text
stringlengths
0
1.59M
meta
dict
Haunted Legends: The Secret of Life ERS Game Studios presents another haunting chapter in the popular Haunted Legends series! You've traveled the world in search of a cure for your deadly illness, and you've finally found it. Unfortunately, it's hidden in a small town with a big secret... A young girl was murdered a week ago, and her soul was cursed. If a purification ritual isn't performed within three days, the curse will spread to the entire town... and your hope of a cure will be lost. Can you uncover the secrets of the House on the Hill to earn the Secret of Life? Find out in this spooky Hidden Object Puzzle Adventure game! Title - Haunted Legends: The Secret of Life Game Download for PC and Mac Description - Revel in Haunted Legends: The Secret of Life, a Hidden Object game devised by ERS G-Studio. Can you uncover the secrets of the House on the Hill to earn the Secret of Life?
{ "pile_set_name": "Pile-CC" }
A hallmark of cancer cells is that they are able to proliferate in the absence of normal proliferative signals. This self-sufficiency in growth signals is often achieved through genetic changes that result in the overexpression of growth factors or their receptors. In breast epithelial cells, normal proliferation is regulated by both steroid hormone receptors and the ErbB family of peptide growth factor receptors (also called Type I receptor tyrosine kinases or RTKs). Overexpression of these receptors is frequently found in breast cancer, and identification of the molecular pathways involved has permitted the development of new breast cancer therapies. Most anti-breast cancer drugs under investigation or in current use act to inactivate the oestrogen receptor or the ErbB receptors, ErbB2 and ErbB1. In particular, much research has focused on the ErbB2 oncogene, because this gene is frequently overexpressed in breast tumours and is associated with a poorer prognosis. Now, however, in a recent report, Holbro and colleagues \[[@B1]\] highlight the oncogenic potential of another ErbB receptor, the ErbB3 receptor, by showing that ErbB3 functions as an essential partner of ErbB2 to drive the proliferation of ErbB2-overexpressing breast tumour cells. The ErbB family of receptors form homodimers and heterodimers on ligand binding to the extracellular domain. The receptor dimer is activated through intrinsic tyrosine kinase-mediated autophosphorylation of the receptors in the cytoplasmic domain. These phosphorylations result in the recruitment of downstream effector proteins that activate multiple signalling pathways including the mitogen-activated protein (MAP) kinase and phosphoinositide 3-kinase (PI-3K) pathways \[[@B2]-[@B4]\]. ErbB3 is distinct in that it has an impaired protein tyrosine kinase activity and activation of this receptor is achieved only through the formation of heterodimeric receptor complexes with other kinase-active family members \[[@B5]-[@B7]\]. In this way, the ErbB2--ErbB3 complex can act as a high-affinity heregulin co-receptor \[[@B8]\]. The ErbB3 receptor is also unique among the ErbB family in its ability to directly recruit and activate PI-3K \[[@B5],[@B9]\]. Elevated levels of tyrosine-phosphorylated ErbB3 are frequently found in breast tumours that overexpress ErbB2 \[[@B10],[@B11]\]. In addition, *in vitro*assays in NIH 3T3 cells and a transgenic mouse model of breast cancer development have shown that ErbB2 cooperates with ErbB3 to transform cells \[[@B12],[@B13]\]. This has led to speculation that ErbB3 might be an important partner to ErbB2 in the development of breast tumours overexpressing ErbB2. To address this issue definitively, Holbro and colleagues used elegant techniques to disrupt ErbB3 and ErbB2 function selectively in breast cancer cells. They blocked ErbB2 activity by using either the ErbB2-selective kinase inhibitor PKI166 \[[@B14]\] or by functionally inactivating the receptor through expression of the single-chain antibody scFv-5R, which targets ErbB2 to the endoplasmic reticulum \[[@B15]\]. To inhibit ErbB3 expression, they infected the cells retrovirally with an artificial transcription factor, E3, composed of a polydactyl zinc-finger domain, which specifically recognizes the 5\' untranslated region of c-erbB3 and downregulates its expression \[[@B16]\]. With these techniques they demonstrated that ErbB2 inactivation blocked proliferation in ErbB2-overexpressing cells and that this was associated with a decrease in the phosphotyrosine content of ErbB3, confirming that ErbB2 activity was required to activate ErbB3. Inactivation of ErbB2 was also associated with a decrease in the level of ErbB3--PI-3K complex and the activity of the PI-3K target, protein kinase B (PKB), demonstrating that activation of the PI-3K pathway was downstream of this receptor. Importantly, they found that specific downregulation of the ErbB3 receptor, using the E3 transcription factor, had similar antiproliferative effects on the cell lines overexpressing ErbB2. The specificity of this effect was confirmed by re-expressing ectopic ErbB3 under the control of a promoter that was insensitive to the E3 transcription factor. Interestingly, some of the cell lines tested also express ErbB1 and ErbB4, suggesting that neither of these receptors is able to substitute for ErbB3. This idea was confirmed by the observation that re-expression of ErbB4 was unable to rescue loss of ErbB3. Together, these results clearly show that ErbB3 is required for ErbB2 to be transforming in these cells. Looking at downstream signalling pathways, the authors observed that, although loss of ErbB3 had no effect on the levels of signalling through the MAP kinase pathway, signalling through the PI-3K pathway was blocked in one cell line. This result suggested that the proliferative signal from this receptor complex was transmitted via this pathway. This finding was corroborated by the observation that constitutive activation of this pathway by the expression of an active form of PKB was sufficient to overcome the proliferative arrest seen in response to the loss of either receptor. Thus, the ErbB2--ErbB3 complex stimulates an oncogenic, proliferative signal via the PI-3K pathway. The clear demonstration of the requirement of ErbB3 as a partner for ErbB2 in breast cell transformation and the observation that the proliferative drive requires signalling through the PI-3K pathway are in line with previous findings. Using a dominant-negative version of ErbB3, Ram and colleagues reported similar findings that ErbB3 function seemed to be required for the growth factor and anchorage independence of an ErbB2-overexpressing breast cancer cell line \[[@B17]\]. In addition, mutagenesis of the ErbB3 receptor to assess its role in the transformation ability of the ErbB2--ErbB3 complex in NIH 3T3 cells points to the importance of the PI-3K pathway in the induction of cellular transformation \[[@B18]\]. The importance of the PI-3K pathway in breast cancer is also suggested by the finding of PTEN deletions and overexpression of PKB in primary breast tumours \[[@B19],[@B20]\]. How does this pathway lead to deregulation of the cell cycle? Holbro and colleagues show that inactivation of this pathway is correlated with a loss of cyclin D3 expression and with a decrease in the phosphorylation of retinoblastoma protein. PI-3K signalling is known to regulate cyclin D levels at both the transcriptional and translational levels \[[@B21]\] and is also known to regulate the concentrations and localization of the cyclin-dependent kinase inhibitor p27^Kip1^\[[@B22]\]. It will be of interest to see whether these are the signalling pathways responsible for driving the proliferation of these cells in this context. These studies clearly show an important role for the PI-3K pathway in the ability of the ErbB2--ErbB3 complex to drive proliferation. However, other signalling pathways originating from the ErbB2--ErbB3 oncogenic unit undoubtedly contribute to transformation *in vivo*. The ErbB2--ErbB3 heterodimer has been reported to increase cell motility and to induce morphological changes that seem to require both PI-3K and MAP kinase signalling \[[@B23]\]. In addition, the ErbB2--ErbB3 heterodimer has been reported to upregulate matrix metalloproteinase-9 expression, which is thought to be important in promoting tumour invasiveness and metastasis \[[@B24]\]. MAP kinase, p38, protein kinase C and PI-3K signalling pathways all seem to have a role in this process. In addition, Src family signalling is thought to be important in the transformation process downstream of ErbB2, through regulation of the cytoskeletal changes that accompany malignant transformation \[[@B25]\]. These findings are relevant to a large proportion of breast malignancies but might also be useful for our understanding of other malignancies. In colorectal cancer, an increase in ErbB2 expression is often associated with an increase in ErbB3 expression \[[@B26]\]. Moreover, co-expression of ErbB2 and ErbB3 is also found in oral squamous cell carcinoma, ovarian tumours and lung adenocarcinomas and in many cases seems to be important for the transformed phenotype of the tumour \[[@B27],[@B28]\]. Advances in our understanding of the molecular pathways responsible for ErbB-mediated transformation should result in the development of novel strategies for treating breast cancer. In particular, the demonstration of an important role of ErbB3 and the PI-3K pathway in driving the proliferation of ErbB2-overexpressing breast cancer cells makes them attractive targets for anti-breast cancer drugs for this subset of patients. One such drug currently undergoing trials is the monoclonal antibody 2C4, which can disrupt the process of heterodimerisation of the ErbB2--ErbB3 receptor by hindering the recruitment of ErbB2 into ErbB3 complexes \[[@B29]\]. It is to be hoped that the identification of ErbB3 as a requisite component of ErbB2 signalling will result in the development of further promising new drugs. Competing interests =================== None declared. Abbreviations ============= MAP = mitogen-activated protein; PI-3K = phosphoinositide 3-kinase; PKB = protein kinase B.
{ "pile_set_name": "PubMed Central" }
Desiree Hartsock & Chris Siegfried Moving In Together In Seattle Desiree, 27, and Chris, 28, moved to Seattle, and they documented their journey through a series of Instagram pics, and Desiree wrote “On the road again! ;) @ChrisRSiegfried #newchapter #roadtrips #mylove #goodbyeCali #helloSeattle.” “Always hard to say goodbye..but hello to my new chapter with @chrisrsiegfried,” she added, but once arrived she tweeted “Home. Sweet. Home. #Seattle.” Desiree is showing such commitment to Chris! She is giving their relationship 110 percent, because she wants to prove all the naysayers who say that she settled for second best wrong. HollywoodLife.com exclusively interviewed the cute couple on August 6, and when asked if they would all go on a double date in Seattle with Catherine and Sean Lowe, Chris and Desiree laughed and said they were open to it! “That is a very interesting question!” said Chris. “Yeah, it would be interesting,” added Desiree. “We all share together,” joked Chris of their love square situation, but Desiree insisted that it could happen. “We like them both and I do speak to both of them, so that would be a possibility.” It sounds like a great idea! What do YOU think HollywoodLifers? Are you happy for Des and Chris? Do you think Des is cool for moving to Seattle?
{ "pile_set_name": "Pile-CC" }
Martin Chapman Martin Chapman (26 March 1846 – 17 March 1924) was a New Zealand barrister. The law firm founded by him in 1875 still exists as Chapman Tripp. He also played first-class cricket for Otago. Early life Chapman was born in 1846 in the Wellington suburb of Karori, the third son of Henry Samuel Chapman. Frederick Chapman was a younger brother. He received his education at the Melbourne Grammar School and in London, and was called to the bar of the Inner Temple in 1871. As a young man, he was a keen sportsman and owned several yachts. He played three first-class matches for Otago between 1864 and 1868. Professional career Chapman returned to New Zealand in 1875 and started to practice on his own account. He was joined in 1882 by William Fitzgerald, a son of James FitzGerald. His partner died in June 1888, and Leonard Owen Howard Tripp joined as the new partner. The name of the firm changed several times due to amalgamations and changes in partners, but reverted to Chapman Tripp in 1949, under which it is still known today. Chapman was amongst the first seven King's Counsel to be appointed in New Zealand in 1907. He retired in 1912. Other activities and death Chapman took over the editorship of the New Zealand Law Reports after Fitzgerald's death. Chapman was a Wellington City Councillor (1888–1890) and a member of the council of the Wellington Law Society. He had an aptitude for languages and as a young man, he became proficient in French and German. He later learned Spanish, Italian, and Portuguese, and Dutch when he was at old age. He once gave as his reason for taking up Spanish because he planned to go on a trip to that country, and could not bear the thought of not being able to read the local newspapers. Chapman died at his home in Golder's Hill (since renamed to Eccleston Hill) in Thorndon on 17 March 1924 aged 78. The funeral service was held at St Paul's Cathedral, after which he was cremated. See also List of Otago representative cricketers References Category:1846 births Category:1924 deaths Category:Wellington City Councillors Category:People educated at Melbourne Grammar School Category:New Zealand Queen's Counsel Category:Members of the Inner Temple Category:New Zealand cricketers Category:Otago cricketers
{ "pile_set_name": "Wikipedia (en)" }
EARLENE Hope your summer has been as pleasant as ours. I can t believe it is over, except I m once more back in my school room with 20 youngsters facing me five days each week. We say as we've said many times before, each show we attend is just delightful in its own way as another. Each one is different - no two are alike but always good and enjoyable. The show on Jimmy Layton's farm in Maryland was quite a surprise. We never realized there would be such a large gathering of machinery and people. We had a wonderful time among all our good friends and engines. -Advertisement- The chicken corn soup supplied by Anna Brandt from Bainbridge fed a large group of us for Saturday evening meal. Need to say it was delicious. Thanks Anna! The next week found us journeying to Canandaigua, New York with the Elmer Schaefers again. They have been kind to take us along in their car so I would not have to drive on these weekend trips. They are most pleasant folks to be in their company. Amos Brandt say to it that my Elmer got on his Huber to drive it in the parade Sunday. Of course this was a thrill for my hubby. He doesn't get such an opportunity too often. It was also good to hear Dayton Nichols announce the parade. He does such a splendid job on the mike. Thanks to him, 12 of us enjoyed a delicious meal together Sunday evening at a nearby restaurant after the show. -Advertisement- The following Thursday we drove to Kinzer for the three days Reunions. This group has surely expanded in size by adding buildings and machinery. It is wonderful to see this progress. Good Luck to them and hope it continues. Mr. Merle Newkirk from Midland, Michigan, invited us along with Mr. and Mrs. Elmer Schaefer and Mr. Walter Carson, Auburn, Michigan to have dinner with him after the show Saturday. This too was a nice experience. We appreciate his kindnesses. Thanks Merle! A very hard rain came just about the time we were getting ready to come home from Kinzer. All our friends helped to gather our belongings together. ___
{ "pile_set_name": "Pile-CC" }
Q: spring application-security configuration bean scan In my project, I needed a custom userDetailsService, So I declaire it like this in certain package: @Service @Ihm(name = "userDetailsService")// ignore Ihm, it's just a custom annotation, which works fine public class UserDetailsServiceImpl implements UserDetailsService And in my application-security.xml file, I added component-scan, <context:component-scan base-package="path(including the userDetailsService for sure)" /> <context:annotation-config /> which didn't help me find my annotated bean, I got bean no defined exception. The only way worked in my case is : 1.remove the service annotation 2.create the bean in the application-security.xml with beans:bean,id,class. this works fine. What's more funny is this, when I kept both the component-scan, and the annotation, I got an ID duplicated(more than one bean, ask to specify the ID) error. More than one UserDetailsService registered. Please use a specific Id reference in <remember-me/> <openid-login/> or <x509 /> elements. So this means the @Service did create the bean, but y won't the security.xml find it? A: Spring Security is auto wiring beans on bean names, for the UserDetailsService that is userDetailsService. @Service public class UserDetailsServiceImpl implements UserDetailsService The code above (like your code) will lead to a bean of the type UserDetailsService however the name is userDetailsServiceImpl and not userDetailsService and hence your bean is never used by Spring Security nor detected by it. (See Spring Reference Guide for naming conventions_ To fix this either change the spring security configuration and put in a reference to your userDetailsServiceImpl bean <authentication-manager> <authentication-provider user-service-ref='userDetailsServiceImpl'/> </authentication-manager> or change the name of your bean by providing the name in the @Service annotation. @Service("userDetailsService") public class UserDetailsServiceImpl implements UserDetailsService Either way will work. Links Using other authentication providers Naming autodetected components
{ "pile_set_name": "StackExchange" }
Q: javascript weird behavior (with Jquery) I have the following code function exibirDialog(div) { $("#divDialogo").ready(function() { $("#divDialogo").dialog({ open: function() { }, close: function() { $(this).dialog("destroy"); }, buttons: { "Print": function() { var popUp = window.open('Print.aspx', "Print", "menubar=0,location=0,height=700,width=700"); //alert(popUp); var x = popUp.document.getElementById('content'); div.clone().appendTo(x); }, "Close": function() { $(this).dialog("destroy"); } } }); }); } Its like: When I click in the Print button the system opens a popup (print.aspx) and copy the div element into the 'content' element. The weird beheavior is: This only works when I uncomment the line "//alert(popUp);" Somebody knows how I do to do this works without the alert? A: The alert gives the page just enough time to load. Your line var x = popUp.document.getElementById('content'); is executed before the content object has the opportunity to be rendered. And because it is not yet on the page, you cannot yet append to it. To wait for the page to load, use the window.opener object. More information about that is available here: http://www.webreference.com/js/tutorial1/opener.html
{ "pile_set_name": "StackExchange" }
Rehambal Rehambal is a census town in Udhampur district about 10 km from Udhampur in the Indian state of Jammu and Kashmir. Demographics India census, Rehambal had a population of 6990. Males constitute 52% of the population and females 48%. Rehambal has an average literacy rate of 67%, higher than the national average of 59.5%: male literacy is 70%, and female literacy is 65%. In Rehambal, 13% of the population is under 6 years of age. Religion Hindu 86.52%, Muslim 6.38% Its distance from main Udhampur town is 10 km on the road towards Jammu (NH44) and it acts as the entry point to the town of Udhampur. Its main attractions include Kali mata mandir which has a small zoo and Dudhar Nallah which is very famous among the youngsters for swimming during the summers. It is also home to 1st Field ordnance depot (1FOD) which is the largest employer in the area. Headquarters of Northern command of Indian army are 5 km from Rehambal. References Category:Cities and towns in Udhampur district
{ "pile_set_name": "Wikipedia (en)" }
An equalizer circuit for compensating for a loss caused by a transmission characteristic of a transmission path is known.
{ "pile_set_name": "USPTO Backgrounds" }
Q: SP13: Image behind Table (HTML) I have content editor web part that I have applied html for a table. I would like to upload an image (through HTML script), but I want the image to appear behind the table. I tried using the following code to add the image behind the table, but the image did not appear. <table align="center" style="width: 94%; height: 96%, background="myimage.gif"> Not sure what I am doing incorrectly. Can anyone help me with the issue? Thanks! A: you can use the below css code for background image: background-image: url("Image.jpg"); background-repeat:no-repeat; background-position:top; background-size:cover;
{ "pile_set_name": "StackExchange" }
Quality of health care provided at a pediatric nurse-managed clinic. The purpose of this study is to assimilate evidence regarding quality of care received at nurse-managed clinics (NMCs), particularly a pediatric NMC that provides health care for the underserved pediatric population. A nonexperimental design was used in this study. Quality of care data were collected at Trinity Nursing Center for Child Health (TNCCH), a pediatric NMC. Evidence included whether a pediatric NMC met selected national benchmark pediatric Healthcare Effectiveness and Data Information Set (HEDIS) quality indicators as well as HEDIS targets set by the Office of Medicaid Policy and Planning (OMPP) in Indiana. Findings suggest that TNCCH met or exceeded national HEDIS benchmark standards of care and targets set by OMPP. This study offers further evidence that NMCs provide a high quality of care. Benefits of addressing the research question in this study include the preservation of the nurse-managed healthcare safety net, increased access to health care for the medically underserved population resulting in improved health outcomes, and evidence to suggest that NMCs can assist private practice physicians to support this population of patients.
{ "pile_set_name": "PubMed Abstracts" }
Q: Alternative approaches to a Minecraft Redstone Simulator I'm just programming a Minecraft Redstone Simulator for Android. I'm doing the simulation with some variations of Dijkstra, but I heard, that the real simulator does something different and updates every redstone block every redstone tick. How is notch doing it? Update I know that he uses a HashSet, this doesn't look like Dijkstra, does it? A: I will call anything that's redstone-related a "redstone block". Every tick, Minecraft iterates through the hashset and updates each redstone block. When more redstone blocks are added, the hashset size is increased, and everything that was in the previous, smaller hashset is scrambled into a random order.
{ "pile_set_name": "StackExchange" }
Urinary cytology in the detection of bladder tumours. Influence of concomitant urothelial atypia. The role of urinary cytology in detection and follow-up of urinary bladder tumours is still evolving. However, considerable variations in the accuracy of detecting bladder tumours exist in published work on the subject. In this study the influence of concomitant urothelial atypia on urinary cytology was investigated. Further, the correlation of grading between cytology and tumour histology was examined, and finally the role of urinary cytology as a prognostic factor was investigated. 102 comparative studies of simultaneously achieved precystoscopic voided urine samples, tumour histology and 8 pre-selected site biopsies were available from patients having a Ta, T1 or T2 bladder tumour. The overall numbers of positive cytology were found to be 64%, but correcting for false positives caused by concomitant urothelial atypia the numbers were reduced to 55% (p less than 0.01). A considerable higher ability to detect high-grade than low-grade tumours was found. Correlation between grading of tumour histology and cytology was found to be only 50%. Patients were followed for 3 years. From the results of pre-cystoscopic cytology it was possible to define a low-risk group and a high-risk group. Patients with negative cytology had very low risk of future invasive tumour recurrence whereas all patients with grade III-IV cytologic changes were found to harbour either a grade III tumour or carcinoma in situ, both conditions predictive of aggressive tumour course.
{ "pile_set_name": "PubMed Abstracts" }
Depression in fatiguing illness: comparing patients with chronic fatigue syndrome, multiple sclerosis and depression. Because depression is commonly observed in the chronic fatigue syndrome (CFS), the present study sought to determine whether the symptom pattern is similar to that seen in clinically depressed subjects (DEP). Individuals with multiple sclerosis (MS) were chosen as an additional comparison group because MS is a fatiguing illness of known organic etiology. The Beck Depression Inventory (BDI) was used to compare categories of depressive symptomatology. Absolute scores on the BDI were higher for the depressed group on mood and self-reproach symptoms, but were not higher than the CFS group on somatic and vegetative items. Analysis of symptoms as a percentage of total BDI score revealed no significant differences in mood or vegetative items among the three groups. The CFS and MS groups exhibited a significantly lower percentage of self-reproach symptoms than DEP, whereas the DEP group showed a lower percentage of somatic symptoms than the CFS and MS groups.
{ "pile_set_name": "PubMed Abstracts" }
The mizuno baseball gloves Diaries The mizuno baseball gloves Diaries This really is an 11 ½ inch baseball glove and Which means it might be somewhat major for many youth players. Regular sized kids underneath nine yrs of age will most likely find it a little large for them. It characteristics very comfortable leather-based all through its development which will substantially reduce break in time. That is also a glove that is very cozy for commencing players to dress in thanks to this sort of style and design features as total grain finger linings. A extremely smart work in glove coming up with below which was carried out using this product by Rawlings. Ground Transport only. Because of the complexity of shipping specifications, additional limits may well submit an application for lithium ion and steel batteries not set up or contained in gear. Pre-Purchase products are transported as soon as in stock and the general public release day arrives. You may be notified of a product's updated status by e mail. The anticipated shipment time is shown within the Solution Detail web site. Remember that each boy or girl differs with regards to their physical toughness and advancement so it is hard to convey what exactly glove dimension is effective For each kid. With that being reported, here is a baseball glove sizing chart That ought to get the job done properly for most children who Engage in the Activity of baseball. Merchants are liable for giving Bizrate with proper and recent charges. Product sales taxes and transport expenses are estimates; make sure you check store for correct quantities. Product or service requirements are received from merchants or third parties. Softer leathers are easy to interrupt in, just take fewer effort and hard work to close and over and over are lighter than rawhide and other sorts of material that baseball gloves are generally product of. As well as, we provide free shipping on all purchases! Our number 1 mission is for making your browsing practical experience as fear cost-free and satisfying as you can, so Examine us out these days at JustBallGloves.com. It is a wonderful all-all-around ball glove but it surely is especially suited to the ones that play the infield. This glove is one that is rather fashionable way too, to convey the least with its primarily black glimpse with yellowish/Orange accents. This certain model is most effective fitted to Individuals youth gamers that wish to play during the infield. It's an internet that is perfect for picking up grounders and It's really a glove that may even their explanation give the youth player a fantastic truly feel for that ball when it really is in this glove. You should Be aware: Some products and solutions are supplied with customization solutions, including monogramming. If you choose a customization solution at checkout, make sure you make it possible for for this preparation time Besides the anticipated cargo time stated around the Product or service Detail website page. Backordered items are shipped after in inventory. You will end up notified of a product's up to date standing by electronic mail. The envisioned shipment time is detailed about the Products Detail web page. *Get On line, Pick Up In Retail outlet orders are typically Completely ready for pick up in just two hrs of submitting an buy. Orders placed immediately after shop several hours are going to be Prepared for get the next day.
{ "pile_set_name": "Pile-CC" }
Q: Eclipse change theme Yesterday when I close eclipse everything was fine. Today I open eclipse and it looks very strange. Some buttons are missing.... and other visual changes. How can I change it back to default look. Btw I'm using: Eclipse Java EE IDE for Web Developers. Version: Mars Release (4.5.0) Build id: 20150621-1200 A: As mentioned in my comment, you can launch eclipse in clean mode by issuing eclipse -clean
{ "pile_set_name": "StackExchange" }
Should College be Free? SourceWe are students, not customers. Education should be a right, not a priviledge Nowadays, if you want to get a decent job, a bachelor’s degree is a must. Whether or not you decide to go to graduate school is up to you. Just remember, you need that college diploma in order to get a skilled job that doesn't have you living paycheck to paycheck. Solutions have been proposed. If you have been closely watching this election cycle for the past year or so, you may have heard Bernie Sanders calling for public colleges to be tuition free. Eventually, Secretary Hillary Clinton has added this proposal to her campaign platform. Jill Stein from the Green Party has proposed for eliminating student debt altogether. As nice as all this sounds: Is is viable? Specifically, would free public colleges be feasible? The Idea Free Public college sounds like a daydream come true. Imagine applying to any public college without worrying if you will be able to pay for it. Imagine only worrying your grades instead of stressing whether you’ll be able to pay for the upcoming semester. And to those who have already graduated: imagine life without college debt. To quote Senator Sanders, “Education should be available to all regardless of anyone’s situation”. Alas, as nice as this all sounds, I believe that making public colleges tuition free is not the answer. Assuming that such a proposal will be passed by Congress without opposition, let’s look at who this would benefit the most. It is important to note that “free” public college is not actually “free”, mainly because it only covers tuition. In regards to food and boarding, students and their families must figure out a way to come up with the funds. A study done by the Brookings Institute shows that such a proposal would mainly benefit higher income families, not lower income families. Aside from preventing debt, the idea behind free public college is to make higher education much more accessible to all, particularly middle to lower income families. Typically, lower income families send their children to community colleges given their low cost. Public colleges, on the other hand, see a greater spectrum of social classes within their student body. Should free public college become a reality, it is worth noting that it would provide more benefits for higher income families instead of lower income families. This chart shows that the top 11% of students (high income), would see 18% of the benefits. The bottom 14% of students (low income), on the other hand, would only see 16% of benefits. SourceThis chart provides a breakdown on how eliminating tuition would affect different social classes Furthermore, lower income students would still have to find a way to fund non-tuition expenses. At this point, these students wouldn’t be able to ask to government for additional funds given that all funds are going towards making public college tuition free. It’s been done before… And here in the United States, too. Over a decade ago, a group of people in Kalamazoo, Michigan got together and decided to create a scholarship to send their town’s high school graduates off to college. Also known as the Kalamazoo Promise, this scholarship covers up to 100% percent of tuition based costs. To be eligible, students must graduate with a high school diploma from Kalamazoo schools. Before we get into the details, it should be noted since the Kalamazoo Promise's inception, high school graduation rates increased. This is a promising sign, as tuition expenses are no longer a roadblock to discourage students from pursuing a college diploma. Moreover, racial gaps via college enrollment has virtually disappeared through the use of this program. It should be noted that income and race are vital factors in this study, especially as black students are more likely to come lower income families. SourceThanks to the Kalamazoo promise, there is an increase in high school graduation rate and an non existent racial gap of graduates If you look at the chart, one can see that college enrollment (for Kalamazoo) between whites and blacks are virtually identical.In spite of this remarkable data, we can see racial gaps reemerge once we measure graduates' progression in college in the following chart. SourceAs time progresses, however, racial gaps reappear as performance is measured throughout the span of sixteen months Over the span of 16 months, we begin to see that white students overall have a better progression compared to black students. This chart also demonstrates that the same concept applies when pitting Not-Disadvantaged students against Disadvantaged students. That is not to say white students are more capable than black students or that non-disadvantaged folk are smarter than disadvantaged folk. It merely shows that their background education was not good enough. We see that for Kalamazoo high school graduates, black and white students progress at a noticeably different rate (57% vs 28%). It becomes more troubling once we see college graduation rates. SourceIn spite of similar high school graduation rates between white and black students, white students surpass black students when it came to college graduation Here we see that although white and black students shared similar high school graduation rates, college graduation rates between the two cohorts are noticeably different. The data shows that there are nearly three times are white college graduates as there are black college graduates. Conclusion The Kalamazoo Promise has succeeded in raising high school graduation rates within the district. It is clear that without college costs discouraging students from attending college, students feel more inspired to graduate high school. With that being said, there are limits to providing free money for students. Just look at the data. Although you have an improved college enrollment rate that eliminates a racial gap, it reemerges once students’ college progression is measured. Furthermore, college graduation rates remain depressingly low once students are divided into racial cohorts. If money isn’t the biggest issue, then what is? College readiness Are high students actually ready for college? In other words, do they have the necessary skills and knowledge to graduate from college? The main issue isn’t money, but rather that high schools aren’t adequately providing students with the tools they deserve. When Senator Sanders first mentioned free college, the internet went viral. College debt is a troubling issue and education is a right that all students should have, especially here in the United States. Nonetheless, problems aren’t resolved just by chucking money at it. Yes, money plays a crucial factor in college enrollment, but what is the point of encouraging students to go to college if they won’t be able to complete it? There should be some type of middle ground. The Kalamazoo Promise was a success in some aspects and should not be overlooked. However, to expect that a student will graduate from college when he/she has a poor education background (K-12) is foolish. I say that high schools, or even the entire public school system, should be reevaluated. While reforms should be done in regards to overpriced college tuition, the public school system should be given high priority as it lays the foundation to the student's success. How could a student succeed when they are forced to stand on weak building blocks? The task will be spartan and gargantuan no doubt, but regardless of our political affiliations and such, a student's education is undeniably worth fighting for.
{ "pile_set_name": "Pile-CC" }
The Clock-Free Asynchronous Receiver Design for Molecular Timing Channels in Diffusion-Based Molecular Communications. In diffusion-based molecular communications, time synchronization is a major reason for the increase of system structure complexity. In this paper, we consider the asynchronous receiver design for molecular communications with information symbols conveyed in the time of released molecules. The main contribution of this paper is that we develop a detector called clock-free asynchronous receiver design (CFARD), in which the receiver recovers the information symbols without measuring the arrival time of molecules. The theoretical analysis indicates that compared with the synchronous receiver designs, the proposed scheme considerably lowers the structure complexity for information demodulation, which is of great significance to the feasibility of nano-scale molecular communications systems with the limitation of energy and size. The numerical results show that in the comparison of bit error ratio (BER) performance, the proposed asynchronous receiver design outperforms the synchronous linear average filter (LAF) detector and approaches to the synchronous maximum likelihood (ML) detector and first arrival (FA) detector.
{ "pile_set_name": "PubMed Abstracts" }
Q: Duplicate calls when using concatMap I want to display in a view the next upcoming event a user is registered to. To do so I need first to retrieve the closest event (in time) the user is registered to and then retrieve the information of this event. Has the list of event a user is registered to is dynamic and so is the event information I need to use two Observable in a row. So I tried to use concatMap but I can see that the getEvent function is called 11 times... I don't understand why and how I could do this better. Here is my controller //Controller nextEvent$: Observable<any>; constructor(public eventService: EventService) { console.log('HomePage constructor'); } ngOnInit(): void { // Retrieve current user this.cuid = this.authService.getCurrentUserUid(); this.nextEvent$ = this.eventService.getNextEventForUser(this.cuid); } The EventService (which contains the getEvent function called 11 times) // EventService getEvent(id: string, company?: string): FirebaseObjectObservable<any> { let comp: string; company ? comp = company : comp = this.authService.getCurrentUserCompany(); console.log('EventService#getEvent - Getting event ', id, ' of company ', comp); let path = `${comp}/events/${id}`; return this.af.object(path); } getNextEventForUser(uid: string): Observable<any> { let company = this.authService.getCurrentUserCompany(); let path = `${company}/users/${uid}/events/joined`; let query = { orderByChild: 'timestampStarts', limitToFirst: 1 }; return this.af.list(path, { query: query }).concatMap(event => this.getEvent(event[0].id)); } And finally my view <ion-card class="card-background-image"> <div class="card-background-container"> <ion-img src="sports-img/img-{{ (nextEvent$ | async)?.sport }}.jpg" width="100%" height="170px"></ion-img> <div class="card-title">{{ (nextEvent$ | async)?.title }}</div> <div class="card-subtitle">{{ (nextEvent$ | async)?.timestampStarts | date:'fullDate' }} - {{ (nextEvent$ | async)?.timestampStarts | date:'HH:mm' }}</div> </div> <ion-item> <img class="sport-icon" src="sports-icons/icon-{{(nextEvent$ | async)?.sport}}.png" item-left> <h2>{{(nextEvent$ | async)?.title}}</h2> <p>{{(nextEvent$ | async)?.sport | hashtag}}</p> </ion-item> <ion-item> <ion-icon name="navigate" isActive="false" item-left small></ion-icon> <h3>{{(nextEvent$ | async)?.location.main_text}}</h3> <h3>{{(nextEvent$ | async)?.location.secondary_text}}</h3> </ion-item> <ion-item> <ion-icon name="time" isActive="false" item-left small></ion-icon> <h3>{{(nextEvent$ | async)?.timestampStarts | date:'HH:mm'}} - {{(nextEvent$ | async)?.timestampEnds | date:'HH:mm'}}</h3> </ion-item> </ion-card> A: The this.af.list(path, { query: query }).concatMap(event => this.getEvent(event[0].id)) is a cold Observable. This means that each time you perform a subscription on it, it will re-execute the underlying stream, which means re-calling the getEvent method. async implicitly subscribes to the Observable, which is why if you count up (nextEvent$ | async) calls in your template, you will see where the 11 comes from. &tldr You need to share the subscription to the stream: this.nextEvent$ = this.eventService.getNextEventForUser(this.cuid) // This shares the underlying subscription between subscribers .share(); The above will connect the stream the first time it is subscribed to but will then subsequently share that subscription between all of the subscribers.
{ "pile_set_name": "StackExchange" }
Father and Daughter duo Darryl & Harmony Lovegorve are a singing sensation that will make your event something you won't forget! Perfect for your next corporate function, charity fundraiser, wedding or other private event Based Sydney, NSW,AustraliaAvailable locally and internationally. A Magical Duo Father and Daughter duo Darryl & Harmony Lovegrove won the highest accolade for entertainment in the corporate and special events industry being 'ENTERTAINER OF THE YEAR' at the prestigious Australian Event Awards 2012. At just 12 years old Harmony is the only child to have bestowed such an honour. Invoking the spirit of much-loved "Father-Daughter" duos Frank and Nancy Sinatra and Nat and Natalie King Cole - award winning performers Darryl Lovegrove and his 12 year old daughter Harmony bring to the stage a unique and special magic that makes audiences everywhere feel good! This extraordinary Father-Daughter duo offer two show options - one being a collection of Broadway blockbusters, contemporary classics and operatic arias including The Prayer, Time to say Goodbye, Somewhere from West Side Story, What the World Needs Nowby Burt Bacharach, The Greatest Love of All and selections from Jesus Christ Superstar, Phantom of the Opera, Beauty & the Beast, Aspects of Loveand Annie. The other show option entitled 'We are Family' is a tribute to the Father-Daughter duos who have gone before them - Frank and Nancy Sinatra, Nat and Natalie King Cole, Australia's own Jimmy and Mahalia Barnes in addition to some of the greatest songs ever recorded by families including The Carpenters, Donny & Marie Osmond, Judy Garland and Liza Minelli, The Jackson Five, The Beach Boys and even the Beach Boys! Well known for his award-winning portrayal of Jesus in Harry M Miller's Jesus Christ Superstar with Jon Stevens and Deni Hines, Darryl won both the Australian Singing Competition and was a finalist in the Asia Pacific Singing Contest in 1989. Appearing in Les Miserables, Chess and alongside Sarah Brightman in The Music of Andrew Lloyd Webber heis the co-creator of the worlds' most successful corporate entertainment act and operatic sensation 'The Three Waiters'. When Tina Arena compares an 11 year old singer to Barbra Streisand - chances are she's worth listening to! Two-time Eisteddfod award-winner and one of the youngest featured artists in the Schools Spectacular 2011 and 2012, Harmony came to the public's attention in the Network 10 revival of 'Young Talent Time' where judge Tina Arena compared her to a young Barbra Streisand and Whitney Huston. Representing two of the finest voices of their respective generations - Darryl & Harmony's vocals will give your audience 'goosebumps'. Some audiences are moved to tears, many are driven to a standing ovation but each and every audience demands an encore! What Others Say... Darryl and Harmony's performance was nothing short of breathtaking. Their unique Father-Daughter performance overwhelmed everyone in attendance. Both performers are incredibly talented in their own right but as a duo they are simply amazing."Patrick Tessier Managing Director AADA National Dealer Convention "To say that guests were absolutely delighted would be an understatement. Everyone was genuinely impressed by Harmony's talent and it goes without saying that the unique flavour of this Father-Daughter combination is truly heart-warming and completely exceeded my expectation for something 'completely fresh and new." Kylie Pagent Group Marketing & Communication Manager AUDI "Barbra Streisand may as well hang up her microphone Harmony because I think you are extraordinary" Tina Arena "You reminded me of a young Whitney Huston"Chucky Klapow - Young Talent Time "Your performance left everyone in the room speechless or in tears and was truly special."Grant Williams, Executive Producer "A Current Affair" “Thank you for your wonderful performance – you and your Dad stole the show!”Don Spencer OAM, Founder Australian Children’s Music Foundation “Alongside her Dad, Harmony and Darryl command the room”.Meg Fisher,Events and Protocol Manager Local Government and Shires Association of NSW “Having them on the show (2UE) was such a highlight we had to replay the performance the next day!" Clint Drieberg Senior Producer/Entertainment Correspondent 2UE "I am amazed by Harmony - not just her talent but her depth of understanding of what Make-A-Wish does and brings to children with life-threatening illness. Thank you all for your wonderful contribution to the Make-A-Wish Balls in Sydney and Melbourne".Bethaney Gilli - Fundraising and Bequest Manager Make-A-Wish Foundation
{ "pile_set_name": "Pile-CC" }
Data Replication is the Key to Business Continuance (Part 1) Written by Robert A. Collar Overview This article is about replication of information, not just disaster recovery, and how it can help improve business continuance for users of Information Technology. While many consider replication primarily a solution for disaster recovery, the reality is that using a robust replication scheme reduces and even eliminates outages in data availability - planned and unplanned. Reducing or eliminating planned outages means mission-critical applications go on generating revenue and improving a company’s bottom line despite interruptions. By reducing a company’s exposure to unplanned outages, the company may be able to continue generating revenue even when the worst cataclysm hits one of their data centers. Drj.com has thousands of articles that will help you learn more about a disaster recovery plan. We have been in the disaster recovery industry for many years and we have partnered with the world's top experts when it comes to business continuity and gathering reliable information on disaster recovery plan templates.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention The present invention relates to a device for receiving a combination of two variable volume chambers and a plurality of valves for forming an ink supply circuit for an ink jet printing head.
{ "pile_set_name": "USPTO Backgrounds" }
Semiquantitative immunohistochemical analysis for hypoxia in human tumors. The goal of this study was to develop a semiquantitative scoring system for measuring hypoxia in human tumors by an immunohistochemical marker approach. Eighteen patients diagnosed with squamous cell carcinoma of the uterine cervix or head and neck were infused intravenously with a solution of pimonidazole hydrochloride at a dose of 0.5 gm/m2. Twenty-four hours later, four biopsies on average from each tumor were fixed in formalin, processed into paraffin blocks, and sectioned. Tissue sections were immunostained for the presence of pimonidazole adducts. Microscopic images (x200) of immunostaining were captured and quantitated by standard image analysis. Images with known amounts of hypoxia spanning ranges of > 0% to 5%, > 5% to 15%, > 15% to 30%, and >30% were assigned scores of +1, +2, +3, and +4, respectively. Three observers then used this calibrated scoring system to analyze hypoxia in tumor sections in a blinded fashion. Excellent interobserver reproducibility was obtained with the calibrated, semiquantitative, immunohistochemical assay for hypoxia in squamous cell carcinomas. The calibrated, semiquantitative assay shows promise as an approach to simplifying the quantitation of human tumor hypoxia by immunohistochemical techniques.
{ "pile_set_name": "PubMed Abstracts" }
{ "private": true, "main": "index.js" }
{ "pile_set_name": "Github" }
Respiratory symptoms in children dying from malignant disease. Shortness of breath and other respiratory symptoms frequently complicate the symptomatic management of terminally ill adults. The extent of the problem in children is not known, but anecdotal evidence from nurses and physicians experienced in paediatric oncology has suggested that respiratory problems are less frequent in children dying from malignant disease than in adults. This is a retrospective review of all children dying from cancer under the care of the symptom care team at the Royal Marsden Hospital between 1982 and 1993. The results show that respiratory symptoms were recorded during the last three months of life in 40% of analysable case histories. The nature of respiratory symptoms in paediatric cancer patients is discussed.
{ "pile_set_name": "PubMed Abstracts" }
In the aftermath of RTO week and following up on Rick's successful pre-briefings, we should be out spinning on the back end as well. Perhaps Sarah, Meredith and I can come up with some thoughts on message points and send them around for comment. Sound OK?
