text
stringlengths
0
3.78M
meta
dict
Robert Gibson and Orlando "Unc" Giles are the last people to leave the homeless camp along the Mississippi River in East St. Louis. They were slow packing up. Gibson, 59 years old with a long gray beard, had lived there more than three years and considered it home — a place with neighbors, regular routines and a sense of belonging. Giles, 51, arrived less than year ago but shared his friend's appreciation for the place. Rather than bouncing between shelters, imposing on relatives or sleeping on the streets, they had been able to settle in and control their own lives. But the collection of tents and wooden huts, which had sprawled into two camps, had grown too big and too public in recent months. Both camps were on private land, and when the owner decided it was time for everyone to go, the nearly two-dozen residents saw no choice but to clear out. A 30-day order to vacate was followed by a seven-day extension. In four hours, at midnight on February 26, the extension will expire, too. "You see how hectic it is," Gibson says, juggling phone calls from supporters checking to make sure he's OK. "We're trying to get things done." During the final days, Pastor Tina Crawford drove the men and two other camp residents back and forth across the river, trying to pin down driver's licenses and arrange appointments with service organizations. The bureaucratic untangling may pay off in benefits, but that is still in the future. The immediate concern is how to get their things out of their old home and into somewhere else. The way other residents moved out irritates the two men. They lived in the camp closest to the road, on a cracked concrete slab they call simply "the platform." The back camp, an intricate collection of homemade wooden huts with a communal kitchen at its center, was set out of sight in the woods. Residents supported each other, sharing food and chores. But in the stress of the order to vacate, people scattered in all directions and tempers spiked. Second- and third-hand accounts of who is getting help from which organizations ran rampant. Rumors of slights spread. "We supposed to be like a family," Giles says, "but when people get their places to go, they start downgrading us." He and Gibson decided to stick together. They spent the first part of the day pushing wheelbarrow loads of their stuff to their new place, a windowless cinder-block building that is a five-minute walk from the camps. A friend put down $25 to rent the space for Gibson. "It's not the Taj Mahal," Gibson says, leading the way to the new place, "but it's better than a tent." The one-room structure is small and dirty, and living there surely violates some sort of building ordinance. Gibson has killed eight brown recluse spiders by his count, smashing them against the walls with his thumb. But there is an honest-to-God door with a lock. The walls are not at risk of collapsing in a strong wind, and there is enough head space to stand up and even stretch your arms overhead without hitting tarp. "We're going to make it, ain't we," Gibson says to Giles. Gibson's twin bed is pushed against a wall, and an Army cot for Giles sits on the other side of the room. A single light bulb dangles overhead from an extension cord, powered by the generator chained up outside. There are still piles of clothes, tools and furniture to move from the platform, but that will have to wait. The men are worn out. They sit sipping 24-ounce cans of Milwaukee's Best Ice, gingerly flexing sore knees and shifting in their seats every few moments to realign aching backs. The air is filled with the smoke of Show-brand cigarillos. "We're chilling," Gibson says. After five weeks of stress, tonight feels like their first opportunity to relax. "Last night, I went into my tent, I sat down on the bed, and I just cried," Giles says. The place has potential, but there are already signs of trouble. Relatives of the landlord chastise Gibson for inviting visitors to the space, and he says they seem bothered after spotting Giles moving in. As long as the rent is paid and he is not causing problems, Gibson says, he should be able to do as he likes. "Come on, people, get your thumb off us," he fumes. The mood lightens as the hours pass. The two men soon fall into old tales of life in the camps, which often include wildlife encounters. Giles, a part-time DJ and natural storyteller, recalls the night he was walking back to his tent from the East St. Louis MetroLink station when a massive buck, brandishing a menacing set of antlers, stepped out of the fog and stared him down. Gibson has heard the story, but he still laughs out loud as his friend describes freezing in fear and then racing home when the buck finally sauntered away. "I ran in the tent," Giles says, his eyes going wide as he recreates the fright. "I put the lock on. I jumped in the bed fully clothed. I was shaking like a leaf." They have arranged a pair of folding chairs around a propane heater. A battered stereo sits on a small table near the wall. After a while, they pop open new beers and smoke more cigarillos. It is 1 a.m. when they finally turn out the light. "What it all boils down to," Giles says. "We — Orlando Giles and Robert Gibson — we went down with the ship." The next morning, the landlord orders them to move out.
{ "pile_set_name": "OpenWebText2" }
Q: position absolute left:50% does not position span in the middle I have a wrap div and inside I have a <span> position absolute to the wrap as it is an icon from Icomoon and I need to be part of the background. And then, at the same level that the <span>, another div, and inside this I have a <h1>, a <p>, an <input> and a <span>. I have positioned the <span> absolute to the wrap (which it has position relative), but although I want to put it in the middle, it just needs left:26%, which is not 50% at all! So the problem becomes when I resize the screen, that it doesn't stay in the middle of the wrap. I was wondering, why can it be caused? I posted another post a while ago because I wanted to include this problem in a JSFiddle but I couldn't work out how to include the fonts files in the JSFiddle so the icons don't appear there. Does anyone has a slight idea about what can I do to fix it? .containerOfSites { display: block; height: auto; float: none !important; margin: 0 auto; } .wrapPortalItem { padding: 0; } .insideWrapItem { text-align: center; border: 3px solid black; padding: 15px; position: relative; } .portalItem { background-color: rgba(255, 255, 255, 0.75); padding-top: 3%; padding-bottom: 10%; font-family: 'Open Sans', sans-serif; position: relative; } .portalItem p { margin-bottom: 40%; font-size: 30px; padding: 5px; } .portalItem p>span { font-weight: 900; } .portalItem span.viewMorePs { text-decoration: none; font-size: 18px !important; z-index: 999; } .portalItem h1 { color: #B5D803; font-weight: 900; text-transform: uppercase; text-shadow: 2px 2px 0 #fff; } .insideWrapItem span[class^="iconI-"] { position: absolute; color: white; bottom: 12%; left: 26%; /* <- */ font-size: 14em !important; } <div id="portalPage" class="col-md-24"> <div class="containerOfSites col-md-18 col-sm-24"> <div class="wrapPortalItem col-md-8"> <div class="insideWrapItem"> <span class="iconI-iconDA_automotive img-responsive"></span> <div class="portalItem portA "> <h1>AUTOMOTIVE</h1> <p>web sites<br /> for the<br /> <span> automotive<br /> </span> market</p> <a href="http://motors06.denison-automotive.co.uk/denison/"><span class="viewMorePsGreen">GO</span></a> </div> </div> </div> <div class="wrapPortalItem col-md-8"> <div class="insideWrapItem"> <span class="iconI-iconDA_web"></span> <div class="portalItem"> <h1>DESIGN</h1> <p>web sites<br /> for the small &<br /> large business<br /> for<span> all sectors</span></p> <a href="http://motors06.denison-automotive.co.uk/denison/denison-2/web-sites/"><span class="viewMorePsGreen">GO</span></a> </div> </div> </div> <div class="wrapPortalItem col-md-8"> <div class="insideWrapItem"> <span class="iconI-iconDA_yourbrand"></span> <div class="portalItem"> <h1>BRANDING</h1> <p><span>branding<br /> </span> and<br /> design</p> <a href="http://motors06.denison-automotive.co.uk/denison/denison-2/branding/"><span class="viewMorePsGreen">GO</span></a> </div> </div> </div> <div class="clearfix"></div> </div> </div> A: It's difficult to say exactly without seeing some code, but I'd guess your problem is the the left edge of your is sitting at 50% but you want the center of the to sit in the center of it's parent? Try something like this on the span (in addition to any other styles): span { position: absolute; left: 50%; transform: translateX(-50%); } This should move (trasnlate) the half of it's own width to it's left.
{ "pile_set_name": "StackExchange" }
A few days after a member of the mainly Palestinian Joint List in the Israeli Knesset, Jamal Zahalka, raised a political uproar by accusing his alleged allies from the Labor Party of being historically more racist than the extreme right, a letter to the editor appeared in the Haaretz newspaper. “I understand this harsh criticism,” the author wrote sarcastically. “Without the (Jewish) Left in 1948, the Palestinian people would have no Nakba (catastrophe); no Palestinian would have lost his home. On the contrary, the Palestinians would have gained a quarter of a million Jewish homes." This letter sums up the core of this sensitive issue still deeply dividing the Israeli left-wing camp between Jews and Palestinians. For many Palestinian citizens of Israel, the Labor movement which ruled over Israel in its founding years was not only historically responsible for exiling 750,000 Palestinians in 1948, it also robbed them of their property by building hundreds of kibbutzim on their lands. For most supporters of the Labor Party, like the writer of the letter, the actions of their predecessors in 1948 is something to be proud of: according to their side of the story, under the leadership of David Ben Gurion, their party led the Zionist movement, founded the state of Israel, and saved it from extinction by Arab invaders. The same kibbutzim that Zahalka complained about were their movement's finest achievement. Things have changed, of course, since 1948. While Mapai, the predecessor of the current Labor Party, ran Israel almost unopposed in its first 30 years, since 1977 Labor has won the elections only twice and its power in parliament has shrunk from 56 to 24 seats. The Palestinian minority, which was barely represented in Israel's first years, now holds 13 seats in the united Joint List formed in the last elections. And the Jewish left as well as the Palestinian minority are supposed to have a common enemy: Israel's right-wing coalitions. The finest hour of the coalition between Labor and Palestinian citizens of Israel came in 1992, when Prime Minister Yitzhak Rabin formed his government with their representatives for the first - and last - time in Israel's history. The Oslo agreement would not have been made possible without their support. In 1999, Palestinians voted massively in favor of Ehud Barak and helped put him in power. This story had a sour end: 13 Palestinian citizens of Israel were killed by police in demonstrations which followed the beginning of the Second Intifada in October 2000. The old memories of 1948's Nakba rose again. Since then, the Labor Party has treated the Palestinian minority as a mistress: it has counted on their votes in order to prevent the right-wing from forming a coalition, but did not see their representatives in parliament as fit to serve in a possible Labor-led government, preferring a "Zionist" coalition. No wonder the Palestinian citizens of Israel feel rejected. "The Labor Party takes us for granted," said Thabet Abu Ras, a political geographer and co-executive director of Abraham Fund. "And they treat us with patronage. We are supposed to vote for them, but we are not allowed to act in our own interests." Abu Ras gives the example of the Naturalisation Law which prevents Palestinians from the West Bank and Gaza from marrying Palestinians in Israel. This is an issue of deep emotional value for Palestinians. Labor leader "Buzi (Yitzhak) Hertzog wants to take care of 10,000 Syrian refugees but is not ready to allow for an Israeli-Palestinian to marry his loved one from the West Bank. This is hypocrisy," he said. The Labor party, remarks Abu Ras, was silent on many other civil issues concerning the Palestinian minority in Israel, from house demolitions in Palestinian cities and villages to redistribution of lands in a more just way toward Palestinian citizens of Israel. It is not the first time in which Zahalka, head of the far-left Balad party that is now part of the Joint List, accused the kibbutzim and the Ashkenazi Jews (Jews of European origin) that settled in them as responsible for the Palestinian tragedy. "The Ashkenzis took our land, not the Oriental (Mizrahi) Jews," he said in a televised interview in 2010. "Not those who shout 'death to the Arabs' but those who sang 'we bring peace on you,'" he added, referring to one of the most popular Zionist songs. Standing on the Knesset's podium last week, Zahalka went even further. "The right-wingers are much better than you,” he stormed. “The Likud established the settlements alongside Arab villages, but Labor established its kibbutzim atop the ruins of Arab villages. Give us back our land!” Abu Ras is uneasy about the tone of this attack. He also argues that the current right-wing coalition is much more racist and anti–Arab than the Labor Party. But he does have sympathy for the political thinking that lies behind Zahalka's speech. The formation of the Joint List in the last elections, assembling together all the political forces of the Palestinian minority for the first time, strengthened their political self-confidence, according to Abu Ras. This newfound political power enabled the Joint List to negotiate with Prime Minister Benjamin Netanyahu on fulfilling some civilian needs of the Palestinian minority in return for their support in a crucial vote on a controversial gas deal in the Knesset The negotiations did not lead to an agreement with the Joint List, but Abu Ras claims they represent a political maturity from the Palestinian minority's side. If the Labor party does not feel obliged to join in issues relevant to Palestinian citizens of Israel, Palestinians do not feel obligated to the Labor party's interests. The ultraorthodox Jews, who use their brokering political power to get financial benefits from the government, serve as an example. In his words in the Knesset and in other interviews, Zahalka has referred to a possible coalition between Palestinians and Mizrahi Jews, bypassing the "racist" Ashkenazi Jews who came from Europe. This hope, or rather dream, to revive good relations, which allegedly existed between Arabs and Jews in Palestine and elsewhere in the Middle East before the Zionist Jews came from Europe, is common to many Palestinians. Yossi Beilin, one of the architects of the Oslo agreement, wrote recently that Palestinian President Mahmud Abbas was convinced for many years that this was the way to achieve peace with the Israelis. But to no avail. During a television debate before the last elections, Ayman Odeh, the head of the Joint List, offered "an alliance of the transparent people" to Arie Der'I, head of Shas, a party representing mainly working-class Mizrahi Jews. Der'I flatly declined the offer. Palestinian citizens of Israel, as Abu Ras notes, may have a much clearer civil agenda. The problem is that they are still struggling to find a partner in this agenda outside the radical left. A quick look at the numbers may show that without the Palestinian minority, which represents more than 20 percent of the Israeli population, the Labor party, and the left in general, has a slim-to-none chance to win elections. But it seems it is not ready yet to pay the price of normalising its relations with the Palestinian minority and see it as a true partner and not just a supplier of votes. Zahalka's words were an expression of this frustration, but Abu Ras and other Palestinian leaders still hope they can change this attitude. - Meron Rapoport is an Israeli journalist and writer, winner of the Napoli International Prize for Journalism for a inquiry about the stealing of olive trees from their Palestinian owners. He is ex-head of the News Department in Haaertz, and now an independent journalist. ​The views expressed in this article belong to the author and do not necessarily reflect the editorial policy of Middle East Eye. Photo: Joint List MK Jamal Zahalka (L) delivers a speech next to fellow MK Ayman Odeh at the party's headquarters in the city of Nazareth on 17 March 2015 (AFP)
{ "pile_set_name": "OpenWebText2" }
Q: Transitions Maps on a Vector Bundle are Linear Let $E$ be a vector bundle, with $X$ base space and $p:E\to X$ a surjective projection. Let $x\in X$ be given. Let $U_1, U_2$ be two neighborhoods of $x$ in $X$ which carry local trivializations, that is, $$\varphi_1:p^{-1}(U_1)\cong U_1 \times V_1$$and $$ \varphi_2:p^{-1}(U_2)\cong U_2 \times V_2$$ are two homeomorphisms, where $V_i\in obj(Vect_{\mathbb{C}})$ for $i=1,2$. Then clearly, $$\left.\varphi_1\right|_{U_1\cap U_2}:p^{-1}(U_1)\cap p^{-1}(U_2)\cong U_1\cap U_2 \times V_1$$ and $$\left.\varphi_2\right|_{U_1\cap U_2}:p^{-1}(U_1)\cap p^{-1}(U_2)\cong U_1\cap U_2 \times V_2$$ are two homeomorphisms and thus $$\left.\varphi_2\right|_{U_1\cap U_2}\circ \left(\left.\varphi_1\right|_{U_1\cap U_2}\right)^{-1}: U_1\cap U_2 \times V_1 \cong U_1\cap U_2 \times V_2 $$ is also a homeomorphism. If $p_2:U_1\cap U_2\times V_2 \to V_2$ is the projection onto the second component, define the map $t_x:V_1\to V_2$ by $$ V_1\ni v_1 \mapsto p_2(\left.\varphi_2\right|_{U_1\cap U_2}\circ \left(\left.\varphi_1\right|_{U_1\cap U_2}\right)^{-1}((x,v_1))) \in V_2 $$ My question is: how do you see that $t_x$ is a linear homeomorphism and not merely a homeomorphism? A: Note that $\varphi_i : p^{-1} (U_i) \to U_i \times V_i$ are not mere homeomorphisms: they are local trivialization. That is, the following diagram commute $\require{AMScd}$ \begin{CD} p^{-1}(U_i) @>\varphi_i>> U_i \times V_i\\ @V p V V\ @VV p_i V\\ U_i @>>id> U_i \end{CD} and $\phi_i$ is linear when restricted to each fiber. This latter fact implies that the transition map is linear.
{ "pile_set_name": "StackExchange" }
Bears receiver Alshon Jeffery calls home every week. He wants to check in with Grandma Adell in St. Matthews, South Carolina. Often, it’s typical talk. She wants to know whether his game is on TV and wants to make sure he’s still catching those balls. But the moment is important. ‘‘I’ll call her two or three times a week just to hear her voice,’’ Jeffery said. ‘‘We had her 80th birthday party this offseason.’’ Jeffery’s grandmother is one of the most important people in his life. ‘‘That’s where I get my personality,’’ Jeffery said. It’s a personality he revealed during a 25-minute interview with the Sun-Times. He is one of the Bears’ most important players, but little is known about him because of his quiet, private nature. This season is undeniably huge for Jeffery, who was voted a team captain for the first time. One of the NFL’s best receivers, he is playing out the year on the franchise tag. A big payday is coming. Unlike other big-name receivers, though, Jeffery avoids the spotlight. Those close to him at Halas Hall describe him as humble, soft-spoken and laid-back. But there’s so much more to him. * * * ‘‘He’s a humble cat. Alshon is different, man. He comes from a small area in South Carolina. The humility he has, I can’t even think of another receiver to compare it to. That’s why myself and a lot of guys like him so much.’’ — Quarterback Connor Shaw, Jeffery’s teammate with the Bears and at South Carolina * * * Two stoplights. No Walmart. That’s how Jeffery describes his hometown of St. Matthews, which had a population of 2,021 in the 2010 census. There are Chicago-area high schools with larger populations. ‘‘Everybody knows everybody,’’ Jeffery said. ‘‘It’s a good town. Quiet. Peaceful. You try to support everybody.’’ Jeffery’s background is blue-collar. His father, Charles, worked for a lumber company before taking a job at the University of South Carolina in facilities. His mother, Deloris, worked in a factory. Jeffery is the third of four brothers. The others are Charles, Darren and Shamier. ‘‘My mom and dad used to tell me to always respect people, to give them the utmost respect because respect is going to take you further than anything,’’ Jeffery said. With his parents working, Jeffery spent the bulk of his young life with Grandma Adell, his mother’s mother. He learned many life lessons from her, and he recites them with a smile. ‘‘Be patient.’’ ‘‘Never rush things.’’ ‘‘What’s going to happen is going to happen.’’ ‘‘You should live your life and just enjoy it.’’ ‘‘Don’t judge.’’ ‘‘I would just see the things that she would go through and how she viewed life,’’ Jeffery said. There were personal hardships and grief. Jeffery said his grandmother lost family members, including a son. ‘‘She always just stayed positive,’’ he said. ‘‘She would feed everyone in the neighborhood if she can.’’ Looking at Jeffery the football player, one message stands out. ‘‘She never liked anybody being loud or obnoxious,’’ he said. ‘‘She always liked to be chill and just relaxed.’’ * * * ‘‘He did a lot more listening than he did talking, but he always had that expression in his eye that he knew what you were talking about. He understood what we trying to do.’’ — Former South Carolina receivers coach Steve Spurrier Jr. * * * Jeffery’s first love was basketball, and he was a star. At Calhoun County High, his teams lost only two games in four years and won four state titles. ‘‘My town, we’re known for basketball,’’ said Jeffery, who called himself a slasher. ‘‘I can make a few shots here or there when I’m feeling it.’’ Jeffery jokingly said one of the two losses deserves an asterisk because he missed it for the Shrine Bowl of the Carolinas, an all-star game for the best football players in the state. On the field, it’s obvious where the basketball comes in. Few, if any, defensive backs can beat Jeffery on jump balls. But he also understands football. He’s more than a go-up-and-get-it receiver. Spurrier Jr., who helped recruit Jeffery to South Carolina, recalls a player who spent countless hours watching film. ‘‘He wasn’t an arrogant guy,’’ said Spurrier Jr., who now works at Oklahoma. ‘‘You didn’t know exactly what he would develop into. But you knew he had a special range and a special trigger to play the game.’’ Los Angeles Rams passing coordinator Mike Groh, the Bears’ receivers coach from 2013 to 2015, also remembers Jeffery’s study habits. The difference was how he analyzed defensive backs and other receivers. ‘‘He is one of those gym-rat kind of guys,’’ Groh said. During a recent practice, Jeffery didn’t like a red-zone concept and spoke up. He thought the Bears should do something else. ‘‘It was a really good idea,’’ offensive coordinator Dowell Loggains said. ‘‘It was a really good thought. We changed it on the field. He’s a sharp guy. As coaches, we very much respect his football knowledge.’’ As far his reliable, strong hands, Jeffery said that started in St. Matthews. The Jeffery boys were athletes. Shamier, the youngest, followed Alshon to South Carolina as a receiver. But Charles, the oldest, is said to be the best athlete of the bunch, an absolute superstar in high school. ‘‘He used to throw balls to me so hard all the time,’’ Jeffery said. ‘‘That’s the reason why I always try to catch the ball and everything with my hands. He’d be 10 feet or not too far from me and throwing it real hard, so I had to catch it.’’ * * * ‘‘Believe it or not, Al’s a real people person, a caring person who looks out for others. If we’re out somewhere [among fans], he’ll be like, ‘Hey, man, let’s take this picture for somebody.’ Or it’s, ‘Come on, man, let’s sign something.’ ’’ — Bears receiver Josh Bellamy * * * The menu at Bears receivers coach Curtis Johnson’s house is Louisiana Cajun, and the mood at the frequent dinners is light. The purpose is for the players to ‘‘put their hair down,’’ Johnson said. It’s for fun. ‘‘The joke’s on me a lot,’’ Johnson said. ‘‘I guess they try to impress my wife or whatever. They talk about me just like a dog.’’ And they talk about everything, especially Jeffery. ‘‘It’s a little different than some of the guys I’ve been around,’’ said Johnson, 55, a longtime coach in the NFL and college. ‘‘I can talk about whatever. We can talk about taxes. We can talk about religion. He’s smart, and then he’s down-to-earth. He can make a conversation about different subjects and different things that most guys can’t or won’t.’’ What is Jeffery into? As far as food, Bellamy said Jeffery loves the lobster tempura at Fleming’s and the cheesesteak egg rolls at Sullivan’s, though Jeffery’s diet has changed. ‘‘He used to be a fat boy, but I can’t eat with him anymore,’’ Bellamy said, laughing. ‘‘He changed up his diet. He’s been eating that crazy healthy stuff.’’ Asked about Jeffery’s home, receiver Cameron Meredith painted a picture of a simple place without much furniture or decorations. They go there to watch Netflix and play video games. NBA2K is Jeffery’s game. It often comes back to basketball. Jeffery said he roots for the Cubs and Blackhawks, but he proudly calls himself a ‘‘die-hard’’ Bulls fan. ‘‘Both of us didn’t like LeBron [James] when he went to Miami because of how he did it,’’ Johnson said. ‘‘But when he came back to Cleveland and was down 3-1, came back and beat Golden State — and how he did it — we feel he’s one of the top-five players.’’ * * * ‘‘If it doesn’t work out this year, next year I guarantee that the Chicago Bears are going to be a totally different team. We’re going to be a hell of a lot better. Right now, we’re just in the moment.’’ — Jeffery * * * Shaw was a struggling, inexperienced starter, and Jeffery was the older star bound for the NFL. But Shaw remembers how Jeffery treated him at South Carolina. ‘‘When he was coming out, the negatives on him were that he didn’t really have a quarterback to get him the ball,’’ Shaw said. ‘‘But he was always so positive with me. He was right there with the growing pains. In good and bad, he was always so positive. That’s what I remember about Alshon.’’ That’s Jeffery as a captain in a nutshell. Jeffery might be quiet, but his positive outlook connects with others. ‘‘Honestly, sometimes you never know what you’re going to get,’’ Meredith said. ‘‘But it’s going to be good because he’s always in a good mood.’’ Jeffery’s approach is St. Matthews-simple. ‘‘I want people around me to enjoy life like how I enjoy life,’’ he said. That kind of optimism matters at Halas Hall, this year or beyond. ‘‘I really believe in this team,’’ Jeffery said. ‘‘And I know this team believes in me.’’
{ "pile_set_name": "OpenWebText2" }
Recognition sequence for the restriction endonuclease BglI from Bacillus globigii. Restriction endonuclease BglI recognizes the DNA sequence (Formula: see text) and cleaves each strand at the site indicated, thus generating 3' protruding ends. The recognition sequence was deduced by correlating mapping data with nucleotide sequence information and the position of cleavage was unambiguously determined by 32P labeling of 5' termini produced by BglI digestion.
{ "pile_set_name": "PubMed Abstracts" }
Pediatric fluid resuscitation after thermal injury. Fluid resuscitation after thermal injury in a child or infant can pose a set of unique and significant challenges. Many approaches to fluid resuscitation of children after burns exist, and most are nonevidence based. This review will highlight the important concepts involved in pediatric fluid resuscitation from thermal injury.
{ "pile_set_name": "PubMed Abstracts" }
How To Pass Ccna And Ccnp Exam In One Years Which should I pursue first CCENT or CCNA? I have to doTo earn this Cisco certification, you must pass the following exam(s): 300-101 ROUTE. Implementing Cisco IP Routing (ROUTE 300-101) is a qualifying exam for the Cisco CCNP and CCDP certifications.... To recertify, pass the ICND2 exam, or pass the current CCNA exam, or pass a CCNA Concentration exam (wireless, security, voice), or pass the current CCDA exam, or pass any 300 – XXX professional level or Cisco Specialist exam (excluding Sales Specialist exams), or pass a current CCIE or CCDE written exam. Cisco Certification Showdown—CCNA vs. CCNP SimplilearnThree Myths About Cisco Exams: One of the drawbacks to the Internet is that it allows myths and "friend of a friend" stories to spread quickly, and usually the story becomes more exaggerated as it's passed along. Cisco exams are no exception. Here are three often-repeated myths and exaggerations regarding the CCNA and CCNP exams. 1. The survey you fill out before the exam determines the... The best way to pass the CCNA exam can be different depending circumstances. One person's best path to exam success may not yield the same result for another. That being said, we can look at three different generalized paths. You can choose the one you think best fits your circumstance and get started on the correct path for exam success. Please note that none of these options are better than Cisco CCNP Security 300-208 Killtest25/10/2006 · I'm considering jacking my job in and studying for my CCNP full time. I currently hold a CCNA and MCSE certification, however I want to move away from desktop/server support which I've been doing for the last 5 years and move over to hardcore networking. how to make the dot symbol This is a free GNS3 CCNP Labs course. The course helps you prepare for the following Cisco exams: NOTE: I am adding more content to the course, so expect it to grow. CCNP Route ⋆ https//ipcisco.comYes, exams are changing with new CCNP Routing and Switching; if you want to get current CCNP certification, then you must take and pass the exam before January 30, 2015. * Exam 642-902 (ROUTE) is being replaced by 300-101 ROUTE and 642-902 ROUTE will reach its end-of-life on January 30, 2015. how to make goo with cornflour and water CCNA certification is valid for three years from the day you pass the exam. Other CCNA tracks (such as CCNA Security and CCNA Cloud) and all professional-level certifications are also measured in three-year certification spans. One method of retaining certification is to pass a higher-level certification. If an individual holding a valid CCNA certification is willing to earn a CCNP Routing and How long can it take? 7 Tips on How to Crack CCNP Exam in First Attempt How much time will it take to pass the CCIE after a CCNA For How long Each Paper of CCNP is VALID ?? CCNP - IT CCNA Training » CCNA FAQs & Tips 9tut.com CCNP Route ⋆ https//ipcisco.com How To Pass Ccna And Ccnp Exam In One Years The Cisco 300-101 exam is one of three tests that one must pass in order to progress in the CCNP Routing and Switching or CCDP certifications. This test … Video training course for the Cisco CCNP TSHOOT 300-135 exam. This is one of three exams you need to pass in order to qualify as a CCNP RS. TSHOOT is usually taken last because it tests you on your ability to troubleshoot many of the technologies you learned in the ROUTE and SWITCH exams. We provide all our ASQ Certification 300-101 exam training material in PDF format, which is a very common format found in all computers and gadgets. Regardless of whichever computer you have, you just need to download one of the many PDF readers that are available for free. Pass the CCNA it is good for three years, pass any professional level exam, (1 of the 4) required for CCXP and as you pass each one, the NA counter resets for another three years. Complete the CCXP certification and pass another professional level exam (1 of CCIP, CCDP) extra, and XP counter and NA counter resets for three years..... Validity. CCNP™ certifications are valid for three years. To recertify, pass any 300-Series exam that is part of the professional level curriculum or any CCIE/CCDE written exam before the …
{ "pile_set_name": "Pile-CC" }
Damsels In Distress: Why Do So Many Contemporary Women Read Old-Fashioned Romance Novels? – I know most of you have probably already seen this (and check out the “addendum,” too, if you haven’t already), but for those who missed it, here is the 4,385,328th statement about Romance that completely misses the significance of both the genre and the feminist movement. Some of the responses are great, though, and it’s interesting to note — once again — how many preconceptions and stereotypes about genre Romance are still so popular and so easily unquestioned. “But I must wonder why so many women – forty years after the women’s liberation movement, Roe vs. Wade and the pill have transformed the lives of women in the most dramatic of ways – continue to indulge in the fanciful tales of females so unlike them who live in fantasy worlds light years removed from their reality?”International Business Times ’50 shades of no’: Critics slam taxpayer-funded romance novel website – More on the campaign against the Popular Romance Project. Note the connection to 50 Shades, which has become kind of a catchall for “this has no value” within certain circles. One of the many reasons I’m so frustrated by the Romance community’s persistent vilification of the series. Anyway, here’s one more balanced quote in the piece: “‘While funding a study on the development of romance in popular books and movies might not be at the forefront of what we deem necessary as far as funding through taxpayer money goes, it certainly has its place in U.S. culture,’ said author and screenwriter Ariane Sommer. ‘And a rather large place it is. For romance, basic needs aside, is likely the biggest motivator in our lives. As a taxpayer I would rather see my money go to cultural projects and education than, say, invasive body scanning machines at airports or subsidizing the ingredients of junk food.'”Fox News Investor sues Barnes & Noble over misstatements, SEC probe – Aaannd, the first derivative shareholder suit is filed against Barnes & Noble. The plaintiff, an attorney from New York, has filed in New York County Supreme Court (the New York equivalent of Superior Court in other states), and has named some of the company’s executives as defendants. Corporate executives have fiduciary duties to the company and its shareholders, and they can be sued for allegedly violating those duties. The idea behind these suits is that shareholders can bring suit against a company, if they believe that those directly responsible for managing the company are not doing so or are acting unethically or illegally. Consequently, even though they are ostensibly filing against the company, they are, in essence, doing so on behalf of the company. “‘The restatement and the accounting allegations under investigation by the SEC are only two symptoms of a pervasive deficiency of internal controls at Barnes & Noble impacting many areas of the company’s operation and reporting,’ Shaev said in the lawsuit.”Los Angeles Times Shia LaBeouf May Have Plagiarized His Apology for Plagiarism – Actor and documentary filmmaker Shia LaBeouf recently came under attack for plagiarizing the comic strip Justin M. Damiano, by Daniel Clowes, and in a twist that underscores the initial violation, has allegedly, and ironically, plagiarized part of his apology. Which, if you read his tweets, isn’t so much of an apology (see previous point about underscoring the problem): “More importantly, there’s the absolutely surreal, yet apparently true, revelation that this apology about plagiarism was itself plagiarized, as noticed by Andrew Hake on Twitter and that LaBeouf has already been caught once before specifically plagiarizing an apology. Let’s look again at that first tweet, shall we?”Wired Spare Rib contributors sought so editions can be digitised and saved – Since several of today’s stories have a feminist twist of them, I figured I’d top things off this this, a rather informative discussion of Spare Rib, a magazine that “charted the grassroots feminist movement through 239 editions,” from 1972 to 1993. The British Library needs permission from a majority of the magazine’s contributors in order to digitize all of the issues. It certainly seems like a good reminder of all the work that has been and still needs to be done to secure social equity around issues implicating gender, sexuality, and race. “The magazine sought to provide an alternative to the traditional gender roles. Cover headlines such as “Doctor’s Needles not Knitting Needles”, “Cellulite – the slimming fraud” and “Why women starve themselves” ran alongside articles featuring women as diverse as country and western singer Tammy Wynette, of Stand by your Man fame, or US political activist Angela Davis, who was interviewed about black women and revolutionary freedom.” The Guardian Share this: Like this: isn't sure if she's an average Romance reader, or even an average reader, but a reader she is, enjoying everything from literary fiction to philosophy to history to poetry. Historical Romance was her first love within the genre, but she's fickle and easily seduced by the promise of a good read. She approaches every book with the same hope: that she will be filled from the inside out with something awesome that she didnʼt know, didnʼt think about, or didnʼt feel until that moment. And she's always looking for the next mind-blowing read, so feel free to share any suggestions! 24 Comments In regards to the whole “romance is trash thingy”, ain’t nothing new here. The only thing I’ll say is I have always looked on romance novels as happily anti-feminist. But I consider this a positive. Whenever I read of a self-proclamed “spokesperson” of women yelling about how bad traditional marriage is for women (except of course for polygymy which is now “sex positive” and all about “diversity”) or shrilly yammering on about evil men, I just laugh. There’s a reason romance is so popular and its not because of “fear of heteronormativity” or “exploration of gender roles.” Its because romance presents a VERY pro-marriage POV and men are GOOD. I love romance for these reasons. I suspect I’m not the only one. I should have followed my instincts and not even clicked through on that first news item. How, and why, do people who have no understanding of the romance genre and its variety of characters and scenarios deem themselves fit to ‘report’ on it? And how is it that so many years after the start of the women’s lib movement so many women still don’t have a clue what feminism really means? One of the many reasons I’m so frustrated by the Romance community’s persistent vilification of the series. I know this is a general statement but it made me question how I portray and respond to this series. I have multiple issues with it but I don’t think I vilify it. I hate that it’s fanfiction that was P2P and that’s got nothing to do with it being romance. I also hate how it portrays what is supposed to be a healthy BDSM relationship – hell a healthy relationship in general. I voice these opinions anytime I get into a discussion about this series, but while I may have no respect for the books and author, and indeed quite a bit of disgust for the books, I still pretty strongly feel ‘to each their own.’ Rambling aside – I guess I wonder what you mean by vilify. Admittedly, this is pretty much my only source for romance ‘news’, so I’m probably missing some stuff that’s happening elsewhere. Of course, it’s a shame that women, even smart, accomplished women read such trashy, unrealistic stuff like romance whereas men disdain fantasy in favor of more realistic, meaningful, intellectual fiction, as epitomized by Jack Reacher and Jack Ryan, not to mention the movie favorites James Bond and Rambo. Why do people consistently opine that “so many smart, successful women like romance novels?” Does it occur to no one that maybe because a lot of really awesome people enjoy romance that the genre might have some great qualities? And be worthy of more than just dismissive scorn? *internally rages* I must be very peculiar because it would never occur to me to spend any significant time analyzing “why” people read whatever it is they choose to read (serious literature, commercial fiction, or comics). Whatever one’s personal preference, the most likely reason he or she reads any genre is to be entertained and, on occasion, provoked in some way. When I pick up an historical romance, I want to be swept away to another time and place for five hours. I’m not consciously thinking about comparisons to reality, or forward movement in womens’ rights, etc. I’m not trying to make any statement about who I am or how smart I am (or am not…LOL). I’m just having FUN. I think writers (especially romance writers) are used to critics, who can sometimes be offensive in the way they bash what or how something is written (which makes me want to ask them to redirect their energy into creating something of their own instead of tearing down the efforts of a writer who did their best to entertain others). But while there is surely value in “objective” book reviews (like those on this site), I have to wonder why anyone needs to bash readers for what they choose to read? Seriously, let’s just be happy people are still reading. And frankly, romance and love are at the root of most of life’s happiness, so it shouldn’t surprise anyone that romance stories are popular. I am consistently bothered by the perceived homogeneous nature of Romance in the popular media. For all its many formulas, this is such an incredibly diverse genre in so many ways, and there are so many different reasons that it might appeal to people. mari and I appear to be basically polar opposites in terms of our sociopolitical views, and the fact that both of us have nevertheless found a lot to love within the same genre, for very different reasons, is a testament to that diversity. So the way in which these articles always seem to assume that we romance readers are all exactly the same, the books are all exactly the same, everyone’s tastes and preferences and motivations for reading are all exactly the same… it reminds me of how in so many other forms of media you have the one token female character whose personality is “female” (and also of this conversation I once had with a thankfully-ex-roommate which concluded with him saying ‘So what I’ve learned from you today is that different women are different‘ as though this were the most novel thing he’d ever heard). I wish that some sort of acknowledgement that romance novels and romance readers are in no way uniform or identical didn’t seem like such a pipe dream. It just seems that the author of that article does not like the romance genre and, therefore judges it and its readers. It is rather childish to have the “I don’t enjoy this and if you do there is something wrong with you” mentality. People like what they like. I remain disturbed by the notion that feminism is somehow anti-man and anti-marrige (referencing mostly Mari’s comment above). Feminism pointed out the ways in which our culture shapes the relationships– legal, emotional, and more— that we must all navigate and how women (in particular) are personally affected by this. I don’t believe it’s anti-marriage to ask that the legal structure of marriage not place one of the partners in a legally inferior position. It’s not anti-marriage to ask that our partners recognize unequal burdens and work to address that in a mutually acceptable and equitable manner. Certainly there are romance novels in which the relationship that leads to marriage is “traditional” with all that means about the dominance and submission of cis-gendered roles. But there are more romance in which the marriage is negotiated through a relationship that does not assume traditional roles. I would argue that Romance novels that substantiate a relationship in which both the partners have arrived at a place in the relationship that gives each of them what they need and want — as opposed to what our culture says they should need and want is by definition feminist. It’s one thing to be in a marriage that imposes an unfair distribution of rights and responsibilities (legal, emotional, etc) and quite another to enter into a marriage where both parties are self-determined as to what their relationship looks like. Feminism gave us the idea that women have the right to determine their fates in and out of marriage and that marriage need not mean loss of agency. Plenty of Romance novels show us women who do exactly that. @Angela: I agree, but I think unless people first hand experience modern romance its hard to put away those prejudices when there’s SO much of it. Kinda sad, but true. Still, doesn’t give him the right to bash on a genre that is so clearly feminist. I sincerely hope romance readers don’t have to with stuff like this fifty years from now, but its doubtful. I would argue that Romance novels that substantiate a relationship in which both the partners have arrived at a place in the relationship that gives each of them what they need and want — as opposed to what our culture says they should need and want is by definition feminist. “The only thing I’ll say is I have always looked on romance novels as happily anti-feminist.” This may be the strangest thing I’ve heard about the modern Romance genre in a while. The most basic premise of modern Romance novels is that people, including women, get to choose with whom they want to have relationships and, possibly. marry. Characters that deny women agency are usually the villains. Where do you think these idea originated? The modern Romance genre is very feminist. […] “But I must wonder why so many women – forty years after the women's liberation movement, Roe vs. Wade and the pill have transformed the lives of women in the most dramatic of ways – continue to indulge in the fanciful … […] “(…) clearly something is missing in the lives and experiences of tens of millions (maybe even hundreds or millions) of contemporary ladies. ” What a moronic statement. Judging people by their hobbies. Claiming that a woman must be unhappy or missing something if she enjoys reading about it. “Still, I would suggest that if someone is enamored with romantic novels, one should perhaps eschew the contemporary books and read the beautiful, deep and moving works of 19th century women authors like Jane Austen and the Bronte sisters – they combined romanticism with cold hard reality and profound insights in humanity.” Clearly the article’s author has read every single contemporary book from every single author and realized that ALL romance books are old-fashioned. But oh, everyone sounds intelligent and well-read if they mention Jane Austen… even if they only watched the movie adaptations of her books. @Carolyn Jewel: Dear Carolyn Jewel, would you please write about the romance genre and its feminism? Not only do you know how to perfectly articulate it, but you’re an amazing writer. Sincerely, Brigid @Diana I was being sarcastic. The thing that annoys me the most about the denigration of the romance genre is that men’s popular fiction is just as unrealistic. Take Lee Child’s Jack Reacher. He’s 6’8″ for starters, he’s, like just about every male hero, wildly attractive to women. Women he’s worked with are secretly in love with him, to the point that they’ve never married and drop everything to run and help. He can kill with one karate chop when fighting a highly trained bad guy with a gun. He’s pretty typical. Even Robert Langdon of the Da Vinci code starts out looking like an ordinary guy, but it turns out he’s the only guy in the world who can break the secret and in the end of the book, he, of course, gets the hot, much younger girl who is — get this, not even James Bond topped this — a direct descendent of Jesus!!! But, that’s realistic, right? All the people who read Dan Brown and Lee Child book weren’t sad, sorry losers who could be reading, say, Moby Dick, if they knew what was good for them. @SAO: My comment wasn’t directed at yours at all. Sorry if it came across that way! It was just a general observation/thought I had when I finished reading the original article, not a reaction to you. :) I completely agree with what you’re saying about perceptions regarding fiction written for/by men and books written for/by women. There aren’t very many (that I’ve seen) condescending pieces written about the intelligence of men who enjoy reading spy or military oriented genre novels. But, of course, anything to do with women’s fiction is highly scrutinized, mocked and pretty openly dismissed. Really depressing! Tweets Copyright FTC Disclaimer We do not purchase all the books we review here. Some we receive from the authors, some we receive from the publisher, and some we receive through a third party service like Net Galley. Some books we purchase ourselves. Login
{ "pile_set_name": "Pile-CC" }
Bedford Bypass The Bedford Bypass, internally designated as Trunk 33, is a highway in the Canadian province of Nova Scotia. The Bedford Bypass is the name given to a long 4-lane highway connecting Windmill Road (Trunk 7) in Dartmouth to Exit 1 of Highway 101 in the Lower Sackville area of the Halifax Regional Municipality. The highway is not visibly assigned with a route number; however, it is assigned Trunk 33 by the provincial transportation department as an unsigned highway. Many maps incorrectly show it as an eastern continuation of Highway 101. The road was built in 1977 to connect the eastern end of Highway 101 and to accommodate nearby truck (mainly B-Train) traffic from the nearby Burnside Industrial Park, relieving traffic from the center of the former town of Bedford and the steep hill entering the town. The posted speed limit is 90 km/h (55 mph). Exit list References Category:Nova Scotia provincial highways Category:Roads in Halifax, Nova Scotia Category:Limited-access roads in Canada
{ "pile_set_name": "Wikipedia (en)" }
Confidence in delegation and leadership of registered nurses in long-term-care hospitals. Effective delegation improves job satisfaction, responsibility, productivity and development. The ageing population demands more nurses in long-term-care hospitals. Delegation and leadership promote cooperation among nursing staff. However, little research describes nursing delegation and leadership style. We investigated the relationship between registered nurses' delegation confidence and leadership in Korean long-term-care hospitals. Our descriptive correlational design sampled 199 registered nurses from 13 long-term-care hospitals in Korea. Instruments were the Confidence and Intent to Delegate Scale and Multifactor Leadership Questionnaire. Confidence in delegation significantly aligned with current-unit clinical experience, length of total clinical-nursing experience, delegation-training experience and leadership. Transformational leadership was the most statistically significant factor influencing delegation confidence. When effective delegation integrates with efficient leadership, staff can deliver optimal care to long-term-care patients.
