text
stringlengths
0
3.78M
meta
dict
Ahna O'Reilly Cannes Interview About James Franco | Video Ahna O'Reilly has not one, but two projects at the Cannes Film Festival this year, and we sat down with the actress to talk about this extraordinary experience, the reception to her two movies, and what it was like to work with her ex-boyfriend James Franco as a director. First up for Ahna was Fruitvale Station, which was coming off huge Sundance success before subsequently being picked up by The Weinstein Company. Ahna spoked about reuniting with good friend Octavia Spencer for their surreal Cannes Palais moment. Ahna also revealed how much she doubted that James Franco actually wanted her to star in his adaptation of As I Lay Dying and discussed who, between the two of them, was more nervous for their big premiere. Check our chat, and keep your eye out for lots more from Ahna O'Reilly.
{ "pile_set_name": "Pile-CC" }
info: x-logo: url: 'https://avatars3.githubusercontent.com/u/12212444?v=4&s=200' backgroundColor: '#FFFFFF' x-apisguru-categories: - open_data
{ "pile_set_name": "Github" }
Q: Are Velomobiles street legal in the UK? I saw a question about velomobiles and recumbent bikes and I was wondering if they were street legal in the UK? Can you ride one on a cycle path or would you have to stick to roads? A: References: Bikehub - Cycling and the Law, Traffic Signs Regulations and General Directions 1994, Road Vehicles Lighting Regulations 1989 A velomobile or recumbent bike is covered by the same law as regular bicycles: "pedal cycle" means a unicycle, bicycle, tricycle, or cycle having four or more wheels, not being in any case mechanically propelled unless it is an electrically assisted pedal cycle of such class as is to be treated as not being a motor vehicle So it's legal to use to ride one on the road in the UK. Cycle paths are a bit more complicated as some legislation refers to "bicycles" and some to "pedal cycles", so it would depend on how many wheels you've got and what type of cycle path / cycle lane / cycle track you wanted to use. If you want to use a velomobile or recumbent bike on the road between sunset and sunrise then you may have problems. To be legal you'd need 2 pedal reflectors on each pedal and these have to be clearly visible from the front and rear. The design of most velomobiles and recumbent bikes do not meet this requirement. This law is rarely (if ever) enforced, I think your main worry on this point is if you were involved in an accident then the other party might try to use your lack of reflectors to show negligence. Note - If your velomobile or recumbent bike is electrically powered then there are additional regulations that must be complied with, but I think that's beyond the scope of the question.
{ "pile_set_name": "StackExchange" }
Diwata (song) "Diwata" ("Fairy") is a song by Filipino rapper Abra featuring Chito Miranda, frontman of the Filipino rock band Parokya ni Edgar. The single released in early 2014, and the music video was released on December 31, 2014, via YouTube. "Diwata" is the second hit song from Abra after "Gayuma" in 2012. Music video The music video features Abra and General Luna vocalist Nicole Asencio (granddaughter of late Vice-President Salvador Laurel). Abra plays a college student who is frequently bullied by his schoolmates, which then he meets Asensio. Later on, Abra befriends Asencio and develops feelings for her. This caused Abra to be bullied furthermore. At the end of the video, Asencio reveals herself to be a fairy or diwata to Abra. That was also the reason why Abra was always bullied; Other people could not see Asencio, thus making him look crazy and like he was interacting with a ghost. Chito Miranda also appears in the music video and plays multiple parts, such as a security guard, teacher, cafeteria staff, and a jeepney driver. Cast Abra (protagonist) Chito Miranda (multiple roles) Nicole Asencio (leading lady/as diwata) Marlon "Loonie" Peroramas (as schoolmate) Ron Henley (as schoolmate) Adrian "Manny Paksiw" Sereño (as basketball coach) Reception Diwata was the Number 1 OPM charts for 2014, especially on Brgy. LS 97.1. On its music video release, it was Number 1 on the MYX Hit Chart. References Category:2014 singles Category:Philippine hip hop songs Category:2014 songs
{ "pile_set_name": "Wikipedia (en)" }
lok-sabha-elections Updated: Apr 05, 2019 08:08 IST In the late 1980s and early 1990s, when the Ram temple movement started gathering momentum, religion had become the leitmotif of politics in eastern Uttar Pradesh. People from the region travelled in droves to Ayodhya, the epicentre of the temple movement, to pay homage at what Hindus believe is the birthplace of the warrior-god Ram. What was remarkable was that despite being home to a sizeable Muslim population, the region wasn’t religiously polarised. The impact of the temple movement, and communal polarisation that ensued, was greater in western UP. First came the 1987 communal violence in Meerut’s Maliyana that left an estimated 350 people dead. The communal feelings that kept simmering beneath the surface exploded again in 2013 in Muzaffarnagar, claiming more than 60 lives. The warring sides were Jats and Muslims. Eastern Uttar Pradesh, in contrast, was calm. Traditionally, eastern and western Uttar Pradesh have been vastly different in terms of their political temperaments, demography and the economy. The success of the Green Revolution in the region in the 1960s brought prosperity to western Uttar Pradesh, where the land, too, is more fertile and land holdings are larger than in the east. As the two regions prepare for the April-May general elections, local factors will again play a key role in how they vote, forcing political parties to customise their campaigns in the two regions. The three Cs — cane, caste and communal polarisation — will decide which way the electoral wind blows in the west. In the east, caste, personality and national issues will be key. To be sure, if there’s one common theme, it’s that of national security, which is at the core of Prime Minister Narendra Modi’s and the Bharatiya Janata Party’s campaign after the February 14 Pulwama terror attack and the February 26 air strike on a terrorist camp in Pakistan’s Balakot by the Indian Air Force. Every party in the elections has its pockets of influence in the west. If Agra is called Bhim Nagari (after Dalit icon Bhimrao Ambedkar) because of the concentration of Dalits, the main support base of the Bahujan Samaj Party (BSP),the Samajwadi Party’s Yadav and Muslim vote bank is also spread across the western belt. Even Ajit Singh’s Rashtriya Lok Dal has influence in Jat-dominated Meerut and Baghpat. Vishwa Hindu Parishad leader Manoj ji (that’s how he is known), from the Saharanpur division, said: “National interest and decisive leadership are the two prime poll issues in 2019. As for the temple, we have decided to do 13 crore ‘jaaps’ (chanting of mantras) on April 6, 2019.” April 6 marks the start of the Hindu festival of Navratri. Putting farmers upfront The Green Revolution brought prosperity to the west. Most politicians in the region tend to come from the farming community, and their issues have traditionally dominated electoral politics. Former prime minister, the late Jat leader Chaudhary Charan Singh, not only brought farmers’ issues to the forefront of electoral politics but also united the different castes using the issues. His son and grandson, Ajit Singh and Jayant Chaudhary, have followed the legacy, focusing their electoral politics on farmers’ issues, besides caste. The consolidation of so-called backward classes started in western UP much before the issue of caste-based quotas in government jobs and educational institutions flared in the late 1980s. According to Jagat Singh, a farmer in Meerut, who has observed the politics of the state since the days of Charan Singh, sugarcane is the lifeblood of the region. In the words of farmers’ leader Choudhury Diwakar, the 5.3 million sugarecane growers of the region influence the outcome of elections, from the local ward level to the Lok Sabha. The scenario started changing in the 1990s, when western UP it became a lab for the BJP to reinforce its Ram temple campaign. The BSP’s Dalit movement, too, struck a chord first in the west. BSP leader Mayawati won her first Lok Sabha election from the region’s Bijnore in 1989. Dalit activist Satish Prakash says, “Dalits are economically and socially strong in west UP, which has now become a centre of the Dalit movement.” While the BSP is aspiring for Dalit-Muslim unity to sail through the choppy waters of western UP, its alliance partner SP is eyeing Yadav-Muslim consolidation in the Yadav belt. Demographically, the Dalits, especially the Jatavs (Mayawati’s caste) and Jats, and Muslims, dominate the region although Yadavs, Gujjars and Vaishyas make up sizeable numbers. Hindutva It was in 2014 that chief minister Yogi Adityanath was first deployed in western UP for campaigning. Prior to that, Adityanath had concentrated on Purvanchal. His Hindutva politics paid dividends as the BJP won 71 of the 80 Lok Sabha seats in Uttar Pradesh in the 2014 Lok Sabha elections, and came to power in the state in 2017. Diwaker says the electoral outcome this time around would depend on the candidates fielded by the SP-BSP alliance as well as the Congress. “It will be advantage BJP if Congress fields strong candidates (to cut into the votes of the alliance). However, the election in many of the constituencies will be on Hindu-Muslim lines though the candidate’s caste would also decide the behaviour of voters,” he added. As for the Muslims, their first preference is the SP, the second is the candidate most capable of defeating the BJP and the third a Muslim. In such a scenario, the Congress will have to push hard to make its mark in the region. Neither the caste factor nor the communal polarisation is going to help the party that had won three seats in the west, 10 in central UP, one in Bundelkhand and seven in the east in the 2009 polls, when its tally of 21 was its best performance in UP since the early 1990s. Now, the East! Eastern UP has sent six prime ministers to the Lok Sabha — Jawaharlal Nehru, Lal Bahadur Shastri, Indira Gandhi, Rajiv Gandhi, Chandra Shekhar and Narendra Modi — but remains the most backward region of the state. Somehow, it hasn’t been able to reap its share of the dividend of economic development and punches below its weight when it comes to influencing electoral outcomes. Anjana Prakash, who was in the past associated with the SP and the Poorvanchal Banao Samiti, said: “Though it is the most backward area of UP, people largely vote for national issues, personality and their ideology. Caste remains the main ingredient in electoral politics across UP.” Interestingly it is the East that has the maximum number of political heavyweights in the fray —Prime Minister Narendra Modi ( Varanasi), Congress president Rahul Gandhi (Amethi), United Progressive Alliance chairperson Sonia Gandhi (Rae Bareli) and former UP chief minister Akhilesh Yadav (Azamgarh) are among the candidates fighting for election to the Lok Sabha from the region. Demographically, the area is dominated by upper castes and backward classes with Muslims, Yadavs and Dalits having a say in small pockets. Farmers, with small land holdings, have little say in the electoral politics of the region. That is why their issues hardly figure in elections. Vinod Chand Dubey of Allahabad, who hails from western UP and worked closely with socialist leader Ram Manohar Lohia and later SP patriarch Mulayam Singh Yadav, said: ‘While the politics of dharnas (sit-ins) and demonstrations run in the east, the west, which has a large farming community, avoids brawls. They are development-oriented.” Political expert KC Rana, from Agra, recalls how a demonstration call given by Charan Singh to protest the infamous Maya Tyagi rape case (1980) of Baghpat had drawn bigger participation from the east than the west. Which way will they vote? Partly because of the increasing penetration of mobile handsets in rural areas, some sections of the eastern and western regions of Uttar Pradesh have started voting uniformly, as was visible in the elections of 2012, 2014 and 2017. Since the 2014 polls, social media has been a major tool of campaigning in elections. Before the 2012 assembly polls, the mufti of Muzaffarnagar Zulfiqar Ali had said lyrically, “Jo hawa purab ke kheton khaliyanon se chali hai wo ab ganne ke kheton tak pahunch gayi hai” (The wind that started blowing from the agricultural fields of the east has now reached the cane fields of western UP.) What will happen this time around? Will the east and west find common factors to unite on electorally? Experts say it happens only when the elections are swept by a 2014 or 2017-like political wave in favour of the BJP. Otherwise, while the west will vote on communal lines and on farmers’ issues, personalities and castes will hold sway in the east. What could blur the divide is nationalism, if it continues to dominate the political narrative until the voter steps into the polling booth.
{ "pile_set_name": "OpenWebText2" }
Q: Is it possible to export all the command line output to a file without manually redirecting via > symbol? I have a python (2.7) script that has various print statements and other things. Now, I want to export the entire command-line output to a file. As most people know, this is very easy to do manually using the below command: script.py > file.txt But I want to make > file.txt also as a part of my python script itself instead of having to redirect manually every time the script is run. I tried using the with command but it only exports a specific object out into a file but not all the print statements, dataframes, and etc. Is there a way to achieve this? I'm not well-versed in unix or python. Can someone please help me with some ideas? Thanks in advance. A: you can use the sys module and add the following line at the begin of your code: import sys sys.stdout = open('file.txt', 'w')
{ "pile_set_name": "StackExchange" }
g**2 - 9*g + 22. Let m be l(3). Solve -3*r = -m*r + 5 for r. 5 Let g(r) = r + 6. Let v be g(4). Solve 0 = 5*l - 0*l - v for l. 2 Let d = -164 + 167. Solve q = 5 - d for q. 2 Suppose -2*s - 4*x + 30 = 0, -3*x + 23 = 5*s - 17. Solve d - s = 2*d for d. -5 Suppose 2*k = 7*k + 20. Let h be (9/(-3))/(3/k). Solve -h*u + 4 = -8 for u. 3 Suppose -361 - 44 = -15*u. Let y = u - 22. Solve y*r + 3 - 13 = 0 for r. 2 Suppose 30 = t - 7*t. Let h be (-60)/(-3)*t/(-20). Solve -2*y + y - h = 0 for y. -5 Let n = -342 - -389. Solve -6 = -n*x + 45*x for x. 3 Let z = 69 - 7. Suppose 14*l - z = 36. Solve 5*k + l = -8 for k. -3 Suppose -5*o - 2 = -7, -4*b + 143 = 3*o. Solve -2*d - b = 5*d for d. -5 Let a(l) be the second derivative of l**5/20 - 5*l**4/12 + l**3/6 - 2*l**2 - 7*l. Let m be a(5). Solve -2*u = -u + m for u. -1 Let o = -138 - -143. Solve -44 = o*g - 34 for g. -2 Let h be 3 + -6 - -3 - (-7 + 2). Solve 0 = -h*n - 8 + 18 for n. 2 Let o(h) = -h**2 - h - 1. Let c(n) = -3*n**2 + 2*n - 14. Let z(r) = c(r) - 4*o(r). Let j be z(-8). Solve 6 = 3*l - j for l. 4 Let x = 275 + -210. Solve 12*s + s + x = 0 for s. -5 Let l = -8 - -9. Suppose 0 = k + l - 7. Suppose -3*a = 5*h - 6 + 21, 2*a - 3*h - 9 = 0. Solve k = 2*y - a for y. 3 Let v(d) = 8*d - 77. Let a(p) = p - 2. Let s(h) = 4*a(h) - v(h). Let g be s(16). Solve -9*b + g = -8*b for b. 5 Let p = -38 - -42. Suppose -p*f + 10 = -2*f. Solve -10 + 35 = f*s for s. 5 Suppose 14*z - 17*z - 15 = 0. Let y(k) = k + 3. Let t(x) = x + 2. Let b(a) = -2*t(a) + 3*y(a). Let j be b(z). Solve r - 3 - 2 = j for r. 5 Suppose -5*i = -15 - 10. Suppose i*x + 0*x = 20. Solve -2*q - x = -q for q. -4 Suppose 2*s - 14 = -0. Let x(c) = -c**2 + 7*c + 7. Let r be x(s). Let h(w) = -2*w - 1. Let b be h(-8). Solve -2*j + r*j = b for j. 3 Let s(h) = -h**3 + 2*h**2 - 7*h. Let g be s(0). Let o be (1 - 3)*5/(-2). Solve g = 3*b + o + 4 for b. -3 Let g = -3 + 8. Suppose -g*q = -4*f + 9 - 2, -2*q + 5 = f. Solve -2*c = f + 3 for c. -3 Suppose 14 = -4*f - 18. Let g be (-2 - -5) + (-48)/f. Solve -5*p = -g + 24 for p. -3 Let h = -210 - -212. Solve h = -5*r + 27 for r. 5 Let a(l) = l**2 + 4*l - 2. Let t be a(-5). Solve -3 = -t*u + 6 for u. 3 Let o(k) = -k**2 + 6*k + 1. Let j be o(5). Let z = -1388 + 1388. Solve 5*g + j + 4 = z for g. -2 Let a be (-72)/12 + 12 - (4 + -1). Suppose 5*f - 29 = -2*v, -31 = -5*v - 5*f + 4. Solve v - a = -b for b. 1 Let r be 28/4 + (-4 - 1). Solve -3*p + r = -7 for p. 3 Let k(d) = 2*d + 40. Let t be k(-14). Solve 2 = -2*y + t for y. 5 Suppose t - 16 = -t. Let l be 23/5 - 2 - (-6)/15. Solve -l*f + 5*f = t for f. 4 Let g(x) = 4*x**2 + 7*x + 2. Let a(q) = -7*q**2 - 14*q - 4. Let k(t) = -3*a(t) - 5*g(t). Let w = -5 + -2. Let n be k(w). Solve s = -1 - n for s. -3 Let g be (0 + -1)/(1/2). Let s be (-2 + (-3)/g)*0. Solve -x + 5 = -s for x. 5 Let h be 1/((-2 - -1)/7). Let o = h + 31. Let p(y) = y**2 + y - 26. Let q be p(5). Solve -8 = -q*x - o for x. -4 Let h(t) be the second derivative of 7*t**6/360 - t**5/120 + t**3/3 - 3*t. Let b(m) be the second derivative of h(m). Let u be b(1). Solve 0 = u*g - 2*g for g. 0 Let r(c) = -c**2 + 6*c - 6. Suppose -2*k + z = -3*k + 1, 0 = k + 4*z + 8. Let h be r(k). Solve 1 + 3 = h*n for n. 2 Let o be 35/3 - (-100)/75. Solve -5*l = 7 + o for l. -4 Let l(c) = c**2 - 22*c + 122. Let g be l(12). Solve 0 = a - g + 2 for a. 0 Let i = 2437 + -2437. Solve i = 11*s - 68 + 13 for s. 5 Let i(t) = t**3 - 7*t**2 + t - 5. Let q be i(7). Suppose -q*y = 2, -3*y + 4 = 2*d + 1. Solve 5 = 2*j + d for j. 1 Let n be (80 - -2 - -1)*1. Let w = -81 + n. Solve a - w*a = 5 for a. -5 Let q be (-12)/(-16)*175/15*4. Solve 0 = 73*i - 80*i + q for i. 5 Let c be (-15)/(2 + -5) + (1 - 1). Suppose 2*u - 14 = -4*q + u, 2*u = 4*q - 8. Solve -c*r - 2 = q for r. -1 Suppose 8*f - 192 = 2*f. Let y = -32 + f. Solve y = m + 2 - 4 for m. 2 Suppose 3*u = -5*b - 3, -2*u - 3*b - 3 = -2. Let c(g) = 0*g**2 - 3 + 2*g + g**2 + u*g. Let i be c(-7). Solve -i*v + 9 = -v for v. 3 Let b = 19 - 16. Suppose 20 = 3*w - 5*p, -b*w + 4 + 14 = -3*p. Solve -3*f + 10 = -w*f for f. -5 Let x(v) = -21*v. Let t be x(1). Let i be -3*(24/t - (-2)/14). Solve i*y = 4*y for y. 0 Let s(u) be the second derivative of u**3/6 + 31*u**2/2 + 8*u - 1. Let c be s(-27). Solve -21 = c*q - 1 for q. -5 Suppose -4*t = 4*o - 8, 0 = -5*t - 4*o - 34 + 48. Solve -8*z + 34 + t = 0 for z. 5 Suppose 0 = -218*f - 119*f + 538 + 2832. Suppose -2*q + 4 = -0. Suppose 20 = -q*u + 6*u. Solve -f = u*p + 10 for p. -4 Suppose -2*q = -0*q - 20. Suppose 5*p - q = 0, -n + 7 = 4*p - 11. Suppose -35 = 5*g - 7*g - 5*c, -2*c = -g - 5. Solve g*z + 0*z + n = 0 for z. -2 Let c be (76/171)/((-10)/(-585)). Solve 2*p - 18 = -c for p. -4 Let y be (-27)/(-15)*(-90)/(-27). Solve -4 = y*r - 4 for r. 0 Let m = 7 + -9. Let s be (m/4)/((-4)/24). Let p = -12 + 18. Solve s*q + 6 = p*q for q. 2 Suppose -7*i - 406 = -77. Let p be (-2)/5 - i/5 - 0. Solve 0 = -2*u + 5*u + p for u. -3 Suppose -3*w - 4*d = 6, 13 = -0*w + 2*w - 3*d. Let l = 4 - 2. Solve 4 = l*j + w for j. 1 Let w be -2*-7*(-1)/(-2). Solve 13*k - w*k = 6 for k. 1 Let l(v) = -v**2 + 8*v - 2. Let f be l(7). Let o(z) = z**2 + 8*z. Let y(a) = a**2 - 12*a + 3. Let x be y(11). Let r be o(x). Solve r = -2*p + 1 + f for p. 3 Let z(r) = 9*r - 6. Suppose 5*q = 3*q + 16. Let g(f) = -3*f + 2. Let u(o) = q*g(o) + 3*z(o). Let p be u(4). Solve -l - l = p for l. -5 Let t(d) = -d**2 + d + 42. Let c be t(6). Suppose c = 20*j - 16*j. Solve 0 = 5*y - j*y - 6 for y. 3 Suppose -99 + 3 = -12*k. Solve 0 = -11*m + 7*m - k for m. -2 Let b = 1193 - 1188. Solve b*c - 13 = -8*c for c. 1 Let b = -48 + -6. Let z = 61 + b. Suppose -3*g + 9 = 2*o, 2*o + 12 = -g + 5*g. Solve 5*i + 27 - z = o for i. -4 Suppose 5*w = 18*w + 4*w. Solve -q - 7*q + 24 = w for q. 3 Let i(q) be the third derivative of q**4/24 + q**3/2 - 15*q**2. Let g be i(-3). Suppose -5*x + m = -20, g = -5*m + 23 + 2. Solve 0 = x*d - d + 20 for d. -5 Let z(f) = 4*f + 3. Let s be z(4). Suppose -2*r = -27 - s. Let g be (24/75)/(1/(-5))*-5. Solve -r = -3*w - g for w. 5 Let g be 18/(-33) - (3 + 980/(-22)). Solve -7 = -12*o + g for o. 4 Let p be (2/(-12))/1 - (-3)/18. Solve p = -22*x + 4*x - 18 for x. -1 Let v(o) = -o**3 + 3*o**2 - 2*o. Let q be v(2). Suppose 5*x + 3*d = d - 22, q = -4*d - 4. Let p be ((-3)/6)/(x/32). Solve 0 = p*w - 7 - 9 for w. 4 Let p(w) = 14*w - 460. Let o be p(33). Solve -15*f - o = -16*f for f. 2 Suppose 2*u = -d - 37, 5*d = -0*u - u - 41. Let x be 1*u*(-4)/8. Suppose x - 3 = c. Solve 0 = c*r - 4 + 9 for r. -1 Let l = 218 - 213. Solve -14 - 6 = -l*r for r. 4 Let s be ((1 + -1)/(-2))/1. Let k(z) = -14*z - 448. Let j be k(-32). Solve i + s + 4 = j for i. -4 Let a = -2 + 6. Suppose 6 = -a*d + 26. Suppose 2*k - 4*v + 3 + 7 = 0, -16 = -k - d*v. Solve 3*u - 13 + k = 0 for u. 4 Suppose 0*j = 4*j - 2*n - 44, -5*n = 3*j - 59. Solve -j*t + 4*t = 9 for t. -1 Let b be 4*(0 - 3/3). Let o(j) = 6*j**2 + 3*j + 1. Let q(r) = 5*r**2 + 3*r. Let k(w) = -4*o(w) + 5*q(w). Let n be k(b). Solve 12 = -n*a + 3*a for a. 4 Suppose 11*z - 44 = 286. Solve -25*a + z*a - 15 = 0 for a. 3 Suppose k - 26 = -5*p, 5*k - 3*p - 48 = 110. Let a = k - 16. Suppose y - 84 = -78. Solve -a = -b + y*b for b. -3 Let r(b) = -b**3 + 3*b**2 + b + 2. Let u be r(3). Suppose -10 = -3*h + h - 3*j, u*j = 2*h - 26. Suppose q - h = -3*q. Solve q*m - 2 = 4 for m. 3 Suppose -158 + 74 = -3*d. Solve d = 4*l + 12 for l. 4 Let l(n) = -2*n**3 + 10*n**2 + 3. Let s be l(5). Let c(j) be the second derivative of j**4/12 - j**3/2 + j**2 - 2*j. Let r be c(s). Solve r*i = 5*i - 3 for i. 1 Suppose 15*b + 140 = 29*b. Solve 0*k - 30 = b*k for k. -3 Let w(q) = -2*q**3 - 5*q**2 + 5*q - 13. Let b be w(-4). Solve -b*p + 6 = -12*p for p. 2 Let s be 3/(-1) + 4 + -1. Let c(a) = 0*a + 0 + 1 + a + s*a. Let y be c(6). Solve b + y = 2 for b. -5 Let x = 98 + -96. Suppose v - 5*g = 0, 0*g = v - x*g. Solve v = u - 3*u for u. 0 Suppose 16 = -7*y + 8*y. Solve 8*a - y*a = 32 for a. -4 Suppose -9*o + 21 - 3 = 0. Solve -8*i + o = -14 for i. 2 Let l(t) = t - 5. Let d be l(11). Suppose -4*f = j + 12, j = d*j - 4*f - 36. Solve 4 = 3*n - j*n for n. -4 Let m(a) = a**3 + 2*a**2 - 24*a + 6. Let n be m(-6). Solve 25 = -r + n*r for r. 5 Let m = 39 + -38. Let t be (1 - -5)*m/2. Solve 0 = 6*h - t*h + 9 for h. -3 Let u be (-
{ "pile_set_name": "DM Mathematics" }
RECENTLY, a reader asked me to define what makes a man attractive. After mulling over the question, I came to a singular conclusion. The answer, to me, seemed obvious. But yet the question was asked and is constantly asked – in literature, advertising, movies, and politics. We’re constantly sold it, told what it is, given new measuring sticks and quotas to meet. And as a result, we’re constantly asking ourselves, in one way or another if we measure up – if we’re good enough. Usually, we’re not. When I set out to start talking about life advice and dating, this was the kind of article I wanted to avoid. I’m sure you’ve seen them before: ‘5 ways to become more attractive’, ‘the 5 traits every woman loves’ – an article where some shithead on the internet tells you how to behave as a man is nothing new – and often, offers advice that does more harm than good. Self-help and personal development are not ubiquitous road maps, but instead journeys – and trying to force someone down your path often just reinforces the fact that they weren’t good enough to find their own way. That’s not a narrative I want to contribute to. But yet, I was asked the question. So I was going to have to try and answer it. And because I’m the enterprising shithead that I am, who desperately wants to avoid any sense of guruhood* – I decided to do something new. Whilst I was certain of my opinion, I’m at least humble enough to realize it comes from just one perspective, specifically a male opinion – one that I wanted to test. So I did something different – I asked every woman I knew for her opinion on that one question: ‘What makes a man attractive?’ And well, the response was overwhelming. The responses came in all shapes and sizes – superficial responses, reasoned responses, emotional responses, responses directed at my own failings (thanks), responses that read like manifestos against exes; there was talk of height, penis size, income, beards, tattoos, and style. Personality traits cropped up, patterns began to show – and slowly, I had the answer. And it wasn’t a good one. WHAT MAKES A MAN ATTRACTIVE? These are the fundamentals as they occurred in all the responses I collected. I’ve listed them in order of the frequency with which they were mentioned, as well as the emphasis placed on their importance. Every response contained, in some way, at least one of these but often contained most, if not all. CONFIDENCE / STRENGTH / ASSERTIVENESS The most common and immediate response. Typically defined as someone who has the certainty of character to follow his conception of himself (morals, values) and pursue his goals. Well defined boundaries and a strong sense of respect, especially self-respect. Eye rolling in its predictability and in my opinion the least understood of all traits. But more on this later. RELIABILITY / TRUSTWORTHY / ACCOUNTABILITY / EMOTIONAL MATURITY / EMPATHY This one was almost tied with confidence. The idea can be distilled down to someone who has a decent emotional understanding of himself, his motivations, his strengths, and weaknesses; and as a result, interacts with the woman from a position of acceptance, equality and chiefly predictability – she knows he’s got her back, and can invest in that trust. Essentially the trait that runs counter to almost the entire body of pick up theory. AMBITION / DRIVE Enormously important. A man who is going places, internally driven towards some kind of goal that he is taking real and practical steps to achieve. That last bit was crucial – he’s actually going after what he wants. Whether or not he’d achieved it was never specified as being necessary, and the word successful was never used. I would distill this down to a lifestyle design or goal that is actively pursued and prioritized. SENSE OF HUMOR / FUNNY / FUN Definition: you can make her laugh. Can come in any form. Goofy, sarcastic, being a dick, being a dork, self-deprecating, one-liners – whatever. It’s about the effect, not the delivery system. INDEPENDENCE This was never specifically mentioned by name but alluded to (almost in every case) in stories of failed relationships. The over-invested boyfriend, the guy who texts too much, who needs to see her every day – in essence, the guy who needs her, rather than the one who wants her. Some women interestingly cited independent men as ones who prioritized their own needs first. The women, in every case, wanted a man who didn’t need her in his life. He wasn’t dependent on her. This is, in effect, neediness. A useful barometer for this is the degree to which you’d be willing to walk away from the relationship. Symbolic examples of this trait in its failed state included men who had very few friends, lived at home and weren’t financially independent (employed). ATTENTIVENESS Paying attention to the details of her personality, and bringing that attention to life in the form of tailored experiences. Examples such as: “never buy me lingerie” to taking her to a Frozen singalong. Investing in her personality rather than applying a one size fits all approach to women. COMPLACENCY The only trait that consistently came up in every form as a negative (even when the question wasn’t asking for negatives) was complacency. It was such a negative, in fact, that its effect can only be described as complete revulsion. This is where the man in some form or another begins to stagnate in life, or perhaps worsen. It is the opposite of ambition. Think of it as instead of drawing things into your life, the flow has halted, or worse – is now flowing the other way. The word ‘provider’ was often used in conjunction here. A complacent man makes for a bad provider – and a bad provider is extremely unattractive. You’ll probably need this too. And ice cream. SOUNDS SIMPLE RIGHT? So by now, I imagine you’ve read through those traits – seen many you expected, perhaps some others you didn’t or gained a fresh perspective on – and now you’re thinking about where you measure up, and where you don’t. But here’s the thing – the traits are not that helpful. I asked the women a simple question ‘what are the fundamental characteristics of the attractive man?’. All of them without exception assumed this referred to a long-term partner. Not a single one assumed I was referring to a short-term hookup. In fact, that was scarcely mentioned, and when it was, the only correlated trait was height (the importance of which was greatly outweighed by the aforementioned traits). Ironically, the majority of these women have at least had one experience of being picked up in a bar or club, by someone they’d never met before. In fact, some of them were picked up by me – and they had no idea as to where I fell on the spectrum of desirable traits, all they could see was some asshole necking vodka. The lesson here being that these traits, whilst attractive – are also contextual, and subject to contradiction; you can still be attractive when none of them are present. That’s the statistical equivalent of dogshit. But where the answers became really interesting was where a woman disagreed with the trend or had a specific niche taste. This didn’t just happen often, it happened a lot. Where three of them would cite confidence as the most desirable trait, another would state she was perfectly confident in herself and liked shy men as a result. Where every woman stated traits that fell into the aforementioned patterns, they would also state traits unique to them, which were equally fundamental but fell into no pattern – for example; creativity, competitiveness, persuasiveness, intellectually challenging, philosophical or, enjoys video games and/or comic books. Confused? The point to take away from this is that not every girl is going to be interested in you – even if you develop all the traits. Despite all your efforts at self-improvement, the numbers game rules the roost, and all your efforts simply lead you to a girl who probably would have liked you anyway. THE ONLY TRAIT THAT MATTERS When the reader first asked me ‘what are the fundamental characteristics of the attractive man?’ I initially thought of a few – but slowly, as I ran them through my mind, many of them began to fall away as they were slowly disproved by my own experience until I was left with only one: He can make a move. There are times when I’ve been shy and still got the girl. There are times when I’ve been incredibly confident and gone home empty-handed. There are times when I’ve been empathetic, a complete dick, had something going for me, had nothing going me – each getting the opposite result I’d expect and the listed traits would imply. But when I got the girl, when she was ‘attracted to me’, and I capitalized on this, I made a move. And this is all that mattered. That is my fundamental. This is what makes a man attractive. A lot of guys believe you have to be confident to make a move. That they have to achieve X, Y, Z or do A, B, C personal-development-meditation-hack-morning-routine to be able to make a move. This is only reinforced by the fact that women will tell you in the blink of an eye that confidence is the most attractive trait in a man, so surely you have to be confident to make a move right? No. No, you really don’t. The thing about confidence is that you get it after you make a move. Not before. That’s how it works. Making a move is leaning into vulnerability, not being too confident to feel it. Another reason I really harp on about making a move is that in my experience, female attraction is amplified by a man expressing his desire. Provided it exists in them to begin with – their desire will be amplified by you expressing your own. They’re aroused by you finding them arousing. The less you fuck around with your own intentions, the faster you’ll end up fucking around with each other later. THE ATTRACTION PARADOX One of the best pieces of advice I ever read was ‘if you have to ask, it’s not going to happen.’ It made me reflect on how I’d been engaging with personal development up until that moment. I’d been searching for the way that worked for others, rather than the way that worked for me. My desire for self-improvement had stemmed from a lack of self-worth, rather than a desire to see myself achieve my goals – and as a result, I couldn’t trust myself to find my own way. And that’s where the question of ‘what are the fundamental characteristics of the attractive man?’ goes wrong. As the answers from the women flooded in, I began to see the flaw at the heart of the reader’s question. The patterns and anomalies in the answers didn’t just fall under the parameters of female attraction, but instead something grander. The traits all described a man who was simply invested in his own development, for the developments sake – for his sake. And that’s the flaw. So much dating advice is concerned with telling you how to be attractive, how to react to the rules and conditions that are required in order to be attractive. It’s a mindset, which in asking the question ‘what are the fundamental characteristics of the attractive man’, already puts you in a position where you’re fundamentally unattractive. You’re pursuing a path of development that’s for her, rather than for you. This is something I’ve come to call the Attraction Paradox™. The more you try to be attractive to her, the less attractive you actually are. This paradox is fundamental to what makes a man attractive. You want to know what’s going through my mind when I’ve done well with women? I want her, so I’m gonna get her. You want to know what’s going through my mind when I’ve completely wiped out over and over again? How do I get her? What would get her? One mindset is all about me, one is all about her. Imagine how you’d behave from each mindset. The more you invest in your own needs, your own character, and your own desires – the more inherently attractive you actually are. You’re not a man who’s trying to be attractive, you’re a man who already is. This truth is why I think all the answers fell under the spectrum of a man who was engaged in his own healthy personal development. They weren’t attracted to the man who was engaged in becoming better with women, but instead the man who was engaged in becoming a better him. Why do you think complacency rated so highly as a repulsive trait? It’s an abandonment of development. And you know what’s a recipe for complacency? Giving your development an end goal, in this instance, women. As soon as you get it, the need for improvement stops. And that can’t happen. Development is an endless project. Slowly developing yourself over years and years of effort – isolating your weak points over time as your self-awareness grows, then working on them. MOVING FORWARD As a culture, we’ve become fixated on the idea of what is attractive and desirable to the opposite sex*. We’re beaten down by a narrative that tells us we don’t measure up, and we aren’t good enough. Objectively, this exists to influence us as consumers. Subjectively, it makes us feel like crap. But worse than that – it’s just a shitty way to go about being attractive. In writing this article, I was asked to compile a list of the traits that women found attractive. The fundamental traits, the ones that couldn’t be missed. This list, if true, presumably offers a roadmap to the heart of every woman on the planet. But in fact, it does quite the reverse. Adhering to a list like this is in itself, not what makes a man attractive. In fact, it’s fundamentally unattractive. The secret of attraction doesn’t lie in a checklist. You’re not ticking the boxes of what she wants. It’s not about that. No, The secret of attraction is simple. It’s not about what she wants, it’s about what you want. It’s about a desire to live well and improve. For no one but yourself. *I am no guru. I’m just a guy. In reality, I’m someone who spends most of his time imploding as a result of his flaws. Just like everyone else. *Imagine a million bearded, tattooed men, with undercuts, falling off a conveyor belt into a fresh plaid shirt. Forever until infinity. WANT A BETTER DATING LIFE? Yeah, I know. You’ve read enough. But this is important. I made a dating course. Like, a really big dating course. It’s over 8 hours of video content, 30 lessons, and over 80 exercises. It covers everything you need to know from making yourself more attractive, building sexual confidence, having great dates, and finding the right women for you. It’s based on years of experience, a library’s worth of scientific research, and just the right amount of common sense. So stop listening to me and check it out for yourself. CLICK ME!