{ "pile_set_name": "Enron Emails" }
Q: ggplot2: Stat_function misbehaviour with log scales I am trying to plot a point histogram (a histogram that shows the values with a point instead of bars) that is log-scaled. The result should look like this: MWE: Lets simulate some Data: set.seed(123) d <- data.frame(x = rnorm(1000)) To get the point histogram I need to calculate the histogram data (hdata) first hdata <- hist(d$x, plot = FALSE) tmp <- data.frame(mids = hdata$mids, density = hdata$density, counts = hdata$counts) which we can plot like this p <- ggplot(tmp, aes(x = mids, y = density)) + geom_point() + stat_function(fun = dnorm, col = "red") p to get this graph: In theory we should be able to apply the log scales (and set the y-limits to be above 0) and we should have a similar picture to the target graph. However, if I apply it I get the following graph: p + scale_y_log10(limits = c(0.001, 10)) The stat_function clearly shows non-scaled values instead of producing a figure closer to the solid line in the first picture. Any ideas? Bonus Are there any ways to graph the histogram with dots without using the hist(..., plot = FALSE) function? EDIT Workaround One possible solution is to calculate the dnorm-data outside of ggplot and then insert it as a line. For example tmp2 <- data.frame(mids = seq(from = min(tmp$mids), to = max(tmp$mids), by = (max(tmp$mids) - min(tmp$mids))/10000)) tmp2$dnorm <- dnorm(tmp2$mids) # Plot it ggplot() + geom_point(data = tmp, aes(x = mids, y = density)) + geom_line(data = tmp2, aes(x = mids, y = dnorm), col = "red") + scale_y_log10() This returns a graph like the following. This is basically the graph, but it doesn't resolve the stat_function issue. A: library(ggplot2) set.seed(123) d <- data.frame(x = rnorm(1000)) ggplot(d, aes(x)) + stat_bin(geom = "point", aes(y = ..density..), #same breaks as function hist's default: breaks = pretty(range(d$x), n = nclass.Sturges(d$x), min.n = 1), position = "identity") + stat_function(fun = dnorm, col = "red") + scale_y_log10(limits = c(0.001, 10))
{ "pile_set_name": "StackExchange" }
/* * Copyright (C) 2018 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.jetbrains.android; import static com.android.SdkConstants.ANDROID_URI; import static com.android.SdkConstants.ATTR_DRAWABLE; import static com.android.SdkConstants.ATTR_SRC; import static com.android.SdkConstants.DOT_XML; import static com.android.SdkConstants.FD_RES_LAYOUT; import com.android.ide.common.rendering.api.ResourceReference; import com.android.ide.common.rendering.api.ResourceValue; import com.android.ide.common.resources.ResourceItem; import com.android.ide.common.resources.ResourceResolver; import com.android.ide.common.resources.configuration.DensityQualifier; import com.android.ide.common.resources.configuration.FolderConfiguration; import com.android.resources.Density; import com.android.tools.adtui.LightCalloutPopup; import com.android.tools.idea.configurations.Configuration; import com.android.tools.idea.configurations.ConfigurationManager; import com.android.tools.idea.flags.StudioFlags; import com.android.tools.idea.res.FileResourceReader; import com.android.tools.idea.res.LocalResourceRepository; import com.android.tools.idea.res.ResourceHelper; import com.android.tools.idea.res.ResourceRepositoryManager; import com.android.tools.idea.ui.resourcechooser.ColorResourcePicker; import com.android.tools.idea.ui.resourcechooser.HorizontalTabbedPanelBuilder; import com.android.tools.idea.ui.resourcechooser.colorpicker2.ColorPickerBuilder; import com.android.tools.idea.ui.resourcechooser.colorpicker2.internal.MaterialColorPaletteProvider; import com.android.tools.idea.ui.resourcechooser.colorpicker2.internal.MaterialGraphicalColorPipetteProvider; import com.android.utils.HashCodes; import com.google.common.annotations.VisibleForTesting; import com.intellij.openapi.actionSystem.AnAction; import com.intellij.openapi.actionSystem.AnActionEvent; import com.intellij.openapi.actionSystem.CommonDataKeys; import com.intellij.openapi.application.ApplicationManager; import com.intellij.openapi.application.TransactionGuard; import com.intellij.openapi.command.WriteCommandAction; import com.intellij.openapi.editor.Editor; import com.intellij.openapi.editor.markup.GutterIconRenderer; import com.intellij.openapi.fileTypes.FileType; import com.intellij.openapi.fileTypes.UnknownFileType; import com.intellij.openapi.project.Project; import com.intellij.openapi.util.Computable; import com.intellij.openapi.vfs.VirtualFile; import com.intellij.psi.PsiElement; import com.intellij.psi.PsiFile; import com.intellij.psi.util.PsiTreeUtil; import com.intellij.psi.xml.XmlAttribute; import com.intellij.psi.xml.XmlAttributeValue; import com.intellij.psi.xml.XmlTag; import com.intellij.psi.xml.XmlTagValue; import com.intellij.ui.scale.JBUIScale; import com.intellij.util.Consumer; import com.intellij.util.EmptyConsumer; import com.intellij.util.ui.ColorIcon; import com.intellij.util.ui.EmptyIcon; import java.awt.*; import java.util.List; import java.util.Objects; import javax.swing.*; import org.jetbrains.android.facet.AndroidFacet; import org.jetbrains.annotations.NotNull; import org.jetbrains.annotations.Nullable; import org.xmlpull.v1.XmlPullParser; /** * Static methods to be used by Android annotators. */ public class AndroidAnnotatorUtil { static final int MAX_ICON_SIZE = 5000; private static final String SET_COLOR_COMMAND_NAME = "Change Color"; private static final int ICON_SIZE = 8; /** * Returns a bitmap to be used as an icon to annotate an Android resource reference in an XML file. * * @param resourceValue the resource value defining the resource being referenced * @param resourceResolver the resource resolver to use * @param facet the android facet * @return the bitmap for the annotation icon, or null to have no annotation icon */ @Nullable public static VirtualFile resolveDrawableFile(@NotNull ResourceValue resourceValue, @NotNull ResourceResolver resourceResolver, @NotNull AndroidFacet facet) { Project project = facet.getModule().getProject(); VirtualFile file = ResourceHelper.resolveDrawable(resourceResolver, resourceValue, project); if (file != null && file.getPath().endsWith(DOT_XML)) { file = pickBitmapFromXml(file, resourceResolver, project, facet, resourceValue); } return pickBestBitmap(file); } @Nullable private static VirtualFile pickBitmapFromXml(@NotNull VirtualFile file, @NotNull ResourceResolver resourceResolver, @NotNull Project project, @NotNull AndroidFacet facet, @NotNull ResourceValue resourceValue) { try { XmlPullParser parser = FileResourceReader.createXmlPullParser(file); if (parser == null) { return null; } if (parser.nextTag() != XmlPullParser.START_TAG) { return null; } String source; String tagName = parser.getName(); switch (tagName) { case "vector": { // Take a look and see if we have a bitmap we can fall back to. LocalResourceRepository resourceRepository = ResourceRepositoryManager.getAppResources(facet); List<ResourceItem> items = resourceRepository.getResources(resourceValue.getNamespace(), resourceValue.getResourceType(), resourceValue.getName()); for (ResourceItem item : items) { FolderConfiguration configuration = item.getConfiguration(); DensityQualifier densityQualifier = configuration.getDensityQualifier(); if (densityQualifier != null) { Density density = densityQualifier.getValue(); if (density != null && density.isValidValueForDevice()) { return ResourceHelper.getSourceAsVirtualFile(item); } } } // Vectors are handled in the icon cache. return file; } case "bitmap": case "nine-patch": source = parser.getAttributeValue(ANDROID_URI, ATTR_SRC); break; case "clip": case "inset": case "scale": source = parser.getAttributeValue(ANDROID_URI, ATTR_DRAWABLE); break; case "layer-list": case "level-list": case "selector": case "shape": case "transition": return file; default: // <set>, <drawable> etc - no bitmap to be found. return null; } if (source == null) { return null; } ResourceValue resValue = resourceResolver.findResValue(source, resourceValue.isFramework()); return resValue == null ? null : ResourceHelper.resolveDrawable(resourceResolver, resValue, project); } catch (Throwable ignore) { // Not logging for now; afraid to risk unexpected crashes in upcoming preview. TODO: Re-enable. //Logger.getInstance(AndroidColorAnnotator.class).warn(String.format("Could not read/render icon image %1$s", file), e); return null; } } @Nullable public static VirtualFile pickBestBitmap(@Nullable VirtualFile bitmap) { if (bitmap != null && bitmap.exists()) { // Pick the smallest resolution, if possible! E.g. if the theme resolver located // drawable-hdpi/foo.png, and drawable-mdpi/foo.png pick that one instead (and ditto // for -ldpi etc) VirtualFile smallest = findSmallestDpiVersion(bitmap); if (smallest != null) { return smallest; } // TODO: For XML drawables, look in the rendered output to see if there's a DPI version we can use: // These are found in ${module}/build/generated/res/pngs/debug/drawable-*dpi long length = bitmap.getLength(); if (length < MAX_ICON_SIZE) { return bitmap; } } return null; } @Nullable private static VirtualFile findSmallestDpiVersion(@NotNull VirtualFile bitmap) { VirtualFile parentFile = bitmap.getParent(); if (parentFile == null) { return null; } VirtualFile resFolder = parentFile.getParent(); if (resFolder == null) { return null; } String parentName = parentFile.getName(); FolderConfiguration config = FolderConfiguration.getConfigForFolder(parentName); if (config == null) { return null; } DensityQualifier qualifier = config.getDensityQualifier(); if (qualifier == null) { return null; } Density density = qualifier.getValue(); if (density != null && density.isValidValueForDevice()) { String fileName = bitmap.getName(); Density[] densities = Density.values(); // Iterate in reverse, since the Density enum is in descending order. for (int i = densities.length; --i >= 0;) { Density d = densities[i]; if (d.isValidValueForDevice()) { String folderName = parentName.replace(density.getResourceValue(), d.getResourceValue()); VirtualFile folder = resFolder.findChild(folderName); if (folder != null) { bitmap = folder.findChild(fileName); if (bitmap != null) { if (bitmap.getLength() > MAX_ICON_SIZE) { // No point continuing the loop; the other densities will be too big too. return null; } return bitmap; } } } } } return null; } /** * Picks a suitable configuration to use for resource resolution within a given file. * * @param file the file to determine a configuration for * @param facet {@link AndroidFacet} of the {@code file} */ @Nullable public static Configuration pickConfiguration(@NotNull PsiFile file, @NotNull AndroidFacet facet) { VirtualFile virtualFile = file.getVirtualFile(); if (virtualFile == null) { return null; } VirtualFile parent = virtualFile.getParent(); if (parent == null) { return null; } VirtualFile layout; String parentName = parent.getName(); if (!parentName.startsWith(FD_RES_LAYOUT)) { layout = ResourceHelper.pickAnyLayoutFile(facet); if (layout == null) { return null; } } else { layout = virtualFile; } return ConfigurationManager.getOrCreateInstance(facet.getModule()).getConfiguration(layout); } /** * Return {@link FileType} if found, or {@link UnknownFileType#INSTANCE} otherwise. */ @NotNull public static FileType getFileType(@NotNull PsiElement element) { return ApplicationManager.getApplication().runReadAction((Computable<FileType>)() -> { PsiFile file = element.getContainingFile(); if (file != null) { return file.getFileType(); } return UnknownFileType.INSTANCE; }); } public static class ColorRenderer extends GutterIconRenderer { private final PsiElement myElement; private final Color myColor; private final ResourceReference myResourceReference; private final Consumer<String> mySetColorTask; private final boolean myIncludeClickAction; @Nullable private final Configuration myConfiguration; public ColorRenderer(@NotNull PsiElement element, @Nullable Color color, @Nullable ResourceReference resourceReference, boolean includeClickAction, @Nullable Configuration configuration) { myElement = element; myColor = color; myResourceReference = resourceReference; myIncludeClickAction = includeClickAction; mySetColorTask = createSetColorTask(myElement); myConfiguration = configuration; } @NotNull @Override public Icon getIcon() { Color color = getCurrentColor(); return color == null ? JBUIScale.scaleIcon(EmptyIcon.create(ICON_SIZE)) : JBUIScale.scaleIcon(new ColorIcon(ICON_SIZE, color)); } @Nullable private Color getCurrentColor() { if (myColor != null) { return myColor; } else if (myElement instanceof XmlTag) { return ResourceHelper.parseColor(((XmlTag)myElement).getValue().getText()); } else if (myElement instanceof XmlAttributeValue) { return ResourceHelper.parseColor(((XmlAttributeValue)myElement).getValue()); } else { return null; } } @Override public AnAction getClickAction() { if (!myIncludeClickAction) { // Cannot set colors that were derived. return null; } return new AnAction() { @Override public void actionPerformed(@NotNull AnActionEvent e) { Editor editor = e.getData(CommonDataKeys.EDITOR); if (editor != null) { openColorPicker(getCurrentColor()); } } }; } private void openColorPicker(@Nullable Color currentColor) { LightCalloutPopup dialog = new LightCalloutPopup(); JComponent colorPicker = new ColorPickerBuilder() .setOriginalColor(currentColor) .addSaturationBrightnessComponent() .addColorAdjustPanel(new MaterialGraphicalColorPipetteProvider()) .addColorValuePanel().withFocus() .addSeparator() .addCustomComponent(MaterialColorPaletteProvider.INSTANCE) .addColorPickerListener((color, source) -> setColorToAttribute(color)) .focusWhenDisplay(true) .setFocusCycleRoot(true) .build(); JComponent popupContent; if (StudioFlags.NELE_RESOURCE_POPUP_PICKER.get() && myConfiguration != null) { // Use tabbed panel instead. ColorResourcePicker resourcePicker = new ColorResourcePicker(myConfiguration, myResourceReference); // TODO: Use relative resource url instead. resourcePicker.addColorResourcePickerListener(resource -> setColorStringAttribute(resource.getResourceUrl().toString())); popupContent = new HorizontalTabbedPanelBuilder() .addTab("Resources", resourcePicker) .addTab("Custom", colorPicker) .setDefaultPage(myResourceReference != null ? 0 : 1) .build(); } else { popupContent = colorPicker; } dialog.show(popupContent, null, MouseInfo.getPointerInfo().getLocation()); } private void setColorToAttribute(@NotNull Color color) { setColorStringAttribute(ResourceHelper.colorToString(color)); } private void setColorStringAttribute(@NotNull String colorString) { Project project = myElement.getProject(); TransactionGuard.submitTransaction(project, () -> WriteCommandAction.runWriteCommandAction(project, SET_COLOR_COMMAND_NAME, null, () -> mySetColorTask.consume(colorString)) ); } @Override public boolean equals(Object o) { if (this == o) return true; if (o == null || getClass() != o.getClass()) return false; ColorRenderer that = (ColorRenderer)o; // TODO: Compare with modification count in app resources (if not framework). if (!Objects.equals(myColor, that.myColor)) return false; if (!myElement.equals(that.myElement)) return false; return true; } @Override public int hashCode() { return HashCodes.mix(myElement.hashCode(), Objects.hashCode(myColor)); } @VisibleForTesting public static Consumer<String> createSetColorTask(@NotNull PsiElement element) { if (element instanceof XmlTag) { XmlTagValue xmlTagValue = ((XmlTag)element).getValue(); return colorString -> xmlTagValue.setText(colorString); } else if (element instanceof XmlAttributeValue) { XmlAttribute xmlAttribute = PsiTreeUtil.getParentOfType(element, XmlAttribute.class); if (xmlAttribute != null) { return colorString -> xmlAttribute.setValue(colorString); } } // Unknown case, do nothing. return EmptyConsumer.getInstance(); } } }
{ "pile_set_name": "Github" }
Spending a penny could cost $16 in Chinese city People with a poor aim are to be fined if they miss their mark when using public toilets in a Chinese city. (AFP Photo) People with a poor aim are to be fined if they miss their mark when using public toilets in a Chinese city, officials said -- provoking online derision over how the rule will be enforced. The penalty will apply to those who urinate outside the bowl of facilities in Shenzhen, the southern boom town neighbouring Hong Kong, although draft regulations seen by AFP did not specify a minimum quantity of spillage required to be classed as a violation. "Such uncouth use of a public toilet will be fined 100 yuan ($16) by authorities" from next month, a city government official told AFP on Tuesday. Users of China's rumbustious weibo social networks poured scorn on the measures, raising the prospect of hordes of toilet inspectors being deployed to inspect performance. "A number of new civil servant positions will be created. There will be a supervisor behind every urinating person to see whether the pee is straight," wrote one poster. Another added: "Very good measures. I expect they can create 20 jobs on average for every public toilet." Officials with the department responsible for details of the rules could not immediately be reached for comment by AFP on Tuesday. The measures have also provoked more considered debate, with one user arguing: "It's better to have no rule than a rule that cannot be implemented." The Beijing Times carried a commentary calling into question the necessity of making a law on something that "can be simply guided by social consensus". "The law should maintain the most basic restraint about the people's private life," wrote Shu Li, a legal worker. Chinese toilet discipline can be notoriously wayward, with pictures of people defecating in public sometimes appearing on weibo.
{ "pile_set_name": "Pile-CC" }
Mountain Commerce Bank has promoted Donnie Blair to vice president and director of technology and information security. Blair has more than 22 years of experience in technology and information security in both the financial and the health care industries. He began his career with Mountain Commerce Bank in 2006 overseeing the implementation of MCB’s technology, serving as senior manager of enterprise infrastructure. In 2010, he was promoted to senior information technology manager. He earned his bachelor of science degree from East Tennessee State University majoring in computer science. Blair holds several software certifications.
{ "pile_set_name": "Pile-CC" }
Bithiga Bithiga is a genus of moths of the family Noctuidae. Species Bithiga rubrisparsa Walker, 1865 References Natural History Museum Lepidoptera genus database Category:Calpinae
{ "pile_set_name": "Wikipedia (en)" }
Q: In vb.net what's the deal with these variable being surrounded by sharp parenthesis? I was reviewing some of my colleagues vb.net code the other day and was mystified at a new level - Unfortunately I don't have the code at hand but it looked something like this: Public Class foo Public Function [new]([bar] As String, [baz] As String) As String Return String.Concat([bar], baz) End Function End Class I have never seen these sharp parenthesis surrounding the name of the function and variable. Anyone can explain to me what the purpose of this is. A: It's because "new" is a keyword and using [ ] is telling the compiler that it should read the keyword as a literal string instead. This way you can use keywords as variable and method names ... if you wanted. I think the usage around the variables [bar] and [baz] is just .... well, because he could.
{ "pile_set_name": "StackExchange" }
/* * FreeRTOS Kernel V10.1.0 * Copyright (C) 2018 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Permission is hereby granted, free of charge, to any person obtaining a copy of * this software and associated documentation files (the "Software"), to deal in * the Software without restriction, including without limitation the rights to * use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of * the Software, and to permit persons to whom the Software is furnished to do so, * subject to the following conditions: * * The above copyright notice and this permission notice shall be included in all * copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS * FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR * COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER * IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. * * http://www.FreeRTOS.org * http://aws.amazon.com/freertos * * 1 tab == 4 spaces! */ /****************************************************************************** * >>>>>> NOTE 1: <<<<<< * * main() can be configured to create either a very simple LED flasher demo, or * a more comprehensive test/demo application. * * To create a very simple LED flasher example, set the * mainCREATE_SIMPLE_LED_FLASHER_DEMO_ONLY constant (defined below) to 1. When * this is done, only the standard demo flash tasks are created. The standard * demo flash example creates three tasks, each of which toggle an LED at a * fixed but different frequency. * * To create a more comprehensive test and demo application, set * mainCREATE_SIMPLE_LED_FLASHER_DEMO_ONLY to 0. ****************************************************************************** * * main() creates all the demo application tasks and software timers, then starts * the scheduler. The web documentation provides more details of the standard * demo application tasks, which provide no particular functionality, but do * provide a good example of how to use the FreeRTOS API. * * In addition to the standard demo tasks, the following tasks and tests are * defined and/or created within this file: * * "Reg test" tasks - These fill both the core and floating point registers with * known values, then check that each register maintains its expected value for * the lifetime of the task. Each task uses a different set of values. The reg * test tasks execute with a very low priority, so get preempted very * frequently. A register containing an unexpected value is indicative of an * error in the context switching mechanism. * * "Check" timer - The check software timer period is initially set to three * seconds. The callback function associated with the check software timer * checks that all the standard demo tasks, and the register check tasks, are * not only still executing, but are executing without reporting any errors. If * the check software timer discovers that a task has either stalled, or * reported an error, then it changes its own execution period from the initial * three seconds, to just 200ms. The check software timer callback function * also toggles an LED each time it is called. This provides a visual * indication of the system status: If the LED toggles every three seconds, * then no issues have been discovered. If the LED toggles every 200ms, then * an issue has been discovered with at least one task. */ /* Standard includes. */ #include <stdio.h> /* Kernel includes. */ #include "FreeRTOS.h" #include "task.h" #include "timers.h" #include "semphr.h" /* Demo application includes. */ #include "partest.h" #include "flash.h" #include "flop.h" #include "integer.h" #include "PollQ.h" #include "semtest.h" #include "dynamic.h" #include "BlockQ.h" #include "blocktim.h" #include "countsem.h" #include "GenQTest.h" #include "recmutex.h" #include "death.h" /* Hardware includes. */ #include "platform_config.h" /* Priorities for the demo application tasks. */ #define mainFLASH_TASK_PRIORITY ( tskIDLE_PRIORITY + 1UL ) #define mainQUEUE_POLL_PRIORITY ( tskIDLE_PRIORITY + 2UL ) #define mainSEM_TEST_PRIORITY ( tskIDLE_PRIORITY + 1UL ) #define mainBLOCK_Q_PRIORITY ( tskIDLE_PRIORITY + 2UL ) #define mainCREATOR_TASK_PRIORITY ( tskIDLE_PRIORITY + 3UL ) #define mainFLOP_TASK_PRIORITY ( tskIDLE_PRIORITY ) /* The LED used by the check timer. */ #define mainCHECK_LED ( 3UL ) /* A block time of zero simply means "don't block". */ #define mainDONT_BLOCK ( 0UL ) /* The period after which the check timer will expire, in ms, provided no errors have been reported by any of the standard demo tasks. ms are converted to the equivalent in ticks using the portTICK_PERIOD_MS constant. */ #define mainCHECK_TIMER_PERIOD_MS ( 3000UL / portTICK_PERIOD_MS ) /* The period at which the check timer will expire, in ms, if an error has been reported in one of the standard demo tasks. ms are converted to the equivalent in ticks using the portTICK_PERIOD_MS constant. */ #define mainERROR_CHECK_TIMER_PERIOD_MS ( 200UL / portTICK_PERIOD_MS ) /* Set mainCREATE_SIMPLE_LED_FLASHER_DEMO_ONLY to 1 to create a simple demo. Set mainCREATE_SIMPLE_LED_FLASHER_DEMO_ONLY to 0 to create a much more comprehensive test application. See the comments at the top of this file, and the documentation page on the http://www.FreeRTOS.org web site for more information. */ #define mainCREATE_SIMPLE_LED_FLASHER_DEMO_ONLY 0 /*-----------------------------------------------------------*/ /* * Set up the hardware ready to run this demo. */ static void prvSetupHardware( void ); /* * The check timer callback function, as described at the top of this file. */ static void prvCheckTimerCallback( TimerHandle_t xTimer ); /* * Register check tasks, and the tasks used to write over and check the contents * of the FPU registers, as described at the top of this file. The nature of * these files necessitates that they are written in an assembly file. */ extern void vRegTest1Task( void *pvParameters ); extern void vRegTest2Task( void *pvParameters ); extern void vRegTestClearFlopRegistersToParameterValue( unsigned long ulValue ); extern unsigned long ulRegTestCheckFlopRegistersContainParameterValue( unsigned long ulValue ); /* * This file can be used to create either a simple LED flasher example, or a * comprehensive test/demo application - depending on the setting of the * mainCREATE_SIMPLE_LED_FLASHER_DEMO_ONLY constant defined above. If * mainCREATE_SIMPLE_LED_FLASHER_DEMO_ONLY is set to 1, then the following * function will create a lot of additional tasks and a software timer. If * mainCREATE_SIMPLE_LED_FLASHER_DEMO_ONLY is set to 0, then the following * function will do nothing. */ static void prvOptionallyCreateComprehensveTestApplication( void ); /*-----------------------------------------------------------*/ /* The following two variables are used to communicate the status of the register check tasks to the check software timer. If the variables keep incrementing, then the register check tasks have not discovered any errors. If a variable stops incrementing, then an error has been found. */ volatile unsigned long ulRegTest1LoopCounter = 0UL, ulRegTest2LoopCounter = 0UL; /*-----------------------------------------------------------*/ int main( void ) { /* Configure the hardware ready to run the test. */ prvSetupHardware(); /* Start standard demo/test application flash tasks. See the comments at the top of this file. The LED flash tasks are always created. The other tasks are only created if mainCREATE_SIMPLE_LED_FLASHER_DEMO_ONLY is set to 0 (at the top of this file). See the comments at the top of this file for more information. */ vStartLEDFlashTasks( mainFLASH_TASK_PRIORITY ); /* The following function will only create more tasks and timers if mainCREATE_SIMPLE_LED_FLASHER_DEMO_ONLY is set to 0 (at the top of this file). See the comments at the top of this file for more information. */ prvOptionallyCreateComprehensveTestApplication(); /* Start the scheduler. */ vTaskStartScheduler(); /* Infinite loop */ for( ;; ); } /*-----------------------------------------------------------*/ static void prvCheckTimerCallback( TimerHandle_t xTimer ) { static long lChangedTimerPeriodAlready = pdFALSE; static unsigned long ulLastRegTest1Value = 0, ulLastRegTest2Value = 0; unsigned long ulErrorFound = pdFALSE; /* Check all the demo tasks (other than the flash tasks) to ensure that they are all still running, and that none have detected an error. */ if( xAreMathsTaskStillRunning() != pdTRUE ) { ulErrorFound |= 0x01UL << 0UL; } if( xAreIntegerMathsTaskStillRunning() != pdTRUE ) { ulErrorFound |= 0x01UL << 1UL; } if( xAreDynamicPriorityTasksStillRunning() != pdTRUE ) { ulErrorFound |= 0x01UL << 2UL; } if( xAreBlockingQueuesStillRunning() != pdTRUE ) { ulErrorFound |= 0x01UL << 3UL; } if ( xAreBlockTimeTestTasksStillRunning() != pdTRUE ) { ulErrorFound |= 0x01UL << 4UL; } if ( xAreGenericQueueTasksStillRunning() != pdTRUE ) { ulErrorFound |= 0x01UL << 5UL; } if ( xAreRecursiveMutexTasksStillRunning() != pdTRUE ) { ulErrorFound |= 0x01UL << 6UL; } if( xIsCreateTaskStillRunning() != pdTRUE ) { ulErrorFound |= 0x01UL << 7UL; } if( xArePollingQueuesStillRunning() != pdTRUE ) { ulErrorFound |= 0x01UL << 8UL; } if( xAreSemaphoreTasksStillRunning() != pdTRUE ) { ulErrorFound |= 0x01UL << 9UL; } /* Check that the register test 1 task is still running. */ if( ulLastRegTest1Value == ulRegTest1LoopCounter ) { ulErrorFound |= 0x01UL << 10UL; } ulLastRegTest1Value = ulRegTest1LoopCounter; /* Check that the register test 2 task is still running. */ if( ulLastRegTest2Value == ulRegTest2LoopCounter ) { ulErrorFound |= 0x01UL << 11UL; } ulLastRegTest2Value = ulRegTest2LoopCounter; /* Toggle the check LED to give an indication of the system status. If the LED toggles every mainCHECK_TIMER_PERIOD_MS milliseconds then everything is ok. A faster toggle indicates an error. */ vParTestToggleLED( mainCHECK_LED ); /* Have any errors been latch in ulErrorFound? If so, shorten the period of the check timer to mainERROR_CHECK_TIMER_PERIOD_MS milliseconds. This will result in an increase in the rate at which mainCHECK_LED toggles. */ if( ulErrorFound != pdFALSE ) { if( lChangedTimerPeriodAlready == pdFALSE ) { lChangedTimerPeriodAlready = pdTRUE; /* This call to xTimerChangePeriod() uses a zero block time. Functions called from inside of a timer callback function must *never* attempt to block. */ xTimerChangePeriod( xTimer, ( mainERROR_CHECK_TIMER_PERIOD_MS ), mainDONT_BLOCK ); } } } /*-----------------------------------------------------------*/ static void prvSetupHardware( void ) { extern void Hitex_CGU_Init( void ); /* Setup system (clock, PLL and Flash configuration) */ platformInit(); /* Wind the clock speed up in steps to its maximum. */ Hitex_CGU_Init(); /* Ensure all priority bits are assigned as preemption priority bits. */ NVIC_SetPriorityGrouping( 0 ); /* Setup the LED outputs. */ vParTestInitialise(); } /*-----------------------------------------------------------*/ static void prvOptionallyCreateComprehensveTestApplication( void ) { #if ( mainCREATE_SIMPLE_LED_FLASHER_DEMO_ONLY == 0 ) { TimerHandle_t xCheckTimer = NULL; /* Start all the other standard demo/test tasks. */ vStartIntegerMathTasks( tskIDLE_PRIORITY ); vStartDynamicPriorityTasks(); vStartBlockingQueueTasks( mainBLOCK_Q_PRIORITY ); vCreateBlockTimeTasks(); vStartCountingSemaphoreTasks(); vStartGenericQueueTasks( tskIDLE_PRIORITY ); vStartRecursiveMutexTasks(); vStartPolledQueueTasks( mainQUEUE_POLL_PRIORITY ); vStartSemaphoreTasks( mainSEM_TEST_PRIORITY ); /* Most importantly, start the tasks that use the FPU. */ vStartMathTasks( mainFLOP_TASK_PRIORITY ); /* Create the register check tasks, as described at the top of this file */ xTaskCreate( vRegTest1Task, "Reg1", configMINIMAL_STACK_SIZE, ( void * ) NULL, tskIDLE_PRIORITY, NULL ); xTaskCreate( vRegTest2Task, "Reg2", configMINIMAL_STACK_SIZE, ( void * ) NULL, tskIDLE_PRIORITY, NULL ); /* Create the software timer that performs the 'check' functionality, as described at the top of this file. */ xCheckTimer = xTimerCreate( "CheckTimer", /* A text name, purely to help debugging. */ ( mainCHECK_TIMER_PERIOD_MS ), /* The timer period, in this case 3000ms (3s). */ pdTRUE, /* This is an auto-reload timer, so xAutoReload is set to pdTRUE. */ ( void * ) 0, /* The ID is not used, so can be set to anything. */ prvCheckTimerCallback /* The callback function that inspects the status of all the other tasks. */ ); if( xCheckTimer != NULL ) { xTimerStart( xCheckTimer, mainDONT_BLOCK ); } /* This task has to be created last as it keeps account of the number of tasks it expects to see running. */ vCreateSuicidalTasks( mainCREATOR_TASK_PRIORITY ); } #else /* mainCREATE_SIMPLE_LED_FLASHER_DEMO_ONLY */ { /* Just to prevent compiler warnings when the configuration options are set such that these static functions are not used. */ ( void ) vRegTest1Task; ( void ) vRegTest2Task; ( void ) prvCheckTimerCallback; ( void ) prvSetupNestedFPUInterruptsTest; } #endif /* mainCREATE_SIMPLE_LED_FLASHER_DEMO_ONLY */ } /*-----------------------------------------------------------*/ void vApplicationMallocFailedHook( void ) { /* vApplicationMallocFailedHook() will only be called if configUSE_MALLOC_FAILED_HOOK is set to 1 in FreeRTOSConfig.h. It is a hook function that will get called if a call to pvPortMalloc() fails. pvPortMalloc() is called internally by the kernel whenever a task, queue, timer or semaphore is created. It is also called by various parts of the demo application. If heap_1.c or heap_2.c are used, then the size of the heap available to pvPortMalloc() is defined by configTOTAL_HEAP_SIZE in FreeRTOSConfig.h, and the xPortGetFreeHeapSize() API function can be used to query the size of free heap space that remains (although it does not provide information on how the remaining heap might be fragmented). */ taskDISABLE_INTERRUPTS(); for( ;; ); } /*-----------------------------------------------------------*/ void vApplicationIdleHook( void ) { /* vApplicationIdleHook() will only be called if configUSE_IDLE_HOOK is set to 1 in FreeRTOSConfig.h. It will be called on each iteration of the idle task. It is essential that code added to this hook function never attempts to block in any way (for example, call xQueueReceive() with a block time specified, or call vTaskDelay()). If the application makes use of the vTaskDelete() API function (as this demo application does) then it is also important that vApplicationIdleHook() is permitted to return to its calling function, because it is the responsibility of the idle task to clean up memory allocated by the kernel to any task that has since been deleted. */ } /*-----------------------------------------------------------*/ void vApplicationStackOverflowHook( TaskHandle_t pxTask, char *pcTaskName ) { ( void ) pcTaskName; ( void ) pxTask; /* Run time stack overflow checking is performed if configCHECK_FOR_STACK_OVERFLOW is defined to 1 or 2. This hook function is called if a stack overflow is detected. */ taskDISABLE_INTERRUPTS(); for( ;; ); } /*-----------------------------------------------------------*/ void vApplicationTickHook( void ) { /* This function will be called by each tick interrupt if configUSE_TICK_HOOK is set to 1 in FreeRTOSConfig.h. User code can be added here, but the tick hook is called from an interrupt context, so code must not attempt to block, and only the interrupt safe FreeRTOS API functions can be used (those that end in FromISR()). */ } /*-----------------------------------------------------------*/
{ "pile_set_name": "Github" }
Driver's Ed in Spanish Inspiration This year, Congress passed a bill that allows U.S. immigrants to apply for their Driver's License. Though this is a huge achievement, many of these immigrants – most of whom are from Latin American countries – lack the education and tools to pass their written exam. This app allows those who can only speak Spanish to study for their written exams and get their licenses: a liberty that should be equally accessible to all. What it does This app prepares users by quizzing them with questions from the official DMV Spanish practice tests. How we built it We built the app using Xcode, a popular IDE for building iOS applications. Challenges we ran into Both members of the team had no knowledge of Swift or Xcode prior to this Hackathon. Because we had no prior experience, we utilized the mentors and the internet to learn the language. Also, there were complications with Xcode and our current operating system, which cost us more than 2 hours of development time before we could even get started on our project. Accomplishments that we're proud of Learning Swift from nothing was one of our biggest achievements. Learning Swift turned out to be a lot more difficult that what we expected, but even this challenge, we were able to persevere and make a functional application that we are extremely proud of. What we learned In terms of computer science, we learned how to use Swift and Xcode, but more importantly, we learned what it is like to participate in a hackathon. This hackathon was our first hackathon, and it was here that we learned about time management with our application and collaboration with other hackers. What's next for Driver's Ed in Spanish In the future, we hope to improve the UI and make it more user-friendly. Similarly, we hope to incorporate images (e.g. traffic signals, signs and diagrams) into the app.
{ "pile_set_name": "Pile-CC" }
<?php /* * Copyright 2014 Google Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); you may not * use this file except in compliance with the License. You may obtain a copy of * the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the * License for the specific language governing permissions and limitations under * the License. */ class Google_Service_AndroidEnterprise_GroupLicenseUsersListResponse extends Google_Collection { protected $collection_key = 'user'; public $kind; protected $userType = 'Google_Service_AndroidEnterprise_User'; protected $userDataType = 'array'; public function setKind($kind) { $this->kind = $kind; } public function getKind() { return $this->kind; } /** * @param Google_Service_AndroidEnterprise_User */ public function setUser($user) { $this->user = $user; } /** * @return Google_Service_AndroidEnterprise_User */ public function getUser() { return $this->user; } }
{ "pile_set_name": "Github" }
Q: Algorithm for Parking Space Allocator System In my office, there are 200 employees who come to the office in their car. But my parking space has slots for parking 160 cars only. Now I want to design and develop an application that issues parking tickets to employees by doing a fair allocation of parking slots. For solving this problem, I was thinking of designing some algorithm like below: We have 200 employees, 5 working days and 160 available parking slots. Create a pool of 5 colors and assign one color to each of the employees. 40 - green - Mon, Tue, Wed, Thur 40 - blue - Tue, Wed, Thur, Fri 40 - red - Wed, Thur, Fri, Mon 40 - white - Thur, Fri, Mon, Tue 40 - black - Fri, Mon, Tue, Wed With this, we will have only 160 cars coming to the office on any given day. Now I want to enhance the above algorithm to make this system more effective and efficient for the following use-case: Employees can apply for a leave, in such cases, his assigned ticket will be unused and parking slot will remain empty - not a very efficient use of the resource. I want to distribute such empty slots to other employees in a fair manner. What is the most, or at the very least, a more optimal algorithm for solving this? A: It's easier to understand this system if you change the way the color codes are explained: Blue = No parking on Mon Red = No parking on Tue White = No parking on Wed Black = No parking on Thr Green = No parking on Fri Once you see that, this is actually not a complicated problem: Employees can apply for a leave, in such cases, his assigned ticket will be unused and parking slot will remain empty - not a very efficient use of the resource. I want to distribute such empty slots to other employees in a fair manner. What is the most, or at the very least, a more optimal algorithm for solving this? It's Monday and I'm calling in sick. I have a green ticket. Someone with a blue ticket could use it. Pick a blue ticket name out of a hat and give them my green ticket for the day. Done. If you fear someone wining twice before someone wins once you could switch to a single deck shuffle. It doesn't tip the odds in favor of anyone but it limits how unlucky someone can be. The drawback is it requires you to preserve state. The lucky winner just has to hope I called in before they got on the bus. Assigning these tickets is easy. Communicating assignment changes is the harder problem to solve.
{ "pile_set_name": "StackExchange" }
State of Mind (EP) State of Mind is the second extended play by American rapper Dizzy Wright. It was released on April 15, 2014, by Funk Volume. The EP features production by 6ix, MLB, Roc & Mayne, Ron Hayden and Sledgren, along with a lone guest appearance by Rockie Fresh. It was supported by the single: "Everywhere I Go". Upon its release, the EP debuted at number 54 on the Billboard 200. Background After the release of the mixtape The Golden Age, Dizzy Wright announced that he was planning to released the EP, titled The Second Agreement, and then he would release his second album. Starting in 2014, Wright began touring with Hopsin on the Knock Madness world tour. On February 16, 2014, Dizzy Wright announced he would be releasing State of Mind, a new EP, during March 2014, replacing the previously announced The Second Agreement EP. In the following month, in an interview with XXL, Dizzy Wright said that the State of Mind had no current release date and confirmed his second studio album would be released during 2014. He said in an interview that he didn't want to rush the release at the expense of quality. On April 8, Wright revealed the cover artwork and release date of April 15, 2014, for the EP. That same day, Dizzy Wright released the first single "Everywhere I Go". As promised, the EP was released on April 15, 2014. It featured production by 6ix, MLB, Roc N Mayne, Ron Hayden, and Sledgren, along with a guest appearance by Rockie Fresh. On April 21, 2014, the music video was released for "Everywhere I Go". Critical reception Upon its release, State of Mind was met with generally positive reviews from music critics. Gregory Heaney of AllMusic said, "While Dizzy might claim that "You don't know shit about me" from a position of relative obscurity on "Nuttin' Bout Me," an EP this solid is going to have a whole lot of people interested in rectifying that situation as quickly as possible." Praverb of XXL gave the album an L rating, saying "With stellar production, improved songwriting, and a mesmerizing approach, Dizzy is destined to shine a lot brighter. Dizzy still has room for improvement, though, as flashes of transparency here only hold him back from being greater. Let this glimpse of Dizzy’s cognitive state be a proper warm-up to his sophomore effort." Sheldon Pierce of HipHopDX said, "Despite flashes of the creativity that powered his earlier projects, Dizzy Wright's State of Mind is plagued by subpar production and a lack of identity." Commercial performance The album debuted at number 54 on the Billboard 200 chart, with first-week sales of 6,800 copies in the United States. Track listing Charts References Category:2014 EPs Category:Dizzy Wright albums Category:Funk Volume albums
{ "pile_set_name": "Wikipedia (en)" }
Give us feedback We strive to provide exceptional service and fulfil your expectations. We'd like to hear any feedback, good or bad, to ensure that we can address any issues and improve our services further in the future.
{ "pile_set_name": "Pile-CC" }
Q: How can Silent Image be used to obscure vision in combat in 5E? In my party I have a warlock who is partial to illusion magic. At second level, he took the 'Misty Visions' invocation, with the intent of using Silent Image to keep the party shrouded in illusory fog during combat. His logic is that because the party knows it is an illusion, they are never hindered by it, but the enemies are effectively blinded to the players until they manage to discern the illusion. In one instance, this resulted in two party members swinging with advantage on a bugbear who couldn't see them, and who had to use his action on the next turn to inspect the illusion. In this situation, Silent Image gives most of the benefits of Darkness, a second level spell, without negatively affecting the party, and without costing a spell slot. I don't want to have to tell the player "No, that's too OP," but I'm not sure how to interpret the mechanics in a way that isn't broken. In short: What does RAW say about using Silent Image on top of or between close quarters combatants? How can Silent Image be interpreted/altered such that it can provide some benefit in combat, while maintaining the intended power level? A: Cost This is not without cost to the warlock; he has chosen to use one of his two invocations to get this thereby forgoing other choices. In addition, he uses an action to cast it and an action to move it; unless your battles are very static he would need to move it a lot. Remember, the most limited resource any creature has is not its spell slots or hit dice; it is its actions, it only gets one per turn. Good players know this and they should be thinking every turn "Is this the best thing I can do with my action right now?" Innovation This is a very clever and imaginative use of the spell - this is something that you should encourage in your players; not discourage. I have had a wizard use Silent Image to create an picture of a hallway that the rogue could walk behind; this not only gave advantage, it also allowed sneak attack against, coincidently, a bugbear. Disadvantages A 15 foot cube of fog rolling towards the bugbear is going to negate surprise (its just not natural) and allow it to make an active perception check to find out where the PCs are in the cloud. The bugbear can then use its action to attack (with disadvantage); following which it can see through the cloud because "Physical interaction with the image reveals it to be an illusion" - sticking your morning star into it qualifies as "physical interaction". It doesn't work that way, anyhow You say: " because the party knows it is an illusion, they are never hindered by it". Where does it say that in the rules? The relevant text of the spell is: Physical interaction with the image reveals it to be an illusion, because things can pass through it. A creature that uses its action to examine the image can determine that it is an illusion with a successful Intelligence (Investigation) check against your spell save DC. If a creature discerns the illusion for what it is, the creature can see through the image. There are only 2 ways to see through the image, "Physical interaction" or "use your action" and make a save. Knowing that it is an illusion doesn't allow you to see through it.
{ "pile_set_name": "StackExchange" }
Google’s co-founder Sergey Brin unleashed perhaps the most stinging criticism of the controversial Stop Online Piracy Act that is working its way through Congress. In a Google+ post, Brin said if the U.S. passed either SOPA, the House version of the bill, or the Protect IP Act, the Senate version, it would put the country in same league as China and Iran as far as Internet censorship is concerned. Brin said the bills were a “threat to free speech.” Brin writes: “Two bills currently making their way through congress — SOPA and PIPA — give the US government and copyright holders extraordinary powers including the ability to hijack DNS and censor search results (and this is even without so much as a proper court trial). While I support their goal of reducing copyright infringement (which I don’t believe these acts would accomplish), I am shocked that our lawmakers would contemplate such measures that would put us on a par with the most oppressive nations in the world.” As we’ve reported, the Motion Picture Association of America, Recording Industry Association of America and the U.S. Chamber of Commerce are behind the legislation, which would create an Internet blacklist and they say control piracy. Today, a group of technology A-listers, including Brin, sent an open letter to Washington stating why they oppose to the bill. The first one listed is the legislation’s mandate that web services monitor “what users link to, or upload.” “This would have a chilling effect on innovation,” the letter reads. The Internet moguls also say the legislation would change the “basic structure of the Internet,” and “deny website owners the right to due process of law.” The letter is signed by some of the founders of eBay, Craigslist, Paypal, Twitter, Yahoo!, Wikipedia, Flickr, Mozilla, YouTube and others.
{ "pile_set_name": "Pile-CC" }
Q: How can I create scrollable columns in Bootstrap? I created a new template file template-home2.php in a Wordpress Theme. In there I have a row with 3 columns, I would like to make each of these columns scrollable instead of the entire page. How can I achieve that? I have a class scrollable that I apply to the outer section of the page to make it scrollable. <section class="<?php if( get_theme_mod( 'hide-player' ) == 0 ){ echo "w-f-md";} ?>" id="ajax-container"> <section class="hbox stretch bg-black dker"> <section> <section class="vbox"> <section class="scrollable"> <div class="row"> <div class="col-md-5 no-padder no-gutter"> some data </div> <div class="col-md-4 no-padder no-gutter"> some data </div> <div class="col-md-3 no-padder no-gutter"> some data </div> </div> </section> </section> </section> </section> </section> When I remove the class “scrollable” from the main section and include it in the column div, the column disappears and the other 2 columns overflow on the elements below. This is the relevant CSS .scrollable { overflow-x: hidden; overflow-y: auto; } .no-touch .scrollable.hover { overflow-y: hidden; } .no-touch .scrollable.hover:hover { overflow: visible; overflow-y: auto; } .slimScrollBar { border-radius: 5px; border: 2px solid transparent; border-radius: 10px; background-clip: padding-box !important; } Thank you for your help. UPDATED CODE .homecol1, .homecol2, .homecol3 { position: absolute; overflow-y: scroll; } <section class="<?php if( get_theme_mod( 'hide-player' ) == 0 ){ echo "w-f-md";} ?>" id="ajax-container"> <section class="hbox stretch bg-black dker"> <section> <section class="vbox"> <section class="scrollable"> <div class="row"> <div class="col-md-5 no-padder no-gutter homecol1"> some data </div> <div class="col-md-4 no-padder no-gutter homecol2"> some data </div> <div class="col-md-3 no-padder no-gutter homecol3"> some data </div> </div> </section> </section> </section> </section> </section> A: To achieve this, you will first need to give each column a class. Then you need to give them the following properties: .your-class { position: absolute; overflow-y: scroll; } You may also want to give your body the property overflow: hidden; Please tell me if this works and if not I'll help further! Edit: Created a JSFiddle https://jsfiddle.net/mjmwaqfp/2/
{ "pile_set_name": "StackExchange" }
Lexus IS V6. 2.5Liter gray used of the 2012 at Los Angeles, California Lexus: IS 250, Navi, back cam, climate seats published 9 months ago 2012 Lexus Is , gray with 33381 miles on the odometer. The interior is Tan. The Vehicle Title is Clear. The VIN number is JTHBF5C22C5184025. By default it includes Sunroof, Leather Seats, CD Player and it has the following extras: Air Conditioning, Cruise Control, Power Locks, Power Windows, Power Seats. The safety features are: Anti-Lock Brakes, Driver Airbag, Passenger Airbag, Side Airbags. Conditions: No defects, very clean car!