{ "pile_set_name": "PubMed Abstracts" }
package tlv import ( "bytes" "errors" "io" "io/ioutil" "math" ) // MaxRecordSize is the maximum size of a particular record that will be parsed // by a stream decoder. This value is currently chosen to the be equal to the // maximum message size permitted by BOLT 1, as no record should be bigger than // an entire message. const MaxRecordSize = 65535 // 65KB // ErrStreamNotCanonical signals that a decoded stream does not contain records // sorting by monotonically-increasing type. var ErrStreamNotCanonical = errors.New("tlv stream is not canonical") // ErrRecordTooLarge signals that a decoded record has a length that is too // long to parse. var ErrRecordTooLarge = errors.New("record is too large") // Stream defines a TLV stream that can be used for encoding or decoding a set // of TLV Records. type Stream struct { records []Record buf [8]byte } // NewStream creates a new TLV Stream given an encoding codec, a decoding codec, // and a set of known records. func NewStream(records ...Record) (*Stream, error) { // Assert that the ordering of the Records is canonical and appear in // ascending order of type. var ( min Type overflow bool ) for _, record := range records { if overflow || record.typ < min { return nil, ErrStreamNotCanonical } if record.encoder == nil { record.encoder = ENOP } if record.decoder == nil { record.decoder = DNOP } if record.typ == math.MaxUint64 { overflow = true } min = record.typ + 1 } return &Stream{ records: records, }, nil } // MustNewStream creates a new TLV Stream given an encoding codec, a decoding // codec, and a set of known records. If an error is encountered in creating the // stream, this method will panic instead of returning the error. func MustNewStream(records ...Record) *Stream { stream, err := NewStream(records...) if err != nil { panic(err.Error()) } return stream } // Encode writes a Stream to the passed io.Writer. Each of the Records known to // the Stream is written in ascending order of their type so as to be canonical. // // The stream is constructed by concatenating the individual, serialized Records // where each record has the following format: // [varint: type] // [varint: length] // [length: value] // // An error is returned if the io.Writer fails to accept bytes from the // encoding, and nothing else. The ordering of the Records is asserted upon the // creation of a Stream, and thus the output will be by definition canonical. func (s *Stream) Encode(w io.Writer) error { // Iterate through all known records, if any, serializing each record's // type, length and value. for i := range s.records { rec := &s.records[i] // Write the record's type as a varint. err := WriteVarInt(w, uint64(rec.typ), &s.buf) if err != nil { return err } // Write the record's length as a varint. err = WriteVarInt(w, rec.Size(), &s.buf) if err != nil { return err } // Encode the current record's value using the stream's codec. err = rec.encoder(w, rec.value, &s.buf) if err != nil { return err } } return nil } // Decode deserializes TLV Stream from the passed io.Reader. The Stream will // inspect each record that is parsed and check to see if it has a corresponding // Record to facilitate deserialization of that field. If the record is unknown, // the Stream will discard the record's bytes and proceed to the subsequent // record. // // Each record has the following format: // [varint: type] // [varint: length] // [length: value] // // A series of (possibly zero) records are concatenated into a stream, this // example contains two records: // // (t: 0x01, l: 0x04, v: 0xff, 0xff, 0xff, 0xff) // (t: 0x02, l: 0x01, v: 0x01) // // This method asserts that the byte stream is canonical, namely that each // record is unique and that all records are sorted in ascending order. An // ErrNotCanonicalStream error is returned if the encoded TLV stream is not. // // We permit an io.EOF error only when reading the type byte which signals that // the last record was read cleanly and we should stop parsing. All other io.EOF // or io.ErrUnexpectedEOF errors are returned. func (s *Stream) Decode(r io.Reader) error { _, err := s.decode(r, nil) return err } // DecodeWithParsedTypes is identical to Decode, but if successful, returns a // TypeMap containing the types of all records that were decoded or ignored from // the stream. func (s *Stream) DecodeWithParsedTypes(r io.Reader) (TypeMap, error) { return s.decode(r, make(TypeMap)) } // decode is a helper function that performs the basis of stream decoding. If // the caller needs the set of parsed types, it must provide an initialized // parsedTypes, otherwise the returned TypeMap will be nil. func (s *Stream) decode(r io.Reader, parsedTypes TypeMap) (TypeMap, error) { var ( typ Type min Type recordIdx int overflow bool ) // Iterate through all possible type identifiers. As types are read from // the io.Reader, min will skip forward to the last read type. for { // Read the next varint type. t, err := ReadVarInt(r, &s.buf) switch { // We'll silence an EOF when zero bytes remain, meaning the // stream was cleanly encoded. case err == io.EOF: return parsedTypes, nil // Other unexpected errors. case err != nil: return nil, err } typ = Type(t) // Assert that this type is greater than any previously read. // If we've already overflowed and we parsed another type, the // stream is not canonical. This check prevents us from accepts // encodings that have duplicate records or from accepting an // unsorted series. if overflow || typ < min { return nil, ErrStreamNotCanonical } // Read the varint length. length, err := ReadVarInt(r, &s.buf) switch { // We'll convert any EOFs to ErrUnexpectedEOF, since this // results in an invalid record. case err == io.EOF: return nil, io.ErrUnexpectedEOF // Other unexpected errors. case err != nil: return nil, err } // Place a soft limit on the size of a sane record, which // prevents malicious encoders from causing us to allocate an // unbounded amount of memory when decoding variable-sized // fields. if length > MaxRecordSize { return nil, ErrRecordTooLarge } // Search the records known to the stream for this type. We'll // begin the search and recordIdx and walk forward until we find // it or the next record's type is larger. rec, newIdx, ok := s.getRecord(typ, recordIdx) switch { // We know of this record type, proceed to decode the value. // This method asserts that length bytes are read in the // process, and returns an error if the number of bytes is not // exactly length. case ok: err := rec.decoder(r, rec.value, &s.buf, length) switch { // We'll convert any EOFs to ErrUnexpectedEOF, since this // results in an invalid record. case err == io.EOF: return nil, io.ErrUnexpectedEOF // Other unexpected errors. case err != nil: return nil, err } // Record the successfully decoded type if the caller // provided an initialized TypeMap. if parsedTypes != nil { parsedTypes[typ] = nil } // Otherwise, the record type is unknown and is odd, discard the // number of bytes specified by length. default: // If the caller provided an initialized TypeMap, record // the encoded bytes. var b *bytes.Buffer writer := ioutil.Discard if parsedTypes != nil { b = bytes.NewBuffer(make([]byte, 0, length)) writer = b } _, err := io.CopyN(writer, r, int64(length)) switch { // We'll convert any EOFs to ErrUnexpectedEOF, since this // results in an invalid record. case err == io.EOF: return nil, io.ErrUnexpectedEOF // Other unexpected errors. case err != nil: return nil, err } if parsedTypes != nil { parsedTypes[typ] = b.Bytes() } } // Update our record index so that we can begin our next search // from where we left off. recordIdx = newIdx // If we've parsed the largest possible type, the next loop will // overflow back to zero. However, we need to attempt parsing // the next type to ensure that the stream is empty. if typ == math.MaxUint64 { overflow = true } // Finally, set our lower bound on the next accepted type. min = typ + 1 } } // getRecord searches for a record matching typ known to the stream. The boolean // return value indicates whether the record is known to the stream. The integer // return value carries the index from where getRecord should be invoked on the // subsequent call. The first call to getRecord should always use an idx of 0. func (s *Stream) getRecord(typ Type, idx int) (Record, int, bool) { for idx < len(s.records) { record := s.records[idx] switch { // Found target record, return it to the caller. The next index // returned points to the immediately following record. case record.typ == typ: return record, idx + 1, true // This record's type is lower than the target. Advance our // index and continue to the next record which will have a // strictly higher type. case record.typ < typ: idx++ continue // This record's type is larger than the target, hence we have // no record matching the current type. Return the current index // so that we can start our search from here when processing the // next tlv record. default: return Record{}, idx, false } } // All known records are exhausted. return Record{}, idx, false }
{ "pile_set_name": "Github" }
Q: How can I correctly document an extension method in C#? I am just starting to look at the C# documentation standards. Here's a method that I have: /// <summary> /// Reformats a key in x.x format to 0x0x format /// </summary> /// <param name="dotFormatRowKey">key in ##.## format</param> public static string DotFormatToRowKey(this string dotFormatRowKey) { if (! Regex.IsMatch(dotFormatRowKey, @"\d+\.\d+")) throw new ArgumentException("Expected ##.##, was " + dotFormatRowKey); var splits = dotFormatRowKey.Split('.') .Select(x => String.Format("{0:d2}", Int32.Parse(x))) .ToList(); var joined = String.Join(String.Empty, splits.ToArray()) return joined; } Can someone give me advice on how I should document the input and return parameters for this method. Also when I do this will the documented comments be available to a person if they use VS2010 intellisense? A: As for how you should document the parameters: i think thats pretty subjective but the way you did it now looks ok to me. Altho you could maybe change your return variable joined into something more verbose, like "keyFormattedString" or something. as for the second part of your question: Also when I do this will the documented comments be available to a person if they use VS2010 intellisense? Quote taken from msdn: Extension methods are only in scope when you explicitly import the namespace into your source code with a using directive. If the method is inside some class in a class library, then they will have to reference that library into their current solution, in order to use/see the method and documented comments. You can basically make a new class library with all your extension methods in it, and then import that DLL to whatever solution you're working on. Let's say that you have a class library, then you simply add using ExtensionMethodsLib; // or whatever you'll call it to your using statements, on whatever page you might need it. Extension methods (msdn)
{ "pile_set_name": "StackExchange" }
Studies on platinum-promoted sulfated zirconia alumina: effects of pretreatment environment and carrier gas on n-butane isomerization and benzene alkylation activities. A series of platinum-promoted sulfated zirconia alumina catalysts (SZA) with different amounts of platinum (0.5, 1, and 2 wt%) were synthesized. Two other catalysts were prepared by mechanically mixing different proportions of the Al-promoted sulfated zirconia with Pt/Al(2)O(3). The 650 degrees C calcined catalysts were characterized by N(2) adsorption/desorption (BET), TPR, and TPD analysis. Butane isomerization activity of the catalysts was studied at 270 degrees C, varying the pretreatment environment and carrier gases. Though the textural properties of the catalysts did not change significantly with platinum loading, the maximum surface area of 116 m(2)/g was exhibited by the catalyst with 1 wt% Pt loading. Under the studied reaction conditions, the air-pretreated catalysts (sulfated zirconia alumina (SZA) and platinated SZA) showed higher n-butane conversion than the N(2)-pretreated catalyst. However, nitrogen was a better carrier gas than H(2), CO(2) or air, and CO(2) and air deactivated the catalyst very fast. Unlike the platinated SZA catalysts, the mechanically mixed catalysts showed an induction phenomenon. A redox mechanism is suggested for butane isomerization over these catalysts. The catalyst SZA was also found to be active for alkylation of benzene with isopropanol, which gave 93% selectivity toward cumene.
{ "pile_set_name": "PubMed Abstracts" }
Boston Red Sox’s David Ortiz raises his hand while taking the oath of citizenship along with 220 other immigrants during naturalization ceremonies at the John F. Kennedy Library, in Boston, Wednesday, June 11, 2008. National Hispanic Heritage Month, which runs from Sept. 15 through Oct. 15, celebrates the histories, accomplishments and contributions of Hispanics and Latinos. Here are seven athletes who have used their platforms to showcase their pride and uplift their communities: Carmelo Anthony NBA superstar and three-time Olympic gold medalist Carmelo Anthony never had the chance to grow up with his Boriqua dad, Carmelo Iriarte, who died when he was 2 years old. But it’s no surprise that the Houston Rockets guard, outspoken especially when it comes to social inequity, is the son of a former member of the Young Lords, a Puerto Rican nationalist group that worked alongside the Black Panthers in the 1960s and 1970s. Anthony, who has a Puerto Rican flag tattoo on his right hand, has exhibited his love for the island by building and restoring basketball courts through the Carmelo Anthony Foundation, founding North American Soccer League expansion franchise Puerto Rico FC and putting together relief efforts after the devastation of Hurricane Maria in 2017. Victor Cruz Super Bowl XLVI champion turned ESPN analyst Victor Cruz was born to a Puerto Rican mother and an African-American father. The wide receiver played all six of his years in the NFL with the New York Giants and famously celebrated touchdowns by dancing salsa merengue in the end zone. His grandmother, Lucy Molina, taught the Paterson, New Jersey, native how to dance the Caribbean rhythm. David Ortiz The 10-time All-Star and three-time World Series champion David Ortiz played most of his MLB career with the Boston Red Sox before retiring in 2016. Ortiz finished 17th on MLB’s all-time home run list, hitting 541 home runs over his 20-season career. Ortiz’s nickname is a nod to his native Dominican Republic. On the island, people refer to each other, even strangers, as “papi.” When Ortiz became a part of the Red Sox organization, he couldn’t remember anybody’s name, not even those of his teammates, so he would call them “papi” just as he would back home. “It’s just a friendly thing, a sign of respect,” Ortiz said in an interview with The Boston Globe in 2015. “After a while, they started calling me ‘Papi’ in return, and then it became ‘Big Papi.’ It took off.” Ortiz, who became a U.S. citizen in 2008, has never forgotten where he came from. He founded the David Ortiz Children’s Fund to help children in both Boston and the Dominican Republic receive lifesaving cardiac treatments. Massy Arias Celebrity fitness trainer and CoverGirl ambassador Massy Arias identifies as both a black woman and a Latina. When she moved to the United States from the Dominican Republic at 14, she knew almost no English. The 28-year-old now speaks English fluently. But when she addresses her 2.5 million followers on Instagram, she is always sure to communicate in both English and her native Spanish. Sophina DeJesus The UCLA gymnast Sophina DeJesus caught the world’s attention, including more than 32 million views on Facebook, with a floor routine against Utah in 2016 . The then-21-year-old rocked royal blue ombre box braids and incorporated the most popular dances at the time — Whip, Nae Nae, Quan and Dab — into her performance. The half African-American, half Puerto Rican scored a 9.925, helping her team secure a win. Maria Isabel Urrutia In 2000, Maria Isabel Urrutia became the first Colombian to win a gold medal at the Summer Games in Sydney. And she did it after tearing cartilage in her knee the previous year at the Pan-American Games. After winning the women’s 75-kilogram weightlifting event, the Colombian used her gold medal to address the guerrillas who kidnapped approximately 80 people from her home city. ”I’m sending a special message to them … hoping they take pity on the families of all the people they have in captivity,” the weightlifter said from Sydney. After retiring from competition, Urrutia was elected twice to the Chamber of Representatives of Colombia from 2002 to 2010 before transitioning into coaching. Idalys Ortiz Idalys Ortiz, a Cuban judoka, won her most recent Olympic medal, a silver, at the 2016 Rio Games. She won the gold medal in the over 78-kilogram division at the 2012 Olympics and won bronze at the 2008 Games in Beijing when she was 18, making her the youngest Olympic medalist in the heavyweight category.
{ "pile_set_name": "OpenWebText2" }
Ent-Kaurane diterpenes from Annona glabra and their cytotoxic activities. A new ent-kaurane glycoside, annoglabasin H (1), and three known ent-kauranes, annoglabasin E (2), annoglabasin B (3), and 19-nor-ent-kaurent-4-ol-17-oic acid (4) were isolated from the fruits of Annona glabra. Their structures were determined by the combination of spectroscopic and chemical methods, including 1D- and 2D-NMR spectroscopy, as well as by comparison with the NMR data reported in the literature. The cytotoxic activities of these compounds were evaluated on four human cancer cell lines, LU-1, MCF-7, SK-Mel2, and KB. Compound 1 exhibited significant cytotoxic activity on all tested human cancer cell lines with IC50 values ranging from 3.7 to 4.6 μM.
{ "pile_set_name": "PubMed Abstracts" }
Q: Define ~ on x by (a1,a2, ...) ~ (b1, b2, ...) if ai = bi for 1 <= i <= k. Find a bijection between X/~ and N x N x .... x N Here is the full question written out: My professor defined a bijection f: N x N x ... N -> X/~ as f((a1, ..., ak)) = (a1, ..., ak, 0, 0, ...). I do not understand how she got this bijection. Here is her full answer if that helps: A: I will present an alternative solution to this problem. In the first place, recall that $X / \sim$ is the set of all equivalence classes induced by $\sim$, that is, $X / \sim$ is the collection of all the sets of the form $$[(a_1,a_2,\dots)] = \{ (b_1,b_2,\dots) \in X :\, a_i = b_i \textrm{ for all } i=1,\dots,k \}$$ where $(a_1,a_2,\dots) \in X$. So, define $f : (X/\sim) \to \mathbb{N}^k$ by the rule $$f \big( [(a_1,a_2,\dots)] \big) = (a_1,a_2,\dots,a_k).$$ We claim that $f$ is, in fact, a function. To see this, it suffices to prove that $$\textrm{if $[(a_1,a_2,\dots)] = [(b_1,b_2,\dots)]$ then } f \big( [(a_1,a_2,\dots)] \big) = f \big( [(b_1,b_2,\dots)] \big), \tag{1}$$ but this is easy, since $[(a_1,a_2,\dots)] = [(b_1,b_2,\dots)]$ tell us that $(a_1,a_2,\dots) \sim (b_1,b_2,\dots)$ and then $a_i=b_i$ for $i=1,\dots,k$, that is, $(a_1,a_2,\dots,a_k) = (b_1,b_2,\dots,b_k)$. Hence, $f$ is well-defined. Now, to prove that $f$ is a bijection, we need to prove that $f$ is injective and that is surjective. To see the injectivity, show that the converse of $(1)$ is also true. The surjectivity is also very easy, given $(c_1,c_2,\dots,c_k) \in \mathbb{N}^k$, the sequence $(c_1,c_2,\dots,c_k,0,0,\dots) \in X$ satisfies that $$f \big( [(c_1,c_2,\dots,c_k,0,0,\dots)] \big) = (c_1,c_2,\dots,c_k)$$ showing that the image of $f$ is the whole $\mathbb{N}^k$, you agree? Let me know if you need help showing the injectivity.
{ "pile_set_name": "StackExchange" }
A 63-year-old male presented to the emergency department being shot with a hunting shotgun from a distance of more than 10 m. He had multiple entry wounds from pellets in the neck, thorax, abdomen, scrotum and upper extremities, with no exit wounds. He was haemodynamically stable and had a whole body CT scan with no intravenous contrast because of chronic renal insufficiency. A pellet adjacent to the left common carotid artery was demonstrated, accompanied by a limited hematoma. Additionally, a pellet was shown next to the trachea, and multiple pellets throughout his torso. Carotid Duplex demonstrated a pellet embedded in the posterior-medial wall of the left common carotid artery, producing a focal intraluminal protrusion of the intima with no tear ([Fig. 1](#F1){ref-type="fig"}). Bronchoscopy was normal. Repeat duplex and bronchoscopy after 48 hours did not show any change. Clopidogrel 75 mg once daily was prescribed and he was discharged after five days. At six months the patient was asymptomatic and repeat Duplex showed no interval changes. Retained intramural pellet has not been previously reported for the carotids. Additionally, no retained intramural missiles or foreign bodies elsewhere in the cardiovascular system have been reported except for the myocardium. There is lack of data regarding the natural history of such a carotid pellet, but the experience from the myocardium is that, in the absence of infection, completely embedded missiles are usually asymptomatic, tolerated well and may be left in place.[1)](#F1){ref-type="fig"} It is prudent for our patient to be on a life-long follow-up with duplex ultrasound in order to reveal possible complications like dissection, erosion and pseudoaneurysm or arteriovenous fistula formation. Another possible late complication could be intimal erosion and pellet migration to intracranial circulation, as has been previously described in acute cases.[@B2] Lead toxicity, another well-recognized late complication can occur months to years after the event.[@B3] ![A Duplex ultrasound six months after the injury depicts the subintimal pellet in the initial position with an acoustic shadow.](jcu-19-105-g001){#F1}
{ "pile_set_name": "PubMed Central" }
Re: Watertown, PA (Rping Thread) I sat calmly in my desk chair, spinning idly in front of the microphone as Guinnivere by CSN&Y aired. It was 4:57 am. My shift was over at 6:30. But that didn't mean much, seeing as Matt would show up whenever at his own discretion for his shift after mine. Quite the entrepeneur. As the song ended, I reached for the mic, ready to broadcast, when the door to my left flew open, slamming into my chair, making me toss down the mic from my desk. "What the Hell!" I looked up as Dan flopped down a folder of papers onto the desk. "Apparently-" he said raking his hands through his hair "you gotta broadcast this on the station" "What?" "Yeah, thats government issue stuff" I looked at him jokingly, "Don't you think if it's that damn important, everyone else is gonna be reading the same thing?" "Dammit Mick, I guess everyone who can hear it needs to! Just get that shit on air!" He slammed the door behind him as he left. I swung my feet up onto the desk. "Don't let the door hit your ass on the way out" This was pretty weird. I mean, it isn't every day that we are obligated to broadcast some important information. I set up another song, so I'd have a minute to leaf through papers. I didn't read the whole first page, just scanned words. And as far as I could tell, this was pretty goddamn weird. I opened the door and poked my head out. "So Dan, what the hell is this all about anyway?" I was not graced with an answer. "Dan?" I looked at, Shelly, she was our receptionist. "Where'd he go?" She didn't look up from the computer "Oh, he went out" "Ah" I began to close the door as the sickening metallic crunch rang from the street out front. "Holy shit..." I jumped out of the chair and looked at Shelly who only stared at the front door. "C'mon!" I yelled at her. I walked to the door, not really knowing what to expect. As I opened it, the first thing I registered was Dan reeling on the walk, and then his car sitting in the road. "Hey man" I asked "Whats going on?!" His faced wavered between me and what was lying in the road. "Oh holy shit" The man lay contorted in the street. His torso turned 180 degrees to face behind him, his arm twisted behind his back, and the glass from the windshield lodged in his face. Agonizing could not describe how the man looked. For the first time in my life, I actually felt faint; and feeling like I was about to vomit, I was still attempting to register the original scene at hand when the dead man began to reach his arms towards the calf of Dan. Re: Watertown, PA (Rping Thread) Fine! Lets go, but try any shit, and I'll blow your ass away! As we walked past Matt, I saw the concern on his face, but right now the most important thing was to make sure our refuge was secure. Why did you break into my house in the first place? I asked Wayne. Re: Watertown, PA (Rping Thread) "Mercy, thats none of your business at this point I snapped" realizing that she could never understand how I had lived during the past few days breaking and entering was routine. Something about this house was different. I didn't want her to know I had to kill the last group of survivors because they wasted our supplies to quickly. Mercy, insisted so I turned away and said, this house was just as good as any, would you have rather me turned into one of those things?" I asked hoping I would hear my answer. Re: Watertown, PA (Rping Thread) No, I guess not, I replied. Okay, show me this place is secure so we can eat, I'm starving. Wayne showed me where he had entered and he had re-secured it. I was about to say something when suddenly I heard a voice on the radio downstairs. (I had left it on the local channel, just in case). OMG, did you hear that? I said. Re: Watertown, PA (Rping Thread) "DAN!!" He turned around as the man wrapped both hands around his leg and attempt to sink his teeth in through his Jeans. He was not able to pierce his teeth through the jeans, but as Dan fell down, slamming his chest into the walk, the man in the street succeeded in ripping the denim, and sunk his teeth deep into his calf. Blood squirted into his eyes as he tore away the first chunk of flesh, and turned away to chew methodically on his first score. A gutterall scream erupted from Dan as he attempted to pull himself up, only to tumble down into the sidewalk again. I was only able to stand and stare, undecided on my next action. I looked back at Dan, "Jesus..." I ran to him and grabbed his arm, pulling him up. I wrapped his arm around my neck and pulled him up the stairs. As I dragged him back into the building, Shelly jumped up from her desk. "What the hell is going on out there?" She looked from me to Dan, now pale faced, but still conscious. "Jeez, Shelly, help me get im' on the couch" She walked over, grabbed his legs, and together we carried him to the main room couch, across from her desk. "What happened to him?" I didn't answer immediatly, instead, I ran down a hallway branching off to the left. "MICK! What happened?" "He hit somebody in the road" "AND?!" "And..." I didn't really know what to say "The man attacked him... he... bit him in the leg" she was quiet for a moment. "He bit him?" "Yeah, in the leg" I continued down the hall until I found what I was looking for. I looked into the red box on the wall where the axe sat behind the glass door. I was surprised this was still here, I mean, generally there was just a fire extinguisher, but no, we also had an axe. There certainly was no fire, but this seemed a good as any to whip it out. I pulled it from the box, held it in my hands for a moment, and headed back to the front room. Re: Watertown, PA (Rping Thread) I could tell by the way Matt stared at me, he wasn't going to ever trust me, so I decided to get the shotgun from him and show him I could be trusted by giving it back. I told Matt that Mercy had some blood on her when I showed her the stash. When he turned to the approaching Mercy, I rustled for the shotgun. "Boom", another shotgun shell wasted as I chopped Matt in the throat and swung the shotgun into my arm. Mercy was trying to get a good shot on my dark-skinned head, but it was dark and Matt was in the way. Shotgun in hand I said, "I just wanted to show you I could be trusted. I don't want to kill any of you guys as long as we work together. Now tell me what you heard over the radio and I will give you back your weapon, but you must get me some kind of weapon other than the magnum...I don't have two index fingers and I won't be much use without a shotgun or melee weapon.." Matt looked pissed, he was surely going to shoot me once I gave him back the weapon. "Make this quick Matt, tell us where the survivors are over the radio and quit looking at me like I have tits". Re: Watertown, PA (Rping Thread) Enough with all the testosterone! I shouted. We need to think about this carefully. We don't even know if it was a live signal or recorded. Lets get something to eat, and turn the radio up. And Wayne, you pull a stunt like that again, and the only ammo you get, will be in the ass! I walked toward the kitchen, turning the volume nob up, on the radio. If there is some one alive there, we need to try and think of a way to contact them. Re: Watertown, PA (Rping Thread) While Mercy listened in, I was in the living room dismantling the furniture and tables. I barred the kitchen window which that zombie had cracked while trying to eat Matt. They were out there. I could smell em, there was a stench and we were going to have to eat soon or I was going to lose my appetite. Matt was a romantic and he had balls, he would come over and cook for Mercy using her cookware and sit down to eat before even touching her. He made some food out of what was left as she watched him getting into the supplies and hugging him from behind. I finished impromptu barricades and the only place left unbarricaded was the second floor. As the radio came on we were about to all sit down and eat but something wasn't right. We heard moans and it wasn't coming from either Mercy or Matt. It was drowning out the broadcasters voice it was so loud. Was it coming over the radio or what was that noise? Was it from inside the house? Re: Watertown, PA (Rping Thread) I returned from the hall with the axe walking toward shelly and Dan, who was attempting to sit up from the couch. He had Shelly's coat wrapped around his leg where she had attempted to stop the bleeding, but it had done little good as it began to trickle down onto the carpet. "What are you going to do with that!?" she asked. "Im using it for self defense" "Self defense from what?" she was looking extremely agitated. "From whoever, or whatever the hell is out there" We both glanced back at the front door. "Goddamn am I tired, I feel like shit" Dan uttered his first words since the attack. He looked extremely weak, and leaned his head back against the window behind the couch. The sudden sound of shattering glass forced Shelly to a scream, and as the window was destroyed from outside forces, a pair of hands reach in and wrapped themselves around dans head. "HOLY SHIT!" Dan began to scream and writhe, attempting to pry away the hands, but as a second pair of hands reached in, grabbing his shoulder, his fate was sealed as he slid through the jagged window glass. We sat stunned, staring at the empty window, waiting for them to try and claim another victim. "Wh...who...who are they..." Shelly managed to say. I grabbed the axe, and slowly peered out the window, sticking my head out. I looked down, and watched four people slowly tear apart Dan, limb by limb on the ground. One at his head grabbed it at the sides and began to pull upward, tearing out of its foundation along with part of his spine. The four were covered with gore, and I threw myself back into the room cutting the back of my neck on a piece of glass. "Jesus christ, I'm pretty sure I know exactly what they are, but I must be crazy if Im going to believe it" I attempted to confirm my disbelief by looking out the front door, but as I opened it a crack, I saw at least thirty dazed people stumbling around the street. Only now did I hear the distant cries, and the screams of sirens. I shot past Shelly, shoving her aside, and darted into the broadcasting room. I picked up the government issue folder that I was given earlier, and what I read was of no reassuring matter. I sat silently in my chair for a moment, then flipped up the switch on the mic and slowly began my broadcast for help. Re: Watertown, PA (Rping Thread) I set my help calls on a loop, broadcasting my name, our position, and the weapons we had here with us. I left the broadcasting room, and walked back once again to see Shelly. It had been 3 hours since Dan had been killed. I left just in time to find Shelly walking out the front door. "JESUS CHRIST! What are you doing?" I yelled to her. We've been staring out at those "things" out there for 3 hours! I have to get out of here! I need to make sure my friends are allright!" "Look, I said" edging towards her, I couldn't afford to let her do anything stupid. "I don't think thats the best idea. I mean, you've seen what those things can do" "I don't give a shit" she snapped back at me. "We can't stay here forever!" I darted to grab her arm, but she tore away edging through the door and shutting it behind her. Re: Watertown, PA (Rping Thread) "Quiet down man! We have been almost surrounded. Can you run Mercy?" I turned and asked her. But, she made no reply. I think for the first time, she realized that we were probably all not going to make it to the station alive. I didn't want to turn into a pile of flesh, so I said "follow me" like i was the lead in a movie and dashed out of the front door and started to run even faster. Matt and Mercy were somewhere behind I could hear them, so I continued to run, but as I turned the first corner, there was an entire street full of brain eaters. I have taken on 3 guys at once before but there was no way we could make it through. I darted back to the house but Matt and Mercy had already left. They must have known a better route, had a vehicle or couldn't keep up with me. I decided to head back in the house and wait there for a minute because I knew they had no chance of surviving without me, I hoped. They knew they could trust me, but did they panic and run scared? Re: Watertown, PA (Rping Thread) I ran out the door hoping to get to Shell before it was too late. I bounded down the stairs, axe in hand. and began to look for her. She wasn't hard to find in the small parking lot in front of the building. She was hurriedly finding her keys in her purse. "Thank god..." I muttered. As I took my first step towards her, something from behind grabbed my shoulder. I whirled around to stare at a slack jawed, pale man, who quietly moaned at me, once again grabbing my shoulder. I pulled him off easily once again, and lifted my foot up, kicking him in the chest, and putting him on the ground. I walked over to her finally, and grabbed her. She started suddenly, yelling. She turned around. "Jesus Mick, you scared the shit out of me" "Im sorry. But look, mabye we can get outta here before those things get to us. I'm not sure they-" She stared wide eyed at something behind me. I once again faced my previous assailant. "Get away from us!" I lifted the axe and swung, firmly planting it into the things head. It went down almost instantly, crumpling. I placed my foot on its neck and pulled. The Axe came free with a disgusting "FWAP". "One down" I said morosely. Re: Watertown, PA (Rping Thread) Quick Guys! Back in the house. But Wayne was already running. Matt and I ran back in and shut the door. What is that idiot doing, I asked Wayne? I have a perfectly good Hummer in the garage. It's all loaded with guns and supplies. We can go downtown, and maybe find that idiot on the way before he gets eaten. Matt just looked exasperated. Matt grabbed a few things from the living room, and we headed for the garage. Aren't you glad I bought a real Hummer, and not one of those useless new things? Matt laughed and said " You bet your sweat ass I am". I'll drive, throw me the keys, Matt replied. We jumped in and I hit the door remote. Drive, I screamed, Drive! We pulled out and I hoped the door closed quickly behind us. We turned toward town. Re: Watertown, PA (Rping Thread) Re: Watertown, PA (Rping Thread) They came for me afterall! I really felt stupid not asking about vehicles, but hey I figured they would have mentioned that. Who knows, they might have mentioned it. I was so hungry. That so called "meal" was hardly in my throat when the chaos began. I always pictured my last meal as being whatever I wanted from a corner store or something. Then I started, "Hey lets look for some survivors on the way and any easy to get supplies." I had the feeling I would see somebody I knew out there, afteral everybody knew me on the street even law enforcement. Re: Watertown, PA (Rping Thread) Shelly's screaming only accomplished one thing. Directing the attention of the zombies to ourselves. Now, they all stumbled around in the street, a good 50 ft. away from us, but they began to inch their way forward. "Dammit Shell! We need to get back to the building!" She stood apparently scared, gaping at the corpse behind me. "C'mon..." I grabbed her arm and began to walk back to the station. "No!" She she pulled away to continue to rummage for her keys, but after a few seconds it was apparent that they weren't in her purse. "I must have dropped them somewhere..." she dropped to the ground and began to sweep under her car. "God..." I said the only sensible thing I could "We are in serious fucking danger. If you aren't coming back into the building than I am" I began to back up. She apparently wasn't listening. She might have been in some kind of shock, and the safest thing wouldn't be to leave her out there alone, but if she wasn't coming, I wasn't getting myself killed over it. She didn't even glance back as I headed back in. Re: Watertown, PA (Rping Thread) OCC: I got an idea, to get Stachii in here we can find him along the way to the radio station. We'll be driving and find him like Beer said in a bus or on the street. How does that sound? (OOC: I like buildings better. ) How the hell did this happen? How the hell should I know? Today started off as a normal day. A normal breakfast, a normal shower, a normal bus ride to work, and a normal lay off from that job. Everything was as it should and usually was. That job at the radio station as janitor blew anyways. So I had the rest of the day to spare, and it wasn't even lunch yet. I decided to spend it kicking back on top of the abandoned apartment complex just across the street from my latest failure at work. Found myself a lawn chair, and a soda from the vending machine at the radio station, playing some tunes on an old boom box, and watched the clouds go by. That is, until the music stopped. At first, I thought it was just a technical difficulty. But Mick's, the radio "DJ", voice sounded distressed and on the verge of insanity. Crying something about cannibal corpses eating Dan. Too convincing and too early in the year to be his Halloween gag. I lifted my sunglasses and peaked over the roof to look at the station, dropping my soda upon seeing it. Windows were busted in, and a mob of people surrounding the area. Too many to count, but not so much to say I was the only one left in town. Most of them were soaked in blood. Was this a riot? Good thing I got fired when I did. Wait, no. Even a angry mob knew to stop when the majority of their mass were missing...limbs? Flesh? I nearly gagged when I realized those were people's guts in the storm drain Before I had the chance to do anything, something started banging on the door to the roof I was on. I panicked barricaded the door with whatever I could find. Which was: A lawn chair, a boom box, and myself. "This isn't happening, this isn't happening." I kept telling myself. And I kept there, even as all hell was breaking loose, trying to get to my little piece of heaven known as the roof, and all I could do was wait. Wait for hell to take me, or for some sort of salvation. Either would do to get out of this. (OOC: Well, there's my first post. If anything really needs to be changed for the sake of continuity, just say so.) Re: Watertown, PA (Rping Thread) The fuel was low in the chainsaw so gracefully lent to me and i knew that he would probably think i was a zombie unless he heard some skilled weapons being wielded. I kept a good grip while lowering it upon the skulls of the zombies. I always loved that scene from Scarface and this was just like it. "Its a survivor, im gonna cut this door down open up", nobody responded and i could hear more zombies closing in, so I tore into the door like i was in 'The Shining'. Dude was shaken, he didn't know what to do. "Hey man, can you handle yourself? Get your ass downstairs and get some real weapons and leave the boombox to distract the zombies, put in a cd and press repeat" Re: Watertown, PA (Rping Thread) Re: Watertown, PA (Rping Thread) OC: I guess ill jump in now... Jason sat in the far corner of the upstairs media room. He opened his eyes and blinked. He figured that it was almost time to leave this shithole. He was just sitting in his dorm room when his roommate stumbled in. He let out a low moan and lurched for Jason. He was most likely high and drunk as usual. Jason shrugged and went back to reading his book. When hiss roommate finally reached him he grabbed Jason by his arm and lowered his head with a snarl. Jason delived a well powered punch to his roommates shoulder causing him to stumble away. "Dude, what the fuck is wrong with you? Im trying to read man." His roommate ignored him and began his advancment on Jason again. Jason put his book down and stood up. He was pissed now, his roommate would always come back from some party and distrupt his study time. This was the finall staw. "Dude I am fucking sick of you okay? Take another step and I'm going to lay your ass out. Got it?" But he ignored Jasons warning and took another step. Jason pulled his arm back and let loose a right hook that would knock any one off there feet. His roommate fell backwards and growled. He slowly got to his feet and snarled at Jason. "Okay what the fuck is wrong with you?" Jason delivered a brain rattling jab and shattered his roommates nose. "Back the fuck off!" He looked at his roommate and glanced at his right shoulder. There was a huge bloody bite mark and cuts all over. "Are you okay man?" Jason asked as he took a cautious step back. His roommate lunged for Jason's neck but met the bottom of Jasons boot. His roommate stumbled backwards and smacked against the window. The glass shattered on impact and Jasons roommate fell backwards plummeting to the ground from the fith story. Jason ran to the window and glanced out. He spotted his roommate sprawled on the ground surrounded by shattered glass and blood. "OH FUCK! Hes dead and I killed him!" Just then Jasons roommate stirred. "Oh thank god! Hey man you okay?" Jason called out as his roommate got on all fours. Then he slowly stood and began lumbering towards a curious young lady who had seen the whole ordeal. He wrapped his arms around her and took a bite out of her neck. She let out a horrid scream and began to attempt to beat him off. But he alread had her in a death lock. That was a while ago though. Now he found himself sitting in a really expesive looking home full of really expesive looking things. He found the family munching on the package boy on the porch. He used four shots to clear up the mess. Now he was left with two bullets left in his 9mm which he managed to snag of a dead cop... well sorta dead... Now he was sitting in the media room with an old CQB radio trying to contact someone. Just then as he switch to another channel he heard a very distressed sounding man broadcasting his postion. He switched on the transmitter and began speaking in a calm voice. "Listen man, if you are still there please respond. I repeat please respond." Re: Watertown, PA (Rping Thread) oc: ok hear goes Jhon sat in the hole he had dug the night before. He was listing the reasons not to go into town, when an explosion rattled the night. It had come from the old burnt-out gas station, it had been months sense he had heard noise from town. It whould be an hour before the sun comes up he though. ”Cody be their soon sun up come be hear... Food be....Miss them we do Cody..¨ Jhon pulls him self out of his hole and heads down the creak path to an abandoned construction sight. ¨ Careful now Cody thay like cold dirt.¨ His shadowy figure scuries throw the tipped over tractors and burnt-out ot trucks, to the edge of the empty lot behind the old gas station. Their where fires just on the far side of the burnt-out building, Jhon sat at the edge of the empty lot scaning the area for movement. The sun was just starting to rise when Jhon say it movement. ¨ Stay Cody whate soon go..¨ Several hours pass as Jhon watches the figure that seems to stair at the same spot, Jhon moveies closer to the odd figure and notices its a tall man hunced over. Jhon watches for a while longer, then he approachies ¨ Hay man i..¨
{ "pile_set_name": "Pile-CC" }
Ask HN: Made for Adsense (MFA) Sites - naithemilkman It's hard to get the skinny on exactly how viable this business model still is considering the amount of outdated information on google.<p>Does anyone currently operate an MFA site(s)? Can you do an AMA? Is it still a realistic business model if you're just looking to generate say 1-2K per month? ====== atgm If Google doesn't screw you over and shut down your account for some reason without telling you why or giving you someone to talk to, then yes, you should be in the clear. I'm just in the bitter, vocal minority here, though. ~~~ naithemilkman So you're operated MFA sites before? How was it? Do tell! ~~~ atgm I tried operating a normal site using AdSense; it got a decent amount of traffic before Google killed my AdSense account. I never got any of the money out of it, Google never responded. This was about six, seven years ago now. To this day, I am unable to use AdSense. ~~~ naithemilkman Can you not just re-make a new google account with a different credit card? ------ Ataraxy Don't build a business on top of a sand castle. ~~~ naithemilkman Maybe don't build a long term business on top of a sand castle
{ "pile_set_name": "HackerNews" }
Evergreen’s Winter Street Food Market Over the past weekend we trekked over to Evergreen Brick Works for a lovely afternoon stroll. As part of Evergreen Brick Work’s Street Food Market, this Toronto outdoor destination brings together local, street-inspired eateries from across the GTA. The diverse and delicious food offerings are a highlight of Evergreen’s season long free Winter Village – open weekends from 11 AM to 6 PM until February 28, 2017. Other activities at the Evergreen Brick Works include: RBC Lounge: Catch up with friends and family in the new cozy seating area next to the Sipping Container and the Street Food Market Saturday Farmers Market: Winter vendors offer a wide variety of local and seasonal food inside on Saturdays from 9 AM to 1PM Free Public Skating: Take a whirl on their outdoor skating rinks. Skate and Helmet rentals available Manulife Warming Station: Take a skating break and cozy up to the campfire just steps from the outdoor rink. Hiking, Biking and Playing: Participate in a self-guided or organized nature walk through the 40 acre Weston Family Quarry Garden, afternoon fat bike group rides through the Don Valley (weather permitting) with Sweet Pete’s Bike Shop, winter-themed scavenger hunts around the Brick Works or family-friendly nature based activities and crafts in the Children’s Garden. . Street Food Market @ Winter Village is open weekends from 11 AM to 6 PM until February 28, 2017.