{ "pile_set_name": "OpenWebText2" }
The simultaneous isolation of multiple high and low frequent T-cell populations from donor peripheral blood mononuclear cells using the major histocompatibility complex I-Streptamer isolation technology. Adoptive transfer of donor-derived T cells can be applied to improve immune reconstitution in immune-compromised patients after allogeneic stem cell transplantation. The separation of beneficial T cells from potentially harmful T cells can be achieved by using the major histocompatibility complex (MHC) I-Streptamer isolation technology, which has proven its feasibility for the fast and pure isolation of T-cell populations with a single specificity. We have analyzed the feasibility of the simultaneous isolation of multiple antigen-specific T-cell populations in one procedure by combining different MHC I-Streptamers. First, the effect of combining different amounts of MHC I-Streptamers used in the isolation procedure on the isolation efficacy of target antigen-specific T cells and on the number of off-target co-isolated contaminating cells was assessed. The feasibility of this approach was demonstrated in large-scale validation procedures targeting both high and low frequent T-cell populations using the Good Manufacturing Practice (GMP)-compliant CliniMACS Plus device. T-cell products targeting up to 24 different T-cell populations could be isolated in one, simultaneous MHC I-Streptamer procedure, by adjusting the amount of MHC I- Streptamers per target antigen-specific T-cell population. Concurrently, the co-isolation of potentially harmful contaminating T cells remained below our safety limit. This technology allows the reproducible isolation of high and low frequent T-cell populations. However, the expected therapeutic relevance of direct clinical application without in vitro expansion of these low frequent T-cell populations is questionable. This study provides a feasible, fast and safe method for the generation of highly personalized MHC I-Streptamer isolated T-cell products for adoptive immunotherapy.
{ "pile_set_name": "PubMed Abstracts" }
Automated grille shutters for regulation of louver angle and thus air flow are increasingly important constituents of automotive engine thermal management systems. Regulation is conveniently accomplished by means of electromechanical actuators. The actuators turn the louvers of the grille shutter, generally through a gear train, to vary the size of the opening for air to flow to cool the radiator. Open loop operation of stepper motor actuators is a reliable state of the art technique. In case of power failure or in any situation of incorrect louver positioning at shut down, however, a fail safe mechanism must be integrated in the grille shutter actuator. A return spring can for instance bring the louvers to an initial position (open or closed, whatever is required). In that case, when in operation, the actuator has to work permanently against the spring force plus any additional forces due to intense air flow when the vehicle is traveling at high speed. Normally that would require an over dimensioned or over powered electromagnetic motor to deliver the maximum torque at the extreme open (or closed) position. It also means high electric power consumption, which is not in accordance with an efficient environmentally-friendly or “green” system. Hence there is a desire for an actuator for a vehicle grille shutter system, in which the output of the motor is more closely matched to the required output of the actuator. The present invention solves this problem by means of a progressive gear which compensates for the variable torque requirements. Progressive or variable gears have been known for a long time. A comprehensive description of a progressive gear can be found in U.S. Pat. No. 2,061,322 or U.S. Pat. No. 8,196,487. In automotive applications progressive gears frequently appear in steering systems.
{ "pile_set_name": "USPTO Backgrounds" }
In recent years, in the field of display devices such as liquid crystal displays and organic electroluminescent displays, due to the demands for reduction in weight and thickness, improvement in flexibility, resistance to breakage and the like, glass substrate and cover glasses have been replaced to plastic substrates. Particularly, in personal digital assistants such as mobile phones, smart phones and tablet PCs, there is a strong demand for plastic substrates. Moreover, LEDs (Light Emitting Diodes) which is taking advantage of the characteristic features such as long service life and low power consumption, have been expanding their range of use to various applications including general household lighting, automotive lighting and backlights of liquid crystal displays. In response to the demand for miniaturization of information terminal devices such as mobile phones, smart phones and tablet PCs, LED elements are increasingly surface-mounted on circuit boards. In those cases where LED elements are surface-mounted on a circuit board, for the efficiently extracting the emitted light from the LEDs to the front, a reflective layer is commonly formed on the circuit board surface. The material of the reflective layer used in such cases is obtained by filling a white pigment into a transparent resin at a high concentration. However, many kinds of the transparent resins that are conventionally used have problems in that they induce yellowing when exposed to a high-temperature condition for a prolonged period and their reflectance is thus decreased with time. In association with increase in the brightness of LEDs, There is an ever increasing trend for the calorific value of LEDs; therefore, it is in urgent need to improve such thermal yellowing. It is strongly demanded that developing a resin material which has not only heat resistance and mechanical properties that conform to these market requirements but also, excellent transparency from the viewpoint of design properties as well as to realize the high visibility and is possible to highly inhibit the yellowing caused by exposure to heat and light. Among organic materials, polyimides are known as polymeric materials that have the highest levels of heat resistance, chemical resistance and electrical insulation properties. In the electrical and electronic industries, for example, “KAPTON (registered trademark)” manufactured by DuPont, which is polymerized from pyromellitic dianhydride (PMDA) and 4,4′-diaminodiphenyl ether (pDADE), and “UPILEX (registered trademark)” manufactured by Ube Industries, Ltd., which is polymerized from biphenyltetracarboxylic dianhydride (BPDA) and p-phenylene diamine (pPD), have been widely used as heat-resistant insulating materials. However, these polyimides have a disadvantage in that they are colored in yellowish brown under a steady state due to intramolecular conjugation and formation of charge transfer complexes. In order to solve this disadvantage, a number of methods have been proposed so far. Specifically, there have been proposed, for example, a method where a fully aliphatic polyimide entirely constituted by an aliphatic and/or alicyclic compound without any aromatic compound being used as a polyimide constituent is utilized for inhibiting coloration caused by intramolecular conjugation (see, for example, Patent Document 1); a method of obtaining a semi-aliphatic polyimide satisfying both heat resistance and transparency by using an aromatic compound as either an acid anhydride or diamine component and an aliphatic and/or alicyclic compound as the other component (see, for example, Patent Document 2); a method of utilizing a flexible polyimide in which the formation of intermolecular charge transfer complexes is inhibited by incorporating, as constituents, an acid dianhydride and/or a diamine that contain a sterically bulky substituent(s) and/or have a flexible structure (see, for example, Patent Documents 3 and 4); and a method of providing transparency by utilizing the structural distortion of a 7-membered cyclic acid dianhydride to force node formation in π-conjugated system and to thereby localize π-electrons (see, for example, Patent Document 5). In the method where an aliphatic and/or alicyclic compound is used as a constituent of a polyimide, there are problems that the aliphatic material causes deterioration in the heat resistance and mechanical strength and that yellowing occurs due to oxidation in a heat-treatment process. The problem of heat resistance can be improved by incorporating a rigid aromatic material into the resin structure; however, such a polyimide usually has a decreased transparency and is often hardly soluble to solvents. Therefore, a coating film is formed using a polyamic acid solution which is a precursor, and the resulting film is subsequently thermally or chemically imidized. However, the polyamic acid solution is easily affected by the humidity, handling and storage thereof are difficult. Meanwhile, in the method of utilizing a flexible polyimide, although excellent solubility to organic solvents and excellent transparency are attained, the polyimide is not possible to ensure sufficient heat resistance by a reduction of the glass transition temperation (Tg) caused by the flexible structure. Further, in the method of providing transparency by utilizing the structural distortion, it is required to use a special material which is an acid dianhydride having a 7-membered ring structure and the 7-membered ring is an unstable as a constituent; therefore, the resultant is likely to have insufficient mechanical strength, long-term heat resistance and thermal yellowing resistance.
{ "pile_set_name": "USPTO Backgrounds" }
NY- Plaza Hotel, a duck’s view Since it was not within my my means to speculate on an apartment in the Plaza Hotel, I made it my duty to tell everyone I knew that they should speculate on apartments in the Plaza. No One listened but I was right. The apartments doubled in value from contract time to closing.
{ "pile_set_name": "Pile-CC" }
Q: Does .NET 3.5 allow to use the new features of Windows 7? Some of the applications running on Windows 7 (Internet Explorer, Google Chrome, in example) use the icon they present in the task bar to show a little progress bar. Is it possible to use that feature using the .NET Framework 3.5? A: Try the Windows API Code Pack http://code.msdn.microsoft.com/WindowsAPICodePack This assembly provides access to Windows specific features like the tool bar. It allows for just the scenario you're looking for.
{ "pile_set_name": "StackExchange" }
// -------------------------------------------------------------------------------- // The MIT License (MIT) // // Copyright (c) 2014 Shiny Development // // Permission is hereby granted, free of charge, to any person obtaining a copy // of this software and associated documentation files (the "Software"), to deal // in the Software without restriction, including without limitation the rights // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell // copies of the Software, and to permit persons to whom the Software is // furnished to do so, subject to the following conditions: // // The above copyright notice and this permission notice shall be included in all // copies or substantial portions of the Software. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE // SOFTWARE. // -------------------------------------------------------------------------------- #import <UIKit/UIKit.h> #import "SDStatusBarOverriderPost9_0.h" /* Generated by RuntimeBrowser. Image: /Applications/Xcode.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/SDKs/iPhoneSimulator.sdk/System/Library/Frameworks/UIKit.framework/UIKit */ typedef struct { char boolitemIsEnabled[27]; char timeString[64]; int gsmSignalStrengthRaw; int gsmSignalStrengthBars; char serviceString[100]; char serviceCrossfadeString[100]; char serviceImages[2][100]; char operatorDirectory[1024]; unsigned int serviceContentType; int wifiSignalStrengthRaw; int wifiSignalStrengthBars; unsigned int dataNetworkType; int batteryCapacity; unsigned int batteryState; char batteryDetailString[150]; int bluetoothBatteryCapacity; int thermalColor; unsigned int thermalSunlightMode : 1; unsigned int slowActivity : 1; unsigned int syncActivity : 1; BOOL activityDisplayId[256]; unsigned int bluetoothConnected : 1; unsigned int displayRawGSMSignal : 1; unsigned int displayRawWifiSignal : 1; unsigned int locationIconType : 1; unsigned int quietModeInactive : 1; unsigned int tetheringConnectionCount; unsigned int unknownOption : 1; } StatusBarRawData; typedef struct { char booloverrideItemIsEnabled[27]; unsigned int overrideTimeString : 1; unsigned int overrideGsmSignalStrengthRaw : 1; unsigned int overrideGsmSignalStrengthBars : 1; unsigned int overrideServiceString : 1; unsigned int overrideServiceImages : 2; unsigned int overrideOperatorDirectory : 1; unsigned int overrideServiceContentType : 1; unsigned int overrideWifiSignalStrengthRaw : 1; unsigned int overrideWifiSignalStrengthBars : 1; unsigned int overrideDataNetworkType : 1; unsigned int disallowsCellularDataNetworkTypes : 1; unsigned int overrideBatteryCapacity : 1; unsigned int overrideBatteryState : 1; unsigned int overrideBatteryDetailString : 1; unsigned int overrideBluetoothBatteryCapacity : 1; unsigned int overrideThermalColor : 1; unsigned int overrideSlowActivity : 1; unsigned int overrideActivityDisplayId : 1; unsigned int overrideBluetoothConnected : 1; unsigned int overrideDisplayRawGSMSignal : 1; unsigned int overrideDisplayRawWifiSignal : 1; StatusBarRawData values; } StatusBarOverrideData; @class UIStatusBarServerClient; @interface UIStatusBarServer : NSObject { UIStatusBarServerClient *_statusBar; struct __CFRunLoopSource { } *_source; } @property(retain) UIStatusBarServerClient * statusBar; + (unsigned int)_serverPort; + (void)runServer; + (id)getDoubleHeightStatusStringForStyle:(long long)arg1; + (bool)getGlowAnimationStateForStyle:(long long)arg1; + (int)getStyleOverrides; + (StatusBarOverrideData *)getStatusBarOverrideData; + (const StatusBarRawData*)getStatusBarData; + (void)permanentizeStatusBarOverrideData; + (void)postStatusBarOverrideData:(StatusBarOverrideData*)arg1; + (void)postStatusBarData:(const StatusBarRawData*)arg1 withActions:(int)arg2; + (unsigned int)_publisherPort; + (double)getGlowAnimationEndTimeForStyle:(long long)arg1; + (void)removeStatusBarItem:(int)arg1; + (void)addStatusBarItem:(int)arg1; + (void)postDoubleHeightStatusString:(id)arg1 forStyle:(long long)arg2; + (void)postGlowAnimationState:(bool)arg1 forStyle:(long long)arg2; + (void)removeStyleOverrides:(int)arg1; + (void)addStyleOverrides:(int)arg1; @end @implementation SDStatusBarOverriderPost9_0 @synthesize timeString; @synthesize carrierName; @synthesize bluetoothConnected; @synthesize bluetoothEnabled; @synthesize batteryDetailEnabled; @synthesize networkType; - (void)enableOverrides { StatusBarOverrideData *overrides = [UIStatusBarServer getStatusBarOverrideData]; // Set 9:41 time in current localization overrides->overrideTimeString = 1; strcpy(overrides->values.timeString, [self.timeString cStringUsingEncoding:NSUTF8StringEncoding]); // Enable 5 bars of mobile (iPhone only) if ([UIDevice currentDevice].userInterfaceIdiom == UIUserInterfaceIdiomPhone) { overrides->booloverrideItemIsEnabled[3] = 1; overrides->values.boolitemIsEnabled[3] = 1; overrides->overrideGsmSignalStrengthBars = 1; overrides->values.gsmSignalStrengthBars = 5; } overrides->overrideDataNetworkType = self.networkType != SDStatusBarManagerNetworkTypeWiFi; overrides->values.dataNetworkType = self.networkType - 1; // Remove carrier text for iPhone, set it to "iPad" for the iPad NSString *carrierText = self.carrierName; if ([carrierText length] <= 0) { carrierText = ([UIDevice currentDevice].userInterfaceIdiom == UIUserInterfaceIdiomPhone) ? @"" : @"iPad"; } overrides->overrideServiceString = 1; strcpy(overrides->values.serviceString, [carrierText cStringUsingEncoding:NSUTF8StringEncoding]); // Battery overrides->booloverrideItemIsEnabled[8] = 1; overrides->values.boolitemIsEnabled[8] = 1; overrides->overrideBatteryDetailString = 1; strcpy(overrides->values.batteryDetailString, [self.batteryDetailEnabled? @"100%" : @" " cStringUsingEncoding:NSUTF8StringEncoding]); // Bluetooth overrides->booloverrideItemIsEnabled[11] = self.bluetoothEnabled; overrides->values.boolitemIsEnabled[11] = self.bluetoothEnabled; if (self.bluetoothEnabled) { overrides->overrideBluetoothConnected = self.bluetoothConnected; overrides->values.bluetoothConnected = self.bluetoothConnected; } // Actually update the status bar [UIStatusBarServer postStatusBarOverrideData:overrides]; // if battery detail was not required, then it was set to one space @" ", so let's correct it here in case bluetooth icon comes after it if (!self.batteryDetailEnabled) { strcpy(overrides->values.batteryDetailString, [@"" cStringUsingEncoding:NSUTF8StringEncoding]); [UIStatusBarServer postStatusBarOverrideData:overrides]; } // Lock in the changes, reset simulator will remove this [UIStatusBarServer permanentizeStatusBarOverrideData]; } - (void)disableOverrides { StatusBarOverrideData *overrides = [UIStatusBarServer getStatusBarOverrideData]; // Remove specific overrides (separate flags) overrides->overrideTimeString = 0; overrides->overrideGsmSignalStrengthBars = 0; overrides->overrideDataNetworkType = 0; overrides->overrideBatteryDetailString = 0; overrides->overrideBluetoothConnected = 0; // Remove all overrides that use the array of bools for (int i = 0; i < 27; i++) { overrides->booloverrideItemIsEnabled[i] = 0; overrides->values.boolitemIsEnabled[i] = 0; } // Carrier text (it's an override to set it back to the default) overrides->overrideServiceString = 1; strcpy(overrides->values.serviceString, [NSLocalizedString(@"Carrier", @"Carrier") cStringUsingEncoding:NSUTF8StringEncoding]); // Actually update the status bar [UIStatusBarServer postStatusBarOverrideData:overrides]; // Have to call this to remove all the overrides [UIStatusBarServer permanentizeStatusBarOverrideData]; } @end
{ "pile_set_name": "Github" }
Q: Hibernate Composite Key Nested Object Criteria Missing From Clause Currently I am trying to use hibernate (version 4.3.Final) to retrieve an object with a composite primary key containing another hibernate bean association. The criteria I am using is as follows: session.createCriteria(IdentityIdentifierHibernateBean.class) .setFetchMode("key.type", FetchMode.JOIN); .createAlias("key.type","typeAlias",JoinType.INNER_JOIN); .add(Restrictions.and( Restrictions.eq("key.value", "value"), Restrictions.eq("typeAlias.id", "id value"))) .list(); When I run this I get an error of: 1. SQL Error: 0, SQLState: 42P01 2. missing FROM-clause entry for table "typealias1_" Which the reason is apparent when I view the generated sql as shown below: select this_.type as type4_4_0_, this_.value as value1_4_0_, this_.id as id2_4_0_, this_.scope as scope3_4_0_ from identityIdentifier this_ where (this_.value=? and typealias1_.id=?) When running createAlias (or createCritera) isn't hibernate suppose to generate a join statement? I have tried both methods and tried creating aliases for the composite primary key as well. Either way, neither of these methods works as a join statement is never created. Is this a bug with resolving nested hibernate beans referenced in an embedded composite primary key? Or am I missing something.... For reference here's a simplified version of the hibernate classes (hashCode, equals and setters not included): @Entity @Table(name = "identityIdentifier") public class IdentityIdentifierHibernateBean implements Serializable { private IdentityIdentifierPrimaryKey key; @EmbeddedId public IdentityIdentifierPrimaryKey getKey() { return key; } } @Embeddable public class IdentityIdentifierPrimaryKey implements Serializable { private String value; private IdentityIdentifierTypeHibernateBean type; @ManyToOne(fetch = FetchType.LAZY) @JoinColumn(name = "type", referencedColumnName="id", unique = true, nullable = false) public IdentityIdentifierTypeHibernateBean getType() { return type; } @Column(name = "value", unique = false, nullable = false, length = 255) public String getValue() { return value; } } @Entity @Table(name = "identityIdentifierType") public class IdentityIdentifierTypeHibernateBean implements Serializable { private String id; @Id @Column(name = "id", unique = true, nullable = false, length=38) public String getId() { return id; } } A: After countless hours of trying to get the criteria API to work (which I genuinely believe is broken for composite keys at this point) I decided to switch to using HQL query instead. After about 20 minutes, I was easily able to get a working query. Word for the wise, don't use composite keys and the criteria api in combination. Query query=session.createQuery( "select distinct identity from IdentityIdentifierHibernateBean as identity " + "inner join identity.key.type as type " + "where (identity.key.value=:value and type.id=:typeid)") .setParameter("value", type.getIdentityIdentifierValue()) .setParameter("typeid", type.getTypeOfIdentityIdentifier()); beanList = (List<IdentityIdentifierHibernateBean>) query.list();
{ "pile_set_name": "StackExchange" }
Edinburgh Yarn Festival 201514th & 15th March The Classes Learn something new or extend your existing skills with one of our fantastic workshops! We are bringing together some of the finest teachers the international knitting industry and designer scene has to offer. At EYF 2013 we offered 4 classes, this time around you will have a choice of 32. Book your class here. Edinburgh's Old Town from Calton Hill The City Edinburgh does have something for everyone. If you want to travel to the festival with family or a non-yarn loving friend/partner, worry not. Edinburgh has so much to offer for all tastes. Check our the Visit Scotland website for some ideas. What is Edinburgh Yarn Festival? A festival of all things woolly and related to yarn, knitting, crochet, spinning, weaving and felting! We will host a fantastic market place with 100+ selected vendors, great workshops and wrap it all up with a host of other attractions. All of it in/close to one of the city's premier exhibition venues: The Edinburgh Corn Exchange. Whether you have never knitted/crochet/spun/woven/felted before, or you are a yarn-junkie already, you will love it - promise. Meet like-minded people and make new friends, show off your latest finished project or WIP, eat and drink in our yarn cafe, socialise, shop and learn a new skill. We really hope you can make it! The Market Place After the first Edinburgh Yarn Festival you told us that you loved the vendors, but that you would have loved more of them. You told us that you enjoyed your time immensely, but that you would have loved to have much more time to browse and shop. You'll have it! Two days rather than one, over 100 exhibitors rather than 40. The line-up is shaping up to be fantastic and we are saving our pennies already. From mid-October you will see updates on our exhibitor's list. Apart from our firm favourites, we will show-case some cracking new vendors that have never been seen here in Scotland. Yaaaaaaaaaaaaaarn The Programme What else will be on offer? Well, we've already announced Podcast Lounge, but we have a couple more aces up our sleeves. Keep coming back here, subscribe to our newsletter, or choose any of the social media options on the Keep in Touch page.
{ "pile_set_name": "Pile-CC" }
Organizer and activist DeRay Mckesson explores news, culture, social justice, and politics through deep conversations with influencers and experts, and the weekly news with fellow activists Brittany Packnett and Sam Sinyangwe, and writer Clint Smith. Clint, Brittany and DeRay are on to discuss the overlooked news, including the impact of economics on the ability to evacuate from a hurricane, college access, and North Carolina gerrymandering. Sam joins remotely to share his news about a House bill that would reclassify dozens of offenses as “crimes of violence.” Anand Giridharadas joins DeRay in the studio to talk about his new book, Winners Take All.