{ "pile_set_name": "Pile-CC" }
/* 931004-13.c from the execute part of the gcc torture suite. */ #include <testfwk.h> #ifdef __SDCC #pragma std_c99 #endif // Todo: Enable when sdcc supports struct! #if 0 struct tiny { char c; char d; char e; char f; }; f (int n, struct tiny x, struct tiny y, struct tiny z, long l) { if (x.c != 10) ASSERT (0); if (x.d != 20) ASSERT (0); if (x.e != 30) ASSERT (0); if (x.f != 40) ASSERT (0); if (y.c != 11) ASSERT (0); if (y.d != 21) ASSERT (0); if (y.e != 31) ASSERT (0); if (y.f != 41) ASSERT (0); if (z.c != 12) ASSERT (0); if (z.d != 22) ASSERT (0); if (z.e != 32) ASSERT (0); if (z.f != 42) ASSERT (0); if (l != 123) ASSERT (0); } #endif void testTortureExecute (void) { #if 0 struct tiny x[3]; x[0].c = 10; x[1].c = 11; x[2].c = 12; x[0].d = 20; x[1].d = 21; x[2].d = 22; x[0].e = 30; x[1].e = 31; x[2].e = 32; x[0].f = 40; x[1].f = 41; x[2].f = 42; f (3, x[0], x[1], x[2], (long) 123); return; #endif }
{ "pile_set_name": "Github" }
246 S.E.2d 907 (1978) James MANDOLIDIS et al. v. ELKINS INDUSTRIES, INC. Carl Ray SNODGRASS v. UNITED STATES STEEL CORP. Mary Kay DISHMON, Admx. v. EASTERN ASSOCIATED COAL CORP. Nos. 13926, 13982 and 13983. Supreme Court of Appeals of West Virginia. Decided June 27, 1978. Dissenting Opinion July 11, 1978. Concurring Opinion August 15, 1978. *909 Cardot, Kent & Queen, James A. Kent, Jr., Elkins, Calwell, Steele, McCormick & Peyton, W. Stuart Calwell, Jr., Nitro, for appellants in No. 13926. Brown, Harner & Busch, John F. Brown, Jr., Elkins, for appellee in No. 13926. DiTrapano, Mitchell, Lawson & Field, John R. Mitchell, Charleston, for appellants in No. 13982. Steptoe & Johnson, Edward W. Eardley, Charleston, for appellee Baker, in No. 13982. Kay, Casto & Chaney, Don R. Sensabaugh, Jr., Charleston, for appellee P. A. Drill, in No. 13982. Love, Wise, Robinson & Woodroe, Charles M. Love and David A. Faber, Charleston, for appellee U. S. Steel, in No. 13982. Edward G. Atkins, Charleston, for appellant in No. 13983. Shaffer, Theibert, Ikner & Schlaegel, H. G. Shaffer, Jr., Madison, for appellee in No. 13983. Spilman, Thomas, Battle & Klostermeyer, Lee F. Feinberg and James H. Davis, III, Charleston, amicus curiae for WV Manufacturers Ass'n. Jackson, Kelly, Holt & O'Farrell, John L. McClaugherty and Alvin L. Emch, Charleston, amicus curiae for WV Farm Bureau; WV Homebuilders Assoc.; WV Retailers Assoc.; WV Auto. Dealers Assoc.; WV Chamber of Commerce; WV Coal Assoc.; WV Surface Mining and Reclamation Assoc.; WV Oil and Natural Gas Assoc.; WV Motor Truck Assoc.; Contractors Assoc. of WV; and WV Restaurant and Licensed Beverage Assoc. James B. McIntyre, McIntyre & Jordan, Charleston, amicus curiae for WV Labor Federation, AFL-CIO. George G. Burnette, Jr., Charleston, amicus curiae for Dist. 17, United Mine Workers of America. Ross Maruka, Fairmont, amicus curiae for Dist. 31, United Mine Workers of America. Harrison Combs, Washington, D. C., James M. Haviland, Charleston, amicus curiae for International Union, United Mine Workers of America. *908 McGRAW, Justice: For purposes of decision, the Court has consolidated three cases here on writs of *910 error. Each case involves a tort action brought by employees or their heirs against employers subject to this state's Workmen's Compensation Act. Each action arises from injuries or deaths suffered by employees during the course of and as a result of their employment. Notwithstanding the immunity from common law suit granted to employers by W.Va. Code § 23-2-6,[1] plaintiffs commenced their actions relying on the deliberate intent exception to such immunity contained in W.Va.Code § 23-4-2.[2] I The validity vel non of the trial courts' judgments, in the cases at bar, can only be ascertained by an examination and analysis of the substantive law as set forth in W.Va. Code § 23-4-2. That provision by its express language preserves for employees a common law action against employers "as if this chapter had not been enacted" "if injury or death result to any employee from the deliberate intention of the employer to produce such injury or death." In these appeals, this Court is asked to delineate the extent to which this statutory provision provides immunity to employers subject to the Act. The individual parties to these actions, as well as various employer and labor organizations filing amicus curiae briefs, urge us to employ familiar and competing rules of statutory construction to ascertain the intent of the Legislature in enacting this provision in 1913. What must be remembered is that canons of construction are but aids devised by courts to ascertain the true meaning, purpose and intent of the Legislature. What was the intention of the original section? The answer to this specific question can best be answered by recalling the purpose for the enactment of workmen's compensation legislation in the first instance. The paramount reason for such legislation was, of course, that under the common law tort system workers injured in industrial accidents recovered compensatory damages in a rather small percentage of cases.[3] The common law tort system with its defenses of contributory negligence, assumption *911 of risk and the fellow servant rule was considered inimical to the public welfare and was replaced by a new and revolutionary system wherein "fault" became immaterial—essentially a no-fault system. The Workmen's Compensation Act was designed to remove negligently caused industrial accidents from the common law tort system.[4] This quote from an earlier Workmen's Compensation decision provides additional historical perspective and insight as to the purpose of this law: "The conditions giving rise to a law, the faults to be remedied, the aspirations evidently intended to be efficiently embodied in the enactment, and the effects and consequences as regards responding to the prevailing conceptions of the necessities of public welfare, play an important part in shaping the proper administration of the legislation. In the aggregate, they sometimes shed very efficient light in aid of clearing up obscurities as to the legislative intent ... The courts should fully appreciate that and be imbued with and guided by the manifest intent of the law to eradicate, utterly, the injustice to employers and employees, and the public as well, of the old system, and to substitute in its place an entirely new one based on the highest conception of man's humanity to man and obligation to industry upon which all depend; recognizing the aggregate of its attending accidents as an element of cost to be liquidated and balanced in money in the course of consumption—a system dealing with employees, employers, and the public as necessarily mutual participants in bearing the burdens of such accidents, displacing the one dealing only with the class of injuries happening through inadvertent failure, without real moral turpitude, to exercise average human care, and placing employee and employer, whose interests are economically the same, in the false position of adversaries, to the misfortune of both and the public, intensified by opportunity for those concerned as judicial assistants to profit by such misfortunes. Most lamentable it will be, if this new system—so freighted with hopes for the minimizing of human burdens and their equitable distribution—shall not endure and be perfected to the best that human wisdom can attain." McVey v. Chesapeake & Potomac Telephone Co., 103 W.Va. 519, 522-3, 138 S.E. 97, 98 (1927) quoting Milwaukee v. Miller, 154 Wis. 652, 144 N.W. 188 (1913) (Emphasis supplied). We now turn to an analysis of our case law construing this statute. In Collins v. Dravo Contracting Co., 114 W.Va. 229, 171 S.E. 757 (1933), the Court rejected the proposition that an employer could never "deliberately intend" to cause an injury or death by an act of omission,[5] and held that under *912 W.Va.Code § 23-4-2 a personal representative may prosecute a wrongful death action on behalf of a decedent employee's widow, widower, child or dependent, because such provision provides a right of action "as if this chapter [Workmen's Compensation Act] had not been enacted." Moreover, the Court held plaintiff's common law declaration sufficient "to require the defendant to go to trial upon the theory of deliberate intent to injure or kill." Id. at 236, 171 S.E. at 759. Less than a year later this Court was asked again to rule on the legal sufficiency of a declaration in Maynard v. Island Creek Coal Co., 115 W.Va. 249, 175 S.E. 70 (1934), and in syllabus point 1 thereof it was held: Allegations in a declaration of acts of gross negligence by the employer do not constitute deliberate intention within the meaning of the said statutory provision. To bring a case within said provision, at the very least, there must be alleged facts from which the natural and probable consequence reasonably to be anticipated would be death or serious injury to the employee affected thereby. In addition, the Court stated that "[a] subscribing employer who has ... complied with the statute is absolutely exempted from liability to employees for injuries received by them in the course of and resulting employment, except, if such injuries be willfully inflicted by the employer ..." Id. at 252, 175 S.E. at 71. (emphasis supplied) And, more than that, the Court said "that the carelessness, indifference, and negligence of an employer may be so wanton as to warrant a judicial determination that his ulterior intent was to inflict injury." Id. at 253, 175 S.E. at 72. It is clear from this language that the Maynard court did not, in construing the statute, conclude that a showing of specific intent to injure or kill was required to avoid the workmen's compensation immunity bar. The Court correctly rejected the idea that gross negligence was equivalent to "deliberate intent," and it is apparent that the Court did not believe the Legislature intended to shield an employer from common law liability where such employer knowingly and wantonly placed an employee in such a condition of peril that serious injury or death would in all probability occur to such employee. It is irrefutable that the Collins and Maynard courts construed the statute so as to allow a jury to consider the culpability of an employer's conduct where such employer subjected an employee to working conditions in which the natural and probable consequences to be anticipated would be death or serious injury. As Justice Wilson observed in his concurring opinion in Eisnaugle v. Booth, W.Va., 226 S.E.2d 259 (1976):[6] When this language [W.Va. § 23-4-2] was first confronted by this Court, it seemed that it was viewed reasonably and was interpreted as to give an employee the benefit of a cause of action left open to him by the statute. Although the standards of pleading and proof were intended to be strict, there was no apparent effort to define "deliberate intention" in such terms as to impose what now amounts to a higher standard of pleading and proof than would be required in pleading and proving a charge of murder. Id. at 262. Yet, just two years after Maynard, in Allen v. Raleigh-Wyoming Mining Co., 117 W.Va. 631; 186 S.E. 612 (1936), the Court read the same statutory provision so as to preclude any recovery by an employee under such provision unless there was a showing of "[a] specific deliberate intent on the part of the latter to produce the injury..." Sec also, Brewer v. Appalachian Constructors, Inc., 135 W.Va. 739, 65 S.E.2d 87 (1951). That opinion, however, is totally devoid of discussion concerning the legislative purposes underlying workmen's compensation legislation. The Court simply relied on judicial *913 decisions interpreting substantially identical provisions contained in the Washington and Oregon laws, and invoked the rule that in construing statutes adopted from another state, "the judicial interpretation already placed on that statute by the highest tribunal of such state will usually be adopted." Id. 117 W.Va. at 636, 186 S.E. at 614. An examination of those cases reveals that the definition of "deliberate intent," as used in their workmen's compensation laws, was arrived at by examining the definition given to such terminology in a murder statute. See, Jenkins v. Carman Manufacturing Co., 79 Or. 448, 155 P. 703 (1916), and the cases cited therein. In Collins the Court was urged by the employer[7] to interpret the statute, based on the same Oregon and Washington cases relied on in Allen, to require a specific intent to injure or kill but, and we think correctly so, the Court declined to do so. We are of the opinion that reading the language of the provision under review here to mean the same thing as similar wording in a criminal statute defining murder is contrary to the basic rules governing the construction of workmen's compensation statutes. There is no adequate justification for adhering to the construction of a statute which is not only erroneous but which works an injustice on persons injured as a result of conduct which is so likely to produce injury or death that its performance, under all circumstances, could perhaps warrant criminal liability.[8] No person or organization of persons should be permitted to escape full responsibility for conduct which could be found to be criminal in nature. We do not, however, wish to and we do not intimate any view as to the nature of conduct involved in the three cases now here on review. In light of the conditions giving rise to the passage of the Act, and in light of the purposes of the Act, we believe the Collins and Maynard courts correctly interpreted the statute, and the Allen court's interpretation was erroneous and cannot continue to represent the law in this state. The workmen's compensation system completely supplanted the common law tort system only with respect to negligently caused industrial accidents, and employers and employees gained certain advantages and lost certain rights they had heretofore enjoyed. Entrepeneurs were not given the right to carry on their enterprises without any regard to the life and limb of the participants in the endeavor and free from all common law liability. The law of this jurisdiction recognizes a distinction between negligence, including gross negligence, and wilful, wanton, and reckless misconduct. The latter type of conduct requires a subjective realization of the risk of bodily injury created by the activity and as such does not constitute any form of negligence. As this Court said in Stone v. Rudolph, 127 W.Va. 335, 346, 32 S.E.2d 742, 748 (1944), citing 38 Am.Jur. 692: *914 Wilfulness or wantonness imports premeditation or knowledge and consciousness that injury is likely to result from the act done or from the omission to act. Wilful, malicious, or intentional misconduct is not, properly speaking, within the meaning of the term `negligence.' Negligence and wilfulness are mutually exclusive terms which imply radically different mental states. `Negligence' conveys the idea of inadvertence as distinguished from premeditation or formed intention. An act into which knowledge of danger and wilfulness enter is not negligence of any degree, but is wilful misconduct. In our view when death or injury results from wilful, wanton or reckless misconduct such death or injury is no longer accidental in any meaningful sense of the word, and must be taken as having been inflicted with deliberate intention for the purposes of the workmen's compensation act. In light of the foregoing discussion, the phrase "deliberate intent to produce such injury or death" must be held to mean that an employer loses immunity from common law actions where such employer's conduct constitutes an intentional tort[9] or wilful, wanton, and reckless misconduct. See Barr v. Curry, 137 W.Va. 364, 71 S.E.2d 313 (1952); Stone v. Rudolph, 127 W.Va. 335, 32 S.E.2d 742 (1944); see 2 Restatement (Second) of Torts § 500-03 (1965). While wilful, wanton, and reckless misconduct are well-established concepts, we wish to make clear that we are using the words "wilful," "wanton," and "reckless" misconduct synonymously, and that the conduct removing the immunity bar must be undertaken with a knowledge and an appreciation of the high degree of risk of physical harm to another created thereby. See Restatement (Second) of Torts § 500, Comment a at 587-88 (1965).[10] Although liability is not simply a function of the degree of the risk created by the conduct without regard to the social utility of such conduct, the degree of the risk of physical harm necessary for a finding of reckless misconduct is greater then that which is necessary to make the conduct negligent. Liability will require "a strong probability that harm may result." Restatement (Second) of Torts § 500, Comment f. at 590 (1965). II Having defined "deliberate intention" within the meaning of the Workmen's Compensation Act, we now consider the instant cases against that substantive law background. In Mandolidis and Snodgrass the plaintiffs' appeal from trial court orders granting summary judgments for the respective defendants. The single issue for decision in both cases is, of course, whether the trial courts were correct in granting the summary judgments. These cases will be discussed first. On April 5, 1974, plaintiff Mandolidis was employed as a machine operator in the furniture manufacturing business of Elkins Industries, Inc. While operating a 10-inch table saw not equipped with a safety guard, his right hand came in contact with the saw blade resulting in the loss of two fingers and part of the hand itself. On April 1, 1976, Mandolidis filed a complaint against Elkins Industries, Inc., in the Circuit Court of Randolph County, alleging *915 that the table saw he was operating when he was injured was not equipped with a safety guard, although it was well known by the defendant that in the defendant's industry that this constituted a violation of federal and state safety laws and accepted industry standards; that the defendant had actual knowledge of the consequences of running such machinery without safety guards, because employees other than the plaintiff had previously suffered injuries as a result of the lack of such guards; that the plaintiff objected to operating the saw without a guard and was told by the defendant, through its agent, to operate the machine or be fired from his job; that this order was issued by the defendant in wilful, wanton, malicious, and deliberate disregard for the well-being of the plaintiff with a deliberate intention to injure or kill him; that a short period of time before plaintiff's injury, federal inspectors had cited the defendant for violations of the Occupational Health and Safety Act because the table saw involved did not have a guard; that the inspectors put tags on the machine forbidding its use until equipped with a guard; that defendant installed a guard of the incorrect type and then shortly thereafter ordered it removed in wilful, malicious, and deliberate disregard of federal and state safety laws; that the defendant fired an employee who refused to operate the saw without a guard; that the defendant ordered employees to operate machines without guards in order to improve production speed and thus increase profits in utter and malicious disregard of the well-being of the plaintiff; that the aforesaid actions and inactions were taken by defendant with the deliberate intention to kill or injure plaintiff, and that the defendant had actual notice and knowledge of the dangerous condition of the unguarded saw and the injuries of other employees caused by that condition; that defendant wholly, wilfully, wrongfully, deliberately, maliciously and with intent to injure or kill plaintiff refused to provide plaintiff with reasonably safe equipment and a reasonably safe place to work; and that the conduct of the defendant was such as to constitute a wanton, wilful, and malicious disregard of the life and limb of its employees so as to warrant a specific finding of a deliberate intent to inflict bodily harm or injury upon its employees in general and the plaintiff in particular. The defendant filed a motion to dismiss under R.C.P. 12(b) accompanied by affidavits denying any deliberate intent to injure the plaintiff, and contending that a subscriber to the Workmen's Compensation Fund it was immune from a common law damage action. An affidavit by the President and General Manager of the defendant corporation stated that defendant was a subscriber to the Workmen's Compensation Fund, and denied both the allegation that the defendant deliberately intended to injure the plaintiff and the allegation that he, or anyone at his direction or in his presence, ever threatened or intimidated the plaintiff concerning the operation of his machine. In a second affidavit, defendant's foreman admitted there was no safety guard on the table saw at the time of plaintiff's injury but expressly denied that he or anyone in his presence had ever ordered the plaintiff to remove the safety guard, or to operate the saw without a safety guard. Similarly, he denied knowledge of the plaintiff being threatened with the loss of his job unless he operated the unguarded saw. The foreman's affidavit also asserted that just prior to the occurrence in question he had been assisting the plaintiff by acting as an "off bearer"; that he had to leave for a few minutes so he expressly instructed the plaintiff not to continue to operate the saw alone; and that plaintiff did operate the saw alone resulting in the injury complained of to his hand. Plaintiff deposed seven former employees of Elkins Industries. Five of these employees, including the President and the steward of a union which once represented employees of Elkins Industries, Inc., indicated that they had complained on numerous occasions *916 to the plant foreman and the plant manager regarding the lack of guards on the table saws. The steward indicated that on one occasion when he complained about the lack of saw guards, the plant foreman just "hee hawed around about it." The former union president indicated that she informed the plant manager that the absence of saw guards was a violation of law, but he "just shrugged his shoulders." Three former employees indicated they had seen the plant foreman remove the guards from the saws. The former plant safety inspector indicated that he had shut down and placed an out-of-order sign on a guardless saw, but the foreman "tore off" the sign and placed the saw back in operation. Three of the former employees indicated that they had been told by the foreman that the guards slowed down production. In his deposition, the plaintiff contradicted the foreman's claim that he told the plaintiff not to continue to operate the saw alone. The plaintiff's version was corroborated by the deposition of another employee working near the plaintiff when the injury occurred. Four of the former employees, including the plaintiff, indicated that the foreman's instructions via the plant manager were that anyone refusing to run a saw without a guard would be "sent home" or fired. One former employee indicated that he had been fired for refusing to run a saw without a guard. These assertions expressly contradicted the affidavits of the foreman and plant manager. Plaintiff's deposition expressly contradicted the assertion contained in the plant manager's affidavit that the allegation of deliberate intent in the plaintiff's complaint was made only to circumvent the immunity bar. The former union president indicated that she informed the plant manager that the plaintiff had been injured on a guardless saw and his reply was, "So what?" "He's getting compensation." On August 17, 1976, the trial court, upon consideration of all matters presented to it, determined that "a deliberate intent to injure plaintiff was lacking," sustained the defendant's motion to dismiss, and dismissed the action with prejudice. The Snodgrass case arises as a result of events that occurred on May 17, 1974. At that time one of the defendants, United States Steel Corporation, was engaged in the construction of a bridge across the New River Gorge in Fayette County, and the plaintiffs, Carl Ray Snodgrass, James H. Taylor, Owen Facemire, Jr. and Gerald L. King, and the plaintiff Joanne Snodgrass' decedent Daniel C. Snodgrass, were employees of the defendant, United States Steel Corporation and were engaged in work in connection with the aforementioned bridge construction. The allegations of plaintiffs' complaint filed in the Circuit Court of Fayette County describe the events of that day in the following manner: The plaintiffs and plaintiff's decedent were working on a platform located adjacent to the construction at the northern bridge abutment. The platform was made of rough lumber and was approximately 6 feet wide, 30 feet long and 14 inches thick. One end of the platform rested on the northern rim of the gorge near the abutment, while the southern end rested on steel reinforcing rods extending from a concrete bridge pier. The platform spanned an excavation, of a depth of approximately 25 feet. The platform became dislodged when a large wire cable was dragged across it and the platform and the men working on it fell into the excavation, causing serious and permanent injury to some of the plaintiffs and death to one of the plaintiff's decedent. Plaintiffs allege that the injuries and death were proximately caused by the negligent and wilful acts of the defendant, more particularly, the failure to provide a safe place to work, the failure to advise or warn the plaintiffs of the impending danger, the failure to equip the plaintiffs with proper tools and equipment, the failure to adopt reasonable safety standards, the failure to provide adequate safety precautions, the failure to follow reasonable safety standards, the violation of the employees collective bargaining agreement *917 regarding safety rules, and the violation of the laws of the State of West Virginia and of the United States of America. Plaintiffs contend that these acts and omissions were such that they constituted a wilful and intentional injury. The defendant filed a motion to dismiss asserting, inter alia, the immunity from common law damage actions provided by the workmen's compensation statute. The motion was accompanied by two affidavits. The first affidavit by the Workmen's Compensation Commissioner indicated that defendant was a self-insurer within the meaning of the workmen's compensation statutes; that defendant had provided its own system of compensation and was not in default under the law; and that plaintiffs had accepted benefits under the Act for the injuries that occurred on May 17, 1974. The second affidavit by the defendant's project superintendent merely stated the conclusion that the injuries and death complained of were the result of an unforeseen accident and did not result from the deliberate intention of the defendant. The affidavit contains no facts regarding the conditions existing at the time of the incident, nor does it contain facts regarding the occurrence. Plaintiffs filed an affidavit by plaintiff Owen Facemire which, among other things, asserted that the defendant's actions in violating statutes, rules, regulations, and contractual provisions were deliberate and intentional. The affidavit also described the construction of the work platform and claimed that the use thereof was a deliberate violation of occupational safety and health standards, the construction, safety and health regulations of the Department of Labor, and the West Virginia Safety Code for building construction of the West Virginia Department of Labor. Additionally, the affidavit described in detail the manner in which the event occurred. On March 21, 1977, the trial court granted United States Steel's motion to dismiss upon consideration of all the matters presented by the parties, and dismissed plaintiffs' action with prejudice. Notwithstanding the style of defendant's motions to dismiss and the wording of the dismissal orders in Mandolidis and Snodgrass, the trial courts' consideration of affidavits and depositions converted the motions to dismiss to motions for summary judgment under Rule 56. Wilfong v. Wilfong, 156 W.Va. 754, 197 S.E.2d 96 (1973). Accordingly, the sole issue in both cases is whether the trial courts erred in concluding there was no genuine issue of material fact and the defendants were entitled to judgment as a matter of law. III Rule 56(c) provides the standard for determining whether a summary judgment in a given situation should be granted. It states in relevant part that "the judgment shall be rendered forthwith if the pleadings, depositions, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to a judgment as a matter of law." In making the determination of whether a motion for summary judgment was properly granted, it is essential that each case be considered on its own peculiar facts and circumstances. Howard's Mobile Homes, Inc. v. Patton, 156 W.Va. 543, 195 S.E.2d 156 (1973). It is basic summary judgment law that "`a party who moves for summary judgment has the burden of showing that there is no genuine issue of fact and any doubt as to the existence of such issue is resolved against the movant for such judgment." Johnson v. Junior Pocahontas Coal Co., W.Va., 234 S.E.2d 309, 315 (1977), quoting, syllabus point 6 of Aetna Casualty & Surety Company v. Federal Insurance Co., 148 W.Va. 160, 133 S.E.2d 770 (1963). And this Court held in Oakes v. Monongahela Power Co., W.Va., 207 S.E.2d 191, 194 (1974) that "although summary judgment ... is *918 a device designed to effect a prompt disposition of controversies on their merits without resort to a lengthy trial, Hanks v. Beckley Newspapers Corp., 153 W.Va. 834, 172 S.E.2d 816 (1970), such judgment should be granted only when it is clear that there is no genuine issue of fact to be tried. As succinctly stated in Haga v. King Coal Chevrolet Co., 151 W.Va. 125, 150 S.E.2d 599 (1966) `If a genuine issue as to any material fact is raised in any action, a summary judgment under the provisions of Rule 56... can not be granted.'" See also Aetna Casualty and Surety Co., supra. The record in Mandolidis discloses that there were material facts in issue. Was the plaintiff told by a company agent that he would be discharged if he refused to run an unguarded saw? Did the foreman tell the plaintiff to wait until his return before continuing to run the saw? The circuit court's order unfortunately does not contain findings of fact or conclusions of law, but it is clear from the record that there were facts in issue. Accordingly, implicit in the court's ruling is the judgment that there were no material facts in issue. This Court cannot agree. The plaintiff is entitled to prove these facts in support of his case, because these facts render the desired inference, when taken together with other facts the plaintiff clearly intends to prove, i. e., that the defendant acted with deliberate intent, more probable than it would be without those facts. We are of the view that complicated industrial "accidents," wherein the state of mind of company representatives is critical, seldom lend themselves to disposition by summary judgment, and where there is any doubt such a motion should be refused. Conclusory affidavits simply denying the existence of the requisite intent, obviously make no contribution to the factual development of the litigated event and, therefore, provide no assistance to the trial court in determining whether a genuine issue of material fact exists. It is for this reason that Rule 56(e) provides that affidavits "shall set forth such facts as would be admissible in evidence." The trial court in Mandolidis "determine[d] that the deliberate intent to injure... is lacking." The Court thus found that even if all plaintiff's facts were taken as true plaintiff could not as a matter of law meet the evidentiary burden of proof with regard to a necessary element of his cause of action. The court determined that even if all of plaintiff's facts were taken as true, they would not support an inference that the defendant employer acted with "deliberate intent." In other words, reasonable men could not infer from all those facts the necessary intent. We do not believe that reasonable men could not infer the necessary intent from the facts in Mandolidis. Accordingly, the court's determination of this issue was erroneous. For these reasons the court's final order in Mandolidis was in error. IV Applying the law to the record in Snodgrass leads to the ineluctable conclusion that the court acted improperly in granting the defendant's motion for summary judgment. Based upon our view of the record, we draw the following conclusions with regard to the existence of an issue as to a material fact. The plaintiff's complaint alleges the violation of numerous safety laws, rules, and regulations. The complaint contains factual allegations regarding the improper construction of the platform and describes the circumstances surrounding the actual fall of the platform. Plaintiff's affidavit contains details as to the violation by the defendant of numerous laws, rules and regulations. The affidavit contains facts concerning the construction of the platform and describes the fall of the platform. The defendant chose not to file an answer relying upon a motion to dismiss, thus the allegations of the plaintiff's complaint remained undenied. *919 The defendant, in support of the motion, filed two affidavits. The affidavit of John Kelly, project superintendent for the defendant, contains no facts with regard to the conditions existing at the time of the accident nor does it contain facts regarding the actual occurrence in question. The affidavit states the bare legal conclusion that the injuries and death in question were the result of an unforeseen accident and did not result from the deliberate intention of the defendant to produce such injury or death. The statement is a conclusion as to the ultimate fact in issue; its admissability at trial would be questionable. See Rule 56(e). Save this one conclusion as to the ultimate fact, the record contains no facts supporting defendant's motion. This record leads to the conclusion that the principles set forth in this opinion were not followed by the trial court in sustaining the defendant's motion. The facts alleged in plaintiff's complaint and the facts set forth in plaintiff's affidavit were material since their existence or nonexistence might affect the result of the action. The trial court's memorandum letter of March 4, 1971, indicates that it found that even if all the plaintiff's facts were regarded as true, reasonable men could not infer therefrom the necessary intent. In pertinent part it reads: The file establishes that this defendant had the protection of the subscriber to the W. Va. Workmen's Compensation law and that the plaintiffs had received compensation benefits. The plaintiffs accordingly, would have no right of action against the defendant employer unless it could be established that the death and the injuries complained of were intentionally inflicted upon the employees involved. The specific allegations of the complaint and the affidavit of Mr. Facemire failed even to come close to establishing that the accident which is the basis of this action and the consequent injury to the employees were intentionally caused or inflicted by the employer. The affidavit of Mr. Facemire asserts that the scaffold on which they were working was not properly constructed and may not have had sufficient safety features to begin with, but he states that the scaffold was caused to fall by a crane operator dragging a 45 ton wire cable across the end of it without the knowledge that the plaintiffs were on or near the scaffold. Certainly this does not establish intentional injury. (emphasis supplied) On this record we cannot conclude that reasonable men could not draw varying inferences from the facts of record and that reasonable men could not infer that the injuries and death complained of resulted from a deliberate intent to produce such an injury or death within the contemplation of the workmen's compensation statute. For the above-stated reasons, we conclude from an examination of the entire record, the proof presented a genuine issue as to whether the plaintiff was injured as a result of a deliberate intent and that the trial court's ruling sustaining the defendant's motion for summary judgment was in error. V In Dishmon, the final case, the Circuit Court of Boone County, by order entered September 27, 1976, sustained a motion to dismiss on behalf of the defendant, Eastern Associated Coal Company. The record reveals that on June 5, 1975, at about 10:30 P.M., Lloyd E. Dishmon reported for work at the Eastern Associated Coal Company, Harris No. 2 Mine, at Bald Knob in Boone County. Shortly thereafter, a large quantity of slate fell from the roof of his work area crushing him to death. On June 15, 1976, plaintiff Mary Kay Dishmon, Administratrix of the Estate of Lloyd E. Dishmon, filed a complaint against decedent's employer, Eastern Associated Coal Corporation alleging, among other things, that at all relevant times the defendant was subject to the provisions of 30 U.S.C. § 862 *920 and 30 U.S.C. § 873(a) relating to roof supports, blasting and explosives; was subject to the regulations of the Secretary of the Interior relating to roof supports and blasting; and was subject to the provisions of W.Va. Code § 22-2-26, 27, 29 and 32 relating to roof space, rib supports, explosives and blasting. Plaintiff further alleges that the defendant deliberately, intentionally, wilfully and wantonly allowed employees, including plaintiff's decedent, to work in conditions which were in violation of the aforementioned laws, rules and regulations, and that the proximate result of such deliberate, intentional wilful and wanton misconduct was the death of plaintiff's decedent. The defendant employer did not answer but filed a motion to dismiss asserting that the complaint should be dismissed on the basis of the employer's immunity secured by W.Va. Code § 23-2-6, and further that the complaint failed to allege that the defendant deliberately and intentionally killed plaintiff's decedent as required by W.Va. Code § 23-4-1. The court sustained the defendant's motion to dismiss. The purpose of a motion under Rule 12(b)(6) of the West Virginia Rules of Civil Procedure is to test the formal sufficiency of the complaint. For purposes of the motion to dismiss, the complaint is construed in the light most favorable to plaintiff, and its allegations are to be taken as true. Since common law demurrers have been abolished, pleadings are now liberally construed so as to do substantial justice. W.Va. R.C.P. 8(f). The policy of the rule is thus to decide cases upon their merits, and if the complaint states a claim upon which relief can be granted under any legal theory, a motion under Rule 12(b)(6) must be denied. United States Fidelity & Guaranty Co. v. Eades, 150 W.Va. 238, 144 S.E.2d 703 (1965). "The trial court's inquiry [is] directed to whether the allegations constitute a statement of a claim under Rule 8(a)." Chapman v. Kane Transfer Co., W.Va., 236 S.E.2d 207, 212 (1977). W.Va. R.C.P. 8(a) reads as follows: (a) A pleading which sets forth a claim for relief . shall contain (1) a short and plain statement of the claim showing that the pleader is entitled to relief .... In a recent case we tried to assist the lower courts in ruling on 12(b)(6) motions by adopting the standard promulgated by the United States Supreme Court for the identical Federal Rule 12(b)(6). The third syllabus point of Chapman v. Kane Transfer Co., supra at 208 sets out the standard: 3. The trial court, in appraising the sufficiency of a complaint on a Rule 12(b)(6) motion, should not dismiss the complaint unless it appears beyond doubt that the plaintiff can prove no set of facts in support of his claim which would entitle him to relief. Conley v. Gibson, 355 U.S. 41, 45-46, 78 S.Ct. 99, 2 L.Ed.2d 80 (1957). All that the pleader is required to do is to set forth sufficient information to outline the elements of his claim or to permit inferences to be drawn that these elements exist. The trial court should not dismiss a complaint merely because it doubts that the plaintiff will prevail in the action, and whether the plaintiff can prevail is a matter properly determined on the basis of proof and not merely on the pleadings. Wright & Miller, Federal Practice and Procedure : Civil § 1216 (1969). In view of the liberal policy of the rules of pleading with regard to the construction of plaintiff's complaint, and in view of the policy of the rules favoring the determination of actions on the merits, the motion to dismiss for failure to state a claim should be viewed with disfavor and rarely granted. The standard which plaintiff must meet to overcome a Rule 12(b)(6) motion is a liberal standard, and few complaints fail to meet it. The plaintiff's burden in resisting a motion to dismiss is a relatively light one. Williams v. Wheeling Steel Corp., 266 F.Supp. 651 (N.D.W.Va. 1967). *921 We believe the complaint, when considered in the light most favorable to the plaintiff, with its allegations taken as true, states a claim for relief. Regardless of how difficult the proof may be when it comes to trial, the plaintiff should have the benefit of discovery. If all the plaintiff's allegations are taken as true, we cannot say that reasonable men could not infer therefrom the intent necessary to overcome defendant's immunity. We believe the judgment of the trial court was in error. Whether such an inference standing alone could support a verdict in plaintiff's favor is a matter for determination at a later time. For these reasons, we feel that the court erred in sustaining the defendant's motion to dismiss. Accordingly, we hereby reverse and remand all three cases to the respective circuit courts for further proceedings consistent with this opinion. Reversed and remanded. NEELY, Justice, dissenting: This dissent may be unique in the annals of dissenting opinions in this State in that I dissent to the tone of the majority opinion rather than to its holding. A fair reading of the majority opinion implies to me that this Court has been waiting many years to remove the yoke of oppression from the workers of this State by providing a vehicle for recovery of common law jury awards for negligently inflicted, work-related injuries in addition to the admittedly parsimonious awards of Workmen's Compensation. Furthermore, the majority opinion fairly implies that we are awaiting an opportunity to create a new legal fiction worthy of the common law fine and recovery of the ancient Britons[1] to be known as "constructive intent to injure" by which we shall magnanimously supplement compensation awards in every routine industrial accident. Our law has long recognized that injuries arising from the deliberate intention of the employer to injure are outside the immunity provision of the workmen's compensation law. W.Va.Code, 23-4-2 [1969]. Brewer v. Appalachian Constructors, Inc., 135 W.Va. 739, 65 S.E.2d 87 (1951); Allen v. Raleigh-Wyoming Mining Co., 117 W.Va. 631, 186 S.E. 612 (1936). See also, Eisnaugle v. Booth, W.Va., 226 S.E.2d 259 (1976). It appears to me that where my more moderate views are impaled in these consolidated cases is pure procedure, i. e., in the interrelationship between the practice of notice *922 pleading and the necessity to eliminate all conceivable factual disputes before summary judgment can properly be awarded. I cannot cavil with the majority's reversal based on procedure. Notice pleading, pursuant to W.Va.R.C.P. 8(a), and summary judgment practice, pursuant to R.C.P. 56(c) prevent a judge from "sniffing out" a totally meritless case and summarily dismissing it. I cannot disagree with the majority opinion that in all three cases the petitioners Alleged sufficient matter to be allowed an opportunity to develop facts. Nonetheless, I have some educated feelings for the facts in each of these three cases and it appears to me that only in the Mandolidis case has the plaintiff any legitimate grounds for recovery. In that case not only was a safety statute violated, but, in addition, the particular safety hazard at issue, a dangerous saw, was brought to the attention of the management by a safety inspector who closed down operation of the saw; management disregarded the safety shut down; and, management ordered the injured workman to operate the dangerous saw implying by past actions that to do otherwise would cost him his job. These facts, if proven, demonstrate more than even gross negligence; they demonstrate a willful, wanton, and reckless disregard for human safety. I doubt that the plaintiffs in Snodgrass or Dishmon can develop anything other than gross negligence, and I would hasten to point out that gross negligence is not the same thing as either intent to injure or willful, wanton, and reckless disregard for human safety. In order for a workman to recover under the intentional injury exception to workmen's compensation immunity, W.Va.Code, 23-4-2 [1969], the standard of proof should be at least as high as that required to prove malice in a murder case. If an act involves such a wanton and willful disregard of an unreasonable human risk as to constitute malice then no actual intent to kill or injure is necessary.[2] This is not the same standard used for criminal negligence. A motorist might pass another car or speed in a manner which, if he causes the death of another, would make him guilty of manslaughter. Another man, without any specific intent to kill anyone, might walk onto his porch and open fire with a machine gun which, if he causes the death of another, would make him guilty of murder. What makes the motorist guilty of manslaughter and the shooter guilty of murder is the shooter's cruel and wicked indifference to human life. The key is that the act of the shooter shows a viciousness not found in the motorist.[3] The motorist is violating a positive law mandate while the shooter is violating a natural law mandate. Accordingly, what concerns me in the tone of the majority opinion is its inspiration to the bar to do a substantial disservice to the economy of this State by instituting frivolous suits every time a workman is injured by anything other than his own negligence. Violation of a safety statute alone does not constitute intentional injury, Evans v. Allentown Portland Cement Co., 433 Pa. 595, 252 A.2d 646 (1969); unsafe working conditions do not constitute intentional injury. Southern Wire & Iron Co. v. *923 Fowler, 217 Ga. 727, 124 S.E.2d 738 (1962); failure to follow recommended procedures or to take standard precautions do not constitute intentional injury. All people, both employers and workmen, are negligent much of the time, and the theory of the Workmen's Compensation Act is to compensate work-connected injury as a normal cost of doing business. What was merely common sense in days of yesteryear has today been codified into elaborately detailed safety codes, so that to say that a safety statute was violated is only to say that an employer has failed to use reasonable care. Violation of a positive law mandate does not elevate negligence to intent to injure no matter how gross the negligence; only violation of a natural law mandate, i. e., an evil blackness of heart and callous indifference to the suffering of others, would so elevate it. While we may be outraged by the parsimony of the statutory compensation awards, we cannot be outraged at the theory of the compensation scheme, which while denying a claimant the advantage of a common law judgment when the employer is at fault, still has the employer pay even when the claimant is at fault. Often it is procedure itself which distorts the entire process; the tone of the majority opinion invites nuisance law suits, a high percentage of which will be settled (particularly by small employers) in preference to sustaining the costs of litigation. The risk, not necessarily the eventuality, of an enormous common law jury award in the event of a capricious judicial process (i. e., an unusually plaintiff oriented trial judge combined with faulty appellate review) are such that some settlements not contemplated by the statutory scheme will inevitably be forthcoming. Settlements are based on the if's, maybe's and might's of the judicial process, and not upon the inevitability of a result in consonance with the ideal administration of the law. The settlements I hypothesize combined over the course of a year, plus the attendant costs of defending frivolous law suits, are the type of expenses which not only divert needed resources from the fund available for wages, plant modernization, and stockholders' dividends, but contribute to inflation by increasing costs and prices in the oligopolistic sector of the economy, and reducing production in the market sector of the economy where companies unable to pass along these costs collapse. Obviously, I am not alleging that by being reactionary about the administration of our workmen's compensation laws we can cure the economic ills of mankind everywhere; I am merely pointing out that numerous untoward consequences can arise from lack of attention to the distortive effects of the legal process itself, and thus tone in judicial opinions becomes important. Without amending the Rules of Civil Procedure or completely reversing this Court's direction on the law of summary judgment, it would be difficult to encourage trial judges to dismiss frivolous law suits on the bare pleadings without an opportunity to develop the facts. Nonetheless, the law appears clear that the trial courts would be remiss in their duty if they permitted more than one case alleging intentional injury in a hundred to go to the jury. With regard to cases involving nothing but gross negligence on the part of the employer, the plaintiff should be given an opportunity to develop his case on depositions, and then the trial court should grant summary judgment. If neither plaintiff nor defendant wishes to engage in extensive pre-trial discovery, then at the trial stage, notwithstanding the impaneling of a jury, the trial judge should dismiss the plaintiff's case at the close of plaintiff's evidence without the least hesitation unless facts have been clearly proven demonstrating deliberate intention to injure or kill or a reckless, wanton, and willful disregard of human life. This is one area of the law in which the threshold issue concerning statutory immunity is in no regard a "jury question." Minute supervision by the trial judge is mandated in all cases because the exception to the blanket workmen's compensation immunity *924 which would permit a plaintiff to submit his case to a jury is so narrow, and the construction of what does or does not constitute a case within the exception is so technical, that trial judges should ruthlessly decide the issue as a matter of law in the first instance. I recognize that the tone of the majority opinion faithfully represents the judicial philosophy of the majority writer, but it implies an attitude on the part of this Court which is contrary to both the legislative intent and this Court's faithful interpretation of that intent over the years. The tone is wrong for what it implies; the holding is entirely correct with regard to Mandolidis, but correct only in the most narrow procedural way with regard to Snodgrass and Dishmon. MILLER, Justice, concurring: I concur in the majority opinion as I do not believe it represents a departure from this Court's construction of the deliberate intent exception[1] to the immunity from suits for damages extended to employers who subscribe to the Workmen's Compensation Fund.[2] The differences between our first case, Collins v. Dravo Contracting Co., 114 W.Va. 229, 171 S.E. 757 (1933), and the last, Eisnaugle v. Booth, W.Va., 226 S.E.2d 259 (1976), are at best semantical. Both Allen v. Raleigh-Wyoming Mining Co., 117 W.Va. 631, 186 S.E. 612 (1936), and Brewer v. Appalachian Constructors, Inc., 135 W.Va. 739, 65 S.E.2d 87 (1951), share a common bond with Maynard v. Island Creek Coal Co., 115 W.Va. 249, 175 S.E. 70 (1934), in that they utilize this key passage from Maynard: "It may be that the carelessness, indifference and negligence of any employer may be so wanton as to warrant a judicial determination that his ulterior intent was to inflict injury." [115 W.Va. at 253, 175 S.E. at 72] Maynard also spoke of the exemption from liability to employees for injuries received resulting from their employment, "except, if such injuries be willfully inflicted by the employer." [115 W.Va. at 252, 175 S.E. at 71] [emphasis added] The divergent language in our cases arises from the struggle to place the term "deliberate intention" into an existing legal compartment. Judge Kenna identified this problem in Collins, stating: "There are definitions of intent in the books more variant than the manifold uses to which that word is put. They range from the statement that a man is presumed to intend the ordinary and usual consequences of his acts, to definitions which make intent practically depend upon the existence of actual malice. In its nature, it is bound to be the existence of a state of mind, and since that state of mind must be arrived at in proof by the establishment of facts extraneous to the mind itself, it seems to us that it is always bound to be a deduction or conclusion from the facts so established. In the *925 very nature of things, these facts, in the main, are matters of evidence and not of pleading." [114 W.Va. at 235,171 S.E. at 759] Generally, the law recognizes that intention[3] can be ascertained either from verbal or nonverbal conduct of a party. The simplest proof is where the actor admits he consciously intended his conduct to produce the result it did. The more usual situation is where intention must be inferred from a person's conduct.[4] Here, the inquiry is directed at the degree of probability that the conduct will produce a given result. The higher degree of probability that a given result will follow, the greater the intention is inferred from the conduct. The link between the conduct and the resulting harm is not only a causative inquiry, but includes another factor by which the conduct is judged—the degree of seriousness of harm. Conduct which carries a high probability that serious harm will result is high on the scale of intentional conduct. Finally, the standard by which the conduct and its resulting harm is judged to determine its "intentional" characteristics is not only the subjective knowledge of the individual, but what would be known by a reasonable person.[5] It is apparent that because intent is measured by the degree of harm occasioned by given conduct, the law labels both the conduct and the intent. Thus we speak of negligent conduct, meaning it is at the bottom of the intent scale, which is to say conduct that is not intentional. At the far end of the scale is the type of intent necessary for first degree murder, which is beyond the concept of malice and involves deliberation and premeditation—the specific intent to kill. State v. Starkey, W.Va., 244 S.E.2d 219 (1978); State v. Stevenson, 147 W.Va. 211, 127 S.E.2d 638 (1962).[6] *926 The problem, of course, is an ancient one. It is the attempt to label or categorize certain acts in order to fit them into our precedential system of law. Admittedly, there is an almost infinite number of variations of conduct such that any process of labeling or categorizing can be criticized as imprecise. Yet, the law requires the effort of systematization to be done, or runs the risk of deciding cases not precedentially, but purely on an ad hoc basis. It seems to me that a fair reading of our prior cases in this area demonstrates that it was never contemplated that the term "deliberate intention" referred only to the type of intent necessary to support a charge of first or second degree murder. If such were the case, there would have been no justification in Allen and Brewer, which were the first cases to use the term "specific intent," to quote the Maynard statement of a wanton injury. Moreover, Maynard's use of the term "willfully inflicted" as being sufficient to hold the employer liable for an injury has never been criticized. Certainly all of our cases in this field have held that gross negligence is not equivalent with deliberate intent. To my mind the key language in the majority opinion is: "We wish to make clear that we are using the words `wilful,' `wanton,' and `reckless misconduct' synonymously, and that the conduct removing the immunity bar must be undertaken with a knowledge and an appreciation of the high degree of risk of physical harm to another created thereby." [246 S.E.2d at p. 914] I believe this rule is perfectly consistent with our former cases and, if applied, would not have changed the result in any of them. This rule, as I understand it, builds on the standard for wilfulness or wantonness in Stone v. Rudolph, 127 W.Va. 335, 32 S.E.2d 742 (1944), which "... imports premeditation or knowledge and consciousness that injury is likely to result ..." [127 W.Va. at 346, 32 S.E.2d at 748] by adding the concept that there is knowledge the conduct carries a "high degree of risk of physical harm." This is no insubstantial hurdle of proof. In view of the tone of the dissent,[7] I am constrained to state that I believe his theoretical fears of increased nuisance suits are not well-founded. It is an argument customarily advanced by those who have had little actual trial experience. No capable trial lawyer can survive by filing nuisance suits, as the contingent fee contract rewards only those who can persevere to a decent monetary recovery. The type of case here involved is complex and depends not on a mere showing that certain safety regulations have been violated, but proof that the employer consciously sanctioned repetitive violations, knowing he had thereby exposed his employee to a high risk of physical harm, which risk did in fact cause the injury. Because this type of case is often complex and since it requires proof of intent, from a procedural standpoint early disposition by a motion to dismiss or motion for summary judgment based on conclusionary affidavits is not warranted. The rule is stated in 10 Wright & Miller, Federal Practice and Procedure: Civil § 2730 (1973): "Since the information relating to state of mind generally is within the exclusive knowledge of one of the litigants and can be evaluated only on the basis of circumstantial *927 evidence, the other parties normally should have an opportunity to engage in discovery before a summary judgment is rendered. But even this may not be enough. Inasmuch as a determination of someone's state of mind usually entails the drawing of factual inferences as to which reasonable men might differ— a function traditionally left to the jury — summary judgment often will be an inappropriate means of resolving an issue of this character." See also Conrad v. Delta Air Lines, Inc., 494 F.2d 914 (7th Cir. 1974); Denny v. Seaboard Lacquer, Inc., 487 F.2d 485 (4th Cir. 1973); Friedman v. Meyers, 482 F.2d 435 (2nd Cir. 1973); 6 Moore's Federal Practice § 56-17 (41.-1) (2d ed. 1976); 3 Barron & Holtzoff, Federal Practice and Procedure § 1232.2 (1958). In my view the discovery developed in Mandolidis displayed sufficient facts, as outlined in the majority opinion, to preclude the granting of a summary judgment against the plaintiff on the issue of deliberate intention. If the plaintiff can sustain the same level of proof at trial, the question of deliberate intention would be for the jury. Both Snodgrass and Dishmon were prematurely terminated. In the former by conclusionary affidavits, and the latter based solely on the claimed inadequacy of the complaint. All we have held is that these two cases are entitled to further development through discovery before the issue of deliberate intention can be determined under the guidelines of our opinion. NOTES [1] W.Va.Code § 23-2-6 provides, in pertinent part, as follows: Any employer subject to this chapter who shall subscribe and pay into the workmen's compensation fund the premiums provided by this chapter or who shall elect to make direct payments of compensation as herein provided, shall not be liable to respond in damages at common law or by statute for the injury or death of any employee, however occurring, after so subscribing or electing, and during any period in which such employer shall not be in default in the payment of such premiums or direct payments and shall have complied fully with all other provisions of this chapter. . 1974 W.Va.Acts, ch. 145. W.Va.Code § 23-2-6a states: The immunity from liability set out in the preceding section [§ 23-2-6] shall extend to every officer, manager, agent, representative or employee of such employer when he is acting in furtherance of the employer's business and does not inflict an injury with deliberate intention. 1949 W.Va.Acts, ch. 136. [2] W.Va.Code § 23-4-2 reads, in relevant part: If injury or death result to any employee from the deliberate intention of his employer to produce such injury or death, the employee, the widow, widower, child or dependent of the employee shall have the privilege to take under this chapter, and shall also have cause of action against the employer, as if this chapter had not been enacted, for any excess of damages over the amount received or receivable under this chapter. 1913 W.Va.Acts, ch. 10 § 28. [3] See generally, 1 A. Larson's, Workmen's Compensation Law ch. 1-4 (1978); W. Prosser, The Law of Torts § 80 (4th ed. 1971). This excerpt from former Governor Henry Drury Hatfield's speech to the Legislature indicates West Virginia's experience with industrial accidents was not unlike experienced elsewhere in the county: In harmony with the advance of civilization and our duty to our neighbor, a more humane system has grown up in the way of compensating workmen who are injured while engaged in the course of their employment. The burden in the past fell upon the employee first, but in case of death, to those dependent upon him. As the law stood previous to the passage of the Workmen's Compensation law, the industry was indemnified by the insurance companies, and less than fifteen per cent of the injured received any damages in case of litigation, and then, after a long-drawn-out litigation, which resulted in practically nothing for the plaintiff. The injustice to the employee and waste of time and money to the tax-payer has excited the attention of public spirited men, and it has been demonstrated that it would have been a saving of money for the tax-payer if a reasonable compensation had been paid out of the State treasury, thereby preventing court cost and injustice. There is, however, no good reason why such a procedure should be necessary in the face of other remedies, which in justice and good conscience should be willing to do their part. Journal of the Senate, App. A, p. 67 (1915). [4] See generally, Journal of the Senate, p. 103 06 (1913) containing former Governor Hatfield's address to the Legislature advocating passage of a compensation law to deal with accidents in modern industrial conditions. [5] This excerpt from Dravo is particularly significant: We cannot see why the master cannot omit to perform a certain duty imposed by law upon him with the deliberate intent by so doing to inflict injury or death upon his employee ... If the defendant permitted the conditions set forth in the declaration to exist; if they were conditions that would naturally result in injury or death to its employees, and lent themselves to that purpose; if the defendant, prior to the happening that resulted in the death of plaintiff's decedent, knew full well that such conditions existed; then, however difficult the proof may be when it comes to that, as a matter of pleading, we cannot see why the very conditions alleged as matters of fact might not have been permitted to continue with the deliberate intent on the part of the employer, and with a design, that their continuance should cause injury or death or both to its employees. Id. at 234-35, 171 S.E. at 759. [6] See 72 W.Va.L.Rev. 90 (1970). [7] 114-C Supreme Court Records and Briefs, Brief for the Defendant in Error, pp. 17-18. [8] "[I]t is almost universally conceded that a corporation may be criminally liable for actions or omissions of its agents in its behalf." W. LaFave and A. Scott, Handbook on Criminal Law 229 (1972); see also State v. B. & O. R. R. Co., 15 W.Va. 362 (1879) (holding a corporation is indictable for misdemeanor of sabbath breaking); R. Perkins, Criminal Law, 641 (2nd ed. 1969). A specific or subjective intent to kill is not essential to murder in the second degree. Syl. pt. 3, State v. Morrison, 49 W.Va. 210, 38 S.E. 481 (1901); State v. Starkey, 244 S.E.2d 219 (W.Va. 1978), citing, State v. Hertzog, 55 W.Va. 74, 46 S.E. 792 (1904). Malice or the criminal intent necessary for a second degree murder conviction may be inferred from the total circumstances surrounding the act or omission. State v. Young, 50 W.Va. 96, 40 S.E. 334 (1901); State v. Douglass, 28 W.Va. 297 (1886); see W. LaFave and A. Scott, op. cit. supra § 70, discussing the conflicting views and authorities as to whether depraved-heart murder requires a subjective realization of very high risk of death or serious bodily injury; see also § 78 thereof for discussion of competing authority as to whether criminal negligence or involuntary manslaughter requires a subjective realization of the high degree of risk of serious bodily injury. See also R. Perkins, op. cit. supra 760-61. [9] We adopt the Restatement Second of Torts definition of "intent." Intentional ". denote[s] that the actor desires to cause consequences of his act, or that he believes that the consequences are substantially certain to result from it." Restatement (Second) of Torts § 8A (1965). See also W. Prosser, Handbook of the Law of Torts 31-2 (4th ed. 1971). [10] Proof of the subjective realization of the risk may and must generally be proved by circumstantial evidence. For example, the defendant's knowledge of the existence and contents of federal and state safety laws and regulations is competent evidence. Prior deaths or injuries as a result of the risk would certainly be relevant. [1] "Fine and recovery was a fictitious and prearranged suit in the form of a writ of right started by the person to whom the property was to be conveyed in fee simple. He would allege (of course falsely) that he was the owner of the property in fee simple by a title superior to the defendant's; that the defendant had no title to the land, having come into possession of it after the complainant had been wrongfully ousted therefrom by some third person named. The defendant, tenant in tail, would then appear, making no denial of the complainant's allegations, but calling upon one X, alleged to be the man who had conveyed the land to him in tail with warranty, to appear and defend the title which he had warranted. X would then appear and defend the title, but afterwards would default, and thereupon judgment would be given to the complainant that he recover the land in fee simple, and to the tenant in tail that he recover from X lands of equal value in recompense for the lands alleged to have been conveyed by X with warranty to the tenant in tail. X, the vouchee, selected to take this pretended part because judgment proof, was usually the court crier, and came to be called the common vouchee because used so frequently in this capacity. He had never any interest in the property. The judgment against him for an equal amount of land in favor of the tenant in tail and the heirs of his body was regarded as sufficient recompense for the loss of the entail by such heirs; so that the recovery suffered by the tenant' in tail was binding as against them, the complainant taking by virtue of the judgment an estate in fee simple which cut off the entail in favor of the heirs of the body of the tenant in tail, and also the reversion of the original donor, it having been judicially determined that the complainant's title in fee simple was superior to the title of the tenant and his donor. The complainant would then convey the land in fee to the tenant in tail, or convey to another at the tenant's direction, or pay the tenant the purchase-price agreed upon in case an actual sale to him was intended." 4 Thompson on Real Property § 1866, p. 486. [2] Brewer v. State, 140 Tex.Cr.R. 9, 143 S.W.2d 599 (1940) (Intoxicated automobile owner who turned car over to intoxicated companion and watched the companion make numerous reckless moves before fatal collision is guilty of murder); People v. Gonzales, 40 III.2d 233, 239 N.E.2d 783 (1968) (Firing shotgun into group of men implies criminal malice); Commonwealth v. Malone, 354 Pa. 180, 47 A.2d 445 (1946) (Playing "Russian Poker" is reckless conduct indicating malice); People v. Jernatowski, 238 N.Y. 188, 144 N.E. 497 (1924) (Firing shots into inhabited house evidences malice). [3] The workmen's compensation scheme is based on personal injury "by accident." Jordan v. State Workmen's Compensation Comm'r., 156 W.Va. 159, 191 S.E.2d 497 (1972); therefore, while this standard seems very strict it must be remembered that it's not the depravity of the employer's conduct that is being tested, but the narrow issue of the intentional versus the accidental quality of the precise injury. [1] W.Va.Code, 23-2-6a: "The immunity from liability set out in the preceding section [§ 23-2-6] shall extend to every officer, manager, agent, representative or employee of such employer when he is acting in furtherance of the employer's business and does not inflict an injury with deliberate intention." W.Va.Code, 23-4-2, reads in material part: "If injury or death result to any employee from the deliberate intention of his employer to produce such injury or death, the employee, the widow, widower, child or dependent of the employee shall have the privilege to take under this chapter, and shall also have cause of action against the employer, as if this chapter had not been enacted, for any excess of damages over the amount received or receivable under this chapter." [2] The applicable portion of W.Va.Code, 23-2-6, is: "Any employer subject to this chapter who shall subscribe and pay into the workmen's compensation fund ... shall not be liable to respond in damages at common law or by statute for the injury or death of any employee, however occurring, after so subscribing . . ." [3] I consider the term "intention" to be substantially synonymous to "intent." The American Heritage Dictionary of the English Language 682-83 (1973), summarizes: "Intention signifies a course of action that one proposes to follow. Intent, often a legal term, more strongly implies a fixed course pursued deliberately, ..." [4] In criminal law where "intent" receives the greatest attention, it was not until Mullaney v. Wilbur, 421 U.S. 684, 95 S.Ct. 1881, 44 L.Ed.2d 508 (1975), that serious examination began to be made on the validity of factual presumptions dealing with intent as they opposed the presumption of innocence. See also State v. Myers, W.Va., 245 S.E.2d 631 (1978) (No. 13896); State v. Starkey, W.Va., 244 S.E.2d 219 (1978); State ex rel. Cogar v. Kidd, W.Va., 234 S.E.2d 899 (1977); State v. Pendry, W.Va., 227 S.E.2d 210 (1976); Pinkerton v. Farr, W.Va., 220 S.E.2d 682 (1975). [5] Justice Holmes discusses the question of intent in both the criminal and intentional tort fields in O. W. Holmes, The Common Law (1881). He traces the historical precedents and arrives at a parallel conclusion: "The test of criminality in such cases is the degree of danger shown by experience to attend the act under the circumstances," Id. at 75, and as to intentional wrongs: "In general this question will be determined by considering the degree of danger attending the act or conduct under the known circumstances." Id. at 162. W. LaFave & A. Scott, Criminal Law §§ 28, 30 (1972), extensively discuss the concept of intent from a criminal and civil standpoint. In summarizing as to the former, they state: "Intent has traditionally been defined to include knowledge, and thus it is usually said that one intends certain consequences when he desires that his acts cause those consequences or knows that those consequences are substantially certain to result from his acts." Id. at 195-96. In settling the concept of "recklessness" they state: "Something more is usually required for criminal liability, either (1) a greater risk of harm, (2) subjective awareness of the risk by the defendant, or (3) both. The word `recklessness' is most often used to describe the third situation,..." Id. at 208. [6] W. Prosser, Torts 184 (4th ed. 1971), discusses the differences between criminal intent and the intent necessary for an intentional tort, stating: "Lying between intent to do harm, which as we have seen includes proceeding with the knowledge that the harm is substantially certain to occur, and the mere unreasonable risk of harm to another involved in ordinary negligence, there is a penumbra of what has been called `quasi intent.' To this area the words `wilful,' `wanton' or `reckless' are customarily applied; and sometimes in a single sentence, all three." [7] Despite the claimed uniqueness of the "tonal" dissent, the writer apparently has missed hearing certain atonalities to his own opinions. See, e. g., Rosier, Adm. v. Garron, Inc., 156 W.Va. 861, 199 S.E.2d 50 (1973) (Justices Berry, Caplan, Haden and Sprouse concurring); Jones v. Laird Foundation, Inc., 156 W.Va. 479, 195 S.E.2d 821 (1973) (Justices Berry, Caplan, Haden and Sprouse concurring). I do not sense that the dissent takes issue with the majority's test since he applies it to find Mandolidis as having "legitimate grounds for recovery." This conclusion is based on the dissenter's statement, "These facts, if proven, demonstrate more than even gross negligence; they demonstrate a wilful, wanton and reckless dis regard for human safety." [Dissent at 922]
{ "pile_set_name": "FreeLaw" }
[Effects of membrane protein ANO1 stable overexpression on laryngocarcinoma Hep-2 cells]. To explore the effects of ANO1 overexpression on the proliferation, detachment, spreading, and migration of laryngocarcinoma Hep-2 cell line. ANO1-overexpressing Hep-2 cell line was selected as the assay group, and Hep-2 cell line with empty plasmid was selected as the control group. MTT assay was used to detect the proliferation abilities of Hep-2 cells in both two groups. Cell detachment assay and spreading assay were used to detect the detachment and spreading abilities of Hep-2 cells. Boyden chamber invasion assay, wound healing assay in vitro, and niflumic acid block chloride channel were used to detect the migration abilities of Hep-2 cells. All data were analyzed by SPSS 10.0 software package. Cell proliferation assay by MTT showed that, compared with the control group, the optical density value of assay group was not significantly different (P=0.62). The results of cell detachment assay and cell spreading assay showed the cell detachment rates and cell spreading rates in assay group were significantly higher than those in control group (P<0.0001). The results of Boyden chamber invasion assay showed the percentages of cells migrating through the membrane in assay group were significantly higher than those in control group (P<0.0001). The results of in vitro wound healing experiments showed the wound area rate in assay group was significantly lower than that in control group (P<0.0001). The results of niflumic acid blocking chloride channel experiments showed the wound area rates in assay group were significantly higher than those in control group (P<0.0001). ANO1 overexpression does not remarkably alter the proliferation rate of cancer cells, but increases the migration, spreading, and detachment capacities of head and neck squamous cell carcinoma.