{ "pile_set_name": "Pile-CC" }
package com.easy.aliNacosProvider; import lombok.extern.slf4j.Slf4j; import org.springframework.web.bind.annotation.GetMapping; import org.springframework.web.bind.annotation.PathVariable; import org.springframework.web.bind.annotation.RestController; @RestController @Slf4j public class HelloController { @GetMapping(value = "/hello/{str}", produces = "application/json") public String hello(@PathVariable String str) { log.info("-----------收到消费者请求-----------"); log.info("收到消费者传递的参数:" + str); String result = "我是服务提供者,见到你很高兴==>" + str; log.info("提供者返回结果:" + result); return result; } }
{ "pile_set_name": "Github" }
Silk industry of Cheshire Congleton, Macclesfield, Bollington and Stockport were traditionally silk weaving towns. Silk was woven in Cheshire from the late 1600s. The handloom weavers worked in the attic workshops in their own homes. Macclesfield was famous for silk buttons manufacture. The supply of silk from Italy was precarious and some hand throwing was done, giving way after 1732 to water-driven mills were established in Stockport and Macclesfield. Location Cheshire is a county in North West England. To the east of the county the landscape changes dramatically from the alluvial plain of Central Cheshire to the hill country of the Peak District. Fast flowing streams forming the River Dane, River Bollin, River Dean and River Goyt provided a moist environment and potential power to drive waterwheels in mills. The coach road from Derby to Manchester passes through, or near to each of the prominent silk towns, and later in 1831 Macclesfield Canal joined Congleton, Macclesfield and Bollington to the Trent and Mersey Canal and the Midlands and the seaports. Silk Silk is a naturally produced fibre obtained from many species of the silk moth. In 1700 the favoured silk was produced by a moth (Bombyx mori), that used it to spin a closed cocoon to protect her larvae. These fed on the mulberry leaf which was grown in Italy. Silk fibres from the Bombyx mori silkworm have a triangular cross section with rounded corners, 5-10 μm wide. The silk is a protein called fibroin and it was cemented in place by the use of a gum, another protein called sericin. The cocoons were harvested and placed in troughs of hot water that dissolved the gum and allowed the single thread to be wound into a skein. The silk throwing process The skeins were placed into bales and taken to the mill for processing. Three sorts of yarn were commonly produced: no-twist which was suitable for weft, tram that had received a slight twist making it easier to handle, and organizine which had a greater twist and was suitable for use as warp. Reeling is the process where the silk that has been wound into skeins, is cleaned, receives a twist and is wound onto bobbins. Silk throwing is the process where the filament from the bobbins is given its full twist. The process where filaments or threads from three or more bobbins are wound together is called doubling.The last two processes can occur more than once and in any order. Tram was wound, thrown and doubled, organzine was wound, doubled then thrown and doubled again. Sewing silk could receive further doubling and throwing. No-twist was often three single filaments doubled together. Many other combinations were possible. Colloquially silk throwing can be used to refer to the whole process: reeling, throwing and doubling, and silk throwsters would speak of throwing as twisting or spinning. Silk throwing was originally a hand process relying on a turning a wheel (the gate) that twisted four threads while a helper who would be a child, ran the length of a shade, hooked the threads on stationary pins (the cross) and ran back to start the process again. The shade would be a between 23 and 32m long. The process was described in detail to Lord Shaftesbury's Royal Commission of Inquiry into the Employment of Children in 1841: For twisting it is necessary to have what are designated shades which are buildings of at least 30 or 35 yards in length, of two or more rooms, rented separately by one,two or four men having one gate and a boy called a helper... the upper storey is generally occupied by children, young persons or grown women as 'piecers', 'winders' and 'doublers' attending to their reels and bobbins, driven by the exertions of one man... He (the boy) takes first a rod containing four bobbins of silk from the twister who stands at his gate or wheel, and having fastened the ends, runs to the 'cross' at the extreme end of the room, round which he passes the threads of each bobbin and returns to the 'gate'. He is despatched on a second expedition of the same kind, and returns as before, he then runs up to the cross and detaches the threads and comes to the roller. Supposing the master to make twelve rolls a day, the boy necessarily runs fourteen miles, and this is barefooted. In 1700, the Italians were the most technologically advanced throwsters in Europe and had developed two machines capable of winding the silk onto bobbins while putting a twist in the thread. They called the throwing machine, a filatoio, and the doubler, a torcitoio. There is an illustration of a circular hand-powered throwing machine drawn in 1487 with 32 spindles. The first evidence of an externally powered filatoio comes from the thirteenth century, and the earliest illustration from around 1500. Filatorios and torcitoios contained parallel circular frames that revolved round each other on a central axis. The speed of the relative rotation determined the twist. Silk would only cooperate in the process if the temperature and humidity were high, in Italy the temperature was elevated by sunlight but in Derby the mill had to be heated, and the heat evenly distributed. In East Cheshire only two mills are known with certainty to have been built to house Italian style circular throwing machines they at the Old Mill at Congleton and the Button Mill, Macclesfield. By 1820, throwing was done using rectangular frames, manufactured from cast iron, and powered by belts from line shafts. Silk spinning Thrown silk is twisted single filament. There is a lot of waste from processing and damaged cocoons. Silk is expensive and ways were found to recover the waste. The waste was cut into fibres 25-50mm long and then these were spun like worsted or cotton using a throstle. This was 'short Silk'. Such a short thread produced a silk with an inferior lustre. In 1836 Gibson and Campbell patented a 'Long Silk' machine for spinning staples up to 250mm. Carding and combing (known as dressing) remained a problem until Lister invented the self-acting dressing machine in 1877. Spun silk is softer than thrown silk and easily blended with other fibres. Silk spinning became an important industry in Congleton: taking place in Stonehouse Green and Brooks Mill, Forge Mill and Bath Vale. Brocklehursts continued long silk spinning in Macclesfield until the 1950s. Silk weaving Early silk looms were similar to woollen looms, built of wood and operated by hand. A man would operate the heddles, and would pass the shuttle though the shed and batten the fell. Naturally the reeds were adapted for the far finer thread. In 1733, John Kay's flying shuttle influenced silk weavers too. Silk ribbons were woven first, and broad-silk looms arrived around 1756. Silk weavers often worked at home, cottages and later houses were built with loomshops in the roof space. These garret workshops had distinctive large casements. Later, these garrets were built with separate access. Jacquard Looms In about 1821, the Jacquard mechanism began to br attached to looms. By means of punched cards, the Jacquard head allowed patterns of great complexity to be woven. In the twentieth century, Macclesfield Silk Pictures became famous, these were woven on these looms by firms such as the BWA (Brocklehurst Whiston Amalgamated). Today they are collectables. Dyeing and printing The single storey sheds used for dyeing can be recognised by the louvred ventilators on their roofs. Printing was done on long tables using engraved blocks, later the tables were used for silk screen printing. Whiston's (BWA) at Langley, Cheshire amassed the world's largest collection of wooden blocks. Silk mills There remain a large number of buildings in the Cheshire silk-weaving towns that can be called silk mills, from complexes of large six storey buildings with attached one storey weaving sheds to the small garret loom shop employing just one family. As the economic balance changed, buildings would switch from silk to cotton and back again; they would change their function from throwing, to dyeing, printing or making up. Buildings would be divided from one owner working the silk in a vertical mill, to multiple tenants who would specialise in different aspects of the industry. And still yarn would be put out to independent weavers. The first mills were modelled on Lombe's Mill, there were austere brick buildings of 4, 5 or 6 storeys, similar to those found in the naval dockyards. They were wide, to accommodate the Italian filatoio. By 1820 throwing was done on rectangular frames and the width of the building was dependent solely on the strength of the floor beam. Spans greater than 8 m needed to be supported by cast iron pillars. Silk does not require the fire-proof construction techniques essential for cotton so are lighter in construction. In 1820 Jacquard equipped looms entered the mills. These were significantly taller than previous looms so mills needed to be built with increased floor heights. These are instantly recognised by the tall windows. Waste spinning, reeling, doubling and throwing put little strain on the building, but power-looms were a different matter. From preference they were operated in single-storey sheds with saw-tooth north-facing roof windows: if they were to be operated on an upper-floor, box-beams and cast-iron columns increased the floor strength and load-bearing capacities. History of silk working in Cheshire Silk was being worked in Cheshire in the late Middle Ages and used for the manufacture of buttons. The Macclesfield town records note a debt from a button maker in 1574. In an inventory of Stephen Rowe's house in 1617 – amounts of raw materials, namely hair, thread, linen yarn and silk – quantities of finished buttons- four gross – and in addition goods to the value of £3 9s 6d put forth to out workers. He would have used a chapman to market his buttons. Chapmen could be merchants who rode through the villages hawking their silkcloth and buttons, but many owned land and traded directly with the London. London was the only legal port of entry for silk, so consequently London merchants came to Macclesfield with the raw silk and some became freemen of Macclesfield so they could legally trade within the town. These merchants sometimes had local factors who would buy and sell on their behalf. Silk weaving Silk processing skills were established in England by French Protestant Huguenots refugees after they had been expelled France following the Revocation of the Edict of Nantes in 1685. They prospered in Spitalfields, outside the bounds of the City of London, where they avoided the restrictive legislation of the City Guilds. But silk-throwing was already happening in Cheshire, for example in Rainow where a John Massey is recorded as owning one black cow, some sheep, three old ladders and a silk twisting wheel. Lace weaving was already under way in Stockport, Macclesfield, Congleton, Leek and Buxton in around 1660. Narrow silk weaving was happening in Macclesfield by 1696, while John Prout (1829) states that broad-silk weaving commenced in 1756. Silk was woven in Cheshire by independent weavers who had hand looms in their own homes. They worked as outworkers for merchants, who supplied them with silk and bought the cloth. This was a common rural practice. With the improvement in the looms and the flying shuttle and the increase in demand for the finished product there was difficulty in finding enough silk. Silk throwing Silk was prepared for weaving by hand-throwing the silk. This was originally an outdoor activity, conducted under long shades, but when it moved into 23-metre-long buildings they also were called shades. In Italy they found a way to do this using machines. Lombe's Mill, in Derby was the first successful powered silk throwing mill in England. John Lombe visited a successful silk throwing mill in Piedmont in 1717, and returned to England with details of the Italian silk throwing machines- the filatoio, and the torcitoio, and with some Italian craftsmen built replicas. This was an early example of industrial espionage. The architect George Sorocold built it next to Thomas Cotchett's failed 1704 mill (which used copies of Dutch throwing machines) on the west bank of the River Derwent. He and his half brother Thomas Lombe, born 1685, instructed George Sorocold to build a mill for the Italian-style machines. To the north of the powered Italian Works an un-powered Doubling Shop was built at some time before 1739, and when this mill was sold in 1739 to Thomas Wilson an inventory taken which still exists today. Thomas Lombe was given a 14-year patent to protect the design of the throwing machines he used. The King of Sardinia responded to this challenge badly, and stopped exporting suitable raw silk. It is speculated that he was responsible for John Lombe's mysterious death six years later in 1722. His elder brother, Thomas Lombe, took over the business. When the patent lapsed in 1732, other mills were built in Stockport (1732) and Macclesfield (1744) and Congleton (1753). Italian style silk throwing had reached Cheshire. Stockport Lombe's patent had been fiercely contested by artisans in Stockport and Macclesfield who looked to supply the Spitalfield silk weavers. When the patent expired, a partnership of six was formed in Stockport, which in essence was a joint stock company, to build a water-powered mill in a bend in the River Mersey, next to Logwood Mill . John Guardivaglio was recruited to manage the new technology. John Clayton, a future Mayor was the partnership leader and Samuel Oldknow was also a partner. Samuel Oldknow later introduced cotton to Stockport in 1784, capitalising on the machine manufacturing and textile skills developed in silk. From map evidence it is speculated that this was a small mill that would house two Italian filatoio.It took until 1743 to cut the tunnels to obtain extra water from New Bridge. Seven years later the silk mill owners bought the neighbouring Logwood Mill and converted that to silk. As this was only square it could only be used for ancillary processes.44 In 1749 there was a reduction on the duty on imported raw silk. This prompted John Clayton and his new partner Nathaniel Pattison, a silk merchant from London, to raise £5000, and secure the water rights and the agreement of the town council to build the Old Mill at Congleton. The five storey mill was far larger than previous mills, aiming to benefit from economies of scale. Macclesfield Buttons The Mottershead family were involved in the early Macclesfield silk button trade and through a series of letters it is revealed that there was a sizeable trade from 1649. It was a cottage industry involving women and children. In 1698 the corporation directed that 'poor children or other poor' should be instructed in the making of buttons. They then could then be employed as 'outworkers' for Macclesfield merchants who bought the materials wholesale and then marketed the finished buttons. Samuel Finney of Wilmslow described this and explained that a good woman could earn four shillings a week, and even a child of six could support themselves by assisting in the preparatory processes. In 1749 the manufacture of silk buttons was the principal industry of the town, but by 1795 it had been superseded, as buttons made from horn became more common. The legacy was a pool of labour with silk preparation skills, and established lines of supply and distribution. In 1765 it is estimated that 15,000 people were working in silk in the town and the surrounding villages. Some buttons were traded by chapmen, but others were sent via Manchester and exported through Bristol and London to the Netherlands, New York and Moscow. John Brocḱlehurst was such a chapman and he enter partnership in 1745 with Messrs Acton and Street who were 'putters out'. Charles Roe was a silk button merchant. Woven silk was obtained from the Huguenots in Spitalfield, who in turn used the yarn supplied by the silk throwsters in small shades or throwing houses in Macclesfield. Throwing Charles Roe built the Button Mill in 1743, where he installed two Italian filatoio (water-driven throwing machines of the type used in Derby), and a dye house. The mill expanded and by 1761 it was employing 350 persons. Other throwing mills followed, such as Frost's Mill on Park Green which was founded in 1775 by Daintry and Ryle. John Hadfield had a mill on the River Bollin, and around this time the first Chester Road Mill was built. Macclesfield prospered. Men in throwing earned 7s a week while men on the land earned 6s. Women earned 3s 6d, and children on a three-year contract started on 6d a week in the first year, then 9d in the second and a whole shilling in the third year. This was for twelve hours a day for a six-day week. Demand increased while Britain was at war with France, but peace caused years of depression. Charles Roe left the silk industry in 1760, selling his share in his business for £10,000, and when the Seven Years' War finished in 1763, there was great hardship. Macclesfield did not weave silk at this time but supplied the thread to Spitalfields. There, there was unrest and large demonstrations which were supported by smaller ones in Park Green and the Market Place. Workers formed combinations. An Act of Parliament in 1773 regulated the wage rates and the number or apprenticeship places in Spitalfields. Weaving In 1790 the weaving of silk was introduced into Macclesfield by Leigh and Voce who introduced looms, and Huguenot weavers to teach the skills, into a loomshop in Back Street. One of the weavers, Margaret Moborn was induced to leave and work for the James Pearson in a weaving shed in Sunderland Street. It was James's father George who had invited John Wesley to preach in Macclefield. Margaret lived with James for several years as well as teaching the principles of weaving and warping. George Pearson and Sons became the leading silk weavers here in the early nineteenth century. Britain was again at war with France between 1793 and 1815 so weaving prospered. A good employed weaver could earn eighteen shillings a week, and a self-employed weaver up to £3. but he would have the costs of maintaining his apprentices. In general by the end of the French Wars a pattern has been set, of power and hand throwing, waste silk working and weaving by hand in weaving sheds in independent homes. The years between 1815 and 1820 were ones of recession, followed by the boom of the 1820s. Twenty six throwing mills were established, and the throwsters often attached weaving sheds. The workforce was divided equally between the employed and outworkers and weaving was all done by hand. In 1821 the population was 21,819, and about 10,000 were employed in the silk factories- some of course would come in from the surrounding villages. They worked a 62-hour week, men earning eleven shillings. Duties on finished silk and raw silk were reduced in 1824, 1825 and 1826. Firms went bankrupt and while there were 70 silk mills in 1826 by 1832 there were only 41. Wages halved, and workers were put on short time. Recessions continued on a ten yearly cycle and as fewer firms survived, the techniques were refined, new products were produced, and management became more adept. Brocklehursts was the largest of these firms. In the 1830s the power-driven loom was perfected, and throwing was done on a metal frame, similar to a throstle. These could be incorporated into existing buildings. The Jacquard head was introduced onto hand looms in the 1820s. Because the Jacquard head was placed on top of the standard loom, an increased ceiling height as needed to accommodate them. Power looms were only suitable for coarse broad cloths, and hand looms continued to be used for the finest silks and the complex Jacquard work. In 1839, two silk workers James Mayers and John Ryle left the town and on the Marion sailed to New Jersey settling in the town of Paterson. Together they opened mills (1846) and established the American silk weaving industry. In hard times 3,000 townsfolk left and joined them, and in 1900 the Paterson newspaper regularly included the Births, Marriages and Deaths column from the Macclesfield Chronicle. After 1850 silk manufacture stopped in Stockport and in other towns, and Macclesfield became known as 'the silk town'. At the Great Exhibition in 1851 Macclesfield firms exhibited calgees, Bandanna handkerchiefs, velvets, satins ribbons and shawls. The industry contracted as fashion showed a preference for cottons and French silk. The workforce contracted to 5,000 in 1886. Prominent silk families such as that of John Brocklehurst and John Birchenough were also active in civic and religious life. Most were keen non-conformists and built chapels for their workers. Silk paid for the education of the poor. Macclesfield Sunday School was founded in 1796 by non-conformists, and the large building that now houses the Heritage Centre was built in 1813-1815. Here 2,500 children each year received a formal education on their one-day off from work. The Anglicans built the National School on Duke Street as a response. It remained in use as a day school until 1960. The technical skills that an apprentice would need were provided by a Technical School, and there was a School of Art where designers were trained. Printing The most significant printing firm in the area was that founded by William Smith at Langley in 1820. This passed into the family of William Whiston and amalgamated with J &T Brocklehurst in 1929 to form BWA, Brocklehurst Whiston Amalgamated. They finished fabrics by tyeing and dyeing, wax resist printing with indigo, and copperplate printing. They printed from engraved wooden blocks and using hand operated silk screens. They had their own wood engraving shop. By 1900 they had 90,000 hand printing blocks: the largest collection in Europe. These were burnt when the department closed. Hand embroidery was a cottage craft, Augustus William Hewetson came to Macclesfield at fourteen, on the death of his father. He studied at the School of Art and at 21, he purchased four Swiss pantograph machines and set up business as a machine embroiderer in George Street in 1898, moving to Albion Mill in 1904. Congleton There were seven mills built in Cheshire to throw silk before 1780. Two were in Congleton on the River Dane. John Clayton and Nathaniel Pattison's silk mill, the Old Mill, was built in 1753 and finally demolished in 2003. It was a 29 bay, five storey mill with an internal wheel-pit (for a waterwheel). It was described by Yates in 1822:The first silk mill which is the largest and most conspicuous structure in Congleton, is built of brick, with a pediment containing the dialplate of a clock in the centre. It is 240 feet long, 24 feet wide and 48 feet high, consisting of five storeys, and is lighted by 390 windows Eleven circular throwing machines were housed on the ground floor with winding machines above. In 1771 it employed 600. This was extended by another 17 bays in 1830. The second mill was Thomas Slate's Dane Mill. This was described in an auction notice in 1811:..is four storeys high, each of the rooms or storeys 84 ft in length by 27 feet in width, the mill room 11feet in height, 1st engine room 7ft 2in in height, the second 7ft 4in and the uppermost or Doublers room 8ft in height with a good piece of building adjoining which has been used as two weaving rooms Ribbon manufacture started in 1754 when a merchant of Coventry reported that he had been putting-out ribbon manufacture to hand loom weavers in Leek and Congleton. Four small firms were operating in Swan Bank and Lawton Street in the 1780s. Cotton was also being carded and spun by the Martin family by 1784. The textile manufacturers would soon work both silk and cotton: William Slate described himself as a silk and cotton manufacturer; George Reade was a cotton spinner who moved into silk throwing; and the Vaudrey family worked both. It was silk that determined the prosperity of Congleton - and external factors such as foreign competition and import restrictions were critical: it was the Cobden–Chevalier Treaty that finished the Congleton industry. Between 1860 and 1950 fustian cutting was Congleton's dominant industry and took over the empty spinning and throwing mills, though from 1930 to the late 1970s towelling and making-up were important. Berisfords ribbons, founded in 1858, continued making labels from Victoria Mill, in Worrall Street into the twenty-first century. See also Derby Industrial Museum Silk Textile manufacture during the Industrial Revolution References Notes Bibliography External links Category:Buildings and structures in Cheshire Category:Textile mills in Cheshire Category:Cheshire Category:Manufacturing in England Category:Silk production
{ "pile_set_name": "Wikipedia (en)" }
Marvin John Jensen Marvin John Jensen was a Rear Admiral in the United States Navy. A native of Sheboygan, Wisconsin, Jensen was born on July 8, 1908. He graduated from the United States Naval Academy in 1931. During World War II he became the first officer to command the USS Puffer (SS-268). While in command he was awarded the Silver Star for his actions during the vessel's war patrol in the Makassar Strait-Celebes Sea area in September and October 1943. He died on April 6, 1993. References Category:People from Sheboygan, Wisconsin Category:Military personnel from Wisconsin Category:United States Navy admirals Category:United States submarine commanders Category:Recipients of the Silver Star Category:American naval personnel of World War II Category:United States Naval Academy alumni Category:1993 deaths Category:Year of birth missing
{ "pile_set_name": "Wikipedia (en)" }
/****************************************************************************** * * Copyright (C) 2011 - 2014 Xilinx, Inc. All rights reserved. * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * Use of the Software is limited solely to applications: * (a) running on a Xilinx device, or * (b) that interact with a Xilinx device through a bus or interconnect. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL * XILINX BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, * WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF * OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE * SOFTWARE. * * Except as contained in this notice, the name of the Xilinx shall not be used * in advertising or otherwise to promote the sale, use or other dealings in * this Software without prior written authorization from Xilinx. * ******************************************************************************/ /*****************************************************************************/ /** * * @file xadcps_selftest.c * @addtogroup xadcps_v2_2 * @{ * * This file contains a diagnostic self test function for the XAdcPs driver. * The self test function does a simple read/write test of the Alarm Threshold * Register. * * See xadcps.h for more information. * * @note None. * * <pre> * * MODIFICATION HISTORY: * * Ver Who Date Changes * ----- ----- -------- ----------------------------------------------------- * 1.00a ssb 12/22/11 First release based on the XPS/AXI xadc driver * * </pre> * *****************************************************************************/ /***************************** Include Files ********************************/ #include "xadcps.h" /************************** Constant Definitions ****************************/ /* * The following constant defines the test value to be written * to the Alarm Threshold Register */ #define XADCPS_ATR_TEST_VALUE 0x55 /**************************** Type Definitions ******************************/ /***************** Macros (Inline Functions) Definitions ********************/ /************************** Variable Definitions ****************************/ /************************** Function Prototypes *****************************/ /*****************************************************************************/ /** * * Run a self-test on the driver/device. The test * - Resets the device, * - Writes a value into the Alarm Threshold register and reads it back * for comparison. * - Resets the device again. * * * @param InstancePtr is a pointer to the XAdcPs instance. * * @return * - XST_SUCCESS if the value read from the Alarm Threshold * register is the same as the value written. * - XST_FAILURE Otherwise * * @note This is a destructive test in that resets of the device are * performed. Refer to the device specification for the * device status after the reset operation. * ******************************************************************************/ int XAdcPs_SelfTest(XAdcPs *InstancePtr) { int Status; u32 RegValue; /* * Assert the argument */ Xil_AssertNonvoid(InstancePtr != NULL); Xil_AssertNonvoid(InstancePtr->IsReady == XIL_COMPONENT_IS_READY); /* * Reset the device to get it back to its default state */ XAdcPs_Reset(InstancePtr); /* * Write a value into the Alarm Threshold registers, read it back, and * do the comparison */ XAdcPs_SetAlarmThreshold(InstancePtr, XADCPS_ATR_VCCINT_UPPER, XADCPS_ATR_TEST_VALUE); RegValue = XAdcPs_GetAlarmThreshold(InstancePtr, XADCPS_ATR_VCCINT_UPPER); if (RegValue == XADCPS_ATR_TEST_VALUE) { Status = XST_SUCCESS; } else { Status = XST_FAILURE; } /* * Reset the device again to its default state. */ XAdcPs_Reset(InstancePtr); /* * Return the test result. */ return Status; } /** @} */
{ "pile_set_name": "Github" }
Q: Why do some of my friends have yellow names, and how do I get it? Some of the friends on my list have yellow names now. I can't seem to find out if it has to do with their status or something new added in the options, but I can't recall having seen this earlier this year. What do these yellow names represent, and how do I get them? A: One of the Lunar New Year rewards introduced in this year's Lunar New Year Steam sale lets you turn your Steam profile golden for a limited time. Users with golden profiles also have their name displayed in gold, and a gold border around their profile avatar.
{ "pile_set_name": "StackExchange" }
Polyclonal IgM anti-GM1 ganglioside antibody in patients with motor neuron disease and variants. Recent studies reported the presence of anti-ganglioside antibodies in occasional patients with motor neuron disease. We found polyclonal serum IgM anti-GM1 antibodies by an anti-GM1 enzyme-linked immunosorbent assay (ELISA) in 9 (19%) of 48 patients with motor neuron disease. A comparable frequency of IgM anti-GM1 antibodies was found in 4 (10%) of 40 sera from patients with other neurological disease. Three (17%) of 18 sera from the patients with motor neuron disease and 2 (17%) of 12 sera from patients with other neurological diseases had anti-GM1 immunostaining as shown by thin layer chromatography immunoblot. One patient with a lower motor neuron variant of motor neuron disease or motor axonopathy without multifocal conduction block had a markedly elevated polyclonal IgM anti-GM1 ELISA titer (greater than 1:64,000) with prominent immunostaining of GM1, moderate immunostaining of GM2, and weak and inconsistent immunostaining of GD1b by thin layer chromatography immunoblot. Treatment with prednisone resulted in clinical improvement despite increasing anti-GM1 antibody titers. These data indicate that patients with motor neuron disease have measurable levels of anti-ganglioside antibodies as frequently as patients with other neurological diseases. This contrasts with a small subgroup of patients with a lower motor neuron variant of motor neuron disease or motor axonopathy who have markedly elevated levels of serum anti-ganglioside antibodies and a clinical syndrome that is treatable with immunosuppression.
{ "pile_set_name": "PubMed Abstracts" }
# frozen_string_literal: true module Solargraph::LanguageServer::Message::Workspace class DidChangeWatchedFiles < Solargraph::LanguageServer::Message::Base CREATED = 1 CHANGED = 2 DELETED = 3 include Solargraph::LanguageServer::UriHelpers def process need_catalog = false # @param change [Hash] params['changes'].each do |change| if change['type'] == CREATED host.create change['uri'] need_catalog = true elsif change['type'] == CHANGED next if host.open?(change['uri']) host.create change['uri'] need_catalog = true elsif change['type'] == DELETED host.delete change['uri'] need_catalog = true else set_error Solargraph::LanguageServer::ErrorCodes::INVALID_PARAMS, "Unknown change type ##{change['type']} for #{uri_to_file(change['uri'])}" end end # Force host to catalog libraries after file changes (see castwide/solargraph#139) host.catalog if need_catalog end end end
{ "pile_set_name": "Github" }
# -*- mode: ruby -*- # vi: set ft=ruby : # All Vagrant configuration is done below. The "2" in Vagrant.configure # configures the configuration version (we support older styles for # backwards compatibility). Please don't change it unless you know what # you're doing. Vagrant.configure(2) do |config| # The most common configuration options are documented and commented below. # For a complete reference, please see the online documentation at # https://docs.vagrantup.com. # Every Vagrant development environment requires a box. You can search for # boxes at https://atlas.hashicorp.com/search. config.vm.box = "ubuntu/trusty64" # Disable automatic box update checking. If you disable this, then # boxes will only be checked for updates when the user runs # `vagrant box outdated`. This is not recommended. # config.vm.box_check_update = false # Create a forwarded port mapping which allows access to a specific port # within the machine from a port on the host machine. In the example below, # accessing "localhost:8080" will access port 80 on the guest machine. config.vm.network "forwarded_port", guest: 80, host: 8080 config.vm.network "forwarded_port", guest: 1234, host: 1234 # Create a private network, which allows host-only access to the machine # using a specific IP. # config.vm.network "private_network", ip: "10.0.0.10" # Create a public network, which generally matched to bridged network. # Bridged networks make the machine appear as another physical device on # your network. # config.vm.network "public_network" # Share an additional folder to the guest VM. The first argument is # the path on the host to the actual folder. The second argument is # the path on the guest to mount the folder. And the optional third # argument is a set of non-required options. # config.vm.synced_folder "./wordpress", "/home/vagrant/wordpress" # Provider-specific configuration so you can fine-tune various # backing providers for Vagrant. These expose provider-specific options. # Example for VirtualBox: # config.vm.provider "virtualbox" do |vb| # Display the VirtualBox GUI when booting the machine # vb.gui = true # Customize the amount of memory on the VM: vb.memory = "1024" end # # View the documentation for the provider you are using for more # information on available options. # Define a Vagrant Push strategy for pushing to Atlas. Other push strategies # such as FTP and Heroku are also available. See the documentation at # https://docs.vagrantup.com/v2/push/atlas.html for more information. # config.push.define "atlas" do |push| # push.app = "YOUR_ATLAS_USERNAME/YOUR_APPLICATION_NAME" # end # Enable provisioning with a shell script. Additional provisioners such as # Puppet, Chef, Ansible, Salt, and Docker are also available. Please see the # documentation for more information about their specific syntax and use. config.vm.provision "shell", inline: <<-SHELL sudo apt-get update \ && sudo apt-get -y install wget \ && wget -qO- https://get.docker.com/ | sh \ && gpasswd -a vagrant docker \ && service docker restart SHELL end
{ "pile_set_name": "Github" }
Personally, I do wish the president would make an effort to be a bit more presidential and stop with the name-calling. I get why he does it -- he's branding his detractors with what Scott Adams likes to call "kill shots." It was a brutally effective campaign strategy -- "Low Energy Jeb," "Little Marco," "Lyin' Ted," and "Crooked Hillary" never recovered from Trump's negative branding. But now that he's president, I'd really like to see him wean himself off of this habit. It drives liberals insane and it's really not good for the country to be this divided. I understand the temptation to give President Trump a pass. Most of the media, Hollywood, the DC swamp, etc. are against him, so he may as well fight back by firing on all cylinders. But Trump said he wants to be a uniter. He can start by knocking it off. That said, I think White House Press Secretary Sarah Huckabee Sanders handled this line of questioning very well, today: Reporter: “Does [Trump] see political value in calling people out racially?” Sanders: “I think that Sen. Warren was very offensive when she lied about something specifically to advance her career.” pic.twitter.com/qvRA06zEOR First lady Melania Trump has chosen classic, traditional decor for her family's first Christmas in the White House, USA Today reports. New this year are wreaths hanging from the exterior of every window. Another new touch are glistening wintry branches lining an East Wing hallway that leads guests to a tree decorated with the Trump family's official Christmas ornament, a gold-toned bauble featuring the presidential coat of arms surrounded by a wreath of holly. Columbia Sportswear may be the next business to flee downtown Portland after a series of frightening encounters with the city's homeless population, including car break-ins, human waste dumped by the office's front door and threats to its employees. "In fact, I am so concerned about the safety of our employees at the Sorel headquarters that we are taking the next 90 days to re-evaluate our location decision," Boyle wrote. Since moving the 50 employees downtown, workers immediately reported being harassed and threatened by homeless individuals near the new offices. Disgusting details at the link on top. Near the end of the David Dinkins administration, New York City was in a similar place: filthy and flea-ridden, with legions of "homeless" squegee men and other beggars everywhere. Finally, even the liberals of Manhattan had had enough and voted in Rudy Giuliani, who brought in Bill Bratton as police chief, and almost overnight the city was livable again. Intentions are not enough: it takes willpower to make the village work.
{ "pile_set_name": "Pile-CC" }
--- abstract: 'Our recent discovery of magnetic fields in a small number of Herbig Ae/Be stars has required that we survey a much larger sample of stars. From our FORS1 and ESPaDOnS surveys, we have acquired about 125 observations of some $70$ stars in which no magnetic fields are detected. Using a Monte Carlo approach, we have performed statistical comparisons of the observed longitudinal fields and LSD Stokes $V$ profiles of these apparently non-magnetic stars with a variety of field models. This has allowed us to derive general upper limits on the presence of dipolar fields in the sample, and to place realistic upper limits on undetected dipole fields which may be present in individual stars. This paper briefly reports the results of the statistical modeling, as well as field upper limits for individual stars of particular interest.' author: - 'G.A. Wade' - 'E. Alecian' - 'C. Catala' - 'S. Bagnulo' - 'J.D. Landstreet' - 'J. Flood' - 'T. Böhm' - 'J.-C. Bouret' - 'J.-F. Donati' - 'C.P. Folsom' - 'J. Grunhut' - 'J. Silvester' date: 'March 8, 2003' title: | How non-magnetic are\ “non-magnetic” Herbig Ae/Be stars? --- Introduction {#intr} ============ Observations of magnetic fields in pre-main sequence Herbig Ae/Be (HAeBe) stars can serve to address several important astrophysical problems: (1) The role of magnetic fields in mediating accretion, and the validity of models which propose that HAeBe stars are simply higher-mass analogues of the T Tau stars. (2) The origin of the magnetic fields of main sequence A and B type stars. (3) The development and evolution of chemical peculiarities and chemical abundance structures in the atmospheres of A and B type stars. (4) The loss of rotational angular momentum which leads to the slow rotation observed in some main sequence A and B type stars. Since 2004, we have been engaged in a systematic assay of the magnetic properties of bright ($m_{\rm V}\ltsim 12$) HAeBe stars using the FORS1 spectropolarimeter at the ESO-VLT (Wade et al. 2007), and the ESPaDOnS spectropolarimeter at the CFHT (Wade et al., in preparation). We have acquired about 130 Stokes $V$ (circular polarisation) spectra of over 75 HAeBe stars, with the aim of measuring the longitudinal Zeeman effect in their spectra. The ESPaDOnS observations are of high resolving power ($R\sim 65000$), and provide the capability to resolve the complex line profiles presented by many HAeBe stars. The longitudinal magnetic field was measured from each observation using the standard first-moment method applied to Least-Squares Deconvolved (LSD; Donati et al. 1997) profiles. The dependence of the field diagnosis on the LSD masks was explored in detail for each star, and “clean” photospheric masks were constructed by excluding lines in the spectrum that exhibited clear contamination by emission, or other significant departures from the predictions of an LTE synthetic spectrum. In most cases we found that global departures of the metallic line spectrum were relatively small, and the improvement achieved using tuned masks was minor. The magnetic field diagnosis obtained from the ESPaDOnS data is very sensitive to the projected rotational velocity $v\sin i$, and the formal uncertainties achieved consequently span a large range of precision, from very good (for most stars with $v\sin i\ltsim 80$ ) to essentially useless (for some stars with $v\sin i\gtsim 150$ ). The FORS1 observations, on the other hand, are of low resolving power ($R\sim 1000-1500$). Although such spectra fail to resolve the complex profiles of most lines, they are relatively insensitive to rotational broadening. Consequently, the longitudinal magnetic fields derived from FORS1 spectra (using the linear regression method developed by Bagnulo et al. 2000) provide a relatively uniform diagnosis over a large range of $v\sin i$. From these surveys magnetic fields have been detected in 6 stars[^1]. As the detailed properties of these magnetic HAeBe stars are discussed by Alecian et al. (these proceedings) and Folsom et al. (these proceedings), we will only review the general results here. The two stars modeled in great detail (HD 200775, HD 72106) show stable, oblique, dipolar magnetic fields with polar intensities of about 1 kG, low $v\sin i$, and rotation periods of several days. The two stars modeled in moderate detail (HD 190073, V380 Ori) show stable, organised magnetic fields, low $v\sin i$, and rotation periods of days, possibly years. Finally, the two stars with a small number of observations (HD 101412, HD 104237) show strong longitudinal fields and simple Stokes $V$ profiles, suggesting organised magnetic fields. Both of these stars have low $v\sin i$. Based on these results, it is clear that some Herbig Ae/Be stars host strong, organised magnetic fields, qualitatively identical to those of the main sequence Ap/Bp stars. Here, we turn our eye to our much larger collection of $\sim 125$ observations of $\sim 70$ undetected HAeBe stars, in order to examine the extent to which our observations can constrain their magnetic properties. In other words, how non-magnetic are “non-magnetic” HAeBe stars? Modeling and Results ==================== To explore the properties of the undetected sample of HAeBe stars, we have followed a Monte Carlo approach similar to that employed by Wade et al. (2007). We developed synthetic populations of magnetic stars where each star was characterised by the inclination of its rotation axis $i$, the obliquity of its dipolar magnetic field $\beta$, the rotation phase at which it was observed $\phi$, and the intensity of its dipolar magnetic field at the magnetic pole, $B_{\rm d}$. For the purposes of our simultations, the parameters $i$ and $\phi$ were selected randomly for each star ($i$ with a $\sin i$ PDF, $\phi$ with a uniform PDF), $\beta$ was randomly set equal to either $0\degr$ or $90\degr$ (with equal probability), while the magnetic intensity $B_{\rm d}$ was fixed for all stars in a given population (and therefore defined the characteristic field strength of that population). We then created synthetic distributions of longitudinal field measurements from each of these populations, assuming the same uncertainties characterising the real observations of undetected HAeBe stars. This procedure was repeated 100 times, using different realisations of the randomly-selected variables. Fig. 1 compares the observed histogram of uncertainty-normalised longitudinal field measurements $z=\langle B_z\rangle/\sigma_B$ (including both FORS1 and ESPaDOnS data), with synthetic histograms compiled from the Monte Carlo simultations. To quantitatively test whether the observed and computed distributions are representative of the same population (with the practical goal of testing if the observations imply fields which are weaker than those which characterise the models), we have performed a one-sided Kolmogorov-Smirnov (K-S) test (e.g. Conover 1971) on the cumulative distributions of longitudinal fields. The test statistic $D$ used in the K-S test is the maximum fractional difference betwen two cumulative distributions (i.e. the observed distribution and that compiled from a model). In this case, we find differences $D=0.058, 0.143, 0.228$ and 0.297 for models corresponding to dipole fields of polar intensity 0, 300, 450 and 600 G, respectively. For a sample size $N\sim 125$, a model distribution can be rejected at the 99% level if $D\geq 0.135$. Therefore the longitudinal field measurements allow us to rule out uniform populations of stars with fields above about 300 G. On the other hand, the observations are consistent with a uniform population of stars with fields of about 300 G or smaller[^2]. ------------- ----- Model \# $B_{\rm d}$ det 100 G 1 300 G 2 450 G 6 600 G 6 1000 G 6 2000 G 13 ------------- ----- : Results of LSD profile modeling. See text for details.[]{data-label="t1"} ----------- ------ ----------------------- ------ ----- ------------ Target Spec $B_{\rm d}^{\rm max}$ P(%) \# $\sigma_B$ Type (G) obs (G) HD 17081 B8 100 95 2 9 HD 139614 A6 300 98 3 14 HD 36112 A4 450 96 4 30 HD 142666 A6 450 98 6 35 HD 169142 A8 600 92 3 24 HD 31648 A3 2000 95 2 52 HD 144432 A9 2000 93 2 30 BF Ori A5 2000 86 1 32 ----------- ------ ----------------------- ------ ----- ------------ : Results of LSD profile modeling. See text for details.[]{data-label="t1"} We then set out to provide a clearer evaluation of the upper limits on dipole fields for individual stars. Unfortunately, such upper limits are nearly impossible to derive using small numbers of longitudinal field measurements because the longitudinal field for most stars becomes null at some point during the rotation cycle, even in the case of a strong surface field. We have therefore employed the individual LSD profiles obtained for those stars observed using ESPaDOnS. The velocity-resolved LSD profiles allow the detection of the magnetic field even when the longitudinal field is null, thanks to the spectral separation of polarised contributions from different parts of the stellar disc due to rotational Doppler effect. However, the interpretation of an LSD profile is more complicated than a longitudinal field measurement, requiring that we create synthetic LSD profiles corresponding to each observation (reproducing its associated LSD profile depth, $v\sin i$ and signal-to-noise ratio). To model the LSD profiles, we first fit each LSD Stokes $I$ profile with a rotationally-broadened model, to determine $v\sin i$, line depth and radial velocity. We then used the model populations of magnetic stars to create synthetic Stokes V LSD profiles corresponding to each of our observations (using the profile synthesis procedure described by Alecian et al. 2007), and introduced synthetic Gaussian noise corresponding to the noise level in the real LSD $V$ profile. Finally, for each synthetic LSD profile we evaluated the probability that a Stokes $V$ signature was detected, using the same criteria that are applied in the real LSD procedure (see Donati et al. 1997). Again, this procedure was repeated 100 times for each observation and for each model, using different realisations of the randomly-selected variables. Examples of observed and synthetic LSD profiles are shown in Fig. 2. The results of this procedure were twofold: first, a global comparison of the predictions of each of the population models with the observations, and secondly a quantitative evaluation of the compatibility of [*each*]{} LSD profile with the predictions of dipole surface field models of different intensities. Table 1 summarises the results of this analysis. On the left, we show the number of detections of individual stars we would expect in the case of each population. Even for models as weak as 300 G, we obtain detections of small numbers of stars in over 90% of model realisations. This result is consistent with that derived from the longitudinal field measurements, and demonstrates that the LSD profiles strongly constrain models which propose the presence of weak, organised magnetic fields in all HAeBe stars. On the other hand, there may still exist a small number of magnetic stars, with magnetic properties similar to the detected magnetic HAeBe stars, present in our “non-magnetic” sample (but which remain undetected with the current observations). We note however that the dipole intensities derived by Alecian et al. and Folsom et al. (these proceedings) for the detected magnetic HAeBe stars, when evolved to the main sequence (Table 1 of Alecian et al.), are typical of those of the majority of Ap/Bp stars (Power et al., these proceedings). This indicates that the Herbig stars in which fields have been detected do not have unusually strong fields, and therefore that most of the magnetic stars in the sample are probably already detected. On the right-hand side of Table 1, we show the inferred upper limits for dipole fields $B_{\rm d}^{\rm max}$ in individual sample stars obtained from fitting the LSD profiles. We also report the fraction of model realisations which generate a detection P(%) when $B_{\rm d}=B_{\rm d}^{\rm max}$, the number of observations, and the derived longitudinal field error bar $\sigma_B$. Of particular interest are the lack of detections for stars in which marginal magnetic field detections had previously been claimed (HD 139614, HD 144432, HD 31648, HD 36112 and BF Ori; Hubrig et al. 2004, 2006a; Wade et al. 2007) based on observations obtained with FORS1. EA is funded by the Marie-Curie FP6 programme, while JDL and GAW acknowledge support from NSERC and DND-ARP (Canada). Alecian E., Catala C., Wade G.A., Donati J.-F., et al., 2007, MNRAS, in press Bagnulo S., Landstreet J. D., Lo Curto G., Szeifert T., Wade G. A., 2003, A&A 403, 635 Conover W.J., 1971, [*Practical nonparametric statistics*]{}, 1st ed., p. 400, Wiley (New York) Donati, J.-F., Semel, M., Carter, B. D., Rees, D. E., Cameron, A. C., 1997, MNRAS 291, 658 Hubrig, S., Sch$\ddot{\rm{o}}$ller, M., Yudin, R. V., 2004, A&A 428, L1 Hubrig, S.; Yudin, R. V.; Schšller, M.; Pogodin, M. A., 2006, A&A 446, 1089 Wade G.A., Bagnulo S., Drouin D., Landstreet J.D. and Monin D., 2007, MNRAS 376, 1145 [^1]: One magnetic star (HD 101412) discovered using FORS1, 4 magnetic stars (V380 Ori, HD 72106, HD 190073, HD 200775) discovered using ESPaDOnS, and 1 magnetic star (HD 104237) discovered previously by Donati et al. (1997). We do not discuss here results from the survey of HAeBe stars in young open clusters, briefly introduced by Alecian et al. (these proceedings). [^2]: We underscore that these field intensities refer to the dipole field polar strength at the stellar surface, and not to the mean longitudinal field.
{ "pile_set_name": "ArXiv" }
[A quantitative approach to sports training-adapted social determinants concerning sport]. Identifying and quantitatively analysing social determinants affecting disabled teenagers' inclusion/exclusion in high-performance sports. This was a descriptive cross-sectional study involving 19 12- to 19-year-old athletes suffering physical and sensory disability and 17 staff from the District Institute of Recreation and Sport. Likert-type rating scales were used, based on four analysis categories, i.e. social structure, socio-economic, educational and living condition determinants. Social inequity pervades the national paralympic sports' system. This is because 74 % of individuals only become recognised as sportspeople when they have obtained meritorious results in set competition without appropriate conditions having been previously provided by such paralympic sports institution to enable them to overcome structural and intermediate barriers. The social structure imposed on district-based paralympic sport stigmatises individuals regarding their individual abilities, affects their empowerment and freedom due to the discrimination experienced by disabled teenagers regarding their competitive achievements.
{ "pile_set_name": "PubMed Abstracts" }
LOG IN TO MY ACCOUNT Michigan Chapter Do It Yourself Fundraising The event you requested is not currently published.
{ "pile_set_name": "OpenWebText2" }
Tropical Storm Gordon has made landfall on the US Gulf Coast, coming on onshore around 50km east of Biloxi, Mississippi, on Wednesday. On arrival, Gordon had sustained winds approaching 115kmph, which is just short of Category 1 hurricane strength. State of emergency was declared across Alabama, Mississippi, Louisiana and the western side of the Florida Panhandle as damaging winds and heavy rain causing flood swept across the region. The worst of the storm lashed the northwest Florida and the Alabama coast where up to 150mm of rain fell in a matter of a few hours. According to the Associated Press, roads were blocked off due to widespread flooding. Similarly, a storm surge led to flooding along the Gulf Coast and barrier islands. The strong winds were also a major concern as trees and power lines were brought down, resulting in widespread outages. At some point, nearly 50,000 people were without power in Alabama. Gordon developed on September 3 around the Turks and Caicos Islands. It then went on to cross the Florida Peninsula, gaining strength as it tracked over the warm waters of the Gulf of Mexico. The storm went on to spawn several tornadoes before weakening as it moved inland towards Arkansas. Additional flooding is likely across the Mississippi Valley as the remnants of the storm move up towards the Midwest. By the end of the week, tropical moisture from Gordon is forecast to continue to fuel heavy rain right across the region.