{ "pile_set_name": "OpenWebText2" }
Q: Regex and file processing This question relates to R but really isn't language specific per se. I have a bunch of csv files with this general format "sitename_03082015.csv". The files have 5 columns and various rows Host MaximumIn MaximumOut AverageIn AverageOut device1 30.63 Kbps 0 bps 24.60 Kbps 0 bps device2 1.13 Mbps 24.89 Kbps 21.76 Kbps 461 bps device5 698.44 Kbps 37.71 Kbps 17.49 Kbps 3.37 Kbps I ultimately want to read in all the files and merge which I can do but during the merge I want to read the site name and date and add it to each related line so the output looks like this Host MaximumIn MaximumOut AverageIn AverageOut Site Name Date device1 30.63 Kbps 0 bps 24.60 Kbps 0 bps SiteA 3/7/15 device12 1.13 Mbps 24.89 Kbps 21.76 Kbps 461 bps SiteA 3/8/15 device1 698.44 Kbps 37.71 Kbps 17.49 Kbps 3.37 Kbps SiteB 3/7/15 device2 39.08 Kbps 1.14 Mbps 10.88 Kbps 27.06 Kbps SiteB 3/8/15 device3 123.43 Kbps 176.86 Kbps 8.62 Kbps 3.78 Kbps SiteB 3/9/15 With my R code I can do the following: #Get list of file names filenames<- list.files(pattern = ".csv$") #This extracts everything up to the underscore to get site name siteName <- str_extract(string = filenames, "[^_]*") # Extract date from file names use date <- str_extract(string = filenames, "\\d{8}" ) With the below R code I can merge all the files but that will be without the added columns of site name and date that I want. myDF<-do.call("rbind", lapply(filenames, read.table, header=TRUE, sep=",")) I just can't get my head around how to do the extracts for site and date adding and populating the columns to create my ideal dataframe which is the second table above. The solution that best worked for me was posted below :) A: The way that immediately comes to my mind is to do cbind while reading information with additional infor and do rbind afterwards. Something similar to this: myDF<-do.call("rbind", lapply(filenames, function(x) cbind(read.table(x, header=TRUE, sep=","), "Site Name" = str_extract(string = x, "[^_]*"), "Date" = as.Date(str_extract(string = x, "\\d{8}"), "%m%d%Y"))))
{ "pile_set_name": "StackExchange" }
Phil Veasley | CEO ATLSportsHQ It’s just preseason, but the Hawks went out and had fun Monday evening. The Atlanta Hawks took to the court for the first time Monday after a long off season which saw many changes. For the most part, the Hawks played with energy and cohesion that more so resembled a regular season game than a glorified scrimmage. While the final score doesn’t really matter in preseason, the 116-102 win and 37-14 3rd quarter showed a glimpse of what can happen on nights when things go “right”. Here are a few things that stood out to me. John Collins John Collins is GOOD. We already knew that of course but Collins appears poised to take his game to the next level this season. He can do much more than dunk but lets just appreciate this dunk for a minute. Miles Plumlee Miles is Miles, still fumbling and bumbling passes. However, he does appear to be more toned up and in shape than last season. Even with his massive contract, it may be hard for him to touch the floor this season outside of major injury circumstances. Alex Len Hopefully the change of scenery and diminished expectations for Alex Len will do him good. While the stat line wasn’t impressive, (3 Points, 8 Rebounds, 4 Blocks) his energy was impressive especially on the defensive end. Alex Poythress Alex had himself an impressive showing. While he is a long shot to make the squad, putting up another 13-5-2 line may raise a few eyebrows. Even if we end up cutting him look for him to catch on with another NBA team or Erie. Hey Alex, we saw that postgame greeting of Hawks’ Owner Tony Ressler after the final buzzer. Tyler Dorsey Dorsey surprisingly found himself glued to the bench until the 4th quarter. He made the most of the late game minutes, driving to the whole with ease and snatching rebounds. Jeremy Lin and Vince Carter The two vets will bring much needed leadership on and off the court for our very young squad. Throughout the game the two could be seen chatting with various members of the team offering words of encouragement and advice. Leadership is something the Hawks have really lacked since 2014-15. Trae Young It wasn’t the best shooting night (5-16 1-6 from 3) but Trae had several impressive drives and dished out 8 flashy assists while only committing 2 turnovers. The shooting percentage likely won’t be pretty this year, but Young is in the perfect scenario to learn and grow. DeAndre’ Bembry Dre turned in a masterful performance Monday night. Everyone say it with me right now: Please stay healthy, please stay healthy. What to watch for Friday: Can Dre do it again? Can Trae find his shot? Is Poythress for real? Phil Veasley | @_ATLPhil Twitter/IG Be sure to tune into GameTime Radio Sunday Evenings at 6PM to hear E-Dub, Ty and myself discuss all things sports! GameTime Radio can be heard live in Atlanta on 1100 AM, on Facebook Live, iHeartRadio or TuneIn. Also available OnDemand in the iTunes Podcasts App. Share this: Twitter Facebook Reddit
{ "pile_set_name": "OpenWebText2" }
// Variables // -------------------------- $fa-font-path: "../webfonts" !default; $fa-font-size-base: 16px !default; $fa-font-display: auto !default; $fa-css-prefix: fa !default; $fa-version: "5.10.2" !default; $fa-border-color: #eee !default; $fa-inverse: #fff !default; $fa-li-width: 2em !default; $fa-fw-width: (20em / 16); $fa-primary-opacity: 1 !default; $fa-secondary-opacity: .4 !default; // Convenience function used to set content property @function fa-content($fa-var) { @return unquote("\"#{ $fa-var }\""); } $fa-var-500px: \f26e; $fa-var-accessible-icon: \f368; $fa-var-accusoft: \f369; $fa-var-acquisitions-incorporated: \f6af; $fa-var-ad: \f641; $fa-var-address-book: \f2b9; $fa-var-address-card: \f2bb; $fa-var-adjust: \f042; $fa-var-adn: \f170; $fa-var-adobe: \f778; $fa-var-adversal: \f36a; $fa-var-affiliatetheme: \f36b; $fa-var-air-freshener: \f5d0; $fa-var-airbnb: \f834; $fa-var-algolia: \f36c; $fa-var-align-center: \f037; $fa-var-align-justify: \f039; $fa-var-align-left: \f036; $fa-var-align-right: \f038; $fa-var-alipay: \f642; $fa-var-allergies: \f461; $fa-var-amazon: \f270; $fa-var-amazon-pay: \f42c; $fa-var-ambulance: \f0f9; $fa-var-american-sign-language-interpreting: \f2a3; $fa-var-amilia: \f36d; $fa-var-anchor: \f13d; $fa-var-android: \f17b; $fa-var-angellist: \f209; $fa-var-angle-double-down: \f103; $fa-var-angle-double-left: \f100; $fa-var-angle-double-right: \f101; $fa-var-angle-double-up: \f102; $fa-var-angle-down: \f107; $fa-var-angle-left: \f104; $fa-var-angle-right: \f105; $fa-var-angle-up: \f106; $fa-var-angry: \f556; $fa-var-angrycreative: \f36e; $fa-var-angular: \f420; $fa-var-ankh: \f644; $fa-var-app-store: \f36f; $fa-var-app-store-ios: \f370; $fa-var-apper: \f371; $fa-var-apple: \f179; $fa-var-apple-alt: \f5d1; $fa-var-apple-pay: \f415; $fa-var-archive: \f187; $fa-var-archway: \f557; $fa-var-arrow-alt-circle-down: \f358; $fa-var-arrow-alt-circle-left: \f359; $fa-var-arrow-alt-circle-right: \f35a; $fa-var-arrow-alt-circle-up: \f35b; $fa-var-arrow-circle-down: \f0ab; $fa-var-arrow-circle-left: \f0a8; $fa-var-arrow-circle-right: \f0a9; $fa-var-arrow-circle-up: \f0aa; $fa-var-arrow-down: \f063; $fa-var-arrow-left: \f060; $fa-var-arrow-right: \f061; $fa-var-arrow-up: \f062; $fa-var-arrows-alt: \f0b2; $fa-var-arrows-alt-h: \f337; $fa-var-arrows-alt-v: \f338; $fa-var-artstation: \f77a; $fa-var-assistive-listening-systems: \f2a2; $fa-var-asterisk: \f069; $fa-var-asymmetrik: \f372; $fa-var-at: \f1fa; $fa-var-atlas: \f558; $fa-var-atlassian: \f77b; $fa-var-atom: \f5d2; $fa-var-audible: \f373; $fa-var-audio-description: \f29e; $fa-var-autoprefixer: \f41c; $fa-var-avianex: \f374; $fa-var-aviato: \f421; $fa-var-award: \f559; $fa-var-aws: \f375; $fa-var-baby: \f77c; $fa-var-baby-carriage: \f77d; $fa-var-backspace: \f55a; $fa-var-backward: \f04a; $fa-var-bacon: \f7e5; $fa-var-balance-scale: \f24e; $fa-var-balance-scale-left: \f515; $fa-var-balance-scale-right: \f516; $fa-var-ban: \f05e; $fa-var-band-aid: \f462; $fa-var-bandcamp: \f2d5; $fa-var-barcode: \f02a; $fa-var-bars: \f0c9; $fa-var-baseball-ball: \f433; $fa-var-basketball-ball: \f434; $fa-var-bath: \f2cd; $fa-var-battery-empty: \f244; $fa-var-battery-full: \f240; $fa-var-battery-half: \f242; $fa-var-battery-quarter: \f243; $fa-var-battery-three-quarters: \f241; $fa-var-battle-net: \f835; $fa-var-bed: \f236; $fa-var-beer: \f0fc; $fa-var-behance: \f1b4; $fa-var-behance-square: \f1b5; $fa-var-bell: \f0f3; $fa-var-bell-slash: \f1f6; $fa-var-bezier-curve: \f55b; $fa-var-bible: \f647; $fa-var-bicycle: \f206; $fa-var-biking: \f84a; $fa-var-bimobject: \f378; $fa-var-binoculars: \f1e5; $fa-var-biohazard: \f780; $fa-var-birthday-cake: \f1fd; $fa-var-bitbucket: \f171; $fa-var-bitcoin: \f379; $fa-var-bity: \f37a; $fa-var-black-tie: \f27e; $fa-var-blackberry: \f37b; $fa-var-blender: \f517; $fa-var-blender-phone: \f6b6; $fa-var-blind: \f29d; $fa-var-blog: \f781; $fa-var-blogger: \f37c; $fa-var-blogger-b: \f37d; $fa-var-bluetooth: \f293; $fa-var-bluetooth-b: \f294; $fa-var-bold: \f032; $fa-var-bolt: \f0e7; $fa-var-bomb: \f1e2; $fa-var-bone: \f5d7; $fa-var-bong: \f55c; $fa-var-book: \f02d; $fa-var-book-dead: \f6b7; $fa-var-book-medical: \f7e6; $fa-var-book-open: \f518; $fa-var-book-reader: \f5da; $fa-var-bookmark: \f02e; $fa-var-bootstrap: \f836; $fa-var-border-all: \f84c; $fa-var-border-none: \f850; $fa-var-border-style: \f853; $fa-var-bowling-ball: \f436; $fa-var-box: \f466; $fa-var-box-open: \f49e; $fa-var-boxes: \f468; $fa-var-braille: \f2a1; $fa-var-brain: \f5dc; $fa-var-bread-slice: \f7ec; $fa-var-briefcase: \f0b1; $fa-var-briefcase-medical: \f469; $fa-var-broadcast-tower: \f519; $fa-var-broom: \f51a; $fa-var-brush: \f55d; $fa-var-btc: \f15a; $fa-var-buffer: \f837; $fa-var-bug: \f188; $fa-var-building: \f1ad; $fa-var-bullhorn: \f0a1; $fa-var-bullseye: \f140; $fa-var-burn: \f46a; $fa-var-buromobelexperte: \f37f; $fa-var-bus: \f207; $fa-var-bus-alt: \f55e; $fa-var-business-time: \f64a; $fa-var-buysellads: \f20d; $fa-var-calculator: \f1ec; $fa-var-calendar: \f133; $fa-var-calendar-alt: \f073; $fa-var-calendar-check: \f274; $fa-var-calendar-day: \f783; $fa-var-calendar-minus: \f272; $fa-var-calendar-plus: \f271; $fa-var-calendar-times: \f273; $fa-var-calendar-week: \f784; $fa-var-camera: \f030; $fa-var-camera-retro: \f083; $fa-var-campground: \f6bb; $fa-var-canadian-maple-leaf: \f785; $fa-var-candy-cane: \f786; $fa-var-cannabis: \f55f; $fa-var-capsules: \f46b; $fa-var-car: \f1b9; $fa-var-car-alt: \f5de; $fa-var-car-battery: \f5df; $fa-var-car-crash: \f5e1; $fa-var-car-side: \f5e4; $fa-var-caret-down: \f0d7; $fa-var-caret-left: \f0d9; $fa-var-caret-right: \f0da; $fa-var-caret-square-down: \f150; $fa-var-caret-square-left: \f191; $fa-var-caret-square-right: \f152; $fa-var-caret-square-up: \f151; $fa-var-caret-up: \f0d8; $fa-var-carrot: \f787; $fa-var-cart-arrow-down: \f218; $fa-var-cart-plus: \f217; $fa-var-cash-register: \f788; $fa-var-cat: \f6be; $fa-var-cc-amazon-pay: \f42d; $fa-var-cc-amex: \f1f3; $fa-var-cc-apple-pay: \f416; $fa-var-cc-diners-club: \f24c; $fa-var-cc-discover: \f1f2; $fa-var-cc-jcb: \f24b; $fa-var-cc-mastercard: \f1f1; $fa-var-cc-paypal: \f1f4; $fa-var-cc-stripe: \f1f5; $fa-var-cc-visa: \f1f0; $fa-var-centercode: \f380; $fa-var-centos: \f789; $fa-var-certificate: \f0a3; $fa-var-chair: \f6c0; $fa-var-chalkboard: \f51b; $fa-var-chalkboard-teacher: \f51c; $fa-var-charging-station: \f5e7; $fa-var-chart-area: \f1fe; $fa-var-chart-bar: \f080; $fa-var-chart-line: \f201; $fa-var-chart-pie: \f200; $fa-var-check: \f00c; $fa-var-check-circle: \f058; $fa-var-check-double: \f560; $fa-var-check-square: \f14a; $fa-var-cheese: \f7ef; $fa-var-chess: \f439; $fa-var-chess-bishop: \f43a; $fa-var-chess-board: \f43c; $fa-var-chess-king: \f43f; $fa-var-chess-knight: \f441; $fa-var-chess-pawn: \f443; $fa-var-chess-queen: \f445; $fa-var-chess-rook: \f447; $fa-var-chevron-circle-down: \f13a; $fa-var-chevron-circle-left: \f137; $fa-var-chevron-circle-right: \f138; $fa-var-chevron-circle-up: \f139; $fa-var-chevron-down: \f078; $fa-var-chevron-left: \f053; $fa-var-chevron-right: \f054; $fa-var-chevron-up: \f077; $fa-var-child: \f1ae; $fa-var-chrome: \f268; $fa-var-chromecast: \f838; $fa-var-church: \f51d; $fa-var-circle: \f111; $fa-var-circle-notch: \f1ce; $fa-var-city: \f64f; $fa-var-clinic-medical: \f7f2; $fa-var-clipboard: \f328; $fa-var-clipboard-check: \f46c; $fa-var-clipboard-list: \f46d; $fa-var-clock: \f017; $fa-var-clone: \f24d; $fa-var-closed-captioning: \f20a; $fa-var-cloud: \f0c2; $fa-var-cloud-download-alt: \f381; $fa-var-cloud-meatball: \f73b; $fa-var-cloud-moon: \f6c3; $fa-var-cloud-moon-rain: \f73c; $fa-var-cloud-rain: \f73d; $fa-var-cloud-showers-heavy: \f740; $fa-var-cloud-sun: \f6c4; $fa-var-cloud-sun-rain: \f743; $fa-var-cloud-upload-alt: \f382; $fa-var-cloudscale: \f383; $fa-var-cloudsmith: \f384; $fa-var-cloudversify: \f385; $fa-var-cocktail: \f561; $fa-var-code: \f121; $fa-var-code-branch: \f126; $fa-var-codepen: \f1cb; $fa-var-codiepie: \f284; $fa-var-coffee: \f0f4; $fa-var-cog: \f013; $fa-var-cogs: \f085; $fa-var-coins: \f51e; $fa-var-columns: \f0db; $fa-var-comment: \f075; $fa-var-comment-alt: \f27a; $fa-var-comment-dollar: \f651; $fa-var-comment-dots: \f4ad; $fa-var-comment-medical: \f7f5; $fa-var-comment-slash: \f4b3; $fa-var-comments: \f086; $fa-var-comments-dollar: \f653; $fa-var-compact-disc: \f51f; $fa-var-compass: \f14e; $fa-var-compress: \f066; $fa-var-compress-arrows-alt: \f78c; $fa-var-concierge-bell: \f562; $fa-var-confluence: \f78d; $fa-var-connectdevelop: \f20e; $fa-var-contao: \f26d; $fa-var-cookie: \f563; $fa-var-cookie-bite: \f564; $fa-var-copy: \f0c5; $fa-var-copyright: \f1f9; $fa-var-cotton-bureau: \f89e; $fa-var-couch: \f4b8; $fa-var-cpanel: \f388; $fa-var-creative-commons: \f25e; $fa-var-creative-commons-by: \f4e7; $fa-var-creative-commons-nc: \f4e8; $fa-var-creative-commons-nc-eu: \f4e9; $fa-var-creative-commons-nc-jp: \f4ea; $fa-var-creative-commons-nd: \f4eb; $fa-var-creative-commons-pd: \f4ec; $fa-var-creative-commons-pd-alt: \f4ed; $fa-var-creative-commons-remix: \f4ee; $fa-var-creative-commons-sa: \f4ef; $fa-var-creative-commons-sampling: \f4f0; $fa-var-creative-commons-sampling-plus: \f4f1; $fa-var-creative-commons-share: \f4f2; $fa-var-creative-commons-zero: \f4f3; $fa-var-credit-card: \f09d; $fa-var-critical-role: \f6c9; $fa-var-crop: \f125; $fa-var-crop-alt: \f565; $fa-var-cross: \f654; $fa-var-crosshairs: \f05b; $fa-var-crow: \f520; $fa-var-crown: \f521; $fa-var-crutch: \f7f7; $fa-var-css3: \f13c; $fa-var-css3-alt: \f38b; $fa-var-cube: \f1b2; $fa-var-cubes: \f1b3; $fa-var-cut: \f0c4; $fa-var-cuttlefish: \f38c; $fa-var-d-and-d: \f38d; $fa-var-d-and-d-beyond: \f6ca; $fa-var-dashcube: \f210; $fa-var-database: \f1c0; $fa-var-deaf: \f2a4; $fa-var-delicious: \f1a5; $fa-var-democrat: \f747; $fa-var-deploydog: \f38e; $fa-var-deskpro: \f38f; $fa-var-desktop: \f108; $fa-var-dev: \f6cc; $fa-var-deviantart: \f1bd; $fa-var-dharmachakra: \f655; $fa-var-dhl: \f790; $fa-var-diagnoses: \f470; $fa-var-diaspora: \f791; $fa-var-dice: \f522; $fa-var-dice-d20: \f6cf; $fa-var-dice-d6: \f6d1; $fa-var-dice-five: \f523; $fa-var-dice-four: \f524; $fa-var-dice-one: \f525; $fa-var-dice-six: \f526; $fa-var-dice-three: \f527; $fa-var-dice-two: \f528; $fa-var-digg: \f1a6; $fa-var-digital-ocean: \f391; $fa-var-digital-tachograph: \f566; $fa-var-directions: \f5eb; $fa-var-discord: \f392; $fa-var-discourse: \f393; $fa-var-divide: \f529; $fa-var-dizzy: \f567; $fa-var-dna: \f471; $fa-var-dochub: \f394; $fa-var-docker: \f395; $fa-var-dog: \f6d3; $fa-var-dollar-sign: \f155; $fa-var-dolly: \f472; $fa-var-dolly-flatbed: \f474; $fa-var-donate: \f4b9; $fa-var-door-closed: \f52a; $fa-var-door-open: \f52b; $fa-var-dot-circle: \f192; $fa-var-dove: \f4ba; $fa-var-download: \f019; $fa-var-draft2digital: \f396; $fa-var-drafting-compass: \f568; $fa-var-dragon: \f6d5; $fa-var-draw-polygon: \f5ee; $fa-var-dribbble: \f17d; $fa-var-dribbble-square: \f397; $fa-var-dropbox: \f16b; $fa-var-drum: \f569; $fa-var-drum-steelpan: \f56a; $fa-var-drumstick-bite: \f6d7; $fa-var-drupal: \f1a9; $fa-var-dumbbell: \f44b; $fa-var-dumpster: \f793; $fa-var-dumpster-fire: \f794; $fa-var-dungeon: \f6d9; $fa-var-dyalog: \f399; $fa-var-earlybirds: \f39a; $fa-var-ebay: \f4f4; $fa-var-edge: \f282; $fa-var-edit: \f044; $fa-var-egg: \f7fb; $fa-var-eject: \f052; $fa-var-elementor: \f430; $fa-var-ellipsis-h: \f141; $fa-var-ellipsis-v: \f142; $fa-var-ello: \f5f1; $fa-var-ember: \f423; $fa-var-empire: \f1d1; $fa-var-envelope: \f0e0; $fa-var-envelope-open: \f2b6; $fa-var-envelope-open-text: \f658; $fa-var-envelope-square: \f199; $fa-var-envira: \f299; $fa-var-equals: \f52c; $fa-var-eraser: \f12d; $fa-var-erlang: \f39d; $fa-var-ethereum: \f42e; $fa-var-ethernet: \f796; $fa-var-etsy: \f2d7; $fa-var-euro-sign: \f153; $fa-var-evernote: \f839; $fa-var-exchange-alt: \f362; $fa-var-exclamation: \f12a; $fa-var-exclamation-circle: \f06a; $fa-var-exclamation-triangle: \f071; $fa-var-expand: \f065; $fa-var-expand-arrows-alt: \f31e; $fa-var-expeditedssl: \f23e; $fa-var-external-link-alt: \f35d; $fa-var-external-link-square-alt: \f360; $fa-var-eye: \f06e; $fa-var-eye-dropper: \f1fb; $fa-var-eye-slash: \f070; $fa-var-facebook: \f09a; $fa-var-facebook-f: \f39e; $fa-var-facebook-messenger: \f39f; $fa-var-facebook-square: \f082; $fa-var-fan: \f863; $fa-var-fantasy-flight-games: \f6dc; $fa-var-fast-backward: \f049; $fa-var-fast-forward: \f050; $fa-var-fax: \f1ac; $fa-var-feather: \f52d; $fa-var-feather-alt: \f56b; $fa-var-fedex: \f797; $fa-var-fedora: \f798; $fa-var-female: \f182; $fa-var-fighter-jet: \f0fb; $fa-var-figma: \f799; $fa-var-file: \f15b; $fa-var-file-alt: \f15c; $fa-var-file-archive: \f1c6; $fa-var-file-audio: \f1c7; $fa-var-file-code: \f1c9; $fa-var-file-contract: \f56c; $fa-var-file-csv: \f6dd; $fa-var-file-download: \f56d; $fa-var-file-excel: \f1c3; $fa-var-file-export: \f56e; $fa-var-file-image: \f1c5; $fa-var-file-import: \f56f; $fa-var-file-invoice: \f570; $fa-var-file-invoice-dollar: \f571; $fa-var-file-medical: \f477; $fa-var-file-medical-alt: \f478; $fa-var-file-pdf: \f1c1; $fa-var-file-powerpoint: \f1c4; $fa-var-file-prescription: \f572; $fa-var-file-signature: \f573; $fa-var-file-upload: \f574; $fa-var-file-video: \f1c8; $fa-var-file-word: \f1c2; $fa-var-fill: \f575; $fa-var-fill-drip: \f576; $fa-var-film: \f008; $fa-var-filter: \f0b0; $fa-var-fingerprint: \f577; $fa-var-fire: \f06d; $fa-var-fire-alt: \f7e4; $fa-var-fire-extinguisher: \f134; $fa-var-firefox: \f269; $fa-var-first-aid: \f479; $fa-var-first-order: \f2b0; $fa-var-first-order-alt: \f50a; $fa-var-firstdraft: \f3a1; $fa-var-fish: \f578; $fa-var-fist-raised: \f6de; $fa-var-flag: \f024; $fa-var-flag-checkered: \f11e; $fa-var-flag-usa: \f74d; $fa-var-flask: \f0c3; $fa-var-flickr: \f16e; $fa-var-flipboard: \f44d; $fa-var-flushed: \f579; $fa-var-fly: \f417; $fa-var-folder: \f07b; $fa-var-folder-minus: \f65d; $fa-var-folder-open: \f07c; $fa-var-folder-plus: \f65e; $fa-var-font: \f031; $fa-var-font-awesome: \f2b4; $fa-var-font-awesome-alt: \f35c; $fa-var-font-awesome-flag: \f425; $fa-var-font-awesome-logo-full: \f4e6; $fa-var-fonticons: \f280; $fa-var-fonticons-fi: \f3a2; $fa-var-football-ball: \f44e; $fa-var-fort-awesome: \f286; $fa-var-fort-awesome-alt: \f3a3; $fa-var-forumbee: \f211; $fa-var-forward: \f04e; $fa-var-foursquare: \f180; $fa-var-free-code-camp: \f2c5; $fa-var-freebsd: \f3a4; $fa-var-frog: \f52e; $fa-var-frown: \f119; $fa-var-frown-open: \f57a; $fa-var-fulcrum: \f50b; $fa-var-funnel-dollar: \f662; $fa-var-futbol: \f1e3; $fa-var-galactic-republic: \f50c; $fa-var-galactic-senate: \f50d; $fa-var-gamepad: \f11b; $fa-var-gas-pump: \f52f; $fa-var-gavel: \f0e3; $fa-var-gem: \f3a5; $fa-var-genderless: \f22d; $fa-var-get-pocket: \f265; $fa-var-gg: \f260; $fa-var-gg-circle: \f261; $fa-var-ghost: \f6e2; $fa-var-gift: \f06b; $fa-var-gifts: \f79c; $fa-var-git: \f1d3; $fa-var-git-alt: \f841; $fa-var-git-square: \f1d2; $fa-var-github: \f09b; $fa-var-github-alt: \f113; $fa-var-github-square: \f092; $fa-var-gitkraken: \f3a6; $fa-var-gitlab: \f296; $fa-var-gitter: \f426; $fa-var-glass-cheers: \f79f; $fa-var-glass-martini: \f000; $fa-var-glass-martini-alt: \f57b; $fa-var-glass-whiskey: \f7a0; $fa-var-glasses: \f530; $fa-var-glide: \f2a5; $fa-var-glide-g: \f2a6; $fa-var-globe: \f0ac; $fa-var-globe-africa: \f57c; $fa-var-globe-americas: \f57d; $fa-var-globe-asia: \f57e; $fa-var-globe-europe: \f7a2; $fa-var-gofore: \f3a7; $fa-var-golf-ball: \f450; $fa-var-goodreads: \f3a8; $fa-var-goodreads-g: \f3a9; $fa-var-google: \f1a0; $fa-var-google-drive: \f3aa; $fa-var-google-play: \f3ab; $fa-var-google-plus: \f2b3; $fa-var-google-plus-g: \f0d5; $fa-var-google-plus-square: \f0d4; $fa-var-google-wallet: \f1ee; $fa-var-gopuram: \f664; $fa-var-graduation-cap: \f19d; $fa-var-gratipay: \f184; $fa-var-grav: \f2d6; $fa-var-greater-than: \f531; $fa-var-greater-than-equal: \f532; $fa-var-grimace: \f57f; $fa-var-grin: \f580; $fa-var-grin-alt: \f581; $fa-var-grin-beam: \f582; $fa-var-grin-beam-sweat: \f583; $fa-var-grin-hearts: \f584; $fa-var-grin-squint: \f585; $fa-var-grin-squint-tears: \f586; $fa-var-grin-stars: \f587; $fa-var-grin-tears: \f588; $fa-var-grin-tongue: \f589; $fa-var-grin-tongue-squint: \f58a; $fa-var-grin-tongue-wink: \f58b; $fa-var-grin-wink: \f58c; $fa-var-grip-horizontal: \f58d; $fa-var-grip-lines: \f7a4; $fa-var-grip-lines-vertical: \f7a5; $fa-var-grip-vertical: \f58e; $fa-var-gripfire: \f3ac; $fa-var-grunt: \f3ad; $fa-var-guitar: \f7a6; $fa-var-gulp: \f3ae; $fa-var-h-square: \f0fd; $fa-var-hacker-news: \f1d4; $fa-var-hacker-news-square: \f3af; $fa-var-hackerrank: \f5f7; $fa-var-hamburger: \f805; $fa-var-hammer: \f6e3; $fa-var-hamsa: \f665; $fa-var-hand-holding: \f4bd; $fa-var-hand-holding-heart: \f4be; $fa-var-hand-holding-usd: \f4c0; $fa-var-hand-lizard: \f258; $fa-var-hand-middle-finger: \f806; $fa-var-hand-paper: \f256; $fa-var-hand-peace: \f25b; $fa-var-hand-point-down: \f0a7; $fa-var-hand-point-left: \f0a5; $fa-var-hand-point-right: \f0a4; $fa-var-hand-point-up: \f0a6; $fa-var-hand-pointer: \f25a; $fa-var-hand-rock: \f255; $fa-var-hand-scissors: \f257; $fa-var-hand-spock: \f259; $fa-var-hands: \f4c2; $fa-var-hands-helping: \f4c4; $fa-var-handshake: \f2b5; $fa-var-hanukiah: \f6e6; $fa-var-hard-hat: \f807; $fa-var-hashtag: \f292; $fa-var-hat-wizard: \f6e8; $fa-var-haykal: \f666; $fa-var-hdd: \f0a0; $fa-var-heading: \f1dc; $fa-var-headphones: \f025; $fa-var-headphones-alt: \f58f; $fa-var-headset: \f590; $fa-var-heart: \f004; $fa-var-heart-broken: \f7a9; $fa-var-heartbeat: \f21e; $fa-var-helicopter: \f533; $fa-var-highlighter: \f591; $fa-var-hiking: \f6ec; $fa-var-hippo: \f6ed; $fa-var-hips: \f452; $fa-var-hire-a-helper: \f3b0; $fa-var-history: \f1da; $fa-var-hockey-puck: \f453; $fa-var-holly-berry: \f7aa; $fa-var-home: \f015; $fa-var-hooli: \f427; $fa-var-hornbill: \f592; $fa-var-horse: \f6f0; $fa-var-horse-head: \f7ab; $fa-var-hospital: \f0f8; $fa-var-hospital-alt: \f47d; $fa-var-hospital-symbol: \f47e; $fa-var-hot-tub: \f593; $fa-var-hotdog: \f80f; $fa-var-hotel: \f594; $fa-var-hotjar: \f3b1; $fa-var-hourglass: \f254; $fa-var-hourglass-end: \f253; $fa-var-hourglass-half: \f252; $fa-var-hourglass-start: \f251; $fa-var-house-damage: \f6f1; $fa-var-houzz: \f27c; $fa-var-hryvnia: \f6f2; $fa-var-html5: \f13b; $fa-var-hubspot: \f3b2; $fa-var-i-cursor: \f246; $fa-var-ice-cream: \f810; $fa-var-icicles: \f7ad; $fa-var-icons: \f86d; $fa-var-id-badge: \f2c1; $fa-var-id-card: \f2c2; $fa-var-id-card-alt: \f47f; $fa-var-igloo: \f7ae; $fa-var-image: \f03e; $fa-var-images: \f302; $fa-var-imdb: \f2d8; $fa-var-inbox: \f01c; $fa-var-indent: \f03c; $fa-var-industry: \f275; $fa-var-infinity: \f534; $fa-var-info: \f129; $fa-var-info-circle: \f05a; $fa-var-instagram: \f16d; $fa-var-intercom: \f7af; $fa-var-internet-explorer: \f26b; $fa-var-invision: \f7b0; $fa-var-ioxhost: \f208; $fa-var-italic: \f033; $fa-var-itch-io: \f83a; $fa-var-itunes: \f3b4; $fa-var-itunes-note: \f3b5; $fa-var-java: \f4e4; $fa-var-jedi: \f669; $fa-var-jedi-order: \f50e; $fa-var-jenkins: \f3b6; $fa-var-jira: \f7b1; $fa-var-joget: \f3b7; $fa-var-joint: \f595; $fa-var-joomla: \f1aa; $fa-var-journal-whills: \f66a; $fa-var-js: \f3b8; $fa-var-js-square: \f3b9; $fa-var-jsfiddle: \f1cc; $fa-var-kaaba: \f66b; $fa-var-kaggle: \f5fa; $fa-var-key: \f084; $fa-var-keybase: \f4f5; $fa-var-keyboard: \f11c; $fa-var-keycdn: \f3ba; $fa-var-khanda: \f66d; $fa-var-kickstarter: \f3bb; $fa-var-kickstarter-k: \f3bc; $fa-var-kiss: \f596; $fa-var-kiss-beam: \f597; $fa-var-kiss-wink-heart: \f598; $fa-var-kiwi-bird: \f535; $fa-var-korvue: \f42f; $fa-var-landmark: \f66f; $fa-var-language: \f1ab; $fa-var-laptop: \f109; $fa-var-laptop-code: \f5fc; $fa-var-laptop-medical: \f812; $fa-var-laravel: \f3bd; $fa-var-lastfm: \f202; $fa-var-lastfm-square: \f203; $fa-var-laugh: \f599; $fa-var-laugh-beam: \f59a; $fa-var-laugh-squint: \f59b; $fa-var-laugh-wink: \f59c; $fa-var-layer-group: \f5fd; $fa-var-leaf: \f06c; $fa-var-leanpub: \f212; $fa-var-lemon: \f094; $fa-var-less: \f41d; $fa-var-less-than: \f536; $fa-var-less-than-equal: \f537; $fa-var-level-down-alt: \f3be; $fa-var-level-up-alt: \f3bf; $fa-var-life-ring: \f1cd; $fa-var-lightbulb: \f0eb; $fa-var-line: \f3c0; $fa-var-link: \f0c1; $fa-var-linkedin: \f08c; $fa-var-linkedin-in: \f0e1; $fa-var-linode: \f2b8; $fa-var-linux: \f17c; $fa-var-lira-sign: \f195; $fa-var-list: \f03a; $fa-var-list-alt: \f022; $fa-var-list-ol: \f0cb; $fa-var-list-ul: \f0ca; $fa-var-location-arrow: \f124; $fa-var-lock: \f023; $fa-var-lock-open: \f3c1; $fa-var-long-arrow-alt-down: \f309; $fa-var-long-arrow-alt-left: \f30a; $fa-var-long-arrow-alt-right: \f30b; $fa-var-long-arrow-alt-up: \f30c; $fa-var-low-vision: \f2a8; $fa-var-luggage-cart: \f59d; $fa-var-lyft: \f3c3; $fa-var-magento: \f3c4; $fa-var-magic: \f0d0; $fa-var-magnet: \f076; $fa-var-mail-bulk: \f674; $fa-var-mailchimp: \f59e; $fa-var-male: \f183; $fa-var-mandalorian: \f50f; $fa-var-map: \f279; $fa-var-map-marked: \f59f; $fa-var-map-marked-alt: \f5a0; $fa-var-map-marker: \f041; $fa-var-map-marker-alt: \f3c5; $fa-var-map-pin: \f276; $fa-var-map-signs: \f277; $fa-var-markdown: \f60f; $fa-var-marker: \f5a1; $fa-var-mars: \f222; $fa-var-mars-double: \f227; $fa-var-mars-stroke: \f229; $fa-var-mars-stroke-h: \f22b; $fa-var-mars-stroke-v: \f22a; $fa-var-mask: \f6fa; $fa-var-mastodon: \f4f6; $fa-var-maxcdn: \f136; $fa-var-medal: \f5a2; $fa-var-medapps: \f3c6; $fa-var-medium: \f23a; $fa-var-medium-m: \f3c7; $fa-var-medkit: \f0fa; $fa-var-medrt: \f3c8; $fa-var-meetup: \f2e0; $fa-var-megaport: \f5a3; $fa-var-meh: \f11a; $fa-var-meh-blank: \f5a4; $fa-var-meh-rolling-eyes: \f5a5; $fa-var-memory: \f538; $fa-var-mendeley: \f7b3; $fa-var-menorah: \f676; $fa-var-mercury: \f223; $fa-var-meteor: \f753; $fa-var-microchip: \f2db; $fa-var-microphone: \f130; $fa-var-microphone-alt: \f3c9; $fa-var-microphone-alt-slash: \f539; $fa-var-microphone-slash: \f131; $fa-var-microscope: \f610; $fa-var-microsoft: \f3ca; $fa-var-minus: \f068; $fa-var-minus-circle: \f056; $fa-var-minus-square: \f146; $fa-var-mitten: \f7b5; $fa-var-mix: \f3cb; $fa-var-mixcloud: \f289; $fa-var-mizuni: \f3cc; $fa-var-mobile: \f10b; $fa-var-mobile-alt: \f3cd; $fa-var-modx: \f285; $fa-var-monero: \f3d0; $fa-var-money-bill: \f0d6; $fa-var-money-bill-alt: \f3d1; $fa-var-money-bill-wave: \f53a; $fa-var-money-bill-wave-alt: \f53b; $fa-var-money-check: \f53c; $fa-var-money-check-alt: \f53d; $fa-var-monument: \f5a6; $fa-var-moon: \f186; $fa-var-mortar-pestle: \f5a7; $fa-var-mosque: \f678; $fa-var-motorcycle: \f21c; $fa-var-mountain: \f6fc; $fa-var-mouse-pointer: \f245; $fa-var-mug-hot: \f7b6; $fa-var-music: \f001; $fa-var-napster: \f3d2; $fa-var-neos: \f612; $fa-var-network-wired: \f6ff; $fa-var-neuter: \f22c; $fa-var-newspaper: \f1ea; $fa-var-nimblr: \f5a8; $fa-var-node: \f419; $fa-var-node-js: \f3d3; $fa-var-not-equal: \f53e; $fa-var-notes-medical: \f481; $fa-var-npm: \f3d4; $fa-var-ns8: \f3d5; $fa-var-nutritionix: \f3d6; $fa-var-object-group: \f247; $fa-var-object-ungroup: \f248; $fa-var-odnoklassniki: \f263; $fa-var-odnoklassniki-square: \f264; $fa-var-oil-can: \f613; $fa-var-old-republic: \f510; $fa-var-om: \f679; $fa-var-opencart: \f23d; $fa-var-openid: \f19b; $fa-var-opera: \f26a; $fa-var-optin-monster: \f23c; $fa-var-osi: \f41a; $fa-var-otter: \f700; $fa-var-outdent: \f03b; $fa-var-page4: \f3d7; $fa-var-pagelines: \f18c; $fa-var-pager: \f815; $fa-var-paint-brush: \f1fc; $fa-var-paint-roller: \f5aa; $fa-var-palette: \f53f; $fa-var-palfed: \f3d8; $fa-var-pallet: \f482; $fa-var-paper-plane: \f1d8; $fa-var-paperclip: \f0c6; $fa-var-parachute-box: \f4cd; $fa-var-paragraph: \f1dd; $fa-var-parking: \f540; $fa-var-passport: \f5ab; $fa-var-pastafarianism: \f67b; $fa-var-paste: \f0ea; $fa-var-patreon: \f3d9; $fa-var-pause: \f04c; $fa-var-pause-circle: \f28b; $fa-var-paw: \f1b0; $fa-var-paypal: \f1ed; $fa-var-peace: \f67c; $fa-var-pen: \f304; $fa-var-pen-alt: \f305; $fa-var-pen-fancy: \f5ac; $fa-var-pen-nib: \f5ad; $fa-var-pen-square: \f14b; $fa-var-pencil-alt: \f303; $fa-var-pencil-ruler: \f5ae; $fa-var-penny-arcade: \f704; $fa-var-people-carry: \f4ce; $fa-var-pepper-hot: \f816; $fa-var-percent: \f295; $fa-var-percentage: \f541; $fa-var-periscope: \f3da; $fa-var-person-booth: \f756; $fa-var-phabricator: \f3db; $fa-var-phoenix-framework: \f3dc; $fa-var-phoenix-squadron: \f511; $fa-var-phone: \f095; $fa-var-phone-alt: \f879; $fa-var-phone-slash: \f3dd; $fa-var-phone-square: \f098; $fa-var-phone-square-alt: \f87b; $fa-var-phone-volume: \f2a0; $fa-var-photo-video: \f87c; $fa-var-php: \f457; $fa-var-pied-piper: \f2ae; $fa-var-pied-piper-alt: \f1a8; $fa-var-pied-piper-hat: \f4e5; $fa-var-pied-piper-pp: \f1a7; $fa-var-piggy-bank: \f4d3; $fa-var-pills: \f484; $fa-var-pinterest: \f0d2; $fa-var-pinterest-p: \f231; $fa-var-pinterest-square: \f0d3; $fa-var-pizza-slice: \f818; $fa-var-place-of-worship: \f67f; $fa-var-plane: \f072; $fa-var-plane-arrival: \f5af; $fa-var-plane-departure: \f5b0; $fa-var-play: \f04b; $fa-var-play-circle: \f144; $fa-var-playstation: \f3df; $fa-var-plug: \f1e6; $fa-var-plus: \f067; $fa-var-plus-circle: \f055; $fa-var-plus-square: \f0fe; $fa-var-podcast: \f2ce; $fa-var-poll: \f681; $fa-var-poll-h: \f682; $fa-var-poo: \f2fe; $fa-var-poo-storm: \f75a; $fa-var-poop: \f619; $fa-var-portrait: \f3e0; $fa-var-pound-sign: \f154; $fa-var-power-off: \f011; $fa-var-pray: \f683; $fa-var-praying-hands: \f684; $fa-var-prescription: \f5b1; $fa-var-prescription-bottle: \f485; $fa-var-prescription-bottle-alt: \f486; $fa-var-print: \f02f; $fa-var-procedures: \f487; $fa-var-product-hunt: \f288; $fa-var-project-diagram: \f542; $fa-var-pushed: \f3e1; $fa-var-puzzle-piece: \f12e; $fa-var-python: \f3e2; $fa-var-qq: \f1d6; $fa-var-qrcode: \f029; $fa-var-question: \f128; $fa-var-question-circle: \f059; $fa-var-quidditch: \f458; $fa-var-quinscape: \f459; $fa-var-quora: \f2c4; $fa-var-quote-left: \f10d; $fa-var-quote-right: \f10e; $fa-var-quran: \f687; $fa-var-r-project: \f4f7; $fa-var-radiation: \f7b9; $fa-var-radiation-alt: \f7ba; $fa-var-rainbow: \f75b; $fa-var-random: \f074; $fa-var-raspberry-pi: \f7bb; $fa-var-ravelry: \f2d9; $fa-var-react: \f41b; $fa-var-reacteurope: \f75d; $fa-var-readme: \f4d5; $fa-var-rebel: \f1d0; $fa-var-receipt: \f543; $fa-var-recycle: \f1b8; $fa-var-red-river: \f3e3; $fa-var-reddit: \f1a1; $fa-var-reddit-alien: \f281; $fa-var-reddit-square: \f1a2; $fa-var-redhat: \f7bc; $fa-var-redo: \f01e; $fa-var-redo-alt: \f2f9; $fa-var-registered: \f25d; $fa-var-remove-format: \f87d; $fa-var-renren: \f18b; $fa-var-reply: \f3e5; $fa-var-reply-all: \f122; $fa-var-replyd: \f3e6; $fa-var-republican: \f75e; $fa-var-researchgate: \f4f8; $fa-var-resolving: \f3e7; $fa-var-restroom: \f7bd; $fa-var-retweet: \f079; $fa-var-rev: \f5b2; $fa-var-ribbon: \f4d6; $fa-var-ring: \f70b; $fa-var-road: \f018; $fa-var-robot: \f544; $fa-var-rocket: \f135; $fa-var-rocketchat: \f3e8; $fa-var-rockrms: \f3e9; $fa-var-route: \f4d7; $fa-var-rss: \f09e; $fa-var-rss-square: \f143; $fa-var-ruble-sign: \f158; $fa-var-ruler: \f545; $fa-var-ruler-combined: \f546; $fa-var-ruler-horizontal: \f547; $fa-var-ruler-vertical: \f548; $fa-var-running: \f70c; $fa-var-rupee-sign: \f156; $fa-var-sad-cry: \f5b3; $fa-var-sad-tear: \f5b4; $fa-var-safari: \f267; $fa-var-salesforce: \f83b; $fa-var-sass: \f41e; $fa-var-satellite: \f7bf; $fa-var-satellite-dish: \f7c0; $fa-var-save: \f0c7; $fa-var-schlix: \f3ea; $fa-var-school: \f549; $fa-var-screwdriver: \f54a; $fa-var-scribd: \f28a; $fa-var-scroll: \f70e; $fa-var-sd-card: \f7c2; $fa-var-search: \f002; $fa-var-search-dollar: \f688; $fa-var-search-location: \f689; $fa-var-search-minus: \f010; $fa-var-search-plus: \f00e; $fa-var-searchengin: \f3eb; $fa-var-seedling: \f4d8; $fa-var-sellcast: \f2da; $fa-var-sellsy: \f213; $fa-var-server: \f233; $fa-var-servicestack: \f3ec; $fa-var-shapes: \f61f; $fa-var-share: \f064; $fa-var-share-alt: \f1e0; $fa-var-share-alt-square: \f1e1; $fa-var-share-square: \f14d; $fa-var-shekel-sign: \f20b; $fa-var-shield-alt: \f3ed; $fa-var-ship: \f21a; $fa-var-shipping-fast: \f48b; $fa-var-shirtsinbulk: \f214; $fa-var-shoe-prints: \f54b; $fa-var-shopping-bag: \f290; $fa-var-shopping-basket: \f291; $fa-var-shopping-cart: \f07a; $fa-var-shopware: \f5b5; $fa-var-shower: \f2cc; $fa-var-shuttle-van: \f5b6; $fa-var-sign: \f4d9; $fa-var-sign-in-alt: \f2f6; $fa-var-sign-language: \f2a7; $fa-var-sign-out-alt: \f2f5; $fa-var-signal: \f012; $fa-var-signature: \f5b7; $fa-var-sim-card: \f7c4; $fa-var-simplybuilt: \f215; $fa-var-sistrix: \f3ee; $fa-var-sitemap: \f0e8; $fa-var-sith: \f512; $fa-var-skating: \f7c5; $fa-var-sketch: \f7c6; $fa-var-skiing: \f7c9; $fa-var-skiing-nordic: \f7ca; $fa-var-skull: \f54c; $fa-var-skull-crossbones: \f714; $fa-var-skyatlas: \f216; $fa-var-skype: \f17e; $fa-var-slack: \f198; $fa-var-slack-hash: \f3ef; $fa-var-slash: \f715; $fa-var-sleigh: \f7cc; $fa-var-sliders-h: \f1de; $fa-var-slideshare: \f1e7; $fa-var-smile: \f118; $fa-var-smile-beam: \f5b8; $fa-var-smile-wink: \f4da; $fa-var-smog: \f75f; $fa-var-smoking: \f48d; $fa-var-smoking-ban: \f54d; $fa-var-sms: \f7cd; $fa-var-snapchat: \f2ab; $fa-var-snapchat-ghost: \f2ac; $fa-var-snapchat-square: \f2ad; $fa-var-snowboarding: \f7ce; $fa-var-snowflake: \f2dc; $fa-var-snowman: \f7d0; $fa-var-snowplow: \f7d2; $fa-var-socks: \f696; $fa-var-solar-panel: \f5ba; $fa-var-sort: \f0dc; $fa-var-sort-alpha-down: \f15d; $fa-var-sort-alpha-down-alt: \f881; $fa-var-sort-alpha-up: \f15e; $fa-var-sort-alpha-up-alt: \f882; $fa-var-sort-amount-down: \f160; $fa-var-sort-amount-down-alt: \f884; $fa-var-sort-amount-up: \f161; $fa-var-sort-amount-up-alt: \f885; $fa-var-sort-down: \f0dd; $fa-var-sort-numeric-down: \f162; $fa-var-sort-numeric-down-alt: \f886; $fa-var-sort-numeric-up: \f163; $fa-var-sort-numeric-up-alt: \f887; $fa-var-sort-up: \f0de; $fa-var-soundcloud: \f1be; $fa-var-sourcetree: \f7d3; $fa-var-spa: \f5bb; $fa-var-space-shuttle: \f197; $fa-var-speakap: \f3f3; $fa-var-speaker-deck: \f83c; $fa-var-spell-check: \f891; $fa-var-spider: \f717; $fa-var-spinner: \f110; $fa-var-splotch: \f5bc; $fa-var-spotify: \f1bc; $fa-var-spray-can: \f5bd; $fa-var-square: \f0c8; $fa-var-square-full: \f45c; $fa-var-square-root-alt: \f698; $fa-var-squarespace: \f5be; $fa-var-stack-exchange: \f18d; $fa-var-stack-overflow: \f16c; $fa-var-stackpath: \f842; $fa-var-stamp: \f5bf; $fa-var-star: \f005; $fa-var-star-and-crescent: \f699; $fa-var-star-half: \f089; $fa-var-star-half-alt: \f5c0; $fa-var-star-of-david: \f69a; $fa-var-star-of-life: \f621; $fa-var-staylinked: \f3f5; $fa-var-steam: \f1b6; $fa-var-steam-square: \f1b7; $fa-var-steam-symbol: \f3f6; $fa-var-step-backward: \f048; $fa-var-step-forward: \f051; $fa-var-stethoscope: \f0f1; $fa-var-sticker-mule: \f3f7; $fa-var-sticky-note: \f249; $fa-var-stop: \f04d; $fa-var-stop-circle: \f28d; $fa-var-stopwatch: \f2f2; $fa-var-store: \f54e; $fa-var-store-alt: \f54f; $fa-var-strava: \f428; $fa-var-stream: \f550; $fa-var-street-view: \f21d; $fa-var-strikethrough: \f0cc; $fa-var-stripe: \f429; $fa-var-stripe-s: \f42a; $fa-var-stroopwafel: \f551; $fa-var-studiovinari: \f3f8; $fa-var-stumbleupon: \f1a4; $fa-var-stumbleupon-circle: \f1a3; $fa-var-subscript: \f12c; $fa-var-subway: \f239; $fa-var-suitcase: \f0f2; $fa-var-suitcase-rolling: \f5c1; $fa-var-sun: \f185; $fa-var-superpowers: \f2dd; $fa-var-superscript: \f12b; $fa-var-supple: \f3f9; $fa-var-surprise: \f5c2; $fa-var-suse: \f7d6; $fa-var-swatchbook: \f5c3; $fa-var-swimmer: \f5c4; $fa-var-swimming-pool: \f5c5; $fa-var-symfony: \f83d; $fa-var-synagogue: \f69b; $fa-var-sync: \f021; $fa-var-sync-alt: \f2f1; $fa-var-syringe: \f48e; $fa-var-table: \f0ce; $fa-var-table-tennis: \f45d; $fa-var-tablet: \f10a; $fa-var-tablet-alt: \f3fa; $fa-var-tablets: \f490; $fa-var-tachometer-alt: \f3fd; $fa-var-tag: \f02b; $fa-var-tags: \f02c; $fa-var-tape: \f4db; $fa-var-tasks: \f0ae; $fa-var-taxi: \f1ba; $fa-var-teamspeak: \f4f9; $fa-var-teeth: \f62e; $fa-var-teeth-open: \f62f; $fa-var-telegram: \f2c6; $fa-var-telegram-plane: \f3fe; $fa-var-temperature-high: \f769; $fa-var-temperature-low: \f76b; $fa-var-tencent-weibo: \f1d5; $fa-var-tenge: \f7d7; $fa-var-terminal: \f120; $fa-var-text-height: \f034; $fa-var-text-width: \f035; $fa-var-th: \f00a; $fa-var-th-large: \f009; $fa-var-th-list: \f00b; $fa-var-the-red-yeti: \f69d; $fa-var-theater-masks: \f630; $fa-var-themeco: \f5c6; $fa-var-themeisle: \f2b2; $fa-var-thermometer: \f491; $fa-var-thermometer-empty: \f2cb; $fa-var-thermometer-full: \f2c7; $fa-var-thermometer-half: \f2c9; $fa-var-thermometer-quarter: \f2ca; $fa-var-thermometer-three-quarters: \f2c8; $fa-var-think-peaks: \f731; $fa-var-thumbs-down: \f165; $fa-var-thumbs-up: \f164; $fa-var-thumbtack: \f08d; $fa-var-ticket-alt: \f3ff; $fa-var-times: \f00d; $fa-var-times-circle: \f057; $fa-var-tint: \f043; $fa-var-tint-slash: \f5c7; $fa-var-tired: \f5c8; $fa-var-toggle-off: \f204; $fa-var-toggle-on: \f205; $fa-var-toilet: \f7d8; $fa-var-toilet-paper: \f71e; $fa-var-toolbox: \f552; $fa-var-tools: \f7d9; $fa-var-tooth: \f5c9; $fa-var-torah: \f6a0; $fa-var-torii-gate: \f6a1; $fa-var-tractor: \f722; $fa-var-trade-federation: \f513; $fa-var-trademark: \f25c; $fa-var-traffic-light: \f637; $fa-var-train: \f238; $fa-var-tram: \f7da; $fa-var-transgender: \f224; $fa-var-transgender-alt: \f225; $fa-var-trash: \f1f8; $fa-var-trash-alt: \f2ed; $fa-var-trash-restore: \f829; $fa-var-trash-restore-alt: \f82a; $fa-var-tree: \f1bb; $fa-var-trello: \f181; $fa-var-tripadvisor: \f262; $fa-var-trophy: \f091; $fa-var-truck: \f0d1; $fa-var-truck-loading: \f4de; $fa-var-truck-monster: \f63b; $fa-var-truck-moving: \f4df; $fa-var-truck-pickup: \f63c; $fa-var-tshirt: \f553; $fa-var-tty: \f1e4; $fa-var-tumblr: \f173; $fa-var-tumblr-square: \f174; $fa-var-tv: \f26c; $fa-var-twitch: \f1e8; $fa-var-twitter: \f099; $fa-var-twitter-square: \f081; $fa-var-typo3: \f42b; $fa-var-uber: \f402; $fa-var-ubuntu: \f7df; $fa-var-uikit: \f403; $fa-var-umbrella: \f0e9; $fa-var-umbrella-beach: \f5ca; $fa-var-underline: \f0cd; $fa-var-undo: \f0e2; $fa-var-undo-alt: \f2ea; $fa-var-uniregistry: \f404; $fa-var-universal-access: \f29a; $fa-var-university: \f19c; $fa-var-unlink: \f127; $fa-var-unlock: \f09c; $fa-var-unlock-alt: \f13e; $fa-var-untappd: \f405; $fa-var-upload: \f093; $fa-var-ups: \f7e0; $fa-var-usb: \f287; $fa-var-user: \f007; $fa-var-user-alt: \f406; $fa-var-user-alt-slash: \f4fa; $fa-var-user-astronaut: \f4fb; $fa-var-user-check: \f4fc; $fa-var-user-circle: \f2bd; $fa-var-user-clock: \f4fd; $fa-var-user-cog: \f4fe; $fa-var-user-edit: \f4ff; $fa-var-user-friends: \f500; $fa-var-user-graduate: \f501; $fa-var-user-injured: \f728; $fa-var-user-lock: \f502; $fa-var-user-md: \f0f0; $fa-var-user-minus: \f503; $fa-var-user-ninja: \f504; $fa-var-user-nurse: \f82f; $fa-var-user-plus: \f234; $fa-var-user-secret: \f21b; $fa-var-user-shield: \f505; $fa-var-user-slash: \f506; $fa-var-user-tag: \f507; $fa-var-user-tie: \f508; $fa-var-user-times: \f235; $fa-var-users: \f0c0; $fa-var-users-cog: \f509; $fa-var-usps: \f7e1; $fa-var-ussunnah: \f407; $fa-var-utensil-spoon: \f2e5; $fa-var-utensils: \f2e7; $fa-var-vaadin: \f408; $fa-var-vector-square: \f5cb; $fa-var-venus: \f221; $fa-var-venus-double: \f226; $fa-var-venus-mars: \f228; $fa-var-viacoin: \f237; $fa-var-viadeo: \f2a9; $fa-var-viadeo-square: \f2aa; $fa-var-vial: \f492; $fa-var-vials: \f493; $fa-var-viber: \f409; $fa-var-video: \f03d; $fa-var-video-slash: \f4e2; $fa-var-vihara: \f6a7; $fa-var-vimeo: \f40a; $fa-var-vimeo-square: \f194; $fa-var-vimeo-v: \f27d; $fa-var-vine: \f1ca; $fa-var-vk: \f189; $fa-var-vnv: \f40b; $fa-var-voicemail: \f897; $fa-var-volleyball-ball: \f45f; $fa-var-volume-down: \f027; $fa-var-volume-mute: \f6a9; $fa-var-volume-off: \f026; $fa-var-volume-up: \f028; $fa-var-vote-yea: \f772; $fa-var-vr-cardboard: \f729; $fa-var-vuejs: \f41f; $fa-var-walking: \f554; $fa-var-wallet: \f555; $fa-var-warehouse: \f494; $fa-var-water: \f773; $fa-var-wave-square: \f83e; $fa-var-waze: \f83f; $fa-var-weebly: \f5cc; $fa-var-weibo: \f18a; $fa-var-weight: \f496; $fa-var-weight-hanging: \f5cd; $fa-var-weixin: \f1d7; $fa-var-whatsapp: \f232; $fa-var-whatsapp-square: \f40c; $fa-var-wheelchair: \f193; $fa-var-whmcs: \f40d; $fa-var-wifi: \f1eb; $fa-var-wikipedia-w: \f266; $fa-var-wind: \f72e; $fa-var-window-close: \f410; $fa-var-window-maximize: \f2d0; $fa-var-window-minimize: \f2d1; $fa-var-window-restore: \f2d2; $fa-var-windows: \f17a; $fa-var-wine-bottle: \f72f; $fa-var-wine-glass: \f4e3; $fa-var-wine-glass-alt: \f5ce; $fa-var-wix: \f5cf; $fa-var-wizards-of-the-coast: \f730; $fa-var-wolf-pack-battalion: \f514; $fa-var-won-sign: \f159; $fa-var-wordpress: \f19a; $fa-var-wordpress-simple: \f411; $fa-var-wpbeginner: \f297; $fa-var-wpexplorer: \f2de; $fa-var-wpforms: \f298; $fa-var-wpressr: \f3e4; $fa-var-wrench: \f0ad; $fa-var-x-ray: \f497; $fa-var-xbox: \f412; $fa-var-xing: \f168; $fa-var-xing-square: \f169; $fa-var-y-combinator: \f23b; $fa-var-yahoo: \f19e; $fa-var-yammer: \f840; $fa-var-yandex: \f413; $fa-var-yandex-international: \f414; $fa-var-yarn: \f7e3; $fa-var-yelp: \f1e9; $fa-var-yen-sign: \f157; $fa-var-yin-yang: \f6ad; $fa-var-yoast: \f2b1; $fa-var-youtube: \f167; $fa-var-youtube-square: \f431; $fa-var-zhihu: \f63f;
{ "pile_set_name": "Github" }
/* Copyright (c) 2007 Stefan Engelke <mbox@stefanengelke.de> Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. $Id$ */ #ifndef _MIRF_H_ #define _MIRF_H_ #include <Arduino.h> #include "nRF24L01.h" #include "MirfSpiDriver.h" // Nrf24l settings #define mirf_ADDR_LEN 5 #define mirf_CONFIG ((1<<EN_CRC) | (0<<CRCO) ) class Nrf24l { public: Nrf24l(); void init(); void config(); void send(uint8_t *value); void setRADDR(uint8_t * adr); void setTADDR(uint8_t * adr); bool dataReady(); bool isSending(); bool rxFifoEmpty(); bool txFifoEmpty(); void getData(uint8_t * data); uint8_t getStatus(); void transmitSync(uint8_t *dataout,uint8_t len); void transferSync(uint8_t *dataout,uint8_t *datain,uint8_t len); void configRegister(uint8_t reg, uint8_t value); void readRegister(uint8_t reg, uint8_t * value, uint8_t len); void writeRegister(uint8_t reg, uint8_t * value, uint8_t len); void powerUpRx(); void powerUpTx(); void powerDown(); void csnHi(); void csnLow(); void ceHi(); void ceLow(); void flushRx(); /* * In sending mode. */ uint8_t PTX; /* * CE Pin controls RX / TX, default 8. */ uint8_t cePin; /* * CSN Pin Chip Select Not, default 7. */ uint8_t csnPin; /* * Channel 0 - 127 or 0 - 84 in the US. */ uint8_t channel; /* * Payload width in bytes default 16 max 32. */ uint8_t payload; /* * Spi interface (must extend spi). */ MirfSpiDriver *spi; }; extern Nrf24l Mirf; #endif /* _MIRF_H_ */
{ "pile_set_name": "Github" }
On weekends, Parker likes to spend time with his girlfriend in Charlotte Name: Evan Parker Position: NASCAR Managing Dir of Content Strategy Where I’m from: L.A. Where I call home: Charlotte Focusing on right now: Trying to bring together a couple of groups that have been doing great work in their own silos. The one larger content group will do everything from our social media, to all the editorial on nascar.com to brand new content with our partners. Best advice: I was home last week for my grandfather’s 100th birthday. He always tells me, "Be happy, work hard and get plenty of exercise." I know it’s simple advice, but if it’s got him to 100 years, I can’t argue with it. Must have for a new hire: The biggest thing for me is somebody who is really a team player and easy to work with. At NASCAR and in the sports industry, you get a lot more done if people want to work with you and if you have respect. It doesn’t matter how talented or smart you are. If people don’t like working with you, you’re not going to be successful. Execs I admire: STEVE PHELPS and JILL GREGORY at NASCAR have been huge mentors to me, and they’ve been able to put me in great positions and teach me a lot. KENNY MITCHELL, who’s now with Gatorade but used to be at NASCAR, taught me to really think outside the box and push boundaries. DAVID FREEMAN, who’s now at CAA, is the first person who really taught me how to sell. Book shelf: I just finished, “RIVER OF DOUBT.” It was about TEDDY ROOSEVELT mapping a river through the Amazon after he was out of the White House. And I just finished “MAN’S SEARCH FOR MEANING” by VIKTOR FRANKL. I don’t read business books, but I like to read a lot of nonfiction and history books about impressive people. Talking tech: It’s a daily challenge to stay on top of all the different ways we can give people content about NASCAR, whether it’s in 140 characters or a video or a long-form article or mobile alert. It seems like every day, it’s changing, with Amazon getting into the space a little more, and as phones evolve. Must-have music: I’m probably single-handedly lowering the age demo for STEELY DAN. But I’m all over the place. A lot of indie rock, like ST. PAUL & THE BROKEN BONES or TENNIS. I grew up on rap and hip hop, so BLACK STAR and PEOPLE UNDER THE STAIRS, PETE ROCK. Since I’ve moved to Charlotte, I’ve had to listen to country, and I can stomach MARSHALL TUCKER BAND, CHRIS STAPLETON and YARN. Food for thought: When I moved to Charlotte, I quickly gained 40 pounds eating barbecue at Midwood Smokehouse and drinking a lot of IPAs. So I’ve had to get a little smarter, switching from heavy IPAs back to Coors Light. The only thing I refuse to eat is coconut. I’m pretty much a garbage disposal, but I think that coconut is probably the worst thing on Earth. First thing in the morning: I try to get some exercise, clear my mind and think about the day. Then as soon as I get to the office, it’s consuming as much content as I can, not just about NASCAR. It’s SBD, Ad Age, Variety, getting an idea of what’s happening in the marketplace. How I unwind: On the weekends, I love nothing more than a solitary breakfast, sitting alone with a book or whatever I’m reading. My girlfriend works in sports as well, for the Hornets. So we don’t have that many weekends where we’re both away from our respective sports. But when we do, it’s taking the dogs to the dog park. I collect vintage watches, so I spend a good amount of time indulging that, researching them or going to shops and checking out watches. Day in the life: This is a new role and a new team. The biggest challenge is combining all these different groups that have always operated separately into one. There’s not a real road map now. News breaks 100 times a day in the NASCAR world. As much as you plan, something can pop up that you have to adapt for.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention The present invention relates to an elevator information communication system for notifying an elevator entrance or the cage of an elevator of information. 2. Description of the Related Art In general, in an elevator information communication system, two types of data are communicated. One of them is information-system data communication, i.e., notification data, such as a message, and the other is control-system data for communicating a notification command for selecting notification data depending on the state of an elevator, to supply the notification data at a good timing. Since the information-system data includes a message or the like, the information-system data is large in amount, and the time required to change the information-system data may be relatively long. The control-system data consists of predetermined code data or the like. The control-system data is small in amount, and the control-system data is allowed to be delayed slightly. For this reason, in a conventional elevator information communication system, two types of cables, i.e., a control-system data communication cable and an information-system data communication cable extending to an elevator entrance or the cage of an elevator are arranged according to data which are different in quality, and the different data are communicated through these cables. A conventional elevator information communication system will be described below with reference to FIG. 33 and FIGS. 34A and 34B. FIG. 33 is a block diagram showing the entire configuration of the elevator information communication system, and FIGS. 34A and 34B are time charts of communication path data of a control-system cable 6 and an information-system cable 5 of the conventional elevator information communication system. Here, an information input device 1 is constituted by a notebook computer or the like. Data can be input with a keyboard or the like (e.g., a CE connects the personal computer to the information-system cable 5 to perform updating or the like of notification data). In FIG. 33, notification data 200 input by the information input device 1 is input to notification devices 3-1 to 3n through the information-system cable 5 and stored by storage means 31-1 to 31-n. In FIG. 41, the notification data 200 consists of a selector 210 for selecting the notification devices 3-1 to 3-n, a command 220 for message updating, time correction, and the like, and data 230. The data 230 in message updating consists of a message number 231, a text length 232, and text data 233. A serial communication scheme using a start-stop transmission scheme is used as a communication scheme to add BCC data or the like for checking the rationality of communication data. With respect to a notification command, for example, it is assumed that a message number 3 is defined as a crowded condition notification (corresponding to the message number 231 and the concrete example thereof), an elevator control device 2 detects a crowded condition to output a notification command 100 in which the selector 101, the command 102, and the data 103, are defined as the notification device 3-1 of the cage, a message display, and the message number 3, respectively. This notification command 100 is input to the notification devices 3-1 to 3-n through the control-system cable 6. Since the notification device 3-1 of the cage is defined as the selector 101, the message of the message number 3 is displayed by a display means 32-1. On the other hand, the notification command 100 is also input to the notification devices 3-2 to 3-n of the elevator entrance. However, since each of the notification devices 3-2 to 3-n do not correspond to the selector 101, the notification devices 3-2 to 3-n neglect the notification command 100 and do no t perform any operation. Here, when the information input device 1 and each of the notification devices 3-1 to 3-n are connected to each other at a ratio of 1 : 1, the selector 210 is not necessary, and each of the notification devices 3-1 to 3-n returns a reply representing whether reception is normally performed. Data is generally re-output from the information input device 1 to the notification devices 3-1 to 3-n in which reception is not normally performed. However, in the configuration in FIG. 40, when replies are given by the notification devices 3-1 to 3n, a plurality of replies conflict with each other. For this reason, the replies cannot be identified by the information input device 1. In the conflict of replies, a method of changing the response timings of the notification devices 3-1 to 3-n from each other or a method of selecting one of the notification devices 3-1 to 3-n from the information input device 1 to check them may be used. However, a cumbersome setting must be performed, and a long communication time is disadvantageously required. For this reason, the replies from the notification devices 3-1 to 3-n are eliminated, and data is repeatedly output from the information input device 1 twice, so that the reliability is assured. An example of the system in which a serial transmission cable in an elevator way is eliminated will be introduced. As described in Japanese Unexamined Patent Application Publication No. 6-87580, a packet transmission control device is installed, notification data from an information input device is stored in the packet transmission control device, and the notification data is transmitted from the packet transmission control device to a notification device when the operation of the elevator is idle. As described in Japanese Patent No. 2700404, fixed information is transmitted as the first series of data, and a block of arbitrary information divided into a plurality of fixed-length blocks is transmitted as the second series of data. In the conventional elevator information communication system, an information-system cable for transmitting a large amount of notification data such as image data, character data, and audio data and a control-system cable for transmitting a notification command having a small amount of data must be installed in the elevator way. For this reason, the system is very expensive, disadvantageously. In order to output notification data from the information input device to each notification device, the notification data must be repeatedly output twice in vain although transmission error rate is very low. The scheme described in Japanese Unexamined Patent Publication No. 6-87580 is expensive because a packet transmission control device must be additionally installed, and disadvantageously requires a long time to input notification data output from an information input device to notification devices. In a scheme in Japanese Patent No. 2700404, a notification command and notification data are transmitted in a fixed length. For this reason, even if the notification command is not required to be output, the notification data cannot be efficiently transmitted. The present invention has been made to solve the above problems, and has as its object to obtain an elevator information communication system in which the number of communication cables can be reduced with a simple configuration without arranging a dedicated device such as a packet transmission control device to efficiently perform communication at a low cost. In consideration of the object, according to the first aspect of the present invention, there is provided an elevator information communication system including a notification device arranged in the elevator system, an information input device for forming notification data to the notification device to input the notification data, and an elevator control device connected to the notification device to output a notification command and having relay means connected to the information input device to relay the notification data input from the information input device to the notification device. According to the second aspect of the present invention, there is provided an elevator information communication system according to the first aspect wherein the elevator control device includes switching means for adding non-transmission time and identification data to data and outputting the data in order to identify a notification command from the elevator control device and the notification data from the information input device by the information device. According to the third aspect of the present invention, there is provided an elevator information communication system according to the first or second aspect wherein the elevator device includes command means for, when a notification command is generated during outputting of notification data from the information input means, interrupting the outputting of the notification data. According to the fourth aspect of the present invention, there is provided an elevator information communication system according to one of the first to third aspects wherein the elevator control device changes notification data into a packet to output the packet, and the notification device includes restoration means for restoring interrupted notification data into original notification data. According to the fifth aspect of the present invention, there is provided an elevator information communication system according to one of the first to fourth aspects wherein the notification device includes reply means for generating a resending request when input notification data is abnormal, and the information input device includes resending means for resending the notification data according to the resending request. According to the sixth aspect of the present invention, there is provided an elevator information communication system according to one of the first to fifth aspects wherein the information input device includes scanning means for checking a notification device which is powered off and broken, and the notification device includes response means for making a check response to the check. According to the seventh aspect of the present invention, there is provided an elevator information communication system according to the sixth aspect wherein the information input device detects the notification device added by the scanning means, and includes re-output means for further outputting un-output notification data to set necessary notification data in the added notification device. According to the eighth aspect of the present invention, there is provided an elevator information communication system including a notification device arranged in the elevator system, an elevator control device connected to the notification device to output a notification command, and an information input device connected to the notification device to form notification data for the notification device and to input the notification, wherein the notification device includes relay means for generating a resending request when the input notification data is abnormal, and the information input device includes resending means for resending the notification data according to the resending request. According to the ninth aspect of the present invention, there is provided an elevator information communication system according to the eighth aspect wherein the information input device includes scanning means for checking a notification device which is powered off and broken, and the notification device includes response means for making a check response to the check. According to the tenth aspect of the present invention, there is provided an elevator information communication system wherein the information input device detects the notification device added by the scanning means, and includes re-output means for further outputting un-output notification data to set necessary notification data in the added notification device.
{ "pile_set_name": "USPTO Backgrounds" }
Recombinant PfEMP1 peptide inhibits and reverses cytoadherence of clinical Plasmodium falciparum isolates in vivo. The parasite ligand Plasmodium falciparum erythrocyte membrane protein 1 (PfEMP1) and host endothelial receptors represent potential targets for antiadhesive therapy for cytoadherence. In the present study, the major host receptor CD36 was targeted in vitro and in vivo with a recombinant peptide, PpMC-179, corresponding to the minimal CD36-binding domain from the cysteine-rich interdomain region 1 (CIDR1) within the MCvar1 PfEMP1. The in vitro inhibitory effect of PpMC-179 on human dermal microvascular endothelial cells (HDMECs) expressing multiple relevant adhesion molecules was investigated using a parallel-plate flow chamber. Pretreatment of endothelial monolayers with PpMC-179 (2 microM) inhibited the adhesion of infected erythrocytes (IRBCs) from all clinical isolates tested by 84.4% on resting and 62.8% on tumor necrosis factor alpha (TNF-alpha)-stimulated monolayers. Adhesion to stimulated cells was further inhibited (90.4%) when PpMC-179 was administered with an inhibitory anti-intercellular adhesion molecule 1 (ICAM-1) monoclonal antibody 84H10 (5 microg/mL). To determine the in vivo effectiveness of PpMC-179, we used a human/severe combined immunodeficiency (SCID) mouse chimeric model that allowed direct visualization of cytoadherence on intact human microvasculature. In unstimulated skin grafts, PpMC-179 inhibited adhesion by 86.3% and by 84.6% in TNF-alpha-stimulated skin grafts. More importantly, PpMC-179 administration resulted in the detachment of already adherent IRBCs by 80.7% and 83.3% on resting and stimulated skin grafts, respectively. The antiadhesive effect of PpMC-179 was rapid and sustained in vivo for at least 30 minutes. Our data indicate that targeting cytoadhesion in vivo is feasible and may offer a rapid antimalarial therapy.