{ "pile_set_name": "PubMed Abstracts" }
FILED NOT FOR PUBLICATION JUN 03 2011 MOLLY C. DWYER, CLERK UNITED STATES COURT OF APPEALS U .S. C O U R T OF APPE ALS FOR THE NINTH CIRCUIT ANASTACIO GUEVARA-GUZMAN, No. 08-71675 Petitioner, Agency No. A078-923-958 v. MEMORANDUM * ERIC H. HOLDER, Jr., Attorney General, Respondent. On Petition for Review of an Order of the Board of Immigration Appeals Submitted May 24, 2011 ** Before: PREGERSON, THOMAS, and PAEZ, Circuit Judges. Anastacio Guevara-Guzman, a native and citizen of El Salvador, petitions pro se for review of the Board of Immigration Appeals’ order dismissing his appeal from an immigration judge’s decision denying his application for asylum, withholding of removal, and protection under the Convention Against Torture * This disposition is not appropriate for publication and is not precedent except as provided by 9th Cir. R. 36-3. ** The panel unanimously concludes this case is suitable for decision without oral argument. See Fed. R. App. P. 34(a)(2). (“CAT”). Our jurisdiction is governed by 8 U.S.C. § 1252. We review de novo questions of law, Cerezo v. Mukasey, 512 F.3d 1163, 1166 (9th Cir. 2008), except to the extent that deference is owed to the BIA’s determination of the governing statutes and regulations, Simeonov v. Ashcroft, 371 F.3d 532, 535 (9th Cir. 2004). We review factual findings for substantial evidence. Barrios v. Holder, 581 F.3d 849, 854 (9th Cir. 2009). We dismiss in part and deny in part the petition for review. The record does not compel the conclusion that Guevara-Guzman established changed or extraordinary circumstances sufficient to excuse the delay in filing his asylum application. See 8 C.F.R. § 1208.4(a)(4), (5). Accordingly, we deny the petition as to Guevara-Guzman’s asylum claim. Substantial evidence supports the agency’s denial of Guevara-Guzman’s withholding of removal claim because he failed to establish gang members have harmed him or will harm him on account of a protected ground. See Barrios, 581 F.3d at 856 (evidence supported conclusion that gang victimized the petitioner for economic and personal reasons rather than on account of a protected ground); see also Ochave v. INS, 254 F.3d 859, 865 (9th Cir. 2001) (“Asylum generally is not available to victims of civil strife, unless they are singled out on account of a protected ground.”). We lack jurisdiction to consider Guevara-Guzman’s 2 08-71675 contentions based on being a member of a class of “small merchants” or “small businessmen” and his contentions based on imputed political opinion because he did not raise them to the agency. See Barron v. Ashcroft, 358 F.3d 674, 678 (9th Cir. 2004). Accordingly, we deny the petition as to Guevara-Guzman’s withholding of removal claim. Finally, Guevara-Guzman fails to raise any substantive challenge to the denial of his CAT claim. See Martinez-Serrano v. INS, 94 F.3d 1256, 1259-60 (9th Cir. 1996) (issues not addressed in the argument portion of a brief are deemed waived). PETITION FOR REVIEW DISMISSED in part; DENIED in part. 3 08-71675
{ "pile_set_name": "FreeLaw" }
A safe blood transfusion procedure for immunization against major histocompatibility complex determinants in man. A standardized procedure is proposed for deliberate immunizations against human major histocompatibility complex determinants. The data presented demonstrate its effectiveness and, by using a number of necessary precautions, this procedure has proven to be very safe. The following points are especially important: (1) exclusive utilization of regular blood donors as immunizers; (3) use of whole blood as an immunizing agent; and (3) use of small immunizing stimuli rather than large transfusions. This procedure can be recommended for the production of monospecific anti-HLA antisera and it may be useful if and when a deliberate transfusion policy for prospective kidney recipients is adopted.
{ "pile_set_name": "PubMed Abstracts" }
Bronchial hyperreactivity in children with antibody deficiencies. Antibody deficiency comprises a heterogeneous group of disorders characterised by the body's inability to mount an effective antibody response to pathogens. Although it has been reported that asthma and allergic disease are frequent in antibody deficiencies, there are no data that evaluate and compare bronchial hyperreactivity (BHR) in all groups of antibody deficiencies. In this study, we aimed to evaluate and compare the frequency of BHR in patients with different antibody deficiencies. The study was carried out on 113 patients between ages 5 and 18 diagnosed with antibody deficiencies. The patients and their families were questioned on their history of asthma and allergic diseases. Allergic skin prick tests and non-specific bronchial provocation test with methacholine was done for all patients. Complete blood count and serum total IgE levels were measured. The mean age of the patients was 10.8 ± 3.8 years and 66.4% were male. Within the study group 41.6% of the patients had selective IgA deficiency, 24.8% had IgG subclass deficiency, 14.2% had partial IgA deficiency, 10.6% had common variable immunodeficiency, 6.2% had transient hypogammaglobulinaemia and 2.7% X-linked agammaglobulinaemia. In total group, 42.5% had bronchial hyperreactivity with methacholine challenge test. BHR was more significant in both patients with selective IgA deficiency and partial IgA deficiency compared to those with IgG subclass deficiency (P=0.041 and P=0.038, respectively). BHR was high in antibody deficiencies, especially selective IgA deficiency compared to IgG subclass deficiency.
{ "pile_set_name": "PubMed Abstracts" }
Mercurys surface had been formed by volcanic activity Washington, July 4 (ANI): Scientists have confirmed that Mercurys surface had been formed by volcanic activity early in the planets history. The conclusion is based on an image taken by the Messenger spacecraft as it flew past Mercury in January 2008, which showed a kidney-shaped volcanic vent, surrounded by a halo-like ring and a fainter outer ring. Earlier, in 1975, the Mariner 10 spacecraft returned intriguing images that showed smooth plains covering large swaths of Mercurys surface. But scientists could not determine whether the plains had been created by volcanic activity or by material ejected from below the surface when objects had collided into it. Thus, they could not reach a consensus over Mercurys geologic past. Now, a research team led by Brown University planetary geologist James Head has determined that volcanism played a central role in forming Mercurys surface. The researchers have found evidence of past volcanic activity, suggesting that the planet underwent an intense bout of changes to its landscape about 3 to 4 billion years ago and that the source for much of that reshaping was within. What this shows is that Mercury was not dead on arrival, said Head. It had a pulse for a while. Now, we want to know when it had that pulse and what caused it to slow down and eventually stop, he added. A major clue to Mercurys geologic past came from the scientists finding of volcanic vents along the margins of the Caloris basin, one of the solar systems largest and youngest impact basins. The group zeroed in on a kidney-shaped depression that was surrounded by a bright ring, lending a halo-like impression to the landscape. The scientists determined that the depression was a volcanic vent, and the bright ring around it was pyroclastic, remnants of lava that had been spewed outward, much like a volcanic fountain on Earth. Another larger ring surrounding the vent and halo ring showed that another type of volcanism, called effusion, in which molten rock from within the planet oozes outward and covers the surface, had occurred. Together, these deposits create a surface feature shaped like a volcanic shield a clear sign to scientists that volcanic activity helped form the surrounding plains. Armed with the higher quality images and greater coverage, Head and his team said that they found many impact craters and areas between craters that were flooded with lava, bolstering their belief that volcanism had been widespread on Mercury and had contributed significantly to the planets formation. (ANI)
{ "pile_set_name": "Pile-CC" }
Transfection assays for transformation of model colonic cell lines. The recognition of cancer as a genetic disease has changed the approach investigators take to understanding the mechanisms of carcinogenesis. The discovery of oncogenes, and the recognition of the inactivation of tumor suppressor genes, DNA repair enzymes, and of apoptotic pathways have provided a clearer picture of the dysregulation which is required for a cell to become a cancer.
{ "pile_set_name": "PubMed Abstracts" }
Newt Gingrich 10:01 pm Wed December 21, 2011 Gingrich's Catholic Journey Began With Third Wife Any discussion of Newt Gingrich's journey to Catholicism begins with his wife. "I have always been a very spiritual person," Callista Gingrich told the Christian Broadcasting Network this year. "I start each day with a prayer, and pray throughout the day, because I am grateful for the many blessings that God has bestowed upon us." Mrs. Gingrich, who is Newt Gingrich's third wife, is a devout Catholic who sings in the professional choir at the the Basilica of the National Shrine of the Immaculate Conception in Washington, D.C. After they married in 2000, Gingrich began attending Mass practically every week to watch her perform. "And I was doing that as a supportive husband, and it sort of caught up with me in a way I could never imagine," Gingrich told the Catholic TV network EWTN. A Slower And Headier Process Gingrich didn't convert to Catholicism in a sudden swell of emotion. Rather, it seemed a slower and headier process. Like many adult converts, Gingrich was drawn by the philosophical richness of the Roman Catholic Church. "Let's not forget this is a Ph.D., a former professor, a man who loves books and loves big ideas, and there is of course a very deep intellectual tradition within Catholicism," says Mark Rozell, a political scientist at George Mason University. "And perhaps Gingrich found a natural connection there. It connects with his persona." Gingrich began studying the history of the Catholic Church and its influence on Western civilization, especially the church's role in the fall of communism. In 2010, Newt and Callista Gingrich produced a documentary about Pope John Paul II's historic trip to Poland. But for Gingrich, the turning point was Pope Benedict XVI's visit to the U.S. in 2008. "The joyful and radiating presence of the Holy Father was a moment of confirmation of the many things I had been thinking and experiencing over the last several years," Gingrich said at a Catholic prayer breakfast this year. That evening, Gingrich told Monsignor Walter Rossi, the rector at the basillica, that he wanted to be received into the church. He was confirmed on March 29, 2009. He says that conversion made him a different man. No Erasing The Past "I have a sense of being at peace," Gingrich told EWTN. "I understand when you give the sign of peace, and when the priest says, 'Peace be with you,' in a way I never did 10 or 15 years ago. I have a deep personal sense of what that means." But his conversion doesn't erase his past. After all, Gingrich has a history of marital infidelity. He cheated on his first wife, and his relationship with Callista, his third wife, began six years before the end of his second marriage. She was a staffer 23 years his junior; he was a Republican congressman who had yet to become speaker of the House. "Without a doubt," says Rozell, "many people will find it rather strange, ironic, whatever, that his religious journey that led him to convert to Catholicism began with an affair he had with a young woman while he was still married to his second wife." That has become satirical fodder for some conservative Christians, including video commentator Molotov Mitchell, whose scorching video went viral by describing Callista Gingrich as "quite the missionary — First Lady material, all the way." Gingrich acknowledges his sins and says — in religious language — that he has sought forgiveness. "People have to render judgment," he said in a recent debate in Iowa. "In my case, I've said upfront openly, I've made mistakes at times. I've had to go to God for forgiveness. I've had to seek reconciliation. But I'm also a 68-year-old grandfather, and I think people have to measure who I am now and whether I'm a person they can trust." "He does seem more settled, more comfortable in his own skin, not as pugnacious, if you will. Surely part of it is a political calculation, but I think part of it might be spiritual as well." But Mathew Schmalz, a political scientist at Holy Cross College in Worcester, Mass., isn't so sure. "It seems to me that his grandiosity for which he is well-known has been held in check during the campaign," Schmalz says. "But nonetheless there have been glimpses of what one would call the 'old Newt Gingrich.' " Culture-Warrior Catholicism Schmalz cites as an example Gingrich's response to rival Mitt Romney, when Romney suggested Gingrich return the $1.6 million he received from mortgage giant Freddie Mac. "I would just say," Gingrich told reporters, "if Gov. Romney wants to give back all the money he's earned from bankrupting companies and laying off employees over his years at Bain, that I would be glad to listen to him. And I would bet you $10 — not $10,000 — that he would not take the offer." Whether or not Gingrich's style and character have changed, his conversion from Southern Baptist to Catholic is playing well with some evangelicals. "They would prefer to have somebody who's a very devout Catholic and strong on the social issues [rather] than, say, a lukewarm Southern Baptist, as many perceived Gingrich was in his past and perhaps a little bit soft on the issues they care about very deeply," says political scientist Rozell. He adds that Gingrich's type of culture-warrior Catholicism — anti-abortion, anti-gay marriage, decrying the rise of secular America — aligns him nicely with the conservative voters Gingrich needs to win the early contests.
{ "pile_set_name": "Pile-CC" }
NOT FOR PUBLICATION UNITED STATES COURT OF APPEALS FILED FOR THE NINTH CIRCUIT JUN 06 2012 MOLLY C. DWYER, CLERK U.S. COURT OF APPEALS MICHAEL SAAVEDRA, No. 09-17775 Plaintiff - Appellant, D.C. No. 3:08-cv-02180-CRB v. MEMORANDUM* L. E. SCRIBNER, Warden; D. TRAVERS; ANTHONY HEDGPETH; P. MANDEVILLE; J. CELAYA; J. MCCALL; R. PARIN, Defendants - Appellees. Appeal from the United States District Court for the Northern District of California Charles R. Breyer, District Judge, Presiding Argued and Submitted May 14, 2012 San Francisco, California Before: THOMAS, McKEOWN, and W. FLETCHER, Circuit Judges. Plaintiff Michael Saavedra, an inmate at Salinas Valley State Prison, sued various prison officials for alleged due process violations arising out of his * This disposition is not appropriate for publication and is not precedent except as provided by 9th Cir. R. 36-3. placement and retention in administrative segregation and the disciplinary proceedings that followed. The district court granted summary judgment to Defendants. It held that the notice given to Saavedra for his placement in administrative segregation was constitutionally deficient, but that Defendants were entitled to qualified immunity. We affirm. We review “questions of our own jurisdiction de novo.” Hunt v. Imperial Merchant Servs., Inc., 560 F.3d 1137, 1140 (9th Cir. 2009). We review a decision to grant summary judgment on the basis of qualified immunity de novo. See Bingham v. City of Manhattan Beach, 341 F.3d 939, 945 (9th Cir. 2003). The doctrine of qualified immunity is a two-part test. “First, a court must decide whether the facts that a plaintiff has . . . shown . . . make out a violation of a constitutional right.” Pearson v. Callahan, 555 U.S. 223, 232 (2009). “Second . . . the court must decide whether the right at issue was ‘clearly established’ at the time of defendant’s alleged misconduct.” Id. For a right to be clearly established, the unlawfulness of official action “must be apparent” “in the light of pre-existing law.” Hope v. Pelzer, 536 U.S. 730, 739 (2002) (internal quotation marks and citation omitted). 1. Rooker-Feldman Doctrine. As a preliminary matter, Defendants contend that the Rooker-Feldman doctrine bars jurisdiction over this case. The 2 Rooker-Feldman doctrine bars federal court jurisdiction where a federal plaintiff is “complaining of injuries caused by state-court judgments” and is “inviting district court review and rejection of those judgments.” Exxon Mobil Corp. v. Saudi Basic Indus. Corp., 544 U.S. 280, 284 (2005). The Rooker-Feldman doctrine does not bar this action on the basis of the state court’s denial of Saavedra’s habeas petition because Saavedra complains of due process injuries caused by Defendants’ conduct, not injuries caused by a state court judgment. 2. Due Process Violations. For placement in administrative segregation, an inmate must “receive some notice of the charges against him,” Hewitt v. Helms, 459 U.S. 460, 476 (1983) (emphasis added), or “notice of the factual basis leading to consideration” for confinement, Wilkinson v. Austin, 545 U.S. 209, 225-26 (2005). The notice must be delivered “within a reasonable time following an inmate’s transfer” in order to be effective in helping the inmate prepare a defense at his hearing. See Hewitt, 459 U.S. at 476 n.8; Toussaint v. McCarthy, 801 F.2d 1080, 1100 & n.20 (9th Cir. 1986) (“Prison officials must hold an informal nonadversary proceeding within a reasonable time after the prisoner is segregated.”). The notice delivered to Saavedra on April 15, 2004, the day of his segregation, stated that Saavedra was “deemed a threat to the safety and security of 3 the institution, it’s [sic] staff, and inmates” based on “confidential information.” Defendants knew that Saavedra was being investigated for overfamiliarity with staff, yet failed to notify Saavedra of that fact. We agree with the district court’s holding that this April 15 notice was constitutionally insufficient under Hewitt. Nearly two months after his segregation, at a hearing on June 10, Defendants gave Saavedra a CDC 1030 form notifying him that his placement in administrative segregation was because of a still-ongoing investigation into the charge for overfamiliarity with staff. We hold that a two-month delay between placement in administrative segregation and the June 10 notice of the charges was unreasonable in violation of due process. See Hewitt, 459 U.S. at 476 n.8; Toussaint, 801 F.2d at 1100 & n.20. Defendants’ contention that Saavedra lacks a protectable liberty interest was not raised in the district court. Accordingly, they have waived this issue. See Costanich v. Dep’t of Soc. & Health Servs., 627 F.3d 1101, 1110 (9th Cir. 2010) (finding waiver on appeal of question of protectable liberty interest where defendants failed to raise it in the district court). 3. Qualified Immunity. We hold that qualified immunity protects Defendants from liability for the due process violations described above. We also hold that qualified immunity protects Defendants from liability for Saavedra’s 4 other notice-based due process claims, but need not decide whether the facts establish a violation of his constitutional rights. See Pearson, 555 U.S. at 236 (holding that a court may decide the question of qualified immunity without deciding the underlying constitutional question). We begin with the question of qualified immunity for the constitutional violation arising out of the deficient notice on April 15, and the failure to effect timely and sufficient notice prior to the June 10 hearing. Because our cases do not give adequate guidance both on the level of specificity required in a Hewitt notice and on ensuring timely delivery of a Hewitt notice, there is qualified immunity for the time period from April 15 to June 10. Assuming without deciding that the June 10 notice of the charges was constitutionally deficient, we conclude that Defendants are entitled to qualified immunity for the June 10 notice. From a reading of our cases and the Supreme Court’s, it would not be apparent to a prison official in 2004 that a Hewitt notice requires more than the notice provided. Defendants are also entitled to qualified immunity for any constitutional violations arising out of the notice delivered to Saavedra for his subsequent disciplinary proceedings that resulted in loss of good time. That notice disclosed the charge and some factual basis for the charge. It would not be apparent to a 5 prison official that he needed to disclose more than this information in a notice to initiate disciplinary proceedings, especially where a portion of the evidence used to support the disciplinary action was legitimately confidential. See Zimmerlee v. Keeney, 831 F.2d 183, 188 (9th Cir. 1987) (“Wolff [v. McDonnell, 418 U.S. 539, 563-66 (1974)] provides little guidance as to the specificity of notice necessary to satisfy due process.”); McCollum v. Miller, 695 F.2d 1044, 1048 (7th Cir. 1982) (explaining that more notice is not necessary where disclosure of evidence may impose significant costs on the prison’s investigation into, and prosecution of, misconduct). 4. “Some Evidence” Justified Saavedra’s Placement in Segregation. Assuming the “some evidence” standard applies to the initial placement in administrative segregation, compare Toussaint, 801 F.2d at 1104 (requiring “some evidence”), with Cato v. Rushen, 824 F.2d 703, 705 (9th Cir. 1987) (not requiring “some evidence”), the evidence Defendants used to place Saavedra in administrative segregation satisfied the “some evidence” standard. AFFIRMED. 6
{ "pile_set_name": "FreeLaw" }
Glycosyl-transferase activities in pancreas: comparison between semi-synthetic and commercial diets. The glycosyl-transferase activities in the rat pancreas have been previously demonstrated to be modified by the quantity of different dietary components (lipids or proteins). To evaluate the role of the qualitative composition of the diet on such enzymic systems, two groups of rats were fed either a semi-synthetic diet or a commercial diet of very similar quantitative composition but differing in the quality of their components. The two diets induce a quite similar growth of animals, although the pancreas weight of the commercial-diet-fed rats is slightly higher. The galactosyl-, fucosyl- and mannosyl-transferase activities are more or less highly enhanced by the commercial diet according to the enzyme studied. The highest increase is observed for the biosynthesis of mannosyl-phosphoryl-dolichol. This enhancement by the commercial diet disappears when exogenous phosphoryl-dolichol is added. Such results indicate that the mannose transfer is probably modified by an increased level of the pancreatic lipidic acceptor.
{ "pile_set_name": "PubMed Abstracts" }
College station jewish girl personals Man pleads to hate crime for nazi symbols at jewish cemetery feb 22, 2018 0 bryan's girl scout house in need of expensive college station. Davis is a new york city wingwoman for jewish singles: is a tough place to be an outspoken jewish girl fairy godmother of the new york city jewish singles. Women seeking men in bryan, tx (1 32 yr old women seek men college station, tx the girls from texas are just a lil bit better. Attention women shooters, here it is tx - snook (college station) become a member of a girl & a gun women's shooting league in addition to all the membership perks listed below, you will receive a personalized name tag. College station's best 100% free jewish girls dating site meet thousands of single jewish women in college station with mingle2's free personal ads and chat rooms. Online dating sites free college china dating casual personals com official site in sugar daddy dating sites free with love songs for college station. Girls world expo event in bryan-college station, tx on sunday, march 18, 2018. 100% free online dating in college station 1,500,000 daily active members. Craigslist provides local classifieds and forums for jobs, housing, for sale, personals, services, local community, and events. Read our expert reviews and user reviews of the most popular dating in college station local personals live teens jewish singles ct single girl quotes and. Meet jewish singles in college station, texas online & connect in the chat rooms dhu is a 100% free dating site to find single jewish women & men. College station cougars big back way connor kelley surged a pass and hopa jewish it 11 yards to the rage craigslist high point nc personals calgary bbw escort. College station girls - our online dating site can help you to find more relationships and more dates discover your love today or find your perfect match right now. Dating in college station 32)personals in college station dating in college station catholic dating in college station jewish dating college station. Home college station dating college station women seeking men report ad (979) 575-8370 posted: tuesday, 20 march 2018, 5:55 pm contact: (979) 575-8370. Uk dating services : peruvian singles, free online dating sites in united states, dating friendship. Davis is a new york city wingwoman for jewish singles: is a tough place to be an outspoken jewish girl jenny singer is a writer for the forward. College station jewish girl personals I’m a jewish cadet in texas and college has been anti-semitism free college station nice jewish girl by the end of freshman year. Do all girls boarding schools of college station, tx work the top schools know that good grades and college entrance are the big key factors to a girl's. Let me tell you about this girl it's not just the chili's here in college station either most of the chili's i have gone to in jewish pastrami. College station personals stoic philosopher a common question of cologne, so many transactions at times. Search engine for classified ads post ads for cars, jobs, housing, for sale, dating and services. Personal ads for college station, tx are a great way to find a life partner, movie date, or a quick hookup personals are for people local to college station, tx and are for ages 18+ of either sex. Meet thousands of local college station singles, as the worlds largest dating site we make dating in college station easy im a very chill girl and easy to talk to. College station personals - if you want to find out who likes you, start using the dating page girls and men are waiting for you, it is simple to.
{ "pile_set_name": "Pile-CC" }
St. Louis Cardinals Player Bio Became a Cardinal: Signed a minor league contract for $2.5 million on February 24. 2017. Awards: The Cardinal Nation top prospect – 2019 #16, 2018 #12 The Cardinal Nation and Cardinals organization Player of the Month – July 2018 Pacific Coast League Player of the Month – July 2018 Pacific Coast League Player of the Week – July 23-29, 2018 The Cardinal Nation system-wide Rookie Player of the Year – 2017 Texas League mid-season All-Star – 2017 (did not play – promoted) Personal: First name is pronounced “ah-DOLE-is”. First-hand news and commentary on the St. Louis Cardinals™ and their minor league system for 20 years
{ "pile_set_name": "Pile-CC" }
A discussion group that especially dedicated to disorders of consciousness and sharing information and knowledge relevant to research of coma, vegetative state,… We're looking for active membersSee More
{ "pile_set_name": "Pile-CC" }
I am starting this one with a definition from Wikipedia: A fakir (the Persian &#1601;&#1602;&#1740;&#1585;, transl. "faqir" which means "poor," and the Arab &#1601;&#1602;&#1585;, faqr , ' poverty ') 1 is an ascetic (or marabout in culture Muslim ) running challenges of physical and mental endurance such as walking on fire or glass, torches or knives inserted in his mouth, lying on beds with nails, among others. The term, originally Islamic , culture was extended to India . Currently also mentions circus artists who practice such activities as trade. And I will expand it. the FAQUIRs were often the throw away people as well, the dwarves, the lame and the dirt poor. But in their POVERTY arose a spirituality beyond any human belief! The FIRE EATER I presented to you here was a FAQUIR as well as the SNAKE CHARMER! In modern times they entertain the tourists but these are the men other men climbed mountains for to gain knowledge! Their bodily control is awesome to walk on hot coals or fire or lay on a bed of nails is no easy stunt! That is why they are called: ASCETICS! One more definition for you - that of ASCETIC: Asceticism or ascetic (in Greek : &#7940;&#963;&#954;&#951;&#963;&#953;&#962; , askesis , " exercise "or" training "), is called to the religious and philosophical doctrine that seeks to purify the spirit through the denial of material pleasures or abstinence , the set of procedures doctrine and behavior morality which is based on the systematic opposition to the fulfillment of needs of various kinds that depend to a greater or lesser extent, the degree and direction in question. In many religious traditions, asceticism is a way to access mystical . Most systems needs disdain ascetic physiological the individual as being of lower order. In the West , the ascetic doctrines first arose in ancient Greece . However, these practices were already ancient in the East . The asceticism reached its dissemination to join religious systems such as Buddhism , the Christianity and Islam . So I am honored to dedicate this MOCpage to the FAQUIRS of the Arab World and the Indian World - we have a lot to learn from these men!
{ "pile_set_name": "Pile-CC" }
import { expect } from "chai"; import "reflect-metadata"; import { IMock, Mock } from "typemoq"; import { IDirectoryManager, ISettingsManager } from "managers"; import { IDirectoryItem, IStatusNotifier } from "models"; import { DirectoryListModel } from "objects"; import { IDirectoryListProps } from "props/panels"; import applicationTheme from "settings/internal/themes/dark"; import { IDirectoryListState } from "states/panels"; import { DirectoryPaneSide } from "types"; describe("DirectoryListModel's", () => { let directoryListModel: DirectoryListModel; let directoryItem1: IDirectoryItem; let settingsManager: IMock<ISettingsManager>; before(() => { directoryListModel = new DirectoryListModel(); settingsManager = Mock.ofType<ISettingsManager>(); }); beforeEach(() => { directoryItem1 = { accessible: true, created: new Date(), isDirectory: false, isHidden: false, lastModified: new Date(), name: "Item 1", path: "path/to/Item 1" }; }); describe("stateChanged method", () => { let prevState: IDirectoryListState; let nextState: IDirectoryListState; beforeEach(() => { const commonState: IDirectoryListState = { chosenItems: [], creatingNewItem: false, directoryItems: [], isFocused: false, isGotoOpen: false, itemDeleted: false, renamingItem: false, selectedIndex: 0, showHiddenItems: false }; prevState = { ...commonState }; nextState = { ...commonState }; }); it("Returns false when nothing has changed", () => { expect(directoryListModel.stateChanged(prevState, nextState)) .to.be.false; }); it("detects changes in 'creatingNewItem'", () => { nextState.creatingNewItem = "file"; expect(directoryListModel.stateChanged(prevState, nextState)) .to.be.true; }); it("detects changes in 'itemDeleted'", () => { nextState.itemDeleted = true; expect(directoryListModel.stateChanged(prevState, nextState)) .to.be.true; }); it("detects changes in 'renamingItem'", () => { nextState.renamingItem = true; expect(directoryListModel.stateChanged(prevState, nextState)) .to.be.true; }); it("detects changes in 'selectedIndex'", () => { nextState.selectedIndex = 1; expect(directoryListModel.stateChanged(prevState, nextState)) .to.be.true; }); it("detects changes in 'showHiddenItems'", () => { nextState.showHiddenItems = true; expect(directoryListModel.stateChanged(prevState, nextState)) .to.be.true; }); it("detects changes in 'isGotoOpen'", () => { nextState.isGotoOpen = true; expect(directoryListModel.stateChanged(prevState, nextState)) .to.be.true; }); }); describe("propsChanged method", () => { let prevProps: IDirectoryListProps; let nextProps: IDirectoryListProps; let directoryManager: IMock<IDirectoryManager>; const statusNotifier = {} as IStatusNotifier; beforeEach(() => { directoryManager = Mock.ofType<IDirectoryManager>(); const commonProps: IDirectoryListProps = { columnSizes: { createdOn: 0, lastModified: 25, name: 50, size: 25 }, directoryManager: directoryManager.object, id: "left", isSelectedPane: false, path: "/path/to/directory", sendPathUp: (path: string) => { }, sendSelectedPaneUp: (paneToSelect: DirectoryPaneSide) => { }, settingsManager: settingsManager.object, statusNotifier, theme: applicationTheme }; prevProps = JSON.parse(JSON.stringify(commonProps)); nextProps = JSON.parse(JSON.stringify(commonProps)); }); it("returns false when nothing has changed", () => { const result = directoryListModel.propsChanged(prevProps, nextProps); expect(result).to.be.false; }); it("detects changes in 'isSelectedPane'", () => { nextProps.isSelectedPane = true; const result = directoryListModel.propsChanged(prevProps, nextProps); expect(result).to.be.true; }); it("detects changes in 'path'", () => { nextProps.path = "some/other/path"; const result = directoryListModel.propsChanged(prevProps, nextProps); expect(result).to.be.true; }); it("detects changes in column sizes", () => { nextProps.columnSizes.name = prevProps.columnSizes.name * 2; const result = directoryListModel.propsChanged(prevProps, nextProps); expect(result).to.be.true; }); }); describe("chosenItemsChanged method", () => { let prevItems: IDirectoryItem[]; let nextItems: IDirectoryItem[]; beforeEach(() => { const commonItems: IDirectoryItem[] = [directoryItem1]; prevItems = [...commonItems]; nextItems = [...commonItems]; }); it("returns false when nothing has changed", () => { const result = directoryListModel.chosenItemsChanged(prevItems, nextItems); expect(result).to.be.false; }); it("detects when a chosen item has been added or removed", () => { nextItems.shift(); const result = directoryListModel.chosenItemsChanged(prevItems, nextItems); expect(result).to.be.true; }); }); describe("directoryItemsChanged method", () => { let prevItems: IDirectoryItem[]; let nextItems: IDirectoryItem[]; beforeEach(() => { const commonItems: IDirectoryItem[] = [directoryItem1]; prevItems = commonItems; nextItems = commonItems; }); it("returns false when nothing has changed", () => { const result = directoryListModel.directoryItemsChanged(prevItems, nextItems); expect(result).to.be.false; }); it("detects when an item has been added or removed", () => { nextItems = []; const result = directoryListModel.directoryItemsChanged(prevItems, nextItems); expect(result).to.be.true; }); it("detects when an item's name has changed", () => { const changedItem: IDirectoryItem = { ...directoryItem1 }; changedItem.name = "Different name"; nextItems = [changedItem]; const result = directoryListModel.directoryItemsChanged(prevItems, nextItems); expect(result).to.be.true; }); }); });
{ "pile_set_name": "Github" }
Dynamics and thermodynamics of hyperthermophilic proteins by hydrogen exchange. The naturally occurring hydrogen exchange of protein molecules can provide nonperturbing site-resolved measurements of protein stability and flexibility and changes therein. The measurement and understanding of these issues is especially pertinent to studies of thermophilic proteins. This chapter briefly reviews the considerations necessary for measuring hydrogen exchange and translating HX measurements into these detailed protein parameters.
{ "pile_set_name": "PubMed Abstracts" }
Category: casino online Good luck charms around the world If you look further afield, however, you'll find there are all sorts of good luck charms and symbols out there in the world. Check out a few that are used around the. 7 Good Luck Charms From Around the World. This St. Patrick's Day, luck isn't just for the Irish. By Lauren Boyer, Social Media Editor | March 17. Whether or not you genuinely believe in the concept of luck, most of us have our own little superstitions or things that we do for good luck, such as crossing our. Culture How to NOT Get Caught Liking an Old Instagram Photo—And Other Social Faux Pas Tips. According to folklore, people who cannot fall asleep reveal their worries to the doll, which is then believed to take over their concerns and allow them to sleep. This good luck charm is said to bring good luck and prosperity, especially if it lands on your hand. Bewertung der Store-Nutzer für Good Luck Charms From Around The World 0. You may unsubscribe from email communication at anytime. For security reasons you should upgrade your browser. Thanks to gutscheine at partners. Dolphins were often seen as a online slots kostenlose of protection. Set Of 3 Metal Lamps Buy It. Bewertung der Store-Nutzer für Good Luck Wow slots From Around The World. Theirry Mugler Alien Buy It. Be the first of your friends. Good luck charms around the world - Hill Never point the toad towards a door leading to the outside of your home. Miscellaneous 25 Superpowers You Wish You Had. In Peru, it's considered good luck to hang a tumi on the wall. In Norse Viking culture, a single acorn is put on a windowsill to protect the home from lightning strikes. The origin of the four-leafed clover as good luck is thought to go back to a legend surrounding the biblical story of Adam and Eve. LEITH Split Sleeve Top Buy It. Dolphins were often seen as a sign of protection. In order to create your account we need you to provide your email address. Search The Web Search The Web. In Japan, you can wear three keys in the hopes of unlocking health, wealth and love. Good luck charms around the world Video Top 10 Luckiest Symbols from Around the World Ba Gua Mirror, China Powerful feng shui: Google Knows a Lot More About You Than You Originally Thought. Putting a friendship bamboo plant on the east part of a room will improve your chi energy , according to Feng Shui. Egg, Ukraine Which came first, the chicken Kiev or the egg? T by Alexander Wang Short Sleeve Collared Dress Buy It. Embroidered Floral Pillow Buy It. In return, the cat sits at the front of the store to attract patrons and brings prosperity to the owner in thanks for their generosity. Culture How to NOT Get Caught Liking an Old Instagram Photo—And Other Social Faux Pas Tips. Culture Meet the Most Www.baden baden.de stadtplan Species on the Planet. The power and regality of a dragon passes onto you when in possession of a dragon statue or charm. The main way to unlock anything from a heart to find cafes nearby door, the key has been a good luck charm for longer than. Other ancient civilizations like 2000 gratis spiele used tumi knives casino roya brain surgery to treat mental disorders, headaches, or cranial artzspiele. If a woman has been recently married, the spots on the extra wild app of a ladybug landing on her hand are said to indicate how many children she will .