{ "pile_set_name": "OpenWebText2" }
Mobile devices (e.g., smartphone, tablets, etc.) often include different types of applications. For example, a single mobile device may include enterprise applications (e.g., enterprise resource planning (ERP), customer relationship management (CRM), enterprise email, and/or other applications), personal applications (e.g., games, social networking apps, personal email applications, and/or other applications), and/or other types of applications. In some cases, an enterprise administrator may wish to limit use of certain applications (e.g., sets/groups of applications) in certain scenarios.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Stormpath Rest api Java can someone help me write this in the form of an httpRequest in java. I´ve tried many times and failed. I don´t know why but I simply can´t get it right =( curl -X POST --user $YOUR_API_KEY_ID:$YOUR_API_KEY_SECRET \ -H "Accept: application/json" \ -H "Content-Type: application/json;charset=UTF-8" \ -d '{ "favoriteColor": "red", "hobby": "Kendo" }' \ "https://api.stormpath.com/v1/accounts/cJoiwcorTTmkDDBsf02bAb/customData" (the custom data has to be in json format) Any help would be greatly appreciated. =) A: DefaultHttpClient httpClient = new DefaultHttpClient(); HttpPost postRequest = new HttpPost( "https://api.stormpath.com/v1/accounts/cJoiwcorTTmkDDBsf02bAb/customData"); String credentials = apiKey.getId() + ":" + apiKey.getSecret(); postRequest.setHeader("Authorization", "Basic " + Base64.encodeBase64String(credentials.getBytes("UTF-8"))); postRequest.setHeader("Accept", "application/json"); StringEntity input = new StringEntity("{\"favoriteColor\":\"red\",\"hobby\":\"Kendo\"}"); input.setContentType(ContentType.APPLICATION_JSON.toString()); postRequest.setEntity(input); HttpResponse response = httpClient.execute(postRequest); System.out.println(response);
{ "pile_set_name": "StackExchange" }
You'll be familiar with some of these near-misses, but others are frankly astonishing. Which rapper almost took Matt Damon's role in Elysium? Which former Friends star was the first choice to front Men in Black? And why is Leonardo DiCaprio Christian Bale's nemesis? Read on... 1. Al Pacino – Star Wars Wenn Getty Images Pacino revealed during a Q&A session in 2015 that the role of roguish smuggler Han Solo was "his for the taking" back in the '70s, but he turned it down because he didn't understand the script. Harrison Ford made the role iconic and ended up having his own issues with Lucas's script, famously telling the director "You can type this shit, George, but you sure can't say it." 2. Tom Selleck – Indiana Jones Rex Features PA Images The first choice for the role back in the day was none other than Tom "The Moustache" Selleck. He recently set the record straight on rumours that he turned down Indy – Spielberg and his producers held out for a month in the hopes Selleck would become available, but CBS refused to let him out of his Magnum PI contract. 3. Henry Cavill – Casino Royale AP/Rex Features Prior to being cast as Superman, Henry Cavill was the perpetual franchise bridesmaid and never the bride. He was cast to play Supes in McG's cancelled movie before being replaced by Bryan Singer with Brandon Routh, and he was a frontrunner for Twilight's Edward Cullen. Before both these near-misses, Cavill was neck-and-neck with Daniel Craig for the chance to play Casino Royale's steely new James Bond, and lost out to Craig because 007's producers wanted someone older. 4. Leonardo DiCaprio – American Psycho Bale was initially cast as killer yuppie Patrick Bateman, but was unceremoniously replaced by Lionsgate after DiCaprio began pursuing the role, fresh off his Titanic success. Bale was "obsessed" with the project and reclaimed it after ferocious lobbying, but his beef with DiCaprio supposedly predated the Brett Easton Ellis adaptation by several years. Bale lost This Boy's Life and What's Eating Gilbert Grape to DiCaprio, and unsuccessfully campaigned for the role of Jack in Titanic. Related: Here's how the Harry Potter films almost looked... 5. Anne Hathaway – Silver Linings Playbook It's safe to say that Jennifer Lawrence and David O Russell mesh well together; Lawrence won her first Oscar for Silver Linings Playbook and was nominated for his American Hustle, and the enthused O Russell went on to cast her in his biopic of Miracle Mop inventor Joy Mangano. But Lawrence's role as Playbook's volatile Tiffany was earmarked for Anne Hathaway, who dropped out over "creative differences" with the famously prickly director. Hathaway won her own Oscar for Les Misérables, so this all worked out for the best. 6. Angelina Jolie – Gravity An impressive list of actresses were considered to shoulder the lead role in Alfonso Cuarón's spectacular space drama, including Natalie Portman, Rachel Weisz and Marion Cotillard. But Angelina Jolie was the firm frontrunner to play astronaut Ryan Stone, but was unable to take the role thanks to scheduling conflicts with either her directorial debut In the Land of Blood and Honey, or her role in Maleficent, or both. Sandra Bullock went on to earn a slew of nominations for her physically and emotionally gruelling turn. 7. Michael Fassbender – Pearl Harbour Rex Features PA Images Yeah, this one came as a surprise. One of Fassbender's very first professional auditions was for the role of soldier Rafe McCawley in Michael Bay's Pearl Harbour, which ultimately went to Ben Affleck. It would be another seven years before Fassbender got his break in Steve McQueen's Hunger, but he might have dodged a bullet – Pearl Harbour was a critical disaster even by Bay's low standards, and might have done Fassbender more harm than good had it been audiences' first exposure to him. 8. Hailee Steinfeld – The Hunger Games Every young actress in Hollywood was vying for the role of The Hunger Games' tough-as-nails heroine, but Steinfeld – along with Abigail Breslin and Nikita star Lyndsy Fonseca – was one of the few contenders to make it down to the wire. It's easy to understand why she got close; both Steinfeld and first choice Jennifer Lawrence were nominated for Oscars in the year the role was cast, and both earned their nods for playing grounded, resourceful young women in True Grit and Winter's Bone respectively. 9. Eminem – Elysium Director Neill Blomkamp dropped this bombshell in an interview with Wired. Prior to casting Matt Damon, Blomkamp was looking to go unconventional with the casting of reluctant hero Max, and was turned down by South African rap-rave icon Ninja from Die Antwoord before approaching Eminem. The real Slim Shady was interested, but only on the condition that the film shot in his hometown of Detroit. Denied. Ninja, by the way, later appeared in Blomkamp's Chappie. 10. Gwyneth Paltrow – Jurassic Park It's widely known that Paltrow was in the running for Kate Winslet's role in Titanic, but a few years earlier she missed out on the female lead in a similarly iconic blockbuster. Having worked with Steven Spielberg previously on 1991's Hook, the still unknown Paltrow screen-tested for the role of plucky paleobotanist Ellie Sattler, which eventually went to Laura Dern. 11. Will Smith – The Matrix Smith and Ewan McGregor were both offered the role of The One in the Wachowskis' groundbreaking cyberpunk saga, and both passed. Smith has since admitted that he wouldn't have been a good fit for the project, explaining: "I would have absolutely messed up The Matrix. I wasn't smart enough as an actor to let the movie be, whereas Keanu was smart enough to just let it be." 12. Robin Williams – Harry Potter PA Images A lot of the Potter series' alternative casting choices are easy to picture – Tim Roth as Snape, Hugh Grant as Lockhart – but Robin Williams as gentle giant Hagrid? That's a struggle, and it came very, very close to happening before JK Rowling made the stipulation that only British actors could be cast in the adaptations. Williams was a great actor, and one of his best performances (Good Will Hunting) was also one of his beardiest, but Hagrid he ain't. 13. Tom Cruise – Iron Man Rex Features PA Images When the concept of an Iron Man-centric movie was first in development back in the late '90s, Tom Cruise was in line to produce and star as Tony Stark. Supposedly, Stan Lee also had a hand in one draft of the script and Quentin Tarantino was among the names considered to direct. While it's very unlikely Iron Man would have become the franchise lynchpin he has under Robert Downey Jr, this version does sound bizarrely fascinating. 14. OJ Simpson – Terminator Rex Features PA Images No, seriously. Back in the early stages of Terminator's development – long before the murder trial in 1994 – Simpson was suggested to play the title role. The football player had enjoyed a decent sideline in acting, with roles in The Naked Gun trilogy and The Towering Inferno among others, but James Cameron and his producers ultimately looked elsewhere because, and we quote, "People wouldn't have believed a nice guy like OJ playing the part of a ruthless killer". 15. Jake Gyllenhaal – Batman Begins In 2003 when Christopher Nolan was casting the reboot that would spearhead arguably the most critically acclaimed superhero franchise of all time, Gyllenhaal was still a relative unknown, with Donnie Darko gradually gathering cult steam and Roland Emmerich's The Day After Tomorrow still a year away from release. Still, he was scriptwriter David Goyer's first choice for the role of Bruce Wayne, but ultimately Nolan passed him over in favour of the older Christian Bale. 16. David Schwimmer – Men in Black Rex Features Getty Images Ross Geller could have been Agent J. Schwimmer was offered the chance to star opposite Tommy Lee Jones, but chose to turn it down in favour of joining Gwyneth Paltrow in poorly received rom-com The Pallbearer, supposedly because he wanted to "grow rather than go for the quick cash". It's fair to say that decision maybe didn't work out exactly the way he'd hoped. 17. Emily Blunt – Iron Man 2 Not many of the entries on this list leave you feeling wistful for what could have been, but Emily Blunt as Marvel's duplicitous Black Widow feels like close to perfect casting. Scarlett Johansson has done well with the role, but Blunt has a very different, more cerebral presence on screen that could have made up for the character's patchy writing in Iron Man 2. 18. Jim Carrey – Pirates of the Caribbean Rex Features PA Images It's not hyperbole to say that Jack Sparrow would not exist were it not for Johnny Depp. Yes, Ted Elliott and Terry Rossio's original script did feature a character by that name, but everybody involved in the franchise has made it clear that it was Depp's performance, part Keith Richards, part Pepé Le Pew, all inspired madness, that made the character an insta-icon. Carrey was Disney's first choice, and we don't feel too bereft for not knowing what his Sparrow would have looked like. 19. Jack Nicholson – The Godfather Rex Features Al Pacino inhabits Michael Corleone so completely throughout his gradual, three-film-long arc from hero to villain that it's hard to imagine anybody else in the role. But Jack Nicholson was reportedly Francis Ford Coppola's first choice, and turned the role down because "at that time I believed Indians should play roles written for Indians, and Italians should do the same". 20. Josh Hartnett – Thor Marvel Getty Images Nothing against Josh Hartnett, but it's hard to imagine that his take on Thor's treacherous brother Loki would have become the breakout fan favourite that he has under Tom Hiddleston's watch. Hartnett reportedly had several meetings with director Kenneth Branagh for the role, around the same time Alexander Skarsgård was rumoured to be the frontrunner for Thor. Want up-to-the-minute entertainment and tech news? Just hit 'Like' on our Digital Spy Facebook page and 'Follow' on our @digitalspy Twitter account and you're all set. This content is created and maintained by a third party, and imported onto this page to help users provide their email addresses. You may be able to find more information about this and similar content at piano.io
{ "pile_set_name": "OpenWebText2" }
Acute infection with Sin Nombre hantavirus without pulmonary edema. Acute infection with Sin Nombre virus has been associated with development of hantavirus cardiopulmonary syndrome (HCPS), a severe cardiopulmonary illness with respiratory failure and shock. We present two cases of Sin Nombre hantavirus infections that did not lead to marked pulmonary complications in two otherwise healthy young adults from Utah and California. Sin Nombre virus causes a wider spectrum of disease severity than has been previously reported.
{ "pile_set_name": "PubMed Abstracts" }
Neurocognitive biases and the patterns of spontaneous correlations in the human cortex. When the brain is 'at rest', spatiotemporal activity patterns emerge spontaneously, that is, in the absence of an overt task. However, what these patterns reveal about cortical function remains elusive. In this article, we put forward the hypothesis that the correlation patterns among these spontaneous fluctuations (SPs) reflect the profile of individual a priori cognitive biases, coded as synaptic efficacies in cortical networks. Thus, SPs offer a new means for mapping personal traits in both neurotypical and atypical cases. Three sets of observations and related empirical evidence provide support for this hypothesis. First, SPs correspond to activation patterns that occur during typical task performance. Second, individual differences in SPs reflect individual biases and abnormalities. Finally, SPs can be actively remodeled in a long-term manner by focused and intense cortical training.
{ "pile_set_name": "PubMed Abstracts" }
<?php namespace Elgg\Cache; /** * Least Recently Used Cache * * A fixed sized cache that removes the element used last when it reaches its * size limit. * * Based on https://github.com/cash/LRUCache * * @internal */ class LRUCache implements \ArrayAccess { /** @var int */ protected $maximumSize; /** * The front of the array contains the LRU element * * @var array */ protected $data = []; /** * Create a LRU Cache * * @param int $size The size of the cache * @throws \InvalidArgumentException */ public function __construct($size) { if (!is_int($size) || $size <= 0) { throw new \InvalidArgumentException(); } $this->maximumSize = $size; } /** * Get the value cached with this key * * @param int|string $key The key. Strings that are ints are cast to ints. * @param mixed $default The value to be returned if key not found. (Optional) * @return mixed */ public function get($key, $default = null) { if ($this->containsKey($key)) { $this->recordAccess($key); return $this->data[$key]; } return $default; } /** * Add something to the cache * * @param int|string $key The key. Strings that are ints are cast to ints. * @param mixed $value The value to cache * @return void */ public function set($key, $value) { if ($this->containsKey($key)) { $this->data[$key] = $value; $this->recordAccess($key); } else { $this->data[$key] = $value; if ($this->size() > $this->maximumSize) { // remove least recently used element (front of array) reset($this->data); unset($this->data[key($this->data)]); } } } /** * Get the number of elements in the cache * * @return int */ public function size() { return count($this->data); } /** * Does the cache contain an element with this key * * @param int|string $key The key * @return boolean */ public function containsKey($key) { return array_key_exists($key, $this->data); } /** * Remove the element with this key. * * @param int|string $key The key * @return mixed Value or null if not set */ public function remove($key) { if ($this->containsKey($key)) { $value = $this->data[$key]; unset($this->data[$key]); return $value; } return null; } /** * Clear the cache * * @return void */ public function clear() { $this->data = []; } /** * Moves the element from current position to end of array * * @param int|string $key The key * @return void */ protected function recordAccess($key) { $value = $this->data[$key]; unset($this->data[$key]); $this->data[$key] = $value; } /** * Assigns a value for the specified key * * @see \ArrayAccess::offsetSet() * * @param int|string $key The key to assign the value to. * @param mixed $value The value to set. * @return void */ public function offsetSet($key, $value) { $this->set($key, $value); } /** * Get the value for specified key * * @see \ArrayAccess::offsetGet() * * @param int|string $key The key to retrieve. * @return mixed */ public function offsetGet($key) { return $this->get($key); } /** * Unsets a key. * * @see \ArrayAccess::offsetUnset() * * @param int|string $key The key to unset. * @return void */ public function offsetUnset($key) { $this->remove($key); } /** * Does key exist? * * @see \ArrayAccess::offsetExists() * * @param int|string $key A key to check for. * @return boolean */ public function offsetExists($key) { return $this->containsKey($key); } }
{ "pile_set_name": "Github" }
Chapter 3 The woman walked out of her house and headed straight for the wall surrounding the village. She did not even bother to close the door behind her. She stopped just a few feet short of the wall and crouched down. With a single swift motion she leaped twenty feet into the air and over the wall. "Well, that explains why no one sees them go." Ruby said. "Is it normal for people in this world to make superhuman leaps in the middle of the night?" Yosuke asked. He was a bit thrown off by Team RWBY's lack of reaction to the sight. "No, but most hunters and huntresses are capable of this." Yang explained. "Either she's secretly a huntress or something strange is going on. We'd better follow her." "We can't make that jump." Chie said. "Ruby, take them around the long way." Blake advised. "I'll follow her." With that Blake rushed forward and bounded over the wall and out of sight. "I shouldn't let her go alone." Yang said and headed off as well. "If we just try to leave through the gate in the middle of the night like this, the guards are going to have a lot of questions." Weiss said. "Is there any way your Personas could get you over the wall?" "We could give it a shot." Yosuke said. He summoned his Persona and it picked him up. "Looks like it shouldn't be a problem." His Persona leaped over the wall and out of sight. The others soon followed. "I really hope nobody saw that." Yukiko said after leaping over the wall. "It would be quite a shock." She sounded out of breath. "Why are you out of breath?" Ruby asked. "Using our Personas requires extreme concentration and exertion." Naoto explained. "Even a short duration use can be exhausting." "Did you try to stop her?" Ruby asked. "We tried walking in front of her, talking to her, even standing in her path." Yang replied. "It's like she's sleepwalking. She just ignored us." "I'd be worried about trying to stop her physically." Blake said. "She could hurt herself or us." "We'll just have to follow her." Ruby said. They had gone quite deep into the forest. They had expected to be attacked by Grimm, but no attack had materialized. They had seen some, but the Grimm appeared to be keeping their distance. It was bizarre. The woman continued her trek, heading for a mountain at the edge of the forest. She arrived at its slope and immediately headed for a large cave. The entrance to the cave had a strange, unnatural look and feel about it. The woman walked into the cave and the group followed. "Now this is like the TV world." Yosuke said confidently. He put on a pair of glasses. "Definitely the same." "I can't see anything, it's too foggy." Ruby said in frustration. "Try these." Yukiko took off her glasses and handed them to Ruby. "Wow, it's like there's no fog at all." Ruby said after putting on the glasses. "Where did you get these?" "Teddie made them for us when we first met him." Chie explained. "There's fog just like this in the TV world. It's disorienting if you don't have the glasses." The Persona users looked at Teddie expectantly. "My time to shine!" Teddie exclaimed. "Ta-da!" He produced four sets of the glasses and handed them out to Team RWBY. "I always keep extras just in case!" "Maybe he's not totally useless after all." Weiss said. Teddie just smiled, seemingly oblivious to the sarcastic and backhanded nature of the compliment. The looked around, but the woman was gone. More worryingly, the location did not look like the inside of a cave at all. They appeared to be standing on a dirt path, an imposing fortress looming in the distance. Team RWBY was visibly concerned by the turn of events. "I wouldn't worry too much." Kanji said. "This kind of thing always happens." "It's hard to explain, but in the TV world, there are many locations that take strange forms like this." Yosuke said. "The cave probably wasn't a cave at all. It was probably some kind of portal, sort of like the TVs we use to enter and exit the TV world." "So what do we do now?" Ruby asked. She did not fully understand what he was saying, but Yosuke clearly had experience she did not have. "Well, that's up to our leader." Yosuke said. "Yu, what should we do?" "First we need to find her." Yu replied. He nodded in Rise's direction. "Kouzeon!" Rise shouted. Behind her, the figure of a six-armed woman in an elegant dress, with a telescope for a head, appeared. The figure placed a visor in front of Rise's face as she concentrated. The Persona vanished and she collapsed to her knees. Yu was nearby to catch her as if he knew it would happen. "I'm alright." She stumbled to her feet. "That way." She pointed deeper into the world. "I'm not sure if it's the woman we followed in here, but I sense a tremendous source of power in that direction. There are lots of shadows here too, powerful ones." "We should rest." Yu said. The other Persona users nodded and began to head for the exit, a cave entrance that was a mirror image of the one they had used to enter the world. "But we have to save that woman!" Blake shouted. "We can't just leave!" "Trust us." Naoto said. "We haven't slept in more than a day, and you're in this world for the first time. It is imperative that we are fully rested and prepared." "In our experience, people aren't killed by the shadows right away." Yukiko explained. "That woman and the others should be alright for a while. Besides, if we can't save them, there's no one else. We need to be ready." "They're right." Ruby said. "Just being here makes my head hurt and I am pretty tired. We should go to our camp and get a night's rest." "I'm worried about them partner." Yosuke said to Yu. They were on watch while the others slept. "We all faced our shadows, they haven't yet. What if we run into their shadows? The way they fight without Personas, their shadows would be incredibly powerful. And who knows what secrets they're hiding. It could get weird, Kanji-weird. Besides that, it took us all time to recover after accepting our other selves." Yu shrugged. "Working together, I'm sure we can overcome anything." "Another thing's bothering me." Yosuke admitted. "This world, we were transported here by Margaret, but she didn't meet us here. When we went into the Hollow Forest, she was there to explain things and provide an exit. When all this is over, how will we get home?" "I'm sure she wouldn't send us here if there was no way back." Yu said. "You know her better than I do." Yosuke sighed. "I just hope you're right." The group trudged down the path leading to the fortress. If not for the yellow sky, constant fog and warped sense of distance, there would have been nothing to distinguish this place from the real world. Upon entering the world, the fortress had seemed to be miles away, but they arrived at it after just minutes of walking. They were greeted by a roiling red and black mass where the gate should have been. "It's a portal." Yosuke explained. "The TV world was subdivided like this too." "The power I sensed earlier is definitely inside." Rise said. "This place kind of reminds me of Yukiko's castle." Teddie said. "Can we please not talk about that?" Yukiko said with a mix of annoyance and embarrassment. "Well, in we go." Kanji said as he confidently stepped through the portal. The others followed. The inside was entirely incongruous with the outside. While the outside had been an imposing fortress with towering stone walls, the inside was a narrow snow-covered path. The path was lined by trees and bushes too thick to push through, so the only way to proceed was straight ahead. "This place seems…familiar." Ruby said. "It's like I've been here before." Yu and Yosuke exchanged knowing looks. "If this is like the TV world, it is partly created by the minds of the people in it." Teddie said. "In our experience, it's a place from your imagination or that relates to the part of yourself you keep hidden." Naoto explained. "For us, it was related to the kidnapping victim, but it could be different here." The Investigation Team was not going to say it, but somewhere inside was likely Ruby's shadow, assuming this was 'her' world. They would cross that bridge when they got to it. Rise summoned her Persona and scanned the area. "There is definitely a person in here." She reported. "There are shadows too, and some powerful ones." "We should get moving." Yang said. "We won't do any good just standing here, there are people who need saving." They walked deeper into the snowy forest, for hours it seemed. It was hard to keep a sense of time. The scenery never changed, so they could not judge how long they had been walking by how much progress they had made. It was a good thing the path was a straight shot; with no landmarks it would be easy to get lost. Finally, Kanji said what most of them were thinking. "So, where are all the shadows?" The group looked to Rise for an answer. "I've been tracking them. They're acting differently than I've ever experienced. The weak ones we'd normally be fighting have been avoiding us. They're all around, but outside the bounds of the path." Yu pressed his hand against the foliage lining the path. Instead of feeling trees and bushes, it was a solid wall. He shook his head to indicate they could not pass through. "Maybe they can sense our power and don't want to fight us." "Or maybe they're setting up an ambush." Naoto cautioned. "I don't think so." Rise said. "If they were going to ambush us, you'd expect them to gather in one place. They're just getting out of the way as we pass and then going back to normal." She stopped to scan the path ahead. "There's a strong shadow nearby. It's just around the corner and I doubt this one will be running away." The path ahead curved lazily before opening into an open field. It was circular, more like an arena than a natural feature. In the center stood a shadow that looked like a twisted version of a Deathstalker. It stood its ground as the group approached. When they got close, it hissed and snapped its claws threateningly but did not charge them. "I'll take care of this!" Yang shouted, charging straight at the shadow. "Wait!" Rise warned. "You shouldn't…" Before Rise finished speaking, Yang slammed her fist full force into the Deathstalker shadow's face. There was a brilliant flash of light and Yang recoiled in pain, clutching her arm. "It reflects physical attacks." Rise finished. With a swipe of its claw, the shadow sent Yang sailing across the field. She slammed into the side of the clearing before falling flat on her face. Even with her aura to protect her, it was tremendously painful. Ruby fired a shot from Crescent Rose. It hit the shadow and deflected harmlessly into the air. "We've got to use something else." Naoto implored. "Your normal weapons won't hurt it." She took a step forward and summoned her Persona. "Yamato Sumeragi!" A figure wearing formal attire, knee-high boots, a sharply pointed triangular helmet, and trailing a cape and flowing blond hair behind it appeared. The Persona made a sweeping motion in the air with its sword and a square of light appeared beneath the shadow. The square collapsed with no effect. It was replaced by a black circle. It too collapsed without doing any damage. "Light and darkness don't have any effect either." Naoto cautioned. "So what should we use?" Blake demanded. "I can't get a good reading." Rise replied. "Just try some things and see what works." She sounded as frustrated as the others. The shadow was now on the attack, charging at the group with its claws and stinger. They scattered but the shadow zeroed in on Weiss. Yu tried to distract it, his Persona delivering a shot of electricity from the flank, but it seemed little more than an annoyance for the shadow. In desperation, Weiss used her glyphs to encase the shadow's legs in ice. The shadow hissed in pain and recoiled, circling back away from her. "That's it!" Rise encouraged. "It's vulnerable to ice!" Chie and Teddie stepped forward and summoned their Personas. Chie's Persona was the form of a female samurai, clad in golden armor with a two-bladed sword. Teddie's was just as strange as the man himself. Rainbow colored and conical, it sported a large, confident smile. Its defining feature was its tail, a rocket. Both Personas unleashed a torrent of ice into the shadow. The ice first pinned it in place and then encased it. The two Personas flew high into the air before coming crashing down into the frozen shadow, which now shattered into innumerable pieces. The pieces evaporated and the shadow was gone. Yang stumbled back over to the group, still wobbly on her feel. "Yang, are you alright?" Ruby asked with clear concern in her voice. "I'll be fine, just a scratch." Yang replied confidently. Her confident front was undermined by her appearance. She still clutched her arm and blood trickled from a cut near her hairline. The others looked at her with apprehension. "I've had worse." She let go of her injured arm to wipe the blood from her face. "I definitely didn't see that coming." "You can't fight shadows the way you fight Grimm." Yosuke warned. "Lots of them, especially the strong ones, have hidden properties. They're most dangerous when they use your own power against you." "You really must fight them more tactically." Naoto added. "See what works and what doesn't first, and then hit them hard when you know it won't backfire." "That kind of hesitation is dangerous." Blake countered. "It is." Yukiko agreed. "But it's necessary, and the abilities Teddie and I have can buy us the time we need." She turned to Yang. "Let me heal you." Yang stepped forward, unsure of what this healing would entail. "Sumeo-Okami!" The figure of a golden woman with elegant wings and flowing hair appeared. With a flourish, Yukiko's Persona surrounded Yang with brilliant light. In an instant her cuts and bruises were gone and her arm no longer hurt. "Thanks." Yang said. Her aura would have healed the damage in a short time, but instant healing was certainly a plus. "That was…interesting." The feeling was hard to describe. It was a warm, perhaps loving feeling. She stretched and flexed her arm to make sure it was fully healed; it was. "I'd rather not need it again, but that's a cool power to have." "There are no other shadows in the immediate area." Rise reported. "Just a few relatively strong ones and a very powerful one further in. The strongest one is very close to the person in here, we should hurry."
{ "pile_set_name": "OpenWebText2" }
1. Introduction {#sec1-ijerph-17-00691} =============== 1.1. The Links between Ageing, Potential Mobility, Choice and Well-Being {#sec1dot1-ijerph-17-00691} ------------------------------------------------------------------------ The importance of having the possibility to participate in society while ageing has been studied and documented in several different contexts \[[@B1-ijerph-17-00691],[@B2-ijerph-17-00691],[@B3-ijerph-17-00691],[@B4-ijerph-17-00691]\], as has the intrinsic value of mobility in itself \[[@B1-ijerph-17-00691]\]. Having the possibility to participate in various out-of-home activities has been found to be central for well-being outcomes during the later stages of life \[[@B5-ijerph-17-00691],[@B6-ijerph-17-00691]\]. This makes exploring the potential means of getting to these activities a key societal concern. Having a range of alternatives from which to choose is widely considered to be beneficial for a person's well-being (\[[@B7-ijerph-17-00691]\], pp. 33--39). In terms of daily mobility, this can relate to the range of everyday activities in which a person can participate \[[@B8-ijerph-17-00691],[@B9-ijerph-17-00691]\]; the time frames during which a person can participate in said activities \[[@B10-ijerph-17-00691],[@B11-ijerph-17-00691]\]; and the mode(s) of transport a person can use to reach said activities \[[@B12-ijerph-17-00691]\]. The importance of having a range of modal options from which to choose (referred to as 'robustness'), and indeed option value, have been emphasized as important elements of accessibility \[[@B13-ijerph-17-00691]\]. This robustness is considered key as it means that an individual is not reliant on a specific mode (with its inherent limitations) but instead has the option to be flexible and free to choose among several modes. This has also been discussed as a multimodal advantage, with those limited to just one mode said to be subject to a corresponding monomodal disadvantage \[[@B12-ijerph-17-00691]\]. The potential for mobility, most often in the form of accessibility (as opposed to mobility itself), is becoming a more prominent focus \[[@B14-ijerph-17-00691]\]. This potential has in turn been found to have strong associations with freedom and autonomy, particularly for older people during the ageing process \[[@B15-ijerph-17-00691]\]. This potential is also said to comprise important elements of well-being in itself \[[@B7-ijerph-17-00691]\]. Accessibility, motility and capability are key concepts which in recent years have been gaining ground as part of discussions surrounding potential mobility see e.g., \[[@B16-ijerph-17-00691],[@B17-ijerph-17-00691],[@B18-ijerph-17-00691]\] for elaborations of each concept. Instead of how, when, where or with whom a person travels, their possibilities or opportunities to do so are becoming the focus within research. 1.2. The Capability Approach as a Conceptual Framework {#sec1dot2-ijerph-17-00691} ------------------------------------------------------ The Capability Approach (CA) has been receiving increasing attention as a conceptual framework in transport research \[[@B19-ijerph-17-00691],[@B20-ijerph-17-00691]\] not least due to its focus on the size of the choice set and how it is tightly linked to equity concerns \[[@B21-ijerph-17-00691]\]. The CA has an emphasis on realizing potential and thus a focus on Eudemonic as opposed to Hedonic aspects of well-being, or becoming, being or living one's 'true self' \[[@B22-ijerph-17-00691]\]. The CA emphasizes the direct links between greater freedom---conceptualized as a larger set of 'capabilities'---and well-being \[[@B23-ijerph-17-00691]\]. Well-being, in turn, is influenced by the capabilities which are operationalized as functionings or the 'beings' and 'doings' of the individual \[[@B23-ijerph-17-00691]\].With respect to daily travel, this is related to the pre-conditions for a person's mobility; the options, capabilities or scope a person has with respect to mobility. The ties between this scope for action and realized mobility is framed as *evaluation* and *selection* of the best alternative, as deemed 'best' by the individual herself. Choice is a central concept in the field of transport and mobility, with choice---particularly modal choice---a key aspect of many studies e.g., \[[@B24-ijerph-17-00691],[@B25-ijerph-17-00691]\]. Revealed behavior ('functionings' within the CA) is the main consideration for many studies within transport. However, revealed behavior only tells us a very limited amount about a person's range of options \[[@B7-ijerph-17-00691]\] (pp. 36--37). If we are to focus on choice, the *range* of options---and the individual's selection from this range---is a more appropriate realm of analysis \[[@B7-ijerph-17-00691]\]. 1.3. Ageing and a Reduced Scope for Action {#sec1dot3-ijerph-17-00691} ------------------------------------------ A person's choice set with respect to mobility is largely considered to reduce in size in tandem with the ageing process \[[@B26-ijerph-17-00691],[@B27-ijerph-17-00691]\], often as a result of declining health, reduced cognitive or physical capacity \[[@B28-ijerph-17-00691],[@B29-ijerph-17-00691]\], changes in household composition (for instance, the death of a spouse) \[[@B30-ijerph-17-00691]\], or changes in personal financial circumstances \[[@B31-ijerph-17-00691]\]. For example, a person's scope for action may decrease in terms of the cognitive or physical capacity required to negotiate the environment(s) in which she moves, or a person's social capital might be diminished if her social network contracts \[[@B27-ijerph-17-00691],[@B32-ijerph-17-00691],[@B33-ijerph-17-00691]\]. However, the scope for action may also increase in some aspects of life as people age. For instance, as one retires, she may enjoy a greater level of flexibility in terms of time \[[@B34-ijerph-17-00691]\]. Some have noted that for older women in particular, reliance on a partner for transportation can ultimately result in a decreased scope for action \[[@B8-ijerph-17-00691],[@B10-ijerph-17-00691]\]. At the same time, caring for a person within one's social network, even just keeping them company, can also mean a reduced scope for action \[[@B30-ijerph-17-00691]\]. Not having access to technology, or not having the possibility to use it can, on the other hand, result in reduced scope for action, particularly as we witness the digitalization of many forms of transport. This can again affect women in particular \[[@B35-ijerph-17-00691],[@B36-ijerph-17-00691]\]. Maintaining the modal choice set in as far as possible could be highly beneficial for older people, in particular older people who have a more limited range of options from which to choose in comparison to what they may have had during earlier stages of life. It has been found that modal options are important in terms of facilitating the fulfilment of travel needs and activity wishes, while a lack thereof can have the opposite effect \[[@B37-ijerph-17-00691],[@B38-ijerph-17-00691]\]. A link has even been found between the use of a narrower range of modes and loneliness \[[@B39-ijerph-17-00691]\], with another study finding that some modes of transport are more closely associated with a greater scope for action than others \[[@B11-ijerph-17-00691]\]. It has even been emphasized that having options to choose from might not appear to be so important during the earlier stages of the ageing process but its importance may become more apparent during the later stages of the ageing process, if or when one has a reduced scope for action and more difficulty participating in everyday out-of-home activities \[[@B40-ijerph-17-00691]\]. While several studies have highlighted the importance of the car as a modal option during later life \[[@B41-ijerph-17-00691],[@B42-ijerph-17-00691]\], the straightforwardness of the relationship between the use of the car and the fulfilment of travel needs has also been questioned, particularly when one considers and accounts for different socio-demographic factors \[[@B43-ijerph-17-00691]\]. While potential mobility (encompassing modal options) and realized mobility (encompassing the mode(s) chosen) among older people have been explored in previous studies e.g., \[[@B37-ijerph-17-00691],[@B38-ijerph-17-00691],[@B39-ijerph-17-00691]\], investigating the process from potential to realization and the different kinds of motivation and reasoning behind the selection of some options over others is less explored. Furthermore, if we are to treat choice as an element of well-being, it is important to analyze the process of choice, and to distinguish between actually having chosen something and doing the same thing without having had a choice. Many empirical studies focusing on modal choice, particularly those based on standard travel survey data, do not make such a distinction. This study examines the process from potential to realized mobility among older people, with a specific focus on modal choice. The differences between the range of self-reported modal option(s), the modal option(s) selected from this range, and the reasons behind the selection of some modal options over others are explored. Links and exchanges between the experienced so-called 'real' options and realized behavior are then analyzed. In this way, we gain a greater insight into the different dynamic elements at play in the process from potential to realized mobility (evaluation as part of the CA), and the different forms of reasoning associated with the selection of different kinds of options. 2. Materials and Methods {#sec2-ijerph-17-00691} ======================== This study draws on a capability-based travel survey among older people (aged 65--79) and living in Sweden's large metropolitan regions; Stockholm, Gothenburg and Malmö. This meant that the survey was purposefully designed and shaped to capture elements of the CA. People within this age group (65--79) tend to have a greater scope for action than those aged 80 and above \[[@B44-ijerph-17-00691]\]. The questionnaire was developed with the intention of capturing three specific elements of the CA: resources (e.g., income, social capital, access to a bicycle, holding a driving license, etc.), capabilities (the range of different possibilities possessed by a person to achieve 'beings' and 'doings' of value) and functionings (the selected 'beings' and 'doings' of value). For a more detailed description of what the different elements of the CA entail, see \[[@B23-ijerph-17-00691]\]. The questionnaire and the Computer-Assisted Telephone Interviewing (CATI) script was formulated, tested and adapted a number of times before interviewing began. Ethical approval for this study was granted by the Regional Ethical Approval Board in Lund, Sweden in September 2015 (Dnr 2015/447). Sweden's three large metropolitan regions (LMRs), Stockholm, Gothenburg and Malmö, comprised the study area. These three LMRs are geographically delimited based on commuter patterns and movement between the central municipality and outer municipalities \[[@B45-ijerph-17-00691]\]. For this study, it was considered that LMRs would include and approximately reflect the relevant geographical areas of respondents' everyday activities. A stratified random sample of 3200 people aged 65--79 and living in Sweden's LMRs was drawn from a population register, with contact details containing a combination of landline and mobile phone numbers. Eleven people opted out before data collection began. A further two people opted out while data collection was underway. Interviewing was conducted by a small group of trained interviewers at a well-established and ISO-certified market research company. The interviews were carried out using CATI, allowing for more interviewer-respondent interaction so as to keep misunderstandings to a minimum and to facilitate a two-way communication process, when compared to other methods of data collection (e.g., compared to a postal survey or web-based survey). The interviews were conducted over the course of a three-week period during November-December 2015. The progression of the data collection was followed in order to gauge whether respondents understood and answered the questions in a consistent manner. From the remaining sample, attempts were made to contact 2119 people. These people were randomly selected but the probability of being selected changed successively with the completion of each additional interview. From those contacted, 1150 agreed to participate in the study, resulting in a response rate of 54% (56% for Stockholm; 52% for Gothenburg; and 55% for Malmö). In total, 1149 valid interviews were conducted (*n* = 383 in each LMR). The reasons given for not participating were (1) the person has a principle of not participating in surveys (29%); (2) the person did not answer (the phone) when they were contacted (18%); and (3) the person did not have time to participate when contacted (13%). All interviews were carried out in Swedish and over the phone. This meant that some people who were contacted could not participate. Among those who could not participate, 5.7% had difficulty speaking, spoke unclearly or did not speak Swedish. See \[[@B46-ijerph-17-00691]\] for a more detailed description of the sample, questionnaire and descriptive statistics. For this study, the focus lay on the process from potential to realized mobility among older people, with a specific focus on modal choice, and the reasoning behind the selection (and use) of specific modes over others. This meant that the elements of the material related to 'capabilities' and 'functionings' were the main focus. The analysis of this material was divided into the following parts:a)A descriptive analysis of the differences between the range of modal options available to respondents and the modes then selected from this range (modal choice).b)A descriptive and explorative analysis of the reasons behind the selection (and use) of said modes and the links between such reasoning and the different forms of selection processes. As part of the survey, respondents were asked to report which modal options they have the possibility to use for their everyday travel within the local region, even if they never use them. For this analysis, driving a car, using public transport (PT), walking and cycling were included as modal options. This material formed the basis for the 'scope for action', or the range of options from which individuals could choose. It is important to note that whether or not the individual considers it possible to use different modes of transport is highly subjective and is purely based on the perceptions of the individual. As such, two people who, for instance, appear to have all the same pre-conditions to cycle (e.g., access to a bicycle, physical capacity, short distances to activities of interest) may report different possibilities to cycle. This could be considered problematic in the sense that comparisons between individuals are not straightforward. However, the individual's perception is the key aspect of interest here, as it reflects the situation as perceived by the individual and thus, her perceived capability with respect to mobility. The respondents were then asked to state which options from this range they actually use, indicating 'realized mobility' and 'modal choice'. Here, although the respondent may have reported having a range of modal options from which to choose, she might perceive that she does not actually have a choice with respect to the mode she then uses. Similarly, the term choice may be perceived differently by respondents, with some perhaps reporting that they have the freedom to choose, and others reporting that they do not, despite being subject to the exact same circumstances. Respondents were then asked to give some reasons for why they opt to use these specific modal options and not the other modal options they could have selected. These reasons were processed in part as pre-codes. These were reasons, based on literature review, that were predicted to be given by respondents in advance of the survey being conducted. Respondents could also give open-ended reasons or accounts for their selection. It was possible to give several different reasons for selection, both in the form of pre-codes and open-ended answers. This meant that those who stated that in some way one mode was 'more suitable' than another often expanded upon their reasoning in the form of an open-ended answer. The actual formulation used in the open-ended answers was analyzed in a qualitative manner, while the information provided was subsequently coded into usually 2--3 different codes. Many respondents gave a combination of several pre-codes as well as an open-ended explanation. The prevalence of the different kinds of codes given by respondents were analyzed and subsequently combined into themes. The unique combinations of different codes provided were also analyzed, as was the actual wording given by respondents (in the open-ended element) for their modal choice. This material formed the basis for the analysis of the motivation and reasoning behind different forms of modal choice. The approach and analysis for this study can be regarded as a combination of quantitative and qualitative methods. The material obtained through the survey allowed for comprehensive, broader, descriptive analyses. However, such analyses are somewhat superficial in nature in terms of the actual meaning for respondents. The subsequent, more qualitative analyses allowed for a deeper and more detailed insight into the nuances behind the respondents' reasoning, allowing us to a gain a clearer understanding of the processes at play. 3. Results {#sec3-ijerph-17-00691} ========== Below is an account of the results for each part of the analysis. 3.1. The Differences between Scope for Action and Modal Choice {#sec3dot1-ijerph-17-00691} -------------------------------------------------------------- An outline of the various combinations of modal options, choice (use) and the frequency of the different choice processes among respondents is presented in [Table 1](#ijerph-17-00691-t001){ref-type="table"}, with the most common selection processes illustrated in [Figure 1](#ijerph-17-00691-f001){ref-type="fig"}. This gives us an insight into the scope for action and the selection of different modal options among respondents. More than one-quarter of respondents (28.8%) belong to the same category; having and using all four modal options. This category can be considered to comprise those at a relative multimodal advantage to the remainder of respondents \[[@B12-ijerph-17-00691]\]. By looking at the selection processes taking place among the second and third largest categories, it is clear to see that cycling is the most 'sensitive' with respect to selection; it being the first option to drop off among all the modal options. Those cycling, walking and using the car, yet choosing not to use public transport despite it being regarded as a modal option is relatively large (7.1% of respondents). Those who consider that they have walking, cycling, public transport and the car as modal options, yet selecting to use just the car is a larger group than expected, although still relatively small at 2.4%. Those with walking and cycling alongside the car as options yet choosing the car comprise a further 1.4%, with those with public transport as an option yet choosing the car making up a further 1%. Those who have the possibility to cycle yet choose the car comprises a further 0.5%, while those with both cycling and public transport as options yet choosing the car makes up another 0.3%. This means that the group actively selecting the car among a range of modal options amounts to 5.6% of respondents. The proportions of respondents actively selecting the other modal options among their respective ranges are much smaller, with the combinations of their respective categories largely only making up a fraction of the combined category actively selecting the car. Not all respondents have options, with 1.0% of respondents stating that they have no modal options whatsoever (or not answering the question). Several respondents state that they have just one or two options, and yet do not use those one or two options. Others state that they have just one option and use that one option. Some of the socio-demographic differences in modal choice processes are presented in [Table 2](#ijerph-17-00691-t002){ref-type="table"}. The variables of income ('lower income' encompasses a monthly household income of up to 16,666 Swedish crowns (SEK)), gender (male and female) and household status (cohabiting or not) were included in the analysis. [Table 2](#ijerph-17-00691-t002){ref-type="table"} indicates the key differences (and similarities) between socio-demographic groups, although no detailed analysis of statistically significant differences has been carried out. Walking and using public transport is spread evenly between income groups, while women are and those not cohabiting are somewhat overrepresented for this modal selection process. While having cycling as an option, yet choosing to walk and use public transport was linked to an overrepresentation of women, suggesting that the sensitivity of cycling for modal selection may be gendered. Actively selecting to use the car despite having other options is associated with an overrepresentation of men, suggesting that this too may be gendered. Those with lower incomes appear to be overrepresented in the use of cycling, walking and public transport as modes of transport (as a unique combination) while those cohabiting appear to be more inclined to actively select the car. However, this is just intended to give a brief overview of the sample. Further, more detailed statistical analyses are required in order to draw any robust conclusions regarding the differences outlined. 3.2. The Reasons Given for Modal Selection {#sec3dot2-ijerph-17-00691} ------------------------------------------ An outline of the different kinds of reasons given by respondents for their modal choice is presented in [Table 3](#ijerph-17-00691-t003){ref-type="table"}. The most common reason given by respondents for choosing the mode(s) they use over the mode(s) they could have used was that they are *more suitable*. Almost one-third (30.6%) of those who answered this question gave this as their one and only reason for choosing the mode(s) they did, while this reason accounted for 36.3% of mentions, either as a sole reason or combined with other reasons. When combined with other reasons or open-ended answers, 'more suitable' appears to be related to matters of convenience, and the mode fitting the purpose intended, be that using public transport in order to avoid difficulty getting parking, or opting to walk because activities lie within walking distance. The explanation attached to the pre-code *more suitable* meant that both positive and negative reasons could be coded in this way i.e., choosing a mode due to it being more efficient in terms of time or *not* choosing another mode because it does not suit the purpose of the trip. The second most common sole reason given was this/these mode(s) being *more comfortable* than the one(s) not chosen (at 15.2%). This reason accounted for 23.1% of the total mentions. Several respondents also mentioned a combination of just these two reasons (more suitable and more comfortable) (7.9%). A rather small proportion of mentions (1.5%) related to choosing mode(s) because they are *better for the environment/for environmental reasons*. However this was usually combined with at least one other reason, and rarely given as the only or main reason, often combined with *enjoyable* or *exercise/wants to move as much as possible*. At the same time, *enjoyable*, *less expensive* and *better for the environment/environmental reasons* also commonly featured as a combined reason for modal selection. These combinations of reasons were often linked to the selection of more active modes (walking and cycling) when the open-ended statements were analyzed. Furthermore, people mainly mentioned exercise as a reason when choosing to walk or cycle. However, this was also given as a reason for choosing to use public transport, with public transport trips sometimes described as comprising an element of exercise. Exercise when walking to/from public transport was even given as a reason for choosing one form of public transport over another e.g., opting for a longer walk to the train station instead of walking to a nearby bus stop. Fewer than expected reported *Health reasons/poor health/no energy* as their sole reason for modal selection (3.2% of respondents, 3.6% of mentions in combination with other options). Having poor health was often combined with another reason and was rather rarely given as a reason on its own. There was, in fact, another more positive relationship with health linked to modal selection, with 1.4% of mentions related to exercise, with several stating that they make this specific selection as exercising is healthy. A rather small proportion (2.2%) mentioned *faster/speed* (being faster than other modes) as their only reason for choosing the mode(s) they do over the modes they do not, with the proportion of mentions accounting for a more considerable 6.4% when combinations with other reasons were included. Being *less expensive/financial reasons* was also mentioned by surprisingly few (3.2% of reasons mentioned). Interestingly, these two reasons (*faster/speed* and *less expensive/financial reasons*) were often given in combination with one another. When focusing on the open-ended reasons, being 'inexpensive' often meant that a person had, for example, already paid for the car and did not want the extra expense of paying for public transport, or indeed, that a person had already bought a monthly or yearly public transport ticket and wanted to make the most of it. This was also related to choosing to walk and cycle because these modes do not cost anything, in the eyes of some respondents. There was only one mention of free public transport and this was by a person living or travelling in Gothenburg. *Proximity* as a sole reason for modal selection represented a larger proportion of respondents than expected (2.4%, 3.0% of total mentions), with 1.0% mentioning a combination of suitability and proximity for their modal selection. The reason *flexible, depending on the situation*, using all options or the strategic use of modal options accounted for 1.7% of sole mentions (1.3% of all mentions), while 2.3% of respondents mentioned having no choice/not much choice or having no alternative(s) as their sole reason for choosing the mode(s) they do. A small proportion (1.9%) explicitly stated that they have no need for alternatives, and gave this as their only reason for modal selection. While 2.4% stated that the sole reason behind their use of these modal options was simply that these were the options available to them. Some of the open-ended answers alluded to this being the life (style) that was chosen; their modal options were limited, but this was a conscious decision. All of the reasons encompassed in these codes allude to having a limited choice set. However, interestingly, the individuals' perceptions of their limited choice set differ considerably, with some expressing implicit dissatisfaction (*no choice/not much choice or having no alternative(s)*) and others expressing implicit satisfaction (*no need for alternatives*) despite perhaps having the same limited range of modal options. Again, the highly subjective nature of the survey means that individuals' perceptions of what is/is not an option could vary to a considerable extent. Some respondents may report not having a choice with respect to which modes they use despite considering that they do have other modal options. Here, there are two aspects to consider, the differences in the scope for action among respondents, as well as the differences in the perceptions of their scope for action. Respondents were inclined to give more positive reasons for selection when selecting more 'sustainable' modes. There was a sense of 'positive' or 'active' selection of the more active modes, with the environment, health, exercise and enjoyment linked to the selection of active or more sustainable modes. Several who chose walking and cycling explicitly mentioned proximity and accessibility to activities, mentioning that they live 'strategically' or 'centrally' and do not have any need to use a car when everything---or most activities---are within walking or cycling distance of their residential location. This is in contrast to the selection of the car, with this selection mechanism characterized as more passive, as reasons for not selecting other options, as opposed to direct reasons for selecting the car. Several talked about there being no alternatives; this was their option, and being locked into a lifestyle with this modal option. More than expected talked about complications related to the car i.e., having to find and pay for parking being the most prominent (0.3% of mentions). Fewer than expected mentioned freedom or wanting to have flexibility as a reason for choosing the car. Although a few open-ended responses did imply these aspects: > *"I come and go without a timetable."