{ "pile_set_name": "PubMed Abstracts" }
Regional Darul Ifta’ of Bangsamoro The Regional Darul Ifta' of the Bangsamoro Autonomous Region in Muslim Mindanao (RDI–BARMM) is an Islamic advisory council which has jurisdiction over Bangsamoro. History The Regional Darul Ifta (RDI) of Bangsamoro was created during the existence of the Autonomous Region in Muslim Mindanao. Then-ARMM Regional Governor Mujiv Hataman institutionalized Islamic jurisconsult in the region when he issued Executive Order 9, series of 2014 on September 2013 which created a transitional office of the jurisconsult that would oversee religious activities in ARMM as well as the propagation of Islam. The office was a temporary one with the Regional Legislative Assembly considering to establish a permanent jurisconsult body. The Muslim Mindanao Autonomy Act No. 323 signed by Governor Hataman in 2015 superseded Executive Order 9. The legislation established the Regional Darul Ifta' of the Autonomous Region in Muslim Mindanao as the Islamic religious authority in the region to deal with issues and concerns of the region's Muslim population. The implementing rules and regulations (IRR) for the legislation establishing the RDI became effective in March 2017. The Islamic body remained extant when the ARMM was succeeded by the Bangsamoro Autonomous Region in Muslim Mindanao (BARMM). Function The Regional Darul Ifta of Bangsamoro's primary role is the promulgation and issuance of fatwa or legal opinions concerning Muslim personal laws as well as jurisprudence with the Article VIII, Section 20 of Republic Act 9054 as the basis for this function. Republic Act 9054 tackles the expansion of the Organic Act of the ARMM. The jurisconsult body also has an advisory role, serving as a consultant to the Bangsamoro regional government in affairs related to Islamic laws, jurisprudence and ecclesiastical matters as well as the religious guide for the region's politicians, government employees and professionals. Structure The Muslim Mindanao Autonomy Act No. 323 mandates the establishment of provincial offices in the then-extant ARMM which should be headed by a provincial mufti selected among the resident Ulama of the relevant province. References Category:Islam in the Philippines Category:Politics of Bangsamoro Category:Islamic organizations based in the Philippines
{ "pile_set_name": "Wikipedia (en)" }
Transapical aortic valve implantation at 3 years. Our objective was to analyze the results of transapical aortic valve implantation in high-risk patients with aortic stenosis at up to 3 years after the procedure. A total of 299 patients underwent transapical aortic valve implantation from February 2006 until January 2010 using the Edwards SAPIEN transcatheter xenograft. Mean patient age was 82 ± 6 years and 70% were female. Logistic EuroSCORE and Society of Thoracic Surgeons score predicted risks for mortality were 31% ± 16% and 12% ± 8%, respectively. All patients were treated in a hybrid operative theater by a team of anesthetists, cardiologists and cardiac surgeons. Successful valve implantation was performed in all patients. Transapical aortic valve implantation was uneventful in 267 patients (89.3%), whereas 32 patients (10.7%) required additional interventions. Such interventions included cardiopulmonary bypass support in 18, implantation of a second SAPIEN valve in 15, coronary intervention in 9, conversion to conventional surgery in 6, and annulus perforation in 3 patients (not mutually exclusive). Intraprocedural stroke was not observed in any patient, although 2 (0.7%) patients had a delayed stroke during their hospital stay. Overall survival was 91% at 30 days, 73% at 1 year, 68% at 2 years, and 58% at 3 years. Transapical aortic valve implantation can be performed with good outcomes in high-risk patients with aortic stenosis. Perioperative complications occur in approximately 10% of patients, and a variety of interventions are required for these events. We believe a team approach is therefore essential for the success of transapical aortic valve implantation.
{ "pile_set_name": "PubMed Abstracts" }
Background ========== The obesity epidemic in Australia is generally monitored by the proportion of the population whose body mass index (BMI) exceeds 30 kg/m^2^\[[@B1]\]. However, what is not as evident is the growing proportion of those who are morbidly obese. This issue is important as adverse health risks and healthcare expenditure amplify as the level of obesity increases \[[@B2]\]. Obesity-related health expenditure in Australia exceeded \$8 billion in 2008, which included expenditure associated with metabolic disease, cardiac disease and surgical complications \[[@B3]\], but it is unclear how much of this expenditure related to different levels of obesity. Service providers are increasingly having to invest in equipment designed to accommodate the morbidly obese. It seems that both direct and indirect costs will amplify as the prevalence of morbid obesity increases. In Australia, few, if any, studies have described the pattern of morbid obesity in the population. Thus, we aimed to document changes in the prevalence of morbid obesity (BMI ≥ 40.0 kg/m^2^) that have occurred over a decade among women living in south-eastern Australia. Methods ======= Subjects -------- The Geelong Osteoporosis Study (GOS) is a population-based cohort study of adults aged 20 years and over, randomly-selected from the Commonwealth electoral rolls for the Barwon Statistical Division in south-eastern Australia \[[@B4]\]. In Australia, the electoral roll is a register of all eligible voters and provides the most comprehensive available list of adult Australian citizens. At baseline, an age-stratified sample was recruited so that there were approximately 100 individuals for each 5-year age-group 20--24, 25--29, 30--34, 35--39, 40--44, 45--49, 50--54, 55--59, 60--64 and 65--69 years, and approximately 200 individuals for each of the age groups 70--79 years and 80 years and older. Baseline assessments for women enrolled in the GOS occurred during the period 1993--7 (1,494 recruited, 77% response) and again approximately a decade later, 2004--8 (882 of the eligible women were assessed at the 10-year follow-up with 82% response). A further sample of 194 women aged 20--29 years was also randomly generated using the same methods employed for the baseline recruitment (2005--8, 82% response) and included in this study. Thus, data from 1,076 women were included in analyses for the 2004--8 time period. Most of the cohort (99%) was Caucasian; details of the study have been provided elsewhere \[[@B4]\]. All participants gave written, informed consent. The Barwon Health Human Research Ethics Committee approved the study. Weight was measured to the nearest 0.1 kg using electronic scales, standing height was measured to the nearest 0.001 m using a wall-mounted stadiometer and BMI expressed as weight/height^2^ (kg/m^2^). An adult with a BMI of 40.0 kg/m^2^ or over is described as being morbidly obese (class III obesity) but the term can also refer to those who have a BMI over 35 kg/m^2^ with obesity-related co-morbidities \[[@B5]\]. We identified morbid obesity using BMI criteria alone. Class II obesity corresponded to BMI 35.0-39.9 kg/m^2^, class I obesity to BMI 30.0-34.9 kg/m^2^, overweight to BMI 25.0-29.9 kg/m^2^, normal weight to BMI 18.5-24.9 kg/m^2^ and underweight to BMI \<18.5 kg/m^2^\[[@B6]\]. Area-based socioeconomic status (SES) was determined using the Socio-Economic Index for Areas (SEIFA) values based on census data (for 1996 for 1993--7; and for 2006 for 2004--8) from the Australian Bureau of Statistics (ABS). SEIFA values were used to assign an Index of Relative Socioeconomic Disadvantage, which was categorised into quintiles according to cut-off points for the study region. Statistical analysis -------------------- In order to compare the prevalence of each BMI category in 1993--7 and 2004--8, both time period datasets were stratified into age-groups and age-standardised to the 2006 census population figures for the Barwon Statistical Division (ABS Catalogue No. 2001.0). The standardized morbidity ratio (SMR) for morbid obesity was calculated using the 2004--8 dataset as the standard. The distribution of BMI was skewed, but was normalised by natural log-transformation. Differences in mean BMI between the two time periods were determined using linear regression models. The variable of interest was the period of assessment (1993--7 or 2004--8) and the models were adjusted for age and SES tested as a potential confounder. Differences in the likelihood of morbid obesity during the two time periods were determined using logistic regression models. The outcome was morbid obesity and the exposure variable of interest was the period of assessment; models were adjusted for age and SES tested as a confounder. This method enables a comparison of the likelihood of morbid obesity between women of the same age and SES in the different time periods. In the statistical models, interaction terms were tested as effect modifiers and retained in the model if p \< 0.05. Statistical analyses were performed using Minitab (version 15; Minitab, State College, PA). Results ======= Subject characteristics are shown in Table  [1](#T1){ref-type="table"}. The calculated age-adjusted geometric mean BMI increased from 26.0 kg/m^2^ (95%CI 25.7-26.3) in 1993--7, to 27.1 kg/m^2^ (95%CI 26.8-27.4) in 2004--8. The increase was observed across the age range, as evidenced by a non-significant age\*time-period interaction in the regression model. Similarly, no interaction was detected between SES and the time period, indicating that mean BMI increased consistently across the range of SES. ###### Subject characteristics for the two periods of assessment, 1993--7 and 2004--8   **1993-7** **2004-8** ------------------------------------------- ------------------ ------------------ Age (years); median (interquartile range) 54.2 (37.4-71.6) 51.1 (34.7-65.9) BMI categories\*; n (%)     morbid (class III) obesity 34 (2.3%) 44 (4.1%) class II obesity 75 (5.0%) 81 (7.5%) class I obesity 227 (15.2%) 191 (17.8%) overweight 494 (33.1%) 333 (31.0%) normal weight 635 (42.5%) 412 (38.3%) underweight 29 (1.9%) 15 (1.4%) \*BMI (kg/m^2^) for morbid (class III) obesity ≥40.0, class II obesity 35.0-39.9, class I obesity 30.0-34.9, overweight 25.0-29.9, normal weight 18.5-24.9, underweight \<18.5. For the period 1993--7, 34 (2.3%) women were identified as morbidly obese (class III obesity), 75 (5.0%) as class II obesity and 227 (15.2%) as class I obesity; there were 494 (33.1%) women classified as overweight; 635 (42.5%) as having normal weight and 29 (1.9%) as underweight (Table  [1](#T1){ref-type="table"}). A decade later, 2004--8, 44 (4.1%) women were morbidly obese (class III obesity), 81 (7.5%) were class II obesity, 191 (17.8%) were class I obesity, and 333 (31.0%) were overweight, 412 (38.3%) were of normal weight and 15 (1.4%) were underweight. The odds for morbid obesity were 76% greater in 2004--8 compared to 1994--7 (OR = 1.76, 95%CI 1.12-2.78). This association was sustained after adjusting for SES (data not shown) and found to be consistent across SES categories. The age-standardised prevalence for morbid obesity (class III obesity) was 2.5% for 1993--7 and 4.2% for 2004--7; prevalence figures for class II obesity were 5.6% and 7.3%, for class I obesity 15.1% and 17.6%, for overweight 31.8% and 30.8%, for normal weight 43.4% and 38.8%, and for underweight 1.6% and 1.3% (Figure  [1](#F1){ref-type="fig"}). The SMR for morbid obesity (class III obesity) was 1.69 (95%CI 1.26-2.27). ![**Title: The prevalence of overweight and obesity according to BMI, for women residing in south-eastern Australia during 1993--7 and 2004--8.** Legend: The stacked column histogram displays the prevalence of morbid (class III) obesity (BMI ≥ 40.0 kg/m^2^), class II obesity (BMI 35.0-39.9 kg/m^2^), class I obesity (BMI 30.0-34.9 kg/m^2^), overweight (BMI 25.0-29.9 kg/m^2^), normal weight (BMI 18.5-24.9 kg/m^2^), and underweight (BMI \< 18.5 kg/m^2^). Data are age-standardised to the 2006 census population figures for the Barwon Statistical Division (ABS Catalogue No. 2001.0) and presented for two time periods, 1993--7 and 2004--8.](1471-2458-13-290-1){#F1} Discussion ========== We report that mean BMI has increased by 4.2% among women during the decade between 1993--7 and 2004--8. A comparison of the prevalence of morbid obesity in 2004--8 with 1993--7 generated a SMR for morbid obesity between 1.26 and 2.27, demonstrating a measurable increase over this ten year time period. Because of the approximate bell-shaped distribution of BMI in the population, a shift of the distribution to higher BMI resulted in a marked proportional increase in the prevalence of the more extreme BMI values. Disproportionate increases in the more extreme categories of BMI have been similarly reported for adults in the USA between 2000 and 2005 \[[@B7]\]. Our results indicate that the increase in the proportion of morbid obesity was not restricted to particular ages or different SES groups. Greater adiposity, and unhealthy lifestyle choices associated with increased risk for obesity, have been observed with increasing social disadvantage \[[@B8]\]. It is curious that our current study showed an increase in the prevalence of morbid obesity to have occurred across the SES spectrum. We may speculate that the increase in morbid obesity affects the population as a whole, thus shifting the entire population distribution toward greater risk for obesity-related disease. However, given the small number of morbidly obese women in our study, there may have been insufficient power to conclusively test for SES differences and it is plausible that a larger sample size could show inequity in the rise of morbid obesity between SES groups. Either way, our data suggest that population-wide approaches that change the underlying conditions in which behaviours occur could be warranted to combat rising rates of morbid obesity for all sub-groups of the population. The strength of this study lies in the random nature of the study population and that the anthropometric measures used to calculate BMI were measured, rather than self-reported which would increase the potential for misclassification \[[@B9],[@B10]\]. However, it is possible that participation bias may have changed over time. It is not unreasonable that social stigma linked with obesity \[[@B11]\] may change as the obesity epidemic progresses, and we cannot exclude the possibility that this might have differentially impacted on participation at the two time periods. Moreover, limitations of BMI as an indicator of adiposity have previously been demonstrated, especially for individuals with muscular body builds and the elderly \[[@B1]\], and this was not considered in the analyses. Our study findings highlight the growing problem of morbid obesity associated with a population-wide increase in BMI. Recently, there has been increased advocacy in Australia for raising awareness of nutrition-related diseases and integrating nutrition into medical curricula \[[@B12]\]. In further recognition of issues surrounding the clinical management of morbidly obese patients, a Morbid Obesity model of care was developed in Western Australia in 2007 \[[@B13]\]. It should be clear, however, that unless the modern obesogenic environment is addressed, obesity-related health problems and healthcare costs are likely to escalate. In 2009, a parliamentary committee developed a series of recommendations designed to combat the rising rates of obesity in Australia \[[@B3]\]. Recommendations included development of the built environment to promote physically active lifestyles, education to encourage healthy eating and to increase the consumption of fresh fruit and vegetables, reformulation of commercially-available foods, more effective food labelling to assist healthy consumer choices and the development of a registry of bariatric surgery. While surgery and other gastrointestinal interventions may be considered appropriate for individuals with severe obesity and co-morbid disease, such as type 2 diabetes \[[@B5]\], such treatment requires a thorough multidisciplinary team assessment of peri-operative risk and possible long-term complications \[[@B14]\] and is unlikely to impact the rising prevalence of morbid obesity at a population level. The challenge is to identify and implement effective strategies that will shift the population distribution towards lower BMI, if the disproportionate increase observed in the extreme levels of obesity is to be curbed. Conclusions =========== We conclude that over a period of a decade, there has been an increase in mean BMI among women residing in south-eastern Australia, resulting in a measurable rise in the prevalence of morbid obesity. Abbreviations ============= ABS: Australian Bureau of Statistics; BMI: Body mass index; GOS: Geelong Osteoporosis Study; SEIFA: Socio-Economic Index for Areas; SES: Socioeconomic status; SMR: Standardized morbidity ratio Competing interests =================== No relevant disclosures. Authors' contributions ====================== JAP conceived of the study, developed the methods, conducted the literature search and led the development of the final manuscript. SLB and MAK contributed to the study conception, design and data interpretation, and provided intellectual content to the final manuscript. All authors read and approved the final manuscript. Pre-publication history ======================= The pre-publication history for this paper can be accessed here: <http://www.biomedcentral.com/1471-2458/13/290/prepub> Acknowledgements ================ The study was funded by the National Health and Medical Research Council (NHMRC) of Australia, the Victorian Health Promotion Foundation (VHPF) and Geelong Regional Medical Foundation, but they played no part in the design or conduct of the study; collection, management, analysis, and interpretation of the data; or in preparation, review, or approval of the manuscript. SLB is supported by NHMRC Early Career Fellowship (1012472).
{ "pile_set_name": "PubMed Central" }
Discriminating rigid from nonrigid motion: minimum points and views. Theoretical investigations of structure from motion have demonstrated that an ideal observer can discriminate rigid from nonrigid motion from two views of as few as four points. We report three experiments that demonstrate similar abilities in human observers: In one experiment, 4 of 6 subjects made this discrimination from two views of four points; the remaining subjects required five points. Accuracy in discriminating rigid from nonrigid motion depended on the amount of nonrigidity (variance of the interpoint distances over views) in the nonrigid structure. The ability to detect a rigid group dropped sharply as noise points (points not part of the rigid group) were added to the display. We conclude that human observers do extremely well in discriminating between nonrigid and fully rigid motion, but that they do quite poorly at segregating points in a display on the basis of rigidity.
{ "pile_set_name": "PubMed Abstracts" }
--- abstract: | Let $p$ be a prime and let $x$ be a $p$-adic integer. We provide two supercongruences for truncated series of the form $$\sum_{k=1}^{p-1} \frac{(x)_k}{(1)_k}\cdot \frac{1}{k}\sum_{1\le j_1\le\cdots\le j_r\le k}\frac{1}{j_1^{}\cdots j_r^{}}\quad\mbox{and}\quad \sum_{k=1}^{p-1} \frac{(x)_k(1-x)_k}{(1)_k^2}\cdot \frac{1}{k}\sum_{1\le j_1\le\cdots\le j_r\le k}\frac{1}{j_1^{2}\cdots j_r^{2}}.$$ address: 'Dipartimento di Matematica, Università di Roma “Tor Vergata”, via della Ricerca Scientifica,00133 Roma, Italy' author: - Roberto Tauraso title: Two supercongruences related to multiple harmonic sums --- Introduction and main results ============================= In [@Ta:10 Theorem 1.1] and [@Ta:12 Theorem 7] we showed that for any prime $p\not=2$, $$\sum_{k=1}^{p-1} \frac{\binom{2k}{k}}{k 4^k} \equiv_{p^3} -H_{(p-1)/2}\quad\text{and}\quad \sum_{k=1}^{p-1} \frac{\binom{2k}{k}^2}{k 16^k} \equiv_{p^3} -2H_{(p-1)/2}$$ where $H_n^{(t)}=\sum_{j=1}^n\frac{1}{j^t}$ is the $n$-th harmonic number of order $t\geq 1$. Here we present two extensions of such congruences which involves the (non-strict) multiple harmonic sums $$S_n(t_1,\dots,t_r):=\sum_{1\le j_1\le\cdots\le j_r\le n}\frac{1}{j_1^{t_1}\cdots j_r^{t_r}}$$ with $t_1,t_2,\dots, t_r$ positive integers. For the sake of brevity, if $t_1 = t_2 = \dots = t_r = t$ we write $S_n(\{t\}^r)$. Let $(x)_n:=x(x+1)\cdots (x+n-1)$ be the Pochhammer symbol, and let $B_n(x)$ be the $n$-th Bernoulli polynomial. For any prime $p$, $\mathbb{Z}_p$ denotes the ring of all $p$-adic integers and $\langle \cdot\rangle_p$ is the least non-negative residue modulo $p$ of the $p$-integral argument. \[MT\] Let $p$ be a prime, $x\in\mathbb{Z}_p$ and $r\in\mathbb{N}$. Let $s:=(x+\langle-x\rangle_p)/p$. i\) If $p>r+3$ then $$\begin{aligned} \label{SI1} \sum_{k=1}^{p-1} \frac{(x)_k}{(1)_k}\cdot \frac{S_k(\{1\}^r)}{k} &\equiv_{p^2} -H^{(r+1)}_{\langle-x\rangle_p}-(-1)^rsp B_{p-r-2}(x).\end{aligned}$$ ii\) If $p>2r+3$ then $$\begin{aligned} \label{SI2} \sum_{k=1}^{p-1} \frac{(x)_k(1-x)_k}{(1)_k^2}\cdot \frac{S_k(\{2\}^r)}{k} &\equiv_{p^3} -2H^{(2r+1)}_{\langle-x\rangle_p}-2(2r+1)sp H^{(2r+2)}_{\langle-x\rangle_p} \nonumber \\&\qquad\qquad +\frac{2s(1+3sr+2sr^2)}{2r+3}\,p^2 B_{p-2r-3}(x).\end{aligned}$$ Note that, when $r=0$, both and have been established by Zhi-Hong Sun in [@Sunzh:15]. Moreover, for the special value $x=1/2$, and yield $$\label{CI1} \sum_{k=1}^{p-1} \frac{\binom{2k}{k}}{k 4^k}\cdot S_k(\{1\}^r) \equiv_{p^2} \begin{cases} -H_{(p-1)/2}^{(r+1)} &\text{if $r\equiv_2 0$},\vspace{3mm}\\ \frac{2^{r+2}-1}{2(r+2)}\,p B_{p-r-2} &\text{if $r\equiv_2 1$,} \end{cases}$$ and $$\label{CI2} \sum_{k=1}^{p-1} \frac{\binom{2k}{k}^2}{k 16^k}\cdot S_k(\{2\}^r) \equiv_{p^3} -2H_{(p-1)/2}^{(2r+1)} -\frac{r(2^{2r+3}-1)}{2}\,p^2B_{p-2r-3}.$$ For $r=1$, the congruence proves the conjecture [@Sunzw:15 Conjecture 5.3]. In the last section we provide $q$-analogs of two binomial identities related to the congruences and . Proof of in Theorem \[MT\] ========================== By taking the partial fraction expansion of the rational function $$x\to \frac{(x)_k}{(x)_n}$$ with $0\leq k<n$, we find $$\label{PDF1} \sum_{k=0}^{n-1} \frac{(x)_k}{(1)_k}\cdot a_k= (x)_n\sum_{j=0}^{n-1}\frac{(-1)^j T_j}{j!(n-1-j)!}\cdot \frac{1}{x+j}$$ where $T_j$ is the binomial transform of the sequence $a_k$, $$T_j:=\sum_{k=0}^j(-1)^k\binom{j}{k}\cdot a_k.$$ It is easy to see from that if $a_0,\dots,a_{p-1},x\in \mathbb{Z}_p$ then $$\label{A1} \sum_{k=0}^{p-1} \frac{(x)_k}{(1)_k}\cdot a_k\equiv_{p} T_{{\langle-x\rangle_p}}.$$In order to show we introduce the function $$G_n^{(r)}(x):=\sum_{k=1}^{n} \frac{(x)_k}{(1)_k}\cdot S_k(\{1\}^r).$$ We have that $$G_n^{(0)}(x)=\frac{(1+x)_{n}}{(1)_{n}}-1$$ and $S_{k}(\{1\}^r)= S_{k-1}(\{1\}^r)+S_{k}(\{1\}^{r-1})/k$ implies $$\label{G1} G_n^{(r)}(x)=\frac{(1+x)_{n}}{(1)_{n}}\cdot S_{n}(\{1\}^r)-\frac{G_n^{(r-1)}(x)}{x}.$$ Moreover $$F_n^{(r)}(x+1)-F_n^{(r)}(x)=\frac{G_n^{(r)}(j)}{x}$$ where $$F_n^{(r)}(x):=\sum_{k=1}^{n} \frac{(x)_k}{(1)_k}\cdot \frac{S_k(\{1\}^r)}{k}.$$ Then, for any positive integer $m$, $$\label{F1} F_n^{(r)}(x+m)-F_n^{(r)}(x)= \sum_{j=0}^{m-1}\frac{G_n^{(r)}(x+j)}{x+j}.$$ By , for $u=1,\dots,n$ $$G_n^{(r)}(-u)=\frac{G_n^{(r-1)}(-u)}{u}=\cdots=\frac{G_n^{(0)}(-u)}{u^r}=-\frac{1}{u^r}.$$ Hence by letting $x=-n$ and $m=n$ in we obtain the known identity (see [@He:99]) $$\label{He} \sum_{k=1}^n (-1)^k\binom{n}{k}\frac{S_k(\{1\}^r)}{k}=-H_n^{(r+1)}.$$ Thus, for $a_k=\frac{S_k(\{1\}^r)}{k}$, we have that $T_j=-H_j^{(r+1)}$, and by , we already have the modulo $p$ version of . Since $sp=x+\langle-x\rangle_p$ it follows that $$G_{p-1}^{(0)}(x) =\frac{(1+x)_{p-1}}{(1)_{p-1}}-1 \equiv_{p^2} \frac{sp}{x}-1.$$ By [@Zh:07 Theorem 1.6], $S_{p-1}(\{1\}^r)\equiv_p 0$ and therefore $$G_{p-1}^{(r)}(x)\equiv_{p^2} -\frac{G_{p-1}^{(r-1)}(x)}{x}\equiv_{p^2}\cdots \equiv_{p^2} (-1)^r\frac{G_{p-1}^{(0)}(x)}{x^{r}} \equiv_{p^2} \frac{(-1)^r sp}{x^{r+1}}-\frac{(-1)^r}{x^{r}}.$$ Moreover $$\begin{aligned} F_{p-1}^{(r)}(sp)&= \sum_{k=1}^{p-1} \frac{(sp)_k}{(1)_k}\cdot \frac{S_k(\{1\}^r)}{k}\equiv_{p^2} \sum_{k=1}^{p-1} \frac{sp}{k}\cdot \frac{S_k(\{1\}^r)}{k}\\ &=spS_{p-1}(\{1\}^{r},2)) \equiv_{p^2} spB_{p-r-2}\end{aligned}$$ where we used $S_{p-1}(\{1\}^r,2)\equiv_p B_{p-r-2}$ (see [@HHT:14 Theorem 4.5]). Finally, by , $$\begin{aligned} F_{p-1}^{(r)}(x)&\equiv_{p^2}\sum_{j=0}^{\langle-x\rangle_p-1} \left(\frac{(-1)^r}{(x+j)^{r+1}}-\frac{(-1)^rsp}{(x+j)^{r+2}}\right)+spB_{p-r-2}\\ &\equiv_{p^2}-\sum_{j=1}^{\langle-x\rangle_p} \frac{1}{(j-sp)^{r+1}}-sp\sum_{j=1}^{\langle-x\rangle_p}\frac{1}{j^{r+2}}+spB_{p-r-2}\\ &\equiv_{p^2}-H_{\langle-x\rangle_p}^{(r+1)}- (r+2)spH_{\langle-x\rangle_p}^{(r+2)}+spB_{p-r-2}\\ &\equiv_{p^2}-H_{\langle-x\rangle_p}^{(r+1)}-(-1)^r spB_{p-r-2}\\\end{aligned}$$ where the last step uses the following congruence: for $2\leq t<p-1$ $$\label{Hp} H_{\langle-x\rangle_p}^{(t)} \equiv_p \sum_{j=1}^{\langle-x\rangle_p} j^{p-1-t}= \frac{B_{p-t}(\langle-x\rangle_p+1)-B_{p-t}}{p-t} \equiv_p (-1)^t\frac{B_{p-t}(x)-B_{p-t}}{t}$$ which is an immediate consequence of [@Sunzh:00 Lemma 3.2]. Proof of in Theorem \[MT\] ========================== We follow a similar strategy as outlined in the previous section. We start by considering the partial fraction decomposition of the rational function $$x\to\frac{(x)_k(1-x)_k}{(x)_n(1-x)_n}$$ with $0\leq k<n$. We have that $$\label{PDF2} \sum_{k=0}^{n-1} \frac{(x)_k(1-x)_k}{(1)_k^2}\cdot a_k= (x)_n(1-x)_n \sum_{j=0}^{n-1}\frac{(-1)^j A_j}{(n+j)!(n-1-j)!}\left(\frac{1}{x+j}+\frac{1}{1-x+j}\right)$$ where $$A_j:=\sum_{k=0}^j(-1)^k\binom{j}{k}\binom{j+k}{k}\cdot a_k.$$ For $n\to \infty$, if the series is convergent, the identity becomes $$\sum_{k=0}^{\infty} \frac{(x)_k(1-x)_k}{(1)_k^2}\cdot a_k= \frac{\sin(\pi x)}{\pi} \sum_{j=0}^{\infty}(-1)^j A_j\left(\frac{1}{x+j}+\frac{1}{1-x+j}\right).$$ In many cases the transformed sequence $A_j$ has a *nice* formula. For example if $a_k=1/(k+z)$ then $$A_j=\frac{(1-z)_j}{(z)_{j+1}}$$ and for $x=z=1/2$ we recover this series representations the Catalan’s constant $G=\sum_{j=0}\frac{(-1)^j}{(2j+1)^2}$: $$\sum_{k=0}^{\infty} \frac{\binom{2k}{k}^2}{(2k+1)16^k}=\frac{1}{2}\sum_{k=0}^{\infty} \frac{(1/2)_k^2}{(1)_k^2(k+1/2)}= \frac{1}{2\pi} \sum_{j=0}^{\infty}(-1)^j \frac{4}{(1/2+j)^2}= \frac{8G}{\pi}.$$ As regards congruences we have the following result. Let $p$ be a prime with $a_0,\dots,a_{p-1},x\in \mathbb{Z}_p$. Then $$\label{A2} \sum_{k=0}^{p-1} \frac{(x)_k(1-x)_k}{(1)_k^2}\cdot a_k \equiv_{p^2} A_{\langle-x\rangle_p}+s(A_{p-1-\langle-x\rangle_p}-A_{\langle-x\rangle_p})$$ For $x=1/2$ and $p>2$ then $$\sum_{k=0}^{p-1} \frac{\binom{2k}{k}^2}{16^k}\cdot a_k \equiv_{p^2} A_{(p-1)/2}.$$ Rearranging in a convenient way, we have $$\sum_{k=0}^{p-1} \frac{(x)_k(1-x)_k}{(1)_k^2}\cdot a_k= \frac{(x)_p(1-x)_p}{(1)_p^2}\binom{2p-1}{p-1}^{-1} \sum_{j=0}^{p-1}(-1)^j\binom{2p-1}{p+j} A_j\left(\frac{p}{x+j}+\frac{p}{1-x+j}\right).$$ If $0\leq k\leq j\leq p-1$ then $A_{p-1-j}\equiv_p A_{j}$ because $$\begin{aligned} \binom{p-1-j}{k}\binom{p-1-j+k}{k} &=\frac{(p-1-j)\cdots (p-j-k)(p-1-j+k)\cdots (p-j) }{(k!)^2}\\&\equiv_p \frac{(j+1)\cdots (j+k)(j-k+1)\cdots j }{(k!)^2} =\binom{j}{k}\binom{j+k}{k}.