{ "pile_set_name": "Pile-CC" }
soundoff(334 Responses) Is it or me , or are you guys supporting a woman who can't even manage her own bills, and she is suppose to help America with it's problems????????????????????????????? And how did she raise this money so quickly, something is fishy! Tit for tat , silly season in America ,,,, You guys are straight wilding out, IDIOTS,,, VOTE for OBAMA OR MCCAIN and WAKE THE HELL UP, your future is at stake. April 24, 2008 02:35 pm at 2:35 pm | Hillary-ious Here's a bit of truth for those who are saying that "Obama is disenfranchising FL and MI voters". Obama is not disenfranchising anyone. Both of those states' legistlatures voted to not redo their primaries. Obama had nothing to do with that. I'm sure people would love to make him a scapegoat for their frustrations, especially since he is the man who is going to beat Hillary Clinton for this nomination, but get your facts straight. None of you can produce one bit of factual evidence that places the blame for FL and MI not revoting on Obama. April 24, 2008 02:36 pm at 2:36 pm | Pat Does Hillary really thinks she will get over 70% of the remaining votes or convince more than half of the super delegates to over turn the vote of the people. It is so unlikely that either of these things will happen it is really unkind to be giving her supporter false hope and asking them for money. April 24, 2008 02:36 pm at 2:36 pm | owl The one that lies will steal......watch out Obama .......We are all looking out for you . vote Obama '08 April 24, 2008 02:36 pm at 2:36 pm | JAX, Florida Clinton supporters don' understand they are only helping her pay her bills. She is in debt and she needs to raise money to pay her creditors and her office crews. It's not money that is going to be used to secure the nomination. April 24, 2008 02:37 pm at 2:37 pm | Jay $100 yesterday.. $100 tomorrow... My kids need someone who KNOWS what they are doing, now someone who HOPES they get it right and is ALL talk!! HILLARY 08!!! April 24, 2008 02:38 pm at 2:38 pm | Phil From VA Billary begging for cash. I can't take any more of this. Please quit. April 24, 2008 02:38 pm at 2:38 pm | Reid This is what is called good money following bad. Typical female behavior, similar to a spoiled child having a temper tantrum and refusing to face reality. Clinton supporters who claim that they will not vote for Obama or vote for McCain in November obviously use the same thoug ht process. Keep spending AND asking for money even though you have already lost and then yell that you are going to "take your vote and run home" if they don't get their way. How ironic that when Roe v. Wade is flushed down the toilet by a 6-3 or 7-2 extremely conservative Supreme Court these fools will be to blame. April 24, 2008 02:39 pm at 2:39 pm | Repentant I gave her so she can pay up the debts and peacefully exit the race without being in the red. But if she makes the mistake of acquiring more debts in a goose chase (Of course she cant win), she will have herself to blame; though not as if it matters much cause, just like Romney, she is sitting on hundreds of $million. April 24, 2008 02:39 pm at 2:39 pm | Eddie G Charlotte...get a clue. This is not about gender. It certainly would be a great time for the first woman or african american to be the president. But Hillary is none of what you described. She is a liar and a cheat that will stop at nothing to be that first woman president. She wants to twist and bend and change the rules. The women over 60 didn't teach that and I hope they don't condone that....so please, if it were a great woman, I would be first in line to vote. Clinton is not, so wait for the right one to come along. April 24, 2008 02:39 pm at 2:39 pm | jj Nasty nasty people, you talk about the money Clinton owes and wastes. Obama spent 3 or 4 times as much and still didn't gain any ground, if people knew in Feb what they know now, he wouldn't have the votes he has. He has the black vote and his supporters have divided the democrates and even more so the country with everything about race pushed down everyones throats. People don't vote for him because they don't trust him. there's a difference between exaggerating something and a continuous belief in racism. Obama and his wife have listened to Wright for 20 years and they are raising their daughters to be racists too. Obama supporters have divided this country and party more than anyone could imagine. They are the racists, they say if you don't vote for him you're a racist. Bull they just don't trust him because too little is known about him except his speeches and his MENTOR. we need to get past this or he will never stand a chance, even once he does get more experience. April 24, 2008 02:39 pm at 2:39 pm | Rick To Steve from California. Yes, campaign finances (contributions) should be limited. The answer is simple. Limit contributions to only those holding a valid Social Security number. No special interests, no PAC, no Unions, no Corporations, etc. US citizens only. But here's another $10 million going down the toilet that won't be available for the general election. April 24, 2008 02:40 pm at 2:40 pm | Leslie4Hillary I'm sorry to burst your bubble Obama supporters, I too, like the rest of you was an Obama supporter; I've contributed to his campaign. I was a precint captain for his caucus. The statement of Obama in that PRIVATE FUNDRAISING in San Francisco, made me turned sour against him. He used me as a tool to fulfill his grand ambition. I've overlook the fact he doesn't have any track record or experience to backup his words. I had high hopes on what he said, but it never dawn on me in private he called me a bigot, looking down on me. I've made amends for the most grieveous mistake that I've committed, I was one of the first time donors to Hillary Clinton campaign after the media announced she was the projected winner. I did not donate just once or twice, but 5 times and I will continue to donate more to her campaign. One thing I cannot stand and leaves a bitter taste in my mouth when a politician with ZERO credentials but wanted us to put faith in his words is to look down on me. April 24, 2008 02:40 pm at 2:40 pm | joyce listen older grannies buy groceries with your money hillary has plenty of her on and her campaighn is lost. when she breaks you, she will still be rich and you will be straving and she could care less about you. i know the clintons, see i am white = 65- and i live in arkansas and we don't want them back her. our state was corrupted enought by them already April 24, 2008 02:40 pm at 2:40 pm | ObamaFan Between Sideshow Bill and Hillary Jr., criss-crossing the country, and HRC's "momentum" BS, and weasel Terry McAuliffe's "new math", I HAVE HAD ENOUGH. I'm from PA, and I apologize we couldn't have ended this madness on Tuesday. To say that Obama can't carry the big states is riduculous. In the last 4 elections, the Dems have carried all the big states that Her Highness only thinks she can. Why are none of the media reporting that Obama was behind in PA by 20 POINTS six weeks ago, and winnowed down to 9? Why is HRC bemoaning the fact that the votes in Michigan should now count, when she, and the other potential nominees agreed that they wouldn't? Because she needs the votes in a contest she's LOSING!!! Enough of her and Bill, and their perceived notion that the they are ENTITLED to the Presidency. OBAMA 2008, 2012 April 24, 2008 02:40 pm at 2:40 pm | Toni Come on you guys.You like her,you really really like her.Stop fighting yourselves and admit the truth. I like and trust her, that is why I keep donating.By the way, I am a woman way under the age of sixty,Mother of two boys,happily married and college educated.And because I am "all that", I make my own decisions. I do not follow what media personalities, entertainers,biased media and anyone else who falls for the flavor of the season . April 24, 2008 02:41 pm at 2:41 pm | Lindsay I just made a donation! . . . To BARACK OBAMA. April 24, 2008 02:43 pm at 2:43 pm | Bobby He got thrashed in OH and PA because hard-nosed Blue-Collar voters can’t be won over with simple minded clichés and lofty speeches. His cronies made sure that MI and FL were not counted. Does anyone see those Democrats voting for him in the GE? 90% of African-Americans are Democrats. Therefore, in States where they are only 15-20% of the population, they suddenly become 30-40% of Democratic Primary Voters and won him S Carolina, Georgia, Miss., etc. They will again become 15-20% of General Election voters, and these States will remain Repub. He's won small White States with large no. of College Students, like Wisconsin and IA. Again, 12% of the pop. translates into a quarter of Primary voters, and will have little effect in the GE. He's done extremely well in Caucuses, which won't exist in the Fall, although I think he'd take IA. The MA, CT, RI and NY Primaries are unimportant, since those States are going to remain with Democrats and TX will similarly remain Repub. Therefore, Barrack in not elect able in the GE. QED April 24, 2008 02:43 pm at 2:43 pm | Steve Hillary's biggest misstep to this point is her failure to state the obvious – Obama is neither prepared nor qualified to be president. It may be against ettiquite to attack an opponent from your party that way, but it's honestly what's best for the country. April 24, 2008 02:43 pm at 2:43 pm | I could use 10 million To the very smart people who donated money to a campaign that is statistically over............I have a new cause I would like for you all to contribute to............my college tuition bills!!! It is a far better cause considering I will actually get my degree. You gave 10 million to a second place contestant!!!! And all she is doing is making sure the person who will be the democratic nominee less appealing even if by some stroke of luck it is her. We are going to be stuck with a crappy republican in office again. Gas will be $5 a gallon and I still will have to work two jobs to graduate from college and keep a roof over my head. So to the people who keep ebbing her on..............thanks for nothing!!! April 24, 2008 02:43 pm at 2:43 pm | DoneWithDems This is great news. Keep them cards and letters coming!! Operators standing by...... April 24, 2008 02:43 pm at 2:43 pm | LH, TX Obama do not debate with Hillary because the media will keep playing the games she likes to play and not discusss the issues. Keep having townhall meetings so the people will get to know who you really are because in Hillary's townhall meetings people will find out how dishonest she is and that she blows whichever way the wind blows. They are not fooling us with these debates and Hillary is not fooling us with her propaganda. God Bless Obama. OBAMA '08 April 24, 2008 02:45 pm at 2:45 pm | Sam I wanted to donate her. But there wasn't any option of dontaing 2 cents. April 24, 2008 02:45 pm at 2:45 pm | wolfsbane Deck stacked against her? Are you serious? She's a former first lady to a two term President, has name recognition, support of the establishment, her husband is a money making spigot with speaking fees, her huge cash advantage at the start.....why isn't she the frontrunner, with such a starting deck in her favor. Clinton supporters should be asking what happened, how did she fall behind and in debt, and what does this say about her leadership ability?
{ "pile_set_name": "Pile-CC" }
Actin conformation is drastically altered by direct interaction with membrane lipids: a differential scanning calorimetry study. One of the current dogmas in cytoskeleton research holds that actin filaments are attached to the cell membrane through integral membrane actin-binding proteins. We have challenged this concept, using an in vitro system composed of pure actin and liposomes, and have found that actin may also interact with membrane lipids. Differential scanning calorimetry (DSC) shows that when the actin molecule is in contact with such lipids, it undergoes a major conformational change which results in the complete disappearance of its phase transition. Conversely, DSC scans reveal that the phase transition of the membrane lipids is only weakly affected by the presence of actin. Indeed, the lipids' main transition shows only slight shifts in Tm, from 56.6 to 57 degrees C, and delta Hcal, from 10.1 to 8.8 kcal/mol. In the lipids' pretransition, Tp is shifted from 52.7 to 53.7 degrees C, and delta Hcal is shifted from 0.75 to 0.33 kcal/mol. This interaction between purified actin and membrane lipids is inhibited by high concentrations of KCl, thus indicating that the phenomenon is primarily electrostatic in nature. The ultrastructural consequences of this change in actin conformation were investigated by electron microscopy, which revealed the formation of paracrystalline arrays of actin filaments at the surface of the liposomes. We therefore propose a model in which a limited number of lipid molecules may interact with specific sites on the actin molecule, resulting in the protein's observed conformational change.
{ "pile_set_name": "PubMed Abstracts" }
It does our hearts good to see Japanese cars from the days before most of the weirdness got focus-grouped out of Nippon's automakers. That's why I was eager to head over to Vallejo for the Motoring J Style show on Saturday and check out what DSwig and his crew had put together this year. The unseasonable rain made life miserable for the drift guys, but it was good news for me- cloudy skies make for easy car photography. We'll be taking a closer look at a few of these cars later in the week, but for now let's get an overview of some vintage and not-so-vintage Japanese iron.
{ "pile_set_name": "Pile-CC" }
--- abstract: 'In this article we explicitly determine the structure of the Weierstrass semigroups $H(P)$ for any point $P$ of the Giulietti–Korchmáros curve $\cX$. We show that as the point varies, exactly three possibilities arise: One for the $\mathbb{F}_{q^2}$-rational points (already known in the literature), one for the $\mathbb{F}_{q^6} \setminus \mathbb{F}_{q^2}$-rational points, and one for all remaining points. As a result, we prove a conjecture concerning the structure of $H(P)$ in case $P$ is a $\mathbb{F}_{q^6} \setminus \mathbb{F}_{q^2}$-rational point. As a corollary we also obtain that the set of Weierstrass points of $\cX$ is exactly its set of $\mathbb{F}_{q^6}$-rational points.' author: - Peter Beelen and Maria Montanucci title: 'Weierstrass semigroups on the Giulietti–Korchmáros curve' --- [^1] [^2] Introduction ============ Let $\cC$ be a nonsingular, projective algebraic curve of genus $g$ defined over a field $\mathbb{F}$. Let $P$ be a rational point on $\cC$. The *Weierstrass semigroup* $H(P)$ is defined as the set of integers $k$ such that there exists a function on $\cC$ having pole divisor exactly $kP$. More generally $H(P)$ can be defined for any point $P$ on $\cC$ by considering $\cC$ as an algebraic curve over the algebraic closure of $\mathbb{F}$. It is clear that $H(P)$ is a subset of natural numbers $\mathbb{N}=\{0,1,2,\ldots\}$. The Weierstrass gap Theorem, see [@Sti Theorem 1.6.8], states that the set $G(P):= \mathbb{N} \setminus H(P)$ contains exactly $g$ elements, which are called *gaps*. The structure of $H(P)$ is not always the same for every point $P$ of $\cC$. However, it is known that for generically the semigroup $H(P)$ is the same, but there can exist finitely many points of $\cC$, called *Weierstrass points*, with a different gap set. These points are of intrinsic interest, for example in Stöhr–Voloch theory [@SV], but in case $\mathbb{F}=\mathbb{F}_q$, the finite field with $q$ elements, they also occur in the study of algebraic geometry (AG) codes [@TV1991]. In this context, a commonly studied class of curves are the so-called *maximal curves*, that is, algebraic curves defined over a finite field $\mathbb{F}_q$ having as many rational points as possible according to the Hasse–Weil bound. More precisely, an algebraic curve $\cC$ with genus $g(\cC)$ and defined over $\mathbb{F}_q$ is said to be an $\mathbb{F}_{q}$-maximal curve if it has $q+1+2g(\cC)\sqrt{q}$ points defined over $\mathbb{F}_q$. Clearly, this can only be the case if the cardinality $q$ of the finite field is a square. An important and well-studied example of an $\mathbb{F}_{q^2}$-maximal curve is given by the Hermitian curve $\mathcal{H}$. For fixed $q$, the curve $\mathcal{H}$ has the largest possible genus $g(\mathcal{H}) =q(q-1)/2$ that an $\mathbb{F}_{q^2}$-maximal curve can have. The Weierstrass points on $\mathcal H$ and the precise structure of the semigroups for $P$ on $\mathcal{H}$ are known; see [@GV]. By a result commonly attributed to Serre, see [@L1987 Proposition 6], any $\mathbb{F}_{q^2}$-rational curve which is covered by an $\mathbb{F}_{q^2}$-maximal curve is also $\mathbb{F}_{q^2}$-maximal. Most of the known maximal curves are subcovers of the Hermitian curve. The first known example of a maximal curve which is not a subcover of the Hermitian curve was constructed by Giulietti and Korchmáros; see [@GK]. This curve is an $\mathbb{F}_{q^6}$-maximal curve and commonly called the Giulietti–Korchmáros (GK) curve. The aim of this paper is to complete the description of the Weierstrass semigroups occurring for this curve. The Weierstrass semigroup for any $\mathbb{F}_{q^2}$-rational point of $\cX$ was computed in [@GK], but the structure of the Weierstrass semigroup $H(P)$ where $P \not\in \cX(\mathbb{F}_{q^2})$ is not known, except for $q \le 9$, [@FG2010; @D2011]. Based on the available data for small $q$, a conjecture concerning the structure of $H(P)$ was stated in [@D2011] for $P \in \cX(\mathbb{F}_{q^6}) \setminus \cX(\mathbb{F}_{q^2})$. For $P \not\in \cX({\mathbb {F}_{q^6}})$ nothing specific is known about $H(P).$ In this article we determine settle the conjecture from [@D2011] and also determine the structure of the generic semigroup for $P$ on $\cX$. More precisely, we show the following theorem. \[mainth\] Let $q$ be a prime power and let $P$ be a point of the Giulietti–Korchmáros curve $\cX$. The Weierstrass semigroup $H(P)$ is given by - $H(P)=\langle q^3 -q^2 +q, q^3, q^3 + 1 \rangle,$  if $P \in \cX(\mathbb{F}_{q^2})$; - $H(P)=\langle q^3-q+1,q^3+1,q^3+i(q^4-q^3-q^2+q-1) \mid i=0,\ldots,q-1\rangle,$  if $P \in \cX(\mathbb{F}_{q^6}) \setminus \cX(\mathbb{F}_{q^2})$; - $H(P)=\mathbb{N} \setminus G,$  if $P \not\in \cX(\mathbb{F}_{q^6})$, where $$G=\left\{iq^3+kq+m(q^2+1)+\sum_{s=1}^{q-2} n_s ((s+1)q^2)+j+1 \mid i,j,k,m,n_1,\ldots,n_{q-2} \in \mathbb{Z}_{\geq0}, \ j \le q-1 \ \makebox{and}\right.$$ $$\left.i+j+k+mq+\sum_{s=1}^{q-2} n_s ((s+1)q-s) \leq q^2-2\right\}.$$ As mentioned above, the case $P \in \cX(\mathbb{F}_{q^2})$ is already known and taken from [@GK]. As a bonus, we will also obtain the set of Weierstrass points of $\cX$. \[mainth2\] Let $W$ denote the set of Weierstrass points of the Giulietti–Korchmáros curve $\cX$. Then $W=\cX(\mathbb{F}_{q^6})$. The paper is organized as follows: In the next section we give the necessary background on the GK curve as well as some results on Weierstrass semigroups and their gaps that we will need later. In section three, we settle the conjecture from [@D2011] concerning $H(P)$ for $P \in \cX(\mathbb{F}_{q^6}) \setminus \cX(\mathbb{F}_{q^2})$, while in section four, we compute the Weierstrass semigroup for $P \not \in \cX(\mathbb{F}_{q^6})$. We finish with some concluding remarks and observations. The Giulietti–Korchmáros curve {#sec2} ============================== Let $q$ be a prime power and $\K=\overline{\mathbb{F}}_q$. The Giulietti–Korchmáros (GK) curve $\cX$ is a non-singular curve in ${\rm PG}(3,\K)$ defined by the affine equations $$\label{eq:GK} \cX: \left\{ \begin{array}{l} Y^{q+1}=X^q+X,\\ Z^{q^2-q+1}=Y^{q^2}-Y.\\ \end{array} \right.$$ This curve has genus $g(\cX)=(q^5-2q^3+q^2)/2$ and $q^8-q^6+q^5+1$ $\mathbb{F}_{q^6}$-rational points. The curve $\cX$ has been introduced in [@GK], where it was proved that $\cX$ is maximal over ${\mathbb {F}_{q^6}}$, that is, the number $|\cX({\mathbb {F}_{q^6}})|$ of ${\mathbb {F}_{q^6}}$-rational points of $\cX$ equals $q^6+1+2gq^3$. Also, for $q>2$, the curve $\cX$ is not ${\mathbb {F}_{q^6}}$-covered by the Hermitian curve maximal over ${\mathbb {F}_{q^6}}$; $\cX$ was the first maximal curve shown to have this property. Note that equation implies that $\cX$ is a cover of the Hermitian curve over ${\mathbb {F}_{q^2}}$ given by the affine equation $Y^{q+1}=X^q+X$. We will denote this curve by $\cH$. The automorphism group ${\rm Aut}(\cX)$ of $\cX$ is defined over ${\mathbb {F}_{q^6}}$ and has order $q^3(q^3+1)(q^2-1)(q^2-q+1)$. Moreover, it has a normal subgroup isomorphic to ${\rm SU(3,q)}$, the automorphism group of the Hermitian curve $\cH$. The set $\cX({\mathbb {F}_{q^6}})$ of the $\mathbb{F}_{q^6}$-rational points of $\cX$ splits into two orbits under the action of ${\rm Aut}(\cX)$: one orbit $\mathcal O_1=\cX({\mathbb {F}_{q^2}})$ of size $q^3+1$, which coincides with the intersection between $\cX$ and the plane $Z=0$; and another orbit $\mathcal O_2=\cX({\mathbb {F}_{q^6}})\setminus\cX({\mathbb {F}_{q^2}})$ of size $q^3(q^3+1)(q^2-1)$; see [@GK Theorem 7]. The orbits $\mathcal O_1$ and $\mathcal O_2$ are the short orbits of ${\rm Aut}(\cX)$, that is, the unique orbits of points of $\cX$ having a non-trivial stabilizer in ${\rm Aut}(\cX)$. Let $x,y,z\in \K(\cX)$ be the coordinate functions of the function field of $\cX$, which satisfy $y^{q+1}=x^q+x$ and $z^{q^2-q+1}=y^{q^2}-y$. Then we denote by $P_{(a,b,c)}$ the affine point of $\cX$ with coordinates $(a,b,c)$ and by $P_\infty$ the unique point at infinity. Similarly, we denote by $Q_{(a,b)}$ the affine point of the Hermitian curve $\cH$ with coordinates $(a,b)$ and by $Q_\infty$ its unique point at infinity. The Weierstrass semigroup at $P_\infty$, and hence at every $\mathbb{F}_{q^2}$-rational point of $\cX$ (since they lie in the same short orbit $\mathcal O_1$ of ${\rm Aut}(\cX)$) was computed in [@GK]. [[@GK Proposition 6.2]]{} The Weierstrass semigroup of $\cX$ at $P_\infty$ is generated by $q^3 -q^2 +q$, $q^3$, $q^3 + 1$. Before describing what is known about $H(P)$ for $P \not \in \cX({\mathbb {F}_{q^2}})$, we introduce several functions on $\cX$ and give their divisors. Some of these functions can be interpreted as functions on $\cH$ as well and therefore have a divisor on $\cH$. To differentiate, we will write $(f)_\cH$ (resp. $(f)_\cX$) for divisors on the Hermitian curve $\cH$ (resp. the GK curve $\cX$). Given a point $P=P_{(a,b,c)}$ on $\cX$, we define the functions $$\label{tilda} \tilde{x}_{P}=-a^q-x+b^qy, \quad \tilde{y}_P=y-b, \quad \tilde{z}_P=-a^{q^3}-x+b^{q^3}y+c^{q^3}z.$$ Then it is not hard to show the following. $$\begin{aligned} (\tilde{x}_{P})_\cX &=q\sum_{\xi^{q^2-q+1}=1}P_{(a,b,\xi c)}+\sum_{\xi^{q^2-q+1}=1}P_{(a^{q^2},b^{q^2},\xi c^{q^2})}-(q^3+1)P_{\infty},\label{eq:divxpX}\\ (\tilde{y}_{P})_\cX & =\sum_{s^q+s=0, \ \xi^{q^2-q+1}=1} P_{(a+s,b,\xi c)}-(q^3-q^2+q)P_\infty,\label{eq:divypX}\\ (\tilde{z}_{P})_\cX & =q^3 P_{(a,b,c)}+{P_{(a^{q^6},b^{q^6},c^{q^6})}}-(q^3+1)P_\infty,\label{eq:divzpX}\\ (z)_\cX & =\sum_{P\in\cX({\mathbb {F}_{q^2}}),P\ne P_\infty} P \, - \, q^3P_{\infty}.\label{eq:divz}\end{aligned}$$ Now let $P=P_{(a,b,c)}$ be a fixed $\mathbb{F}_{q^6}$-rational point of $\cX$ which is not $\mathbb{F}_{q^2}$-rational (implying $c \neq 0$). In this case equation implies: $$\label{eq:divzpX6} (\tilde{z}_{P})_\cX=(q^3+1)(P-P_\infty) \ \makebox{for} \ P=P_{(a,b,c)} \in \cX({\mathbb {F}_{q^6}}).$$ The Weierstrass semigroup $H(P)$ is only completely known in finitely many cases if $P\in \cX({\mathbb {F}_{q^6}})\setminus \cX({\mathbb {F}_{q^2}})$. It was computed for $q=2$ and $q=3$ in [@FG2010] and for $4 \le q \le 9$ in [@D2011]. Also in [@D2011], the following partial information was obtained for general $q$: Equations , and imply that the functions $1/\tilde z_P, \tilde y_P / \tilde z_P, \tilde x_P / \tilde z_P$ have poles only in $P$ of orders $q^3+1$, $q^3$ and $q^3-q+1$ respectively. Hence $$\label{eq:somepoles} \langle q^3-q+1,q^3,q^3+1\rangle \subseteq H(P) \ \makebox{for} \ P \in \cX({\mathbb {F}_{q^6}}) \setminus \cX({\mathbb {F}_{q^2}}).$$ Based on this and the results for $q \le 9$, the following conjecture was stated in [@D2011], which we will prove in the next section. \[conjD\] The Weierstrass semigroup $H(P)$ of $\cX$ at $P \in \cX(\mathbb{F}_{q^6}) \setminus \cX(\mathbb{F}_{q^2})$ is given by $$H(P)=\langle q^3-q+1,q^3+1,q^3+i(q^4-q^3-q^2+q-1) \mid i=0,\ldots,q-1\rangle.$$ Finally, for $P \not \in \cX({\mathbb {F}_{q^6}})$ nothing specific is known about the structure of semigroup $H(P)$. We will completely determine its gap structure, but for now, we finish this section by stating some facts that we will use to achieve this. We start with the following well-known lemma connecting regular differentials (i.e., differential forms having no poles anywhere on $\cX$) and gaps of $H(P)$. [[@VS Corollary 14.2.5]]{}\[prop:holom\] Let $\cX$ be an algebraic curve of genus $g$ defined over $\K$. Let $P$ be a point of $\cX$ and $\omega$ be a regular differential on $\cX$. Then $v_P(\omega)+1$ is a gap at $P$. This proposition has the following, for us very useful, consequence. \[holom\] For any point $P$ on the GK curve $\cX$ distinct from $P_\infty$ and for any $f \in L((2g(\cX)-2)P_\infty),$ we have $v_P(f)+1 \in \mathbb{N} \backslash H(P).$ First note that $(dy)_\cH=(q^2-q-2)Q_\infty$. The set of points that ramify in the covering of $\cX$ by $\cH$ is exactly $\cH({\mathbb {F}_{q^2}})$, the set of ${\mathbb {F}_{q^2}}$-rational points of the Hermitian curve, all with ramification index $q^2-q+1$. Moreover, the points of $\cX$ above $\cH({\mathbb {F}_{q^2}})$ are precisely the ${\mathbb {F}_{q^2}}$-rational points of $\cX$. Therefore, we immediately obtain that $$(dy)_\cX=(q^4-2q^3+q^2-2)P_\infty+(q^2-q)\sum_{P\in\cX({\mathbb {F}_{q^2}}),P\ne P_\infty} P.$$ Thus, from $z^{q^2-q+1}=y^{q^2}-y$ and equation , $$(dz)_\cX=(-dy/z^{q^2-q})_\cX=(q^5-2q^3+q^2-2)P_\infty.$$ In particular a differential $fdz$ is regular if and only if $f \in L((q^5-2q^3+q^2-2)P_\infty)=L((2g(\cX)-2)P_\infty)$. The corollary now follows by applying Proposition \[prop:holom\]. The Weierstrass semigroup $H(P)$ for $P \in \cX(\mathbb{F}_{q^6}) \setminus \cX(\mathbb{F}_{q^2})$ ================================================================================================== This section is devoted to the proof of Conjecture \[conjD\] for any prime power $q$. In particular in this section $P=P_{(a,b,c)}$ will always denote a point in $\cX(\mathbb{F}_{q^6}) \setminus \cX(\mathbb{F}_{q^2})$. Further we define the semigroup $$T:=\langle q^3-q+1,q^3+1, q^3+i(q^4-q^3-q^2+q-1) \mid i=0,\ldots,q-1\rangle.$$ Conjecture \[conjD\] then simply states that $H(P)=T$. Our proof of the conjecture consists of two main steps. In the first step, we will show that $T \subset H(P)$ by showing that the generators of $T$ are in $H(P)$. In the second step, we show that the number of gaps of the semigroup $T$ (also known as the genus of $T$) is exactly equal to the genus of $\cX$. Once this has been established, the equality $H(P)=T$ will follow immediately, proving Conjecture $\ref{conjD}$. $T \subset H(P)$ ---------------- As before we use the function $\tilde x_P$ defined in equation and its divisor in equation . Moreover, for $k \in \mathbb{Z}$, we define the $k$-th Frobenius twist of $\tilde x_P$ as the follows: $$\label{eq:FrobxP} \tilde x_P^{(k)}:=-a^{q^{2k+1}}-x+b^{q^{2k+1}}y \ \makebox{for} \ P=P_{(a,b,c)}.$$ Since we assume that $P \in \cX(\mathbb{F}_{q^6}) \setminus \cX(\mathbb{F}_{q^2}),$ equation implies that $$\begin{aligned} \label{eq:divFrobxP} (\tilde x_P^{(1)})_{\cX} & =q\sum_{\xi^{q^2-q+1}=1}P_{(a^{q^2},b^{q^2},\xi c^{q^2})}+\sum_{\xi^{q^2-q+1}=1}P_{(a^{q^4},b^{q^4},\xi c^{q^4})}-(q^3+1)P_{\infty},\notag\\ (\tilde x_P^{(2)})_{\cX} & =q\sum_{\xi^{q^2-q+1}=1}P_{(a^{q^4},b^{q^4},\xi c^{q^4})}+\sum_{\xi^{q^2-q+1}=1}P_{(a,b,\xi c)}-(q^3+1)P_{\infty}.\end{aligned}$$ \[functions\] Let $P=P_{(a,b,c)} \in \cX(\mathbb{F}_{q^6}) \setminus \cX(\mathbb{F}_{q^2})$ and let $\tilde f_i=f_i / \tilde z_P^{iq-i+1}$ where $$f_i:=\frac{(\tilde x_P)^{qi} \cdot \tilde x_P^{(2)}}{(\tilde x_P^{(1)})^{i}}, \ \makebox{for} \ i=1,\dots,q-1.$$ Then $(\tilde f_i)_{\infty}=(q^3+i(q^4-q^3-q^2+q-1))P$ and in particular $q^3+i(q^4-q^3-q^2+q-1) \in H(P)$ for $i=1,\ldots,q-1$. Using equations and , we directly obtain that $$(f_i)_{\cX}=(iq^2+1)\sum_{\xi^{q^2-q+1}=1}P_{(a,b,\xi c)}+(q-i)\sum_{\xi^{q^2-q+1}=1}P_{(a^{q^4},b^{q^4},\xi c^{q^4})}-(q^3+1)(iq-i+1)P_\infty.$$ Now using the divisor of $\tilde z_P$ given in equation , we find that $$(\tilde f_i)_{\cX}=-(q^3+i(q^4-q^3-q^2+q-1))P+(iq^2+1)\sum_{\substack{\xi^{q^2-q+1}=1, \\ \xi \neq 1}}P_{(a,b,\xi c)}+(q-i)\sum_{\xi^{q^2-q+1}=1}P_{(a^{q^4},b^{q^4},\xi c^{q^4})}.$$ The lemma now follows. Note that the lemma is also true for $i=0$. Considering the corresponding function $\tilde f_0=\tilde x_P^{(2)}/\tilde z_P$, gives a way to show that $q^3 \in H(P)$. However, this is already known, see equation . \[prop:contained\] Let $P \in \cX(\mathbb{F}_{q^6}) \setminus \cX(\mathbb{F}_{q^2})$. Then $T\subset H(P).$ Equation and Lemma \[functions\] imply that $\{ q^3-q+1,q^3+1, q^3+i(q^4-q^3-q^2+q-1) \mid i=0,\ldots,q-1\} \subset H(P)$. Since by definition these numbers generate $T$, the proposition follows. The genus of the numerical semigroup $T$ equals $g(\cX)$ -------------------------------------------------------- We now show that the genus $g(T)$ of the numerical semigroup $T=\langle q^3-q+1,q^3+1,q^3+i(q^4-q^3-q^2+q-1) \mid i=0,\ldots,q-1\rangle$ is equal to $g(\cX)=(q^5-2q^3+q^2)/2$. In this way, since we already know that $T \subseteq H(P_{(a,b,c)})$ from Proposition \[prop:contained\], Conjecture \[conjD\] will be completely proved. We recall that a numerical semigroup is called *telescopic* if it is generated by a telescopic sequence, that is by a sequence $(a_1,\ldots,a_k)$ such that - $\gcd(a_1, \ldots , a_k)=1$; - for each $i=2,\ldots,k$, $a_i/d_i \in \langle a_1/d_{i-1},\ldots, a_{i-1}/d_{i-1}\rangle$, where $d_i=\gcd(a_1,\ldots,a_i)$ and $d_0=0$; see [@KP1995]. From [@HVP1998 Proposition 5.35], the genus of a semigroup $\Gamma$ generated by a telescopic sequence $(a_1,\ldots,a_k)$ is $$\label{gentelescopic} g(\Gamma)=\frac{1}{2} \bigg( 1+ \sum_{i=1}^k \bigg( \frac{d_{i-1}}{d_i}-1\bigg) a_i \bigg).$$ For the semigroup $S$ defined by $S:=\langle q^3-q+1,q^3+1\rangle$ we obtain the following: \[genusS\] The numerical semigroup $S=\langle q^3-q+1,q^3+1\rangle$ is telescopic. Its genus $g(S)$ is given by $$g(S)=\frac{q^3(q^3-q)}{2}.$$ Let $a_1=q^3-q+1$ and $a_2=q^3+1$. Then $gcd(a_1,a_2)=1$ and, using the same notation as above, $d_1=a_1$ and $d_2=1$. Since $a_2/d_2 \in \langle 1 \rangle= \langle a_1/d_1 \rangle$, $S$ is telescopic. Thus from equation , $$g(S)=\frac{1}{2} \bigg( 1-a_1+(a_1-1)a_2 \bigg)=\frac{q^3(q^3-q)}{2}.$$ Now the idea is to compute the number of gaps of $T$ by identifying the elements of $T$ that are gaps of $S$. The following observation is trivial, but will be very useful. \[obs:representationab\] For any integer $n$, there exist unique integers $a$ and $b$ such that $n=a(q^3-q+1)+b(q^3+1)$ and $0 \le b \le q^3-q.$ An integer $n$ is an element of the semigroup $S=\langle q^3-q+1,q^3+1\rangle$ if and only if there exist integers $a$ and $b$ such that $n=a(q^3-q+1)+b(q^3+1)$, $a \ge 0$ and $0 \le b \le q^3-q.$ In the following lemma, we identify several elements of $T \setminus S$ that turn out to play an important role. \[lem:sij\] For any $i=0,\ldots,q-1$ and $j=1,\ldots,q-1$, define the set $$S_{i,j}:=\{(iq-jq^2+k_1)(q^3-q+1)+(jq^2-i+k_2)(q^3+1) \mid k_1=0,\ldots,q-1, \ k_2=0,\ldots,q^3-q-jq^2+i\}.$$ Then we have: 1. $S_{i,j} \subset T \setminus S.$ 2. $S_{i,j} \cap S_{i'j'} = \emptyset$ if $(i',j') \neq (i,j)$, $0 \le i' \le q-1$ and $1 \le j' \le q-1.$ 3. $|S_{i,j}|=q(q^3-q-jq^2+i+1).$ First of all note that $$jq^3+i(q^4-q^3-q^2+q-1)=(-jq^2+iq)(q^3-q+1)+(jq^2-i)(q^3+1).$$ Using this, it is clear from Proposition \[prop:contained\], that $(iq-jq^2+k_1)(q^3-q+1)+(jq^2-i+k_2)(q^3+1) \in T$ for any $i,j,k_1,k_2$ in the given range. To show that these elements are not in $S$, observe that $$\label{eq:ijk} iq-jq^2+k_1 \le (q-1)q-q^2+q-1<0 \ \makebox{and} \ 0 \le jq^2-i+k_2 \le q^3-q.$$ Observation \[obs:representationab\] now implies that $(iq-jq^2+k_1)(q^3-q+1)+(jq^2-i+k_2)(q^3+1) \not \in S.$ This completes the proof of the first item. Now suppose that $S_{i,j} \cap S_{i'j'} \neq \emptyset$. Then there exist integers $k_1,k_1',k_2,k_2'$ satisfying the defining requirements of $S_{i,j}$ and $S_{i'j'}$ such that $$(iq-jq^2+k_1)(q^3-q+1)+(jq^2-i+k_2)(q^3+1)=(i'q-j'q^2+k'_1)(q^3-q+1)+(j'q^2-i'+k'_2)(q^3+1).$$ As above, we have equation as well as the similar equation $$i'q-j'q^2+k'_1 <0 \ \makebox{and} \ 0 \le j'q^2-i'+k'_2 \le q^3-q.$$ Observation \[obs:representationab\] therefore implies that $$iq-jq^2+k_1=i'q-j'q^2+k'_1 \ \makebox{and} \ jq^2-i+k_2=j'q^2-i'+k'_2,$$ and in particular $(i-i')q-(j-j')q^2+(k_1-k_1')=0.$ Considering this equation modulo $q$ and modulo $q^2$, we see that $k_1=k_1'$ and $i=i'$, implying that $j=j'$ as well. Then it is also clear that $k_2=k_2'$. This implies the second item. As for the third item: if $$(iq-jq^2+k_1)(q^3-q+1)+(jq^2-i+k_2)(q^3+1)=(iq-jq^2+k'_1)(q^3-q+1)+(jq^2-i+k'_2)(q^3+1),$$ with integers $k_1,k_1',k_2,k_2'$ satisfying the defining requirements of $S_{i,j}$, then the same reasoning as in above proof of the second item, shows that $k_1=k_1'$ and $k_2=k_2'$. Hence the cardinality of $S_{i,j}$ is simply the number of possibilities for $k_1$ times that for $k_2$. Picture \[fig1\] describes the sets $S_{i,j}$ for $q=3$. In this picture a point of coordinates $(a,b)$ is used to represent the element $a(q^3-q+1)+b(q^3+1)$. Black dots represent elements of the numerical semigroup $S$, while white dots represent the elements contained in $S_{i,j}$ for some $i$ and $j$. \[fig1\] (-2.8,0)–(3,0) node \[right\] [$a$]{}; (0,0)–(0,2.7) node \[above\] [$b$]{}; (-2.8,2.4)–(3,2.4) node \[right\] [$24$]{}; (0,0)–(-2.8,2.4); in [0,0.1,...,2.8]{} in [0,0.1,...,2.5]{} at (,) ; at (-0.3,0.7) ; at (-0.9,0.9) ; at (-0.6,0.8) ; at (-1.2,1.6) ; at (-1.5,1.7) ; at (-1.8,1.8) ; (1.3,2.5) –(1.3,2.5) node \[above, right\][$S$]{}; (-0.3,0.7)–(-0.3,2.5) node \[above, right\][$S_{2,1}$]{}; (-0.9,0.9) –(-0.9,2.5) node \[above, right\][$S_{0,1}$]{}; (-0.6,0.8) –(-0.6,2.5) node \[above, right\][$S_{1,1}$]{}; (-1.2,1.6) –(-1.2,2.5) node \[above, right\][$S_{2,2}$]{}; (-1.5,1.7) –(-1.5,2.5) node \[above, right\][$S_{1,2}$]{}; (-1.8,1.8) –(-1.8,2.5) node \[above, right\][$S_{0,2}$]{}; (-0.3,0.7)–(0,0.7); (-0.9,0.9) –(-0.6,0.9); (-0.6,0.8) –(-0.3,0.8); (-1.2,1.6) –(-0.9,1.6); (-1.5,1.7) –(-1.2,1.7); (-1.8,1.8) –(-1.5,1.8); (-2.8,2.4) –(-2.8,0) node \[below\] [ ]{}; in [-0.1,-0.2,-0.3]{} in [0.7,0.8,...,2.5]{} at (,) ; in [-0.4,-0.5,-0.6]{} in [0.8,0.9,...,2.4]{} at (,) ; in [-0.7,-0.8,-0.9]{} in [0.9,1,...,2.5]{} at (,) ; in [-1,-1.1,-1.2]{} in [1.6,1.7,...,2.4]{} at (,) ; in [-1.3,-1.4,-1.5]{} in [1.7,1.8,...,2.5]{} at (,) ; in [-1.6,-1.7,-1.8]{} in [1.8,1.9,...,2.4]{} at (,) ; (-0.3,0.7) –(-0.3,0) node \[below\] [ ]{}; (-0.6,0.8) –(-0.6,0) node \[below\] [ ]{}; (-0.9,0.9) –(-0.9,0) node \[below\] [ ]{}; (-1.2,1.6) –(-1.2,0) node \[below\] [ ]{}; (-1.5,1.7) –(-1.5,0) node \[below\] [ ]{}; (-1.8,1.8) –(-1.8,0) node \[below\] [ ]{}; (-0.3,0.7) –(-2.8,0.7) node \[left\] ; (-0.6,0.8) –(-2.8,0.8); (-0.9,0.9) –(-2.8,0.9) node \[left\] [ ]{}; (-1.2,1.6) –(-2.8,1.6) node \[left\] [ ]{}; (-1.5,1.7) –(-2.8,1.7); (-1.8,1.8) –(-2.8,1.8) node \[left\] [ ]{}; --------- ----------------------- -- ----------------- $\circ$ Elements in $S_{i,j}$ Elements in $S$ --------- ----------------------- -- ----------------- We are now ready to prove Conjecture \[conjD\]. We have $g(T)=g(\cX)$ and in particular $H(P)=T.$ Proposition \[prop:contained\] implies that $g(T) \ge g(\cX)$. Hence the theorem follows once we show that $g(T) \le g(\cX)$. However, using the first two items of Lemma \[lem:sij\], we see that $$g(T) \le g(S)-\sum_{i=0}^{q-1}\sum_{j=1}^{q-1}|S_{i,j}|.$$ Using Lemma \[genusS\] and item three of Lemma \[lem:sij\] we obtain $$\begin{aligned} g(T) &\leq \frac{q^6-q^4}{2} -\sum_{i=0}^{q-1} \sum_{j=1}^{q-1} q(q^3-q+1-jq^2+i)\\ &= \frac{q^6-q^4}{2} -\sum_{i=0}^{q-1} \sum_{j=1}^{q-1} q(q^3-q+1) +\sum_{i=0}^{q-1} \sum_{j=1}^{q-1}jq^3-\sum_{i=0}^{q-1} \sum_{j=1}^{q-1}iq\\ &= \frac{q^6-q^4}{2}-q^2(q-1)(q^3-q+1)+\frac{q^5(q-1)}{2}-\frac{q^2(q-1)^2}{2}=\frac{q^5-2q^3+q^2}{2}=g(\cX).\end{aligned}$$ A direct consequence of the above theorem is that $H(P)=\left(\bigcup_{i,j}S_{i,j} \right) \cup S$. It is not hard to obtain more information about $H(P)$ from the above calculations. For example, it is clear that the multiplicity of $H(P)$ (i.e., the smallest positive element in $H(P)$) is equal to $q^3-q+1$, while its conductor (i.e., the largest gap) is $2g(\cX)-1$. This means in particular that like $H(P_\infty)$, the semigroup $H(P)$ is symmetric. Since $H(P_\infty)$ has multiplicity $q^3-q^2+q$, we also see that $H(P) \neq H(P_\infty).$ The Weierstrass semigroup $H(P)$ for $P \not\in \cX(\mathbb{F}_{q^6})$ ====================================================================== In this section we determine the Weierstrass semigroup $H(P)$ for $P \not\in \cX(\mathbb{F}_{q^6})$. In particular in this section $P=P_{(a,b,c)}$ will always denote a point on $\cX$ not in $\cX(\mathbb{F}_{q^6})$. For future reference, note that as in the previous section, this means that $c \neq 0$. As we will see, the semigroup $H(P)$ is the same for all $P \not\in \cX(\mathbb{F}_{q^6})$ and hence the ‘generic’ semigroup for a point on $\cX$. Our approach is use Corollary \[holom\] to construct gaps of $H(P)$ by computing the valuation at $P$ of functions $f \in L((2g(\cX)-2)P_\infty).$ It is very easy to find a basis of the Riemann–Roch space $L((2g(\cX)-2)P_\infty)$. For example the functions $x^iy^jz^k$ where $i \ge 0$, $0 \le j \le q$, $0 \le k \le q^2+q$ and $i(q^3+1)+j(q^3-q^2+q)+kq^3\le 2g(\cX)-2$ form a basis. However, this does not settle the matter, since these basis elements all will have valuation $0$ at $P$. Therefore an effort must be made to construct functions in $L((2g(\cX)-2)P_\infty)$ having distinct valuations at $P$. In the next subsection, we construct functions with various valuations at $P$. After that we will combine these functions and obtain a set $G$ of several explicitly described gaps of $H(P)$ using Corollary \[holom\]. The remainder of the section will then be a somewhat lengthy calculation showing that the set $G$ in fact contains $g(\cX)$, and hence all, gaps of $H(P)$. Construction of functions. -------------------------- We start by constructing a function $g_1$ with small, but positive, valuation at $P=P_{(a,b,c)}$. It will be convenient to define $\beta=b^{q^2}-b$. Note that $b^{q^2}-b=c^{q^2-q+1} \neq 0$, since $P \not \in \cX({\mathbb {F}_{q^6}})$ (and therefore a fortiori $P \not \in \cX({\mathbb {F}_{q^2}})$). We define $$g_1:=(\beta^{q^2-1}-1)\tilde x_P^q+\beta^{q^2+q}+\beta^{q}\left((\tilde y_P-\beta)(\tilde x_P+\beta^q(\tilde y_P-\beta))^{q-1}\right).$$ The functions $\tilde x_P$ and $\tilde y_P$ are as in equation . This definition may seen ad hoc, but it arises naturally when constructing functions of low pole order at $P_\infty$ and large vanishing order at $P$. More precisely, we have the following lemma. \[lem:g1\] The function $g_1$ is an element of $L((2g(\cX)-2)P_\infty)$. Moreover $v_{P_\infty}(g_1)\ge-q(q^3+1)$ and $v_P(g_1)=q^2+1$. It is clear that $g_1$ only can have a pole at $P_\infty$. Moreover, from equations and imply that $\tilde x_P$ (resp. $\tilde y_P$) has a pole at $P_\infty$ of order $q^3+1$ (resp. $q^3-q^2+q$). Therefore, the triangle inequality implies that $v_{P_\infty}(g_1) \ge v_{P_\infty}(\tilde x_P^q)=-q(q^3+1),$ which is what we want to show. From equation , we see that the function $\tilde y_P$ is a local parameter for the point $P=P_{(a,b,c)}$. The defining equation for $\mathcal H_q$ directly implies that $\tilde x_P^q+\tilde x_P=\beta \tilde y_P^q-\tilde y_P^{q+1}$. Hence we easily can obtain the power series development of $\tilde x_P$ in terms of $\tilde y_P$. More precisely, we obtain that $$\begin{aligned} \label{eq:powerx} \tilde x_P & = \beta \tilde y_P^q-\tilde y_P^{q+1}-\tilde x_P^q=\beta \tilde y_P^q-\tilde y_P^{q+1}-\beta^q \tilde y_P^{q^2}+\tilde y_P^{q^2+q}+\cdots \notag\\ & = (\tilde y_P-\beta)(-\tilde y_P^q+(\tilde y_P-\beta)^{q-1}\tilde y_P^{q^2})+\cdots\end{aligned}$$ Using this, we also obtain that $$\begin{aligned} \label{eq:powerw} (\tilde y_P-\beta)\left(\tilde x_P+\beta^q(\tilde y_P-\beta)\right)^{q-1}&=(\tilde y_P-\beta)\left((\tilde y_P-\beta)(-\tilde y_P^q+(\tilde y_P-\beta)^{q-1}\tilde y_P^{q^2}) + \beta^q(\tilde y_P-\beta) \right)^{q-1}+\cdots\notag\\ & = (\tilde y_P-\beta)^q\left( -(\tilde y_P-\beta)^q+(\tilde y_P-\beta)^{q-1}\tilde y_P^{q^2}\right)^{q-1}+\cdots\notag\\ &=(\tilde y_P-\beta)^{q^2-q+1}\left( -(\tilde y_P-\beta)+\tilde y_P^{q^2}\right)^{q-1}+\cdots\notag\\ &=(\tilde y_P-\beta)^{q^2}-(\tilde y_P-\beta)^{q^2-1}\tilde y_P^{q^2}+\cdots\notag\\ &=-\beta^{q^2}+(1-\beta^{q^2-1})\tilde y_P^{q^2}+\beta^{q^2-2}\tilde y_P^{q^2+1}+\cdots.\end{aligned}$$ Combining equations and , we see that $$\begin{aligned} g_1&=(\beta^{q^2-1}-1)\beta^q \tilde y_P^{q^2}+\beta^{q^2+q}+\beta^q(-\beta^{q^2}+(1-\beta^{q^2-1})\tilde y_P^{q^2}+\beta^{q^2-2}\tilde y_P^{q^2+1}) + \cdots\\ &=\beta^{q^2+q-2}\tilde y_P^{q^2+1}+\cdots\end{aligned}$$ This implies that $v_P(g_1)=q^2+1$, which is what we wanted to show. The next functions are inspired by the previous section in the sense that we again use the functions $\tilde x_P^{(k)}$ introduced in equation , but now for $P=P_{(a,b,c)} \not\in \cX({\mathbb {F}_{q^6}})$. For $s=1,\ldots,q-2$ we define $$h_s:=\left( \frac{\tilde x_P^q}{\tilde x_P^{(1)}} \right)^{s+1} \cdot \tilde x_P^{(2)}.$$ We have the following lemma about these functions. \[lem:hs\] Let $s=1,\dots,q-2$. The function $h_s$ is an element of $L((2g(\cX)-2)P_\infty)$. Moreover $v_{P_\infty}(h_s)=-(q(s+1)-s)(q^3+1)$ and $v_P(h_s)=(s+1)q^2$. Using equations and , we see that $v_{P_\infty}(h_s)=-(q(s+1)-s)(q^3+1)$ and that $h_s$ has no other poles. Further it is well known that $\mathcal H_q({\mathbb {F}_{q^2}})=\mathcal H_q(\mathbb{F}_{q^4}).