* Others took the car as a given or had normalized the use of the car as a sort of 'de facto' option, stating that they would only look into other options if it was not possible to use the car. Others questioned why one would even think about using other options when then the car is the only necessary option: > *"I use my own car as the first choice."* Some mentioned that their lifestyle dictates which mode(s) they use, meaning that having to carry heavy loads or living considerable distances from activities in remote locations result in the car being the only viable option. Fewer referred to not choosing public transport but when they did they talked about the non-existence of public transport, or mentioned that the destinations that could be reached using public transport were very limited, or that the public transport itself (i.e., the bus stop) was located too far away. Reliability was mentioned by fewer than expected and was usually given in combination with at least one or two other reasons. In the literature, reliability is often mentioned as an important aspect with respect to modal choice \[[@B37-ijerph-17-00691],[@B47-ijerph-17-00691]\] but as a theme, it was less apparent here. There were rather clear adaptive preference effects see \[[@B48-ijerph-17-00691]\] (pp. 83--84) at play with some people mentioning that they should not expect to be able to use other modes as they are sick or have poor or declining health, or mentioning that they have no choice, and that the only options that exist for them are the ones they use. Indications of adjustment related to the ageing process was also present. This materialized in the form of respondents discussing having stopped using certain modes, having had a fall, or having begun to experience declining health: > *"I am a pensioner. There is no need for me to travel every day."* The use of the tram became apparent as a very prominent mode of transport in Gothenburg, as several respondents living in this region went out of their way to mention their specific use of the tram, with habit an intertwined theme with the selection of this mode. Mentions of the tram in Gothenburg were much more evident than any other form of transport in any other area: > *" Because the tram goes exactly where I want it to go, and very often. It suits me fine. The tram is the best thing that exists."* The use of the tram seemed to be associated with a form of pride or a deeper association with the central parts of Gothenburg. In this sense, some of the reasons given suggested that the identity of the city seemed to be connected to the identity of the person, which in turn points to the symbolism of the tram as a mode of transport, and indeed its social meaning as a mode of transport \[[@B1-ijerph-17-00691],[@B49-ijerph-17-00691],[@B50-ijerph-17-00691]\]. Walking and the use of the tram were often discussed in tandem, alluding to the complementary nature of the two modes. Several mentioned the needs or wants of another person (most often a spouse) influencing their modal choice, e.g., having to give the spouse lifts, or not being able to use certain modes because they usually travel with the spouse. On the other hand, others talked about choosing the car because they had to give grandchildren lifts and had installed car seats for this purpose. Others talked about not being able to use the car and instead using public transport when travelling with grandchildren, or using public transport to reach their own children's homes to visit them and grandchildren. A number of respondents (1.3% of mentions) discussed tailoring their choice according to their needs. This meant having several options but, for instance, opting to use public transport in the city center or cycling or walking for shorter distances, but when it came to longer distances, using the car or public transport On the other hand, others (rather few) mentioned using the car for shorter distances, simply because they were used to using the car. 3.3. The Links Between Modal Selection Processes and the Reasons Given for Modal Selection {#sec3dot3-ijerph-17-00691} ------------------------------------------------------------------------------------------ The codes presented in [Table 3](#ijerph-17-00691-t003){ref-type="table"} were combined to form overarching themes, as presented in [Table 4](#ijerph-17-00691-t004){ref-type="table"}. Only the first recorded reason given by the respondent was used to form the codes, and overarching themes. This was because many respondents gave a range of different reasons (some gave up to eight reasons) that could not be placed into just one coding category or theme. This was in order to limit and simplify the categories produced by the cross-tabulation with the selection processes, presented in [Table 5](#ijerph-17-00691-t005){ref-type="table"}, and is, unfortunately, a limitation of this part of the analysis. The cross-tabulation of the different codes (reasons for modal selection) with the selection processes is presented in [Table 5](#ijerph-17-00691-t005){ref-type="table"}. Just some categories of modal selection processes were included, again in order to limit the number of categories produced. This also meant limiting the analysis to a number of more interesting groups, or rather, those who had actively selected a specific mode (or modes) when they had the possibility to select other modes. It is also important to note that many of the groups and sub-groups are very small so it is not possible to draw any robust conclusions from these small numbers. They are instead intended to give an illustration of how the respondents answered and reasoned. Those who actively chose the car were also more inclined to give extra benefits as a reason for choosing the car, although in most if not all of these specific cases, respondents were referring to enjoyment and freedom, and not exercise or the environment. As detailed in [Section 3.2](#sec3dot2-ijerph-17-00691){ref-type="sec"}, those giving these reasons generally gave them in combination with other reasons, and were most often not the first reason recorded, and therefore not presented in [Table 5](#ijerph-17-00691-t005){ref-type="table"}. 4. Discussion {#sec4-ijerph-17-00691} ============= The aim of this study was to examine and gain a greater insight into the process of selection from potential to realized mobility among older people aged 65--79, with a specific focus on modal choice. The differences between the range of modal option(s), the modal option(s) selected from this range, and the reasons behind the selection of some modal options over others were explored. One of the main findings was that a sizeable proportion (more than a quarter) of respondents have the option to use and actually use all modes for everyday travel. Although this can be considered a rather positive finding, this group can be considered to comprise those at a multimodal advantage relative to the remainder of respondents, a remainder which in turn comprises the majority. If we are to consider that a greater range of modal options can imply a greater freedom with its inherent links to well-being \[[@B7-ijerph-17-00691]\], then this group certainly fares best, especially when taking the findings from other studies into account \[[@B37-ijerph-17-00691],[@B38-ijerph-17-00691],[@B39-ijerph-17-00691]\]. However, others might have fewer modal options but still feel that their activity needs are met (e.g., those who expressed having no need for more alternatives). Here, it is difficult to decipher whether this is an indication of adaptive preference, or if this group in fact does have all of their mobility needs covered with just one option. Nonetheless, having just one or very few options might imply being at risk later on, if said modal options are no longer viable in later stages of life. Cycling as a modal option appeared to be the most sensitive with respect to selection; it being the first option to drop off among all the modal options. This is in line with previous findings where cycling has been found to be quite difficult for older people, with reports of issues with traffic safety, concerns with cycling environments and the behavior of other road users \[[@B49-ijerph-17-00691],[@B50-ijerph-17-00691]\]. This sensitivity appeared to be gendered. Although further analysis is required to confirm this. At the same time, other studies have pointed to the benefits of cycling for older people \[[@B51-ijerph-17-00691],[@B52-ijerph-17-00691]\]. Here, just like with driving cessation, cycling cessation (no longer having cycling as a modal option, and thus experiencing a reduced scope for action) requires adjustment and reconfiguration of mobility, and in some cases, participation in society \[[@B50-ijerph-17-00691]\]. However, for this study, we do not know whether the exclusion of cycling from the selected modal options is due to the individual having ceased cycling, or simply never having cycled. There were groups who perceived that they had no choice and just used the one or two options available to them. This could either indicate a difference in modal options, or just a difference in perceptions of modal options and choice among respondents, or indeed, both. This is an important aspect and limitation of subjective material and a focus on perceptions. Similarly, there were very different perspectives on having a limited choice set, with some respondents expressing implicit dissatisfaction (*no choice/not much choice or having no alternative(s))* and others expressing implicit satisfaction *(no need for alternatives)* despite perhaps having the same limited range of modal options. This finding calls into question the conceptualization of modal choice in empirical studies and underscores the importance of exploring the notions of choice and how choice is framed and deciphered as part of empirical studies. Moreover, there may be differences between an observer's account of the individual's choice and the individual's account of her choice, which can also be somewhat problematic, particularly when attempting to objectively assess differences among groups and between people \[[@B53-ijerph-17-00691]\]. Here it is rather difficult to decipher wherein the difference lies---a difficulty which has been highlighted by several studies (see \[[@B53-ijerph-17-00691]\] for an overview). In this sense, engaging different methods and different perspectives (both 'objective' and 'subjective') might assist in giving a more comprehensive and accurate picture of choice. Although we can question whether an option can really be considered an option if it is not the individual's perception that this is the case. Suitability and comfort were the two main reasons given for modal choice. There was a sense of 'positive' and 'active' selection of the more active modes, with more positive reasons such as the environment, health, exercise and enjoyment linked to the selection of active or more sustainable modes such as walking and cycling. This is in contrast to the selection of the car, with this selection mechanism characterized as more passive; as reasons for not selecting other options, as opposed to direct reasons for selecting the car were often given. Nonetheless, the car was more inclined to be selected among those who have a range of different modal options, with poor health one of the main reasons given for selecting the car over public transport. This finding is in line with those of previous studies, where it has been found that health issues related to ageing are associated with more negative effects for public transport use than for the use of the car \[[@B8-ijerph-17-00691]\]. The selection of the car in this manner might suggest that the car is a *de facto* option for some---as alluded to in some of the reasons given by respondents. It also links back to the monomodality question, and the normalization of the car as a mode of transport, and how this reliance on the car can be problematic if driving cessation becomes a reality. In such cases, well-being can be significantly compromised, particularly if the cessation is involuntary \[[@B41-ijerph-17-00691],[@B42-ijerph-17-00691],[@B43-ijerph-17-00691]\]. In this sense, linking back to previous research, we can question how the car is often framed as the transport mode of choice \[[@B54-ijerph-17-00691],[@B55-ijerph-17-00691]\], with this study revealing some of the more intricate elements behind this 'choice'. This implies that choice might not be as clear-cut as it seems, particularly when considering the links between choice, scope for action, freedom and well-being. The adjustment of expectations and preferences in accordance with disadvantage (often referred to as 'adaptive preference') \[[@B48-ijerph-17-00691]\] was evident in some parts of the empirical material. Such effects were apparent in the selection processes, with several respondents expressing that they know they have few or no options yet they do not feel that they should expect to have such a wide range of options. In some cases, this was in tandem with some clear adjustment effects, where respondents discussed having adjusted their expectations and actions as they aged. This also materialized in the form of respondents discussing having stopped using certain modes, having had a fall, or having begun to experience declining health \[[@B56-ijerph-17-00691]\]. This study facilitated a greater insight into the process behind modal choice; an insight which is often missing from discussions regarding modal choice. This study allows us to better understand the intricate processes at play and the underlying perceptions of individuals when considering their modal options and modal choice. Linking back to the CA, we can see that there are indeed differences in the ways in which people perceive their options (their capabilities), and in how they evaluate their options and select and operationalize their capabilities (functionings). This is an inherent difficulty with the empirical application of the CA as it means that there are discrepancies when attempting to carry out inter-personal analyses, especially with respect to equity concerns. Nonetheless, the empirical material engaged as part of this study simultaneously allowed for both a broader and more in-depth analysis of the perceptions of individuals with respect to modal options and modal choice. This study did, however, have some limitations. Its cross-sectional perspective did not allow for changes to be traced according to the ageing process. A longitudinal perspective would have aided us in understanding the selection process from an ageing standpoint. No 'objective' indicator was included, which would have allowed for a calibration of the self-reported responses, and would have given us a more nuanced perspective on some reports. This study did not explicitly include a geographical perspective. A lack of focus on geographical aspects may have resulted in some important considerations being masked as part of this study. Moreover, no comprehensive or clear-cut measure of subjective well-being was included in the study. This would have allowed for an empirical analysis of the links between modal options, modal choice and subjective well-being. This, in turn, would have facilitated a tighter connection to the CA and its conceptualization of the links between the size of the capability set and well-being. Nevertheless, this study did give a greater insight into the selection and reasoning processes behind modal choice, through the lens of those aged 65--79 and living in Sweden's LMRs. 5. Conclusions {#sec5-ijerph-17-00691} ============== Through engaging the careful treatment of the process of choice and drawing on information about individuals' reasoning with respect to the choice process, this study gave us a greater insight into the dynamic aspects at play with respect to modal choice for this group. Findings indicated that certain types of reasoning are related to the selection of specific modal options. Drawing on these types of reasoning and tailoring policy accordingly could prove fruitful in encouraging more sustainable travel behavior, and indeed promoting multimodality among this group. This would require a holistic approach by policymakers, encompassing not just transport policy but also community supports where the possibility to use other modes of transport (other than the car) are highlighted and promoted. For instance, training programs for using public transport could be employed. Solutions in the form of promoting multimodal trips (walking and public transport), highlighting the benefits in terms of exercise, experience and the environment could also be developed. In this way, individualized mobility suggestions could be developed so that people do not just use the car out of habit, and instead consider other modes. Not only 'carrot' but also 'stick' measures could prove effective. Several of the respondents remarked that they actively choose not to use the car because it is difficult to find parking. While others mentioned that they use public transport because they have a monthly ticket and want to make the most of it. Reducing parking opportunities alongside more attractive monthly pricing mechanisms could be another effective means of changing perspectives on modal options and intervening in the selection process. Those who had several options were more inclined to choose to use the car. This is despite car use often being framed as a lack of choice. Importantly, ensuring that the car does not reign as the 'automatic' option is key to achieving a modal shift. For instance, making public transport and other modes more usable for people with health problems---through infrastructure, but also increasing awareness of other passengers and drivers---could be a crucial way of establishing such a change. This study showed that the size and form of the choice set is important, and that it does matter whether someone chose from a range of options or instead just had to go with their one and only option. These findings have important implications for the consideration and treatment of modal options and modal choice within research going forward, presenting compelling reasons for including more detailed analyses of the processes behind modal choice. This approach could also be taken further by linking it to measures of subjective well-being, in order to draw clearer links between the scope for action (choice set) and well-being. Here, the focus was on those in the earlier stages of later life. These considerations could become even more tangible during the later stages of the ageing process. By studying and plotting out the process of modal choice, the reasons behind the selection of specific modal options and links between these and other aspects of life, we have a better basis for understanding and planning for older people's mobility. In this way, measures to promote and encourage sustainable mobility can be shaped and implemented, in such a way that the well-being of older people is also supported. The author would like to thank the respondents who generously dedicated their time to participating in this study. The author would like to acknowledge and thank Anders Wretstrand and Steven M. Schmidt for their supervision of the doctoral thesis from which this work stemmed. This research was funded by K2, The Swedish Knowledge Centre for Public Transport. This study was conducted within the context of the Centre for Ageing and Supportive Environments (CASE) at Lund University, funded by the Swedish Research Council for Health, Working Life and Welfare (FORTE). The author declares no conflict of interest. ![Illustration of the most common modal choice processes. Those filled with a pattern indicate a modal option that has not been used. The modes encompassed in each selection process are given equal representation in the chart. This, however, is purely for illustration purposes and is not intended to reflect the extent to which individuals use the respective modes; PT---indicates public transport.](ijerph-17-00691-g001){#ijerph-17-00691-f001} ijerph-17-00691-t001_Table 1 ###### Frequency of the different modal choice processes. Description of Selection Process Frequency Percentage ------------------------------------------------------------- ----------- ------------ Cycling, walking, PT and car used 331 28.8% Cycling option, walking, PT and car used 104 9.1% Walking, PT and car used 104 9.1% Walking and PT used 82 7.1% PT option, cycling, walking and car used 82 7.1% Cycling, walking and PT used 62 5.4% Cycling and PT options, walking and car used 40 3.5% Cycling option, walking and PT used 33 2.9% PT option, walking and car used 32 2.8% Cycling, walking and PT options, car used 28 2.4% Car option, cycling and PT used 17 1.5% Cycling option, PT and car used 17 1.5% Cycling and walking options, car used 16 1.4% Car and PT used 15 1.3% PT used 13 1.1% No modal options 12 1.0% Cycling, PT and car used 11 1.0% PT option, car used 11 1.0% Cycling and walking options, PT and car used 11 1.0% PT option, cycling and walking used 10 0.9% Car option, walking and PT used 10 0.9% PT and car options, cycling and walking used 9 0.8% Car used 8 0.7% PT option, no modal options used 8 0.7% Cycling option, car used 6 0.5% Cycling option, PT used 6 0.5% PT option, cycling and car used 6 0.5% Cycling, walking and car used 6 0.5% Cycling option, walking and car used 5 0.4% Cycling and PT options, walking used 5 0.4% Walking used 5 0.4% Cycling and PT used 4 0.3% PT and car options, walking used 4 0.3% Car option, PT used 3 0.3% Walking and car used 3 0.3% PT option, walking used 3 0.3% Cycling and PT options, car used 3 0.3% Cycling, walking and car options, PT used 3 0.3% Cycling and walking options, PT used 3 0.3% Cycling, walking and PT options, no modal options used 2 0.2% Walking and cycling used 2 0.2% Cycling and car used 2 0.2% Cycling, PT and car options, walking used 2 0.2% Cycling option, no modal options used 1 0.1% Cycling and car options, no modal options used 1 0.1% Walking and cycling options, no modal options used 1 0.1% PT and car options, no modal options used 1 0.1% Car option, no modal options used 1 0.1% PT option, cycling used 1 0.1% PT and car options, cycling used 1 0.1% Cycling and PT options 1 0.1% Walking option, cycling used 1 0.1% Cycling, walking, PT and car options, no modal options used 1 0.1% Total 1149 100.0 Note: PT---indicates public transport. ijerph-17-00691-t002_Table 2 ###### Socio-demographic differences in modal choice processes. Selection Process Description Income % (*n*) Gender % (*n*) Household Status % (*n*) ---------------------------------------------- ---------------- ---------------- -------------------------- ----------- ---------- ----------- Walking and PT used 50% (41) 50% (41) 21% (17) 79% (65) 68% (56) 32% (26) PT option, walking and car used 28% (9) 72% (23) 56% (18) 44% (14) 19% (6) 81% (26) Walking, PT and car used 23% (24) 77% (80) 45% (47) 55% (57) 43% (45) 57% (59) Cycling option, walking and PT used 42% (14) 58% (19) 6% (2) 94% (31) 61% (20) 39% (13) Cycling, walking and PT options, car used 21% (6) 79% (22) 75% (21) 25% (7) 29% (8) 71% (20) Cycling and PT options, walking and car used 17% (7) 83% (33) 73% (29) 27% (11) 10% (4) 90% (36) Cycling option, walking, PT and car used 15% (16) 85% (88) 52% (54) 48% (50) 20% (21) 80% (83) Cycling, walking and PT used 43% (27) 57% (35) 21% (13) 79% (49) 65% (40) 35% (22) PT option, cycling, walking and car used 24% (20) 76% (62) 59% (48) 41% (34) 18% (15) 82% (67) Cycling, walking, PT and car used 19% (63) 81% (268) 53% (174) 47% (157) 24% (79) 76% (252) Total 28% 72% 46% 54% 33% 67% Note: \* A lower income refers to those with a monthly household income of up to 16,666 Swedish crowns (SEK). ijerph-17-00691-t003_Table 3 ###### Reasons for choosing to use one or several modes over another or other options ^1^. ------------------------------------------------------------------------------------------------------------------------------------------------------- Code Description Frequency of Mentions Percentage ------------------------------------------------------------------------------------------------------------------ ----------------------- ------------ More suitable (or less trouble than other modes) 487 36.3% More comfortable (e.g., having a place to sit) 310 23.1% Faster/speed 86 6.4% Health reasons/poor health/no energy 48 3.6% Habit/not a conscious choice 45 3.4% Less expensive/financial reasons 43 3.2% Proximity 40 3.0% Enjoyable (e.g., the experience. the views/less unenjoyable) 31 2.3% No choice/not much choice/no alternatives 28 2.1% Reliable (e.g., punctuality) 26 1.9% These are the options available 24 1.8% No need for other options/alternatives 21 1.6% Better for the environment/environmental reasons 20 1.5% Exercise/wants to move as much as possible 19 1.4% More secure (e.g., lower risk of being exposed to crime) 19 1.4% Safer (traffic/road safety) 19 1.4% Flexible depending on the situation/use all options/ strategic use 18 1.3% Distance/too far to walk 13 1.0% Due to someone else's needs or wants/\ 11 0.8% looking after someone else/someone else decides/\ shared household resources/\ minding dog/grandchildren Adjustment with age or health circumstances/no need to travel/too much difficulty travelling/'too old' to travel 7 0.5% Freedom (general) 6 0.5% The car is a given/normalised 6 0.5% Too much trouble with the car/parking 4 0.3% Satisfied with option(s)/with freedom of choice 3 0.2% Transporting heavy or large items/loads 3 0.2% Flexibility/no timetable/no planning 2 0.2% Public transport not possible/does not exist 2 0.2% **Total** **1341** **100%** ------------------------------------------------------------------------------------------------------------------------------------------------------- Note: ^1^ Frequency of mentions, several reasons given by some respondents (*n* = 961), with some respondents choosing not to give a reason for their modal selection. ijerph-17-00691-t004_Table 4 ###### Theme descriptions and the descriptions of codes included in each theme. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Theme Description Descriptions of Codes Included ----------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------- More comfortable (or previous combination of more suitable and more comfortable) More suitable (or less trouble than other modes)\ More comfortable (e.g., having a place to sit) Flexibility and versatility/habit Habit/not a conscious choice\ Distance/too far to walk\ Transporting heavy or large items/loads Flexibility/no timetable/no planning\ The car is a given/normalized Less expensive/financial reasons Less expensive/financial reasons Security and safety More secure (e.g., lower risk of being exposed to crime)\ More secure and more comfortable\ Safer (traffic/road safety) More suitable More suitable Extra benefits (e.g., freedom, enjoyment, exercise, environment) Enjoyable (e.g., the experience. the views/less unenjoyable)\ Exercise/wants to move as much as possible\ Better for the environment/environmental reasons\ Enjoyable and better for the environment\ Freedom (general) Reliability, punctuality and speed Faster/speed\ Reliable (e.g., punctuality) Expressing a limitation with options (e.g., less choice, adjusted expectations or trouble with car) Public transport not possible/does not exist No choice/not much choice/no alternatives\ Adjustment with age or health circumstances/no need to travel/too much difficulty travelling/'too old' to travel\ Too much trouble with the car/parking\ These are the options available Health reasons/poor health/no energy Health reasons/poor health/no energy Expressing satisfaction with options (e.g., use several options, no need for other options) Flexible depending on the situation/use all options/ strategic use\ Satisfied with option(s)/freedom of choice\ No need for other options/alternatives Decision dependent on someone else or the needs of others Due to someone else's needs or wants/\ looking after someone else/someone else decides/\ shared household resources/\ minding dog/grandchildren ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ijerph-17-00691-t005_Table 5 ###### Cross-tabulation of selection process groups of interest with themes of reasons for modal selection based on the first recorded reason (*n* = 395) \*. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Selection Processes Examined Further More Suitable\ More Comfortable (or Previous Combination of More Suitable and More Comfortable)\ Reliability, Punctuality and Speed\ Flexibility and Versatility/Habit\ Less Expensive/Financial Reasons\ Expressing a Limitation with Options (e.g., Less Choice, Adjusted Expectations or Trouble with Car)\ Expressing Satisfaction with Options (e.g., Use Several Options, No Need for Other Options)\ Extra Benefits (e.g., Freedom, Enjoyment, Exercise, Environment)\ Security or Safety\ Health Reasons/Poor Health/No Energy\ Decision Dependent on Someone Else or the Needs of Others\ Total\ % (*n*) % (*n*) % (*n*) % (*n*) % (*n*) % (*n*) % (*n*) % (*n*) % (*n*) % (*n*) % (*n*) % (*n*) ---------------------------------------------- ---------------- ----------------------------------------------------------------------------------- ------------------------------------- ------------------------------------ ----------------------------------- ------------------------------------------------------------------------------------------------------ ---------------------------------------------------------------------------------------------- ------------------------------------------------------------------- --------------------- --------------------------------------- ------------------------------------------------------------ -------------- PT option, car used 30.0% (3) 10.0% (1) 10.0% (1) 0.0% (0) 0.0% (0) 10.0% (1) 0.0% (0) 0.0% (0) 0.0% (0) 40.0% (4) 0.0% (0) 100.0% (10) PT option, car and walking used 53.1% (17) 28.1% (9) 9.4% (3) 3.1% (1) 0.0% (0) 3.1% (1) 0.0% (0) 0.0% (0) 0.0% (0) 0.0% (0) 3.1% (1) 100.0% (32) Car option. walking and PT used 70.0% (7) 0.0% (0) 0.0% (0) 10.0% (10) 0.0% (0) 0.0% (0) 10.0% (1) 0.0% (0) 0.0% (0) 0.0% (0) 10.0% (1) 100.0% (10) Cycling option, PT and car used 64.7% (11) 0.0% (0) 5.9% (1) 0.0% (0) 5.9% (1) 0.0% (0) 0.0% (0) 0.0% (0) 0.0% (0) 23.5% (4) 0.0% (0) 100.0% (17) Car option, cycling and PT used 62.5% (10) 0.0% (0) 6.3% (1) 0.0% (0) 6.3% (1) 0.0% (0) 18.8% (3) 0.0% (0) 6.3% (1) 0.0% (0) 0.0% (0) 100.0% (16) Cycling and walking options, car used 43.8% (7) 18.8% (3) 6.3% (1) 12.5% (2) 6.3% (1) 12.5% (2) 0.0% (0) 0.0% (0) 0.0% (0) 0.0% (0) 0.0% (0) 100.0% (16) Cycling option, walking and PT used 45.5% (15) 6.1% (2) 6.1% (2) 12.1% (4) 3.0% (1) 18.2% (3) 0.0% (0) 0.0% (0) 6.1% (2) 3.0% (1) 0.0% (0) 100.0% (33) Cycling, walking and PT options, car used 42.9% (12) 25.0% (7) 7.1% (2) 10.7% (3) 0.0% (0) 3.6% (1) 0.0% (0) 7.1% (2) 0.0% (0) 3.6% (1) 0.0% (0) 100.0% (28) Cycling and PT options, walking and car used 45.0% (18) 35.0% (14) 2.5% (1) 0.0% (0) 0.0% (0) 0.0% (0) 7.5% (3) 7.5% (3) 0.0% (0) 2.5% (1) 0.0% (0) 100.0% (40) Cycling option, walking, PT and car used 55.3% (57) 21.4% (22) 2.9% (3) 2.9% (3) 2.9% (3) 6.8% (7) 3.9% (4) 1.0% (1) 2.9% (3) 0.0% (0) 0.0% (0) 100.0% (103) PT and car options, walking and cycling used 25.0% (2) 37.5% (3) 0.0% (0) 0.0% (0) 0.0% (0) 0.0% (0) 37.5% (3) 0.0% (0) 0.0% (0) 0.0% (0) 0.0% (0) 100.0% (8) PT option, cycling, walking and car used 47.6% (39) 30.5% (25) 6.1% (5) 3.7% (3) 1.2% (1) 1.2% (1) 2.4% (2) 4.9% (4) 0.0% (0) 1.2% (1) 1.2% (1) 100.0% (82) Total 50.1% (198) 21.8% (86) 5.1% (20) 4.3% (17) 2.0% (8) 4.8% (19) 4.1% (16) 2.5% (10) 1.5% (6) 3.0% (12) 0.8% (3) 100.0% (395) -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- \* Please note that this table is simply intended to give an indication of how respondents answered and some of the percentages represent very small numbers. PT---indicates public transport.
{ "pile_set_name": "PubMed Central" }
Grant Sabatier Grant Sabatier (born December 13, 1984) is an American author, podcaster, blogger, and entrepreneur. He is best known for his book Financial Freedom which was published by Penguin Random House on February 5, 2019. Grant Sabatier founded personal finance website Millennial Money and hosts two podcasts, Financial Freedom and Millennial Money Minutes. Life Grant grew up in Falls Church, VA, went to George Mason High School, and then attended the University of Chicago where he studied Philosophy. In 2010, at age 24, Sabatier was unable to find a job, so taught himself digital marketing. Several months later, Sabatier was hired at a digital marketing agency. After reading over 300 personal finance books and realizing that retirement seemed unattainable at his current salary, he quit to start a consulting business. Despite the rapid growth of the consulting business, Sabatier consciously avoided lifestyle inflation. By saving more than 80% of his six-figure income, Sabatier amassed $1.25 million and reached financial independence by age 30. Works Publication Sabatier has written a book, Financial Freedom: A Proven Path to All the Money You Will Ever Need, which has been translated into 8 languages and is popular in the FIRE Movement. Podcasts Financial Freedom The Financial Freedom podcast focuses on money, meaning, and everything in between. It's an interview-style podcast where Sabatier interviews guests who share strategies for mastering money and living meaningful lives. Millennial Money Minutes The podcast is co-hosted by Grant Sabatier, which distills personal finance topics in five minutes. Blog MIllennial Money focuses on helping others "make smarter financial decisions, build more successful companies, reach financial independence and live richer lives. References Category:1984 births Category:Living people Category:American men podcasters Category:American podcasters Category:American male bloggers Category:American financial writers Category:21st-century American male writers
{ "pile_set_name": "Wikipedia (en)" }
Q: Display a "No Javascript" div, but not to google / facebook share service I would like to show a div near the top of a site to suggest to visitors that do not have javascript enabled that they should enable their javascript. I thought I had found a good method by using the noscript tag. Unfortunately I found that this solution was less than ideal because of services like Google's indexer and Facebook's link sharing functionality. These services scrape the page and read the text in the noscript div as the summary of the page. This happens because these services are not utilising javascript (obviously). So, my question to the masses is: What techniques do you prefer for avoiding having your "please enable your javascript" messages appearing in Google's results etc. Ideally, I'm hoping to discover the best practice for solving this issue, but am interested in hearing any techniques you have user successfully, or unsuccessfully in the past. Thanks! A: In a pure HTML scenario (as tagged), consider placing your message at the bottom of the page, and using CSS to position it visibly at the top. This should push your warning far enough down the page as to avoid it showing up in typical search results. If your HTML is generated by server script, then you may be able to conditionally present the element based on the client UserAgent. A good search engine user agent list would be convenient in this case.
{ "pile_set_name": "StackExchange" }
On the 28th of December 2014, Indonesia Air Asia flight QZ8501 disappeared mid-flight on a routine journey from Surabaya, Indonesia to Singapore. On the 1st of December 2015, the Komite Nasional Keselamatan Transportasi (KNKT), the Indonesian ministry in charge of aviation investigations in Indonesia, released a report of over 200 pages regarding the accident. The results make for chilling reading. The aircraft was an Airbus A320-216, registration PK-AXC, built in 2008. Indonesia Air Asia is an Indonesian airline within the Air Asia Group which operates 30 Airbus A320 aircraft for domestic and regional routes. Flight QZ8501 was a scheduled flight from Surabaya Juanda International Airport, Indonesia to Changi International Airport, Singapore. The crew consisted of two pilots and four flight attendants. There were 156 passengers on board, including 22 children under 15. The Airbus A320 departed Juanda airport at 22:35 UTC (6:35 in the morning local time). The departure and initial cruise at FL320 (32,000 feet) was uneventful. At 23:00, 25 minutes after take-off, the Electronic Centralized Aircraft Monitoring set off an advisory alarm. The Master Caution light lit up, a chime sounded and AUTO FLT RUD TRV LIM 1 appeared on the display To understand this crash, we need to understand first the aircraft system and maintenance as well as the history of this error. The Airbus A320 has two Flight Augmentation Computers (FACs) which perform four main functions including the yaw functions. Under normal circumstances, FAC1 controls the yaw damper, turn coordination, rudder trim and rudder travel limit while FAC2 is in standby. The A320 also has a Centralised Fault Display which collects issues that arise during aircraft operations. Maintenance personnel access the data through the Post Flight Report (PFR), which can be displayed or printed. In the month before the accident, the Post Flight Report is dominated by failure messages relating to the Rudder Limiting Function on the Flight Augmentation Computers. On the 19th of December, the flight crew received 11 cautions on the first flight of the day and 13 cautions on the second. Each time, the pilots reset the caution using the emergency cancel button. The emergency cancel button turns off the master warning light and stops the aural warnings for that particular error condition. It is specifically used to suppress spurious master cautions. There’s no other approved method for cancelling multiple, repetitive cautions. The personnel doing the daily maintenance of the aircraft saw the error on the Post Flight Report relating to the Rudder Travel Limiter Unit. The Airbus Trouble Shooting Manual is quite clear that the Rudder Travel Limiter Unit electronic module needs to be replaced if the problem persists. However, the initial maintenance action was the BITE test, which tests the system’s electrical and computer connection. Each time maintenance personnel performed the BITE test, the system passed. The issue was dealt with by resetting the Flight Augmentation Computer and running an operational test. Thus, there was no need to continue on to the next steps in the Trouble Shooting Manual. Aircraft issues highlighted on the Post Flight Report that are resolved using the Trouble Shooting Manual don’t need to be listed on the Maintenance Report. This means that every maintenance person saw the issue on the PFR as an isolated event, rather than a recurring problem. On the 25th of December, the captain of the accident flight was in the same aircraft for a scheduled flight to Kuala Lumpur. During push back, the AUTO FLT RUD TRV LIM SYS message appeared and the captain decided to return the aircraft to the parking bay and report the fault. A company engineer came to the cockpit to trouble-shoot the issue. Based on the advice on the Airbus Trouble Shooting Manual, the engineer reset the circuit breakers for both Flight Augmentation Computers and then performed the BITE test. This appeared to address the issue. The captain asked the engineer if he could perform the same reset action whenever the problem reappeared. The engineer said that the pilots could reset the circuit breakers whenever instructed on the Electronic Centralized Aircraft Monitoring display. The aircraft was ready for departure and push back. During the pushback, the AUTO FLT RUD TRV LIM SYS error reappeared. The pilot used the reset button for the Flight Augmentation Computers but it did not fix the error. The engineer saw that the aircraft had not moved and contacted the pilot via the interphone. The captain explained that the rudder travel limiter issue had occurred again and asked if he could reset the system by pulling the circuit breakers for the Flight Augmentation Computers. The circuit breakers were behind the right seat in the cockpit and could not be reached by either pilot while sitting. The second-in-command, who was not the same pilot as on the accident flight, left his seat, presumably to reset the circuit breakers. The problem still existed and the engineer asked the captain to return the aircraft to gate. The engineer replaced Flight Augmentation Computer 2 (FAC2) and asked the captain to start both engines. After both engines started, the problem did not reappear. The captain was happy that the fault had been resolved and the flight proceeded as scheduled with only a slight delay. There were no further occurrences of the error in that flight or the next. Three days later, the 28th of December, the same captain and his first officer were flying over the Java sea when the errors started again. 23:01 Both Rudder Travel Limiter Units failed, triggering a chime and a master caution light. The captain performed the cited action to press the push-buttons on the overhead panel to set Flight Augmentation Computers 1 and 2 to OFF and then to ON, one by one. Both Rudder Travel Limiter Units returned to normal. 23:04 The captain requested a 15 miles deviation left of track to avoid thunderstorms in the area, which was approved. 23:06 The first officer, who was Pilot Flying, did a standard cruise crew briefing, including actions in case of an engine failure or emergency descent and that Semarang Airport would be the alternate. 23:09 Both Rudder Travel Limiter Units failed, triggering a chime and a master caution lights. The captain performed the cited action to press the push-buttons on the overhead panel to set Flight Augmentation Computers 1 and 2 to OFF and then to ON, one by one. Both Rudder Travel Limiter Units returned to normal. 23:11 The flight crew confirmed to Air Traffic Control that they had routed left to avoid the storm. They were asked to report when clear of the water. 23:12 The flight crew requested a climb to flight level 380 (38,000 feet) when possible and were asked to standby. 23:13 Both Rudder Travel Limiter Units failed, triggering a chime and a master caution lights. The captain performed the cited action to press the push-buttons on the overhead panel to set Flight Augmentation Computers 1 and 2 to OFF and then to ON, one by one. Both Rudder Travel Limiter Units returned to normal. Three failures in just over ten minutes must have been frustrating but it didn’t stop there. 23:15 Both Rudder Travel Limiter Units failed for the fourth time, triggering a chime and a master caution lights. 23:16 Air Traffic Control issued a clearance for the flight to climb to flight level 340. The pilots did not respond. 23:16:27 The master caution was triggered for the fifth time, this time for a fault in Flight Augmentation Computer 1. The Flight Data Recorder recorded the components controlled by Flight Augmentation Computer 1 as fluctuating, which is a pattern which occurs when the data to be recorded is not available. 23:16:39 Flight Augmentation Computer 1 came back online. 23:16:44 The master caution was triggered for the sixth time with a fault in Flight Augmentation Computer 1 and Flight Augmentation Computer 2. The same data fluctuation was logged by the Flight Data Recorder. The autopilot and the auto-thrust disengaged. Flight control law reverted from Normal Law to Alternate Law. The rudder deflected 2°. The aircraft started to roll. 23:16:54 Flight Augmentation Computer 2 came back online. The autopilot and autothrust remained disengaged. Flight control law remained in Alternate Law. The Airbus flight control system has two modes in Normal Law: GROUND and FLIGHT. Under Normal Law in flight mode, the pilot has control of the roll and heading but the aircraft limits the roll rate and the bank angle and coordinates the turns. So for example, the pilot can depress the side-stick for a turn at a high bank angle and then release, the bank angle is automatically reduced to 33°. If the pilot holds the side-stick to the full deflection at the side, the bank angle goes to 67° and no further. If Angle-of-Attack protection is active, the bank angle will not go beyond 45°. If High Speed Protection is active, the bank angle will not go beyond 40°. However, if there are failures in the flight control system, the aircraft will revert to Alternate Law. This means that there are reduced protections and bank angle protection is not provided. The first four faults were caused by the intermittent failure of the Rudder Travel Limiter Units. Examination of the unit after the crash showed cracked soldering on the electronic module which had caused the repetitive faults. However, the fifth fault was caused by a failure of Flight Augmentation Computer 1. The push-button on the overhead panel was set to OFF and Flight Augmentation Computer 1 had no power. Power was restored 12 seconds later but the pushbutton on the flight control overhead was not reset, so it did not return to service. All equipment controlled by Flight Augmentation Computer 1 was not operational. Flight Augmentation Computer 2 was then “de-energised” as the report puts it, causing the sixth master caution that both Flight Augmentation Computers had failed. The data recorded on the flight data recorder matches the data from 25th December 2014, when the aircraft had the RTLU problem on the ground and the circuit breakers were reset by pulling out and pushing back in. However, returning the circuit breakers during flight does not re-engage the FAC functions; the FAC push button on the overhead panel must be reset. The auto-pilot and the auto-thrust disengaged as a result and the rudder deflection of 2° to the left was not automatically corrected. The quick reference guide for the airbus states that the flight crew should only reset computers listed in the table (which does not include the flight augmentation computers) and that the flight crew must consider and fully understand the consequences. As the captain had seen the engineer resetting the Flight Augmentation Computer circuit breakers on the ground, he may have considered himself to fully understand the consequences. It may not have occurred to him that the consequences of resetting the circuit breakers mid-flight were very different than on the ground. The action certainly implies that he did not have a good understanding of the aircraft systems and how they hung together. The investigation report states that there was no evidence on the Cockpit Voice Recorder that the flight crew ever discussed resetting the circuit breakers or that they considered the risks. Even if they discussed the situation during the 54 seconds after the fourth master caution, when the communications were not recorded, it’s quite clear that they did not anticipate the consequences. The Rudder Travel Limiter Unit failure would stop the rudder limiter at the last position but not affect the rudder operation. The autopilot, auto-thrust and other systems controlled by the Flight Augmentation Computer are still available. The flight safety was not affected. By pulling out both circuit breakers, the captain put his flight at immediate risk by disabling the Flight Augmentation Computer completely. When the breakers were pushed back in, the flight crew clearly expected the Flight Augmentation Computers to just work, as neither ever pushed the reset button to bring them back online. The aircraft went into alternate law, disabling everything, and they apparently had no idea why everything had suddenly gone wrong. It’s not possible to reset the circuit breakers from a seated position. As the first officer was the pilot flying, it seems likely that it was the captain who left his seat and reset the circuit breakers. After the autopilot disengaged and the rudder deflected at 2°, the aircraft rolled to the left, without pilot input, at a rate of 6° per second; twice the speed of a normal roll rate operation. The master caution triggered with a chime to attract the crew’s attention to the fact that the autopilot was disengaged. Under normal conditions, a pilot will respond immediately to level the wings when an aircraft is rolling unexpectedly. It took the first officer nine seconds to respond after the autopilot disengaged. It’s not clear where his attention was or why it took so long to respond. By the time he responded, the aircraft roll angle was 54°. 23:16:53 The flight data recorder records initial movements of the right side stick, where the first officer was seated. His initial response was a backward movement on the side step up to 15° and to the right to the maximum deflection. In normal law, the 15° pitch up would have allowed the aircraft to climb back to its preset level at a sensible rate. In alternate law, the sidestick motions gave the aircraft the instruction to pitch up fast and roll hard to the right. The aircraft began to climb rapidly and rolled to the right from 54° left to 9° left bank. The pilot flying did not notice the rudder deflection of 2°, which made the aircraft even more difficult to manage. At this stage, he appeared to suffer from “the leans”, a form of spatial disorientation where the inner ear messages give the wrong feedback as to whether you are banking. Still banking 9° to the left despite his hard roll to the right, he shifted the side stick to the left again. Having never achieved straight-and-level flight, he rolled the aircraft back to the left to 53°. He then began using gentler movements on the side stick moving it back to the right. The aircraft gently rolled to 2.5º to the left (so still not straight and level) and pitched up to 5°. The aircraft continued to climb. 23:16:56 The stall warning activated, including a voice message which calls out STALL, STALL. The voice message activates when the aircraft reaches 8° Angle of Attack: the angle between the oncoming air or relative wind and a reference line on the aircraft or wing. A plane is stalled when the angle of attack is beyond the stalling angle. Under Normal Law, the aircraft system would switch the elevator control to protection mode, so that the angle of attack is proportional to side-stick deflection. Even if the pilot pulls the side-stick all the way back, the angle of attack will not exceed the maximum. If the pilot releases the side-stick, the angle of attack returns to what it should be. This protection against stall and wind shear has priority over all other protections. However, in Alternate Law, which the flight had been in since the Flight Augmentation Computers had been disconnected, this protection is overridden. When the audio stall warning goes off in Alternate Law, the flight crew recover from the impending stall by lowering the nose to reduce the angle of attack. The first officer reacted instinctively to the mechanical voice calling STALL, STALL. The right side stick was at neutral and then moved forward for two seconds. The Angle of Attack decreased to below 8° and the stall warning stopped. One second later, the right-side stick was pulled back again to 12°. The aircraft pitched up and began to climb at a rate of 11,000 feet/minute. The stall warning sounded again. This time, he did not react. He continued to pull back on the side stick and the aircraft continued to pitch up. The captain called out, “level…level….” There were no side-stick inputs from the captain; he was almost certainly at the circuit breakers and would have found it difficult to get back to the seat. He may have been referring to the previous high roll angle. In any event, the command appeared to focus the first officer on levelling the wings rather than paying attention to the pitch. The aircraft continued to climb. The cockpit voice recorder recorded the captain saying “Oh my god!” 23:17:03 The first input from the left-side side stick was logged: the captain was in his seat and apparently attempting to take control of the flight. The first side stick input lasted two seconds. Fifteen seconds later, a second input was logged, also lasting two seconds. If one pilot uses the side stick, it sends control signals to the computers. If both pilots use their side sticks simultaneously in the same or opposite direction, then the system adds the signals algebraically. Two green Side Stick Priority lights go on and a voice message activates which says DUAL INPUT, DUAL INPUT. However, in this case the DUAL INPUT voice was overridden by the higher priority STALL, STALL, STALL. In a stall situation, the captain can should take control of the situation and can take control of the aircraft. The standard call out is “I HAVE CONTROL” to which the other pilot should respond “YOU HAVE CONTROL”. If the captain was not taking control of the flight, then he should not have been touching the side-stick. The captain could have stopped the dual input by pressing the priority push button which gives his seat priority while the button is depressed. If he held down the priority push button for 40 seconds or more, priority would have been transferred to him and no further input would have been accepted from the other side stick unless the first officer pushed the button to take it back. The captain pressed the push button twice, once for two seconds and once for five. No comment about transfer of control was ever made. The captain never pressed the priority push button long enough to make a difference, let alone take control. Instead, they worked against each other: the first officer pulled back while the captain pushed forward. 23:17:15 The aircraft pitch reached 24° up. The captain called out “pull down, pull down!” The captain was Indonesian and the first officer was French; they spoke to each other in English. It is unfortunate that in the heat of the moment, the captain used exactly the wrong phrase for what he wanted the first officer to do. The aircraft speed was below the stall speed, the engines were on cruise power and the aircraft was descending at 12,000 feet per minute. The pitch and roll were near 0°; the aircraft appeared to be straight and level. This high altitude stall was not standardly taught as a part of pilot training and the first officer might not have ever realised the high angle of attack despite the stall warning and the buffet. The airline did not train its pilots in Upset Recovery which might have helped the first officer to recognise the situation. Although Airbus’s operator’s training manual included this training, the airline’s Operations Manual said that The effectiveness of fly-by-wire architecture, and the existence of control laws, eliminates the need for upset recovery maneuvers to be trained on protected Airbus. The problem with an unstallable plane is that you can’t believe your eyes when it finally stalls. 23:17:29 The left-side side stick is used continuously from this point on. The captain never took priority, so the aircraft continued with dual input. The average of the side stick inputs recorded on the flight data recorder indicated that the first officer was pulling almost full back input while the Captain was slightly pushing nose down. The sum of both side stick inputs commanded a nose-up pitch. The aircraft descended at a rate of up to 20,000 feet per minute. The pilot training for stalls teaches the pilot to recognise the indications of a stall condition and recover. The aircraft system is designed to prevent the stall by providing early warning. Both are intended to avoid the aircraft stalling. There is no training for dealing with an angle of attack over 40° and recovering from this is considered “beyond the competency of an airline pilot”. Once the angle of attack reached 48°, there was nothing left that they knew how to do. 23:18 AirAsia flight QZ8501 disappeared from the Jakarta Radar controller’s screen. According to the flight data recording, the STALL, STALL, STALL warning continued and the two pilots continued their dual input, the first officer pulling all the way back while the captain pushed gently forward, until the aircraft crashed into the Java sea. Contributing Factors The cracking of a solder joint of both channel A and B resulted in loss of electrical continuity and led to RTLU failure. The existing maintenance data analysis led to unresolved repetitive faults occurring with shorter intervals. The same fault occurred 4 times during the flight. The flight crew action to the first 3 faults in accordance with the ECAM messages. Following the fourth fault, the FDR recorded different signatures that were similar to the FAC CB‟s being reset resulting in electrical interruption to the FACs The electrical interruption to the FAC caused the autopilot to disengage and the flight control logic to change from Normal Law to Alternate Law, the rudder deflecting 2° to the left resulting the aircraft rolling up to 54° angle of bank. Subsequent flight crew action leading to inability to control the aircraft in the Alternate Law resulted in the aircraft departing from the normal flight envelope and entering prolonged stall condition that was beyond the capability of the flight crew to recover. One thing I’d like to add. Often, there’s an argument that pilots are no longer being taught how to hand fly and that modern airlines are becoming too reliant on technology. There’s no evidence for that in this instance. The captain was an Air Force pilot for ten years, flying everything from jet fighters to transport planes. He was a flight instructor on single-engine propeller aircraft. He flew twins and propeller aircraft and Boeings as well as the Airbus A320 and had over 14,000 hours. You couldn’t ask for a more experienced pilot. The full report is available in English on the KNKT site as a PDF.