\end{aligned}$$ Thus, since $\langle -x\rangle_p+\langle-(1-x)\rangle_p=p-1$, it follows that $$\begin{aligned} \sum_{j=0}^{p-1}(-1)^j\binom{2p-1}{p+j} \frac{pA_j}{x+j} &\equiv_{p^2}\sum_{j=0}^{\langle-x\rangle_p-1} \frac{pA_j}{x+j}+(-1)^{\langle-x\rangle_p}\binom{2p-1}{p+{\langle-x\rangle_p}} \frac{A_{\langle-x\rangle_p}}{s}+\sum_{j=\langle-x\rangle_p+1}^{p-1} \frac{pA_j}{x+j}\\ &\equiv_{p^2}\sum_{j=0}^{\langle-x\rangle_p-1} \frac{pA_j}{x+j}+(-1)^{\langle-x\rangle_p}\binom{2p-1}{p+{\langle-x\rangle_p}} \frac{A_{\langle-x\rangle_p}}{s} -\!\!\!\!\!\!\sum_{j=0}^{\langle-(1-x)\rangle_p-1}\!\!\! \frac{pA_{p-1-j}}{1-x+j}.\end{aligned}$$ Therefore $$\begin{aligned} \sum_{j=0}^{p-1}(-1)^j\binom{2p-1}{p+j} A_j\left(\frac{p}{x+j}+\frac{p}{1-x+j}\right) &\equiv_{p^2}(-1)^{\langle-x\rangle_p}\binom{2p-1}{p+{\langle-x\rangle_p}} \left(\frac{A_{\langle-x\rangle_p}}{s} +\frac{A_{\langle-(1-x)\rangle_p}}{1-s}\right).\end{aligned}$$ Finally, by using $$\begin{aligned} &\binom{2p-1}{p-1} \equiv_{p^3} 1,\\ &\binom{2p-1}{p+j} \equiv_{p^2} (-1)^{j}\left(1-2p H_{j}\right),\\ &\frac{(x)_p(1-x)_p}{(1)_p^2}\equiv_{p^2} s(1-s)\left(1+2p H_{\langle-x\rangle_p}\right),\end{aligned}$$ we are done. For $x=1/2$ it suffices to note that $$\langle-x\rangle_p=(p-1)/2= p-1-\langle-x\rangle_p.$$ As an application of the previous theorem, we note that when $a_k=1$ then $A_j=(-1)^j$, and, by , it follows that $$\sum_{k=0}^{p-1} \frac{(x)_k(1-x)_k}{(1)_k^2} \equiv_{p^2} (-1)^{\langle -x\rangle_p}$$ which has been established in [@Sunzh:14 Corollary 2.1]. Another example worth to be mentioned is $a_k=1/k^r$ for $k\geq 1$ (and $a_0=0$). Then by [@Pr:10 Theorem 1] $$A_j=-\sum_{1\cdot k_1+3\cdot k_3+\dots= r} \frac{2^{k_1+k_3+\dots} (H_j^{(1)})^{k_1}(H_j^{(3)})^{k_3}\cdots}{1^{k_1}3^{k_3}\cdots k_1!k_3!\cdots}.$$ Now we consider the case $a_k=S_k(\{2\}^r)/k$. Let $$G_n^{(r)}(x):=\sum_{k=1}^{n} \frac{(x)_k(-x)_k}{(1)_k^2}\cdot S_k(\{2\}^r).$$ We have that $$G_n^{(0)}(x)=\frac{(1+x)_{n}(1-x)_{n}}{(1)_{n}^2}-1,$$ and $S_{k}(\{2\}^r)= S_{k-1}(\{2\}^r)+S_{k}(\{2\}^{r-1})/k^2$ implies $$\label{G2} G_n^{(r)}(x)=\frac{(1+x)_{n}(1-x)_{n}}{(1)_{n}^2}\cdot S_{n}(\{2\}^r)+\frac{G_n^{(r-1)}(x)}{x^2}.$$ Moreover $$F_n^{(r)}(x+1)-F_n^{(r)}(x)=\frac{2G_n^{(r)}(x)}{x}$$ where $$F_n^{(r)}(x):=\sum_{k=1}^{n} \frac{(x)_k(1-x)_k}{(1)_k^2}\cdot \frac{S_k(\{2\}^r)}{k}.$$ Hence $$\label{F2} F_n^{(r)}(x+m)-F_n^{(r)}(x)= 2\sum_{j=0}^{m-1}\frac{G_n^{(r)}(x+j)}{x+j}.$$ The next identity is a variation of and it appears to be new. For any integers $n\geq 1$ and $r\geq 0$, $$\label{Ta} \sum_{k=1}^{n} (-1)^k\binom{n}{k}\binom{n+k}{k}\frac{S_k(\{2\}^r)}{k}=-2H_{n}^{(2r+1)}.$$ By , for $u=1,\dots,n$, $$G_n^{(r)}(-u)=\frac{G_n^{(r-1)}(-u)}{u^2}=\dots=\frac{G_n^{(0)}(-u)}{u^{2r}}=-\frac{1}{u^{2r}}.$$ Hence by letting $x=-n$ and $m=n$ in $$\begin{aligned} \sum_{k=1}^{n} (-1)^k\binom{n}{k}\binom{n+k}{k}\frac{S_k(\{2\}^r)}{k}&=F^{(r)}_n(-n)=F_n^{(r)}(0)-2\sum_{j=0}^{n-1}\frac{G_n^{(r)}(-n+j)}{-n+j}\\ &=2\sum_{j=0}^{n-1}\frac{1}{(-n+j)^{2r+1}}=-2H_{n}^{(2r+1)}.\end{aligned}$$ Thus by applying $\eqref{A2}$ we find a modulo $p^2$ version of $\eqref{SI2}$. A more refined reasoning will lead us to the $p^3$ congruence. Since $sp=x+\langle-x\rangle_p$, $$G_{p-1}^{(0)}(x) =\frac{(1+x)_{p-1}(1-x)_{p-1}}{(1)_{p-1}^2}-1 \equiv_{p^3} -\frac{s(1-s)p^2}{x^2}-1$$ By [@Zh:07 Theorem 1.6], $S_{p-1}(\{2\}^r)\equiv_p 0$ and therefore $$G_{p-1}^{(r)}(x)\equiv_{p^3} \frac{G_{p-1}^{(r-1)}(x)}{x^{2}}\equiv_{p^3}\cdots \equiv_{p^3} \frac{G_{p-1}^{(0)}(x)}{x^{2r}} \equiv_{p^3} -\frac{s(1-s)p^2}{x^{2r+2}}-\frac{1}{x^{2r}}.$$ It follows that $$\begin{aligned} F_{p-1}^{(r)}(sp)-F_{p-1}^{(r)}(x) &\equiv_{p^3} 2\sum_{j=0}^{\langle-x\rangle_p-1}\frac{G_{p-1}^{(0)}(x+j)}{(x+j)^{2r+1}}\\ &\equiv_{p^3} -2s(1-s)p^2\sum_{j=1}^{\langle-x\rangle_p}\frac{1}{j^{2r+3}}-2\sum_{j=0}^{\langle-x\rangle_p-1}\frac{1}{(x+j)^{2r+1}}.\end{aligned}$$ By $$\sum_{j=1}^{\langle-x\rangle_p}\frac{1}{j^{2r+3}}=H_{\langle-x\rangle_p}^{(2r+3)} \equiv_p -\frac{B_{p-2r-3}(x)-B_{p-2r-3}}{2r+3}.$$ Moreover $$\begin{aligned} F_{p-1}^{(r)}(sp)&= \sum_{k=1}^{p-1} \frac{(sp)_k(1-sp)_k}{(1)_k^2}\cdot \frac{S_k(\{2\}^r)}{k}\\ &\equiv_{p^3} \sum_{k=1}^{p-1} \frac{sp(k-sp)}{k^2}\cdot \frac{S_k(\{2\}^r)}{k}\\ &=sp\sum_{k=1}^{p-1} \frac{S_k(\{2\}^r)}{k^2} -p^2s^2\sum_{k=1}^{p-1} \frac{S_k(\{2\}^r)}{k^3}\\ &=spS_{p-1}(\{2\}^{r+1})) -p^2s^2S_{p-1}(\{2\}^{r},3))\\ &\equiv_{p^3} sp\frac{2pB_{p-2r-3}}{2r+3} +p^2s^22rB_{p-2r-3}\\ &\equiv _{p^3} \frac{2sp^2(1+sr(2r+3))B_{p-2r-3}}{2r+3}\end{aligned}$$ where we used $$\frac{(sp)_k(1-sp)_k}{(1)_k^2} =\frac{sp(k-sp)}{k^2}\cdot \frac{(1+sp)_{k-1}(1-sp)_{k-1}}{ (1)_{k-1}^2}\equiv_{p^3}\frac{sp(k-sp)}{k^2}$$ and the congruences $$S_{p-1}(\{2\}^r)\equiv_{p^2} \frac{2pB_{p-2r-1}}{2r+1}\quad\text{and}\quad S_{p-1}(\{2\}^r,3)\equiv_p -2rB_{p-2r-3}.$$ which have been established in [@Zh:07 Theorem 1.6] in [@HHT:14 Theorem 4.1] respectively. Finally, $$\begin{aligned} F_{p}^{(r)}(x) &\equiv_{p^3} \frac{2sp^2(1+sr(2r+3))B_{p-2r-3}}{2r+3} -\frac{2s(s-1)p^2(B_{p-2r-3}(x)-B_{p-2r-3})}{2r+3}\\ &\qquad\qquad+2\sum_{j=0}^{\langle-x\rangle_p-1}\frac{1}{(x+j)^{2r+1}}\\ &\equiv_{p^3} 2\sum_{j=0}^{\langle-x\rangle_p-1}\frac{1}{(x+j)^{2r+1}} +\frac{2s(1-s)}{2r+3}p^2B_{p-2r-3}(x) \\&\qquad\qquad +\frac{2s^2(r+1)(2r+1)}{2r+3}p^2 B_{p-2r-3}\end{aligned}$$ We observe that follows by letting $x=1/2$. Then $\langle-x\rangle_p-1=(p-1)/2$, $B_{2n}(1/2)=(2^{1-2n}-1)B_{2n}$ and for $p-4>t>1$ $$H^{(t)}_{(p-1)/2}\equiv \begin{cases} \frac{t(2^{t+1}-1)}{2(t+1)}\,p B_{p-t-1} \pmod{p^2} &\text{if $t\equiv_2 0$},\vspace{3mm}\\ -\frac{(2^{t}-2)}{t}\, B_{p-t} \qquad \pmod{p} &\text{if $t\equiv_2 1$}. \end{cases}$$ see [@Sunzh:00 Theorem 5.2]. Final remarks: $q$-analogs of and ================================== It is interesting to note that identities and have both a $q$-version (the first one appears in [@Pr:00]). For any integers $n\geq 1$ and $r\geq 0$, $$\label{Heq} \sum_{k=1}^n(-1)^k{\genfrac{[}{]}{0pt}{}{n}{k}_q}q^{\binom{k}{2}-(n-1)k}\cdot \frac{S_k(\{1\}^r;q)}{1-q^k} =-\sum_{k=1}^n\frac{q^{rk}}{(1-q^k)^{r+1}}$$ and $$\label{Taq} \sum_{k=1}^n(-1)^k{\genfrac{[}{]}{0pt}{}{n}{k}_q}{\genfrac{[}{]}{0pt}{}{n+k}{k}_q} q^{\binom{k}{2}-(n-1)k} \cdot \frac{S_k(\{2\}^r;q)}{1-q^k} =-\sum_{k=1}^n\frac{(1+q^k)q^{rk}}{(1-q^{k})^{2r+1}}$$ where ${\genfrac{[}{]}{0pt}{}{m}{k}_q}$ is the Gaussian binomial coefficient $${\genfrac{[}{]}{0pt}{}{m}{k}_q}=\left\{ \begin{array}{ll} \frac{(1-q^m)(1-q^{m-1})\cdots (1-q^{m-k+1})}{(1-q^k)(1-q^{k-1})\cdots (1-q)} &\mbox{if $0\leq k\leq m$},\\[3pt] 0 &\mbox{otherwise}, \end{array}\right.$$ and $$S_n(t_1,\dots,t_r;q):=\sum_{1\le j_1\le\cdots\le j_r\le n}\frac{q^{j_1+\dots +j_r}}{(1-q^{j_1})^{t_1}\cdots (1-q^{j_r})^{t_r}}.$$ We show and we leave the proof of other one to the interested reader. The procedure is quite similar to the one given for the corresponding ordinary identity . Let $$G_n^{(r)}(u):=\sum_{k=1}^n(-1)^k{\genfrac{[}{]}{0pt}{}{u}{k}_q}{\genfrac{[}{]}{0pt}{}{u+k-1}{k}_q} q^{\binom{k}{2}-(u-1)k} \cdot S_k(\{2\}^r;q).$$ Then for $u=1,\dots,n$, $G_n^{(0)}(u)=-1$ and $$G_n^{(r)}(u)=\frac{q^u G_n^{(r-1)}}{(1-q^u)^2}=\dots=\frac{q^{ru }G_n^{(0)}(u)}{(1-q^u )^{2r}}=-\frac{q^{ru }}{(1-q^u)^{2r}}.$$ Moreover $$F_n^{(r)}(u)-F_n^{(r)}(u-1)=\frac{(1+q^u)G_n^{(r)}(u)}{(1-q^u)} =-\frac{(1+q^u)q^{ru }}{(1-q^u)^{2r+1}}$$ where $$F_n^{(r)}(u):=\sum_{k=1}^n(-1)^k{\genfrac{[}{]}{0pt}{}{u}{k}_q}{\genfrac{[}{]}{0pt}{}{u+k}{k}_q} q^{\binom{k}{2}-(u-1)k} \cdot S_k(\{2\}^r;q).$$ Thus, since $F_n^{(0)}(n)=0$, $$\begin{aligned} F_n^{(r)}(n)&=\sum_{u=1}^n\frac{(1+q^u)G_n^{(r)}(u)}{(1-q^u)}+F_n^{(0)}(n) =-\sum_{u=1}^n\frac{(1+q^u)q^{ru}}{(1-q^{u})^{2r+1}}\end{aligned}$$ and the proof is complete. [99]{} V. Hernández, [*Solution IV of problem 10490 - A reciprocal summation identity*]{}, Am. Math. Mon. [**106**]{} (1999), 589-590. Kh. Hessami Pilehrood, T. Hessami Pilehrood, and R. Tauraso, [*New properties of multiple harmonic sums modulo $p$ and $p$-analogues of Leshchiner’s series*]{}, Trans. Am. Math. Soc. [**366**]{} (2014), 3131-3159. H. Prodinger, *A q-analogue of a formula of Hernández obtained by inverting a result of Dilcher*, Australas. J. Comb. **21** (2000), 271–274. H. Prodinger, *Identities involving harmonic numbers that are of interest for physicists*, Util. Math. **83** (2010), 291–299. Z. H. Sun, [*Congruences concerning Bernoulli numbers and Bernoulli polynomials*]{}, Discrete Appl. Math. [**105**]{} (2000), 193–223. Z. H. Sun, *Generalized Legendre polynomials and related supercongruences*, J. Number Theory **143** (2014), 293–319. Z. H. Sun, [*Super congruences concerning Bernoulli polynomials*]{}, Int. J. Number Theory [**11**]{} (2015), 2393–2404. Z. W. Sun, [*A new series for $\pi^3$ and related congruences*]{}, Internat. J. Math. [**26**]{} (2015), ID 1550055, 23 pp. R. Tauraso, [*Congruences involving alternating multiple harmonic sum*]{}, Electron. J. Combin., \#R16 (2010). R. Tauraso, [*Supercongruences for a truncated hypergeometric series*]{}, Integers **12** (2012), \#A45, 12 pp. J. Zhao, [*Bernoulli numbers, Wolstenholme’s theorem, and $p^5$ variations of Lucas’ theorem*]{}, J. Number Theory [**123**]{} (2007), 18–26.
{ "pile_set_name": "ArXiv" }
Barbra Streisand has walked back her controversial comments about Michael Jackson's sexual abuse accusers, saying she feels "deep remorse" for dismissing the trauma they experienced as children. “I am profoundly sorry for any pain or misunderstanding I caused by not choosing my words more carefully about Michael Jackson and his victims,” the icon wrote Saturday in a statement on Twitter. “I didn’t mean to dismiss the trauma these boys experienced in any way. "Like all survivors of sexual assault, they will have to carry this for the rest of their lives. I feel deep remorse and I hope that James (Safechuck) and Wade (Robson) know that I truly respect and admire them for speaking their truth.” Backlash set in after wide-ranging interview published Friday, in which Streisand told The Times of London that she believes the accusations made by Robson, 36, and Safechuck, 40, in the recent HBO documentary, "Leaving Neverland." "Oh, absolutely. That was too painful," says Streisand, who recalled Jackson as "very sweet, very childlike." Asked about the abusive behavior alleged in the documentary, Streisand says: "His sexual needs were his sexual needs, coming from whatever childhood he has or whatever DNA he has. You can say ‘molested,’ but those children, as you heard say, they were thrilled to be there. They both married and they both have children, so it didn’t kill them.” She acknowledged having a combination of feelings about the situation. "I feel bad for the children. I feel bad for him. I blame, I guess, the parents, who would allow their children to sleep with him.” Earlier Saturday, the singer tried to explain her remarks to The Associated Press in a sympathetic statement that read: “To be crystal clear, there is no situation or circumstance where it is OK for the innocence of children to be taken advantage of by anyone.” Jackson's close friend and mentor Diana Ross also touched on the controversy over the weekend. “This is what’s on my heart this morning,” Ross wrote Saturday on Twitter. “I believe and trust that Michael Jackson was and is a magnificent incredible force to me and to many others.” The Jackson estate has condemned "Leaving Neverland," noting that Jackson, who died at age 50 in 2009, was acquitted of molestation charges in a trial in 2005. “The legacy and the fans around the world, this is not going to do anything to them because they know the truth,” the superstar's nephew, Taj Jackson, told USA TODAY in February. Contributing: Bill Keveney, Andrea Mandell and The Associated Press
{ "pile_set_name": "OpenWebText2" }
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ /* * $Id: $ */ package com.sun.org.apache.xml.internal.serializer; import java.io.IOException; import org.w3c.dom.Node; import org.w3c.dom.DOMErrorHandler; import org.w3c.dom.ls.LSSerializerFilter; /** * Interface for a DOM serializer capable of serializing DOMs as specified in * the DOM Level 3 Save Recommendation. * <p> * The DOM3Serializer is a facet of a serializer and is obtained from the * asDOM3Serializer() method of the org.apache.xml.serializer.Serializer interface. * A serializer may or may not support a level 3 DOM serializer, if it does not then the * return value from asDOM3Serializer() is null. * <p> * Example: * <pre> * Document doc; * Serializer ser; * OutputStream os; * DOMErrorHandler handler; * * ser = ...; * os = ...; * handler = ...; * * ser.setOutputStream( os ); * DOM3Serialzier dser = (DOM3Serialzier)ser.asDOM3Serializer(); * dser.setErrorHandler(handler); * dser.serialize(doc); * </pre> * * @see org.apache.xml.serializer.Serializer * * @xsl.usage general * */ public interface DOM3Serializer { /** * Serializes the Level 3 DOM node. Throws an exception only if an I/O * exception occured while serializing. * * This interface is a public API. * * @param node the Level 3 DOM node to serialize * @throws IOException if an I/O exception occured while serializing */ public void serializeDOM3(Node node) throws IOException; /** * Sets a DOMErrorHandler on the DOM Level 3 Serializer. * * This interface is a public API. * * @param handler the Level 3 DOMErrorHandler */ public void setErrorHandler(DOMErrorHandler handler); /** * Returns a DOMErrorHandler set on the DOM Level 3 Serializer. * * This interface is a public API. * * @return A Level 3 DOMErrorHandler */ public DOMErrorHandler getErrorHandler(); /** * Sets a LSSerializerFilter on the DOM Level 3 Serializer to filter nodes * during serialization. * * This interface is a public API. * * @param filter the Level 3 LSSerializerFilter */ public void setNodeFilter(LSSerializerFilter filter); /** * Returns a LSSerializerFilter set on the DOM Level 3 Serializer to filter nodes * during serialization. * * This interface is a public API. * * @return The Level 3 LSSerializerFilter */ public LSSerializerFilter getNodeFilter(); /** * Sets the new line character to be used during serialization * @param newLine a String that is the end-of-line character sequence to be * used in serialization. */ public void setNewLine(String newLine); }
{ "pile_set_name": "Github" }
Girls' Love Stories Girls' Love Stories was an American romance comic book magazine published by DC Comics in the United States. Started in 1949 as DC's first romance title, it ran for 180 issues, ending with the Nov-Dec 1973 issue. The stories covered such topics as girls worrying about getting a man, or marrying out of pressure, not love. Some of the early covers were photographs. The book's initial tagline was "True to Life!" Writers for the title included Bob Kanigher and George Kashdan. Notable artists for Girls' Love Stories included George Tuska, Tony Abruzzo, Vince Colletta, Bill Draut, Frank Giacoia, Gil Kane, Bob Oksner, Art Peddy, Jay Scott Pike, John Romita Sr., Joe Rosen, John Rosenberger, Bernard Sachs, and Mike Sekowsky. Editor, Zena Brody began working on Girls' Love Stories in 1952. Images taken from Girls' Love Stories have been used in some of Roy Lichtenstein's work. References External links Category:1949 comics debuts Category:1973 comics endings Category:American bimonthly magazines Category:American comics magazines Category:American monthly magazines Category:Defunct American comics Category:Eight times annually magazines Category:Magazines established in 1949 Category:Magazines disestablished in 1973 Category:Romance comics
{ "pile_set_name": "Wikipedia (en)" }
Hazards associated with pregnancies and deliveries in lysinuric protein intolerance. Lysinuric protein intolerance (LPI) is an autosomal recessive transport disorder of the dibasic amino acids. The defect leads to deficiency of lysine, arginine, and ornithine and, secondarily, to a functional disorder of the urea cycle. Transient postprandial hyperammonemia and subsequent persistent protein aversion, linked with several other biochemical and clinical characteristics of the disease, suggest an increased risk for maternal and fetal complications during pregnancy and delivery. Our unique material on the outcomes of 18 pregnancies of 9 Finnish mothers with LPI and the follow-up of their 19 children shows that maternal LPI is truly associated with increased risk of anemia, toxemia, and intrauterine growth retardation during pregnancy and bleeding complications during delivery. Successful pregnancies and deliveries can still be achieved with careful follow-up of blood pressure and laboratory values. The children of the mothers with LPI generally develop normally. Special care of maternal protein nutrition and control of ammonemia, anemia, and toxemia during pregnancy are essential. We propose centralization of deliveries to obstetric units with capability to deal with bleeding complications and rare inborn errors of metabolism.
{ "pile_set_name": "PubMed Abstracts" }
Reparsing block ---------- Element(Perl5: CODE_CAST_EXPR) ---------- &{ say => 'start'; some => ; say =>'end'; } ---------- After typing ---------- if($a){ say 'hi'; &{ say => 'start'; some => ']'<caret>; say =>'end'; }; } ---------- Psi structure ---------- Perl5 PsiPerlIfCompoundImpl(Perl5: IF_COMPOUND) PsiElement(Perl5: if)('if') PsiPerlConditionalBlockImpl(Perl5: CONDITIONAL_BLOCK) PsiPerlConditionExprImpl(Perl5: CONDITION_EXPR) PsiElement(Perl5: ()('(') PsiPerlScalarVariableImpl(Perl5: SCALAR_VARIABLE) PsiElement(Perl5: $$)('$') PerlVariableNameElementImpl(Perl5: SCALAR_NAME)('a') PsiElement(Perl5: ))(')') PsiPerlBlockImpl(Perl5: BLOCK) PsiElement(Perl5: {)('{') PsiWhiteSpace('\n ') PsiPerlStatementImpl(Perl5: STATEMENT) PsiPerlPrintExprImpl(Perl5: PRINT_EXPR) PsiElement(Perl5: say)('say') PsiWhiteSpace(' ') PsiPerlCallArgumentsImpl(Perl5: CALL_ARGUMENTS) PsiPerlStringSqImpl(Perl5: STRING_SQ) PsiElement(Perl5: QUOTE_SINGLE_OPEN)(''') PerlStringContentElementImpl(Perl5: STRING_CONTENT)('hi') PsiElement(Perl5: QUOTE_SINGLE_CLOSE)(''') PsiElement(Perl5: ;)(';') PsiWhiteSpace('\n ') PsiPerlStatementImpl(Perl5: STATEMENT) PsiPerlCodeCastExprImpl(Perl5: CODE_CAST_EXPR) PsiElement(Perl5: $&)('&') PsiPerlBlockCodeImpl(Perl5: BLOCK_CODE) PsiElement(Perl5: &{)('{') PsiWhiteSpace('\n ') PsiPerlStatementImpl(Perl5: STATEMENT) PsiPerlCommaSequenceExprImpl(Perl5: COMMA_SEQUENCE_EXPR) PsiPerlStringBareImpl(Perl5: STRING_BARE) PerlStringContentElementImpl(Perl5: STRING_CONTENT)('say') PsiWhiteSpace(' ') PsiElement(Perl5: =>)('=>') PsiWhiteSpace(' ') PsiPerlStringSqImpl(Perl5: STRING_SQ) PsiElement(Perl5: QUOTE_SINGLE_OPEN)(''') PerlStringContentElementImpl(Perl5: STRING_CONTENT)('start') PsiElement(Perl5: QUOTE_SINGLE_CLOSE)(''') PsiElement(Perl5: ;)(';') PsiWhiteSpace('\n ') PsiPerlStatementImpl(Perl5: STATEMENT) PsiPerlCommaSequenceExprImpl(Perl5: COMMA_SEQUENCE_EXPR) PsiPerlStringBareImpl(Perl5: STRING_BARE) PerlStringContentElementImpl(Perl5: STRING_CONTENT)('some') PsiWhiteSpace(' ') PsiElement(Perl5: =>)('=>') PsiWhiteSpace(' ') PsiPerlStringSqImpl(Perl5: STRING_SQ) PsiElement(Perl5: QUOTE_SINGLE_OPEN)(''') PerlStringContentElementImpl(Perl5: STRING_CONTENT)(']') PsiElement(Perl5: QUOTE_SINGLE_CLOSE)(''') PsiElement(Perl5: ;)(';') PsiWhiteSpace('\n ') PsiPerlStatementImpl(Perl5: STATEMENT) PsiPerlCommaSequenceExprImpl(Perl5: COMMA_SEQUENCE_EXPR) PsiPerlStringBareImpl(Perl5: STRING_BARE) PerlStringContentElementImpl(Perl5: STRING_CONTENT)('say') PsiWhiteSpace(' ') PsiElement(Perl5: =>)('=>') PsiPerlStringSqImpl(Perl5: STRING_SQ) PsiElement(Perl5: QUOTE_SINGLE_OPEN)(''') PerlStringContentElementImpl(Perl5: STRING_CONTENT)('end') PsiElement(Perl5: QUOTE_SINGLE_CLOSE)(''') PsiElement(Perl5: ;)(';') PsiWhiteSpace('\n ') PsiElement(Perl5: &})('}') PsiElement(Perl5: ;)(';') PsiWhiteSpace('\n') PsiElement(Perl5: })('}')
{ "pile_set_name": "Github" }
Il y a quelques mois, une journaliste m’avait demandé si j’avais des données qui permettraient de rendre compte de la variation géographique des dénominations du sandwich à la viande grillée, que l’on appelle « kebab », « dürüm, « döner », « grec » ou encore « sh(a)warma ». Désolé, j’avais répondu par la négative, mais promis d’ajouter lors de la mise au point de la 7e édition de notre série d’enquêtes sur les spécificités locales du français de nos régions, la question suivante: Les mots désignant le sandwich que l’on réalise avec la viande que l’on voit sur la photo varient d’un bout à l’autre du territoire. Comment appelez-vous ce sandwich ? – un döner – un dürüm – un grec – un gyros – un kebab – un kebap – un shawarma (shwarma, shawerma ou shoarma) – autre (précisez): Six mois plus tard, plus de 8.000 internautes francophones (8.229 pour être exact) avaient répondu au sondage. L’enquête clôturée, il a été possible d’analyser et de cartographier les résultats. Je les présente dans ce billet (PS: les formes kebap, shawarma et variantes et gyros n’ont pas fait l’objet d’un grand nombre de votes, et n’ont donc pas donné lieu à des cartes). Quel français régional parlez-vous? 8e édition! Vous êtres francophones, connectés à Internet? Vous pouvez vous aussi participer à l’une de nos enquêtes et nous aider à mieux comprendre comment le français varie d’un bout à l’autre des territoires où il est parlé. Comment appelez-vous le bout d’une baguette de pain? Que dites-vous à quelqu’un quand il éternue? En été vous vous rafraîchissez plutôt avec un granité ou un granita? Comment prononcez vous les mots jadis, juillet, août, épais, Catherine? Dites-le-nous en répondant à quelques questions de ce sondage en ligne (anonyme et accessible depuis n’importe quel support connecté); si vous êtes originaires d’Amérique du Nord, cliquez ici! Méthode de cartographie Pour réaliser les cartes de ce billet, nous avons utilisé différentes librairies du gratuiciel R, notamment les librairies kknn, raster et ggplot2 et téléchargé les fonds de carte du site GADM. Sur la base des codes postaux des localités où les participants ont indiqué avoir passé la plus grande partie de leur jeunesse, nous avons d’abord calculé pour chaque réponse les pourcentages d’utilisateurs de chaque arrondissement de France et de Belgique, ou de district en Suisse. Nous avons ensuite utilisé différentes méthodes d’interpolation pour obtenir une surface lisse et continue du territoire, comme on peut le voir ci-dessous: Fig. 1: Vitalité et aire d’extension du mot döner d’après les enquêtes Français de nos Régions (7e édition), avant (à gauche) et après (à droite) interpolation. Les traits épais délimitent les frontières entre la France et la Belgique d’une part, entre la France et la Suisse d’autre part. Plus la couleur est sombre, plus le pourcentage est élevé. Kebab Notre première carte rend compte de la vitalité et l’aire d’extension de la variante kebab. À la lecture de cette carte, on comprend que partout en France et en Suisse romande, cette variante est connue et employée avec des pourcentages relativement élevés. Il n’y a guère qu’en Belgique où la forme n’est pas en usage (47% en moyenne, le maximum étant atteint pour l’arrondissement de Mouscron, 91%): Dürüm Si le mot kebab n’est pas (ou presque) employé en Belgique, c’est parce que les Wallons appellent dürüm le sandwich réalisé sur la base de la viande grillée, telle qu’on peut la voir sur l’image qui illustre l’en-tête de ce billet: Döner La réponse döner montre qu’en Alsace (et un peu en Moselle), le mot kebab n’est pas la seule appellation existante. La forme kebab y est en effet employée en alternance avec la forme döner, une ellipse du syntagme döner kebab: Grec Enfin, l’examen de la réponse grec permet de faire apparaître une aire dont le centre est Paris, mais qui s’étend plus ou moins fortement du nord-ouest au sud-ouest de l’Hexagone: De façon surprenante, les données révèlent un intéressant effet d’âge. Le montage ci-dessous, réalisé avec Juxtapose, permet d’apprécier les différences entre les réponses des participants les plus jeunes (moins de 25 ans, à gauche, N=3.627), et les réponses des participants plus âgés (50 ans et plus, à droite, N=1.243).  Fig. 6: Vitalité et aire d’extension du mot grec (au sens de sandwich à la viande grillée) d’après les enquêtes Français de nos Régions (7e édition), en fonction des réponses des participants de moins de 25 ans (à gauche) et des participants de plus de 50 ans (à droite). Les traits épais délimitent les frontières entre la France et la Belgique d’une part, entre la France et la Suisse d’autre part. Plus la couleur est sombre, plus le pourcentage est élevé. Chez les moins de 25 ans, la réponse grec est beaucoup plus répandue sur le territoire, alors que chez les plus de 50 ans elle ne s’entend guère en dehors de Paris. On peut donc faire l’hypothèse que l’utilisation du mot grec pour désigner un sandwich à la viande grillée est une innovation récente, née à Paris. Carte de synthèse La carte ci-dessous permet d’avoir une idée de l’aire d’extension relative de chacune des variantes en circulation à l’heure actuelle en français pour désigner le sandwich réalisé à partir de viande grillée à la broche. En pratique, pour la France, où partout domine la forme kebab, on a décidé de retenir en plus les variantes grec et döner pour les arrondissements où les pourcentages obtenus pour ces réponses étaient supérieurs à 20%. On a appliqué ensuite une méthode d’interpolation pour obtenir une surface lissée du territoire, similaire dans le principe à celle qui a été appliquée pour les cartes précédentes. Un peu d’histoire et d’étymologie Avant de terminer ce billet, il nous reste à mentionner d’où viennent les différentes dénominations en présence, et faire des hypothèses qui permettraient d’expliquer leur aire d’extension. Le mot kebab est un emprunt à l’arabe کباب, kabāb, qui signifie littéralement « viande grillée, grillade », et qui désigne dans les pays orientaux différents plats réalisés à partir de cette viande. En français, le mot kebab renvoie non seulement à la viande, mais aussi au sandwich et au restaurant où on le sert. Quant au terme döner, c’est un raccourci de donner kebab, tournure turque que l’on peut traduire par « grillade tournante ». Il est à noter que le mot est particulièrement répandu en Allemagne, où la majorité des vendeurs de kebabs sont d’origine turque (l’inventeur serait d’ailleurs un immigré turc installé à Berlin!). Rien de surprenant qu’il soit utilisé dans les départements français adossés à l’Allemagne! Le mot dürüm est également un mot d’origine turque (il signifie « enroulade »), et désigne une préparation enroulée dans une galette turque. C’est donc une différence non pas linguistique qui oppose les Belges et les Français, mais une différence d’objet. En Belgique, le sandwich est préférentiellement réalisée à partir d’une galette, et non de pain. Enfin, en ce qui concerne l’utilisation de la variante grec (ou sandwich grec), il s’agirait selon Wikipédia d’une innovation parisienne, assez récente, ce qui est confirmé par nos données: En région parisienne, le kebab est souvent appelé familièrement sandwich grec, voire grec. Cette appellation erronée — et pratiquement inconnue dans les autres régions de France — trouve son origine dans l’apparition, dans les années 1980, de vendeurs grecs de gyros (spécialité grecque très proche du kebab mais à base de pain pita), dans le 5e arrondissement de Paris (quartier latin, rue de la Huchette, rue Mouffetard), qui furent les premiers à commercialiser ce type de sandwichs à destination de la population à la fois étudiante et touristique propre à cet arrondissement. Par la suite, lorsque les kebabs germano-turcs proprement dit firent leur apparition dans toute la région parisienne dans les années 1990, majoritairement tenus par des Maghrébins, le terme grec subsista dans le langage courant, y compris parmi les restaurateurs eux-mêmes, qui n’hésitent pas à mentionner grec sur leurs menus. Finalement, peu importe le nom que l’on donne à ce sandwich, l’important c’est qu’il soit bon!