$ Since any point in $\mathcal H_q({\mathbb {F}_{q^2}})$ ramifies totally in the cover $\cX \to \cH$, this means that also $\mathcal \cX({\mathbb {F}_{q^2}})=\mathcal \cX(\mathbb{F}_{q^4}).$ Therefore $v_P(\tilde x_P^{(2)})=0$, since $P \not \in \cX({\mathbb {F}_{q^6}})$. This implies that $$v_P(h_s)=(s+1)\left(qv_P(\tilde x_P)-v_P(\tilde x_P^{(1)})\right)=(s+1)q^2,$$ as claimed. Now we able to determine several gaps of $H(P)$. \[gaps\] Let $P \not\in \cX(\mathbb{F}_{q^6})$ be a point on $\cX$. Then $$\begin{gathered} G:=\{iq^3+j+kq+m(q^2+1)+\sum_{s=1}^{q-2} n_s ((s+1)q^2)+1 \mid i,j,k,m,n_1,\ldots,n_{q-2} \in \mathbb{Z}_{\geq 0}, \ \makebox{and}\\ i(q+1)+jq+k(q+1)+mq(q+1)+\sum_{s=1}^{q-2} n_s ((s+1)q-s)(q+1) \leq (q+1)(q^2-2)\},\notag\end{gathered}$$ is a set of gaps at $P$. Let $i,j,k,m,n_1,\ldots,n_{q-2}$ be nonnegative integers and write $f= \tilde z_P^i\tilde y_P^j\tilde x_P^k g_1^m \prod_{s=1}^{q-2} h_s^{n_s}$. Equations , , combined with Lemmas \[lem:g1\] and \[lem:hs\] imply that $f \in L((2g(\cX)-2)P_\infty)$ if $$i(q^3+1)+j(q^3-q^2+q)+k(q^3+1)+m(q^4+q)+\sum_{s=1}^{q-2} n_s ((s+1)q-s)(q^3+1) \leq q^5-2q^3+q^2-2,$$ which is equivalent to $$\label{eq:inquality1} i(q+1)+jq+k(q+1)+mq(q+1)+\sum_{s=1}^{q-2} n_s ((s+1)q-s)(q+1) \leq (q+1)(q^2-2).$$ On the other hand we have $$v_P(f)=iq^3+j+kq+m(q^2+1)+\sum_{s=1}^{q-2} n_s ((s+1)q^2).$$ Hence the claim follows from Lemma \[holom\]. \[obs:largestgapinG\] Inequality implies in particular that $i\leq q^2-2,j \leq q^2+q-3,k \leq q^2-2$, $m \leq q-1$ and $n_s \leq \lfloor (q+1)/(s+1)\rfloor$. This implies directly that the largest gap of $H(P)$ that is contained in $G$ is obtained by putting $i=q^2-2$ and all other remaining variables to $0$. In other words: the largest element in $G$ is $q^5-2q^3+1=2g(\cX)-q^2+1.$ \[obs:jsmall\] If $j\ge q$ and the tuple $(i,j,k,m,n_1,\dots,n_{q-2})$ satisfies inequality , then the tuple $(i,j-q,k+1,m,n_1,\dots,n_s)$ will also satisfy inequality . This implies that when calculating the set $G$, we may assume that $j \le q-1$. Moreover, inequality is equivalent to $$i+j+k+mq+\sum_{s=1}^{q-2} n_s ((s+1)q-s) \leq q^2-2+\frac{j}{q+1},$$ which for $j \le q-1$ is equivalent to $$\label{eq:inquality} i+j+k+mq+\sum_{s=1}^{q-2} n_s ((s+1)q-s) \leq q^2-2,$$ since all variables involved are integers. $|G|=g(\cX)$. ------------- We now prove that $G$ is exactly the set of gaps $G$ at $P=P_{(a,b,c)} \not\in \cX({\mathbb {F}_{q^6}})$, that is $|G|=g(\cX)$. Since we already know that $G$ contains gaps of $H(P)$, it is sufficient to show that $|G| \ge g(\cX)$. This will require a detailed study of the elements of $G$. To this end we consider the following map $$\varphi: \mathbb{Z}_{\geq 0}^{q+2} \rightarrow \mathbb{Z}_{\geq 0}, \quad {\rm with} \quad \varphi(i,j,k,m,n_1,\ldots,n_{q-2}) = iq^3+j+kq+m(q^2+1)+\sum_{s=1}^{q-2} n_s ((s+1)q^2)+1,$$ and consider the set $$\mathcal{G}=\{(i,j,k,m,n_1,\ldots,n_{q-2}) \in \mathbb{Z}_{\geq 0}^{q+2} \mid j \le q-1, \ \makebox{inequality \eqref{eq:inquality} holds}\}.$$ Then by Observation \[obs:jsmall\] we have $G=\varphi(\mathcal{G})$. The main difficulty is that $\varphi_{\big | \mathcal{G}}$, the restriction of the map $\varphi$ to $\mathcal{G}$, is not injective. This makes estimating the cardinality of $G$ somewhat tricky. We proceed by studying the image of $\varphi$ on the following three subsets of $\mathcal G$. $$\begin{aligned} \mathcal G_1&:=\{(i,0,k,m,0,\dots,0) \in \mathcal G\},\\ \mathcal G_2&:=\{(i,j,k,m,0,\dots,0) \in \mathcal G \mid 1 \le j \le q-1, k \le q-1, j+m \le q-1\}\\ \mathcal G_3&:=\{(i,j,k,0,\dots,0,n_s,0,\dots,0) \in \mathcal G \mid k \le q-1,1 \le s \le q-2,n_s=1,i+k+(s+1)q \ge q^2-1\}.\end{aligned}$$ Further, we write $G_1=\varphi(\mathcal G_1)$, $G_2=\varphi(\mathcal G_2)$ and $G_3=\varphi(\mathcal G_3)$. We will show that these sets are mutually disjoint and that their cardinalities add up to $|G|$ in a series of lemmas. \[lem:G1\] Let $\mathcal G_1$ and $G_1=\varphi(\mathcal{G}_1)$ be as above. Then $\varphi$ restricted to $\mathcal G_1$ is injective and $$|G_1|=\frac12 q^2(q-1)\left( \frac13 q^2+\frac56 q + \frac12\right).$$ If $(i,0,k,m,0,\dots,0) \in \mathcal G_1$, then $\varphi(i,0,k,m,0,\dots,0)=iq^3+kq+m(q^2+1)+1$ and by inequality $i+k+mq \le q^2-2.$ This implies in particular that $$0 \le m \le q-1 \ \makebox{and} \ 0 \le kq+m(q^2+1) \le (k+mq)q+q-1 \le (q^2-2)q+q-1 < q^3.$$ Now suppose $(i_1,0,k_1,m_1,0,\dots,0),(i_2,0,k_2,m_2,0,\dots,0) \in \mathcal G_1$ and $$i_1q^3+k_1q+m_1(q^2+1)=i_2q^3+k_2q+m_2(q^2+1).$$ Calculating modulo $q$ and using that $0 \le m_1 \le q-1$ and $0 \le m_2 \le q-1$ (see Observation \[obs:jsmall\]), we see that $m_1=m_2$. Further, since $0 \le k_1q+m_1(q^2+1)<q^3$ and $0 \le k_2q+m_2(q^2+1)<q^3$, we see that $k_1q+m_1(q^2+1)=k_2q+m_2(q^2+1)$ and $i_1q^3=i_2q^3$. Combining these equalities, we see that $(i_1,0,k_1,m_1,0,\dots,0)=(i_2,0,k_2,m_2,0,\dots,0)$, which is what we wanted to show. Now we compute $|G_1|.$ First of all, from the above we see that $|G_1|=|\mathcal G_1|$. Further we have $$\begin{aligned} |\mathcal G_1|&= \sum_{m=0}^{q-1}\sum_{i=0}^{q^2-2-mq}\sum_{k=0}^{q^2-2-mq-i} 1=\sum_{m=0}^{q-1}\sum_{i=0}^{q^2-2-mq} (q^2-1-mq-i)\\ & = \sum_{m=0}^{q-1}\frac{(q^2-1-mq)(q^2-mq)}{2} = \frac{(q^2-1)q^3}{2}+\sum_{m=0}^{q-1}\frac{-2q^3-q^2+q}{2} m+\binom{m+1}{2}q^2\\ & = \frac{(q^2-1)q^3}{2}+\frac{-2q^3-q^2+q}{2}\binom{q}{2}+\binom{q+1}{3}q^2.\end{aligned}$$ In the last equality we used *summation on the upper index* to evaluate the summation $\sum_m\binom{m+1}{2}$; see [@GKP Eqn. (5.10)]. The desired equality for $|G_1|$ now follows. \[lem:G2\] Let $\mathcal G_2$ and $G_2=\varphi(\mathcal{G}_2)$ be as above. Then $\varphi$ restricted to $\mathcal G_2$ is injective and $$|G_2|=\frac12 q^2(q-1)\left( \frac23 q^2-\frac16 q - \frac56\right).$$ If $(i,j,k,m,0,\dots,0) \in \mathcal G_2$, then $\varphi(i,j,k,m,0,\dots,0)=iq^3+j+kq+m(q^2+1)+1$ and by definition we have $1 \le j \le q-1$, $1 \le j+m \le q-1$ and $0 \le k \le q-1$. Moreover, inequality gives that $i+j+k+mq \le q^2-2.$ Similarly as in the previous lemma, we obtain that $$0 \le m \le q-1 \ \makebox{and} \ 0 \le j+kq+m(q^2+1) \le (k+mq)q+q-1 \le (q^2-2)q+q-1 < q^3.$$ Now suppose $(i_1,j_1,k_1,m_1,0,\dots,0),(i_2,j_2,k_2,m_2,0,\dots,0) \in \mathcal G_2$ and $$i_1q^3+j_1+k_1q+m_1(q^2+1)=i_2q^3+j_2+k_2q+m_2(q^2+1).$$ Reasoning exactly as in the previous lemma, we obtain that $j_1+m_1=j_2+m_2$, $j_1+k_1q+m_1(q^2+1)=j_2+k_2q+m_2(q^2+1)$ and $i_1=i_2$. Combining the first two equations, we deduce that $k_1q+m_1q^2=k_2q+m_2q^2$. Since $0\le k_1 \le q-1$ and $0 \le k_2 \le q-1$, we see $k_1=k_2$, which now implies that $(i_1,j_1,k_1,m_1,0,\dots,0)=(i_2,j_2,k_2,m_2,0,\dots,0).$ Now we compute $|G_2|$. First note that $k\le q-1$, but for a given $j$ and $m$, we also have $k \le q^2-2-j-mq$. However, since $j \ge 1$ and $0 \le j+m \le q-1$, we see that $m \le q-2$. Hence $q^2-2-j-mq \ge q^2-2-1-(q-2)q \ge q-1,$ implying that the condition $k \le q^2-2-j-mq$ is trivially satisfied. Hence $$\begin{aligned} |\mathcal G_2|&= \sum_{j=1}^{q-1}\sum_{m=0}^{q-1-j}\sum_{k=0}^{q-1} \sum_{i=0}^{q^2-2-j-k-mq}1=\sum_{j=1}^{q-1}\sum_{m=0}^{q-1-j}\sum_{k=0}^{q-1} (q^2-1-j-k-mq)\\ & = \sum_{j=1}^{q-1}\sum_{m=0}^{q-1-j} (q^2-1-j-mq)q-\binom{q}{2}=\sum_{j=1}^{q-1}\left((q^2-1-j)q-\binom{q}{2}\right)(q-j)-q^2\binom{q-j}{2}\\ & = \sum_{j=1}^{q-1}\left((q^2-q)q-\binom{q}{2}\right)(q-j)-(q^2-2q)\binom{q-j}{2} =\left((q^2-q)q-\binom{q}{2}\right)\binom{q}{2}-(q^2-2q)\binom{q}{3}.\end{aligned}$$ The desired equality now follows. \[lem:G3\] Let $\mathcal G_3$ and $G_3=\varphi(\mathcal{G}_3)$ be as above. Then $\varphi$ restricted to $\mathcal G_3$ is injective and $$|G_3|=\frac12 q^2(q-1)\left( \frac13 q - \frac23\right).$$ If $(i,j,k,0,0,\dots,0,n_s,0,\dots,0) \in \mathcal G_3$, then $\varphi(i,j,k,0,0,\dots,0,n_s,0,\dots,0)=iq^3+j+kq+(s+1)q^2+1$ and by definition we have $n_s=1$, $1 \le s \le q-2$, $0 \le j \le q-1$, $0 \le k \le q-1$ and $i+k+(s+1)q \ge q^2-1$ (that is $i+k+sq \ge q^2-q-1$). Moreover, inequality gives that $i+j+k+s(q-1) \le q^2-q-2.$ Note that the inequalities $i+k+sq \ge q^2-q-1$ and $i+j+k+s(q-1) \le q^2-q-2$ only can be satisfied simultaneously, if $j \le s-1$, so we may assume this as well in the remainder of the proof. Now suppose $(i_1,j_1,k_1,0,0,\dots,0,n_s,0,\dots,0),(i_1,j_1,k,0,0,\dots,0,1,0,\dots,0) \in \mathcal G_3$ and $$i_1q^3+j_1+k_1q+(s_1+1)q^2=i_2q^3+j_2+k_2q+(s_2+1)q^2.$$ Since the $q$-ary expansion of a number is unique, we immediately obtain that $j_1=j_2$, $k_1=k_2$ and $s_1=s_2$, since all variables involved at between $0$ and $q-1$. Hence $i_1=i_2$ as well and the first part of the lemma follows. Now we compute $|G_3|$. Recall that we may assume $j \le s-1$. Hence $$\begin{aligned} |\mathcal G_3|&= \sum_{s=1}^{q-2}\sum_{j=0}^{s-1}\sum_{k=0}^{q-1}\sum_{i=q^2-q-1-k-sq}^{q^2-q-2-j-k-s(q-1)}1= \sum_{s=1}^{q-2}\sum_{j=0}^{s-1}\sum_{k=0}^{q-1}(s-j)\\ & = q\sum_{s=1}^{q-2}\sum_{j=0}^{s-1}(s-j)=q\sum_{s=1}^{q-2}\binom{s+1}{2}=q\binom{q}{3}.\end{aligned}$$ The desired equality now follows. Finally to obtain an estimate for $|G|$, we need to study the intersections of the sets $G_1$, $G_2$ and $G_3$. It turns out that they are disjoint, as we will now show. \[G1G2G3disjoint\] The sets $G_1$, $G_2$ and $G_3$ defined above are mutually disjoint. [**Part 1. $G_1 \cap G_2 = \emptyset$.**]{} Let $(i_1,0,k_1,m_1,0,\dots,0) \in \mathcal G_1$, $(i_2,j_2,k_2,m_2,0,\dots,0) \in \mathcal G_2$ and suppose that $$i_1q^3+k_1q+m_1(q^2+1)=i_2q^3+j_2+k_2q+m_2(q^2+1).$$ Since $0 \le m_1 \le q-1$ and $1 \le j_2+m_2 \le q-1$, we see that $m_1=j_2+m_2$ and hence that $i_1q^2+k_1+m_1q=i_2q^2+k_2+m_2q.$ Note that $m_1-m_2=j_2 \ge 0$, where the inequality follows from the definition of $\mathcal G_2$. Inequality implies that $k_1+m_1q < q^2$ as well as $k_2+m_2q < q^2$. Hence we obtain $i_1=i_2$ and $k_1+m_1q=k_2+m_2q$, whence $(m_1-m_2)q=k_2-k_1$. This implies that $k_1 \equiv k_2 \pmod{q}$, but since $k_1 \ge 0$ and $0 \le k_2 \le q-1$ we can deduce $k_1-k_2 \ge 0$. On the other hand we already have seen that $m_1-m_2=j_2 \ge 1$, but then we arrive at a contradiction, since $0<(m_1-m_2)q=k_2-k_1 \le 0$. [**Part 2. $G_1 \cap G_3 = \emptyset$.**]{} Let $(i_1,0,k_1,m_1,0,\dots,0) \in \mathcal G_1$, $(i_3,j_3,k_3,0,0,\dots,0,1,0,\dots,0) \in \mathcal G_3$ and suppose that $$i_1q^3+k_1q+m_1(q^2+1)=i_3q^3+j_3+k_3q+(s+1)q^2.$$ Similarly as in part 1 above, we obtain that $m_1=j_3$, whence $i_1q^2+k_1+m_1q=i_3q^2+k_3+(s+1)q$, as well as the inequality $k_1+m_1q<q^2$. However, since $k_3 \le q-1$ and $s+1 \le q-1$, we also have $k_3+(s+1)q<q^3$. Therefore we obtain that $i_1=i_3$ as well as $k_1+m_1q=k_3+(s+1)q$. This implies that $$i_3+k_3+(s+1)q=i_1+k_1+m_1q \le q^2-2,$$ where we have used inequality to obtain the inequality. On the other hand $i_3+k_3+(s+1)q \ge q^2-1$ by the definition of $\mathcal G_3$ and we arrive at a contradiction. [**Part 3. $G_2 \cap G_2 = \emptyset$.**]{} Let $(i_2,j_2,k_2,m_2,0,\dots,0) \in \mathcal G_2$, $(i_3,j_3,k_3,0,0,\dots,0,1,0,\dots,0) \in \mathcal G_3$ and suppose that $$i_2q^3+j_2+k_2q+m_2(q^2+1)=i_3q^3+j_3+k_3q+(s+1)q^2.$$ Reasoning very similarly as in Part 1 and Part 2, we obtain $j_2+m_2=j_3$, $i_2=i_3$ and $$i_3+k_3+(s+1)q=i_2+k_2+m_2q \le q^2-2.$$ Again we arrive at a constriction. We are now ready to prove the main theorem of this section. Let $P$ be a point of $\cX$ with $P\not\in \cX(\mathbb{F}_{q^6})$. Then the set of gaps of $H(P)$ is given by, $$G=\{iq^3+kq+m(q^2+1)+\sum_{s=1}^{q-2} n_s ((s+1)q^2)+j+1 \mid i,j,k,m,n_1,\ldots,n_{q-2} \in \mathbb{Z}_{\geq 0}, j \le q-1,\ \makebox{and}$$ $$i+j+k+mq+\sum_{s=1}^{q-2} n_s ((s+1)q-s) \leq q^2-2\}.$$ Moreover, the set of Weierstrass points $W$ on $\cX$ coincides with $\cX(\mathbb{F}_{q^6})$. Combing Lemmas \[lem:G1\], \[lem:G2\], \[lem:G3\], and \[G1G2G3disjoint\] we see that $$|G| \ge |G_1|+|G_2|+|G_3|=\frac12 q^2(q-1)(q^2+q-1)=g(\cX).$$ Since we know that $H(P)$ has exactly $g(\cX)$ gaps, Proposition \[gaps\] then implies that $H(P)=\mathbb{N} \setminus G$. From Observation \[obs:largestgapinG\], we deduce that the largest gap in $H(P)$ is $2g(\cX)-q^2+1$, while we already know that for any $P \in \cX({\mathbb {F}_{q^6}})$, the largest gap is $2g(\cX)-1$. This implies the last statement in the theorem. The proof also shows that the gaps of $H(P)$ are precisely $G_1 \cup G_2 \cup G_3$, which is convenient when checking if a particular number is a gap or not. For example, this allows us to compute the multiplicity (smallest positive element) of $H(P)$ fairly easily. Let $P$ be a point of $\cX$ with $P\not\in \cX(\mathbb{F}_{q^6})$. The multiplicity of $H(P)$ is equal to $q^3-1$. From Stöhr-Voloch Theory we know that $q^3-1$ and $q^3$ are non-gaps at $P$, since $P$ is not a Weierstrass point; see [@HKT Proposition 10.9]. It is also not difficult to verify this directly. On the other hand, let $1 \le a \le q^3-2$ be an integer and write $a-1=c_0+c_1q+c_2q^2$ with $0\le c_t \le q-1$ for $t=1,2,3$. Then we distinguish three cases. [**Case 1. $c_2 \ge c_0$ and $(c_1,c_2) \neq (q-1,q-1)$.**]{} In this case a direct verification shows that $a=\varphi(0,0,c_1+(c_2-c_0)q,c_0,0\dots,0)$ and that $(0,0,c_1+(c_2-c_0)q,c_0,0\dots,0) \in \mathcal G_1$. [**Case 2. $c_2<c_0$.**]{} We have $a=\varphi(0,c_0-c_2,c_1,c_2,0\dots,0)$ and $(0,c_0-c_2,c_1,c_2,0\dots,0) \in \mathcal G_2$ in this case. [**Case 3. $(c_1,c_2) = (q-1,q-1)$**]{} Note that in this case $c_0 \le q-3,$ since $a-1=c_0+(q-1)q+(q-1)q^2 \le q^3-3$. One then checks that $a=\varphi(0,c_0,q-1,0,0,\dots,0,1)$ and that $(0,c_0,q-1,0,0,\dots,0,1) \in \mathcal G_3$. At this point seems to be reasonable to ask for the generators of the Weierstrass semigroup $H(P)$ for $P \not\in \cX(\mathbb{F}_{q^6})$. Their explicit determination seems to be a challenging task as the following examples show. In particular the number of generators of $H(P)$ seems to grow quickly with respect to $q$. - If $q=2$ then $g=10$ and $$G=\{1,2,3,4,5,6,9,10,11,17\}.$$ Clearly $7$ and $8$ must be generators of $H(P)$ and since $12 \not\in \langle 7,8\rangle$ and $13 \not\in \langle 7,8,12 \rangle$ we obtain that also $12$ and $13$ are generators. Note that $\langle 7,8,12,13\rangle \cap \{0, \ldots,20\}=\{7,8,12,13,14,15,16\}$ and hence also $18$ is a generator. In fact $$H(P)=\langle 7,8,12,13,18\rangle.$$ Moreover, if $P \in \cX$ then $$H(P)=\begin{cases} \{{ 0, 6, 8, 9, 12, 14, 15, 16, 17, 18,20,\ldots }\}, \ \makebox{if} \ P \in \cX(\mathbb{F}_{4}), \\ \{ 0, 7, 8, 9, 13, 14, 15, 16, 17, 18,20,\ldots\}, \ \makebox{if} \ P \in \cX(\mathbb{F}_{64}) \setminus \cX(\mathbb{F}_4), \\ \{0,7,8,12,13,14,15,16,18,19,20 \ldots\}, \ \makebox{otherwise}. \end{cases}$$ - If $q=3$ then $g=99$ and $$G=\{ 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 28, 29, 30, 31, 32, 33, 34,$$ $$35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69,$$ $$70, 71, 73, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 109, 110, 111, 112, 113, 114, 115, 116, 118, 119,$$ $$136, 137, 138, 139, 140, 142, 163, 164, 166, 190 \}.$$ Arguing as for the previous case, one can prove that $$H(P)=\langle 26,27,50,51,72,74,75,96,97,117,120,121,141,145,165\rangle.$$ It is unclear what the number of generators for general $q$ is. For $q=4$ the semigroup turns out to have $28$ generators. Collecting the results in the paper, we have proven Theorem \[mainth\] and Corollary \[mainth2\] from the introduction. We finish by summing up some further facts on the various semigroups on $\cX$ in a table, leaving a question mark for the minimal number of generators in the case $P \not\in \cX({\mathbb {F}_{q^6}})$. Determining this number could be interesting future work.\ $P$ multiplicity conductor number of generators -------------------------------------------------------------------- -------------- ----------------- ---------------------- $P \in \cX({\mathbb {F}_{q^2}})$ $q^3-q^2+q$ $2g(\cX)-1$ $3$ $P \in \cX({\mathbb {F}_{q^6}})\setminus \cX({\mathbb {F}_{q^2}})$ $q^3-q+1$ $2g(\cX)-1$ $q+2$ $P \not\in \cX({\mathbb {F}_{q^6}})$ $q^3-1$ $2g(\cX)-q^2+1$ ? Acknowledgments {#acknowledgments .unnumbered} =============== The first author gratefully acknowledges the support from The Danish Council for Independent Research (Grant No. DFF–4002-00367). The second author would like to thank the Italian Ministry MIUR, Strutture Geometriche, Combinatoria e loro Applicazioni, Prin 2012 prot. 2012XZE22K and GNSAGA of the Italian INDAM. [99]{} I. Duursma, [*Two-Point Coordinate Rings for GK-Curves*]{}, IEEE Trans. Inf. Theory [**57**]{}(2), 593-600 (2011). S. Fanali and M. Giulietti, [*One-Point AG Codes on the GK Maximal Curves*]{}, IEEE Trans. Inf. Theory [**56**]{}(1), 202–210 (2010). A. Garcia and P. Viana, Weierstrass points on certain nonclassical curves, Arch. Math. [**46**]{}(4), 315-322 (1986). M. Giulietti and G. Korchmáros, [*A new family of maximal curves over a finite field*]{}, Math. Ann. [**343**]{}, 229–245 (2009). R. Graham, D. E. Knuth, O. Patashnik: *Concrete mathematics. A foundation for computer science.* Second edition. Addison-Wesley Publishing Company, Reading, MA, (1994), xiv+657 pp. J.W.P. Hirschfeld, G. Korchmáros and F. Torres, *Algebraic Curves over a Finite Field,* *Princeton Series in Applied Mathematics*, Princeton, (2008). T. Høholdt, J. Van Lint, R. Pellikaan, [*Algebraic geometry codes*]{}, in: V.S. Pless, W.C. Huffman (Eds.), Handbook of Coding Theory, North-Holland, 871-961 (1998). C. Kirfel and R. Pellikaan, [*The minimum distance of codes in an array coming from telescopic semigroups*]{}, IEEE Trans. Inf. Theory [**41**]{}, 1720-1732 (1995). G. Lachaud, *Sommes d’Eisenstein et nombre de points de certaines courbes algébriques sur les corps finis*, C.R. Acad. Sci. Paris **305**(Série I) 729-732 (1987). H. Stichtenoth, *Algebraic function fields and codes*, Springer, 2009. K.O. Stöhr, J.F. Voloch: *Weierstrass points and curves over finite fields*, Proc. London Math. Soc. **52**(3), 1-19 (1986). M.A. Tsfasman, G. Vladut, *Algebraic-geometric Codes*, Kluwer, Dordrecht, (1991). G. D. Villa Salvador, *Topics in the theory of algebraic function fields*, Mathematics: Theory & Applications. Birkhäuser Boston, Inc., Boston, MA, (2006). Peter Beelen Technical University of Denmark,\ Department of Applied Mathematics and Computer Science,\ Matematiktorvet 303B,\ 2800 Kgs. Lyngby,\ Denmark,\ [email protected]\ Maria Montanucci Universita’ degli Studi della Basilicata,\ Dipartimento di Matematica, Informatica ed Economia,\ Campus di Macchia Romana,\ Viale dell’ Ateneo Lucano 10,\ 85100 Potenza,\ Italy,\ [email protected] [^1]: [*Math. Subj. Class.:*]{} Primary: 11G20.   Secondary: 11R58, 14H05, 14H55. [^2]: [*Keywords:*]{} Giulietti–Korchmáros maximal curve, Weierstrass semigroup, Weierstrass points.
{ "pile_set_name": "ArXiv" }
# ngrep > Filter network traffic packets using regular expressions. > More information: <https://github.com/jpr5/ngrep>. - Capture traffic of all interfaces: `ngrep -d any` - Capture traffic of a specific interface: `ngrep -d {{eth0}}` - Capture traffic crossing port 22 of interface eth0: `ngrep -d {{eth0}} port {{22}}` - Capture traffic from or to a host: `ngrep host {{www.example.com}}` - Filter keyword 'User-Agent:' of interface eth0: `ngrep -d {{eth0}} '{{User-Agent:}}'`
{ "pile_set_name": "Github" }
#include <u.h> #include <libc.h> /* * In place, rewrite name to compress multiple /, eliminate ., and process .. */ #define SEP(x) ((x)=='/' || (x) == 0) char* cleanname(char *name) { char *p, *q, *dotdot; int rooted; rooted = name[0] == '/'; /* * invariants: * p points at beginning of path element we're considering. * q points just past the last path element we wrote (no slash). * dotdot points just past the point where .. cannot backtrack * any further (no slash). */ p = q = dotdot = name+rooted; while(*p) { if(p[0] == '/') /* null element */ p++; else if(p[0] == '.' && SEP(p[1])) p += 1; /* don't count the separator in case it is nul */ else if(p[0] == '.' && p[1] == '.' && SEP(p[2])) { p += 2; if(q > dotdot) { /* can backtrack */ while(--q > dotdot && *q != '/') ; } else if(!rooted) { /* /.. is / but ./../ is .. */ if(q != name) *q++ = '/'; *q++ = '.'; *q++ = '.'; dotdot = q; } } else { /* real path element */ if(q != name+rooted) *q++ = '/'; while((*q = *p) != '/' && *q != 0) p++, q++; } } if(q == name) /* empty string is really ``.'' */ *q++ = '.'; *q = '\0'; return name; }
{ "pile_set_name": "Github" }
The promise, and peril, of Modi’s mandate The promise, and peril, of Modi’s mandate Siddharth Varadarajan If the struggle of Narendra Modi for power is the struggle of forgetting over memory, his victory represents a collective leap towards an uncertain future. Mr Modi’s remarkable election campaign may have been fuelled by unprecedented sums of money and magnified by the logic of the first-past-the-post system — which converted a 12 percentage point difference in vote share with the Congress into a 600 per cent difference in seats – but it has helped him banish, for all intents and purposes, the lingering shadows of a darker past. Troubling questions about his record that were met earlier with menacing silence or anger, but never answers, can no longer be asked. With the absolute majority Mr Modi has now delivered for the BJP, a new ledger of accounts has been opened. Any audit of his record will henceforth be on his own terms. Narendra Damodar Modi asked the electorate for 272+ seats and they have given it to him. He asked voters for a ‘Congress-mukt Bharat’ – an India free of the Congress – and they have handed it to him. So reviled was the Congress-led United Progressive Alliance government and so terrible its record of governance that the party has justifiably suffered the worst defeat in its 129-year history. The ‘Modi Wave’ left nearly 60 per cent of the electorate cold and failed to make a major dent in those states where regional parties still enjoy a high degree of credibility with voters like Tamil Nadu, Odisha and West Bengal but it has wrecked the Congress everywhere. The wave swept through Uttar Pradesh, where it also managed to draw away voters from the Bahujan Samaj Party if not from the Samajwadi Party, and of course Bihar too. With the Congress winning less than 55 seats, the 16th Lok Sabha will not have an Official Opposition or a formal Leader of the Opposition. Ever reluctant to shoulder responsibilities in a competitive environment, Rahul Gandhi is once again off the hook. But the question of an effective opposition so essential for democracy is not merely a formal one. Taken together, MPs from national parties like Congress, the Left and the Aam Aadmi Party will barely add up to 60. Regional parties like the AIADMK, the TRS and the Biju Janata Dal, which are non-ideological, or the Trinamool Congress, which veers towards populism but is essentially Bengal-centric, are unlikely to show much interest in, let alone challenge, the Modi government on a large number of crucial areas of policymaking. Mr Modi will lack a majority in the Rajya Sabha for at least the next year so he will either cut deals with regional parties to ensure the passage of legislation in the upper house or look for ways to take executive decisions, especially in the economic and financial sphere where discretionary powers abound. Indeed, BJP leaders close to the incoming Prime Minister have already drawn up a list of measures that could be implemented by administrative fiat. Spared the burden of filling his cabinet with allied parties, Mr Modi will have the freest hand of any Prime Minister since Rajiv Gandhi. So far, he ran a ‘presidential’ style campaign. His style of governance is likely to be equally ‘presidential’. To the extent this streamlines decision-making, this will have a positive impact. But to the extent this concentrates authority in a ‘power vertical,’ his style could be harmful too. While the Indian corporate sector and native and foreign investors in the stock market are justified in celebrating the arrival of a “right wing”, business-friendly government, this is not necessarily the side of ‘Modinomics’ that most BJP voters would like to see. Mr. Modi campaigned hard on a platform of economic development, job creation and an efficient administration, and the 40 per cent of voters who backed the BJP-led alliance did so because they believe he will deliver on these promises. But contradictions exist, especially in areas where satisfying the aspirations of a corporate constituency – for example in the area of labour reform – will perforce end up undermining the aspirations of voters for jobs and job security. Another area to watch closely will be the Modi government’s attitude towards law and order, and especially the right of vulnerable citizens – women, minorities, adivasis and dalits – to security, justice and equity. Mr Modi lost a golden opportunity during the election campaign to assure India’s Muslims that they would be safe under him when his attention was drawn to VHP leader Pravin Togadia’s suggestion that violence be used to evict a Muslim family in Bhavnagar that had bought a house in a so-called Hindu area. As Gujarat’s Chief Minister and Home Minister, Mr Modi could have reached out to the Muslim family and assured them – and by extension all of India’s Muslims – that they had the right to live and work wherever they liked in India and that he would defend their right to do so. Sadly, he made no such effort. All he did was tweet his disapproval of those “claiming to be BJP’s well wishers [who] are deviating the campaign from the issues of development & good governance.” Will Mr Modi as Prime Minister be more concerned about the insecurity Indian Muslims feel than he was as a candidate for the job? Will he find a way to reach out to this crucial section of the population which today views him with distrust? Or will he regard any talk about addressing their concerns and fears as “appeasement”? Mr Modi’s critics can be forgiven for feeling a knot in their stomach today but this is not the first time the Indian electorate has ignored the unpleasant baggage a candidate brings and been seduced by the dream of technology, development and corruption-free government. In December 1984, Rajiv Gandhi won 404 seats barely a month after his Congress party presided over the mass murder of Sikhs in Delhi, Kanpur, Bokaro and other north Indian cities. Rajiv was an attractive figure for young voters who embodied the same kind of technocratic promise that Mr Modi does today. The mandate Rajiv received was even more decisive. He ran a government with virtually no checks and balances, and was the darling of the corporate sector. But as his failures mounted, the temptation to create diversions and play the politics of vote-banks proved irresistible. This is the future an India under Narendra Modi must avoid at all costs. Related 43 comments on “The promise, and peril, of Modi’s mandate” Excellent article Dr. Varadarajan. The parallel with Rajiv Gandhi and his naiivete of development is SO well adduced. I remember the time when we had to turn off the doordarshan for showing long tedious Rajiv speeches. The essay is also provocative in the right mixture especially when media channels want to use the euphoria of BJP victory as a subterfuge to dull our intellect and impel us to acquiescence. The mass media is happy to organize studio cockfights and leave real issues unaddressed. They are happy that we are moving to a US-style “presidential” system in our focus on the persona of Modi. That works in the US, which is an honest and simple society. But for India it is hugely detrimental given the complexity and diversity of issues that face us. The media is also responsible for its silence on the erosion of a number of unspoken good values of electoral politics. For instance, the bifurcation of promises on a written and an oral register is a terrible precedent set by the BJP, but one largely unexamined in the mainstream media, with a few notable exceptions like you. The BJP took the votes on the basis of oral promises of vikas. Their manifesto, however, mentions Ram Mandir and Uniform Civil Code. They will build the Ram Mandir – and why shouldn’t they, it is written in ink – only a question of time (most likely after Pres Mukherjee’s term ends). When Modi chided the RSS for making Hindutva comments in a tweet, it was for campaign considerations. He was not upset that a minority-threatening issue had been raised. In all, your article gravely underscores that the recent electoral victory has only been the clearest and the most standard case of winning by realpolitik…..Alas when we are ravaged, we understand how things are constituted. Good analysis. However, when Mr. Siddharth Varadarajan asks the question “Will Mr Modi as Prime Minister be more concerned about the insecurity Indian Muslims feel than he was as a candidate for the job?”.. I think Mr. Varadarajan himself seems to suggest in the next sentence that its not a question that is worth expecting a positive response on. Mr. Rajiv Gandhi may have played with religion when all else failed. Mr. Modi, his background and his party, all provide sufficient indications that they will move to try and dismantle institutional protections such as they exist today for our Muslim citizens. These are concerns that all Indians concerned about their history should watch out for. Here in the United States, some of us NRIs look forward to welcoming Mr. Modi with bloodied hands. Afterall, facts do not disappear because the powerful do not like it! Mr.Varadarajan, I think virulent,paid and spineless media is far more dangerous than any other thinkable danger in India. Dont forget that Modi was made by Media propoganda.It is Media that has failed the country.Unless we rescue Media from the shackles of Crony Capitalists, from Consumerism nothing good ever is going to happen to this country. Why are we so pessimistic? Can Modi’s victory be not viewed as a collective step towards a certain bright future? Why can’t we all be partners in creating that bright future? On mr. Ram’s comment : Modi is not just the creation of media alone. His own strength, solid support from his party and the determination and hard work by the grass root workers and the negative contribution of media along with positive and powerful contribution of social media created MODI. My conviction is “Media will be rescued from the shackles from crony capitalists by the growth of social media in the long run.” It is just a matter of time. Process has started. More prosperity, more personalized gadgets and more and more information thru personal contacts. If media does not behave, people will care hoots. Hello Mr.VaradaRajan, We all know it is Paid Media that created this huge ‘Development’ propoganda.No good in any society is ever possible without Independent Media. We public are a bit tired of donating to AAP.We have donated more than 70 crores.Even if we donate more to the coming Delhi Assembly re-elections; AAP hasn’t got a chance against Modi’s Extreme Election Engineering and Paid Media. But we shall all collect 100 crores under ‘Independent Media Fund’ and start a Media Society, a sort of Public funded Media managed by a Janlokpal style Board. What are your opinions on this?Do you think it will work?Will it bring balance and change in the venomous and highly virulent Indian Paid and Corporate Media Scene?Will 100 crores be enough to start?Will it be viable financially?? If you think it is viable let me know I can send my first 100 dollars.I am serious.I can collect upto 5000 dollars on my own. Another worrying factor about the mandate, particularly in the context of women, is the interpretation of this mandate by fringe elements such as the Bajrang Dal etc. I think about Maharashtra after the Sena came to power. Under the ‘New Indian voter’s aspiration’ theory the issues of social justice are brutally ignored by the mainstream political discourse and corporate media. The neo-liberal policies will get a boost which were kept in abeyance by the UPA due to its want of majority in both houses. An efficient ‘environmental (disaster) clearance system is in offing. As a strategy he/BJP/RSS may not opt for an immediate persecution of minorities other than some legal interventions. The Hitler era in Germany was infamously famous for its industrial leaps. The inevitable crumbling of Congress and its genetic engineering experiments in democracy may force the people to find a real peoples platform/s to fight. Can’t help drawing parallels with AIADMK and JJ, another autocratic leader of a party that spent a long time out of power. Both leaders passed through a stage of bluster and a sense of unrealistic entitlement to power and immunity from their pasts, best called out by Karan Thapar. Whether the nation has or not, they have come to terms with their transgressions, partly by fiercely selling sops and bright futures to the electorate and partly, by fortifying their PR systems. It is conceivable that Modi’s biggest priority will be to keep his job, even at the expense of his party’s communal agenda and the demands of the corporate elephant in the room. A very balanced piece Mr Varadarajan, There is much to be apprehensive about and yet it does represent “vox populi” – the voice of the people. Somehow I do feel we have got to a stage when a genuine debate about religion and caste is now not possible. There are some very radical views that exist in the so-called “elite and intellectual” that is very disconcerting. I cannot forget the history of all parties concerned (be it 1984, 1993 or 2002) and yet do agree that one has to look ahead. There is a certain majoritarian view that is being echoed a bit too loudly and sharply. I fear the intellectuals, poets and thinkers that we had during our freedom struggle seem to have been replaced by aggressive polemics. Here are a few lines from Tagore’s Nationalism which was written just before the 20th century about India’s role in the world (that was being torn apart by war). Keep watch, India. Bring your offerings of worship for that sacred sunrise. Let the first hymn of its welcome sound in your voice, and sing, ‘Come, Peace, thou daughter of God’s own great suffering. Come with thy treasure of contentment, the sword of fortitude, And meekness crowning thy forehead.’ Be not ashamed, my brothers, to stand before the proud and the powerful With your white robe of simpleness. Let your crown be of humility, your freedom the freedom of the soul. Build God’s throne daily upon the ample bareness of your poverty And know that what is huge is not great and pride is not everlasting ..amen to that… “know that what is huge is not great and pride is not everlasting”,,,, Extremism in Hindus is rising. Wont be surprised that 2014 election results are compared to the seeds that 1906 separate electorates laid. Now India officially has a subject class in Muslims. No representation, no development and no life with dignity. The tragedy is that history textbooks have been so distorted and the law so weak, that even top schools in India are producing bigots and abusers. Without a good team, this miracle performance with majority on its own, is impossible for anybody. Let us wait and watch. new back office young advisers with a different perspective angle of the good of rural India where the votes lie, will start working. That may help Modi to continue. ‘Another area to watch closely will be the Modi government’s attitude towards law and order, and especially the right of vulnerable citizens – women, minorities, adivasis and dalits – to security, justice and equity.’ The Indian electorate has handed Narendra Modi the PM gaddi believing in his promise of good governance and development only. Women constitute one half of this country and nowhere did one hear throughout many months of campaigning any talk for improving their lot especially their safety, keeping in mind physical assaults on females – sometimes just children as young as 5 years.Gujarat under his Chief Ministership has seen crimes on those who needed protection. Minorities, a sizable presence in the country, too must be feeling uneasy at this huge mandate with NO OPPOSITION to thwart/oppose/reject policies that may not be benefecial to their interests. It will be interesting to see how Modi along with his chosen team deal with crimes on women, children, and those who have no representation in the government.Corporates and business houses may cheer at this mandate, but running a country is not only about creating atmosphere for robust economic growth and helping business magnates but also putting in place efficent affordable systems for healthcare , education and just the basic requirement of living a decent peaceful life with no threat to self and pelf. He must always remind himself that it is not only Gujarat but the welfare of this vast diverse country -its people, its environment, its natural resources that a Prime Minister and his team must PROTECT-NOT EXPLOIT. Hindutva must take a backseat. Hope he chooses his team wisely for a progressive India. What is the objective of this article? Every issue that you have raised for/against Mr.Modi are true for every govt since post socialist India (post 91 if you may).why should Mr.Modi stand greater scrutiny/trial by fire/ higher standards of statesmanship in comparison to his predecessors.No party in India can be acquitted of the crime of caste/religious politics.Further every govt has a blemish on human rights track record. The electorate(could be at the margin like you say)while delivering a mandate to Mr.Modi is not demanding a clean administration, efficient governance.Mr.Modi may well succeed due to low benchmarks set by previous govt & large macro economic dynamics (mnrega/pay commission helped in 2009 & proved to be an intractable inflation problem in 2014) Bottomline: Mr.Modi is no statesman yet.His victory need not be feared or reviled.Let us not hold him to standards higher than his predecessors well said sir, but there is real possibility that RSS would interpret this mandate as an approval of its divisive agenda and they would pursue their poisonous policies at the cost of idea of India. i wish, they would prove us wrong. I find the article quite positive. However, minority appeasement should stop. From here-on we should attempt to build a society of equals. Minorityism, Reservations and special privileges just build a divided society. It’s high time we aspire to become a meritocracy adopting the “value” called generosity! Dear Mr. Varadarajan For all the allegations of appeasement, did the Congress actually do something for “appeasement” other than the talk of OBC reservation to Muslims. I have a feeling that this allegation of appeasement is being played out disproportionately Hari May 18, 2014 Dear Mr. Varadarajan Sir, Its the same word you would use for the inactive state AP Cong govt. and Cong govt. at centre when Mr. Owaisi had one of his several oral diarrhoeas these last few years. I think the that word we are looking for is called “OUTLIERS”. There always are. Especially in our diverse country. It is neither that either (Mr. Togadia & Mr. Owaisi) of their comments justify the others’s nor that either’s comment is less heinous than the others’s. I feel that, what ever that Mr. Modi is being accused to be guilty of, now, especially after the mandate he has been given, we are to give him time to see how he is going to behave over time. Any premature commentary on this, in spite of Mr.Modi’s assertions on such indiscretions (via. twitter), look cynical and bordering on fear-mongering. But I find most of the rest of the article very constructive though. Azous D'Pilid May 17, 2014 Yawn. “Troubling questions about his record that were met earlier with menacing silence or anger, but never answers, can no longer be asked” Really menacing silence? These questions cannot be asked? Odd. I thought they had been asked at least 7 million times between 2002 and today. And i believe they had been answered as well. Did he express any regret or remorse for 2002? To quote Modi himself – would you be happy with an apology? I note there are Indians who practise Islam commenting on this site – would you be happy with somebody who caused a bloodbath, and then just said sorry? If he’s guilty, he should hung from a lamp post in a public square as a lesson to everyone. But after discussing this threadbare over 10 years, no evidence has been found. None. His past is no less dark than anybody else’s “As Gujarat’s Chief Minister and Home Minister, Mr Modi could have reached out to the Muslim family and assured them – and by extension all of India’s Muslims – that they had the right to live and work wherever they liked in India and that he would defend their right to do so. ” I know it is hard to leave the time-warp you’re stuck in, but the reason he did not do that is because this is not a country of Hindus and Muslims. It is a country of Indians. He doesn’t need to reach out to Muslims, because he is reaching to everybody – or nobody. And Indians – true Indians, of any faith, recognise that. The divisions between Hindus and muslims are in your head. Not theirs. Having seen the UPA 1 & 2 bungling along the years they were in power, I feel the electorate could not have given a better reply. Modi’s speeches in Vadodara & Amdavad yesterday after the results, if anything reveal an astute leader. It was very easy to take a dip in the euphoria of the sea of goodwill that was evident in the audience. On the contrary he showed great composure and maturity by calling for the assistance and cooperation of all the parties, winners and losers. I am hopeful that his vision will prove to be an infection and will and should take all Indians by storm. We have subsisted for too long and now is the time to show ourselves our mettle. How about the people who have invested a fortune to help Modi get elected? Would Modi be able to stand up to them? Astuteness is fine. What about strength of character? The political economy of India demands tough choices. Let us begin by seeing what he does on Gas Prices from the Narmada basin Cliche it is but let us not jump to conclusions. Time will soon tell. Hope for the best. Predictions of gloom and doom will obviously invite dark and disruptive tendencies. Public welfare demands positive participation from those able and willing to help. FK.