{ "pile_set_name": "OpenWebText2" }
Two dozen injured in a road accident (Representational) Seven persons were killed and two dozen injured in a road accident early on Friday on the Agra-Lucknow Expressway, the police said. Fifty passengers from different parts of Bihar were headed in a sleeper bus for Rajasthan, when the bus rammed against a sand carrying truck in the Fatehabad area, SHO Parvesh Kumar said.
{ "pile_set_name": "OpenWebText2" }
There's a whole realm of fantastic worlds and characters to explore, and when you pick up the Xbox 360 games for sale that we feature, you can collect the best titles at amazing prices. We've been working hard searching the web for all the greatest deals and offers on these video games so you'll know exactly where to find them. Who Has the Best Xbox 360 Game Deals? One of the most popular places to buy and trade Xbox 360 games, consoles and accessories is GameStop. Buying used games is an easy way to get the same product for less, and here you can take any old Xbox 360 games you don't want and trade them in for cash or credit off your purchase. Another place to find used game deals is eBay, where you can buy directly from individual sellers and score classics like Battlefield 4, Resident Evil 6, Fallout 3 and more—and often for under $10. With a GameFly membership, you can buy used and disc-only games, as well as rent games, which are all savings opportunities when it comes to Xbox 360 games. A wonderful perk of living in this technological age is the ability to purchase digital products and games online without ever having to go to the store. You can visit Gamesdeal for digital game codes and live cards at discounted and affordable prices way below retail options, in addition to special hot deals and promos. Newegg and Amazon also advertise weekly and daily digital game sales, so be sure to check there for special Xbox 360 games deals. Remember to check out big-box stores like Walmart, Target and Best Buy for deals and coupons. Though these places sell a huge range of products, they also carry a wide selection of Xbox 360 games and game accessories. Be on the lookout for free shipping offers and clearance sales to get the most out of your shopping experience. Price Breakdown The price was a major issue at the Xbox One’s launch, as its $499 price point was the highest among consoles. The fact that this price was due to the “required” Kinect camera system, which many people didn’t want, didn’t make the Xbox One a lot of friends early on. Microsoft then removed the Kinect, dropping the price to $399, and then they instituted a “holiday deal” at $349, which has remained in place since then. There is also a $399 model with a 1 TB hard drive, as opposed to the standard 500 GB. Your best option is to find a good bundle that includes additional games or accessories for the same $349 price point. We’ve seen occasional console deals as low as $288, and it wasn’t even during Black Friday or Cyber Monday. However, that’s usually the best time of the year for gaming console deals. Last Black Friday saw deals around $329 from several retailers (though Wal-Mart and Target added store gift cards on top of the deal, making their bundles better overall) back when retail price was $399, so expect to see sub $280 deals this year. Best Buy is also a popular retailer to get gaming consoles from because you can always get an extra 10 percent off with the Movers Coupon, which will at least cover sales tax. Remember not to get too fixated on just the price, though. A bundle might cost an extra $40 or so, but you could be getting games, gift cards or other bonus items worth $100+ in value. You can also help reduce the cost of a new Xbox One by trading in your 360. At the moment, you can get about $50 from Gamestop, but you may be able to find more for your trade-in elsewhere. Other Ways to Save on Xbox 360 Games You don't always have to rely on Xbox 360 game coupons and promo codes to save cash on your purchase. You can also: Sign up for rewards programs. Many benefits of being a rewards member are earning points every time you buy, special birthday offers, exclusive pricing and more. Look for price-match guarantees. For most places, this means they'll match prices if you find a better deal advertised somewhere else. About Slickdeals Slickdeals is the leading crowdsourced shopping platform:
{ "pile_set_name": "OpenWebText2" }
Wild Talents: White Knights, Black Hearts "White Knights, Black Hearts" is a WILD TALENTS adventure about street-level superheroes in world-class danger. It's the sweaty summer of 1975, and you play the Talents who keep an eye on the troubled neighborhoods where the big city's official superheroes, the White Knights, can't be bothered to stick their noses. But that all changes when a little girl gets killed and YOUR team is at the top of the list of suspects. Now you've got the cops and the White Knights on your tail while you try to figure out who really killed that little girl. And the deeper you dig, the uglier it gets. The streets have never been meaner. "White Knights, Black Hearts" includes six pregenerated characters ready for play, and guidelines for bringing your own characters to the streets of Red Shore. White Knights Black Hearts is a crime investigation adventure set in the 70's just like those stories Ed Brubaker writes for his heroes where there is no good-bad and everything is a shade of gray with concepts of mistrust and corruption. Very well wri [...] This is the first adventure I've seen from Arc Dream and I was interested in seeing how they'd do it. Suffice to say, I was impressed! The adventure is solid and atmospheric. The NPCs are interesting but it is the setting which really captured m [...] These products were created by scanning an original printed edition. Most older books are in scanned image format because original digital layout files never existed or were no longer available from the publisher. For PDF download editions, each page has been run through Optical Character Recognition (OCR) software to attempt to decipher the printed text. The result of this OCR process is placed invisibly behind the picture of each scanned page, to allow for text searching. However, any text in a given book set on a graphical background or in handwritten fonts would most likely not be picked up by the OCR software, and is therefore not searchable. Also, a few larger books may be resampled to fit into the system, and may not have this searchable text background. For printed books, we have performed high-resolution scans of an original hardcopy of the book. We essentially digitally re-master the book. Unfortunately, the resulting quality of these books is not as high. It's the problem of making a copy of a copy. The text is fine for reading, but illustration work starts to run dark, pixellating and/or losing shades of grey. Moiré patterns may develop in photos. We mark clearly which print titles come from scanned image books so that you can make an informed purchase decision about the quality of what you will receive. Original electronic format These ebooks were created from the original electronic layout files, and therefore are fully text searchable. Also, their file size tends to be smaller than scanned image books. Most newer books are in the original electronic format. Both download and print editions of such books should be high quality.
{ "pile_set_name": "Pile-CC" }
In recent years, a flash device has been widely employed to an optical apparatus such as, for example, a camera. Particularly when the flash device is employed in the photographing, the light is the important component. In an automatic light adjusting device which is employed in the photographing, the flashlight is ceased when the reflecting light from an object to be photographed attains to a predetermined value. The reflected light from the object to be photographed is, however, few in case that color of the object is black or in case that distance from the object to be photographed to the flash device is long, and an automatic light adjusting device was inactivated, and therefore a photographer could not judge easily how to the distance between the object and the flash device or to adjust the diaphragm. To contrary, the object to be photographed is white, the quantity of the reflected light becomes much, and the quantity of the reflecting light becomes much when the distance from the object to the flash device is very short. Accordingly, the automatic light adjusting device does not activate correctly. It is also impossible for the photographer to alternate the distance or to adjust the diaphragm. A flash device which can produce multiple flashlight during a predetermined time interval is so called a multi-flashing device. Thus multi-flashing device can produce the multiple flashlight momentarily and periodically. By using the multi-flashing device, it is possible to photograph a rotating substance or a moving substance at the stationary state by means of the flashlight which is repeated momentarily and periodically. In this kind of prior art multi-flashing device, the quantity of the flashlight in short distance photographing was same value with that of the flashlight in long distance photographing in spite that the few quantity of the flashlight is adequate in short distance photographing, since the multi-flashing device has not been provided with a light quantity control device which can automatically control the quantity of light. It was, accordingly, impossible to increase the flashing times and to make repetition of the flashing of the flash device particularly employing a battery as a power source faster in short distance photographing, and, therefore, it was impossible to obtain the suitable exposure.
{ "pile_set_name": "USPTO Backgrounds" }
; RUN: llc < %s -disable-fp-elim target datalayout = "e-p:32:32:32-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:32:64-f32:32:32-f64:32:64-v64:64:64-v128:128:128-a0:0:64-f80:128:128-n8:16:32-S128" target triple = "i386-apple-macosx10.7" ; This test case has a landing pad with two predecessors, and a variable that ; is undef on the first edge while carrying the first function return value on ; the second edge. ; ; Live range splitting tries to isolate the block containing the first function ; call, and it is important that the last split point is after the function call ; so the return value can spill. ; ; <rdar://problem/10664933> @Exception = external unnamed_addr constant { i8*, i8* } declare void @llvm.memset.p0i8.i32(i8* nocapture, i8, i32, i32, i1) nounwind define void @f(i32* nocapture %arg, i32* nocapture %arg1, i32* nocapture %arg2, i32* nocapture %arg3, i32 %arg4, i32 %arg5) optsize ssp { bb: br i1 undef, label %bb6, label %bb7 bb6: ; preds = %bb %tmp = select i1 false, i32 0, i32 undef br label %bb7 bb7: ; preds = %bb6, %bb %tmp8 = phi i32 [ %tmp, %bb6 ], [ 0, %bb ] %tmp9 = shl i32 %tmp8, 2 %tmp10 = invoke noalias i8* @_Znam(i32 undef) optsize to label %bb11 unwind label %bb20 bb11: ; preds = %bb7 %tmp12 = ptrtoint i8* %tmp10 to i32 %tmp13 = bitcast i8* %tmp10 to i32* %tmp14 = shl i32 %tmp8, 2 %tmp15 = getelementptr i32* %tmp13, i32 undef %tmp16 = getelementptr i32* %tmp13, i32 undef %tmp17 = zext i32 %tmp9 to i64 %tmp18 = add i64 %tmp17, -1 %tmp19 = icmp ugt i64 %tmp18, 4294967295 br i1 %tmp19, label %bb29, label %bb31 bb20: ; preds = %bb43, %bb41, %bb29, %bb7 %tmp21 = phi i32 [ undef, %bb7 ], [ %tmp12, %bb43 ], [ %tmp12, %bb29 ], [ %tmp12, %bb41 ] %tmp22 = landingpad { i8*, i32 } personality i8* bitcast (i32 (...)* @__gxx_personality_v0 to i8*) catch i8* bitcast ({ i8*, i8* }* @Exception to i8*) br i1 undef, label %bb23, label %bb69 bb23: ; preds = %bb38, %bb20 %tmp24 = phi i32 [ %tmp12, %bb38 ], [ %tmp21, %bb20 ] %tmp25 = icmp eq i32 %tmp24, 0 br i1 %tmp25, label %bb28, label %bb26 bb26: ; preds = %bb23 %tmp27 = inttoptr i32 %tmp24 to i8* br label %bb28 bb28: ; preds = %bb26, %bb23 ret void bb29: ; preds = %bb11 invoke void @OnOverFlow() optsize to label %bb30 unwind label %bb20 bb30: ; preds = %bb29 unreachable bb31: ; preds = %bb11 %tmp32 = bitcast i32* %tmp15 to i8* %tmp33 = zext i32 %tmp8 to i64 %tmp34 = add i64 %tmp33, -1 %tmp35 = icmp ugt i64 %tmp34, 4294967295 %tmp36 = icmp sgt i32 %tmp8, 0 %tmp37 = add i32 %tmp9, -4 br label %bb38 bb38: ; preds = %bb67, %bb31 %tmp39 = phi i32 [ %tmp68, %bb67 ], [ undef, %bb31 ] %tmp40 = icmp sgt i32 %tmp39, undef br i1 %tmp40, label %bb41, label %bb23 bb41: ; preds = %bb38 invoke void @Pjii(i32* %tmp16, i32 0, i32 %tmp8) optsize to label %bb42 unwind label %bb20 bb42: ; preds = %bb41 tail call void @llvm.memset.p0i8.i32(i8* %tmp32, i8 0, i32 %tmp9, i32 1, i1 false) nounwind br i1 %tmp35, label %bb43, label %bb45 bb43: ; preds = %bb42 invoke void @OnOverFlow() optsize to label %bb44 unwind label %bb20 bb44: ; preds = %bb43 unreachable bb45: ; preds = %bb57, %bb42 %tmp46 = phi i32 [ %tmp58, %bb57 ], [ 255, %bb42 ] %tmp47 = icmp slt i32 undef, 0 br i1 %tmp47, label %bb48, label %bb59 bb48: ; preds = %bb45 tail call void @llvm.memset.p0i8.i32(i8* %tmp32, i8 0, i32 %tmp9, i32 1, i1 false) nounwind br i1 %tmp36, label %bb49, label %bb57 bb49: ; preds = %bb49, %bb48 %tmp50 = phi i32 [ %tmp55, %bb49 ], [ 0, %bb48 ] %tmp51 = add i32 %tmp50, undef %tmp52 = add i32 %tmp50, undef %tmp53 = getelementptr i32* %tmp13, i32 %tmp52 %tmp54 = load i32* %tmp53, align 4, !tbaa !0 %tmp55 = add i32 %tmp50, 1 %tmp56 = icmp eq i32 %tmp55, %tmp8 br i1 %tmp56, label %bb57, label %bb49 bb57: ; preds = %bb49, %bb48 %tmp58 = add i32 %tmp46, -1 br label %bb45 bb59: ; preds = %bb45 %tmp60 = ashr i32 %tmp46, 31 tail call void @llvm.memset.p0i8.i32(i8* null, i8 0, i32 %tmp37, i32 1, i1 false) nounwind br i1 %tmp36, label %bb61, label %bb67 bb61: ; preds = %bb61, %bb59 %tmp62 = phi i32 [ %tmp65, %bb61 ], [ 0, %bb59 ] %tmp63 = add i32 %tmp62, %tmp14 %tmp64 = getelementptr i32* %tmp13, i32 %tmp63 store i32 0, i32* %tmp64, align 4, !tbaa !0 %tmp65 = add i32 %tmp62, 1 %tmp66 = icmp eq i32 %tmp65, %tmp8 br i1 %tmp66, label %bb67, label %bb61 bb67: ; preds = %bb61, %bb59 %tmp68 = add i32 %tmp39, -1 br label %bb38 bb69: ; preds = %bb20 resume { i8*, i32 } %tmp22 } declare i32 @__gxx_personality_v0(...) declare noalias i8* @_Znam(i32) optsize declare void @Pjii(i32*, i32, i32) optsize declare i32 @llvm.eh.typeid.for(i8*) nounwind readnone declare void @OnOverFlow() noreturn optsize ssp align 2 !0 = metadata !{metadata !"int", metadata !1} !1 = metadata !{metadata !"omnipotent char", metadata !2} !2 = metadata !{metadata !"Simple C/C++ TBAA", null}
{ "pile_set_name": "Github" }
Adam de Craponne Born in 1526 in Salon-de-Provence, between 1557 and 1558, Craponne built the channel bearing his name. The Canal de Craponne enabled irrigation of the desertic Crau with water coming from the Durance. Craponne personally funded the project, with the help of private partners, such as Nostradamus.
{ "pile_set_name": "Pile-CC" }
Welcome to my Blog......... Disclaimer: - Everything on Antjie are not written by me, all come from different sources such as google search,several websites and forums.Blog owner hold no responsibility for any illegal usage of the content.If anyone have see the copyrighted content or objectable content on this blog then viewer's can say to blog owner through comments,the content will be removed from this blog immediately.Thanks!
{ "pile_set_name": "Pile-CC" }
Fisherman's Cove Vivanta by Taj—Fisherman's Cove, commonly called Fisherman's Cove, is a luxury beach resort near the coast of the Bay of Bengal in Chennai, India. Categorized as a 5-star deluxe resort by Ministry of Tourism, Government of India, it is a part of the chain of Taj Hotels, Resorts and Palaces and is classified under the group's leisure/resort hotels section. Owner by the Covelong Beach Hotels Limited, an associate of the Taj Group, the hotel is built on the ramparts of a ruined 18th-century Dutch castle. History The Dutch, upon arriving at the coast, built a magnificent fort in the 18th century. However, they were attacked and driven out by the Nawab of Arcot, who in turn was tricked by the French and ultimately surrendered. The British vanquished the French, and with them the fort remained until independence. The Fisherman's Cove hotel is built on the ramparts of this ruined fortress. The hotel was opened in 1974. In 1996, the Indian Hotels Company entered a technical assistance agreement with Covelong Beach Hotel (India) Ltd to run the hotel. In September 2010, the hotel was rebranded and renamed as Vivanta by Taj—Fisherman's Cove, Chennai. Location Vivanta by Taj—Fisherman's Cove is situated 32 km away from the city of Chennai. It is near the Covelong Beach and the temple towns of Mahabalipuram and Kanchipuram. The hotel Fisherman's Cove is set on a 48-acre land with Casuarina trees. Other facilities at the hotel include the following: A 10,000 sq ft (9 sq m) swimming pool, including a sunken bar and a children's pool. A fitness centre, with facilities for aromatic oil massages and chill showers. A 4,000 sq ft pillar-less hall named 'Casuarina', with a capacity of 300. A business center. A 3,000 sq ft main banquet hall. Facilities for recreation, including aquatics, tennis, etc. A Shopping arcade. See also Hotels in Chennai References External links Official website Category:Buildings and structures in Chennai Category:Hotels in Chennai Category:Taj Hotels Resorts and Palaces Category:Resorts in India Category:Mahabalipuram
{ "pile_set_name": "Wikipedia (en)" }
Ab initio calculations and reduced density gradient analyses of the structure and energetics of hydrated calcium fluoride and calcium carbonate. We studied microhydrated calcium fluoride, calcium carbonate and their ions at the MP2/6-311++G** level of theory due to the lack of basic thermodynamic information about solvation of these salts and of systematic analyses of hydrogen bonding in their solvated species. Low-lying configurations were obtained through a molecular dynamics search involving stepwise hydration of the species of interest. The molecular dynamics employed a semiempirical Hamiltonian. The resulting configurations were then geometry-optimized at the MP2/6-311++G** level of theory and characterized as energy minima through vibrational analysis. We report a first estimate of the enthalpies of hydration at infinite dilution for calcium fluoride, calcium carbonate and their constituent anions. We also find that the dissociation processes of both hydrated calcium fluoride and calcium carbonate are endothermic processes. We analyze the interrelation of hydrogen bonding and van der Waals interactions in defining the structure of the first solvation shells of calcium fluoride, fluoride ion, calcium carbonate and carbonate ion by invoking geometric criteria, by calculations yielding critical points obtained from quantum theory of atoms in molecules (QTAIM) and by examination of reduced density gradient (RDG) surfaces. RDG surfaces reveal that water-water non-covalent interactions tend to destabilize the solvation shell, and are compensated for by cooperative hydrogen bonds.
{ "pile_set_name": "PubMed Abstracts" }
Satellite and defective RNAs of Cryphonectria hypovirus 3-grand haven 2, a virus species in the family Hypoviridae with a single open reading frame. Cryphonectria parasitica hypovirus 3-Grand Haven 2 (CHV3-GH2) is the most recently characterized member of the Hypoviridae family of viruses associated with hypovirulence of the chestnut blight fungus. Isolates of CHV3-GH2 contain either three or four double-stranded (ds) RNAs that are visible on ethidium bromide-stained agarose or polyacrylamide gels. Only the largest dsRNA appears to be required for virus infectivity, and was characterized previously (C. D. Smart et al., 1999, Virology 265, 66-73). In this study, we report the cloning, sequencing, and analysis of the other three dsRNAs. Sizes of the accessory dsRNAs are 3.6 kb (dsRNA 2), 1.9 kb (dsRNA 3), and 0.9 kb (dsRNA 4), compared to 9.8 kb for the genomic dsRNA segment (dsRNA 1). All three accessory dsRNA species are polyadenylated on the 3'-end of one strand, as is genomic dsRNA. DsRNA 2 represents a defective form of dsRNA 1, with the 5'-terminal 1.4 kb derived from the 5'-end of dsRNA 1 and the 3'-terminal 2.2 kb from the 3'-end of dsRNA 1. A single major open reading frame (ORF) is evident from deduced translations of dsRNA 2. The deduced translation product is a 91-kDa protein that represents a fusion consisting of the entire N-terminal protease and the entire putative helicase domain. DsRNAs 3 and 4 represent satellite RNAs that share very little sequence with dsRNA 1 and 2. DsRNA 4 is 937 nucleotides, excluding the poly(A)(+). The first AUG of the polyadenylated strand of dsRNA 4 occurs eight residues in from the 5'-terminus and would initiate the largest ORF on dsRNA 4, with the coding capacity for a 9.4-kDa protein. Within the deduced ORF and approximately 100 nucleotides from the 5'-end of dsRNA 4 is a 22-base sequence that is identical to sequences found in the nontranslated leaders of dsRNAs 1 and 2. DsRNA 3 accumulation in infected cultures varied, but it was less abundant than dsRNA 4. DsRNA 3 was found to represent a head-to-tail dimer of dsRNA 4 linked by a poly(A)/(U) stretch of 40-70 residues.
{ "pile_set_name": "PubMed Abstracts" }
546 F.2d 570 1976-2 Trade Cases 61,184 CHARLOTTE TELECASTERS, INC., and North Carolina Cable, Inc.,Appellants,Television Presentations, Inc., Plaintiff,v.JEFFERSON-PILOT CORPORATION et al., Appellees. No. 75-2326. United States Court of Appeals,Fourth Circuit. Argued June 9, 1976.Decided Dec. 10, 1976. Jerry S. Cohen, Washington, D. C. (Michael D. Hausfeld, Herbert E. Milstein, Washington, D. C., Jerry W. Whitley, Charlotte, N. C., on brief), for appellants. William L. Stocks, Greensboro, N. C. (Welch Jordan, Janet L. Covey, Jordan, Wright, Nichols, Caffrey & Hill, Greensboro, N. C., on brief), for appellees. Before HAYNSWORTH, Chief Circuit Judge, and BUTZNER and WIDENER, Circuit Judges. BUTZNER, Circuit Judge: 1 Charlotte Telecasters, Inc., and Television Presentations, Inc., (Telecasters) appeal the summary judgment dismissing their antitrust claim against Jefferson-Pilot Corp., Jefferson Standard Broadcast Co., and Jefferson-Carolina Corp. (Jefferson). Telecasters charged that Jefferson conspired with members of the city council of Charlotte, North Carolina, to obtain a television franchise, and to prevent the award of a franchise to the applicant in which Telecasters had an interest.1 The district court ruled that Telecasters' claim was barred by the statute of limitations, and, alternatively, that Jefferson did not violate Section 1 of the Sherman Act, 15 U.S.C. § 1.2 Since we find that the claim was barred by the statute of limitations, we do not consider whether summary judgment was appropriate on the merits. 2 * On January 16, 1967, the city council enacted an ordinance authorizing non-exclusive franchises for cable television. The council awarded franchises to Jefferson and another applicant on March 20, 1967, and confirmed these awards on April 3, 1967. Although Telecasters did not receive a franchise, it was told, at the March meeting, that additional franchises might be considered in the future. On August 7, 1967, Telecasters asked the council to reconsider its application. The council, however took no further action. 3 Telecasters commenced this action on September 7, 1971. Section 4B of the Clayton Act, 15 U.S.C. § 15b, provides that an action to enforce the antitrust laws "shall be forever barred unless commenced within four years after the cause of action accrued." A cause of action generally accrues each time the defendant commits an act that injures the plaintiff's business. Zenith Radio Corp. v. Hazeltine Research, Inc., 401 U.S. 321, 338, 91 S.Ct. 795, 28 L.Ed.2d 77 (1971). Accordingly, this action would ordinarily be barred unless an act injurious to Telecasters' business occurred after September 7, 1967. 4 Telecasters contends that the defendants were engaged in a continuing conspiracy to prevent it from obtaining a franchise. It argues that the cause of action did not accrue until the council had had a reasonable time at least thirty days to consider its request of August 7, 1967, and that the council's silence was an overt act of refusal. On the other hand, Jefferson claims that the alleged violation consisted of a single act which injured Telecasters. Under its theory, the cause of action accrued when the council confirmed the awards to Telecasters' competitors on April 3, 1967. 5 In deciding the date from which the cause of action accrued, we must determine whether the injury alleged by Telecasters was caused by a single or a continuing violation of the Act. Distinguishing between the two, the Supreme Court has held that a single violation necessarily occurs "within some specific and limited time span," whereas continuing violations "inflict continuing and accumulating harm." Hanover Shoe, Inc. v. United Shoe Machinery Corp., 392 U.S. 481, 502 n.15, 88 S.Ct. 2224, 2236, 20 L.Ed.2d 1231 (1968). For this reason, exclusion from participation in an industry constitutes a continuing conspiracy, unless the exclusion is final in its impact. Poster Exchange, Inc. v. National Screen Service Corp., 517 F.2d 117, 126-27 (5th Cir. 1975); Twin City Sportservice, Inc. v. Charles O. Finley & Co., 512 F.2d 1264, 1270 (9th Cir. 1975). Thus, each refusal to deal gives rise to a claim under the antitrust laws. Pioneer Co. v. Talon, Inc., 462 F.2d 1106, 1108-09 (8th Cir. 1972). Nevertheless, even when the plaintiff charges a continual refusal to deal, the statute of limitations commences to run from the last overt act causing injury to the plaintiff's business. Poster Exchange,517 F.2d at 128. 6 In this case, Telecasters was not excluded from participation in the cable television industry by a single act of the alleged conspirators at one specific time. Since the council adopted a non-exclusive ordinance and left open the possibility of granting additional franchises, Telecasters has properly alleged a continuing conspiracy. However, the last overt act of the alleged conspiracy was the council's consideration of Telecasters' request on August 7, 1967. On that occasion, the mayor responded that the council would "leave it as it is." His additional comment that the council "will give some thought to what (Telecasters' spokesman) has said today" did not promise action in the future. The council's silence after the meeting, therefore, does not constitute an overt act. Cf. Poster Exchange, 517 F.2d at 128. Since no overt act occurred within the four years preceding the filing of the complaint, the action is barred unless it falls within one of the exceptions to the statute of limitations. II 7 Claiming that its loss of future profits could not be ascertained in 1967, Telecasters asserts that it is entitled to rely on the exception to the statute of limitations created by Zenith Radio Corp. v. Hazeltine Research, Inc., 401 U.S. 321, 338-42, 91 S.Ct. 795, 28 L.Ed.2d 77 (1971). In Zenith, the Court held that a cause of action for future damages does not accrue until the damages become reasonably ascertainable and, therefore, capable of proof. However, Zenith did not prescribe new standards for determining whether damages are too speculative to permit recovery. The principal cases explaining the criteria for ascertaining whether damages are speculative remain Bigelow v. RKO Pictures, Inc., 327 U.S. 251, 264, 66 S.Ct. 574, 90 L.Ed. 652 (1946) and Story Parchment Co. v. Paterson Parchment Paper Co., 282 U.S. 555, 562-66, 51 S.Ct. 248, 75 L.Ed. 544 (1931). These cases teach that when the defendant's wrong has been proven, "the jury may make a just and reasonable estimate of the damage based on relevant data, and render its verdict accordingly. In such circumstances, 'juries are allowed to act upon probable and inferential, as well as direct and positive proof.' " 327 U.S. at 264, 66 S.Ct. at 580. Tested by these principles, we believe that Telecasters' damages could have been ascertained in September, 1967, with sufficient certainty to sustain a verdict. 8 Telecasters concedes that its future profits would depend on the number of subscribers to its cable television system. It argues that the subscriptions could not be estimated accurately until 1969 when Jefferson's success in signing subscribers could be evaluated. 9 We are not persuaded by Telecasters' argument. Telecasters' application to the council early in 1967 included its projection of subscribers and gross receipts for the first five years of operation under a franchise. These projections indicate that after the fourth year, its system would serve 29,000 to 30,000 subscribers, and the gross receipts would stabilize at approximately $1,740,000 to $1,800,000. These projections appear sufficient to enable a jury to make a just and reasonable award of damages. Telecasters introduced no proof that cast doubt on its projections or indicated that they were speculative. Since the projections were designed to induce the council to award a franchise, the district court could conclude, in the absence of evidence to the contrary, that they were rationally based on valid assumptions. Under these circumstances, we conclude that the damages which Telecasters sought were not too speculative to prevent the cause of action from accruing at the time of the last overt act, August 7, 1967. Cf. Woods Exploration & Producing Co. v. Aluminum Co. of America, 509 F.2d 784, 792 (5th Cir. 1975); Akron Presform Mold Co. v. McNeil Corp., 496 F.2d 230, 234 (6th Cir. 1974). III 10 Telecasters also seeks application of the familiar rule that fraudulent concealment tolls a federal statute of limitations. See Holmberg v. Armbrecht, 327 U.S. 392, 397, 66 S.Ct. 582, 90 L.Ed. 743 (1946). In Weinberger v. Retail Credit Co., 498 F.2d 552, 555 (4th Cir. 1974), we emphasized, however, that merely intoning the word "fraudulently" is not sufficient to avoid the statute. We stated that the elements of this counterpoise are "(1) fraudulent concealment by the party raising the statute together with (2) the other party's failure to discover the facts which are the basis of his cause of action despite (3) the exercise of due diligence on his part." Since this means of avoiding the statute was created by courts of equity, we adopted their requirement that the facts necessary to show these elements should be distinctly pleaded. Cf. Moviecolor Ltd. v. Eastman Kodak Co., 288 F.2d 80, 88 (2d Cir. 1961). In Stearns v. Page, 48 U.S. (7 How.) 818, 829, 12 L.Ed. 928 (1849), the Court explained the reasons for these essential allegations as follows: 11 "A complainant, (to avoid the statute of limitations,) must state in his bill distinctly the particular act of fraud, misrepresentation, or concealment, must specify how, when, and in what manner, it was perpetrated. The charges must be definite and reasonably certain, capable of proof, and clearly proved. . . . And especially must there be distinct averments as to the time when the fraud, mistake, concealment, or misrepresentation was discovered, and what the discovery is, so that the court may clearly see, whether, by the exercise of ordinary diligence, the discovery might not have been before made." 12 Telecasters has made no averment of fraudulent concealment. We have no doubt that the district court would have excused its initial omission, and allowed it to respond to Jefferson's plea of the statute. But Telecasters sought no leave to amend. Obviously, Telecasters had acquired information about its cause of action by September 7, 1971, when it filed its complaint, but it has not shown, by amendment to its pleadings, by affidavit, or otherwise, when and how it got this knowledge. It emphasizes that it learned additional facts after the suit was filed, but this information simply serves to corroborate the charge of conspiracy that had already been made, rather than to support Telecasters' claim that it was ignorant of the facts necessary to institute its suit.3 Moreover, Telecasters has introduced no evidence from which the district court could infer that it exercised diligence to learn the facts before the statute barred its claim. At most, its claim is a plea of ignorance, but this is insufficient to avoid the statute. Akron Presform Mold Co. v. McNeil Corp., 496 F.2d 230, 234 (6th Cir. 1974). 13 We affirm the judgment of the district court on the ground that the action is barred by the statute of limitations. 1 The applicant was North Carolina Cable, Inc., which, though a party to the proceedings in the district court, has not appealed. Telecasters claims that it was interested in the application as a joint venturer, and, for simplicity, we will refer to Telecasters as the applicant 2 The district court directed the entry of a final judgment as to this single claim of the multi-claim complaint pursuant to Fed.R.Civ.P. 54(b) 3 Indeed, for aught that appears in this record, Telecasters may have known on August 7, 1967, of the facts that led it to believe that Jefferson and members of the council had conspired to violate the antitrust laws. On that date, a spokesman for Telecasters told the city council that Telecasters could bring a legal action, but that it preferred to have the council grant it a franchise "without going into a federal court." It has never explained what proceeding it contemplated, other than an action for violation of the antitrust laws, although it bears the burden of proof on the issue of fraudulent concealment. Akron Presform Mold Co. v. McNeil Corp., 496 F.2d 230, 233 (6th Cir. 1974)
{ "pile_set_name": "FreeLaw" }
Hakataramea Valley farmers have been given some food for thought with the suggestion they could market their products directly to consumers. The idea was raised by Prof Keith Woodford during a field day at Waikora Station last week organised by the Hakataramea Sustainability Collective. The collective, set up in 2016, comprises a group of farmers whose aim is to assist and encourage the protection and enhancement of the valley’s environment and promote profitable and sustainable farming practices for future generations. It has been working closely with the New Zealand Landcare Trust, Environment Canterbury, the Department of Conservation, Fish and Game, local iwi and the Waimate District Council to ensure a collaborative and cohesive approach. . . When Sam Staley went to the Defence Force’s Tekapo Military Training Area back in 1996 to run the Military Camp and Training Area for a three year stint, one of the tasks at the time was pest control. Today, 22 years later, he’s still there, and so are some of the rabbits, but after two decades of the comprehensive rabbit control operation which Sam initiated, the rabbits are nothing like the problem they used to be on the 19,000 hectare military site. “The training area is unique,” Sam says. “It’s a very special bit of dirt! It’s probably the most intensively managed, non-grazed piece of high country land in Canterbury. It includes unique and nationally threatened plants and native fauna like alpine weta, rare butterflies and moths and many endangered vertebrates such as the Mackenzie Basin skink.” . . Robots have taken over many of America’s factories. They can explore the depths of the ocean, and other planets. They can play ping-pong. But can they pick a strawberry? “You kind of learn, when you get into this — it’s really hard to match what humans can do,” says Bob Pitzer, an expert on robots and co-founder of a company called Harvest CROO Robotics. (CROO is an acronym. It stands for Computerized Robotic Optimized Obtainer.) Any 4-year old can pick a strawberry, but machines, for all their artificial intelligence, can’t seem to figure it out. Pitzer says the hardest thing for them is just finding the fruit. The berries hide behind leaves in unpredictable places. . . Farmers desperately seeking answers feel they have been left in limbo as the cattle disease Mycoplasma bovis takes hold and still the Ministry for Primary Industries (MPI) says it has no clear idea how it got here. The ministry has confirmed the outbreak could cost $100 million in tracking and tracing the spread of the disease and paying compensation to farmers. It initially budgeted for $35m. With too many gaps and too few answers farmers are understandably anxious about whether the Government is going to eradicate it, Federated Farmers dairy chairman Chris Lewis said. . . Waikato farmers have found an upside in the continuing delays plaguing the Healthy Rivers plan and believe critical dates in it might be pushed out beyond the original timeframe. Despite being notified in October 2016 the plan was derailed late that year when Hauraki iwi objected to part of the catchment being included, subject to that iwi’s claim over its ownership. That required the plan to be effectively split with the 12% or 120,000ha of the catchment affected by the claim becoming subject to negotiation between iwi and the council on Healthy Rivers conditions, before being re-notified. But Waikato Federated Farmers president Andrew McGiven said farmers are conscious the plan has some specific dates in it requiring them to submit nitrogen reference points by March next year. . . The definition for mānuka honey may be revised if fresh science shows the need, Ministry for Primary Industries director-general Martyn Dunne says. MPI first announced the definition on December 11 last year but beekeepers objected to an aspect of the definition that required a kilogram of monofloral or multifloral honey contain at least five micrograms of 2′-methoxyacetophenone (known as 2 MAP). More pure and composite meat goats are needed to fill four planned shipments of live goats and goat meat to Asian clients in the next few months, says Shingle Creek Chevon partner Dougal Laidlaw, of Clyde. As the market for live exports was competitive, he did not wish to say which countries or clients the goats were going to. However, he wanted to hear from farmers who might be interested in supplying or rearing goats, both for live and meat export as well as for the domestic top end restaurant trade. Clara is a college student in Toronto, and in a few days, she’s flying home to Paris to visit her family and friends. She also stopping at a fromagerie to buy some cheese to bring back to Canada, specifically Comté, a cousin of Gruyere made under strict rules in the French Alps. “It’s not gooey, and you know it’s not going to give a scent to your entire suitcase,” Clara says. Comté is also a lot cheaper in France. It’s easy to find at supermarkets for the equivalent of about $6 or $7 a pound. In Canada, it’s both a lot harder to find, and it’s usually at least $20 a pound. Clara’s yearly ritual becomes a source of anxiety when she flies back to Canada and prepares to face a border officer — and that dreaded question: “Are you bringing in any food?” . . As the new Government pushes for a zero carbon economy by 2050 a Fonterra submission on what a low emission economy means has highlighted issues it maintains challenge a transition into the Emissions Trading Scheme for dairy. The new Government has indicated it wants farming to contribute to greenhouse gas emission costs, possibly incurring 5% of those costs initially. The farmer co-operative has submitted to the Productivity Commission’s inquiry into the impact of a low emissions economy on economic well-being and production. . . Where we ask a farmer five quick questions about farming, and what agriculture means to them. Today we talk to Mid Canterbury Proud Farmer David Clark. 1. How long have you been farming? I grew up in the North Island and left school at the end of the 6th Form at a time when farming in New Zealand was very tough coming out of the ’80s downturn. I was very fortunate to be employed by the Cashmore Family at Orere, SE of Auckland. It was during this time that my employers showed me by example that there was a future in farming if you worked hard and did things well, this set me on my course. 2. What sort of farming were you involved in? My parents had been both Town Milk Dairy and Sheep and Beef Farmers and I was determined to make a start for myself so started contract fencing which then led into a wider range of Agricultural Contracting activities. In 1994 my parents sold their farm and I sold my contracting business and we pooled our resources and purchased a dryland sheep property at Valetta, inland Mid Canterbury. It soon became very clear that we needed to develop irrigation on the property in order to move to an intensive arable farm system. . . FARMING will have to shut down in Canterbury’s Selwyn district to meet national water quality standards for the region’s polluted Lake Ellesmere, Environment Canterbury has told the Government. In a business case analysis provided to the Ministry for the Environment, ECan outlined significant fundamental change needed to bring the lake, one of New Zealand’s most polluted, into line. “On the current basis to achieve Government freshwater outcomes as mandated it would mean taking all intensive agriculture, not just dairy, out of the play,” ECan councillor and Selwyn district farmer John Sunckell said. . . MPI’s progress in the response to the cattle disease Mycoplasma bovis was the focus of a well-attended public meeting in Waimate last night. Around 100 people turned out to hear MPI officials and a number of industry body partners outline the current surveillance and testing regime and timelines, the robustness of disease containment measures and the actions farmers can take to protect their farms. There remains no change to the number of properties with confirmed positive test results for Mycoplasma bovis – 2 farms, both within the wider Van Leeuwen group of farms. . . As the southern dairy industry improves after seasons of low payouts and on-farm cost-cutting, some of the region’s veterinarian practices are finding it difficult to fill staff vacancies, a trend that is reflected nationally. They are also in competition with overseas recruiting agencies, which are eyeing New Zealand to fill their clients’ needs. The increasing demand for both production and companion animal vet services as practices get busier, is a good indicator of how well the economy is doing, New Zealand Veterinary Association’s Veterinary Business Group chairwoman Debra Gates said. . .
{ "pile_set_name": "Pile-CC" }
Elizabeth Thomas (poet) Elizabeth Thomas (1675 – 1731) was a British poet. Early years Elizabeth Thomas was born in London, the only child of Elizabeth Osborne (died 1719), aged 16, and lawyer Emmanuel Thomas (d. 1677), aged 60. Her father died when she was an infant, leaving Osborne to take care of her. Osborne and Thomas faced many financial difficulties while living in Surrey, but, after they returned to London to live in Great Russel Street. She was educated at home, was well read, and learned some French and Latin. Career Thomas educated herself by buying books and reading, and by her mid twenties, she was a confident poet, which lead her to sharing her poetry with literary men. As an impoverished gentlewoman, she was dependent on others for patronage, and she was fortunate to be part of an illustrious artistic and literary circle which included Lady Mary Chudleigh, Mary Astell, Judith Drake, Elizabeth Elstob, Lady Mary Wortley Montagu, John Norris, and painter Sarah Hoadly, wife of Benjamin Hoadly. She sent John Dryden, an English poet, two poems not long before his death, and he responded, "your Verses were, I thought, too good to be a Woman's." Dryden then compared Thomas to Katherine Philips, another female poet. John Dryden was also who gave her her nome de plume, "Corinna". Her first known publication was an elegy, "To the Memory of the Truly Honoured John Dryden, Esq", published anonymously in the collection Luctus Britannici (1700). Thomas was engaged for sixteen years to Richard Gwinnett (1675–1717). The couple was not in a financial position to get married until 1716. Thomas later postponed the marriage in order to nurse her terminally ill mother. Gwinnett died the next year, and although he left Thomas a legacy, his family suppressed his will. After litigation, Thomas could not cover her legal costs. During their engagement they had maintained an extensive correspondence, much of which was published in Pylades and Corinna (1731–2) and The Honourable Lovers (1732; repr. 1736). Thomas was active and had a reputation in London and Bath literary circles. She experimented with a wide range of literary forms including lyrics, panegyrics, pastorals, polemics, religious meditations, and satires. Much of her poetry dealt with women's issues, particularly women's right to education, as women were in her time "still deny'd th'Improvement of our Mind." Her work initially circulated in manuscript, but due to financial necessity she published Miscellany Poems on Several Subjects anonymously in 1722, and thereafter sought publication. Her friend Henry Cromwell some time earlier had given Thomas some letters he had received from Alexander Pope. Needing money, Thomas sold these letters to Edmund Curll in 1726. Curll promptly published the letters in Miscellanea in Two Volumes (1726), much to the irritation of Pope. For this infraction he lampooned Thomas in The Dunciad as "Curll's Corinna" (II 66). A minor revenge was attributed to her by Pope — the publication of Codrus, or, 'The Dunciad' Dissected (1728) — though she was incarcerated at the time it was published. Her reputation was severely damaged by the notoriety, and she was long believed to have been Cromwell's mistress though there is no reason to believe that she was. Thomas continued to publish through the 1720s, but was unable to meet her debts and was jailed in the Fleet prison in 1727 for three years. Within a year of her release, Thomas died and was buried at St Bride's, Fleet Street in 1731. Themes Elizabeth uses the theme of sarcasm multiple times throughout her poems to convey the importance of her message. For example, in her poem of "On Sir J- S- saying in a Sarcastic Manner, My books would make me Mad. An Ode" MS? LION RL (1722) By changing her voice and taking on the role as a man in her poem. The reader can conclude that Thomas is using sarcasm to emphasize that fact women she be involved in Selected works "To the Memory of the Truly Honoured John Dryden, Esq", Luctus Britannici (anon., 1700) Miscellany Poems on Several Subjects (anon., 1722); rpt. Poems on Several Occasions (1726) Codrus, or, ‘The Dunciad’ Dissected (attrib., 1728) Metamorphosis of the Town (anon., 1730, repr. 1731, 1732; under her own name, 1743) R. Gwinnett and E. Thomas, Pylades and Corinna, 2 vols. (1731–2) The Honourable Lovers (1732; repr. 1736) "On Sir J- S- saying in a Sarcastic Manner, My books would make me Mad. An Ode" MS? LION RL (1722) "To Almystrea [Mary Astell], on Her Divine Works" RL References Bibliography Blain, Virginia, et al., eds. "Thomas, Elizabeth." The Feminist Companion to Literature in English. New Haven and London: Yale UP, 1990. 1075-1076. Greer, Germaine, et al., eds. "Elizabeth Thomas." Kissing the Rod: an anthology of seventeenth-century women's verse. Farrar Straus Giroux, 1988. 429-438. Mills, Rebecca. "Thomas, Elizabeth (1675–1731)." Oxford Dictionary of National Biography. Ed. H. C. G. Matthew and Brian Harrison. Oxford: OUP, 2004. 13 May 2007. Category:1675 births Category:1731 deaths Category:18th-century British women writers Category:English women poets Category:18th-century English writers
{ "pile_set_name": "Wikipedia (en)" }
AC Radio: Offseason Listener Mailbag Extravaganza This week on Assembly Call Radio, we discuss Anthony Leal’s college decision, the recently announced Hoosier Hysteria date, and then open up the listener mailbag. We answer questions about the packline defense; why the offense might be better than we think … if we can ever get some shooting; which recruits are must-gets in 2020 and 2021; who will score 8 or more points for IU this season; the impact of Race Thompson, our level of concern with only having one true point guard on the roster; Jerome Hunter; the possibility of Davis and Brunk playing together; and more. It’s a fun, wide-ranging episode and we hope you enjoy. All of that and more on this week’s edition of Assembly Call Radio. On the mics: Jerod, Ryan, and Coach Listen to the edited podcast here (rundown with time stamps below): And here is the unedited video of the live broadcast of this week’s episode: Footer Whether basking in a signature victory or wallowing in a defeat, loyal Hoosier basketball lovers need a place where they can surround themselves with like-minded fans for intelligent postgame wrap-up. That place is The Assembly Call. -- Jared Weyerbacher (IU, '08)
{ "pile_set_name": "Pile-CC" }
A record number of women are running to be the next president of the United States, but Americans still don’t seem to think the country is ready for them, according to a new Daily Beast and Ipsos poll. Only 33 percent of voters surveyed believed their neighbors would be comfortable with a woman in the Oval Office, despite 74 percent saying they themselves would be comfortable with a woman president. The poll, which was conducted in early June, also showed 20 percent of Democratic and independent men also agreed with the sentiment that women were “less effective in politics than men.” It should be said, as Harvard political scientist Ryan Enos pointed out on Twitter, there’s some inherent “murkiness” in this opinion poll, because it’s impossible to tell how much respondents are conflating their own opinions with their peers’ — although this is one way pollsters get at opinions voters are possibly embarrassed about holding. But even beyond what the poll might say about voters’ own beliefs, that murkiness is also a takeaway. Among Democrats and independents, 82 percent of respondents said their top priority in picking a Democratic nominee was based on who they thought could beat President Donald Trump — so whether people think their neighbors will support a candidate is statistically important on its own. While it’s still early in the presidential election cycle, we’ve seen “electability” play a role over and over in how Democrats are approaching the presidential primary. And this poll gives greater insight into how factors like gender and identity — whether or not they are actually rooted in reality — could play a factor in making those determinations. Democrats are hung-up on electability So far, poll after poll has shown Democrats prioritizing “electability.” In other words, it’s really important to Democrats that whomever they pick will be able to actually beat Trump, sometimes even more so than if their beliefs match up with the candidate’s. So there’s a big difference between what Democratic voters say they want in a president, and who they are supporting. A recent survey from Pew Research Center suggests more Democrats might prefer their 2020 candidate wasn’t an old white man than those who would. Yet former Vice President Joe Biden remains the heavy favorite in early polls, followed most consistently by Sen. Bernie Sanders — two septuagenarian white men. Sen. Elizabeth Warren has been rising in the polls, but that’s been a fairly recent development. As Vox’s Li Zhou has reported, the emphasis on electability goes a long way to explain why so many Democrats are gravitating toward men: “the expectation of who can win is inextricably wrapped up in the knowledge of who has won,” Zhou writes. “Metrics like authenticity and likability and electability are just code that we use against candidates who are not like what we are used to,” Christina Reynolds, a spokesperson for Emily’s List, a political organization that supports women candidates, previously told Vox. Elected women are actually more effective in political office The pervasiveness of sexism in American politics actually creates a paradox in government — elected women are actually more effective in office. Political scientists Sarah Anzia and Christopher Berry from University of California, Berkeley and University of Chicago, respectively, call it the “Jill Robinson effect” — after Jackie Robinson, the first black baseball player who became one of the biggest stars in the game. “Robinson had to be better than almost any white player in order to overcome the prejudice of owners, players, and fans,” Anzia and Berry write. In their 2011 study, they argue there’s a parallel with women in politics; because women have to work harder to prove themselves in the electoral process, they actually perform better when they get into office as well: First, if voters discriminate against female candidates, only the most talented, hardest working female candidates will win elections. Second, if women in the political eligibility pool underestimate their qualifications for office, or if women perceive there to be sex discrimination in the electoral process, then only the most qualified, politically ambitious females will emerge as candidates. Since 2009, as Sarah Kliff reported for Vox, the average female legislator in Congress had 2.31 of her bills enacted, compared with men, who turned 1.57 bills into law. And on average, women lawmakers were able to secure 9 percent more in funding for their congressional districts than their male colleagues. All told, districts represented by women received $49 million more per year than districts represented by men. A significant percentage — 20 percent — of Democratic and independent male voters don’t see women as effective in politics; this speaks to the challenges many of the 2020 candidates are facing. Voters have had only one example of a female nominee for a major political party, Hillary Clinton. And if the polling around gender, and electability has shown anything, Clinton’s loss clearly remains a factor for the women running now.