{ "pile_set_name": "OpenWebText2" }
Q: What happens when two clients send UDP packets to a Socket Lets assume Host X has a UDP Socket running on Port 1337. Now Host Y and Z both send a UDP Packet to port 1337 of Host X. Are the packets going to be de-muxed? A: UDP is a transfer protocol with no guarantees of delivery and doesn't have much of an implementation. When both host Y an Z send a UDP packet to port 1337, and assuming both packets arrive, the application listening on port 1337 decides what happens with those packages. The application can choose which packet to demux, to demux both or to demux neither. Hope this clears things up
{ "pile_set_name": "StackExchange" }
SHORT Divide unit information EVENTSET FIXC0 INSTR_RETIRED_ANY FIXC1 CPU_CLK_UNHALTED_CORE FIXC2 CPU_CLK_UNHALTED_REF PMC0:EDGEDETECT ARITH_FPU_DIV_ACTIVE PMC1 ARITH_FPU_DIV_ACTIVE METRICS Runtime (RDTSC) [s] time Runtime unhalted [s] FIXC1*inverseClock Clock [MHz] 1.E-06*(FIXC1/FIXC2)/inverseClock CPI FIXC1/FIXC0 Number of divide ops PMC0 Avg. divide unit usage duration PMC1/PMC0 LONG Formulas: Number of divide ops = ARITH_FPU_DIV_ACTIVE:EDGEDETECT Avg. divide unit usage duration = ARITH_FPU_DIV_ACTIVE/ARITH_FPU_DIV_ACTIVE:EDGEDETECT - This performance group measures the average latency of divide operations
{ "pile_set_name": "Github" }
アニメーションと実物の異性、どちらにときめく?そんな判定ができるセンサーの体験コーナーが、千葉市の幕張メッセで開催中のアジア最大の家電・IT(情報技術)の見本市「CEATEC JAPAN(シーテック・ジャパン)2015」に登場し、来場者の人気を集めている。 半導体メーカーのローム(京都市)と、新興企業のテクマク(同)が共同開発した。来場者は、美形のアニメキャラクターと実物モデルの異性から、それぞれ「愛の告白」を受ける。手のひらの脈拍などの動向をローム製の光センサーがとらえ、テクマクの技術で解析し「ときめき度」を測定。どちらに心を動かされたかを判定する。 男女を問わず行列ができており、今のところ結果は「3次元の方に分がある」(ローム担当者)という。 体験した女性(25)は「2次元でもときめいたが、やっぱり3次元が出てくると違う。もっとどきどきした」と話していた。 この技術は今後、ゲーム開発などに応用される。
{ "pile_set_name": "OpenWebText2" }
1900 University of Utah football team The 1900 University of Utah football team was an American football team that represented the University of Utah during the 1900 college football season as an independent. Head coach Harvey Holmes led the team to a 2–1 record. Schedule Note: 2016 Utah Media Guide lists 2–1 record for the above three games, but also lists HC Holmes with a 2–2 mark for the season. References Utah Category:Utah Utes football seasons Utah
{ "pile_set_name": "Wikipedia (en)" }
CUSTOMER INFORMATION Terms & Conditions 1. This website is operated by Rosiesmoments Terms such as "we", "us" and "our" refer to Rosiesmoments where they are used in these terms and conditions. 2. By purchasing something from our ecommerce store, you agree to be bound by the terms and conditions contained in this document. 3. Incorporated into these terms are also the terms and conditions as laid out in our privacy policy and refund policy. ONLINE SHOPPING 4. We will take all reasonable care to ensure that the details displayed for a particular item offered for sale are correct at the time when the information was entered onto the system. 5. Whilst care is taken to ensure that we display as accurately as possible appearances, colours, textures or finishes, what you will see on your computer monitor or equipment may differ and so we cannot guarantee that images are an accurate representation of the actual goods or services that you are purchasing. 6. We may not be able to accept your order due to one or more of the following reasons, or for a reason not listed below: i) The item you have ordered is out of stock ii) We cannot authorise your payment or have reasonable grounds to suspect your payment may be fraudulent iii) There has been a pricing or product description error iv) There is a system or procurement failure v) You have failed our customer validation checks 7. When you place an order you will receive an email confirming the details of your order. This email is not confirmation that your order has been accepted by us. 8. Your order will only be accepted by us once your goods have been dispatched. DELIVERY 9. On completing your purchase you will be presented with one or more options for delivery. Where an estimated timescale for delivery is provided, this is an estimate only and your items may be delayed in being received due to circumstances beyond our control (such as a courier delay, or at busy times). 10. Where you select a "next day delivery" option, orders placed on Fridays, Saturdays or Sundays may not be despatched for delivery until the following Monday and so may not be received until Tuesday. ORDER CANCELLATION 11. If you wish to cancel an order you have placed you must contact us immediately to ascertain whether the items have been dispatched or not. Where they have been dispatched, you will need to return the item to us and you will be responsible for paying the cost of returning the items. 12. Where items have not been dispatched prior to a cancellation request our refund policy will apply. LIABILITY AND INDEMNITY 13. Rosesmoments shall not be liable for any direct, special, indirect or consequential or incidental damages including loss of profit or loss of opportunity as a result of the use of or the inability to use any items that have been ordered on this website. 14. You agree to indemnify us and our agents, officers, directors and employees, immediately and on demand, against all claims, liability, damages, costs and expenses, including legal fees, arising out of any breach of any of our terms and conditions. JURISDICTION 15. These terms and conditions shall be governed in accordance with the laws of England and are subject to the exclusive jurisdiction of the courts of England & Wales. ENTIRE AGREEMENT 16. These terms and conditions constitute the entire agreement between the parties and supersede any and all preceding and contemporaneous agreements between you and Rosiesmoments whether written or oral. GENERAL 17. We may change these terms and conditions at any time. 18. Should any part-term or term be found to be unenforceable then the remainder of the terms and conditions shall continue to have full force and effect as if the invalidated term was not present. 29. Should any delay or failure to comply with our obligations under these terms and conditions arise where it is beyond our reasonable control, we will not be responsible to you for such delay or failure.
{ "pile_set_name": "Pile-CC" }
Q: Multi-Target .NET Standard 2.0 and .NET 4.5 fails due to missing .net 4.5 framework On my dev box I have .net 4.6.2 and dotnet-sdk-2.1 installed. I originally had 4.0 then 4.5 then 4.6.2 I am able to run dotnet build on a project which multi-targets to both netstandard2.0 and net45 like this: <TargetFrameworks>netstandard2.0;net45</TargetFrameworks> I am able to build it successfully and run unit tests etc. I see the bin directory contains subdirectories for each target framework and contains all the DLLs. When I try to put together my CI build on a teamcity agent which is built on Windows Server 2016. I get an error: The reference assemblies for framework ".NETFramework,Version=v4.5" were not found. This is puzzling to me because the machine has .NET 4.6.2 SDK installed. (It also has the dotnet sdk 2.1 installed) Doing some googling around I see many mentioning that the frameworks should be in the dictory: C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\.NETFramework\ And when I check the Server 2016 machine I see the directory and I see subdirectory: v4.6.2 no subdirectories for 4.5 On my dev box however I see all kinds of directories there: 4.5, 4.0, 3.5, 4.6.2 ... I can't install framework 4.5 SDK on the Server 2016 machine because it already has a higher version installed. So it seems I can't build targeting .NET 4.5 on that machine. As a sanity check I changed my csproj file to: <TargetFrameworks>netstandard2.0;net462</TargetFrameworks> And I was able to build the project successfully. So the build does work but it requires 4.6.2 on that machine. It does not work neither if I target net46. What am I doing wrong here? Is there a way for me to be able to multi-target my project to net45 on the Server 2016 machine? A: TL;DR: install the .NET Framework 4.5 Developer Pack to build .NET Framework 4.5 projects. You say that your server has the .NET Framework 4.6.2 Developer Pack installed, and you are trying to build a .NET Framework 4.5 project with it. Unlike runtime packs, where each version contains (so to speak) the previous version, you need to have the developer pack for the exact version of the framework you are targetting.
{ "pile_set_name": "StackExchange" }
The students of Covington Catholic High School are facing expulsion and need our help. On January 19, a now-infamous video took the internet by storm, depicting a gaggle of students from Covington Catholic High School looking on as an elderly Native American man played the drum in front of them. The boys, as they looked on, appeared enamored. However, when the video of this event hit the internet, their looks of enamor were soon mischaracterized. Scores of public figures flocked to social media, decrying the students supposed bad behavior, labeling them racists, bigots, and white supremacists. Many even called for their expulsion from Covington Catholic High School. Early Sunday morning, the Diocese of Covington and Covington Catholic High School released a statement: We condemn the actions of the Covington Catholic High School students towards Nathan Phillips specifically, and Native Americans in general, Jan. 18, after the March for Life, in Washington, D.C. We extend our deepest apologies to Mr. Phillips. This behavior is opposed to the Church’s teachings on the dignity and respect of the human person. The matter is being investigated and we will take appropriate action, up to and including expulsion. We know this incident also has tainted the entire witness of the March for Life and express our most sincere apologies to all those who attended the March and all those who support the pro-life movement. However, as this episode has played out, new videos have emerged, directly in conflict with the narrative of the mainstream media. It was not the students from Covington who approached the Native American. It was the Native American who approached the students from Covington. It was not the students from Covington who chanted "Build The Wall". It was, however, one of the Native Americans who told the students from Covington to "go back to Europe". It was not the students from Covington who instigated this fiasco. It was Native American activist, Nathan Phillips. The #BoysOfCovington need our help.
{ "pile_set_name": "OpenWebText2" }
This lesson uses the Site C Dam review by the BC Utilities Commission as a case study to: • find out more about megaprojects in BC • ask questions about where our power comes from and energy security in general • delve into the November 2018 BC Utilities Commission Report on the Site C Dam project • understand how the history and issues around the Site C dam relates to themes in Social Studies, and anticipate what the government is going to do next. This license allows you to download and share this resource (copy and redistribute the material in any medium or format) and adapt this resource (remix, transform, and build upon the work) for non-commercial purposes. You must credit the creator of the resource and and license your new creations under the same license as the original. 4 recommendations 1464 downloads 4 recommendations 1464 downloads Won Alexander Cumyow: Working People: A History of Labour in BC- Labour History Project Lesson Materials 6 Lesson activities to accompany the vignette "Won Alexander Cumyow" from the acclaimed Knowledge Network series; Working People: A History of Labour in British Columbia produced by Landrock Entertainment. The vignette explores the prejudices and racism experienced by Chinese Canadians in the late 19th-early 20th century. Trained as a lawyer but unable to practice law, Won Alexander Cumyow becomes an advocate for the rights of Chinese immigrants in British Columbia. This material can also be used as a background resource for the topic of the Head Tax and the Asiatic Exclusion laws in early 20th Century Canada found in the Social Studies 11 course. This is a unit created by the Labour History Project, a group of retired and current British Columbia teachers collaborating to develop a series of lesson plans, activities, and workshops focused on labour studies and labour history. See: http://www.labourheritagecentre.ca/education/lesson-plans/ Subject Cross-Curricular Social Justice Social Studies History Labour History Keywords British Columbia Chinese Canadians immigration minority rights voting rights 1907 Riots Learning Standards The materials address aspects of the key learning standards of the current social studies 10 curriculum. Critical thinking skills are applied throughout as well as research and writing skills as described in the “skills and processes of social studies”. Aspects of “Identity, Society and Culture” are addressed in the materials including gender roles, ethnicity and daily life of Chinese immigrants in early British Columbia. Additionally the limitations and advancements in democratic principles are explored in this lesson. In Social Studies 11 for the Politics and Government learning outcome, students can examine how Canadians can effect change at the federal and provincial levels. Under the society and Identity learning outcome students will also be able to assess the development and impact of Canadian social policies and programs related to immigration and minority rights. This license allows you to download and share this resource (copy and redistribute the material in any medium or format) and adapt this resource (remix, transform, and build upon the work) for non-commercial purposes. You must credit the creator of the resource and and license your new creations under the same license as the original.
{ "pile_set_name": "Pile-CC" }
Category Archives: beer brewing Brewing beer or making wine at home isn’t complicated but it does require an attention to detail and a willingness to measure and sanitize things multiple times, particularly when tracking the progress of fermentation. This job has gotten easier thanks to the iSpindel project; an ESP8266 based IoT device intended as a DIY alternative to a costly commercial solution. Tracking fermentation normally involves a simple yet critical piece of equipment called a hydrometer (shown left), which measures the specific gravity or relative density of a liquid. A hydrometer is used by winemakers and brewers to determine how much sugar remains …read more
{ "pile_set_name": "Pile-CC" }
Q: Lorentz symmetry and Noether's theorem I'm trying to overcome some misunderstanding that I have in Noether's theorem. There is formula in David Gross's Lectures on QFT for Noether's theorem: $$J^\mu_\alpha=\mathcal{L}X^\mu_\alpha+\Pi^\mu_i\left[\Psi_{i\alpha}-\partial_\nu\phi_i X^i_\alpha\right]$$ $J^\mu_\alpha$ - conserved vector current, $\Pi^\mu_i$-canonical momentum, $X^\mu_\alpha$ and $\Psi_{i\alpha}$ are generators of symmetry which are defined by $$x'^\mu=x^\mu+X^\mu_\alpha \omega^\alpha,$$ $$\phi'(x'^\mu)=\phi(x^\mu)+\Psi_{i\alpha} \omega^\alpha,$$ Particularly I'm working out Lorentz symmetry: $$x'^\mu=\Lambda^\mu_\nu x^\nu$$ Infinitesimal version of this transformation is: $\Lambda^\mu_\nu=\delta^\mu_\nu+\omega^\mu_\nu$, where $\omega^\mu_\nu=-\omega^\nu_\mu$ is antisymmetric. So, my problem that I dont understand why (they write this expression in many sources, not only in Gross) $$X^{\mu,\alpha}_\beta=\delta^\mu_\alpha x^\beta-\delta^\mu_\beta x^\alpha$$. If I'm calculating $X^{\mu,\alpha}_\beta\omega^\beta_\alpha$, I get $2\omega^\mu_\nu x^\nu$, not the $\omega^\mu_\nu x^\nu$. Also I've done this calculation: $$f(x'^\mu)=f(x^\mu+\omega^\mu_\alpha x^\alpha)\approx f(x^\mu)+\omega_{\alpha \mu}x^\alpha \partial^\mu f = f(x^\mu) + \frac 1 2 \omega_{\alpha \mu} \left(x^\mu \partial^\alpha-x^\alpha \partial^\mu \right)f $$ If $f=x^\mu$ (coordinate function), then $$X^{\mu,\alpha}_\beta=\frac 12\left(\delta^\mu_\alpha x^\beta-\delta^\mu_\beta x^\alpha\right).$$ What exactly am I doing wrong? A: I think this calculation is the answer for your question: $$\sum_{\alpha,\mu}\frac 1 2 \omega_{\alpha \mu} \left(x^\mu \partial^\alpha-x^\alpha \partial^\mu \right)=\frac 1 2 \sum_{\alpha<\mu}\omega_{\alpha \mu} \left(x^\mu \partial^\alpha-x^\alpha \partial^\mu \right)+\frac 1 2 \sum_{\mu<\alpha}\omega_{\alpha \mu} \left(x^\mu \partial^\alpha-x^\alpha \partial^\mu \right)=\frac 1 2 \sum_{\alpha<\mu}\omega_{\alpha \mu} \left(x^\mu \partial^\alpha-x^\alpha \partial^\mu \right)+\frac 1 2 \sum_{\alpha<\mu}\omega_{\mu\alpha } \left(x^\alpha \partial^\mu-x^\mu \partial^\alpha \right)=\frac 1 2 \sum_{\alpha<\mu}\omega_{\alpha \mu} \left(x^\mu \partial^\alpha-x^\alpha \partial^\mu \right)+\frac 1 2 \sum_{\alpha<\mu}\omega_{\alpha \mu} \left(x^\mu \partial^\alpha-x^\alpha \partial^\mu \right)=\sum_{\alpha<\mu}\omega_{\alpha \mu} \left(x^\mu \partial^\alpha-x^\alpha \partial^\mu \right)$$ Where I Splited sum in "$\alpha<\mu$" and "$\mu<\alpha$" parts. Changed $\alpha \leftrightarrow \mu$ Used antisymmetric property of $\omega_{\alpha \mu}$ and $\left(x^\mu \partial^\alpha-x^\alpha \partial^\mu \right)$
{ "pile_set_name": "StackExchange" }
Bioassay of dapsone for possible carcinogenicity. A bioassay of dapsone, 4,4'-sulfonyldianiline, for possible carcinogenicity was conducted by administering the test material in feed to Fischer 344 rats and B6C3F1 mice. Groups of 35 rats and 35 mice of each sex were administered dapsone at one of two doses, either 600 or 1,200 ppm for rats and either 500 or 1,000 ppm for mice. The rats and mice were treated for 78 weeks; the rats were then observed for 26-28 weeks, the mice for 28-30 weeks. Matched controls consisted of groups of 15 untreated rats and 14 untreated mice of each sex, pooled controls, used for statistical evaluation, consisted of the matched controls combined with 30 male and 30 female untreated rats and 29 male and 29 female untreated mice from similarly performed bioassays of two other test chemicals. All surviving rats were killed at 104-106 weeks, all surviving mice at 106-108 weeks. Treated rats and mice had lower mean body weights than the corresponding controls; when treatment was discontinued at week 78, both species showed some increase in body weight. Survival among rats was unaffected by treatment with dapsone; adequate numbers of animals survived for meaningful statistical analyses of the incidences of tumors. Dapsone did not adversely affect the survival of mice, as shown by the test for positive dose-related trend. Suppurative bronchopneumonia was found in some mice in all matched-control and treated groups. Several control males died early in the study, while survival of the other groups of mice was not affected until week 75. Among rats, mesenchymal tumors of the abdominal organs or peritoneal tissues occurred in 13/35 low-dose males and 22/33 high-dose males. None occurred among control males or among control or treated females. The most commonly occurring tumors were fibroma, fibrosarcoma, or sarcoma, NOS (not otherwise specified), of the spleen and the peritoneum. In male rats, these mesenchymal tumors of the spleen occurred in a statistically significant incidence in both treated groups (low-dose 6/34, P=0.006; high-dose 14/32, P<0.001) when compared with pooled controls. In the peritoneum, the incidences of these mesenchymal tumors were significant in both treated groups (low-dose 5/35, P=0.014; high-dose 6/33, P=0.005) when compared with the pooled controls. No tumors related to treatment were found in female rats. Among the mice, there were no tumors that could clearly be related to treatment. It is concluded that under the conditions of this bioassay, dapsone was not carcinogenic for female Fischer 344 rats or B6C3F1 mice of either sex. Dapsone was carcinogenic (sarcomagenic) for male Fischer 344 rats, causing mesenchymal tumors in the spleen and the peritoneum.
{ "pile_set_name": "PubMed Abstracts" }
package org.eclipse.birt.data.engine.olap.impl.query; import org.eclipse.birt.data.engine.api.IBaseExpression; import org.eclipse.birt.data.engine.olap.api.query.IDerivedMeasureDefinition; public class DerivedMeasureDefinition extends MeasureDefinition implements IDerivedMeasureDefinition { // private IBaseExpression expr; /** * Constructor. * * @param name * @param type * @param expr */ public DerivedMeasureDefinition( String name, int type, IBaseExpression expr ) { super( name ); super.setDataType( type ); this.expr = expr; } /* * (non-Javadoc) * @see org.eclipse.birt.data.engine.olap.api.query.IDerivedMeasureDefinition#getExpression() */ public IBaseExpression getExpression( ) { return this.expr; } }
{ "pile_set_name": "Github" }
It's been nearly three months since, but Black Caps captain Kane Williamson admits he still hasn't watched a replay of the Cricket World Cup final. Your playlist will load after this ad "I saw it live so I don't really need to," he told 1 NEWS. Despite that, he still gets to relive the match - a heartbreaking super over loss to England marred by a controversial boundary call - when he's spotted by Kiwi fans on the street. "You think about it when people come up to you and talk about it," he said. "That's probably within every 10 or 15 metres," he joked. For more on this story, watch 1 NEWS at 6pm. Source: 1 NEWS Williamson said he didn't mind the encounters, though, as it showed how passionate fans were about the game and how the sport captivated the country. "It's been full on in terms of the amount of people who appear to have watched the match and stayed up all night," he explained. "They just want to chat about it and almost unload and I'm like, 'Yeah, it's okay'.
{ "pile_set_name": "OpenWebText2" }
<!DOCTYPE HTML> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <title>Highcharts Example</title> <!-- 1. Add these JavaScript inclusions in the head of your page --> <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.6.1/jquery.min.js"></script> <script type="text/javascript" src="../js/highcharts.js"></script> <!-- 1a) Optional: add a theme file --> <!-- <script type="text/javascript" src="../js/themes/gray.js"></script> --> <!-- 1b) Optional: the exporting module --> <script type="text/javascript" src="../js/modules/exporting.js"></script> <!-- 2. Add the JavaScript to initialize the chart on document ready --> <script type="text/javascript"> var chart; $(document).ready(function() { chart = new Highcharts.Chart({ chart: { renderTo: 'container', defaultSeriesType: 'area' }, title: { text: 'Historic and Estimated Worldwide Population Distribution by Region' }, subtitle: { text: 'Source: Wikipedia.org' }, xAxis: { categories: ['1750', '1800', '1850', '1900', '1950', '1999', '2050'], tickmarkPlacement: 'on', title: { enabled: false } }, yAxis: { title: { text: 'Percent' } }, tooltip: { formatter: function() { return ''+ this.x +': '+ Highcharts.numberFormat(this.percentage, 1) +'% ('+ Highcharts.numberFormat(this.y, 0, ',') +' millions)'; } }, plotOptions: { area: { stacking: 'percent', lineColor: '#ffffff', lineWidth: 1, marker: { lineWidth: 1, lineColor: '#ffffff' } } }, series: [{ name: 'Asia', data: [502, 635, 809, 947, 1402, 3634, 5268] }, { name: 'Africa', data: [106, 107, 111, 133, 221, 767, 1766] }, { name: 'Europe', data: [163, 203, 276, 408, 547, 729, 628] }, { name: 'America', data: [18, 31, 54, 156, 339, 818, 1201] }, { name: 'Oceania', data: [2, 2, 2, 6, 13, 30, 46] }] }); }); </script> </head> <body> <!-- 3. Add the container --> <div id="container" style="width: 800px; height: 400px; margin: 0 auto"></div> </body> </html>
{ "pile_set_name": "Github" }
Leikkelehyllyllä siihen havahtuu. Pienessäkin lähiömarketissa leivän päälle tarjotaan ohutta, ohuen ohutta, keskipaksua ja paksua. Kevyttä, ultrakevyttä, lihaisaa ja Kunnon makkaraa. Palvattuna, pippurisena, ylikypsänä, reilun kypsänä ja hunajapaahdettuna. Sikaa, nautaa, broileria tai kalkkunaa. Poroa ja hevostakin löytyy. Päivittäistavarakauppa ry:n mukaan kauppojen valikoimat ovat viimeisten 20 vuoden aikana kolminkertaistuneet. Kuluttajat ovat oppineet vaativiksi, ja kaupat haluavat vastata tarpeeseen parhaansa mukaan. Leivän päälle kaivataan vaihtelua Lihatuote- ja valmisruokayritys Atria valmistaa tällä hetkellä sataa erilaista itsepalveluleikkelettä. – Juuri leivänpäälliset ovat sellaisia, joihin ihmiset kaipaavat tyypillisesti vaihtelua. Siipikarjapohjaiset tuotteet ovat juuri nyt kasvava tuoteryhmä, ja tässä taloustilanteessa uusia tuotteita kehitetään myös hintakategorian alapäähän, Atrian lihavalmisteiden ja valmisruokaliiketoiminnan johtaja Matti Perälä kertoo. Juuri leivänpäälliset ovat sellaisia, joihin ihmiset kaipaavat tyypillisesti vaihtelua Matti Perälä Uutuuksia yhtiö tuottaa yleensä jokaiselle myyntijaksolle, eli syksyyn, kevääseen ja kesään viidestä kymmeneen kappaletta. Vanhoja poistuu markkinoilta sitä mukaa kuin niiden myynti hiipuu. – Uutuuksien merkitys on meille tietenkin suuri. Niiden avulla tuoteryhmä säilyttää houkuttelevuutensa vaihtelunhaluisten kuluttajien silmissä. Mutta tietenkin liiketaloudellinenkin puoli on tärkeä, niiden avulla valikoima pysyy elinvoimaisena. Suosituimpana yksittäisenä tuotteena yhtiöllä on kuitenkin edelleen vaaleiden leikkeleiden valtias, 50-vuotias Gotler. Seuraavana tulee lähes yhtä perinteinen saunapalvi. Asiakkaat täytyy pitää tyytyväisenä Keskikokoinen Citymarket Kuopion Päivärannassa möi viime vuonna 22 000:ta erilaista elintarviketta. – Tähän tulee tietenkin lisäksi vielä ne, joita ei myyty laisinkaan, kauppias Pasi Toppari laskee. Sellaisiakin kaupan valikoimiin mahtuu useita. Topparin mukaan heikomminkin myyvä tuote kannattaa pitää valikoimissa niin kauan kuin suurin osasiitä ei mene hävikkiin. Kyllähän vähemmälläkin varmasti tulisi toimeen Pasi Toppari – Kyllähän vähemmälläkin varmasti tulisi toimeen. Mutta onhan se kilpailuetu, että asiakas voi luottaa siihen, että saa kaikki tarvitsemansa tuotteet saman katon alta. Toppari kertoo itsekin havahtuneensa valikoiman suuruuteen viimeksi juuri lihajalosteiden ja valmisruokien hyllyä järjestäessään. – Vielä alle vuosikymmen sitten valikoimassa oli 1 300 erilaista artikkelia. Nyt luku on 1 898. Haussa uusi kuluttaja-asenne Valtaisan valikoiman varjopuolena on valtaisa hävikki. MTT on mitannut sen viimeksi vuonna 2011, jolloin se oli Suomessa runsaat 65 miljoonaa kiloa. Entisen MTT:n, nykyisen Luonnonvarakeskuksen ohjelmapäällikkö Juha-Matti Katajajuuren mukaan hävikin vähentäminen vaatisi uudentyyppistä kuluttaja-asennetta. – Se tarkoittaisi, että laskisimme vaatimustasoamme, eli emme vaatisi aina niin montaa eri sortimenttia. Myös siihen pitäisi saada asennemuutos, että esimerkiksi ale-ruokien ostaminen ei ole noloa. Se tarkoittaisi, että laskisimme vaatimustasoamme Juha-Matti Katajajuuri Katajajuuri kertoo havainneensa, että kaupatkin ovat heränneet asiaan uudella tavalla. – Esimerkiksi hedelmä- ja vihannesosastolla, jossa hävikkiä tulee ylivoimaisesti eniten, myydään usein alennettuun hintaan muun muassa kakkoslaatuisia, mutta edelleen täysin käyttökelpoisia tuotteita. Ongelmana Katajajuuri näkee kauppojen palveluhalun. – En tiedä, kuka uskaltaisi olla kehityksen etujoukoissa. Sehän voi tarkoittaa pettyneitä asiakkaita, ja sitä kaupat tuskin tahtovat.