{ "pile_set_name": "Pile-CC" }
Dietary carbohydrate type and cholesterol-induced hypercholesterolemia in cynomolgus monkeys: influence of oral antibiotic. The relationship of carbohydrate type to cholesterol-induced hypercholesterolemia and the potential role of intestinal flora in the above process were examined in 12 male cynomolgus monkeys (M. fascicularis). Semipurified diets provided two types of carbohydrates (starch or sucrose, 49% by calorie) with 0.4 mg cholesterol/kcal. Six weeks of the starch diet resulted in significantly enhanced hypercholesterolemia when compared to sucrose diet. Starch in relation to sucrose produced cholesterol enrichment of intermediate density lipoproteins and increase in low density lipoprotein particles, whereas sucrose increased high density lipoprotein constituents (phospholipids, cholesterol, and apoA-I) and triglyceride content of very low density lipoproteins. Fecal Escherichia counts were high during the starch diet as contrasted with sucrose diet, but the Escherichia, Streptococcus, and Bacteroides groups did not show differences by diet following each consecutive 4-week period of oral neomycin (107 mg/kg body wt) treatment and withdrawal. The magnitude of hypercholesterolemia during these periods also remained similar between starch and sucrose, suggesting formation of germfree metabolic characteristics. Thus, the magnitude of cholesterol-induced hypercholesterolemia can be affected by the type of carbohydrate, which may be in part determined by intestinal flora metabolism.
{ "pile_set_name": "PubMed Abstracts" }
Q: MongoDB increment number in subdocument My mongoDB document looks like this: { valOne: "one", valTwo: "two", valThree: { threeOne: 0, threeTwo: 0 } } i would like to increment either "threeOne" or "threeTwo" depending on the user request. My code so far: var whichFieldToUpdate = request.body.field; //can be either threeOne or threeTwo var id = new BSON.ObjectID(request.body.id); //contains document id db.collection('name').update({_id: id}, {$inc: { ?????? } }, function(err, result) { }); ???? should be something like this: {$inc: {valThree: {whichFieldToUpdate : 1 } } A: var field = 'valThree.' + request.body.field; var inc = {}; inc[field] = 1; db.collection('name').update({_id: id}, {$inc: inc } }, function(err, result) { });
{ "pile_set_name": "StackExchange" }
Q: How does this "integration" work? $\vec{x}\cdot\frac{\partial \vec{x}}{\partial y}= \frac{\partial}{\partial y}(\frac{1}{2}\vec{x}^{2})$ Various derivations I recently looked up contained this sort of "steps". I fail to understand how what I suppose to be the Sum/Integral over $xdx$ can equal $xdx$ itself Ex.: $$\frac{d}{dt}(\dot{\vec{r}_i}\cdot\frac{\partial\dot{\vec{r}_i}}{\partial\dot{q_j}})-\dot{\vec{r}_i}\cdot\frac{\partial\dot{\vec{r}_i}}{\partial q_j}=\frac{d}{dt}\frac{\partial}{\partial\dot{q_j}}(\frac{1}{2}\dot{\vec{r}_i}^{2})-\frac{\partial}{\partial q_j}\cdot(\frac{1}{2}\dot{\vec{r}_i}^{2})$$ But I have yet to understand what exactly is happening here :( I would be pleased if you could tell me what I am missing. A: Take it from the RHS instead, and use the product rule: \begin{align} \frac{\partial}{\partial y}\left(\frac{1}{2}x^2\right) & =\frac{1}{2}\left[ \frac{\partial x}{\partial y}\cdot x+ x\cdot\frac{\partial x}{\partial y} \right] \\ & = x\cdot\frac{\partial x}{\partial y}, \end{align} because the dot product is commutative.
{ "pile_set_name": "StackExchange" }
Daylighting Detroit's long buried rivers - rmason http://www.freep.com/article/20110509/BUSINESS04/105090350/Activists-Detroit-streams-once-turned-into-sewers-could-new-life ====== rmason Here's a map showing the locations of the rivers <http://www.freep.com/assets/freep/pdf/C417411359.PDF> I've walked the Bloody Run stretch in the Elmwood Cemetery while doing geneological research.
{ "pile_set_name": "HackerNews" }
Take the hard work out of cooking with The Andrew James Electric Multi Cooker. Measuring 42cm in diameter (40 internal diameter) and 5cm in depth, the Multi Cooker is large enough for you to create delicious one-pot meals for the entire family and it is durable enough for everyday use. The Multi Cooker is also ideal for when you are cooking a meal for several guests as everything can be cooked in the one pan, saving kitchen space and additional washing up. The detachable power cord and lightweight design allows you to serve your meal direct from the pan meaning you can create a dining table centrepiece from the delicious meal you have created. As the Multi Cooker is fully portable it is ideal to be taken away on caravanning or camping holidays so you can make and enjoy a hearty full English breakfast before heading out for the day or you can make a delicious and filling meal for when you return home after a busy day. Dimensions (cm): 44.0L x 42.0W x 5D 42CM ELECTRIC MULTI COOKER — The Andrew James Electric Multi Cooker measures 42cm in diameter (40cm internal diameter) and 10cm in depth. This large, family sized Multi Cooker is perfect for creating everyday sumptuous one-pot meals for the family, for entertaining guests at a dinner party or for taking away on a caravanning or camping holiday. 1500W & ADJUSTABLE HEAT SETTINGS — Mains powered, this 1500W Multi Cooker simply needs plugging in and you’re ready to start making delicious Multi Cooker recipes such as paella, Spanish omelette, full English breakfasts, pizza and more. Featuring an adjustable thermostat, you can select from 5 different temperature settings which range up to 240°C allowing you complete control over the cooking process. NON-STICK COATING & GLASS LID — The Electric Multi Cooker is constructed from high quality stainless steel and with a fantastic non-stick coating your food will be cooked to perfection with little to no oil giving you healthier results than traditional cooking. The non-stick coating also makes the multi cooker quick and easy to clean. The glass lid allows you to monitor the cooking process without removing it. COOL TOUCH HANDLES & DETACHABLE POWER CORD — No matter how hot you have the Multi Cooker, the Cool Touch handles will never heat up, allowing you to transport the pan to the dinner table for easy serving. This is made even easier with its lightweight design and the detachable power cord. 2 YEAR MANUFACTURER’S WARRANTY — Shop with confidence as the Andrew James 42cm Electric Multi Cooker is covered by a 2 year manufacturer’s warranty.
{ "pile_set_name": "Pile-CC" }
Tuesday, December 11, 2012 The Life Blues I'm sitting here at work, next to the big window-doors leading onto the back balcony and everything's covered in snow. Both my babies are sleeping (even though the bigger one can hardly be called a baby anymore.) Kung Fu Panda 2 is playing in the background and I don't know why I haven't turned it off already. I've been a little depressed. I don't know why. Probably it's a combination of things: lack of sleep, the setting in of Winter, postpartum hormones. Actually my period just came back today for the first time in over a year without any warning, so I suspect that has something to do with it. (So no, mom, I'm not pregnant again!) I've danced with depression before and this hasn't been too bad, compared to other depressions. I'm sure none of my depressions have been too bad compared to some other people's. But I've been taking it slow, trying not to worry it too much. Trying to coax it softly to see what it's all about. I'm not usually a high-energy person anyway, and lately I'm even less so. That part I can confidently attribute to lack of sleep. All I want to do is curl up in blankets and watch all kinds of movies and eat things that aren't good for me. Like cookies? Hello. Being at work is hard, even though it seems like it shouldn't be. I do get to be in a comfortable house all day; I don't have to be on my feet or be in front of a desk doing not-fun computer things, like some of you. But it's not my home. It's notmy food or my couch or my smells. It's not James' crib or his toys. It's not our neighborhood and our backyard. I so envy you stay-at-home-moms. Even though I know staying at home would come with it's own set of monotony and things to complain about, I can't help but want it. Wishing for what you don't currently have is such a trap, isn't it? Right now I also wish it were Summer; that we could go outside and be warm, and take ourselves to the park and stretch out on blankets in the shade in balmy blissfulness. That sounds nice. But it's easy to forget that Summer actually gets really, really hot, and while stretching out in the shade is nice, it can be so tiring loading everything and everyone into the car, and waiting for the A/C to get going. And heavy, squirmy babies get even heavier and squirmier when you're already hot and sweaty and want to strip off all your clothes and jump into any and all bodies of water you pass, including the gutters full of sprinkler water right in front of your neighbors. (I haven't done this, and I probably won't. Don't worry.) So I'm trying to practice being grateful for what I have, right here, right now. Even though it's hard. Even though the depressed, weepy, sullen side of me wants to take James and go home and sit in the warm bathtub and cry and feed myself a whole batch of my mom's amazing gingersnaps until I bloat and fall asleep. Fortunately I have a moderately healthy awareness of societal norms to prevent me from doing that, but still. Instead, soon I'll hear my sweet boy crying for me when he wakes up from his nap in the pack-and-play in the basement, and I'll go save him from the torture of involuntarily trying to crawl in his sleep. And I'll kiss his sweet squishy face and hold his sweet squishy hands and brush his crazy hair out of his eyes. And with him in my arms it will be easier to remember why it's just too ridiculous to be unhappy. 1 comment: I dont know how a week went by and I didn't see this! Kayla, I love you. Sometimes we just need to be reminded of this. You are important. I know exactly how you feel about winter. It is so hard to get through sometimes. Have you tried taking vitamin D? I have to take a lot of it to feel normal up here in the NW. I have a deficiency but I recommend it to all. I take it in drop form, i bought it at whole foods, one flavorless drop on my tongue a day and it makes a big difference. You know you can call/text me if you need anything. We can make jokes about how we are zebras and love stripes. Or swap cookie recipes. DO you have a good sugar cookie recipe? Because I need one.
{ "pile_set_name": "Pile-CC" }
Anxiety and depression in bariatric surgery patients: a prospective, follow-up study using structured clinical interviews. Candidates for bariatric surgery frequently have co-morbid psychiatric problems. This study investigated the course and the prognostic significance of preoperative and postoperative anxiety and depressive disorders in 107 extremely obese bariatric surgery patients in a prospective design with face-to-face interviews (SCID) conducted prior to the surgery and postoperatively after 6-12 months and 24-36 months. The point prevalence of depressive disorders but not of anxiety disorders decreased significantly after surgery. Preoperative depressive disorders predicted depressive disorders 24-36 months but not 6-12 months after surgery, whereas preoperative anxiety significantly predicted postoperative anxiety disorders at both follow-up time points. Preoperative lifetime and current depressive disorders were unrelated to postoperative weight loss whereas preoperative lifetime, but not current anxiety disorders were of negative prognostic value for postoperative weight loss. Patients with both depressive and anxiety disorders at baseline (current and lifetime) lost significantly less weight after surgery. Postoperative anxiety disorder was not associated with the degree of weight loss at any follow-up time-point; however postoperative depressive disorder was negatively associated with weight loss at the 24-36 month follow-up assessment point. Missing data, limited statistical power, self-reported height and weight are the limitations of this study. As opposed to anxiety disorders, the point prevalence of depressive disorders decreased significantly after bariatric surgery. However, the presence of depressive disorders after bariatric surgery significantly predicted attenuated post-surgical improvements and may signal a need for clinical attention.
{ "pile_set_name": "PubMed Abstracts" }
Saturday, November 15, 2014 Sweet and Sour Meatballs I was going thru my drafted posts, and found this Sweet and Sour Meatballs photo which I made a few months ago. The recipe was taken from an old Chinese cookbook which I bought more than two decades ago, when I was still single. It was pretty "expensive" back then, but I like the recipes and there's a photo for each recipe. The cookbook, "Chinese Cuisine" by Huang Su-Huei is a book on Chinese cuisines, and was first published in January 1972. It has since been revised a number of times and has almost 70 reprintings since then, with many editions that were published in English, Chinese/English (bilingual edition), Japanese and French. Of course, my copy is the bilingual edition, and it was printed in 1991. Huang Su-Huei has authored many books on Chinese cuisines. When I did a search from Amazon website, I was rather surprised to find that she has quite a number of books to her name. But surprisingly, not much info can be found on Huang Su-Huei. From what I gather at this website, she is a teacher, writer and cooking consultant and business operator. She began her career at the Wei-Chuan Food Corporation in Taiwan and eventually founded the Wei-Chuan Cooking School. What I like about this cookbook is, it has many recipes that are simple enough for everyday dishes, and yet there are some recipes that are perfect for festivities and to serve if you are entertaining, Chinese-style. So far I have tried a few recipes from this book, mostly are before my blogging days. I have a few favourites that I do cook from time to time. I have posted before, one of it, Stir-fry Pork with Green Onions, which I served with rice, really delicious. Too bad I only have one of her cookbooks. I supposed that it is not easy to find her cookbooks anymore. And there's no updated info on this author, not even from Wei-Chuan Cooking School's website, when I went in to have a peek. Maybe there's more info, from Chinese websites, but I could not very well search from these websites, since I'm practically Chinese illiterate! Do you have any of Huang Su-Huei's cookbooks? Sweet and Sour Meat Balls, as can be seen from the photo at the front cover of the book. This is a simple and homey dish, great to have as part of a Chinese meal, served with plain rice, maybe with a soup and a green veggie stir-fry to accompany. Go easy on the vinegar, as I've used only about a tablespoon. Adjust the rest of the seasoning; soy sauce, sugar, salt, to your taste. I have omitted the red chilli since I do not have any at that time. This recipe can be found on the back page of the front cover of the cookbook. Hi Joyce,Agree with Mel, this meatballs dish really tasty. I noticed that most authentic Chinese dishes have cooking wine. This is something my late mom didn’t use as far as I know. Think I will try it one day. Thanks for sharing. I always like making my own Chinese dishes. It is healthier and so much better. It is also not so expensive. This does look real good something that I know would disappear in a minute! Have a beautiful Sunday. Catherine xo Hi Joyce, I have a vast collection of cookbooks but regret I don't seem to have this particular book. Will try to look for it, as the books sounds good. Your sweet and sour meatballs is very ho jiak and tempting. Thumbs up to you and regards :) About Me Welcome to my kitchen! My name is Joyce and I'm currently residing in Selangor, Malaysia. I love to bake and trying out new recipes from my ever increasing collection of cookbooks. You may contact me at [email protected] Thank you for stopping by! Copyright Statement All photographs and written posts contents featured at kitchen flavours solely belong to mycookinggallery.blogspot.com, unless otherwise stated. Any party interested to use any photographs or contents, either full or partial, or intended for a repost, please request for prior permission. If request is approved, please give full credit and post a link direct to this site. Please do not change, alter or amend any contents without prior consent.
{ "pile_set_name": "Pile-CC" }
--- layout: post title: Space date: 2016-09-13 16:08:00 homepage: https://github.com/victorvoid/space-jekyll-template/ download: https://github.com/victorvoid/space-jekyll-template/archive/master.zip demo: http://victorvoid.github.io/space-jekyll-template/ author: Victor Igor thumbnail: space-jekyll-template.png license: MIT License license_link: https://github.com/victorvoid/space-jekyll-template/blob/master/LICENSE --- ### Space Jekyll Template <iframe src="//ghbtns.com/github-btn.html?user=victorvoid&repo=space-jekyll-template&type=watch&count=true&size=small" allowtransparency="true" frameborder="0" scrolling="0" width="110px" height="20px"></iframe> A simple and elegant Jekyll theme based on Spacemacs. The theme works well on mobile devices as well. The [Space Jekyll Template](https://github.com/victorvoid/space-jekyll-template/) show the main Theme. Feel free to Fork, Star it and make a New Version of it. ### Contribute <iframe src="//ghbtns.com/github-btn.html?user=victorvoid&repo=space-jekyll-template&type=fork&count=true&size=small" allowtransparency="true" frameborder="0" scrolling="0" width="95px" height="20px"></iframe> Start by [forking the repository](https://github.com/victorvoid/space-jekyll-template/). ### Contact <iframe src="//ghbtns.com/github-btn.html?user=victorvoid&type=follow&count=true&size=small" allowtransparency="true" frameborder="0" scrolling="0" width="156px" height="20px"></iframe> If you have any questions or suggestions for improvements, don't hesitate to [open an issue](https://github.com/victorvoid/space-jekyll-template/issues) or making a pull request for your fork!
{ "pile_set_name": "Github" }
This is to confirm the monthly Industrials meeting for Thursday June 22, 2000 at 1:00 pm. Date: June 22, 2000 Thursday Time: 1:00 pm Location: EB 3316 Topic: Industrials If you have any questions/conflicts, please feel to call me at 853-0643. Thanks, Kay
{ "pile_set_name": "Enron Emails" }
Fascicular tubulization: a cellular approach to peripheral nerve repair. Present techniques of nerve repair by suture are based on an anatomical approach. The severed layers of connective tissue are reapproximated. Another approach to nerve repair is to separate the specific cellular components of the peripheral nerve that contribute to fibrous healing and nerve regeneration. The perineurium normally separates the extrafascicular epineurium of mesodermal origin from the intrafascicular endoneurium of ectodermal origin. A cellular approach to nerve repair would use a tube around the fascicle as an artificial perineurium to separate fibrous healing from axonal regeneration until the perineurium reestablishes its continuity. Fascicular tubulization with polyglycolic acid tubes was studied in 25 rats. The polyglycolic acid tube is resorbed after the perineurium has reestablished its continuity. The repairs by fascicular tubulization demonstrated improved organization of the repair site compared to suture repairs. The diameter histograms of the regenerated myelinated axons were similar in repairs by tube and suture techniques. The total regenerated cross-sectional area of the myelinated axons was similar in the repairs by fascicular tubulization to repairs by fascicular suture.
{ "pile_set_name": "PubMed Abstracts" }
When installing carpet, hardwood floor or other type of floor covering, both the removal of existing floor covering (including preparation of the floor surface) and the installation of the new floor covering is facilitated by having easy access to the floor surface, and in particular, the floor surface near to walls. Access to the floor surface may not be easily or quickly achieved, particularly in an office setting, because of the presence of furniture and other obstacles positioned across the floor surface. It may not be convenient to empty the room of the furniture, since there may not be an alternate and convenient space in which the furniture to be removed may be stored. Furthermore, it may be difficult to move the furniture, especially if all of the furniture is being moved through doorways and openings and there is the possibility of damage to the room walls and doorways and to the furniture itself. Still further, the process of emptying a room of furniture may consume considerable resources, in terms of time, cost and human power. In an office setting, the task is often further complicated by the division of a relatively large space into cubicles and offices through the use of a plurality of interconnected partitions or dividers across the floor surface. Clearing the space thus involves, prior to and in addition to the removal of the furniture, dismantling and removal of the wall partitions. Beside the difficulty discussed above in connection with the movement of furniture, which is also the case in connection with the movement of the wall partitions, additional complications arise. For example, the walls may be populated with shelves and personal knick-knacks to be removed, catalogued and stored prior to dismantling the walls. More significantly, the layout of the wall structures into cubicles and offices is often complicated and may not be easily replicated after the floor covering has been installed without a clear and detailed map. Still further, because the walls are relatively interdependent, there may be a pre-determined order of disassembly and/or reassembly that will avoid unintentional collapse of the entire cubicle structure. In any event, additional human power may be called for in order to ensure avoiding such collapse. An alternative that may be suitable in many cases of installation of floor coverings is to temporarily move the furniture a short distance away from its present location and elevate the wall partitions. In many instances, moving the furniture by approximately five feet away from a wall or corner and elevating a number of the wall partitions a few feet above the floor surface may provide sufficient access to allow the existing floor covering to be removed, the floor surface to be prepared and the new floor covering to be installed. There are a number of partition lifting and moving devices disclosed in the prior art. Typically they have a partition engaging portion, such as a foot ledge that may engage the bottom of the partition, that may be urged upwards by an extension mechanism. For example, U.S. Pat. No. 6,769,655 entitled “Workstation Panel Lifting Bracket” and issued Aug. 3, 2004 to Beese discloses a workstation panel lifting bracket adapted to be mounted to a jack to raise a workstation panel off the floor a sufficient distance to allow for access beneath the panel. The bracket comprises a generally horizontal top plate that is adapted to be mounted to the jack. A leg extends downwardly and forwardly from a forward edge of the top plate. Preferably, the leg forms an angle of about 80° to about 85° with the bracket top plate. A foot extends forwardly from a bottom end of the leg. An upwardly turned lip is preferably formed at the end of the foot. To provide stability to the bracket, jack, and panel during raising and lowering of the panel, the bracket also includes a brace on the leg. The brace has a front surface and opposed side surface. The side surfaces are generally triangular in shape, and the brace front surface is in a plane substantially perpendicular to a plane of said top plate. Preferably, the brace front face is approximately as long as the leg. U.S. Pat. No. 5,915,670 entitled “Apparatus for Lifting Furniture in Place to Install Floor Covering Beneath It” issued Jun. 29, 1999 to Cain discloses an apparatus for lifting furniture in place to install floor covering underneath the furniture. The apparatus comprises a plurality of lifting assemblies. Each lifting assembly includes a substantially vertical piston and cylinder assembly. A piston rod is attached to each piston. The piston rod extends from the upper end of the piston and cylinder assembly and a substantially L-shaped member is attached to the piston rod. A pressurized fluid control system is constructed and arranged to uniformly supply pressurized fluid to the lifting assemblies; whereby, the lifting assemblies act together to simultaneously lift furniture in one movement when pressurized fluid is uniformly supplied from the pressurized fluid control system to the lifting assemblies. U.S. Pat. No. 6,471,187 entitled “Apparatus for Lifting or Supporting Modular Furniture” issued Oct. 29, 2002 to Dubé et al. discloses an apparatus for lifting or supporting modular furniture panels having accessory hanging tracks with apertures, including a support having an upright shaft and a lifting jig movable on the shaft. The lifting jig has a support plate for engaging the underside of a panel, and an angle bracket above the support plate has a series of undercut hooks for engagement with apertures of a hanging track so as to positively locate the jig in relation to the panel. The angle bracket has an inner flange parallel to and attached to a front face of the lifting jig and an outer flange projecting perpendicularly from the front face and having the hooks. The inner flange is provided with horizontal slots which are engageable by screws which extend into said front face of the lifting jig and which allow lateral adjustment of the bracket relative to the lifting jig. The slots have enlarged end portions which allow the bracket to be removed from the lifting jig upon loosening of the screws, so that the bracket may be removed and repositioned in inverted position without removal of the screws; in inverted position the hooks can directly engage the hanging tracks. A number of jack systems make use of a pin locking mechanism. U.S. Pat. No. 5,915,672 entitled “Collapsible Jack Stand and Method Therefor” issued Jun. 29, 1999 to Dickey discloses a highly portable collapsible jack stand. The jack stand is comprised of a plurality of leg members. Each leg member is detachably coupled to a top guide plate which is used to support and align a telescoping rod. A ram head is coupled to the telescoping rod and is used for supporting a load. A base plate is detachably coupled to the plurality of leg members. The base plate prevents the jack stand from sinking into the ground when the jack stand is in use and under a heavy load. A low profile jack may be positioned underneath the telescoping rod for raising and lowering the telescoping rod thus raising and lowering the load on the jack stand apparatus. UK Patent Publication No. 2 190 962 entitled “Lifting Jacks” and published Dec. 2, 1987 to Sarra discloses a jack having an elongatable jack body comprising a pair of telescopically mutually slidable members forming a housing, a fluid pressure ram positioned within the housing such as to force elongation of the jack body in use, and a locking fork having arms positionable in holes in a first member to engage a second member to form a mechanical barrier against shortening of the jack body. The jack can be operated from the hydraulic fluid system of a tractor. There remains a need for a simple lifting apparatus for elevating a wall partition which does not suffer from the limitations of the prior art.
{ "pile_set_name": "USPTO Backgrounds" }
$100,000,000 PLANNING FUND The Natural Resilience Foundation 1.Identify Suitable Site Locations. With special attention to “elevation, elevation, elevation” as the new real estate mantra and other select criteria, select 10 sites in the U.S. Plan for a range of small-, mid- and large-sized communities with initial populations ranging from 50,000 – 500,000 growing to 250,000 – 5,000,000. One site will be for a megalopolis to support an eventual population of 25 million people. 2. Design a Sustainable and Resilient Community. Design must address how best to spatially and physically organize, orient and layout these communities into smaller, more livable scales. Cohesiveness, collaboration, creativity, entrepreneurship and sense of place are the governing principles we believe will promote social and economic sustainability; and these may be better achieved within smaller self-contained communities. These smaller scales of population should allow for self-sustained infrastructure like district energy, mass transit, net zero carbon use, local food sourcing, telecommunications and Internet. 3. Develop Master Plans. Plan types will call for expansion of existing communities or cities, establishment of new ones, or retrofitting of existing ones. 4.Develop Appropriate Political and Governance Structures. Explore and re-think how the benefits of some bureaucracy and systematization can be balanced with promoting creativity, entrepreneurship and small business. Utilize digital technology platforms to better manage resources in a transparent and fair way as well as promote a shared economy. Shift decision-making towards constructing healthy, sustainable and resilient ecosystems. 5.Rethink our Financial Structures. The Great Recession of 2008 demonstrated that our financial systems suffer from considerable speculation, gaming, shifting risk, risk-taking and unaccountability. Establish triple bottom line accounting to reflect the true costs of their activities on society and the environment. 6. Secure Build-out Capital and Financing. Utilize a portion of the Planning Fund to raise capital for infrastructure build-out. Seek a mix of public money and private capital. Structure appropriate public, private and community partnerships (PuPCos) for the sharing and flow of financial, intellectual property, development and community resources.
{ "pile_set_name": "Pile-CC" }
syntax = "proto3"; package host; option java_package = "com.imageworks.spcue.grpc.host"; option java_multiple_files = true; import "comment.proto"; import "criterion.proto"; import "job.proto"; import "renderPartition.proto"; // -------- Services --------] service DeedInterface { // Remove the deed rpc Delete(DeedDeleteRequest) returns (DeedDeleteResponse); // Returns the full host for these settings. rpc GetHost(DeedGetHostRequest) returns (DeedGetHostResponse); // Returns the owner for these settings. rpc GetOwner(DeedGetOwnerRequest) returns (DeedGetOwnerResponse); // Sets a blackout time for the host. rpc SetBlackoutTime(DeedSetBlackoutTimeRequest) returns (DeedSetBlackoutTimeResponse); // Enable/Disable blackout time without changing the times. rpc SetBlackoutTimeEnabled(DeedSetBlackoutTimeEnabledRequest) returns (DeedSetBlackoutTimeEnabledResponse); } service HostInterface { // Add a comment on this host. rpc AddComment(HostAddCommentRequest) returns (HostAddCommentResponse); // Set a tag on this host. rpc AddTags(HostAddTagsRequest) returns (HostAddTagsResponse); // Delete host. rpc Delete(HostDeleteRequest) returns (HostDeleteResponse); // Find a host by its name rpc FindHost(HostFindHostRequest) returns (HostFindHostResponse); // Get the comments for this host. rpc GetComments(HostGetCommentsRequest) returns (HostGetCommentsResponse); // Return the deed for this host. rpc GetDeed(HostGetDeedRequest) returns (HostGetDeedResponse); // Return a host by its id rpc GetHost(HostGetHostRequest) returns (HostGetHostResponse); // Search for a number of hosts rpc GetHosts(HostGetHostsRequest) returns (HostGetHostsResponse); // Return the host whiteboard rpc GetHostWhiteboard(HostGetHostWhiteboardRequest) returns (HostGetHostWhiteboardResponse); // Get the owner settings of this particular host. rpc GetOwner(HostGetOwnerRequest) returns (HostGetOwnerResponse); // Returns the list of proc resources allocated from this host. rpc GetProcs(HostGetProcsRequest) returns (HostGetProcsResponse); // Return any render partitions that are setup on this host. rpc GetRenderPartitions(HostGetRenderPartitionsRequest) returns (HostGetRenderPartitionsResponse); // Locks the host. Its possible we'll need to pass in a show name here in the future rpc Lock(HostLockRequest) returns (HostLockResponse); // Issues an immediate reboot. rpc Reboot(HostRebootRequest) returns (HostRebootResponse); // Sets the reboot when idle state, nothing has to be locked to set this. When the host pings in idle a reboot // command is sent to the host and the host will be put into the Rebooting state. If any locks are set they will // be removed upon reboot. rpc RebootWhenIdle(HostRebootWhenIdleRequest) returns (HostRebootWhenIdleResponse); // Redirect the given procs to the specified job. rpc RedirectToJob(HostRedirectToJobRequest) returns (HostRedirectToJobResponse); // Remove a tag from this host. rpc RemoveTags(HostRemoveTagsRequest) returns (HostRemoveTagsResponse); // Rename tag. rpc RenameTag(HostRenameTagRequest) returns (HostRenameTagResponse); // Assign a host to an allocation. rpc SetAllocation(HostSetAllocationRequest) returns (HostSetAllocationResponse); // Manually set the hardware state for the host. The hardware state may be changed automatically if the host pings // in. If the hardware state is set to "Reimage", the state will not automatically change with a host ping, and // must be manually set back to Up. rpc SetHardwareState(HostSetHardwareStateRequest) returns (HostSetHardwareStateResponse); // Set the name of the host operating system. rpc SetOs(HostSetOsRequest) returns (HostSetOsResponse); // Changes the host's [ThreadMode] rpc SetThreadMode(HostSetThreadModeRequest) returns (HostSetThreadModeResponse); // Unlocks the host for booking if the proc is in the Locked state. You cannot unlock a NimbyLocked proc. rpc Unlock(HostUnlockRequest) returns (HostUnlockResponse); } service OwnerInterface { // Deletes the owner record. rpc Delete(OwnerDeleteRequest) returns (OwnerDeleteResponse); // Get a list of all deeds this owner has. rpc GetDeeds(OwnerGetDeedsRequest) returns (OwnerGetDeedsResponse); // Get a list of all hosts this owner is responsible for. rpc GetHosts(OwnerGetHostsRequest) returns (OwnerGetHostsResponse); // Return an Owner record by name, id, or email. rpc GetOwner(OwnerGetOwnerRequest) returns (OwnerGetOwnerResponse); //Sets the owners show. rpc SetShow(OwnerSetShowRequest) returns (OwnerSetShowResponse); // Set the hosts new owner settings. Any host may have an owner, not just desktops. This allows direct control of // the cores. By default hosts have no owner settings. rpc TakeOwnership(OwnerTakeOwnershipRequest) returns (OwnerTakeOwnershipResponse); } service ProcInterface { // Clears the redirect off of the proc so it dispatches naturally. rpc ClearRedirect(ProcClearRedirectRequest) returns (ProcClearRedirectResponse); // Returns the [Frame] running on the [Proc] rpc GetFrame(ProcGetFrameRequest) returns (ProcGetFrameResponse); // Returns the [Host] this [Proc] was allocated from. rpc GetHost(ProcGetHostRequest) returns (ProcGetHostResponse); // Returns the [Job] the [Proc] has been assigned to. rpc GetJob(ProcGetJobRequest) returns (ProcGetJobResponse); // Returns the [Layer] the [Proc] has been assigned to. rpc GetLayer(ProcGetLayerRequest) returns (ProcGetLayerResponse); // Return a list of procs matching the search rpc GetProcs(ProcGetProcsRequest) returns (ProcGetProcsResponse); // Sends a kill signal to the running process. rpc Kill(ProcKillRequest) returns (ProcKillResponse); // Unbooks and redriects the proc to the specified group. Optionally kills the proc immediately. Will overwrite an // existing redirect. Return true if the redirect was a success. The redirect would fail in the event that the // specified group does not have a suitable frame for the proc. rpc RedirectToGroup(ProcRedirectToGroupRequest) returns (ProcRedirectToGroupResponse); // Unbooks and redriects the proc to the specified job. Optionally kills the proc immediately. Will overwrite an // existing redirect. Return true if the redirect was a success. The redirect would fail in the event th rpc RedirectToJob(ProcRedirectToJobRequest) returns (ProcRedirectToJobResponse); // Unbooks this [Proc]. Unbooking means the [Proc] will automatically seek out a new [Job] when the current // [Frame] is complete. rpc Unbook(ProcUnbookRequest) returns (ProcUnbookResponse); //Unbooks procs that match the ProcSearchCriteria. This request can span jobs, shows, allocations, hosts etc. // Set kill to true if the running frames should immediately be killed. rpc UnbookProcs(ProcUnbookProcsRequest) returns (ProcUnbookProcsResponse); // Unbooks procs that match the ProcSearchCriteria and books them on the specified group, assuming the group has // layers that can take the procs. If the kill boolean is set to true, the operation happens immediately. If false, // the proc will move after it finishes its current frame. rpc UnbookToGroup(ProcUnbookToGroupRequest) returns (ProcUnbookToGroupResponse); // Unbooks procs that match the ProcSearchCriteria and books them on the specified list of jobs, assuming those jobs // have layers that can take the procs. If the kill boolean is set to true, the operation happens immediately. If // false, the proc will move after it finishes its current frame. rpc UnbookToJob(ProcUnbookToJobRequest) returns (ProcUnbookToJobResponse); } // -------- Enums -------- enum HardwareState { UP = 0; DOWN = 1; REBOOTING = 2; REBOOT_WHEN_IDLE = 3; REPAIR = 4; } enum HostTagType { MANUAL = 0; HARDWARE = 1; ALLOC = 2; HOSTNAME = 3; } enum LockState { OPEN = 0; LOCKED = 1; NIMBY_LOCKED = 2; } // Proc redirects can have two different types of destinations, jobs and groups. enum RedirectType { JOB_REDIRECT = 0; GROUP_REDIRECT = 1; } // Defines the possible states for a core or proc enum RunState { // Entity is idle, which means it can be booked. IDLE = 0; // Entity is booked, which means its in use on a render proc BOOKED = 1; } enum ThreadMode { // Auto determines the number of threads to use automatically // based on the amount of memory used by the frame. AUTO = 0; // All always uses all of the cores available on the proc. // These hosts are always booked on threadable layers. ALL = 1; // All mode during the day, auto-mode at night. VARIABLE = 2; } // -------- Primary Message Types --------] message Deed { string id = 1; string host = 2; string owner = 3; string show = 4; bool blackout = 5; int32 blackout_start_time = 6; int32 blackout_stop_time = 7; } message DeedSeq { repeated Deed deeds = 1; } message HardwareStateSeq { repeated HardwareState state = 1; } message Host { string id = 1; string name = 2; string alloc_name = 3; bool nimby_enabled = 4; bool has_comment = 5; float cores = 6; float idle_cores = 7; int64 memory = 8; int64 idle_memory = 9; int64 gpu = 10; int64 idle_gpu = 11; int64 total_swap = 12; int64 total_memory = 13; int64 total_gpu = 14; int64 total_mcp = 15; int64 free_swap = 16; int64 free_memory = 17; int64 free_mcp = 18; int64 free_gpu = 19; int32 load = 20; int32 boot_time = 21; int32 ping_time = 22; string os = 23; repeated string tags = 24; HardwareState state = 25; LockState lock_state = 26; ThreadMode thread_mode = 27; } message HostSearchCriteria { repeated string hosts = 1; repeated string regex = 2; repeated string substr = 3; repeated string ids = 4; repeated string allocs = 5; HardwareStateSeq states = 6; } message HostSeq { repeated Host hosts = 1; } message NestedHost { string id = 1; string name = 2; string alloc_name = 3; bool nimby_enabled = 4; bool has_comment = 5; float cores = 6; float idle_cores = 7; int64 memory = 8; int64 idle_memory = 9; int64 gpu = 10; int64 idle_gpu = 11; int64 total_swap = 12; int64 total_memory = 13; int64 total_gpu = 14; int64 total_mcp = 15; int64 free_swap = 16; int64 free_memory = 17; int64 free_mcp = 18; int64 free_gpu = 19; int32 load = 20; int32 boot_time = 21; int32 ping_time = 22; string os = 23; repeated string tags = 24; HardwareState state = 25; LockState lock_state = 26; ThreadMode thread_mode = 27; NestedProcSeq procs = 28; } message NestedHostSeq { repeated NestedHost nested_hosts = 1; } message NestedProc { string id = 1; string name = 2; string show_name = 3; string job_name = 4; string frame_name = 5; string group_name = 6; int32 ping_time = 7; int32 bookedTime = 8; int32 dispatch_time = 9; int64 reserved_memory = 10; int64 reserverd_gpu = 11; int64 used_memory = 12; float reserved_cores = 13; bool unbooked = 14; string log_path = 15; string redirect_target = 16; repeated string services = 17; NestedHost parent = 18; } message NestedProcSeq { repeated NestedProc nested_procs = 1; } message Owner { string id = 1; string name = 2; string show = 3; int32 host_count = 4; } message Proc { string id = 1; string name = 2; string show_name = 3; string job_name = 4; string frame_name = 5; string group_name = 6; int32 ping_time = 7; int32 bookedTime = 8; int32 dispatch_time = 9; int64 reserved_memory = 10; int64 reserved_gpu = 11; int64 used_memory = 12; float reserved_cores = 13; bool unbooked = 14; string log_path = 15; string redirect_target = 16; repeated string services = 17; } message ProcSearchCriteria { // An array of host names to match. repeated string hosts = 1; // An array of job names to match. repeated string jobs = 2; // An arra of layer names to match. repeated string layers = 3; // An array of show names to match. repeated string shows = 4; // An array of allocation names to match. repeated string allocs = 5; // A range of memory usage. Values are in KB. repeated criterion.InRangeIntegerSearchCriterion memory_range = 6; // A duration range. Values are in seconds. repeated criterion.InRangeIntegerSearchCriterion duration_range = 7; //The maximum number of results. repeated int32 max_results = 8; //The offset of the first result. int32 first_result = 9; } message ProcSeq { repeated Proc procs = 1; } // -------- Requests & Responses --------] // DEED ---- // Delete message DeedDeleteRequest { Deed deed = 1; } message DeedDeleteResponse {} // Empty // GetHost message DeedGetHostRequest { Deed deed = 1; } message DeedGetHostResponse { Host host = 1; } // GetOwner message DeedGetOwnerRequest { Deed deed = 1; } message DeedGetOwnerResponse { Owner owner = 1; } // SetBlackoutTimeEnabled message DeedSetBlackoutTimeEnabledRequest { Deed deed = 1; bool enabled = 2; } message DeedSetBlackoutTimeEnabledResponse {} // Empty // SetBlackoutTime message DeedSetBlackoutTimeRequest { Deed deed = 1; int32 start_time = 2; int32 stop_time = 3; } message DeedSetBlackoutTimeResponse {} // Empty // HOST ---- // AddComment message HostAddCommentRequest { Host host = 1; comment.Comment new_comment = 2; } message HostAddCommentResponse {} // Empty // AddTags message HostAddTagsRequest { Host host = 1; repeated string tags = 2; } message HostAddTagsResponse {} // Empty // Delete message HostDeleteRequest { Host host = 1; } message HostDeleteResponse {} // Empty // FindHost message HostFindHostRequest { string name = 1; } message HostFindHostResponse { Host host = 1; } // GetComments message HostGetCommentsRequest { Host host = 1; } message HostGetCommentsResponse { comment.CommentSeq comments = 1; } // GetDeed message HostGetDeedRequest { Host host = 1; } message HostGetDeedResponse { Deed deed = 1; } // GetHost message HostGetHostRequest { string id = 1; } message HostGetHostResponse { Host host = 1; } // GetHosts message HostGetHostsRequest { HostSearchCriteria r = 1; } message HostGetHostsResponse { HostSeq hosts = 1; } // GetHostWhiteboard message HostGetHostWhiteboardRequest {} // Empty message HostGetHostWhiteboardResponse { NestedHostSeq nested_hosts = 1; } // GetOwner message HostGetOwnerRequest { Host host = 1; } message HostGetOwnerResponse { Owner owner = 1; } // GetProcs message HostGetProcsRequest { Host host = 1; } message HostGetProcsResponse { ProcSeq procs = 1; } // GetRenderPartitions message HostGetRenderPartitionsRequest { Host host = 1; } message HostGetRenderPartitionsResponse { renderPartition.RenderPartitionSeq render_partitions = 1; } // Lock message HostLockRequest { Host host = 1; } message HostLockResponse {} // Empty // Reboot message HostRebootRequest { Host host = 1; } message HostRebootResponse {} // Empty // RebootWhenIdle message HostRebootWhenIdleRequest { Host host = 1; } message HostRebootWhenIdleResponse {} // Empty // RedirectToJob message HostRedirectToJobRequest { Host host = 1; repeated string proc_names = 2; string job_id = 3; } message HostRedirectToJobResponse { bool value = 1; } // RemoveTags message HostRemoveTagsRequest { Host host = 1; repeated string tags = 2; } message HostRemoveTagsResponse {} // Empty // RenameTag message HostRenameTagRequest { Host host = 1; string old_tag = 2; string new_tag = 3; } message HostRenameTagResponse {} // Empty // SetAllocation message HostSetAllocationRequest { Host host = 1; string allocation_id = 2; } message HostSetAllocationResponse {} // Empty // SetHardwareState message HostSetHardwareStateRequest { Host host = 1; HardwareState state = 2; } message HostSetHardwareStateResponse {} // Empty // SetOs message HostSetOsRequest { Host host = 1; string os = 2; } message HostSetOsResponse {} // Empty // SetThreadMode message HostSetThreadModeRequest { Host host = 1; ThreadMode mode = 2; } message HostSetThreadModeResponse {} // Empty // Unlock message HostUnlockRequest { Host host = 1; } message HostUnlockResponse {} // Empty // OWNER ---- // Delete message OwnerDeleteRequest { Owner owner = 1; } message OwnerDeleteResponse {} // Empty // GetDeeds message OwnerGetDeedsRequest { Owner owner = 1; } message OwnerGetDeedsResponse { DeedSeq deeds = 1; } // GetHosts message OwnerGetHostsRequest { Owner owner = 1; } message OwnerGetHostsResponse { HostSeq hosts = 1; } // GetOwner message OwnerGetOwnerRequest { string name = 1; } message OwnerGetOwnerResponse { Owner owner = 1; } // SetShow message OwnerSetShowRequest { Owner owner = 1; string show = 2; } message OwnerSetShowResponse {} // Empty // TakeOwnership message OwnerTakeOwnershipRequest { Owner owner = 1; string host = 2; } message OwnerTakeOwnershipResponse {} // Empty // PROC --- // ClearRedirect message ProcClearRedirectRequest { Proc proc = 1; } message ProcClearRedirectResponse { bool value = 1; } // GetFrame message ProcGetFrameRequest { Proc proc = 1; } message ProcGetFrameResponse { job.Frame frame = 1; } // GetHost message ProcGetHostRequest { Proc proc = 1; } message ProcGetHostResponse { Host host = 1; } // GetJob message ProcGetJobRequest { Proc proc = 1; } message ProcGetJobResponse { job.Job job = 1; } // GetLayer message ProcGetLayerRequest { Proc proc = 1; } message ProcGetLayerResponse { job.Layer layer = 1; } // GetProcs message ProcGetProcsRequest { ProcSearchCriteria r = 1; } message ProcGetProcsResponse { ProcSeq procs = 1; } // Kill message ProcKillRequest { Proc proc = 1; } message ProcKillResponse {} // Empty // RedirectToGroup message ProcRedirectToGroupRequest { Proc proc = 1; string group_id = 2; bool kill = 3; } message ProcRedirectToGroupResponse { bool value = 1; } // RedirectToJob message ProcRedirectToJobRequest { Proc proc = 1; string job_id = 2; bool kill = 3; } message ProcRedirectToJobResponse { bool value = 1; } // Unbook message ProcUnbookRequest { Proc proc = 1; bool kill = 2; } message ProcUnbookResponse {} // Empty // UnbookProcs message ProcUnbookProcsRequest { ProcSearchCriteria r = 1; bool kill = 2; } message ProcUnbookProcsResponse { int32 num_procs = 1; } // UnbookToJob message ProcUnbookToJobRequest { ProcSearchCriteria r = 1; job.JobSeq jobs = 2; bool kill = 3; } message ProcUnbookToJobResponse { int32 num_procs = 1; } // UnbookToGroup message ProcUnbookToGroupRequest { ProcSearchCriteria r = 1; job.Group group = 2; bool kill = 3; } message ProcUnbookToGroupResponse { int32 num_procs = 1; }
{ "pile_set_name": "Github" }
Q: Policy for SE employees influencing community decisions using mod powers Under what conditions, if ever, is it acceptable for SE employees to influence community matters on the Meta site of a community they do not actively participate in by upvoting or downvoting posts? I’m not talking about removing spam or obviously remove-worthy content, but about using voting powers, granted only as part of the employee mod diamond and not earned as privilege, to modify the outcome of community-related votes by upvoting or downvoting individual posts. Examples for community matters: questions of scope community projects (for example: contests or blogs) community ads A: Most of the time it is a bad idea for SE employees to intervene in anything but obvious cases (the big exception is if the mods are unavailable). Moderator actions by unfamiliar users are much more likely to create some controversy than if the site mods had performed them. So in any case that isn't entirely obvious, SE employees should generally prefer to notify the site mods and let them handle it. Jeff and Joel used to be more active in using mod powers, and I experienced that on Skeptics as a mod directly. They certainly had a point when they acted, but it would have been much smoother if they had asked us mods to handle those issues instead of acting themselves on issues that weren't settled at that time. There are some exceptions that we just have to accept, these are mostly legal issues like DMCA notices. I personally don't think it's a big deal if an SE employee performs a mod action. But there are a lot of ways to screw this up that create drama and additional work for the mods. One thing I'd like to emphasize is that site mods should feel comfortable to override SE employees when they perform moderator actions, unless the SE employees indicate that there are legal reasons or they're enforcing the "Be Nice" rules. The details of running a site are up to the local community, if SE has a fundamental issue with how a site is run they have to take it to meta and discuss it directly with the mods. Otherwise the sites should feel free to set their rules within the scope of the code of conduct. I misread the question when answering, and my points are about the main site. But my answer isn't really different for meta. They should behave the same way as the site mods, and if there is conflict the site mods should feel free to override the decisions of SE employees unless they indicate that there are legal reasons or that the issue is violating one of the few global rules like the code of conduct. And there are no rules about who can vote on meta sites. I have proposed in the past to only allow users active on the main site to cast votes on meta, but that didn't go anywhere. It doesn't seem useful to try to establish any rules on voting as it is secret, so you could never enforce them anyway A: My short two cents: I see no problem if it's restricted to upvote or downvote only. Those are not mod powers, anyone can gain them quickly enough. Most employees have the association bonus so can upvote anywhere anyway, the missing 20 rep for downvote are really trivial. I do have a problem with using actual mod/high rep powers like closing questions, deleting posts etc. A: My personal perspective: First off, in my opinion, a hard-and-fast rule is not appropriate here. Voting is private, so a rule banning voting not enforceable. There's no point in making a rule that can't be enforced. Also, what makes sense will depend on the context, so a bright-line rule is not appropriate. Instead, I think it makes the most sense to focus on norms and principles, and what we'd advocate for. Our general principle is that of self-governance: a site is run by the site's community, and we want policy decisions to be made by those who are part of the community, rather than by outsiders. We'd also like people to be informed about the issues before voting. Generally speaking, we'd probably discourage people who aren't active in the community and aren't informed about the issues from voting on policy questions. Another principle is that of self-governance: empirically, communities seem to work better when they make their own decisions and are given authority and empowered to do that. So, if SE employees vote on a heated issue, there's a risk that this sense gets violated, and that can lead to dysfunctional results. I would hope that SE employees will take this into account before taking a position. But I think it's also important to recognize that there are situations where SE employees may have an important and valuable contribution to make. They may bring useful experience from other sites, or a helpful perspective. It would be great to have them involved in those cases. I also think it doesn't make sense to lump all SE employees together. To give an example, there may be a significant difference between a CM vs a marketing representative. A CM is likely going to bring a lot of experience in related matters, and I'd love to have CMs participating in our meta discussions. As a general rule of thumb, I think we should trust SE employees to self-assess the situation, and welcome and encourage them to participate in meta discussions and upvote or downvote posts if they feel that the benefits outweigh the risks. If it becomes a problem, we could discuss, but I don't think it's worth setting a more specific general rule. Lest it be unclear, I think it's absolutely appropriate for SE employees to participate in meta discussion by posting questions, answers, and comments. Finally, I'd like to provide some context. You mention "using voting powers, granted only as part of the employee mod diamond and not earned as privilege" -- I think some perspective is in order here. It only takes 101 reputation to have the privilege to upvote, and 125 reputation to have the privilege to downvote. Are we really arguing about a privilege that's granted to people at 101 reputation, or 125 reputation? There's nothing magical about the reputation threshold; it's a heuristic for identifying people who have some experience with the site and some exposure to the model. Indeed, you can gain 101 reputation via the association bonus with no experience or activity on the site at all, as long as you have some activity on some other Stack Exchange site. I think it's likely that most SE employees are going to have that at least as much as someone who uses their association bonus to upvote a post on Meta, or a new user who just received 125 reputation, so I can't see a big deal here with SE employees having that privilege. Related: Should Community Managers remain impartial during Moderator elections?.