{ "pile_set_name": "OpenWebText2" }
New boy Santi Cazorla has revealed that former Gunners Cesc Fabregas and Robert Pires encouraged him to sign for the club. Speaking to Arsenal Player, in his first interview since joining, the Spanish international said he’d sought advice before making the switch, and received nothing but positive comments. “I spoke to Robert Pires, we played together at Villareall,” he said, “and obviously he knew about the rumours of me coming here and encouraged me to sign. He said it was a really good club and that I would enjoy London. “The same with Cesc, he said the same, that it was a great club. He said I would be very happy here and I would adapt easily. I can feel that even though I’ve only been here a few hours!” Cazorla also spoke about how the move came about, confirming he almost joined the club last summer before his switch to Malaga, and outlined why he joined the Arsenal. “It was always a club I liked very much. Because of circumstances in football things have not gone as well as we’d have liked in Malaga this year, but now I’m going to have the opportunity to experience the Premier league and I couldn’t miss it. I’m 27 years old, it was the last train I could catch. “I think it’s one of the greatest clubs in Europe. ” And his aim is quite simple, “I hope to win trophies here, that’s what I want.” Bienvenido, Sanit! — See the full interview on Arsenal Player
{ "pile_set_name": "OpenWebText2" }
Q: mysql, how to join this key id? Forgive me, I am new to mysql I have this mysql table: |ID|KeyID1|KeyID2|Param|Value|... |asdf|1|2| ... The KeyID1 and KeyID2 values exist another Table like this: |KeyID|Real Name| | 1 | Gordon | 2 | Jason I want to be able to join the two tables together such that I would have ID|Real Name1|Real Name2|Param|Value what would i need to do in mysql? Would I need to duplicate another table? edit: i can change the database design A: This is a classic JOIN operation: SELECT ID, tab1.RealName as RealName1, tab2.RealName as RealName2, Param, Value FROM mytable JOIN nametable AS tab1 ON (mytable.KeyID1 = tab1.KeyID) JOIN nametable AS tab2 ON (mytable.KeyID2 = tab2.KeyID) ; I'm assuming that your first table is called mytable and that the name lookup table is called nametable, and I also removed the spaces from column names. Whenever you need to replace a foreign unique identifier by values from the corresponding lookup table, it's time for a JOIN on that lookup table. If you do it multiple times from the same table, you can use aliases (AS) to disambiguate which instance you are referring to.
{ "pile_set_name": "StackExchange" }
Mathias C. and Eva B. Crowell Fuhrman Farm The Mathias C. and Eva B. Crowell Fuhrman Farm is an agricultural historic district located north of Independence, Iowa, United States. At the time of its nomination it consisted of seven resources, which included three contributing buildings, two contributing sites, one non-contributing building, and one non-contributing structure. The significance of the district is attributed to its being a collection of farm related buildings that exemplify the changes in farming in the local area. The contributing buildings include the 1906 Queen Anne house, the 1901 frame barn with a gambrel roof, the 1920s corncrib, and the ruins of the 1920s hog house and a stable (1865). The stable is believed to date from the original development of the farmstead. The metal machine shed and a silo are the non-contributing elements. Three generations of the Fuhrman family operated the farm until it was sold to Tom and Beth Greenley. The district was listed on the National Register of Historic Places in 1998. References Category:Queen Anne architecture in Iowa Category:Buildings and structures in Buchanan County, Iowa Category:National Register of Historic Places in Buchanan County, Iowa Category:Historic districts on the National Register of Historic Places in Iowa Category:Farms on the National Register of Historic Places in Iowa
{ "pile_set_name": "Wikipedia (en)" }
Q: R: Creating dummy variables for values of one variable conditional on another variable ORIGINAL QUESTION I want to add a series of dummy variables in a data frame for each value of x in that data frame but containing an NA if another variable is NA. For example, suppose I have the below data frame: x <- seq(1:5) y <- c(NA, 1, NA, 0, NA) z <- data.frame(x, y) I am looking to produce: var1 such that: z$var1 == 1 if x == 1, else if y == NA, z$var1 == NA, else z$var1 == 0. var2 such that: z$var2 == 1 if x == 2, else if y == NA, z$var2 == NA, else z$var2 == 0. var3 etc. I can't seem to figure out how to vectorize this. I am looking for a solution that can be used for a large count of values of x. UPDATE There was some confusion that I wanted to iterate through each index of x. I am not looking for this, but rather for a solution that creates a variable for each unique value of x. When taking the below data as an input: x <- c(1,1,2,3,9) y <- c(NA, 1, NA, 0, NA) z <- data.frame(x, y) I am looking for z$var1, z$var2, z$var3, z$var9 where z$var1 <- c(1, 1, NA, 0, NA) and z$var2 <- c(NA, 0, 1, 0, NA). The original solution produces z$var1 <- z$var2 <- c(1,1,NA,0,NA). A: You can use the ifelse which is vectorized to construct the variables: cbind(z, setNames(data.frame(sapply(unique(x), function(i) ifelse(x == i, 1, ifelse(is.na(y), NA, 0)))), paste("var", unique(x), sep = ""))) x y var1 var2 var3 var9 1 1 NA 1 NA NA NA 2 1 1 1 0 0 0 3 2 NA NA 1 NA NA 4 3 0 0 0 1 0 5 9 NA NA NA NA 1 Update: cbind(z, data.frame(sapply(unique(x), function(i) ifelse(x == i, 1, ifelse(is.na(y), NA, 0))))) x y X1 X2 X3 X4 1 1 NA 1 NA NA NA 2 1 1 1 0 0 0 3 2 NA NA 1 NA NA 4 3 0 0 0 1 0 5 9 NA NA NA NA 1
{ "pile_set_name": "StackExchange" }
Sleep habits in native Brazilian Terena children in the state of Mato Grosso do Sul, Brazil. Sleep habits in childhood vary in function of physiological factors. Cultural traits also influence sleep habits. This research evaluates sleep habits of Native Brazilian Terena children. The Terena group here studied live in the central region of Mato Grosso do Sul, Brazil, on the plains; they are peaceful and dedicated mainly to agriculture. Two villages were studied, Tereré and Córrego do Meio, both in Reservations. Sleep characteristics of 67 children (40M;27F), 2 to 10 year olds, were evaluated in interviews with their mothers. The results evidenced that cosleeping, in the same bed with family members is the standard Terena pattern present in every evaluated child. The presence of two or more beds and a mean of five or more people in each bedroom was the typical finding. The authors propose that cosleeping and the presence of numerous family members reflect the high values attributed to family links in the Terena culture.
{ "pile_set_name": "PubMed Abstracts" }
Iván Casquero Iván Casquero Cosio (born 14 July 1979) is a Spanish former footballer who played as a left back. Playing career Born in Gijón, Asturias, Casquero played youth football at Real Oviedo. On 26 May 1996, while still a junior, he made his first and only appearance in La Liga, coming on as a late substitute for Thomas Christiansen in a 3–1 away loss against CP Mérida. In the 2000–01 and 2001–02 seasons, Casquero played a combined 26 matches in Segunda División matches for SD Eibar and CD Numancia. He all but competed in Segunda División B until his retirement at the age of 32, representing mainly Cultural y Deportiva Leonesa. Coaching career Casquero returned to Oviedo after retiring, and worked at the club as youth physio and assistant coach to their reserves. References External links Category:1979 births Category:Living people Category:Sportspeople from Gijón Category:Spanish footballers Category:Asturian footballers Category:Association football defenders Category:La Liga players Category:Segunda División players Category:Segunda División B players Category:Tercera División players Category:Real Oviedo Vetusta players Category:Real Oviedo players Category:SD Eibar footballers Category:CD Numancia players Category:Cultural Leonesa footballers Category:Universidad de Las Palmas CF footballers Category:Caudal Deportivo footballers
{ "pile_set_name": "Wikipedia (en)" }
Dozens of people have been gathering along a section of the Cornish coastline over the past few hours and they are flocking there for a very good reason. You might notice a crowd on a remote stretch near Land's End and wonder what on earth is going on. Particularly when you find out some of them have travelled for several hours in order to get there. The reason for this is that they are all desperate to catch sight of a very rare bird - the catbird. Around 50 people could be seen all looking through their binoculars this morning at Treeve Moor Farm. One of them there had travelled from as far as Leicester. The crowds have gathered in Cornwall to try and spot the catbird (Image: Greg Martin) The bird, which is about 20cm (7.8in) long and grey in colour, is named because of its distinctive "meowing" sound. The crowds wanting to see a glimpse of the catbird (Image: Greg Martin) It is only the second time it has been seen here - the first sighting in Britain was in Anglesey in 2001, according to the British Birds Rarities Committee. The crowds wanting to see a glimpse of the catbird (Image: Greg Martin) Mark Grantham, chairman of the Cornwall Bird Watching and Preservation Society, said he thought the bird, which was first seen on Monday, had been brought across the Atlantic on low pressure systems following the recent US storms. It can be a long waiting game to spot the catbird (Image: Greg Martin) He said: "Birds heading south get carried out to sea on weather systems and then can follow the Gulf Stream before making landfall at the first opportunity." Read More Only in Cornwall It is no secret that plenty of people have been delighted by its arrival. Cornwalll Birds tweeted on Thursday morning (October 18): "The Grey Catbird is still at Treeve Moor this morning - for it's fourth day! (Will it stay till Saturday?!) 3 Ring-necked Duck back on Drift Res, and the Red-breasted Fycatcher still at the far end of Penlee NR in the east of the county."
{ "pile_set_name": "Pile-CC" }
Q: How to use net user with c# I am trying to use net user with c# System.Diagnostics.ProcessStartInfo proccessStartInfo = new System.Diagnostics.ProcessStartInfo("net user " + id + " /domain"); proccessStartInfo.CreateNoWindow = true; System.Diagnostics.Process proc = new System.Diagnostics.Process {StartInfo = proccessStartInfo}; proc.Start(); string result = proc.StandardOutput.ReadToEnd(); textBoxOp.Text = result; When the I execute the code Win32 exception occurs with message The system cannot find the file specified Details of exceptions are as follows at System.Diagnostics.Process.StartWithShellExecuteEx(ProcessStartInfo startInfo) at GetUserFromAD.Form1.GetInformation(String id) in D:\GetUserFromAD\GetUserFromAD\Form1.cs:line 25 at GetUserFromAD.Form1.button_Click(Object sender, EventArgs e) in D:\Ram\MyC#\GetUserFromAD\GetUserFromAD\Form1.cs:line 35 at System.Windows.Forms.Control.OnClick(EventArgs e) at System.Windows.Forms.Button.OnMouseUp(MouseEventArgs mevent) at System.Windows.Forms.Control.WmMouseUp(Message& m, MouseButtons button, Int32 clicks) at System.Windows.Forms.Control.WndProc(Message& m) at System.Windows.Forms.ButtonBase.WndProc(Message& m) at System.Windows.Forms.Button.WndProc(Message& m) at System.Windows.Forms.Control.ControlNativeWindow.WndProc(Message& m) at System.Windows.Forms.NativeWindow.DebuggableCallback(IntPtr hWnd, Int32 msg, IntPtr wparam, IntPtr lparam) at System.Windows.Forms.UnsafeNativeMethods.DispatchMessageW(MSG& msg) at System.Windows.Forms.Application.ComponentManager.System.Windows.Forms.UnsafeNativeMethods.IMsoComponentManager.FPushMessageLoop(Int32 dwComponentID, Int32 reason, Int32 pvLoopData) at System.Windows.Forms.Application.ThreadContext.RunMessageLoopInner(Int32 reason, ApplicationContext context) at System.Windows.Forms.Application.ThreadContext.RunMessageLoop(Int32 reason, ApplicationContext context) at GetUserFromAD.Program.Main() in D:\Ram\MyC#\GetUserFromAD\GetUserFromAD\Program.cs:line 18 at System.AppDomain._nExecuteAssembly(Assembly assembly, String[] args) at Microsoft.VisualStudio.HostingProcess.HostProc.RunUsersAssembly() at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state) at System.Threading.ThreadHelper.ThreadStart() A: net is the command. Everything from user onwards are command arguments. As such, you'll need to use the following constructor: System.Diagnostics.ProcessStartInfo proccessStartInfo = new System.Diagnostics.ProcessStartInfo("net", "user " + id + " /domain"); In addition, in order to capture the standard output you'll need to set the following properties before you call proc.Start() proc.StartInfo.RedirectStandardOutput = true; proc.StartInfo.UseShellExecute = false;
{ "pile_set_name": "StackExchange" }
Pharmacologic management of cancer pain. More than three quarters of cancer patients experience chronic pain during the course of their disease. With optimal pharmacotherapy alone, 70% to 90% could achieve adequate relief. Optimal pharmacotherapy begins with a comprehensive pain assessment, which defines the nature of the pain complaint and clarifies the degree to which pain and other factors contribute to impaired quality of life. Although the potential analgesic consequences of primary therapy are always considered, only radiotherapy is used commonly. Patients with persistent moderate to severe pain should be treated with an appropriate opioid regimen, which is based on careful selection of an opioid drug and route of administration, individualization of the dose through titration based on repeated assessment of the patient, and ongoing efforts to manage side effects. The use of adjuvant analgesics and the use of sequential opioid trials may improve the outcome of therapy for patients who fail to promptly attain a favorable balance between analgesia and side effects during an opioid trial.
{ "pile_set_name": "PubMed Abstracts" }
Scientist attempt to create new pain drug from... snail venom Experts are attempting to create a pain relief drug derived from snail venom. Scientists have reported creating five new "experimental substances" based on a tiny protein found in the venom of a cone snail.The substances, which could potentially be stronger than morphine, could one day lead to the development of a drug to treat chronic nerve pain, they said. This is an important incremental step that could serve as the blueprint for the development of a whole new class of drugs capable of relieving one of the most severe forms of chronic pain that is currently very difficult to treat. – Lead author Professor David Craik, from the University of Queensland in Australia Cone snails are marine animals that use venom to paralyse their prey.The venom contains hundreds of small proteins known as conotoxins which appear to have an analgesic effect in humans, he said. We don't know about side effects yet, as it hasn't been tested in humans. But we think it would be safe."It acts by a completely different mechanism than morphine so we think it has a minimal possibility of producing the side-effects of that medication. That is one of the big advantages of this drug. Prof Craik and his team, who will present their finding at an American Chemical Society conference, are working to develop a conotoxin-based drug that can be taken orally - unlike the only drug that uses the protein now which must be injected into a patient's spine.Experiments on rats have shown that a prototype drug has been shown to "significantly reduce pain", he said.
{ "pile_set_name": "Pile-CC" }
LUXEMBOURG (Reuters) - Refugees who enter the European Union alone as minors can apply to be reunited with their families, even if they reach legal adulthood before the end of the process, the EU’s top court ruled on Thursday. At the peak of Europe’s migrant crisis in 2015, 96,465 lone children applied for asylum in the EU, although numbers have fallen since then. The European Court of Justice ruled on a Dutch case in which authorities rejected an application by an Eritrean who arrived as a minor for her family to obtain temporary residence permits. Since her paperwork was not submitted by a refugee organization until after she turned 18, the application was rejected because she no longer could be considered an “unaccompanied minor”. Winning approval for refugees’ families to join them in Europe can become more difficult if they are considered adults. However, the court determined that the Dutch rejection breached EU law, saying it would otherwise be “entirely unforeseeable” for a minor to understand whether they had the right to seek asylum for their families. It ruled that applications for family reunification should be made within three months of a minor obtaining refugee status.
{ "pile_set_name": "OpenWebText2" }
The Probation Service says there is no evidence to show that disclosing details of sex offenders reduces reoffending. A new Government bill which will allow gardaí to give names and address of sex offenders to the public is being cautiously welcomed. The proposals will also allow for the electronic tagging of an offender as part of a sex offender order. Probation Service Director Vivian Geiran says there is a concern that the open disclosure will cause offenders to go off the radar. That can drive sex offenders underground and the lack of a stable living situation is shown to be a high-risk factor. "There's no evidence to show that public information would help in that way," he said. Digital Desk
{ "pile_set_name": "OpenWebText2" }
The man was taken to an area hospital for treatment and is expected to be charged with attempted murder, assault and various gun-related charges, police said. Officials said the armed guard was not an off-duty police officer.
{ "pile_set_name": "OpenWebText2" }
The return of centerfielder A.J. Pollock has been a shining moment in a season that hasn’t been so bright for the Diamondbacks. Three days before the season started, Pollock broke his elbow by sliding into home plate in an exhibition game against the Kansas City Royals. The injury caused him to be out of the majors for five months. The D-backs, who were riding a big wave of expectations coming into the season, seemed to crumble when the 2015 all-star went down. Chief Baseball Officer Tony La Russa joined the Doug and Wolf Show on Arizona Sports 98.7 FM, as he does every Wednesday, to talk about the state of the team. There was speculation by some whether or not bringing Pollock back in late August during a lost season was such a good idea, but La Russa said he couldn’t keep the outfielder from joining his teammates. “I’d let (the people questioning) know that we totally agree with that, and in fact if you listen to some of A.J.’s comments he’s been pushing the front office and the training staff to accelerate his return,” La Russa said. “We all had the same concerns, he can only do so much good here at the end (of the season) so make sure that we err on the side of caution.” Despite Michael Bourn being a solid replacement, as he’s batting .261 with three homers, 30 RBI and 13 stolen bases, he is no Pollock. La Russa stated that Pollock brings many things to the table that were irreplaceable. In the minuscule amount of action he’s seen, the centerfielder is batting .333, with two runs, one RBI and three stolen bases. “When you have a player like A.J., who’s multidimensional, he just takes the defense at centerfield, and that by itself is a game changer many times,” La Russa said. “Then you take away what he does offensively, he has a very live bat, .300 hitter with a ball that jumps and really has exciting legs.” Pollock quickly made the ascension to being one of the top outfielders in the game last season, as he took home a Gold-Glove award last year in just his third season at the major league level. La Russa believes that he knew what they had with the 28-year-old, and he did not underestimate the significance of his presence in the lineup. “Absolutely not, absolutely not… We knew after watching, they were telling me how great he was. Then he got hurt late and it was a shame,” La Russa said. “We knew it, and a good example is next year he’s solidly under contract, and we’re getting a very nice return because of that confidence.”
{ "pile_set_name": "Pile-CC" }
479 So.2d 1277 (1985) Wesley McCain HUGHSTON v. Shellie Robin IVEY. Civ. 4925. Court of Civil Appeals of Alabama. October 16, 1985. Rehearing Denied November 20, 1985. B. Greg Wood of Wood, Hollingsworth & Willis, Talladega, for appellant. No Brief for appellee. EDWARD N. SCRUGGS, Retired Circuit Judge. This is a child custody modification case. When the parties were divorced in January 1982, the final judgment of the Circuit Court of Talladega County approved an agreement of the parties whereby the mother was granted custody of their only child, Adam. In June 1983, custody was changed to the father by an agreement which was ratified and confirmed by the trial court. The wife filed the present proceedings *1278 in early 1985, seeking the child's custody because of an alleged material change in the circumstances. After a contested trial, a judgment was rendered which found that there had been a material change in the mother's circumstances and, no evidence having been introduced that the mother was an unfit person to have Adam's custody, it was ordered that the parents alternate as to the boy's custody each six months. The father appealed from that judgment and ably argues the adequacy of the evidence to support the custody modification judgment. The mother has not favored this court with a brief. We detail the pertinent evidence upon the issue in question. At the time the father was granted custody, the mother was employed by the Talladega Sheriff's Department, and she lived in the City of Talladega. The child was kept by the maternal grandmother while the mother worked; but, after serious surgery was performed upon the maternal grandfather in May 1983, the grandmother could not look after both the grandson and her ill husband, who was not able to go back to his employment until July 1983. The mother had no one to keep the child while she was on her job and, by agreement of the parties, the custody change to the father was made in June 1983. The son was almost two years of age at that time. The mother filed for bankruptcy two months before she signed the 1983 custody agreement. After the father obtained Adam's custody, the mother lost her employment and, when her unemployment compensation benefits expired, she moved back home with her parents because she could not find another job. In May 1984, the mother married Mr. Ivey, who is also from the Talladega area. For several months they lived near Talladega, but they moved to Ft. Walton, Florida, around May 1, 1985. Mr. Ivey has permanent office employment with a construction business as a project manager, where he earns about $26,000 per year, not including fringe benefits. They rent a very adequate home in Ft. Walton. The mother does not work and has no plans to seek employment. Consequently, she is at home all day and is available to provide personal, full-time care for Adam, along with the seven-year-old daughter of her new husband. Ft. Walton is a five-hour drive from Talladega for the Iveys, but the mother missed few, if any, every-other-weekend visits with her son. When her visitations end, Adam objects to going home to his father. The boy and Mr. Ivey have a good relationship. Mr. Ivey is willing to support Adam while he is in his wife's custody, at which time Adam will become a dependent insured by the stepfather's health insurance policy. When the father first had custody, he and the boy lived with the paternal grandmother in Talladega. The child has a close relationship with the paternal grandmother. Because the father and that grandmother were each employed, the child attended a nursery school from about 8:00 A.M. until around 4:30 P.M. Adam did well in that school and established friendships with the other children. At the time of the hearing in May 1985, the father's employment was from 6:30 A.M. until 4:30 or 5:30 P.M. on Monday through Friday of each week. He earns about $16,000 yearly. The father recently remarried and has an adequate home for Adam. This is his present wife's first marriage. She is an elementary school teacher and assists Adam in his intellectual growth. The boy is a dependent under both the father's and stepmother's health policies. No question was made by the evidence as to either parent's fitness to have custody of the boy, and no issue was raised as to the integrity, character or habits of either new spouse. No adverse evidence was presented as to the manner in which the father administered to the needs of the child or as to Adam's environment while he was in his father's custody. When the trial court hears the evidence ore tenus in a child custody modification case, as it did here, we presume that the trial court was correct and reverse only for an abuse of discretion or where *1279 the judgment is so unsupported by the evidence as to be palpably wrong. Matter of Young, 456 So.2d 823 (Ala.Civ.App. 1984.) When a noncustodial parent attempts to modify a judgment which granted custody to the other parent, the noncustodial parent bears the affirmative burden of proving that a change of custody would materially promote the best interests of the child. Ex parte McClendon, 455 So. 863 (Ala.1984); Clayton v. Pair, 457 So.2d 420 (Ala.Civ.App.1984). The petitioning parent must show that the positive good brought about by modifying the judgment more than offsets the inherently disruptive effect of uprooting the child. McClendon, supra; Clayton, supra. Where a child custody award has been made to the father and the mother later filed modification proceedings, it is insufficient for the mother to show that she has remarried, reformed her lifestyle and improved her financial condition; but she bears the burden of reasonably satisfying the trial court from the evidence and reasonable inferences therefrom that the child's best interest will be promoted by a change in custody. McClendon, supra. Here, there was evidence of a favorable material change in the mother's circumstances. She worked and had no one to look after Adam for a period of time after surgery was performed upon the maternal grandfather. Custody was changed to the father on that account. That agreed modification was for the benefit of the child and did not occur because of the mother's fault or unfitness. Both of the parties have fine new spouses. The mother is presently able to administer to Adam's needs on a full-time basis in an adequate home where he will be loved and cared for. While both parties are fit parents and either would provide him with a nurturing, loving home, the mother has shown that, since she agreed to give up the custody of Adam, her circumstances have improved and that she is able to provide for her son, not only in the same or equal manner that the father and stepmother have been providing for him but in an improved manner, since Adam must attend a nursery school while the father and his wife both work and since the mother is now able to devote her time and talents to the rearing of Adam on a full-time basis. Such constitutes adequate proof that Adam's interests are promoted by the change, i.e., such evidence was sufficient to overcome the disruptive effect caused by uprooting the child. Adam's custody is now split equally between his parents, and he will have the opportunity of again intimately knowing both of them. While the present custody arrangement will probably need altering when Adam becomes of mandatory school age, we do not deem that the present custody arrangement constitutes an abuse of the trial court's discretion under the facts and circumstances of this particular case. In short, the mother met the evidentiary requirements as imposed by McClendon, supra. Accordingly, any change of custody rested in the discretion of the trial court. We find no abuse thereof and affirm. The foregoing opinion was prepared by retired Circuit Judge EDWARD N. SCRUGGS, serving on active duty status as a judge of this court under the provisions of § 12-18-10(e) of the Code of Alabama 1975, and this opinion is hereby adopted as that of this court. AFFIRMED. All the Judges concur.
{ "pile_set_name": "FreeLaw" }
HIPAA Compliance means the very highest quality and data security standards. Our third-party audits and ISO certified procedures translate into precision for over 60,000 medical work units per month. Data entry to us means defining work well, doing it rapidly and with precision. Some team SLAs require real time collaboration with overseas teams. Our systems are mature, effective, secure and deliver on our byline of “Service Excellence”. Click here to see our work…
{ "pile_set_name": "OpenWebText2" }
Tile Wall Murals And Backsplashes Of France And French tile wall murals and backsplashes of france and french: Everybody’s treasured kitchen Appliances buying kitchen appliances and utensils are all fun. But also for a few people it’s also confusing. Lots of people end up getting a thing that they do not desire it only because the plan is excellent or only it has big discount. That you really don’t want to have useless appliances which you never utilize it which is likely to create your kitchen seem crowded and unorganized. It is recommended that you purchase kitchen appliances and also utensil based on the thing you want. Instead of developing a real bar, it may be practical and more economical should you just construct a bar layout kitchen island. The idea will be to construct a kitchen using a higher role in the opposing side. You are able to nonetheless ready the meal readily, as well as another family members can sit front of the kitchen island by using their table. Apart from that, Sears additionally really provides you a few services and products with high quality. How to know its quality? Well, you can assess it on some buyer reviews for that. There is going to be some terrific tips you can find such as the product scores. Last but not least, those are all some short reviews about tile wall murals and backsplashes of france and french along with the main reason why you must select them. 3 Many Sturdy, dependable and tile wall murals and backsplashes of france and french makes that you don’t wish to simply take risks together with your kitchen appliances. You need something sturdy and not prone to services each and every single every so often. Because of this, it is best if you only opt for the kitchen wall from trustworthy brands. That will help you make an informed selection, here are just the most reliable kitchen home equipment brand names in the marketplace . Whirl-pool is your best if it has to do with icebox. For a kitchen with modern day model, select a level plank closet with grey color. It’s possible for you to incorporate it using stainless appliances along with beige backsplash. To find a tasteful search for your kitchen, you’re able to choose a recessed panel cupboard with green look. Combine it quartz countertops, white back-splash or stone tile back splash and also tiled flooring. Select a glossy green cabinets to produce the classy appearance even more durable. To start with, we can choose letter U model for this kind of kitchen pub. For acquiring U style, it is simple to organize the chairs and tables onto U place. It is really going to create the new atmosphere of your kitchen spot, correct? Letter U concept is very an simple task to make. You certainly can get it done yourself now. tile wall murals and backsplashes of france and french have become contemporary and futuristic. Though the style can be only a bit out with the planet, slim wrought iron is really quite versatile and can be readily joined to various design and style. To assist you to receive creative using wrought iron iron on your kitchen, here are a few ideas to encourage you. This Tile Wall Murals And Backsplashes Of France And French the gallery form Wall Tiles For Kitchen Backsplash. Hopefully you can find the best inspiration from our gallery here.
{ "pile_set_name": "Pile-CC" }
Q: Pipeline Release's to environment fail tests In our release pipeline within TFS (on prem) the Run Functional test task are having redundant logs with "Test run is in 'InProgress' state ".  After several repetition (some times up to the time-out level) of the same message the test is aborted causing the task to be failed. Reattempting would execute test case to success. We do not have this issue on our build server only when we test what we have released to an environment. We want to know the root cause and resolution for this issue. We do have a Test Agent installed on the Server so that the test are performed there. Here is an example of what we sometimes see that is causing the issue. 2019-10-02T15:08:02.6850117Z DistributedTests: build id: 6374 2019-10-02T15:08:02.6850117Z DistributedTests: test configuration mapping: 2019-10-02T15:08:02.9506501Z DistributedTests: Test Run with Id 3439 Queued 2019-10-02T15:08:03.0450717Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:08:13.1288425Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:08:23.1965836Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:08:33.2571132Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:08:43.3372572Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:08:53.4159907Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:09:03.4760176Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:09:13.5396749Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:09:23.5995694Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:09:33.6578911Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:09:43.7221898Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:09:53.8077140Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:10:03.8614622Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:10:13.9438805Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:10:24.0015664Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:10:34.0601261Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:10:44.1201041Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:10:54.1826966Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:11:04.2538091Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:11:14.3385817Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:11:24.3927960Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:11:34.4611704Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:11:44.5277491Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:11:54.5927946Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:12:04.6715006Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:12:14.7412140Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:12:24.8137052Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:12:34.8707487Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:12:44.9422325Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:12:55.0129476Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:13:05.1284906Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:13:15.1900203Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:13:25.2565799Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:13:35.3280345Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:13:45.3982751Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:13:55.4603385Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:14:05.5207280Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:14:15.5857792Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:14:25.6530083Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:14:35.7347753Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:14:45.7941659Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:14:55.8551101Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:15:05.9238471Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:15:15.9829484Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:15:26.0513261Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:15:36.1212279Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:15:46.2300557Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:15:56.2810072Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:16:06.3525471Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:16:16.4174982Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:16:26.4911422Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:16:36.5562109Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:16:46.6349393Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:16:56.6933076Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:17:06.7679881Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:17:16.8282799Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:17:26.8957535Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:17:36.9561716Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:17:47.0226277Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:17:57.0822145Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:18:07.1718473Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:18:17.2482416Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:18:27.3100487Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:18:37.3705919Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:18:47.4270207Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:18:57.4878769Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:19:07.5784610Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:19:17.6583487Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:19:27.7184931Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:19:37.7861986Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:19:47.8453393Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:19:57.9135570Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:20:07.9783979Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:20:18.0400239Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:20:28.1168838Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:20:38.1722693Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:20:48.2345722Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:20:58.2978591Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:21:08.3585618Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:21:18.4180230Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:21:28.4809123Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:21:38.5409894Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:21:48.6067102Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:21:58.6745500Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:22:08.7298142Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:22:18.8020461Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:22:28.8787059Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:22:38.9554949Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:22:49.0238237Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:22:59.0795040Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:23:09.1508546Z DistributedTests: Test run '3439' is in 'InProgress' state. 2019-10-02T15:23:19.2118167Z DistributedTests: Test run '3439' is in 'Aborted' state. 2019-10-02T15:23:29.2214050Z ##[warning]DistributedTests: Test run is aborted. Logging details of the run logs. 2019-10-02T15:23:29.2370197Z ##[warning]DistributedTests: New test run created. 2019-10-02T15:23:29.2370197Z Test Run queued for Project Collection Build Service (EnterpriseA). 2019-10-02T15:23:29.2370197Z 2019-10-02T15:23:29.2370197Z ##[warning]DistributedTests: Test discovery started. 2019-10-02T15:23:29.2370197Z ##[warning]DistributedTests: UnExpected error occured during test execution. Try again. 2019-10-02T15:23:29.2370197Z ##[warning]DistributedTests: Error : Some tests could not run because all test agents of this testrun were unreachable for long time. Ensure that all testagents are able to communicate with the server and retry again. 2019-10-02T15:23:29.2370197Z 2019-10-02T15:23:29.2370197Z ##[warning]DistributedTests: Test run aborted. Test run id: 3439 2019-10-02T15:23:29.2370197Z ##[error]System.Exception: The test run was aborted, failing the task. 2019-10-02T15:23:29.2838927Z ##[error]PowerShell script completed with 1 errors. A: This is a known issue for Run Functional test task. A single test run timed out cause that test run aborted, finally fail the task. We have fixed this issue and it's available in TFS 2018 Update 1 and VSTS. We are asking folks to move to the VsTest v2 task that is capable of parallel execution both in release and build. For more detail info you could refer below two similar questions: Run Functional Tests: The test run was aborted, failing the task Release: Run Functional Tests Task Issue: The test run was aborted, failing the task - DistributedTests: Test run timed out According to your tag, seems you are still working on TFS2017. Unfortunately, there isn't any better workaround expect reattempt as you pointed out in question. Suggest you upgrade to TFS 2018 and use 2.x or higher Visual Studio Test task instead. Run Functional test task is deprecated in Azure Pipelines and TFS 2018 and later. Use version 2.x or higher of the Visual Studio Test task together with jobs to run unit and functional tests on the universal agent. Hope this helps.
{ "pile_set_name": "StackExchange" }
Geographical variation in admissions due to poisoning in Sri Lanka: a time series analysis. To carry out time series analyses of hospital admissions for poisoning between 1995-2008 in all districts in Sri Lanka to identify trends and geographical variations in the substances used in poisoning. Data of hospital admissions from 1995-2008 due to poisoning were obtained from the Annual Health Bulletins published by the Ministry of Health. Data were converted to annual rates per 100,000 population. Time trends in the rates of suicide and self-poisoning were calculated using univariate time series analysis. All districts except Kilinochchi and Mullaitivu showed an increase in the rates of admissions due to poisoning with drugs, medicaments and biological substances. Colombo, Hambantota, Kalutara and Anuradhapura showed an exponential increase. Hambantota, Monaragala, Nuwara Eliya and Colombo show an increase in the rate of admissions after pesticide poisoning. All other districts showed a linear decrease. Admissions due to all types of poisoning showed a negative trend in Anuradhapura, Polonnaruwa, Ampara, Matale and Batticoloa districts. Other districts show a positive trend in the rate of admissions for all types of poisoning. Results should be viewed with caution because they are based on analysis of secondary data. Although the rate of suicides has reduced since 1995, admissions due to self poisoning have increased in almost all districts. While pesticide poisoning is becoming less, there is a gradual shift to the use of drugs and medicaments in self poisoning. Poisoning with drugs, medicaments and biological substances are increasing both in urban and rural areas.
{ "pile_set_name": "PubMed Abstracts" }
Volatile anesthetics decrease calcium content of isolated myocytes. The calcium transient of myocytes was measured using a fluorescent dye, Fura-2. Caffeine, halothane, enflurane, and isoflurane increased the resting calcium level and decreased the calcium transient. The amount of caffeine-induced calcium release was suppressed if myocytes were pretreated with halothane. The amount of halothane-induced calcium release was suppressed if myocytes were pretreated with caffeine. Both halothane and caffeine were found to have similar effects on the sarcoplasmic reticulum (SR). The effect of 4 mM halothane (equivalent to 13.6% v/v) was approximately equivalent to that of 10 mM caffeine. Caffeine, halothane, enflurane, and isoflurane all decreased the total calcium content of myocytes by 10-70%. These data suggest that volatile anesthetics decrease the calcium content of the cardiac SR by increasing the calcium permeability of the SR, and that the mechanism of action of volatile anesthetics may be similar to certain actions of caffeine.
{ "pile_set_name": "PubMed Abstracts" }
A versatile label-free electrochemical biosensor for circulating tumor DNA based on dual enzyme assisted multiple amplification strategy. A versatile label-free electrochemical biosensor based on dual enzyme assisted multiple amplification strategy was developed for ultrasensitive detection of circulating tumor DNA (ctDNA). The biosensor consists of a triple-helix molecular switch (THMS) as molecular recognition and signal transduction probe, ribonuclease HII (RNase HII) and terminal deoxynucleotidyl transferase (TdT) as dual enzyme assisted multiple amplification accelerator. The presence of target ctDNA could open THMS and trigger RNase HII-assisted homogenous target recycling amplification to produce substantial signal transduction probe (STP). The released STP hybridized with the capture probe immobilized on a gold electrode, then TdT and assistant probe were further employed to fulfill TdT-mediated cascade extension and generate stable DNA dendritic nanostructures. The electroactive methyl blue (MB) was finally used as the signal reporter to realize the multiple electrochemical amplification ctDNA detection as the amount of MB is positively correlated with the target ctDNA. Combined with the efficient recognition capacity of the designed THMS and the excellent multiple amplification ability of RNase HII and TdT, the constructed sensing platform could detect KRAS G12DM with a wide detection range from 0.01 fM to 1 pM, and the limit of detection as low as 2.4 aM. Besides, the platform is capable of detecting ctDNA in biological fluid such as plasma. More importantly, by substituting the loop of THMS with different sequences, this strategy could be conveniently expanded into the detection of other ctDNA, showing promising potential applications in clinical cancer screening and prognosis.
{ "pile_set_name": "PubMed Abstracts" }
Their original rationale for intervention has long been exposed as another lie. Remember that President Obama initially involved the US military in Iraq and Syria to "prevent genocide" of the Yazidis and promised the operation would not drift into US "boots on the ground." That was three years ago and the US military became steadily more involved while Congress continued to dodge its Constitutional obligations. The US even built military bases in Syria despite having no permission to do so! Imagine if Syria started building military bases here in the US against our wishes. After six years of war the Syrian government has nearly defeated ISIS and al-Qaeda and the US-backed "moderates" turned out to be either Islamist extremists or Kurdish soldiers for hire. According to a recent report, the US has shipped two billion dollars worth of weapons to fighters in Syria via eastern Europe. Much of these weapons ended up in the hands of ISIS directly, or indirectly through "moderates" taking their weapons with them while joining ISIS or al-Qaeda.
{ "pile_set_name": "Pile-CC" }
M Deepika (17) married a 25-year-old man, one of her relatives living in her neighbourhood in Gerahalli village near Magadi. But it did not go down well with her father as the two families were not on good terms. So he hatched a murder plan to eliminate his own daughter and at the same time punish his son-in-law. The shocking incident happened on Sunday when Deepika—a second pre-university student at Kutagal Government PU College—was fast asleep. Her father Mahadevaiah smothered her using a pillow and shifted her body to the bathroom in her husband S Aswath’s house. Magadi police station circle inspector H Ravi told DNA that the incident happened around 1am at the girl’s residence. But the incident came to light only at daybreak when Aswath’s father Shivanna went to the bathroom. He immediately called up the police. Mahadevaiah tried to put the blame on Aswath’s family and alleged that one of them had murdered her. The police, however, grew suspicious over his behaviour and took him to custody. During interrogation he confessed that he had murdered his daughter for marrying Aswath against his wish. Police said that despite family rivalry, Deepika was having an affair with Aswath for the past few years. Mahadevaiah had warned his daughter against the affair, but she was defiant. In June, Deepika and Aswath tied the knot at Sri Anjaneya Swamy Temple in Kengal on Mysore Road, without their parents’ knowledge. But later the villagers came to know of it, which created a sensation. The villagers then held a compromise meeting between the families. At the meeting it was decided that the couple would stay separately for now, but will get married once Deepika becomes 18. Mahadevaiah, however, was not happy with this decision and decided to eliminate her. On Sunday, he pretended as if he was concerned about his daughter’s disappearance, but capitulated during police interrogation. The Magadi police said they have also arrested Aswath for marrying a minor. “We have registered a case against Aswath too,” an investigating officer said. Karnataka State Commission For Women president C Manjula and officials visited the village and directed the police to register a case against Aswath.Manjula told DNA that the girl’s family was upset after the marriage. The villagers tried to resolve the issue by convincing both the families to get the couple married again. They also organised a Tamoola exchange programme, but Aswath was absent. He also chided his parents for accepting Tamoola from Deepika’s parents. This had further frustrated the girl’s family, she said, calling the police to investigate into the issue.
{ "pile_set_name": "OpenWebText2" }
With the increase of gambling at gaming venues has come increased competition between gaming venues to obtain a larger share of the total gambling spend. Gaming venue operators have therefore continuously looked for new variations and types of games in order to attract both new and return customers to their venues. In response to this need, suppliers of gaming devices and systems have attempted to provide the sought after variety, while still developing games that comply with the relevant regulations in the jurisdiction of the gaming venue operator. Suppliers of gaming devices therefore are faced with restrictions on the types of games and gaming apparatus that are allowable, both in terms of the prevailing regulations and in terms of providing a return on investment to the gaming venue operators. In addition, it is important that a player be able to understand the operation of a game quickly so that the player can start to quickly play the game and therefore extract maximum entertainment from the game. One method that has been used with gaming machines is to offer a progressive prize. The progressive prize is contributed to through gaming activity on the gaming machine, for example by taking a percentage of all wagers placed on the gaming machine. The progressive prize is awarded on the occurrence of a progressive prize winning event. Various methods of contribution to a progressive prize and determination of when the progressive prize has been awarded have been developed. A problem with progressive prizes is finding an appropriate method of determining how to award the progressive prize. Taking the example of a gaming machine that implements a spinning reel game, if the progressive prize winning event is the spinning up of a particular combination of symbols on a pay line that has been purchased through the placing of a wager in the form of a number of credits, then this combination can be expected to occur with the same frequency no matter how many credits are wagered on that outcome. For other winning combinations of a pay line, the award may be multiplied by the amount of credits that were wagered on that pay line. However, multiplication of a progressive prize in this manner is not viable. The result is that the contribution to the expected return to player of the progressive prize is higher for players that only wager a single credit per pay line than for players that wager multiple credits per pay line. An ongoing problem faced in the field is how to develop new ways of offering progressive prizes that adequately address variations in the expected return to player.