{ "pile_set_name": "StackExchange" }
Impact of intimate partner violence on anxiety and depression amongst women in Ile-Ife, Nigeria. Research into intimate partner violence in the Nigerian environment has been limited. The objective of this study was to determine, amongst a sample of women attending the Enuwa Primary Health Care Center, Ile-Ife, the association between intimate partner violence and anxiety/depression. A descriptive cross-sectional study was conducted amongst 373 women who attended the antenatal clinic and welfare units of a primary health centre in Ile-Ife using the Composite Abuse Scale, the Hospital Anxiety and Depression Scale and a socio-demographic scale as instruments. Slightly over a third (36.7 %) reported intimate partner violence within the past year, 5.6 % had anxiety and 15.5 % were depressed. Anxiety and depression in the respondents were significantly associated with intimate partner violence. Women were ten times more likely to report being depressed and 17 times more likely to report anxiety if they were in violent relationships. This research has shown that the magnitude of intimate partner violence within the study population is comparable to those found in the developing countries. There are significant associations between intimate partner violence, anxiety and depression amongst the study population and this fact undoubtedly has implications for the mental health of the Nigerian woman.
{ "pile_set_name": "PubMed Abstracts" }
Q: How do you determine the proper rate of descent for landing? I'm trying to use a simulator to learn to land properly. One part that I'm finding really tricky is picking a proper rate of descent. I know I'm supposed to do my best to keep it so I have two red lights and two white lights on the Precision Approach Path Indicator (PAPI), but at the moment I basically am just eyeballing it and adjusting my course whenever the lights aren't right. I have to assume, though, that for any given airspeed there is a rate of descent I can maintain that will keep me right in the middle of the preferred glide slope for that airport. I just have no idea how to figure it out. Is there an application or formula that is preferred for this? Or is it time to learn Vector Calculus? PS- I did check this question to see if it related. But that question is about starting the descent from cruise. I'm talking about rate of descent for final. I did also check this answer, but it's about using the PAPI/VASI lights. I'm looking for a formula to figure out the proper rate of descent during final for a given speed. A: Assuming you want a 3 degree glide slope, just take 5 times your ground speed in knots as a starting point. As an example, approaching at 90kt ground speed in a light aircraft, go for 450feet per minute. at 140kt in a jet, try 700fpm. If you're flying a jet outside of 4 miles, and the controller wants you to keep the speed up at 200kt then descend 1000fpm. It's not perfect, but it works pretty well for a first guess, and you can adjust as necessary. Of course, your ground speed is not the same as your air speed, and even for a constant IAS it will likely vary as you descend and the wind changes. Another way to think about this is that a 3 degree glideslope is almost exactly 300ft per nautical mile. If you're 2 miles out and 700 feet up, then you need to descend a bit faster, conversely, if you're at 500 feet, you need to descend slower. A third related rule of thumb is that your final approach speed (in CAS, although IAS is good enough in most aircraft) is 1.3 times your stall speed in the landing configuration (Vso). So if you stall at 100 knots, you want to approach at 130KIAS. IFR approaches are all about having an initial guess at these numbers in your head, trying them out, and then adjusting as the conditions require. If you're good at the guesses then the adjustments will be very small.
{ "pile_set_name": "StackExchange" }
Q: Updating IIS 5.0 to IIS 6.0 I want to update the IIS server from 5.0 to 6.0 or higher. The condition is that I cant upgrade the server. My machine is Windows XP SP3 Is there any way I can only update the IIS. A: You can install IIS Express 7.5 on Windows XP. Note that the Express version is a lightweight (yet fully featured) version of IIS meant for development purposes, not production hosting. You shouldn't use Windows XP as a production server anyway.
{ "pile_set_name": "StackExchange" }
Nikolay Dobrokhotov Nikolay Nikolayevich Dobrokhotov (;  – 15 October 1963) was a Soviet scientist and metallurgist, Honored Worker of Science and Technology of the Ukrainian SSR, Academician of the Ukrainian SSR Academy of Sciences. Biography Nikolay Dobrokhotov was born on March 27, 1889 in Arzamas in Nizhny Novgorod Guberniya in the Russian Empire. His father Nikolay Nikanorovich Dobrokhotov was a telegraphist. His mother — Maria Fedorovna Vladimirskaya, graduate of Smolny Institute — was from the Vladimirskie family, many of whose members were engaged in social activities (maternal uncle — Mikhail Fyodorovich Vladimirsky — one of the oldest figures of the communist party, companion in arms of Vladimir Lenin), were friends of Maxim Gorky. Nikolay Dobrokhotov was the eldest son in a family of 12 children. There was no secondary school in Arzamas at that time and Dobrokhotov was sent to Nizhny Novgorod, where in 1900 he entered the Realschule. In 1907 he graduated from the Realschule and successfully passed the competitive examination in the metallurgical department of the Saint Petersburg Mining Institute. Here many famous professors and lecturers taught: E.S. Fyodorov on crystallography, N.S. Kurnakov on chemistry, I.A. Time on metallurgical engineering, A.F. Ioffe on thermodynamics, A.L. Baboshin on metallography and others. During his student years Nikolay Dobrokhotov actively collaborated in the student metallurgical study group, many times underwent practical training on metallurgical plants, worked as a designer, as a Martin foreman and held some other posts. In December 1914 he graduates from the institute. In 1914–1917 years Nikolay Dobrokhotov works on Perm Ordnance Factory, where he was engaged on mastering and improving the technology of artillery steel production. On May 11, 1915 Nikolay Dobrokhotov marries Elizaveta Ivanovna Zventsova (1891-1978) - daughter of Ivan Vasilievich Zventsov, a member of Zemsky Court in Kashin. Nikolay Dobrokhotov had 6 children, two of them died at an early age. In 1920 Nikolay Dobrokhotov joined as an Assistant Lecturer the Metallurgy Department of the Saint Petersburg Mining Institute, which was headed by Prof. V.N. Lipin. Here he worked till 1924. In these years Nikolay Dobrokhotov is formed as an independent young scientist - he explores some of the issues of gas-furnace heating engineering and publish many works in this area. In November 1924 Nikolay Dobrokhotov was appointed head of the Department of steel metallurgy and theory of furnaces of Ural Polytechnic Institute (which until then was headed by prof. V.E.Grum-Grzhimailo) and according to the decision of the State Academic Council of Narkompros of RSFSR of June 4, 1926 was approved in the academic rank of professor in the Department of steel metallurgy. The fall of 1929 Nikolay Dobrokhotov leaving on a business trip to metallurgical plants in Germany and the U.S. In 1930 in Sverdlovsk was arrested on charges of subversive activities. Then was arrested almost the entire management team of scientists and teachers of Ural Polytechnic Institute. On August 20, 1931 Sverdlovsk OGPU released Nikolay Dobrokhotov from custody by order of Moscow OGPU. To the release of Nikolay Dobrokhotov contributed Ekaterina Pavlovna Peshkova, wife of Gorky. In 1931, Nikolay Dobrokhotov moved to Moscow, started working the head of the furnace laboratory of the Central Research Institute of Machine Building and performed together with his staff research in gas-furnace heating engineering. Since January 1935 he was again working on his main speciality as a professor, head of the Department of steel metallurgy of Dnepropetrovsk Metallurgical Institute. By decision of the Higher Attestation Commission on April 11, 1938 Nikolay Dobrokhotov was approved in the degree of Doctor of Technical Sciences. By General Meeting of the Ukrainian SSR Academy of Sciences on February 22, 1939 Nikolay Dobrokhotov was elected an Academician of the Ukrainian SSR Academy of Sciences. On April 9, 1939 for his successful work in the ferrous metallurgy Nikolay Dobrokhotov was awarded the Order of the Red Banner of Labour. In the same year Nikolay Dobrokhotov was elected to the Dnipropetrovsk Oblast Council of People's Deputies. In August 1941 Nikolay Dobrokhotov evacuated to the Urals. During the German-Soviet War, he was associated with 16 plants, providing them with scientific and technical assistance in gas-furnace heating engineering and steel metallurgy, for which he was awarded a Medal for Valiant Labor in the Great Patriotic War of 1941-1945 and decorations as an eminent person in Tank and Metallurgical Industry. In December 1944 Nikolay Dobrokhotov moved to Kiev, worked as head of steel-smelting department of Ferrous Metallurgy Institute of the Ukrainian SSR Academy of Sciences and the head of the Department of steel metallurgy and industrial furnaces of Kiev Polytechnic Institute. On December 14, 1948 by General Meeting of the Ukrainian SSR Academy of Sciences Nikolay Dobrokhotov was elected a Chairman of the Bureau of the Department of technical sciences of the Ukrainian SSR Academy of Sciences. On initiative of Nikolay Dobrokhotov was created the Gas Institute of the Ukrainian SSR Academy of Sciences and he was appointed its director from September 1, 1949. By decree of the Presidium of the Supreme Soviet of the Ukrainian SSR dated February 3, 1951 Nikolay Dobrokhotov was given the rank of Honored Worker of Science and Technology of the Ukrainian SSR. By decree of the Presidium of the Supreme Soviet of the Ukrainian SSR dated May 3, 1954 Nikolay Dobrokhotov was awarded the Order of Lenin and by decree dated July 19, 1958 he was awarded the Order of the Red Banner of Labour. October 15, 1963 in Kiev, Nikolay Dobrokhotov died. He was buried in the Baykove cemetery of Kiev. In the name of Nikolay Dobrokhotov in Kiev was called street (Academic Dobrokhotov Street). Scientific and applied activities In 1921 was published the first scientific paper of Nikolay Dobrokhotov "About burning of oil shale in the gas generators". Nikolay Dobrokhotov created a new theory of furnaces, which was fundamentally different from the hydraulic (prevalent in the 1930s) in the substantive provisions and practical conclusions. He first showed that the movement of gases in furnaces is turbulent and not laminar in nature, and therefore the processes of mixing gas and combustion of fuel run through the laws of the turbulent and not laminar flow. Its essence is as follows: to improve heat transfer by convection and radiation, gases must move in the working space of the furnace as close to the surface of the heated subjects with the greatest possible speed; combustion of fuel at high temperatures is determined by the conditions of mixing it with oxygen. The chemical reaction of combustion occurs very quickly and does not limit the rate of fuel combustion process; length of the turbulent flame is proportional to the diameter of the fuel jet and does not increase with increasing of heat load at a constant ratio of fuel and air; geometric pressure of gases in furnaces is small in comparison with the kinetic energy of gases. Effect of geometric pressure can be neglected, considering only the forces of inertia and kinetic energy of gas flows. capacity of the furnace is necessary to determine not only by the quantity of supplied fuel in it, but the oxygen consumed by the furnace for combustion of fuel; the choice of transporting system of processed and received materials in the furnace, which determines the type of the furnace and is its main feature, is very important. This theory has opened new directions in the design of compact furnaces with forced movement of gases. In 1931-1935, he developed a new theory of metal heating and experimentally proved that the steel can be heated very quickly, ensuring high performance of furnaces with a perfect metal quality and its low waste. He also suggested a method of calculating the thermal and structural stresses arising during heating of steel products, that was the basis for the development of heating conditions, radically improved the process. Nikolay Dobrokhotov shown theoretically and in practice has proved the possibility and desirability of a sharp acceleration in the heating of steel products without deterioration, that completely changed the prevailing views on the permissible rate of their heating. Nikolay Dobrokhotov designed the heating furnaces and their equipment more than 35 years. According to his projects in 1929-1930 were built heating furnaces in rolling mills of Nizhneserginski and Nizhny Tagil metallurgical plants. N. Dobrokhotov proposed to increase the capacity of open-hearth furnaces to increase their productivity and reduce fuel consumption in steel smelting and later formulated the basic theses of the theory of intensification of heat work of open-hearth furnaces. With the use of the provisions made by him in the mid 1930s were upgraded 90-ton open-hearth furnaces of Nizhnedneprovsk metallurgical plant in the name of Comintern. Increased heat output of the furnaces made it possible to dramatically raise their productivity and exceed all previously known records of high-speed steelification. Later was improved design of open-hearth furnaces of many metallurgical plants. N. Dobrokhotov proposed to equip open-hearth furnaces with fans for air supply, with smoke exhausters for removal of combustion products, with front wall without arch and improved refrigerators. During the German-Soviet War, N. Dobrokhotov offers to hold ferromanganese deoxidation of boiling steel in the ladle, that was implemented in 1942 in one of the Ural plants. This method saved a large amount of ferromanganese, since when steel is deoxidized in the furnace of about 50% of it oxidized and was lost with the slag. For that time when as a result of military actions was lost main extraction base of manganese ore, this fact was of great importance. After World War II, N. Dobrokhotov, together with his disciples developed a theory of drying and firing of ceramic products based on a fundamentally new method. He scientifically substantiated, fast drying and firing modes of production, identified ways to improve the quality of ceramics. Under his guidance and direct participation was designed and put into operation at the Kiev factory of ceramic blocks first in Ukraine a strong tunnel kiln for firing of building and ceramic products. Technology and technique of using of natural gas in open-hearth production of the Soviet Union created mainly through the works of N. Dobrokhotov. Before him, the natural gas was used in a mixture with fuel oil. In 1959, N. Dobrokhotov with students suggested to heat three-way open-hearth furnaces with natural gas instead of a mixture of coke oven and blast-furnace gas. The method was first introduced at several furnaces of Zaporizhstal and K. Liebknecht plants, and then - in many plants of the country. N. Dobrokhotov develops basic theory and practice of deoxidation and alloying of finished steel in ladle with solid ferroalloys, use of which radically improved steelmaking process. It was first tested at the Volgograd metallurgical plant "Red October", and later - at the Izhevsk metallurgical plant in the name of 50 years of the USSR, at Kuznetsk metallurgical plant in the name of Lenin and at other plants. Implementing of it made it possible to increase the productivity of smelting furnaces, reduce haze of alloy additions and deoxidants, reduce the cost of steel and improve the quality of the material. N. Dobrokhotov developed a scientific basis for steel pouring at high temperatures to improve the quality, that gave rise to a new direction in the field of steel pouring to ingots and obtaining shaped steel casts, thereby improving their quality at all indicators. Before him there was an erroneous opinion that it was necessary to pour steel as slowly as possible. He laid the scientific basis for high-speed pouring of steel and has proved, that steel can be poured in three to four times faster without compromising quality of ingots. This increased the productivity of pouring bays of open-hearth workshops and twice reduced the employment of pouring spaces and equipment. N. Dobrokhotov proposed a new technology of direct receipt of iron from ore. By his instructions on metallurgical plant "Zaporizhstal" in the name of S. Ordzhonikidze were constructed semi-industrial devices - shaft furnace and the boiling bed reactor for direct reduction of iron by products of conversion of natural gas, by which were obtained necessary basic data for designing industrial units of this type. Major works 1. Furnaces for metal heating / D.V. Budrin, M.V. Groshev, V.F.Kopytov et al. Edited by academician N.N. Dobrokhotov M.-L.: GOSNTIML, 1941, 416 p. (in Russian) 2. Dobrokhotov N.N. About the dynamics of diffusion processes / Kiev: AS USSR, 1948, 39 p. (in Russian) 3. 4. References 1. V.S.Kocho, B.Kh.Khan. Nikolay Nikolaevich Dobrokhotov - Kiev:Izdatel'stvo akademii nauk USSR, 1959 (in Russian). 2. 3. 4. Category:1889 births Category:1963 deaths Category:Burials at Baikove Cemetery Category:Members of the National Academy of Sciences of Ukraine Category:People from Arzamas Category:Recipients of the Order of Lenin Category:Russian metallurgists Category:Saint Petersburg Mining University alumni Category:Soviet scientists
{ "pile_set_name": "Wikipedia (en)" }
The determination of caloric expenditure is an important component of any weight control or fitness program. The number of calories burned is generally estimated through the use of tabulated values for a given activity or by the use of workload measurements on exercise equipment such as treadmills or bikes. Neither, however, is particularly reliable. The tables are generally only average rates for a 70 kg individual performing each activity in some arbitrary, average manner. Certainly not very reflective of any given individual's caloric expenditures, the tables may vary as much as 50% from actual caloric expenditures. Exercise equipment having calorie calculators makes similar errors, and such equipment fails to provide any indication of total caloric expenditure for the day. A more reliable approach would be to actually monitor the caloric expenditure. The body's metabolic "engines" generate significant amounts of heat; at rest this heat generation is equivalent to that of a 100 watt light bulb. In the human body's attempt to maintain a body temperature of 98.6.degree. F., it controls heat loss to the environment by regulating blood flow to the body surface. At rest, blood flow to the skin is restricted and the surface of the skin may be as much as 20.degree. F. cooler than the body core. This results in a lower flux of heat to the environment. With exercise however, the excess heat generated by physical exertion (approximately 80% of the energy needed to contract human muscles is wasted as heat) must be dumped to the environment to maintain constant body temperature. Blood flow is diverted to the skin, raising its temperature and the rate at which heat is dumped to the environment is increased. As a homoiotherm, the body maintains a nearly constant internal body temperature by balancing the generation of heat by its metabolic process with controlled loss of heat through an orchestration of evaporative, convective, radiant, and conductive heat loss mechanisms. At rest in normal room temperature conditions, the body can utilize convective and radiant heat loss (with minor conductive heat loss contributions as well) to regulate body temperature, primarily by control of blood flow to the skin surfaces. If an individual is exercising or is in ambient temperatures above 35.degree. C., the convective and radiant heat loss is inadequate to control internal temperature and the body begins to utilize evaporative heat loss. Evaporation, both that which occurs insensibly (i.e. without obvious sweating) and sensibly (i.e. with obvious sweating) can provide several fold greater heat loss than the other two mechanisms combined. Heat flow can be accurately measured with a whole body calorimeter. This device is a chamber in which the subject is placed and the total heat given off by the subject's body can be captured and measured. The disadvantages of a whole body calorimeter are that it is expensive, relatively immobile, and the actions and motions of the subject are limited to the space within the chamber. See W. H. Close, M. J. Dauncey, and D. L. Ingram (1980), "Heat loss from humans measured with a direct calorimeter and heat-flow meters", Br. J. Nutr. 43, 87, pp 87-93. In order to overcome the disadvantages of the whole body calorimeter, a sampling technique using heat flow sensors has been developed to estimate the total heat loss from a subject by measuring heat loss on only a few selected locations on the subject's skin surface. Each measured value is multiplied by a "weighting co-efficient" in order to estimate the heat loss for that particular region of the subject's body. The sum of all regional heat loss components is the estimate of the total heat loss. One system of "weighting co-efficients" has been developed by Hardy and DuBois. See Archives of Internal Medicine, Vol. 17, No. 6, pp. 863-871 (1916). Traditional heat flow sensors are generally based on the measurement of the temperature differential that occurs across a material due to the thermal resistance of that material. In order for the sensor to accurately measure the heat flow, it must not add a significant insulating layer and it must lose heat from its surface in the same manner as the surface on which it is placed. The available heat flow sensors perform well on inanimate objects such as walls, doors, boilers, and pipes, where convective, radiant, and conductive heat loss mechanisms predominate. They are, however, inadequate for measuring heat loss from the human body, where evaporative heat loss may be significant. Current heat flow sensors, such as that produced by RdF, are unable to reliably include the component of evaporative heat loss from the body as part of its output signal for two main reasons; 1) such sensors actually occlude the surface of the skin, preventing evaporation; therefore, any moisture that does move from under the sensor evaporates from the skin surface adjacent to the sensor and not from the sensor surface itself, and 2) when used to monitor body heat loss, these sensors actually show a decreased heat flow as the evaporative heat loss increases, thereby reducing the skin surface temperature. Accordingly, a significant advance in the art could be realized if a heat flow sensor capable of measuring all components of heat loss, including evaporative heat loss, could be developed.
{ "pile_set_name": "USPTO Backgrounds" }
Storing translations in a database: The right way! When you are creating a website (or a webshop) targeting multiple countries and languages, you want to provide your visitors with localized content. For example in a webshop where you want to manage your products, some properties of the products are language invariant but others have to be translated. Because you keep all these products in a database you want to find an efficient way to store this information. Of course there are lots of ways to do this. There are several things we need to think about when storing translations. You don't want to have translations shattered all over your database You don't want to edit your database in case a new language has to be supported You want an efficient way to get the translated objects out of the database Keeping these rules in mind, I decided to find a way to keep track of localized content. Lets see how I did this! The setup In this example I won't be creating a website to illustrate the issue. Instead I have just created a console application which will add translated content to the database and retrieve the localized information. Using this example you will get the idea of writing and reading localized content to and from the database, and you will be able to implement it anywhere you like! I will start off with storing movies in a database and providing the localized content for user of different languages (think IMDB but very very basic!). Defining our object Actually we will have to define multiple objects to represent our front end (translated), and back end (with multiple translations). ​I have created a simple movie class which has an Id, Duration, Director, Title and Description. Now if we take a closer look at these properties, we can see that some of them are translatable like Title and Description, but others are not (Id, Duration & Director). So when we want to save this object to the database we will have to separate the translatable and non translatable properties. Back end (Translatable) Well have to split up our object into translatable properties and non translatable properties. Something like this: This Entity will always have a list of translatable details. One for each language in which the entity should be available. I have also defined a method GetTranslatedEntity that has to be implemented by each entity. Abstractions I have created an abstract class for our ITranslatableDetails because we will need this in our repository later. Our entity will derive from the abstract class EntityWithTranslatableFields and I have supplied MovieFrontEnd as our translated Entity and the MovieTranslatableDetails as our translatable details for this entity. I have made this interface generic so that we can reuse it later. All we have to do is specify for which entity and translated entity we want this repository to work for. Apart from that I have created a few methods to create and read items from the database. Now that we got our interface set up, lets create the actual repository. Again, I first created an abstract class as our base repository so that we can reuse this later. I won't go over this code line by line because it is easy to understand. Basically this is what happens: Read the seeded movie in English Read the seeded movie in Dutch If a second movie does not exist, create a second movie in English and Dutch Read all movies in English Wait to close the program This is the output of the program to confirm that it actually works: It works, now what? You might say yes it works, but it was a lot of work to get here. And you're 100% right! It was a lot of work to get to this point, but from now on it is really easy to create new entities with translatable fields! Lets do the test! Implementing a new entity Lets use something completely different class like "Shirt" to illustrate how easy and flexible this approach really is! 5. Create the repository 6. Profit! That's it, Finished! Go and enjoy a well earned beer with the time you saved! Wrapping up As you can see keeping translations in the database can be hard at first glance. But once you create a clean structure around it, and you make sure the whole thing is reusable, it's easy as pie! Using this approach you can safe yourself lots of time in implementing a multilingual website or any other application! I hope you have enjoyed reading this, as much as I did writing it! And if you have any questions or suggestions please feel free to comment below!
{ "pile_set_name": "Pile-CC" }
Somebody Loves You (1932 song) "Somebody Loves You" is a popular song. The music was written by Peter DeRose and the lyrics by Charlie Tobias. The song was published in 1932. One of the earliest recordings of the song was by Ted Lewis and his Band, recorded March 16, 1932 and released by Columbia under catalog number 2635-D. A British cover version was issued by Bob and Alf Pearson. The song is now a standard, recorded by many artists. Among the best-known versions were recordings by Eddy Arnold and Dean Martin. References Category:1932 songs Category:Songs with music by Peter DeRose Category:Songs written by Charles Tobias
{ "pile_set_name": "Wikipedia (en)" }
using System; using System.Collections.Generic; using System.Linq; using Foundation; using UIKit; namespace Baskervilles.iOS { // The UIApplicationDelegate for the application. This class is responsible for launching the // User Interface of the application, as well as listening (and optionally responding) to // application events from iOS. [Register("AppDelegate")] public partial class AppDelegate : global::Xamarin.Forms.Platform.iOS.FormsApplicationDelegate { // // This method is invoked when the application has loaded and is ready to run. In this // method you should instantiate the window, load the UI into it and then make the window // visible. // // You have 17 seconds to return from this method, or iOS will terminate your application. // public override bool FinishedLaunching(UIApplication app, NSDictionary options) { global::Xamarin.Forms.Forms.Init(); LoadApplication(new App()); return base.FinishedLaunching(app, options); } } }
{ "pile_set_name": "Github" }
Q: Should I invest my time in making my site HTTPS-only? I'm building a Django website that does not need to have registration/authentication. The only sensitive part is a form with a reCaptcha v2. Of course I'm embedding the CSRF token, which then I read with Javascript and send it with Ajax requests. Is HTTPS needed in this case? I'm somewhat confused, since as far as I know the token can be used only once. A: Is HTTPS needed in this case? In every case that I can think of HTTPS is beneficial. The trivial case is if you don't have sessions, why would you need a secure connection if there are no sessions and everything is public? Having a secure connection actually helps your Google PageRank, and it also helps the user feel more secure by visiting your site If you actually have sessions and dynamic content the benefits are of course more substantial. One easy way to implement SSL/TLS certificates is using CloudFlare or some similar service.
{ "pile_set_name": "StackExchange" }
Phyang Tsedup Festival Day 01: Arrive at Leh airport by morning flight from Delhi. This flight is one of the most sensational flights in the world. On a clear day from one side of the aircraft can be seen in the distance the peaks of K2, Nanga Parbat, Gasherbrum and on the other side of the aircraft, so close that you feel you could reach out and touch it, is the Nun Kun massif. Upon arrival you will be transferred to your hotel. You would take a little time to settle in and acclimatize since you have gone from a relatively low elevation in New Delhi to over 11,000 feet! During the afternoon, you can walk through the old town, beneath the Leh Palace, to allow you to get oriented to this fascinating city. Overnight in a hotel. Day 02: Phyang Festival + Sightseeing Visit to Phyang Monastery - enroute Spituk Monastery ( One of the major monasteries of yellow sect ) - Magnetic hill - later attend the festival for whole day - later go back. Phyang Festival is a monastic festival has sacred dance � dramas and the main attraction is the pilgrimages to the huge Thangka of Skyabje Jigten Gombo which is kept on exhibition during the two day festival. Enoy the inaugural day of the monastic festival at Phyang monastery , being the most vibrant and active monastery just located 15Kms west of Leh. Packed lunch will be served at the festival. Return to hotel in Leh for dinner and overnight stay. Day 03: Continue the festival The annual Tse-dup festival takes place at the Phyang Gompa, situated on a hill overlooking the Phyang village. The sacred dance-drama of the resident monks culminates with ritual burning of the votive offerings. On the occasion of this auspicious event, the huge antique thanka painting of Skyabje Jigten Gombo, the founder of the Dri-gung-pa monastic order, is exhibited for the public every 3rd year. Phyang Gompa is one of the best maintained gompas in Ladakh and lies only 17 kilometers west of Leh. Dressed in colourful bright brocades with vibrantly decorated and richly adorned paper-mache masks (some extending over 1 metre in height) the masked dancers simulate combat between good spirits and evil demons to the cacophony of drums, cymbals and long horns. The crowd unites in uproarious song and dance when the dough idol of evil is destroyed by the leader of black hat dancers signifying that good has prevailed. Today , after concluding the festival drive back to Leh Day 04: Leh - Alchi (HT 3250 M) - - Lamayuru Today you will drive to ALCHI. The complex of temples located within the village is the most celebrated of Ladakh's monasteries and dates back to the 11th century. The complex consists of a group of five temples as well as a number of chortens scattered around the complex. The Dukhang and the three-tiered Sumstek are the most significant. It is the seat of the Ngri Rimpoche, an incarnation at present embodied in the younger brother of the Dalai Lama. Alchi Gompa is the only monastery, built on flat ground. It is very famous for its paintings and architecture, which has an Indian and Kashmiri influence in them. dinner and an overnight stay.Drive to the 11th century LAMAYURU MONASTERY, which is spectacularly located along the valley plain and surrounded by mountains on all sides. According to legend, the arhat Madhyantika, a disciple of Buddha offered "torma' (sacred food) and water to the spirits inhabiting the site to satisfy them. A handful of rain spilled on the soil which caused barley plants to sprout in the shape of Yung-drung (swastika), hence its name Yung-Drung. The great yogi Naropa meditated in a cave, which today forms part of the monastery. The monastery has gradually expanded over the years and newer structures have been built around a large courtyard. The antiquity of this site is evident from the large number of chortens, similar to those at Alchi. After the visit you will be driving back to your hotel in Leh for an overnight stay. Day 05: Leh - Over Khardung La (HT 5602 M) - Hunder (HT 4350 M) (Nubra Valley) - approx 5 hrs The road journey from Leh to NUBRA VALLEY passes over KHARDUNG LA (the highest motorable road in the world) at 5602 M / 18,390 Ft, around 39 km from Leh. From the pass, one can see all the way south over the Indus valley to seemingly endless peaks and ridges of the Zanskar range, and north to the giants of the Saser massif. Nubra Valley is popularly known as Ldumra or the valley of flowers. It is situated in the north of Ladakh between the Karakoram and Ladakh ranges of the Himalayas. The average altitude of the valley is 10,000 Ft. above sea level. The Shayok and Saichen Rivers drain Nubra. The flat part of the river is sandy & occupied by green farms & myricaria. The villages look pretty with greenery, willow & poplar trees. Till partition Nubra Valley was one of the trade centers, the ancient famous Silk Route passed through this area. On arrival in Hundar you will be receive and check in the camp. Later walk to the sand dune to have unique opportunity to ride on a bacterian camel (double humped) amidst the sand dunes of this high altitude desert with snow capped mountains on the horizon. Back to Camp for overnight. Day 06: Hunder - Leh - approx 3 hrs After breakfast drive to witness the morning prayer and visit to DISKIT MONASTERY perched on a rock overhanging next to a stream, which provides the source of energy used by mills in the area. The monastery is rich, full of thangkas, magnificent giant statues, effigies of the Buddha and old mural paintings in which can be noted a multitude of influences. It was founded by Lama Sherab Zangpo of Stod around 1420 A.D. DISKIT is the main village or headquarters of Nubra Valley, which has a small market consisting of a row of shops. Later drive back to Leh. Overnight Hotel Day 07 : Leh � Delhi Transfer to the airport to fly to Delhi. Tour Ends
{ "pile_set_name": "Pile-CC" }
Q: Python Port Scanner 2.1 I made lots of changes to the script presented in my previous question. I was tempted to edit that one with the new code, but it would invalidate @200_success's helpful answer. It was also disallowed on a Meta thread. So I apologize for the new question, but it seemed like the right thing to do. Again, any and all tips are appreciated! Also, this is my first time writing any docstrings, so if I'm breaking convention, let me know. #!/usr/bin/env python3 import argparse import errno import functools import multiprocessing import os import platform import socket import time from concurrent.futures import ThreadPoolExecutor from concurrent.futures import ProcessPoolExecutor DEFAULT_HOST = '127.0.0.1' DEFAULT_TIMEOUT = 1 DEFAULT_THREADS = 512 PORT_RANGE = range(1, 65536) def tcp_ping(host, port): """ Attempts to connect to host:port via TCP. Arguments: host: IP address or URL to hit port: Port to hit Returns: port number, if it's available; otherwise False """ try: with socket.socket() as sock: sock.connect((host, port)) print(str(port) + ' Open') return port except socket.timeout: return False except socket.error as socket_error: if socket_error.errno == errno.ECONNREFUSED: return False raise def perform_scan(host, use_threads = False): """ Perform a scan on all valid ports (1 - 65535), either by spawning threads or forking processes. Arguments: host: IP address or URL to scan use_threads: whether or not to use threads; default behaviour is to fork processes Returns: list of available ports """ if use_threads: executor = ThreadPoolExecutor(max_workers = DEFAULT_THREADS) else: executor = ProcessPoolExecutor() with executor: ping_partial = functools.partial(tcp_ping, host) return list(filter(bool, executor.map(ping_partial, PORT_RANGE))) def is_address_valid(host): """ Validate the host's existence by attempting to establish a connection to it on port 80 (HTTP). Arguments: host: IP address or URL to validate Returns: bool indicating whether the host is valid """ try: with socket.socket() as sock: sock.connect((host, 80)) return True except socket.gaierror: return False except (socket.timeout, socket.error): return True def scan_ports(host = DEFAULT_HOST, timeout = DEFAULT_TIMEOUT): """ Scan all possible ports on the specified host. If the operating system is detected as Windows, the ports will be scanned by spawning threads. Otherwise, new processes will be forked. Arguments: host: IP address or URL to scan timeout: connection timeout when testing a port """ # Set defaults if CLI arguments were passed in but not specified if host is None: host = DEFAULT_HOST if timeout is None: timeout = DEFAULT_TIMEOUT # Strip the protocol from the URL, if present if '://' in host: host = host[host.index('://') + 3:] # Set the timeout for all subsequent connections socket.setdefaulttimeout(timeout) # Validate the IP/host by testing a connection if not is_address_valid(host): print('DNS lookup for \'' + host + '\' failed.') return # Perform the scan. On Windows, thread. On all others, fork. print('Scanning ' + host + ' ...') start_time = time.clock() if os.name == 'nt': print('Running on Windows OS.') available_ports = perform_scan(host, use_threads = True) elif os.name == 'posix': print('Running on *Nix OS.') available_ports = perform_scan(host) else: print('Unidentified operating system: ' + os.name + ' [' + platform.system() + ' ' + platform.version() + ']') available_ports = perform_scan(host) end_time = time.clock() print('Done.') # Display results print() print('Time elapsed: ' + format(end_time - start_time, '.2f') + ' sec') available_ports.sort() print() print(str(len(available_ports)) + ' ports available.') print(available_ports) def main(): arg_parser = argparse.ArgumentParser() arg_parser.add_argument('-ip', '--host', help = 'IP address/host to scan') arg_parser.add_argument('-t', '--timeout', help = 'Connection timeout in seconds', type = int) args = arg_parser.parse_args() scan_ports(args.host, args.timeout) if __name__ == '__main__': main() A: Trying to connect to TCP port 80 in order to check whether the DNS lookup succeeds is overkill. You should just call socket.gethostbyname(). A: I notice a few little things that I would adjust just from a housekeeping perspective. You import multiprocessing but I don't see where it is used.. I would remove if it is not needed. some small pep8 stuff - Keyword args should not have spaces around the equal, 2 blank lines between each function, and more than 80 line length on the argpase.add_arg near the bottom.
{ "pile_set_name": "StackExchange" }
Consumers build the income gap Wednesday Nov 30, 2011 at 12:01 AMNov 30, 2011 at 10:55 AM By WALTER WILLIAMS Benefiting from a hint from an article titled “Is Harry Potter Making You Poorer?” and written by my colleague John Goodman, president of the Dallas-based National Center for Policy Analysis, I’ve come up with an explanation and a way to end income inequality in America, possibly around the world. J.K. Rowling was a welfare mother in Edinburgh, Scotland. All that has changed. As the writer of the “Harry Potter” novels, having a net worth of $1 billion, she is the world’s wealthiest author. More important, she’s one of those dastardly 1-percenters condemned by the Occupy Wall Streeters and other leftists. How did Rowling become so wealthy and unequal to the rest of us? The entire blame for this social injustice lies at the feet of the world’s children and their enabling parents. Rowling’s wealth is a direct result of more than 500 million “Harry Potter” book sales and movie receipts grossing more than $5 billion. In other words, the millions of “99-percenters” who individually plunk down $8 or $9 to attend a “Harry Potter” movie, $15 to buy a “Harry Potter” novel or $30 to buy a “Harry Potter” Blu-ray Disc are directly responsible for contributing to income inequality and wealth concentration that economist and Nobel laureate Paul Krugman says “is incompatible with real democracy.” In other words, Rowling is not responsible for income inequality; it’s the people who purchase her works. We can’t blame just the children for the unfairness of income inequality. Look at how Wal-Mart Stores generated wealth for the Walton family of Christy ($25 billion), Jim ($21 billion), Alice ($21 billion) and Robson ($21 billion). The Walton family’s wealth is not a result of ill-gotten gains but rather the result of Wal-Mart’s revenue: $422 billion in 2010. The blame for this unjust concentration of wealth rests with those hundreds of millions of shoppers worldwide who voluntarily enter Wal-Mart premises and leave dollars, pounds and pesos. Basketball great LeBron James plays forward for the Miami Heat and earns $43 million for doing so. That puts him with those 1-percenters denounced by Wall Street occupiers. But who made LeBron a 1-percenter? It’s those children again, enabled by their fathers or some other significant male. Instead of children doing their homework and their fathers helping their wives with housework, they get into their cars, drive to a downtown arena and voluntarily plunk down $100 for tickets. The millions of people who watch LeBron play are the direct cause of LeBron’s earning $43 million and are thereby responsible for “undermining the foundations of our democracy.” Krugman laments in his Nov. 3 New York Times column, “We have a society in which money is increasingly concentrated in the hands of a few people, and in which that concentration of income and wealth threatens to make us a democracy in name only.” I’d ask Krugman this question: Who’s putting all the money in the hands of the few, and what do you think ought to be done to stop millions, perhaps billions, of people from using their money in ways that lead to high income and wealth concentration? In other words, I’d like Krugman to tell us what should be done to stop the millions of children who make J.K. Rowling rich, the millions who fork over their money to the benefit of LeBron James and the hundreds of millions of people who shop at Walmart. I’d like to end this discussion with a bit of a personal note. The readers of this column know that I never make charges of racism. Rowling is an author, and so am I. In my opinion, my recently published book “Race and Economics: How Much Can Be Blamed on Discrimination?” is far more important to society than any “Harry Potter” novel. I’d like to know what it is about me that explains why millions upon millions have not purchased my book and made me a billionaire author.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention This invention relates to a bus system for data transmission and, more particularly, to a digital data bus for communication within a digital data processing system. 2. Description of Prior Art Digital data buses are used in data processing systems, for example, for communication of digital data between a data processor and one or more peripheral devices, such as disc drive memories, terminals, or other data processing units. In general, data buses used in such systems are either synchronous, wherein data transfer is performed in synchronization with a clock signal, or are asychronous, wherein handshake signals synchronize the sending and receiving units. In a synchronous data bus system, all data transfers are performed in synchronization with a clock signal. That is, the operation of the sending and receiving units is synchronized to the clock. Such systems may utilize either a single frequency clock, or a multiple or variable frequency clock. A single frequency clock system allows the use of simple clock circuitry but data transmission rate, and thus operation of the overall system, is limited to the data rate of the slowest device in the data processing system. In a multiple or variable clock rate system, clock rate is selected to be that of the slower of the sending or receiving units currently communicating. Data rate may, however, be selected to be the highest achievable with the particular units which are communicating. A multiple or variable data rate synchronous system is, in general, more complex than a single clock rate system since the clock circuitry must be capable of generating a multiplicity of clock frequencies. Also, before data communication can be performed the sending and receiving units must communicate to select a clock rate. In an asychronous data bus system, as stated above, transfer of data between a sending and a receiving unit is synchronized by handshake signals. That is, a sending unit places data on the bus and transmits a handshake signal to the receiving unit indicating that data is present on the bus. When the receiving unit is ready to accept the data, the receiving unit accepts the data and transmits a handshake signal to the sending unit indicating that the data has been accepted. An asynchronous data bus system thereby allows greater flexibility of data rate and the data rate may be the maximum achievable between a particular sending and receiving unit pair. An asynchronous data bus system is in general, however, more complex than a synchronous system due to the requirement to exchange handshake signals between sending and receiving units. In addition, maximum data rate may not be achievable due to the requirement to resynchronize the data transferred at the sending and receiving units. That is, data must first be transferred from, for example, a disc drive, to a sending unit, then from sending unit to receiving unit, and finally from receiving unit to, for example, a data processor. Additional delays in data transmission will thereby be imposed at the sending end of the bus in transferring data from the peripheral device to the sending unit, and from the sending unit to the bus. This delay occurs because data transfer between the peripheral device and the sending unit is not synchronized with transfer of data from the sending unit to the data bus. Similarly, additional data transmission delays may be imposed at the receiving end because reception of data by the receiving unit is not synchronized with transfer of data between the receiving unit and the data processor. The present invention provides a solution to these problems of the prior art as will be discussed in detail hereinbelow.
{ "pile_set_name": "USPTO Backgrounds" }
New DNA findings for Unipolar depression In the past year we have contributed to a number of published papers that have used data from the Depression Case Control (DeCC) and Depression Network (DeNT) family studies. One of these studies found that variations in DNA (called copy number variants) were associated with recurrent depression. These findings are an important step toward identifying the biological underpinnings of the disorder.
{ "pile_set_name": "Pile-CC" }
# Write a function to sort a list of numbers. What is the runtime of the # algorithm that you have written? Can it be improved? # This is insertion sort, it is acceptable answer for this question but not # in many real-world circumstances. def sort(ls): for i in range(len(ls)): for j in range(i-1,0, -1): if list[j] > list[j-1]: tmp = list[j] list[j] = list[j-1] list[j-1] = tml
{ "pile_set_name": "Github" }
Postoperative courses of breast reconstruction using inferior adipofascial tissue repair. Nevertheless in breast conserving surgery, the dissection of inferior part of breast mound will cause severe deformity, which affects the patient's quality of life adversely. We have used an infra-mammary adipofascial tissue to repair the defect, and breast mound could be reconstructed concurrently in primary breast cancer surgery. From September 2009 to June 2012, we performed the infra-mammary adipofascial tissue repair (IATR) on 25 patients with breast cancer in inferior site of their breast mound. Surgeon makes the skin incision on the infra-mammary line and performs the quadrantectomy as planned. After verifying its negative surgical margin pathologically, we mobilize the adipofascial fat tissue associated with myofascia of the serratus anterior muscle from the infra-mammary area. This tongue-shaped flap is reflected back, and fills the defect of breast mound. We performed routinely examination, mammography, and ultra-sound echogram to the IATR patients who visited our hospital after 1 year from the end of treatment. We, furthermore, performed the QOL questionnaire (QOL-ACD and QOL-ACD-B) to them and retrospectively compared their data to that from the other breast surgery patients. All patients with IATR were treated with irradiation, and no image findings of a partial or total necrosis of the flap recognized 1 year after examination. They produced good cosmetic results; however, they could not elevate the QOL score on the whole.
{ "pile_set_name": "PubMed Abstracts" }
Q: Find all functions from $\mathbb{Z}$ to $\mathbb{Z}$ such that $f(x+y)=f(x)+f(y)$. Find all functions from $\mathbb{Z}$ to $\mathbb{Z}$ such that $f(x+y)=f(x)+f(y)$. We showed these claims: Claim1. $f(0)=0$. Claim2. $f(-x)=-f(x)$. But, how should I show that there is no other $g$ function from $\mathbb{Z}$ to $\mathbb{Z}$ which satisfies $g(x+y)=g(x)+g(y)$. A: Hint: Every positive integer is a sum of 1's.
{ "pile_set_name": "StackExchange" }
Organic polysulfides such as alkyltrisulfides are useful for many purposes such as additive for elastomers, as antioxidants for lubricating oils, as intermediate for the production of organic chemicals, insecticides, and germicides and as additive to diesel fuels to improve the cetane number and ignition qualities of these fuels. These compounds are also useful in the compounding of extreme pressure lubricants and in the acceleration of rubber treating processes. Such trisulfide compounds can be produced by reacting mercaptans with elemental sulfur in the presence of a basic catalyst. For example, Shaw (U.S. Pat. No. 5,530,163) discloses that organic trisulfides can be produced from a mercaptan and sulfur catalyzed by a basic catalyst. However, there is always a need to develop an improved process to produce an organic trisulfide compound for industrial uses.
{ "pile_set_name": "USPTO Backgrounds" }