{ "pile_set_name": "USPTO Backgrounds" }
Mikhail Shchennikov Mikhail Anatolyevich Shchennikov (, born 24 December 1967 in Sverdlovsk) is a Russian race walker. He was born in Sverdlovsk. His son Georgi Shchennikov is a professional footballer for PFC CSKA Moscow. Achievements External links Category:1967 births Category:Living people Category:Soviet male racewalkers Category:Russian male racewalkers Category:Sportspeople from Yekaterinburg Category:Olympic athletes of the Soviet Union Category:Olympic athletes of the Unified Team Category:Olympic athletes of Russia Category:Olympic silver medalists for Russia Category:Olympic silver medalists in athletics (track and field) Category:Athletes (track and field) at the 1988 Summer Olympics Category:Athletes (track and field) at the 1992 Summer Olympics Category:Athletes (track and field) at the 1996 Summer Olympics Category:Medalists at the 1996 Summer Olympics Category:World Athletics Championships athletes for the Soviet Union Category:World Athletics Championships athletes for Russia Category:World Athletics Championships medalists Category:European Athletics Championships medalists Category:World record setters in athletics (track and field) Category:IAAF world indoor record holders Category:Goodwill Games medalists in athletics
{ "pile_set_name": "Wikipedia (en)" }
Q: Network Transparent Boolean Logic Evaluator Write an expression evaluator for boolean expressions encoded as JSON. Read on for explanation and rules. Motivation: Consider a scenario where two agents (Alice and Bob) are communicating with each other under the following constraints: All communication must be done as valid JSON strings (no JSONP or extensions), because Bob and Alice love JSON. They have had problems with character encoding in the past, so they have decided to restrict themselves to ASCII. Alice needs Bob to notify her in case a certain condition is met, but: Bob doesn't know what the condition is in advance. Alice can't evaluate the condition herself because it requires information that only Bob has. The status of the variables can change rapidly enough (and the network is slow enough) that it would be infeasible for Bob to continuously transmit the data to Alice. Neither knows anything about the implementation of the other agent (for example, they can't make assumptions about the implementation language of the other agent). Alice and Bob have worked out a protocol to help them complete their task. Representing Conditional Expressions: They have agreed to represent Boolean literals by strings, for example "foo" or "!bar", where ! represents the negation of a literal, and valid names contain only letters and numbers (case sensitive, any strictly positive length; "" and "!" are not valid; i.e. a literal is a string whose contents match the regex /^!?[a-zA-Z0-9]+$/). Expressions are only transmitted in negation normal form. This means that only literals can be negated, not subexpressions. Expressions are normalized as a conjunction of disjunctions of conjunctions of disjunctions ... etc encoded as nested arrays of strings. This needs a bit more explanation, so... Expression Syntax: Consider the following boolean expression: (¬a ∧ b ∧ (c ∨ ¬d ∨ e ∨ ¬f) ∧ (c ∨ (d ∧ (f ∨ ¬e)))) Notice that the entire expression is contained in parentheses. Also notice that the first level(and all odd levels) contains only conjunctions(∧), the second level(and all even levels) contains only disjunctions(∨). Also notice that no subexpression is negated. Anyway meat and potatoes... This would be represented by Alice in JSON as: ["!a","b",["c","!d","e","!f"],["c",["d",["f","!e"]]]] Another example: ((a ∨ b ∨ c)) Becomes: [["a","b","c"]] In summary: [] are interpreted as parentheses, literals are wrapped in "",! means negation, and , means AND or OR depending on nesting depth. NB: the empty conjunction (the result of ANDing no variables) is true, and the empty disjunction (the result of ORing no variables) is false. They are both valid boolean expressions. Bob's data: Bob's data is emitted by a program on his computer as a simple JSON object as key-value pairs, where the key is the name of the variable, and the value is either true or false. For example: {"a":false,"b":true,"c":false} Bob needs our help! Bob has little programming experience, and he's in over his head. He has handed you the task. You need to write a program that accepts the JSON text that Alice sent along with the JSON text for Bob's data, and evaluates the expression with those values, returning true or false (the actual strings true and false; Bob and Alice love JSON, remember?) Bob says less is more, so he wants you to make your source code as short as possible (this is a code-golf) You are allowed to use an external library to parse the JSON text, but this is the only exception. Only standard library functionality is allowed. Note that the JSON is accepted and returned as a string. There is no requirement to explicitly parse it though, if you can get it to always work without doing so. If Alice uses a variable that Bob doesn't know, assume it is false. Bob's data may contain variables that Alice doesn't use. If Alice's or Bob's JSON Object contains an invalid literal, or the JSON is invalid, or it contains a non ASCII character, then your program must return null Some test cases(in JSON): [ {"alice":"[\"\"]","bob":"{}","result":"null"}, {"alice":"[\"!\"]","bob":"{}","result":"null"}, {"alice":"[\"0\"]","bob":"{\"0\":true}","result":"true"}, {"alice":"[]","bob":"{}","result":"true"}, {"alice":"[[]]","bob":"{}","result":"false"}, {"alice":"[\"a>\"]","bob":"{\"a\":true}","result":"null"}, {"alice":"[\"0\"]","bob":"{}","result":"false"}, {"alice":"[\"0\"]","bob":"","result":"null"}, {"alice":"[\"1\"]","bob":"{\"1\":false}","result":"false"}, {"alice":"[\"true\"]","bob":"{\"true\":false}","result":"false"}, {"alice":"[\"foo\",\"bar\",\"baz\"]","bob":"{\"foo\":true,\"bar\":true,\"biz\":true}","result":"false"}, {"alice":"[[[\"a\",[\"!b\",\"c\"],\"!c\"],\"d\"]]","bob":"{\"a\":true,\"b\":false,\"c\":true,\"d\":false}","result":"false"}, {"alice":"[\"!a\",\"b\",[\"c\",\"!d\",\"e\",\"!f\"],[\"c\",[\"d\",[\"f\",\"!e\"]]]]","bob":"{\"a\":false,\"b\":true,\"c\":true,\"e\":true,\"f\":false}","result":"true"} ] As can be seen from the test cases, input and output are strings that are correctly parseable JSON. The empty string test case for bob was originally in error, the correct value to return is null, but if it saves you characters to return false, then that is also acceptable. I added cases for the empty clauses to make that explicit. I added another 2 test cases in response to a bug I found in someone's implementation A: ECMASCript 6 variation, 213 194 190 189 192 166 chars try{P=_=>JSON.parse(prompt()) B=P() f=(a,c)=>a[c?'some':'every'](v=>v.big?[B][+/\W|_/.test(s=v.slice(C=v[0]=='!'))-!s][s]^C:f(v,!c)) q=f(P())}catch(_){q=null}alert(q) Note: takes Bob's input first, and then Alice's input. This saves us four bytes. Checks for syntactically valid JSON since JSON.parse throws if it isn't. Since we're already relying on the try-catch for the above, we (ab)use out-of-bounds access to trigger our "failed validation" path when validating the (possibly negated) literals This is accomplished with the [B][...][s] part (thanks, @l4m2! used to use a slightly more verbose construction) The -!s is to catch "" and "!" as invalid literals The C variable holds the "should negate" state, which is accomplished with a "bitwise" XOR (and relies on implicit type coercion) ES5 solution: https://codegolf.stackexchange.com/revisions/19863/8 A: Ruby, 335 (327?) characters begin;a,b=*$<;require'json';b=JSON[b];q if a=~/{|}/||!a[?[]||b.any?{|v,x|v=~/[\W_]/||x!=!!x} l=0;a.gsub!(/\[|\]/){"[{}]"[($&==?]?2:0)+l=1-l]};a.gsub!(/"(!)?([a-z\d]+)"/i){b[$2]^$1} 0 while [[/\[[#{f=!1},\s]*\]/,f],[/{[#{t=!f},\s]*?}/,t],[/\[[\w,\s]*\]/,t],[/{[\w,\s]*}/,f]].any?{|k,v|a.sub!(k){v}} rescue a=??;end;puts a=~/\W/?"null":a I've heard you can't parse HTML with Regex, but I've never been told you cannot parse JSON this way, so I tried. Alice's input is separated from Bob's input by a newline; also, it's assumed that neither input contains newlines itself. This assumption is for I/O purposes only, and is not used later. If I can make an extra assumption that Alice's input contains no whitespace, we can drop 8 characters by removing all \s's on line #3. If we can only assume it contains no whitespace but spaces, we can still replace \s's with the space characters to save 4 characters. A: Python 3 (429) Longer than the other answers, but arguably the most readable so far... :) import json,sys,re r,p,m='^!?[a-zA-Z\d]+$',print,re.match def g(a,b,s): if type(a)is str: if m(r,a): try:return('not '+str(b[a[1:]]))if a[0]=='!'else str(b[a]) except:return'False' raise Exception return'('+((' and 'if s else' or ').join(g(x,b,not s)for x in a))+')' s,j=sys.argv,json.loads try: a,b = j(s[1]),j(s[2]or'{}'); if all(m(r,x)and x[0]!='!'for x in b):p(str(eval(g(a,b,1))).lower()) except: p('null')
{ "pile_set_name": "StackExchange" }
Am i the only one around here Who prefers original sunchips over harvest cheddar? 341 shares
{ "pile_set_name": "OpenWebText2" }
Etsy, the e-commerce platform for handmade goods, is acquiring music gear marketplace Reverb for $275 million in cash. The site, which sells new, used, and vintage musical instruments and accessories, will continue to operate as a standalone business. The two companies have a natural connection to each other, with Etsy CEO Josh Silverman describing Reverb “as the ‘Etsy’ of musical instruments.” Reverb CEO David Kalt also credited Etsy with giving him the confidence to launch his own marketplace. Kalt, a former guitar store owner, started the site in 2013 to create a place where musicians could buy and sell instruments from each other. Kalt will step down from the CEO position after the acquisition closes, which is expected in the third or fourth quarter of 2019. Etsy has made a similar acquisition in the past, buying French marketplace A Little Market in 2014, only to shut it down in 2017 amid Etsy’s layoffs and leadership changes. Since going public in 2015, Etsy’s most recent acquisition was in 2016 for Blackbird Technologies, an AI startup that developed algorithms to help with the site’s search functionalities.
{ "pile_set_name": "OpenWebText2" }
e factors of 78874130? 2, 5, 19, 23, 18049 List the prime factors of 23954998. 2, 137, 87427 List the prime factors of 3070590064. 2, 29, 139, 47609 What are the prime factors of 4237457267? 4237457267 What are the prime factors of 59013154? 2, 17, 1735681 What are the prime factors of 574243828? 2, 109, 157, 8389 What are the prime factors of 2425950005? 5, 485190001 List the prime factors of 906652545. 3, 5, 19, 3181237 List the prime factors of 3921111198. 2, 3, 31, 191, 36791 List the prime factors of 52644201. 3, 17548067 What are the prime factors of 9013676473? 9013676473 List the prime factors of 1318055390. 2, 5, 17, 887, 8741 List the prime factors of 104401570. 2, 5, 7, 13, 47, 2441 What are the prime factors of 960359852? 2, 17, 14122939 What are the prime factors of 31392224? 2, 41, 71, 337 What are the prime factors of 1826037602? 2, 913018801 What are the prime factors of 331199931? 3, 23, 4799999 List the prime factors of 280306722. 2, 3, 71, 619, 1063 What are the prime factors of 1206958947? 3, 402319649 What are the prime factors of 209976518? 2, 61, 1297, 1327 List the prime factors of 2273703127. 53, 42900059 What are the prime factors of 21631026? 2, 3, 41, 87931 What are the prime factors of 153634139? 153634139 What are the prime factors of 803658047? 1979, 406093 List the prime factors of 65172622. 2, 19, 821, 2089 What are the prime factors of 374948878? 2, 73, 269, 9547 List the prime factors of 32769225. 3, 5, 43, 1129 List the prime factors of 415998833. 41, 47, 61, 3539 What are the prime factors of 138475248? 2, 3, 2884901 What are the prime factors of 19086? 2, 3, 3181 List the prime factors of 350406115. 5, 109, 642947 List the prime factors of 361544460. 2, 3, 5, 6025741 List the prime factors of 1147977212. 2, 1579, 181757 List the prime factors of 116387584. 2, 43, 97, 109 What are the prime factors of 48274902? 2, 3, 13, 206303 List the prime factors of 67457995. 5, 11, 89, 13781 List the prime factors of 1821295702. 2, 43, 21177857 What are the prime factors of 156891860? 2, 5, 7844593 List the prime factors of 1011050431. 1223, 826697 List the prime factors of 6413174602. 2, 3206587301 What are the prime factors of 6643841313? 3, 1511, 1465661 What are the prime factors of 3425775399? 3, 8753, 43487 What are the prime factors of 119630431? 119630431 What are the prime factors of 150996446? 2, 29, 727, 3581 List the prime factors of 236847947. 7, 719, 47059 What are the prime factors of 429329705? 5, 7, 677, 18119 List the prime factors of 326160345. 3, 5, 7, 787, 3947 List the prime factors of 131106603. 3, 1433, 30497 What are the prime factors of 271334847? 3, 7, 31, 416797 What are the prime factors of 791202965? 5, 7, 313, 72223 List the prime factors of 353810093. 7, 13, 3888023 List the prime factors of 7461237908. 2, 19, 7177, 13679 What are the prime factors of 46773130? 2, 5, 4677313 List the prime factors of 4378868273. 13, 1129, 298349 What are the prime factors of 1078852139? 97, 11122187 List the prime factors of 852530786. 2, 7621, 55933 What are the prime factors of 37571664? 2, 3, 13, 19, 3169 What are the prime factors of 6036187290? 2, 3, 5, 7, 61, 471209 List the prime factors of 33131932. 2, 31, 267193 List the prime factors of 125505988. 2, 31376497 List the prime factors of 1360753611. 3, 7, 64797791 What are the prime factors of 44137294? 2, 22068647 List the prime factors of 228789626. 2, 13, 8799601 List the prime factors of 472647013. 43, 10991791 What are the prime factors of 3880596141? 3, 143725783 What are the prime factors of 648514481? 107, 911, 6653 What are the prime factors of 44799341? 37, 1210793 What are the prime factors of 118021947? 3, 23, 73, 23431 List the prime factors of 2948845275. 3, 5, 13105979 What are the prime factors of 3774356963? 13, 290335151 List the prime factors of 2941749929. 31, 94895159 List the prime factors of 51408182. 2, 7, 3672013 List the prime factors of 5074889697. 3, 37, 359, 42451 What are the prime factors of 161456679? 3, 229, 26113 What are the prime factors of 37669843? 37669843 List the prime factors of 49103374. 2, 24551687 What are the prime factors of 251258752? 2, 1962959 What are the prime factors of 353650271? 13, 4217, 6451 What are the prime factors of 2278758765? 3, 5, 151917251 What are the prime factors of 3564925315? 5, 7, 101855009 What are the prime factors of 5332247999? 13, 17, 24127819 List the prime factors of 80533948. 2, 11, 23, 79579 List the prime factors of 21001583. 1879, 11177 What are the prime factors of 59824607? 59824607 List the prime factors of 54854103. 3, 23, 71, 11197 What are the prime factors of 152058390? 2, 3, 5, 11, 197, 2339 List the prime factors of 74002121. 74002121 List the prime factors of 36441399. 3, 31, 83, 4721 List the prime factors of 1547021442. 2, 3, 257836907 What are the prime factors of 84324186? 2, 3, 1561559 List the prime factors of 31120177. 11, 2829107 What are the prime factors of 21872555? 5, 4374511 List the prime factors of 3412723054. 2, 13, 79, 271, 6131 What are the prime factors of 694767954? 2, 3, 115794659 List the prime factors of 494338675. 5, 19, 97, 10729 List the prime factors of 155807099. 7, 1063, 20939 What are the prime factors of 2290040850? 2, 3, 5, 15266939 List the prime factors of 1702484548. 2, 1283, 331739 List the prime factors of 37465864. 2, 67, 69899 What are the prime factors of 643811793? 3, 214603931 What are the prime factors of 625873159? 41, 149, 102451 List the prime factors of 1821929465. 5, 401, 569, 1597 What are the prime factors of 31585533? 3, 7, 1504073 What are the prime factors of 1960375484? 2, 490093871 What are the prime factors of 41906686? 2, 743, 28201 List the prime factors of 121371825. 3, 5, 1618291 List the prime factors of 1071209110. 2, 5, 269, 398219 List the prime factors of 17673683. 23, 307, 2503 List the prime factors of 6038917656. 2, 3, 251621569 What are the prime factors of 70108904? 2, 8763613 What are the prime factors of 101549377? 9887, 10271 What are the prime factors of 166687020? 2, 3, 5, 131, 7069 What are the prime factors of 20518026? 2, 3, 1063, 3217 List the prime factors of 923806060. 2, 5, 2207, 20929 What are the prime factors of 745995554? 2, 37, 67, 379, 397 List the prime factors of 14947280. 2, 5, 186841 List the prime factors of 1561982793. 3, 7, 359, 207187 What are the prime factors of 761776597? 41, 193, 96269 List the prime factors of 1855663531. 25747, 72073 List the prime factors of 1091274239. 11, 239, 443, 937 What are the prime factors of 422735184? 2, 3, 839, 3499 List the prime factors of 48795091. 229, 213079 List the prime factors of 107462040. 2, 3, 5, 7, 127931 What are the prime factors of 957956899? 37, 233, 111119 What are the prime factors of 219630333? 3, 13, 193, 29179 List the prime factors of 1347398872. 2, 179, 940921 What are the prime factors of 53944375? 5, 86311 List the prime factors of 492502943. 492502943 List the prime factors of 430380980. 2, 5, 43, 500443 List the prime factors of 2245485583. 11, 47, 4343299 List the prime factors of 627236480. 2, 5, 13, 75389 List the prime factors of 7447800. 2, 3, 5, 12413 What are the prime factors of 207495156? 2, 3, 11, 142903 List the prime factors of 1603368802. 2, 7, 114526343 What are the prime factors of 139644972? 2, 3, 293, 1471 List the prime factors of 2480673242. 2, 919, 983, 1373 List the prime factors of 3558998909. 17, 23, 401, 22699 List the prime factors of 865184385. 3, 5, 13, 1753, 2531 List the prime factors of 7968234. 2, 3, 127, 10457 List the prime factors of 25652464. 2, 1603279 List the prime factors of 3649183716. 2, 3, 181, 1680103 List the prime factors of 1662656183. 24071, 69073 What are the prime factors of 2060506691? 71, 29021221 What are the prime factors of 337847069? 7, 17, 23, 53, 137 List the prime factors of 13126601. 17, 37, 41, 509 List the prime factors of 1607247093. 3, 61, 71, 123701 What are the prime factors of 784473627? 3, 7, 23, 1624169 What are the prime factors of 110050626? 2, 3, 7, 2620253 What are the prime factors of 156683770? 2, 5, 15668377 What are the prime factors of 75317395? 5, 17, 331, 2677 What are the prime factors of 108698470? 2, 5, 79, 137593
{ "pile_set_name": "DM Mathematics" }
Palliative care research: methodological and ethical challenges. Nursing research in palliative care has, to date, been limited. As palliative care is increasingly recognized as a nursing specialty area, it requires the scientific foundation that research provides. Palliative care clients are particularly vulnerable because of the intensity of their illnesses and the emotional impact of impending death. This article identifies and discusses ethical and methodological challenges faced by those conducting research with this population. Suggestions for strategies that may help researchers meet these challenges are included.
{ "pile_set_name": "PubMed Abstracts" }
1. Field of the Invention The invention disclosed here relates generally to remote control of computerized equipment and more specifically to remote control of the power supply of a computer system and/or other electrical devices. 2. DESCRIPTION OF THE RELEVANT ART The advantages of being able to turn on and off the power supply of a computer system located at a remote site are well known. U.S. Pat. No. 4,206,444 "Remote Power Controller Utilizing Communication Lines" issued June 3, 1980 to Ferlan, for example, discusses the advantages of reducing power consumption and the danger of unintended turn-on. The Ferlan disclosure is incorporated herein by reference. According to the Ferlan patent, a comparator is interposed at the remote site between a modem and a gate activated power relay. The comparator scans through incoming serial signals from the modem searching for a predetermined sequence, and when this sequence is detected, the gate controlled relay is turned either on or off to thereby supply electrical power to a computer power unit. A disadvantageous aspect of the Ferlan design is that incoming messages to the modem must be restricted so that the predetermined power turn-on or turn-off sequence is not included when such turn-on or turn-off is not desired. It is possible for binary bit stream to randomly include this sequence, and if such a sequence is randomly generated, an undesirable activation of the power controlling relay may take place. Another disadvantage of the Ferlan design is that the receiving modem at the remote site needs to be closely placed to the power control unit and to the computer which is to be turned on or off. This limits the flexibility of users in being able to move their computer equipment from one location to another within the remote site without having to also move the receiving modem and its adjunctive telephone wires. Other works in the field of remote control which Applicant is aware of include U.S. Pat. No. 4,701,946 "Device for Controlling the Application of Power to a Computer" issued Oct. 20, 1987 to Oliva, et al.; U.S. Pat. No. 4,723,269 "Method and Apparatus for Power-Up of Unattended Computer" issued Feb. 2, 1988 to Summerlin; U.S. Pat. No. 4,647,721 "Telephone Activated Power Controller" issued Mar. 3, 1987 to Busam, et al.; U.S. Pat. No. 4,809,163 "Computer System with Power Control Based on the Operational Status of Terminals" issued Feb. 28, 1989 to Hirosawa, et al.; and U.S. Pat. No. 4,812,963 "Plural Cooking Computer Communication System" issued Mar. 14, 1989 to Albrecht, et al.
{ "pile_set_name": "USPTO Backgrounds" }
1. Field of the Invention This invention relates to an adjustable joint for coupling two segments of a positionable arm. More specifically, this invention relates to a joint for coupling two segments forming a positionable arm that can be fixedly positioned and repeatedly repositioned. 2. Description of Related Art Various types of positionable arms are known. These arms typically use motors or mechanical friction caused by, for example, the tightening of screws or bolts, to maintain the orientation of the arm. Such arms may include a plurality of arm segments connected by adjustable joints, thereby providing multiple degrees of freedom with which to arrange the arm. Positionable arms can be used in any number of applications, such as where a workpiece or tool is attached to the end of the positionable arm and the user must reposition the tool periodically during use. In such an application, it is important that the arm, when positioned, fixedly retain that position during use, while still allowing for relatively easy repositioning when desired. Positionable arms which maintain their positions using friction created between arm members by tightening screws are disadvantageous because in order to reposition the tool, the frictional retaining force must be overcome by the repositioning force applied by the user. This type of apparatus is impractical where the tool being suspended is sufficiently heavy that the downward force caused by the weight of the tool is roughly equivalent to or greater than the force that is applied by the user. Thus, the necessary amount of friction required to prevent movement of the heavily-weighted arm interferes with the user""s ability to easily reposition the tool. Accordingly, there is a need for a positionable arm which can fixedly maintain a position while under load, but is easily repositionable by hand. In accordance with the present invention, an adjustable joint is provided, comprising a first member having an inner surface and an end portion defining a first connector opening, a piston having a first end and a second end, a chamber within the first member defined by the first end of said piston and the inner surface of the first member, a rotatable connector received in the first hollow member between the second end of said piston and the end portion of the first hollow member such that an increased pressure in the chamber urges the piston towards the first connector opening, thereby clamping the rotatable connector between the first connector opening and the second end of said piston, and a pressurized fluid source in fluid communication with the chamber. A spring may be provided in the chamber, said spring providing a force against said piston such that said piston presses against said rotatable connector, thereby providing a frictional resistance to rotation of said rotatable connector. In accordance with another aspect of the present invention, a method for locking and unlocking a joint is provided. This method comprises providing a first member having an inner surface and an end portion defining a first connector opening, a piston in said first member, said piston having a first end and a second end, said first end of said piston and said inner surface of said first hollow member defining a chamber, joining said first member with a second member using a rotatable connector, arranging said rotatable connector in said first member between said second end of said piston and said end portion of said first member, increasing a fluid pressure in said chamber, said increased fluid pressure urging said piston towards said first connector opening, thereby clamping said rotatable connector between said first connector opening and said second end of said piston, and decreasing said fluid pressure in said chamber, thereby decreasing the clamping applied to said rotatable connector by said first connector opening and said second end of said piston.
{ "pile_set_name": "USPTO Backgrounds" }
Three Times Three Times (Chinese: 最好的時光; Zuìhǎo de shíguāng; lit. 'Best of Times') is a 2005 Taiwanese film directed by Hou Hsiao-hsien. It consists of three separate stories of romance, set in different eras, using the same lead actors, Shu Qi and Chang Chen. In "A Time for Love," set in 1966, a soldier (Chang) meets an alluring pool-hall hostess (Shu). "A Time for Freedom," set in 1911, focuses on a courtesan's relationship with a freedom fighter during the Japanese occupation of Taiwan. In "A Time for Youth," set in 2005, a singer forsakes her female lover for a photographer with whom she's having an affair. The film was nominated for the Palme d'Or at the 2005 Cannes Film Festival, won the Golden Apricot for Best Feature Film at the 2006 Yerevan International Film Festival, and received positive reviews. In 2017 The New York Times listed it as one of the 25 best films of the 21st century. It has been praised for its topical themes of communication, romance and relationships, with each linked symbolically to the era it takes place in. Plot A Time for Love (Chinese: 戀愛夢; pinyin: liàn ài mèng) Set in Kaohsiung in 1966 (the year of the Cultural Revolution in mainland China and consequently a time of great freedom in Taiwan) with dialogue in Taiwanese Hokkien, the first story follows a young soldier, Chen, who is awaiting deployment to his station, and his encounter with a young woman, May, who works in a poolhall. Chen and May meet while playing pool together and often exchange glances while trying to remain discreet about their mutual attraction. As May begins to close the hall for the night, Chen promises to write to her before departing and she is flattered. Three months later, May receives a letter from Chen in which he writes that he hopes to see her soon. After working at the poolhall for a few months, she decides to return to Chiayi, where she had previously worked. One day, while off duty, Chen gets a chance to visit the Kaohsiung poolhall only to discover that May no longer works there. He begins to follow her trail, finally tracking her down at a different pool hall in Huwei. They spend some time together before heading to the train station so that he may return to his post, but arrive too late, missing the departure. She suggests they wait for the next bus and as they stand at the stop, he takes her hand and they huddle together underneath their umbrella. A Time for Freedom (Chinese: 自由夢; pinyin: zì yóu mèng) Set in Dadaocheng in 1911 (when Taiwan was occupied by the Japanese), with dialogue presented only through on-screen titles (as in a silent film), the second segment follows a singing courtesan living in a brothel who wants to be freed by becoming a concubine to Mr. Chang, a customer whose occupation as a traveling writer and political freedom fighter keeps him away for months at a time. When he visits her, he often shares stories of his travels and she sings to him (the only times we hear a voice during the segment). Despite being fond of her, he denies her the opportunity of freedom because he disagrees with the system of concubinage and is overcommitted to the political cause of fighting the Japanese through diplomacy. When her younger sister, Ah Mei, who also works as a courtesan, is impregnated by a customer who can't afford to buy her out, Mr. Chang decides to help buy the younger sister's freedom. After being bought, Ah Mei goes to speak with her sister and they say their farewells. One month later, Mr. Chang returns to the brothel to visit the courtesan. She tells him that she has been asked by her Madame to remain until Ah Mei's position is replaced and hopefully glances at him. Mr. Chang doesn't respond. A few days later, the new courtesan is brought in and speaks with her. She asks her age; the girl says she is ten. After Ah Mei comes to visit, the courtesan asks Mr. Chang if he has any plans to make her his concubine. He remains silent and she begins to cry. Three months later, the courtesan listens to the new girl's singing lessons when she receives a letter from Mr. Chang. In it, he writes of a poem that reflects on the sorrow that may befall Taiwan after being liberated by its captors. After reading the poem, the courtesan wipes her tears away. A Time for Youth (Chinese: 青春夢; pinyin: qīng chūn mèng) Set in Taipei in 2005, with dialogue in Mandarin, the third segment begins with Jing, an epileptic club singer in a lesbian relationship, who has a sexual encounter with a photographer, Zhen, in his apartment and begins an affair. During one of her performances, he comes onstage to photograph her up close, prompting other photographers to follow suit, all while her girlfriend watches from the crowd. After Jing begins to interact with Zhen on stage, his girlfriend (presumably) walks out on the performance. Back at his apartment, Zhen finds Jing's badge with instructions on what to do in case of an epileptic episode. Before he goes to return it, he spots his girlfriend down the street and tries to embrace her, but she rejects his advances. Later, at a club, Jing and her girlfriend argue over Jing's failure to respond to her calls. Jing calms her down with a hug and promises to wait for her to perform. After they arrive at their apartment, Jing receives a text from Zhen to meet the following day so he can give her the photos as well as her misplaced badge. Jing's girlfriend tries to speak with her, but she remains distant. When her girlfriend leaves to bathe, Jing starts writing lyrics inspired by her experience with Zhen. The following morning, Jing works on recording the music to the song she wrote the night before. She meets up with Zhen and asks him to take her to his place, where they continue their affair. Back at the apartment, Jing's girlfriend wakes up to find Jing absent. After finding Jing's phone left behind, she types Jing a message in which she writes that she's tired of waiting to be loved back and that she'll kill herself like Jing's previous girlfriend. Jing returns home and finds the message. She reads it and lies down on the bed. The song she wrote begins to play. We see her riding with Zhen on his motorbike along the freeway. Production Three Times was originally meant to be an omnibus collection of short films, with Hou directing only one of the segments. But the producers were unable to obtain the financing to hire three directors, so Hou took over the whole production. Hou cast Shu Qi for the female lead roles, marking his second collaboration with her, after 2001's Millennium Mambo. For the male lead roles, Hou cast Chang Chen, adding to Chen's list of collaborations with notable Chinese and Taiwanese directors, including Edward Yang, Wong Kar Wai, Ang Lee and Jeffrey Lau. He and Shu reunited with Hou in his 2015 wuxia film The Assassin. The film's Chinese title is best translated as "Our Best Moments", and Hou has said the stories are somewhat inspired by his memories. He has said, "It seems to me that by contrasting love stories from three different times, we can feel how people's behavior is circumscribed by the times and places they live in. [...] I'm pushing sixty, and these things have been hanging around for so long it seems like they're part of me. Maybe the only way I can discharge my debt to them is to film them." Discussing Three Times in an interview for Artificial Eye’s UK DVD edition, Hou said: I feel that every era has its own distinctive sense. These eras will never come again. Time keeps moving forward. One’s environment and one’s thoughts keep changing as well. They’ll never come again. It’s not that they’re good times, it’s because we’re recalling them that we call them good times. It has been reported that there was not enough time for the actors to learn their dialogue for the second segment, so Hou chose to use inter-titles instead. Critical reception Three Times received generally positive reviews when it was released in North America. It holds an 86% approval rating on Rotten Tomatoes. Most critics agreed that the opening segment, A Time for Love (which is often likened to the works of Wong Kar-Wai), was the most successful, and that the final segment, A Time for Youth (which was compared to Hou's 2001 film Millennium Mambo) was the least. Response to the second segment, A Time for Freedom, was mixed, with many critics comparing it to Hou's 1997 film Flowers of Shanghai. Roger Ebert, who championed the film at Cannes, gave it four stars out of four in his review for the Chicago Sun-Times:"Three stories about a man and a woman, all three using the same actors. Three years: 1966, 1911, 2005. Three varieties of love: unfulfilled, mercenary, meaningless. All photographed with such visual beauty that watching the movie is like holding your breath so the butterfly won’t stir." Kay Weissberg in Variety wrote:"Synthesizing Hou Hsiao-hsien's ambivalent relationship with time and memory, Three Times forms a handy connecting arc between the Taiwanese helmer's earlier work and the increasingly fragmentary direction of his recent films. Best appreciated by those familiar with his slow rhythms and pessimistic take on contempo life, pic presents three stories using the same leads set in three time periods to explore love and how the present circumscribes lives." Stephen Whitty of the Star-Ledger wrote:"According to one American critic, Three Times is 'why cinema exists.' Only if you think that cinema has no higher calling than presenting a long series of gorgeously lit close-ups of beautiful actresses are you likely to agree." Independent filmmaker Jim Jarmusch wrote: "Hou Hsiao-hsien is not only the crowning jewel of contemporary Taiwanese cinema, but an international treasure. His films are, for me, among the most inspiring of the past thirty years, and his grace and subtlety as a filmmaker remain unrivaled. Film after film, Hou Hsiao-hsien is able to adeptly balance a historical and cultural overview with the smallest, most quiet and intimate details of individual interactions. His narratives can appear offhand and non-dramatic, and yet the structures of the films themselves are all about storytelling and the beauty of its variations. And Hou's camera placement is never less than exquisite. His newest film, THREE TIMES, is also his newest masterpiece. A trilogy of three love stories, Chang Chen and Shu Qi beautifully portray Taiwanese lovers in three distinct time periods: 1966, 1911 and 2005. The first section (in 1966), just on its own, is one of the most perfect pieces of cinema I’ve ever seen. The second, set in a brothel in 1911, remarkably explores dialogue and verbal exchange by almost completely eliminating sound itself (!), while the final piece leaves us in present-day Taipei—a city of rapidly changing social and physical landscapes where technology has a harsh effect on delicate interpersonal communication. The resonance of these combined stories, their differences and similarities, their quietness and seeming simplicity, left me in a near dream-state—something that only happens to me after the most striking cinematic experiences. Now, for the first time, one of Hou Hsiao-hsien's films is finally being properly released (by IFC) in the U.S. And this makes me, as a true fan, very, very happy." Box office & Distribution Three Times was released in the United States on April 26, 2006, and was only the second of Hou's films to receive theatrical distribution in the USA (the first was Millennium Mambo). In its opening weekend on three screens, it grossed $14,197 ($4,732 per screen). Never playing at more than five theaters at any point during its theatrical run, it eventually grossed $151,922. The film was released on a region 1 DVD in the United States by IFC Films in 2006. It is also available on digital for rent and for purchase on Amazon Prime Video. Awards and nominations 2005 Cannes Film Festival Nominated: Palme d'Or 2005 Golden Horse Awards Won: Best Taiwanese Film of the Year Won: Best Actress (Shu Qi) Won: Best Taiwanese Filmmaker (Hou Hsiao-hsien) Nominated: Best Actor (Chang Chen) Nominated: Best Art Direction Nominated: Best Cinematography Nominated: Best Director Nominated: Best Editing Nominated: Best Makeup and Costume Design Nominated: Best Picture Nominated: Best Original Screenplay 2005 Hong Kong Film Awards Nominated: Best Asian Film (Taiwan) 2006 Yerevan International Film Festival Won: Golden Apricot - Best Film References External links Three Times at Cannes FF Category:2005 films Category:Taiwanese films Category:Mandarin-language films Category:Films directed by Hou Hsiao-hsien Category:Chinese romantic drama films Category:Chinese films Category:Films set in 1911 Category:Films set in 1966 Category:Films set in 2005 Category:Films with screenplays by Chu T’ien-wen
{ "pile_set_name": "Wikipedia (en)" }
SAN FRANCISCO -- The head of BART's Board of Directors on Wednesday denounced an attempt by the transit agency's chief spokesman to stock a news conference with riders critical of activists who have staged rush-hour protests in downtown San Francisco stations. The spokesman, Linton Johnson, sent an e-mail to BART colleagues hours before a planned protest Aug. 11 in which he outlined a strategy to win over public opinion by showcasing "loyal riders" at a news conference. The riders were to say that protesters were putting their safety at risk. Johnson planned for two sport utility vehicles to bring 10 to 15 riders to the news conference at the Powell Street Station in San Francisco, where they would read from scripts that the spokesman wrote. The scripted statement concluded, "We riders demand an immediate end to these illegal acts that make us late and put our lives at risk." The e-mail was first reported by the Bay Citizen online newspaper Tuesday. On Wednesday, board President Bob Franklin said that Johnson's plan had been unnecessary and that only one rider contacted by BART had actually appeared at the news conference. The Chronicle did not quote the man, and Franklin said other news outlets had not, either. "It was inappropriate for him, or anyone, to provide talking points to passengers," Franklin said of Johnson. "It wasn't genuine, and there was no need for it. BART doesn't have to do that." Although the SUVs were never used to shuttle riders to the news conference, renting the vehicles for four hours still cost BART $872, Franklin said. Johnson, a former TV news reporter, has been out on personal leave since Aug. 22. Attempts to reach him Wednesday were unsuccessful. More for you News Linton Johnson is no longer BART's spokesman Franklin said he was not aware of any other attempts by the BART spokesman to steer riders toward news cameras and coach them on what to say. "I think the intent was to show some context," Franklin said. "There were a couple dozen protesters and 350,000 riders. Some are not good in front of the camera, so I think he was trying to provide some focus. ... But it's not genuine, and we don't think it's a good idea." Johnson has been at the center of several controversies since the near-weekly protests began in July, following the fatal shooting of a 45-year-old transient, Charles Blair Hill, by a BART police officer. BART police say Hill was winding up to throw a knife at an officer at the Civic Center Station when the officer shot him. BART called the Aug. 11 news conference in reaction to a planned protest that did not happen. BART cut off wireless service in the downtown stations that evening to prevent activists from coordinating their movements, an idea that Johnson later said had been his. Free-speech activists denounced the action, and BART has not repeated it at subsequent protests. Franklin said Johnson had also erred when he defended the idea by declaring that riders' free-speech rights end at the fare gates. "I think at the time, Linton began taking some of this personally," Franklin said. "He made a series of errors in a limited amount of time." Franklin said Johnson's bosses would discuss the e-mail after the spokesman returns from his leave Monday. "We can have a proactive approach not to do this again," Franklin said - "acknowledging it and taking corrective steps, and moving on."
{ "pile_set_name": "OpenWebText2" }
Q: How to query a constexpr std::tuple at compile time? In C++0x, one can create a constexpr std::tuple, e.g. like #include <tuple> constexpr int i = 10; constexpr float f = 2.4f; constexpr double d = -10.4; constexpr std::tuple<int, float, double> tup(i, f, d); One also can query a std::tuple at runtime, e.g. via int i2 = std::get<0>(tup); But it is not possible to query it at compile time, e.g., constexpr int i2 = std::get<0>(tup); will throw a compilation error (at least with the latest g++ snapshot 2011-02-19). Is there any other way to query a constexpr std::tuple at compile time? And if not, is there a conceptual reason why one is not supposed to query it? (I am aware of avoiding using std::tuple, e.g., by using boost::mpl or boost::fusion instead, but somehow it sounds wrong not to use the tuple class in the new standard...). By the way, does anybody know why constexpr std::tuple<int, float, double> tup(i, f, d); compiles fine, but constexpr std::tuple<int, float, double> tup(10, 2.4f, -10.4); not? Thanks a lot in advance! - lars A: std::get is not marked constexpr, so you cannot use it to retrieve the values from a tuple in a constexpr context, even if that tuple is itself constexpr. Unfortunately, the implementation of std::tuple is opaque, so you cannot write your own accessors either.
{ "pile_set_name": "StackExchange" }
HPLC quantification of kaempferol-3-O-gentiobioside in Cassia alata. Kaempferol-3-O-gentiobioside, the major flavonoid glycoside in Indonesian Cassia alata was quantified in various parts of the plant. The mature leaf was found to contain the highest content of this metabolite. A decrease of the flavonoid content in the juvenile leaf during the period of October through December was also observed. The contents ranged from 2.0 to 5.0% and 1.0 to 4.0% in mature and juvenile leaves, respectively. The other parts studied were flower (sepal and petal), rachis, stem and seed. Kaempferol-3-O-gentiobioside was not detected in the seed.
{ "pile_set_name": "PubMed Abstracts" }
Subtitling reviews: Availability: (unknown) Film information Story: Triple bill of children's features. In 'Jumanji' (1995), young Judy and Peter Shepherd (Kirsten Dunst and Bradley Pierce) discover the board game Jumanji in their new house. But when they begin to play they release wild animals along with Alan Parrish (Robin Williams), a grown man who has been trapped inside the game since he was 12 years old. Together they must seek out Alan's friend Sarah (Bonnie Hunt) and re-enter the game to win. In doing so they have to face elephants, lions, and the big game hunter Van Pelt (Jonathan Hyde). 'Monster House' (2006) is an animated spinetingler featuring the voices of Steve Buscemi, Nick Cannon, Maggie Gyllenhaal and Kevin James. DJ Harvard (voice of Mitchel Musso) lives directly across the street from a most unusual house. A malevolent entity that longs to feed on the energy of the living, the once peaceful house that looms ominously outside of DJ's bedroom window would like nothing more than the chance to feast on the children of the neighbourhood. As Hallowe'en begins to draw near and the children of the neighbourhood prepare for another long night of trick-or-treating, it appears as if it may be the house that is in for the biggest treat of all. In 'Small Soldiers' (1998), Alan Abernathy (Gregory Smith) is working at his father's toy store when he receives a sample of two new ranges of action figures: the Gorgonites, a race of peaceable aliens; and the Commando Elite, a tough bunch of war-ready soldiers. However, when Alan takes them home, the figures come to life and begin to engage each other in a furious running battle, with the Commando Elite transforming ordinary household implements into deadly weapons as they wage war against their alien foe. When Alan realises what is going on, he joins ranks with the Gorgonites and starts to draw up plans to bring an end to the commando threat.
{ "pile_set_name": "Pile-CC" }
Stability of citrate, PVP, and PEG coated silver nanoparticles in ecotoxicology media. Silver nanoparticles (AgNPs) are present in the environment and a number of ecotoxicology studies have shown that AgNPs might be highly toxic. Nevertheless, there are little data on their stability in toxicology media. This is an important issue as such dynamic changes affect exposure dose and the nature of the toxicant studied and have a direct impact on all (eco)toxicology data. In this study, monodisperse citrate, PVP, and PEG coated AgNPs with a core size of approximately 10 nm were synthesized and characterized; their behavior was examined in standard OECD media used for Daphnia sp. acute and chronic tests (in the absence of Daphnia). Surface plasmon resonance, size, aggregation, and shape were monitored over 21 days, comparable to a chronic exposure period. Charge stabilized particles (citrate) were more unstable than sterically stabilized particles. Replacement of chloride in the media (due to concerns over chloride-silver interactions) with either nitrate or sulfate resulted in increased shape and dissolution changes. PVP-stabilized NPs in a 10-fold diluted OECD media (chloride present) were found to be the most stable, with only small losses in total concentration over 21 days, and no shape, aggregation, or dissolution changes observed and are recommended for exposure studies.
{ "pile_set_name": "PubMed Abstracts" }
Aberrant seizure-induced neurogenesis in experimental temporal lobe epilepsy. Neurogenesis in the hippocampal dentate gyrus persists throughout life and is increased by seizures. The dentate granule cell (DGC) layer is often abnormal in human and experimental temporal lobe epilepsy, with dispersion of the layer and the appearance of ectopic granule neurons in the hilus. We tested the hypothesis that these abnormalities result from aberrant DGC neurogenesis after seizure-induced injury. Bromodeoxyuridine labeling, in situ hybridization, and immunohistochemistry were used to identify proliferating progenitors and mature DGCs in the adult rat pilocarpine temporal lobe epilepsy model. We also examined dentate gyri from epileptic human hippocampal surgical specimens. Prox-1 immunohistochemistry and pulse-chase bromodeoxyuridine labeling showed that progenitors migrate aberrantly to the hilus and molecular layer after prolonged seizures and differentiate into ectopic DGCs in rat. Neuroblast marker expression indicated the delayed appearance of chainlike progenitor cell formations extending into the hilus and molecular layer, suggesting that seizures alter migratory behavior of DGC precursors. Ectopic putative DGCs also were found in the hilus and molecular layer of epileptic human dentate gyrus. These findings indicate that seizure-induced abnormalities of neuroblast migration lead to abnormal integration of newborn DGCs in the epileptic adult hippocampus, and implicate aberrant neurogenesis in the development or progression of recurrent seizures.
{ "pile_set_name": "PubMed Abstracts" }
The present disclosure relates to an image signal processing device and method for performing interpolation of pixel signals of three primary colors output from an imaging device including a color filter of a Bayer array. A pixel signal of each of three primary colors output from an imaging device including a color filter of a Bayer array is only one of pixel signals of R (red), G (green) and B (blue) per pixel. Pixel signals of two colors other than a pixel which is output as a pixel signal among three pixels are required to be produced by interpolation processing. Processing for producing pixel signals which are not output as pixel signals by interpolation processing is called demosaicing. An example of the easiest method of demosaicing is a bilinear method for performing linear interpolation using pixel signals of peripheral colors which are the same as a color to be produced by interpolation. However, the interpolation processing by the bilinear method is not used in general because the method has the disadvantages of, for example, causing false colors at edges of images because of incorrect interpolation and causing great deterioration in resolution. There is known an adaptive color plane interpolation (ACPI) method commonly used for resolving the disadvantages of the bilinear method. The ACPI method is used for performing interpolation of a pixel signal with reference to pixel signals of colors different from a color to be produced by the interpolation. U.S. Pat. No. 5,629,734 (Patent Literature 1) discloses interpolation processing by the ACPI method. Japanese Unexamined Patent Application Publication No. 2012-099903 (Patent Literature 2) discloses interpolation processing by a method obtained by improving the ACPI method.
{ "pile_set_name": "USPTO Backgrounds" }