{ "pile_set_name": "OpenWebText2" }
A unique, fresh approach to daily spiritual discipline, this book offers new ways of experiencing the real living presence of God in our lives and the world. Through forty-one days of spiritual practice, Bruce Epperly guides the reader through using both traditional and creative, adventurous experiences. Theological reflections, spiritual affirmations, imaginative prayers and adventurous actions are all part of this day by day guide to spiritual adventure. Choose your own adventure! This is not just the title of a children’s book series, it is also God’s invitation to you and all creation. African American mystic, teacher, and spiritual guide Howard Thurman described our lives as a holy adventure. In each moment, we are confronted with choices, small and large, that will shape what we and the universe will become. Each moment reveals what the Celtic spiritual guides described as a “thin place” where persons can encounter the Living God in ordinary time. While not usually as dramatic as the options in the “choose your own adventure” series, each choice we make in the course of the day awakens new possibilities for our relationship with God and the world in which we live.- Chapter 1
{ "pile_set_name": "Pile-CC" }
"use strict"; var _interopRequireDefault = require("@babel/runtime/helpers/interopRequireDefault"); Object.defineProperty(exports, "__esModule", { value: true }); exports["default"] = void 0; var _extends2 = _interopRequireDefault(require("@babel/runtime/helpers/extends")); var _slicedToArray2 = _interopRequireDefault(require("@babel/runtime/helpers/slicedToArray")); var _isNil2 = _interopRequireDefault(require("lodash/isNil")); var _classnames = _interopRequireDefault(require("classnames")); var _propTypes = _interopRequireDefault(require("prop-types")); var _react = _interopRequireDefault(require("react")); var _lib = require("../../lib"); var _Dimmer = _interopRequireDefault(require("../../modules/Dimmer")); var _Label = _interopRequireDefault(require("../Label/Label")); var _ImageGroup = _interopRequireDefault(require("./ImageGroup")); /** * An image is a graphic representation of something. * @see Icon */ function Image(props) { var avatar = props.avatar, bordered = props.bordered, centered = props.centered, children = props.children, circular = props.circular, className = props.className, content = props.content, dimmer = props.dimmer, disabled = props.disabled, floated = props.floated, fluid = props.fluid, hidden = props.hidden, href = props.href, inline = props.inline, label = props.label, rounded = props.rounded, size = props.size, spaced = props.spaced, verticalAlign = props.verticalAlign, wrapped = props.wrapped, ui = props.ui; var classes = (0, _classnames["default"])((0, _lib.useKeyOnly)(ui, 'ui'), size, (0, _lib.useKeyOnly)(avatar, 'avatar'), (0, _lib.useKeyOnly)(bordered, 'bordered'), (0, _lib.useKeyOnly)(circular, 'circular'), (0, _lib.useKeyOnly)(centered, 'centered'), (0, _lib.useKeyOnly)(disabled, 'disabled'), (0, _lib.useKeyOnly)(fluid, 'fluid'), (0, _lib.useKeyOnly)(hidden, 'hidden'), (0, _lib.useKeyOnly)(inline, 'inline'), (0, _lib.useKeyOnly)(rounded, 'rounded'), (0, _lib.useKeyOrValueAndKey)(spaced, 'spaced'), (0, _lib.useValueAndKey)(floated, 'floated'), (0, _lib.useVerticalAlignProp)(verticalAlign, 'aligned'), 'image', className); var rest = (0, _lib.getUnhandledProps)(Image, props); var _partitionHTMLProps = (0, _lib.partitionHTMLProps)(rest, { htmlProps: _lib.htmlImageProps }), _partitionHTMLProps2 = (0, _slicedToArray2["default"])(_partitionHTMLProps, 2), imgTagProps = _partitionHTMLProps2[0], rootProps = _partitionHTMLProps2[1]; var ElementType = (0, _lib.getElementType)(Image, props, function () { if (!(0, _isNil2["default"])(dimmer) || !(0, _isNil2["default"])(label) || !(0, _isNil2["default"])(wrapped) || !_lib.childrenUtils.isNil(children)) { return 'div'; } }); if (!_lib.childrenUtils.isNil(children)) { return _react["default"].createElement(ElementType, (0, _extends2["default"])({}, rest, { className: classes }), children); } if (!_lib.childrenUtils.isNil(content)) { return _react["default"].createElement(ElementType, (0, _extends2["default"])({}, rest, { className: classes }), content); } if (ElementType === 'img') { return _react["default"].createElement(ElementType, (0, _extends2["default"])({}, rootProps, imgTagProps, { className: classes })); } return _react["default"].createElement(ElementType, (0, _extends2["default"])({}, rootProps, { className: classes, href: href }), _Dimmer["default"].create(dimmer, { autoGenerateKey: false }), _Label["default"].create(label, { autoGenerateKey: false }), _react["default"].createElement("img", imgTagProps)); } Image.handledProps = ["as", "avatar", "bordered", "centered", "children", "circular", "className", "content", "dimmer", "disabled", "floated", "fluid", "hidden", "href", "inline", "label", "rounded", "size", "spaced", "ui", "verticalAlign", "wrapped"]; Image.Group = _ImageGroup["default"]; Image.propTypes = process.env.NODE_ENV !== "production" ? { /** An element type to render as (string or function). */ as: _lib.customPropTypes.as, /** An image may be formatted to appear inline with text as an avatar. */ avatar: _propTypes["default"].bool, /** An image may include a border to emphasize the edges of white or transparent content. */ bordered: _propTypes["default"].bool, /** An image can appear centered in a content block. */ centered: _propTypes["default"].bool, /** Primary content. */ children: _propTypes["default"].node, /** An image may appear circular. */ circular: _propTypes["default"].bool, /** Additional classes. */ className: _propTypes["default"].string, /** Shorthand for primary content. */ content: _lib.customPropTypes.contentShorthand, /** An image can show that it is disabled and cannot be selected. */ disabled: _propTypes["default"].bool, /** Shorthand for Dimmer. */ dimmer: _lib.customPropTypes.itemShorthand, /** An image can sit to the left or right of other content. */ floated: _propTypes["default"].oneOf(_lib.SUI.FLOATS), /** An image can take up the width of its container. */ fluid: _lib.customPropTypes.every([_propTypes["default"].bool, _lib.customPropTypes.disallow(['size'])]), /** An image can be hidden. */ hidden: _propTypes["default"].bool, /** Renders the Image as an <a> tag with this href. */ href: _propTypes["default"].string, /** An image may appear inline. */ inline: _propTypes["default"].bool, /** Shorthand for Label. */ label: _lib.customPropTypes.itemShorthand, /** An image may appear rounded. */ rounded: _propTypes["default"].bool, /** An image may appear at different sizes. */ size: _propTypes["default"].oneOf(_lib.SUI.SIZES), /** An image can specify that it needs an additional spacing to separate it from nearby content. */ spaced: _propTypes["default"].oneOfType([_propTypes["default"].bool, _propTypes["default"].oneOf(['left', 'right'])]), /** Whether or not to add the ui className. */ ui: _propTypes["default"].bool, /** An image can specify its vertical alignment. */ verticalAlign: _propTypes["default"].oneOf(_lib.SUI.VERTICAL_ALIGNMENTS), /** An image can render wrapped in a `div.ui.image` as alternative HTML markup. */ wrapped: _propTypes["default"].bool } : {}; Image.defaultProps = { as: 'img', ui: true }; Image.create = (0, _lib.createShorthandFactory)(Image, function (value) { return { src: value }; }); var _default = Image; exports["default"] = _default;
{ "pile_set_name": "Github" }
Comments : I'm writing a program that is going to have two external interrupt.: I wan't these interrups to occur in the order they are received without: one interrupt having priority over the other.: : my idea "temperature control": : 2 push buttons, one to increase the temperature, one to decrease it;: the main program will be doing it's own thing until an interrupt occurs;: : what is the best way of connecting my two push buttons to my 68hc11?: : if I put one push button on irq and one on xirq one interrupt will have priority over the other, and I don;t wan't this to happen: : thanks: I dont know much about the 68hc11, but how about putting both buttons (i hope theyre debounced!) on the irq line with a gate and using a couple of input port pins aswell. So when a button is pushed, the interrupt triggers and your routine checks the two port pins to find out which one is pressed. This is assuming the code runs faster than you can take your finger off the button
{ "pile_set_name": "Pile-CC" }
Introduction ============ Many students in higher education are not successful and encounter academic failure ([@B66]). One of the factors associated with academic failure is academic procrastination ([@B57]; [@B29]), although there are also instances in which the pressure created by procrastination can improve performance ([@B28]). When students procrastinate, they often experience problems with learning activities, for example, with starting on time to prepare for exams and dealing with deadlines for assignments. In the present study, we define procrastination as *the voluntary delay of an intended and necessary and/or (personally) important activity, despite expecting potential negative consequences that outweigh the positive consequences of the delay* ([@B57]; [@B31], p. 26). In the context of the present study, the "important" activities are learning activities. Various studies clarified that academic procrastination is common among college students. [@B51] conducted a study among 278 Dutch undergraduate college students, showing that more than 70% reported academic procrastination. About 20% reported chronic academic procrastination. In a meta-analysis, [@B57] cited research showing that 80--90% of undergraduate college students report that they experience procrastination in some form ([@B10]; [@B39]). [@B40] investigated the prevalence of academic procrastination in 203 Turkish undergraduate college students and found that 52% of them reported frequent academic procrastination. Although the estimated percentages of procrastination in these studies differ, academic procrastination clearly is a serious problem and has negative consequences. Students who procrastinate regularly receive lower course grades and lower final exam grades ([@B69]; [@B57]), and these students are less successful in their degree programs ([@B65]). The present study examines learning characteristics of students with different levels of academic procrastination and how they deal with factors that possibly influence their learning. We conceptualize learning characteristics as those features of learning processes that students themselves indicate as relevant to their procrastination behavior, as we were interested in students' views of factors influencing their learning. Factors Influencing Procrastination ----------------------------------- Academic procrastination can be seen as a prevalent and pernicious form of self-regulatory failure ([@B57]). Self-regulation is a process through which the student activates and maintains thoughts, feelings, and behavior necessary for achieving personal goals ([@B72]). Differences in self-regulation among students contribute considerably to differences in students' academic achievements ([@B71]) and levels of procrastination ([@B57]; [@B30]; [@B21]). In the self-regulation process, three different phases can be distinguished, when a student sets himself or herself to a given learning activity ([@B53]; [@B43]). The first phase is the forethought and planning phase. In this phase, the student plans his or her study activity, while various thoughts regarding motivation, values, and goals are active. The second phase is the monitoring performance and motivation phase. In this phase, the student has already started the study activity and tries to control his or her motivation and academic performance. For example, during the study activity the student can decide to change his or her learning strategy because it does not have the desired effect. The third phase is the phase after completing the study activity. This is the reflection on performance phase. During this reflection phase, the student attempts to understand why a certain result occurred and manages his or her emotions with respect to this result. In each of the self-regulation phases, procrastination problems can occur [@B22]. For example in the first phase, students with low levels of self-efficacy (e.g., [@B68]) and deficient time management and goal-setting skills ([@B34]) have more procrastination problems. During the performance phase, procrastinating students show low perseverance ([@B21]) and high susceptibility to social temptations ([@B9]). In the self-reflection phase, academic procrastinators tend to make external and global attributions regardless of whether their performance was a success or not ([@B14]). ### Personal Factors Procrastination is influenced by several personal factors. Factors that may increase the tendency to procrastinate include anxiety ([@B56]), depression ([@B61]), self-handicapping (*r* = 0.53; [@B15]), the Big Five factor neuroticism (*r* = 0.26; [@B63]), fear of failure (*r* = 0.63; [@B15]), perceived competence ([@B24]), and pessimistic academic attributional style (*r* = 0.14; [@B65]). There are also factors that may decrease the tendency to procrastinate. These factors include self-esteem (*r* = -0.28; [@B62]), self-efficacy (*r* = -0.54; [@B15]), self-control (*r* = -0.58; [@B57]), and the Big Five factors extraversion (*r* = -0.08), agreeableness (*r* = -0.10), openness (*r* = -0.15), and conscientiousness (*r* = -0.65; [@B63]). Volitional control, social relatedness, and task competence are also important aspects influencing students' procrastination ([@B32]). When students have to do a learning activity for their degree program, it is important that they have a certain level of the executive functioning domains of initiation, plan/organize, organization of materials, and task monitoring ([@B44]). There is a higher risk of academic procrastination if students have poor planning skills ([@B44]), a reduced use of cognitive and meta-cognitive learning strategies ([@B26]), or a low level of perseverance, and if the students are easily distracted ([@B9]). It is also important that students are motivated for the learning activity ([@B21]). Motivation is the force that drives a person to engage in activities ([@B2]) and concerns energy, direction, persistence, and all aspects of activation and intention ([@B46]). Student motivation can be distinguished ([@B46]) as intrinsic motivation, that is, motivation resulting from internal drives (doing a learning activity for the pleasure it brings or because of interest) and extrinsic motivation, that is, motivation resulting from external factors (doing something for an external reason; for example, the student wants to maintain a good relationship with the teacher). High intrinsic motivation reduces academic procrastination ([@B35]; [@B57]). Students have a mastery-approach goal orientation ([@B26]) when they focus on learning, mastering the task according to self-set standards, or when they improve themselves and develop new competencies. Mastery goal orientation is an important factor that prevents academic procrastination ([@B54]). When a learning activity does not intrinsically motivate a student, he or she has to actively transform external regulation into internal regulation and shift from external control of his or her behavior to internal control of his or her behavior. This is the so-called process of internalization ([@B46]). ### Situational Factors Academic procrastination can also be influenced by situational factors. An important situational factor is teachers, because if teachers are well-organized, it is easier for students to organize, structure, and plan their work ([@B7]). Unorganized and lax teachers can be a reason for students' procrastination ([@B21]). Procrastination is also promoted by teachers when they expect less, are willing to negotiate deadlines, and are more flexible in their grading ([@B52]). Teachers with high expectations increase students' class enjoyment and interest and diminish students' procrastination ([@B7]). When a teacher provides clear instructions for assignments, students procrastinate less ([@B1]). When students have to do study tasks, procrastination can be evoked and maintained by task characteristics ([@B38]). A task perceived as boring, unpleasant, and/or uninteresting (so-called task aversiveness) strongly predicts students' procrastination ([@B3]; [@B57]). At the start of a project, task aversiveness is related to personal meaning, such as pleasure, fun, enjoyment, and communion. When a task is perceived as interesting or requires students to use a variety of skills, and when students perceive social norms and rewards for starting promptly, students procrastinate less ([@B1]). An optimal degree of task difficulty is reached if a task is sufficiently challenging but also achievable ([@B62]; [@B57]). Differences in How Students Deal With Procrastination ----------------------------------------------------- Thus, various factors could influence students' procrastination behavior. However, there also can be differences between students in how they are influenced by these factors. Interviews with experienced university counselors showed that antecedents and consequences of academic procrastination are largely a reflection of students' characteristics, personal and learning situations, and the environment of the university ([@B42]). There can also be differences between students' delaying behavior and having academic procrastination, because delaying a task can be an intentional decision. For example, students intentionally delay because of other priorities or because they feel they can work better when they set aside a designated period of time ([@B36]). [@B21] showed that students who are pressure-seeking types are not negatively affected by academic delays and have low academic procrastination. An interesting study for insights into differences between students with different levels of academic procrastination was conducted by [@B38]. Their study showed that differences in students' academic procrastination are associated with the manner in which students deal with environmental factors that might provoke procrastination behavior. Academic procrastination (in the form of choosing social activities when intending to do academic work) and the evaluations of other students' procrastination habits were higher in students in the field of humanities compared to the field of natural sciences and medicine. Differences between students were moderated by the dispositional tendency to procrastinate. The humanities students demonstrated a higher level of socially induced academic procrastination and evaluated other students' procrastination habits (peer procrastination) more than students in medicine and natural sciences did. Environmental factors had a negligible impact on academic procrastination on students with a low disposition to procrastinate. For students with medium levels of dispositional procrastination, which are the majority, procrastination-friendly environments facilitate and augment the students' procrastination. Research Gap ------------ Academic procrastination is a highly complex human behavior that involves a combination of affective, cognitive, and behavioral components ([@B4]; [@B6]). Despite the extensive, mainly quantitative, research concerning procrastination, there is still a lack of understanding of why students procrastinate ([@B57]; [@B32]; [@B27]). Because we wanted to get insights into differences among students with high, average, and low procrastination, we selected students with different measured levels of procrastination. This is an important difference compared with previous qualitative studies on academic procrastination. Most previous qualitative studies about academic procrastination (e.g., [@B21]; [@B32]; [@B36]) included students with high academic procrastination. The selection of the respondents in those studies was not based on students' measured levels of academic procrastination, but students were, for example, approached on the university campus restaurant by the interviewers and asked whether they would be willing to participate in an interview study concerning academic procrastination ([@B32]). In other studies, flyers were distributed on the university campus with a call to participate in the study ([@B21]), or students were asked to fill out a questionnaire between lectures or students were contacted through the course forum when they did not attend lectures ([@B38]). The Present Study ----------------- Therefore, we know that factors influencing procrastination can work differently among students from different academic disciplines and among students with different procrastination levels ([@B38]). We do not know how the process behind these differences works. In the present study, we wanted to dig deeper into the process behind students' academic procrastination and how students deal with factors that might influence their learning. We see the present study as an important continuation of [@B38] study in which they concluded that social and environmental factors should receive increased attention and suggested that future studies should include more diverse measures. We conducted the present study from a qualitative perspective, because students' views ([@B32]) could show more about their learning characteristics whether and how they deal with procrastination. With this study, we wanted to provide new insights for theoretical groundwork in procrastination research and provide insights that can be used for developing interventions that teach students how to handle their procrastination. This is important for educational institutions and people in these institutions who work with students, such as teachers, counselors, and educational psychologists. Research Question ----------------- The following research question guided the present study: what are differences between students with low, average, and high levels of academic procrastination in learning characteristics and in factors that might influence students' learning? Materials and Methods {#s1} ===================== To our knowledge, the present study is the first study to explore differences in learning characteristics and in the influential factors on academic procrastination among students with low, average, or high academic procrastination tendencies. We conducted a qualitative interview study because we aimed to explore this topic without preliminary hypotheses and wanted to get insight into students' actual experiences and regulation of learning activities, and how they relate to the students' study practices. Sampling -------- In this study, we interviewed 22 students (7 men, 15 women, age between 16 and 22 years; *M* = 17.7, *SD* = 1.4). All students were freshmen in a full-time 4-year elementary teacher education program at a small teachers college with approximately 1,500 students, situated in the western region of The Netherlands. To select the participants for the interviews, we first wanted to know at what level students actually experienced academic state procrastination in the week before their exam period. Therefore, we measured the students' academic procrastination with the Academic Procrastination State Inventory (APSI; [@B50], unpublished). The APSI is an existing Dutch questionnaire that meets the requirements of internal reliability and validity (α = 0.94) and has been used in previous research (e.g., [@B25]). In the APSI, the student is asked about his or her study behavior during the week before completing the questionnaire. Each of the 31 items begins with the question "How often did you... last week?" On a five-point Likert scale from never (1) to always (5), the student indicates his or her assessment of how often something happened. After measuring all first-year students' (*N* = 215) levels of academic state procrastination, we used the data of the students who completed the APSI questionnaire (*N* = 186; 26 men, 160 women, age between 16 and 22 years; *M* age = 17.62, *SD* age = 1.03; *M* APSI = 81.68, *SD* APSI = 19.38, *α* APSI = 0.93). We ranked the outcomes and classified three groups of students, based on their APSI scores: students with the lowest sum score, students with an average sum score, and students with the highest sum score for academic state procrastination. In the order of the sum score ranking (beginning with the lowest-scoring student of the low procrastinators, the average-scoring student of the average procrastinators, and the highest-scoring student of the high procrastinators), the first author of this article approached students personally. He informed them about this study and asked whether they were willing to participate in the study and to be interviewed about how they gave meaning to their learning activities. As a result, 22 students were interviewed: eight students with low procrastination scores, eight students with average procrastination scores, and six students with high procrastination scores. See **Table [1](#T1){ref-type="table"}** for the APSI scores of all first-year students and the groups of selected participants. ###### Academic Procrastination State Inventory (APSI) scores of the selected participants and all first-year students. Age Academic state procrastination^∗1^ ------------------------------------ ----- ------------------------------------ ------- ------ ----- --------- -------- ------- ***Low procrastinators*** 16 22 17.75 1.83 36 56 49.13 6.15 *N* = 8: three males, five females ***Average procrastinators*** 16 20 17.75 1.28 73 81 78.89 2.75 *N* = 8: two males, six females ***High procrastinators*** 17 19 17.50 0.84 110 129^∗2^ 117.00 7.01 *N* = 6: two males, four females ***All first-year students*** 16 22 17.62 1.03 36 131 81.68 19.38 *N* = 186: 26 males, 160 females ∗ 1 The lowest possible minimum score is 31; the highest possible maximum score is 155. ∗ 2 The APSI maximum of the high procrastinators differs from the APSI maximum of all first-year students, because not all high procrastinators we approached were willing to be interviewed. Interviews ---------- All the interviews were conducted individually by the first author of this article. The interviewer was not familiar with the students and had no relationship with them. At the start of the interview, the interviewer gave information about the interview process. He explained that the interview would take about 45 min and that the interview was about how the student gave meaning to his/her learning activities. The interviewer explained that he wished to make an audio recording and asked the student for permission for this. He stated that the interview would be processed anonymously and that the conversation was an open conversation, in which there would be no right or wrong answers. The interview protocol for this study was structured by seven general questions. The interviewer used the questions as guidance but also probed specific issues that came up during the interview. The interview questions were general questions regarding students' personal experiences with preparing for assignments and exams, as well as questions to better understand students' procrastinating processes and the influential factors (see **Table [2](#T2){ref-type="table"}**). With the interview questions, we wanted to cover the three phases of the self-regulation process ([@B53]; [@B43]): the forethought and planning phase, the monitoring performance and motivation phase, and the phase after completing the study activity, as well as factors influencing the students' learning. During the interviews, the interviewer used the protocol to check whether all interview questions were covered. On average, the interviews lasted 46 min (*SD* = 9). ###### Overview of the interview questions. Interview questions --------------------- ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- \(1\) Why did you choose this degree program? \(2\) If you have to study/complete assignments for your study, how do you get started? Can you describe your approach? \(3\) How is it for you to be engaged in study activities? \(4\) How is it for you if, while performing study activities, you realize that it is going well? What do you think? What do you say to yourself? \(5\) How is it for you if, while performing study activities, you realize that it is not going well? What do you think? What do you say to yourself? \(6\) How do you appreciate yourself in general? \(7\) What expectations do you have about the results, before an examination? Do you expect them to be positive or negative? What explanation do you have for that result? The procedures of this study were carried out in accordance with the recommendations of the local guidelines of the Faculty of Behavioural and Movement Sciences, VU University Amsterdam ([@B67]). This study was approved on these guidelines by the local ethic committee Research Centre of Driestar Christian University. All subjects gave written informed consent in accordance with the Declaration of Helsinki. Analysis -------- The interviews were anonymously transcribed by a research assistant. The first author read the interviews to get an overall impression and then segmented the text into meaningful units that were comprehensive by themselves and contained one idea, episode, or piece of information ([@B60]; [@B49]). The first author coded nine selectively chosen interview transcripts (the highest-, middle-, and lowest-scoring participants of each subgroup of procrastinators) and composed the codebook, consisting of 18 codes. For the coding procedure, the software ATLAS.ti was used. To calculate intercoder reliability, a research assistant independently coded the nine interviews. Cohen's kappa was calculated for the nine interviews, based on the 18 codes and the 193 segments. The intercoder reliability was good (*κ* = 0.82). After this procedure, the first author coded the remainder of the segments (13 interviews, consisting of 324 segments). To further structure the data, we performed a qualitative content analysis using a thematic analysis approach ([@B11]) to identify overarching themes that captured the differences in learning characteristics and the factors that influence students' learning, as described by participants in the interviews. This analysis resulted in six main themes. To promote validity, the authors applied peer debriefing several times until consensus was reached, and they critically discussed the results of the coding process, the formulation of overarching themes, and the selection of the illustrative quotes. When one or more participants gave answers that contradicted one of the themes we described, we did not neglect these quotes but used them to further elaborate the findings and mentioned the quotes in Section "Results." We also counted how often quotes occurred in relation to the total number of the students in a subgroup and showed this in Section "Results." See **Table [3](#T3){ref-type="table"}** for an overview of the codes and themes. ###### Overview of codes and themes. Codes Themes Explanation --------------------------------------------------------------------------------------------------------------- --------------------------------------------- -------------------------------------------------------------------------------- Motivation to be a teacher \(1\) Degree program choice Student's motivation for his or her degree program choice Approach when performing study activities \(2\) Getting started with study activities Student's approach for getting started with study activities Positive feeling(s) when working on or completing study activities \(3\) Engagement in study activities How the student is engaged in study activities Being in the flow: absorbed in the study activity Motivation enhancing the study experience or study activity Postponement behavior \(4\) Ways of reacting to failure How the student reacts to failure or difficult moments during study activities Distracting thoughts during study activities Focus on what is finished or what still needs to be done Need for fun and contact with friends or other people Dealing with setbacks when the activity is not successful Dealing with moments of lack of motivation/boring study tasks/not seeing the usefulness of the study activity Dealing with distracting multimedia (Facebook/WhatsApp) Sense of conscience/discipline/responsibility Attitude of life Belief in oneself or in one's ability to succeed \(5\) View of oneself The way the student sees himself or herself Attitude of acceptance \(6\) Study results Expectations for and evaluations of study results Expectation about exam results/results of assignments/feelings of anxiety about exams Results ======= Six themes emerged from the interview data, which we discuss below. In these six themes, there were clear differences between all three groups of students, or between one group and the other two groups. In the description of each theme, we present between brackets (.../...) how often quotes occurred in relation to the total number of the students in that subgroup. Every theme is illustrated with a representative quote. When one or more students in the subgroup gave answers related to the theme that contradicted the quotes we described, we also give representative examples of these contradictory quotes. The student names cited for each quote are pseudonyms. See **Table [4](#T4){ref-type="table"}** for a summary of the results. ###### Summary of the results. Low procrastination students Average procrastination students High procrastination students --------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Degree program choice Intrinsically motivated decision to become a teacher. Intrinsically motivated decision to become a teacher. Have no clear idea of becoming a teacher. Choice confirmed by positive experiences with theoretical and practical parts of the program. Internships are important experiences motivating students to continue with their program when they have doubts about it. Have doubts about the program and consider quitting. Getting started with study activities First focus on the description of the activities content, nature of the material, and assignments requirements, and then plan tasks and goals to achieve. First focus on content or number of activities and then plan tasks and goals to achieve. Plan learning activities, but carrying out the plan depends on certain preconditions. Set no preconditions to start. Set no preconditions to start. Set preconditions to start. If preconditions are not met, the learning activity will be postponed. Engagement in study activities Intrinsically motivated and go for it. Focus on completing study activities and less so on possible takeaways. Focus on the utility of the study activity. When the learning activity appears to be useful and enjoyable, they enjoy doing it. Aware of how the activity is going and the progress they make. Consciousness of gaining insights and general knowledge. Progress of the task is determined by relevance to the profession and applicability during internships. If not, it's hard to remain engaged. When a learning activity is boring and considered stupid, they tend to stop doing it, turning to other non-school activities that are more appealing. Further their knowledge. Reflect on own role as a teacher when learning activity bears on the profession. Way of reacting to failure Remain focused on completing the learning activity when the result is not desirable. Do less and think they are wasting their time when the result of a learning activity is not desirable. When progress is disappointing, then judge themselves negatively. Encourage themselves verbally to keep going. Experience a sense of failure and feel low or moody. Experience negative feelings and low self-esteem. Rely on their capacities to complete the learning activity. Are hopeful that they will manage and expect that, in the end, they will be able to complete. No longer believe that they are up to it. Those negative feelings can also concern situations outside the program View of oneself Satisfied with the person they are. In general satisfied with the person they are, but also critically reflect on themselves seeing points for improvement. Some moments of not being satisfied with the person they are. The esteem others have for them is also important. Positive self-esteem. Positive self-esteem. Frequent moments of negative self-esteem. Study results Confident about results beforehand, which is reinforced by good results in the past. Sometimes doubtful beforehand about the results. Confident beforehand if they know they spend enough time to prepare for exams. Levelheadedness, no stress or nerves for exams. Nervous about exams and feel pressure to do well. No fear or nerves about exams. Passing the exams is explained by their own efforts. Expectations of passing or failing depend on the difficulty of subject. See themselves as the determining factor in passing or not. If they fail, they attribute their failure to not spending enough time preparing for the exam and/or to not attending all lectures. Theme 1: Degree Program Choice: Intrinsically Motivated Versus "I'd Rather Do Something Different" -------------------------------------------------------------------------------------------------- ### Students With Low Levels of Procrastination When considering statements about motivation for doing the degree made by the group of students with low levels of procrastination ("LP students"), all LP students reported this choice was intrinsically motivated, as the logical way to fulfill their dream of becoming a teacher (8/8). 1. I am highly motivated to do this degree. It simply is my dream to become a teacher (...). (Tiffany) All the LP students were intrinsically motivated for the degree they were doing. They described it was the right choice which was confirmed by their positive experiences with the theoretical and practical parts of the program (8/8). 1. The assignments are so interesting and fun to carry out that you really enjoy doing them. You get a positive energy to carry on. This feeling---I can do it, I've submitted it, it looks good. And then, "Okay, up to the next one..." It's just nice to experience it like this. (Lucas) Most of the LP students felt it was self-evident that they should be committed to the program and persevere. They felt they were accountable for the choice they made for their degree (5/8). 1. It is simply perseverance, because I want to. I just want to get those credits and do well. I really think it is important. You decide to take this degree, so you really go for it.... My approach is purposeful. I have a goal in mind, and I feel responsible for it. Because I chose to do this, it is up to me to do well. I want to become a good teacher, so it's important to go to class and make sure you learn from it. (Irma) ### Students With Average Levels of Procrastination All students (8/8) with average levels of procrastination ("AP students") stated they carefully chose their degree program. They had a clear intrinsically motivated goal in mind for doing the degree; they wanted to become a teacher. 1. I've known for a long time, since I was four years old, that this is what I want. So I think like, this is your drive to get things done after all. (Marvin) Most AP students reported they were more focused on the practical part and less on the theoretical part of the degree (6/8). The internships in the field of their profession were very important to most AP students (7/8). When AP students had doubts about their degree program choice, most drew energy from their internship experiences, which provided them with the incentive to continue their degree (5/8). They realized once again why they wanted to do this, namely, to become a teacher. 1. With some assignments, I have that kind of feeling like, what for? Surely, I don't need all that to become a teacher.... Doing the internship confirms my choice, I really enjoy doing that. But at school I don't always have that feeling. I just love the practical work. So then I think, well I've just got to get through those four years. The internship makes that I realize that this is what I really want. (Ailyn) ### Students With High Levels of Procrastination Students with high levels of procrastination ("HP students") described they did not carefully choose their degree program. Finishing the degree or becoming an elementary school teacher was not the primary intrinsically motivated goal for the majority of HP students (4/6). Most of the students reported their interests lay elsewhere (4/6). The students had a wide range of reasons for still opting for an elementary teacher education program. 1. I didn't have that feeling like "this is what I want later in life" when I opted for this degree. Of course, if you think this is super fun, you will be much more dedicated to the program. But that hasn't been the case for me from the start. I'm here because I didn't have a better idea.... Once I'm done here, I should like to continue at university, I'm kind of interested in History. (Jack) Most HP students (5/6) stated they were doubtful about continuing their degree and considered quitting. Some (3/5) of these HP students who were doubtful about continuing their degree and considered quitting their studies, explained that the program content and the learning activities that came with it had little appeal. 1. If all day long all you do is being busy with those stupid assignments, you do start to wonder, why am I doing a degree in elementary teacher education? I'd rather do fun things. I've got that quite often.... So I'm not really that positive about the program. I keep wondering whether this is the right choice for me. (Jennifer) For some HP students (2/6) who carefully chose their degree program, the way things were going at the college gave them the feeling they were not in the right place. Therefore, they wanted to continue their studies at a different teacher training college. 1. This college just isn't the place for me. I find it too strictly Christian.... I've enrolled in a different college for next year. (Ariah) Theme 2: Getting Started With Learning Activities: Just Get Started Versus Get Started Only Under Certain Preconditions ----------------------------------------------------------------------------------------------------------------------- ### Students With Low Levels of Procrastination Most of the LP students (6/8) stated, when they had to perform learning activities for the program, their approach was to focus first on the description of the content of the activity. In this way, they assessed the nature of the material and the assignment's requirements. Based on this orientation, they planned the different tasks, considering the goals they wanted to achieve for completing the activity. Then the students performed the learning activity. They did not set any preconditions for getting started. 1. The first thing I do primarily is to look at the assignment, see what it says. Its requirements, what I need to do. Then I start with the assignment until I'm done. Or at least I get started with it. I see how far I get, how much time I've got.... I make a to-do list for the assignments. (Audree) All LP students (8/8) stated, that when they started with their learning activity, they found out easily whether they had made the correct assumptions about it, and then they expected to see how far they get. 1. I primarily make sure I understand the assignment and if I don't, just ask. And then I just get started with it and see how far I get. If I'm stuck, I just see what I can do about it so that I can get on with it. You just need to know what's expected... I could start straightaway, but then it would go like, I'm in the middle of it, and I realize this should go in and that as well and I shouldn't have done such and such because I don't need it at all. And I don't like that! (Lucas) ### Students With Average Levels of Procrastination Most of the AP students (7/8), described that, when they had to perform learning activities for the program, they did not set any preconditions to get started and just begin. Four of these AP students who did not set any preconditions planned their work after orienting themselves to the content of the activity. The other three planned their work after it was clear how much they needed to do. Their study behavior was guided by making themselves familiar with the demands of the assignment and its deadline. 1. At the start of the term, I read the course guides and note down the assignments I have to do for each course. I put them in a schedule, so that I know, this is what I have to do in this term and those are the deadlines. It's a kind of goal I set myself. I find it quite useful.... So that I have an absolutely clear overview of what needs to be done in terms of assignments and exams. (Juliet) ### Students With High Levels of Procrastination When HP students had to perform learning activities for the program, most reported they made a study plan (5/6). Whether the plan was actually executed depended for most of the HP students on certain preconditions they have (5/6). Examples of such preconditions regarding study activities are: does the activity yield enough credits? Is the activity attractive and fun to do? Is it clear what must be done? Is the activity not too difficult? How nearby or far is the deadline when the activity must be done? Does the activity concern group work? Some conditions have to do with the student, such as they need a clear overview in order to get started or must feel some enthusiasm for it, be in the right mood for it, or be confident about their ability to complete the learning activity successfully. 1. I'm not good at planning my work. I can make a plan but I do not stick to it. I kind of think, what appeals to me now, or more often really, what must be done now or is there any group work that has priority, because with group work you must do your bit. With the other stuff I look at how important it is, how soon I'll get credits for it, things like that. (Jennifer) In the absence of preconditions, most of the HP students described they easily postponed learning activities (4/6). 1. If an assignment isn't clear, and I believe it is difficult, I postpone it. Because I feel that 'I won't be able to do it anyway,' or 'I don't know how to go about it.' (Ariah) Most HP students told they often thought they had enough time to do the learning activity and postponed getting started, thinking "there's still time" (4/6). Such procrastination behavior could occur at different moments: at the start of the term when there was still enough time, but also when the deadline was near, such as the week before the submission of a report or even the evening before the day of an exam. 1. If I read the summary half an hour before it, I usually get a pass. For example, I think, I've got an hour, so if I get started at nine o'clock, I'll get it done. And then it is nine thirty, and I think, oh well, tomorrow is another day. (Jennifer) Theme 3: Engagement in Learning Activities: Interested in the Content for Its Own Sake Versus Usefulness of Content in Practice ------------------------------------------------------------------------------------------------------------------------------- ### Students With Low Levels of Procrastination Reporting about performing learning activities, most LP students (7/8) told they were conscious of their own commitment to the activity and of how the activity was going. When they (5/8) found the content interesting, they looked to further their knowledge. Because they were interested in the content, they actively became more engaged, deepening their knowledge and doing more than was required by the assignment. 1. If I'm interested, I learn from it. What those people say, I then think, hey, that's a good one, I want to find out more about this. I then sometimes search for articles in newspapers or for discussions about it. (Tiffany) In the experience of LP students, performing learning activities was something they enjoyed (5/8). They were aware that they were gaining important skills and knowledge from doing these activities and that these skills contributed to their personal development. 1. Looking at how far I've come and what I've learned. It all contributes. General knowledge. Knowledge about teaching, insight into yourself. Really very useful. (Lucas) Whether certain learning activities did not look interesting or useful to LP students, most students still continued doing them (7/8). The students described they realized that completing the unenjoyable learning activity was necessary to be able to complete their degree. In their minds, the activity was just something that formed part of the curriculum and just has to be done. They showed perseverance, wanting to get it done. 1. I do not always see the usefulness of an assignment. You've still got to do it though, to build your knowledge and be able to do it in practice. This is after all what's expected of you, it's part of your professional attitude. (Brandon) ### Students With Average Levels of Procrastination When AP students reported about performing learning activities, most described they focused on completing the activities (5/8). These students were less interested in the question of what they would take away from it. Most AP students were motivated to do the learning activity if the activity looked inherently interesting (5/8). Half of the AP students reported it was easier to get started and complete the activity when they considered it interesting (4/8). In order to stay engaged with the activity when completing it, it was important to half of the AP students that the activity was interesting and/or fun. If that was the case, they felt it was easier to perform the activity (4/8). 1. Theories are often too remote. If I don't find it interesting, I think, stupid assignment, I'll leave it till later. With practical assignments, I really put myself to it, thinking, 'I'll make sure it's good.' (Amber) Most AP students described they were interested in the learning activity if it was relevant for, and applicable to, the profession (6/8). They asked themselves, "What can or should I do with this as a teacher?" If a learning activity's usefulness was unclear, then it had little appeal, which made starting the activity harder. 1. It's more fun to do if the material is interesting and practice-oriented. Seeing how you could apply it easily makes it more appealing. It is also easier to remember. (Ailyn) When a learning activity was not interesting or appealing, for all AP students it was harder to get started with it and persist (8/8). 1. When studying for my exams, I notice I'm not really into that. So I think, tomorrow is another day. Then I postpone it again. (Marvin) ### Students With High Levels of Procrastination All of the HP students reported it was important for them to perceive the learning activity as useful and enjoyable. In that case, they were motivated to perform it, and experienced it as pleasant to do (6/6). 1. If teachers would just explain the assignments in class, tell you which to do, and about their purpose. But they never do so. Why so many assignments? Just set a few small assignments with a clear purpose. That would be a huge difference for me. Then I'd do them. (Gordon) Most HP students (5/6) described they did not perceive the utility of a learning activity if they considered it boring. They tended to stop doing it and turned to other activities that were more appealing. 1. If all day long all you must do is those stupid assignments. You do start to wonder, "Why am I taking this degree? What am I doing here? I would much rather do something more fun." That happens quite often with me. (Jennifer) Theme 4: Ways of Reacting to Failure: Perseverance and Getting It Done Versus Doubting One's Ability and Giving Up ------------------------------------------------------------------------------------------------------------------ ### Students With Low Levels of Procrastination Most LP students (7/8) reported they did not give up when their efforts for the learning activity did not seem to lead to a desirable result. LP students were aware that the learning activity was not going as well as they would have liked. They were annoyed but still focused on their goal, wanting to complete the learning activity. Most LP students maintained a positive attitude, relying on their ability to eventually complete the learning activity (5/8). 1. If it isn't going well, you often feel kind of, "Come on---just get on with it and then you're done. Just carry on and then it is finished." That's how it works for me. It's like "it's something that simply has to be done, just go for it now so that it won't bother you later." (Whitney) ### Students With Average Levels of Procrastination Most AP students (7/8) described they noticed that an activity was not going well and that they were doing less than they would have liked to, when their efforts for the learning activity did not seem to lead to a desirable result. If it was not going according to their wishes, most AP students (6/8) reported they got negative feelings, thinking they were wasting their time. For example, they felt low and/or moody, or experienced a sense of failure. 1. But if I'm working on it and not managing, I'll feel very negative. Thinking "Oh it isn't going well at all, I'm just wasting my time." I kind of drift off ... And then I feel quite low. I feel a bit of a loser. (Amber) In such situations, when performing the learning activity was not going well, most AP students (6/8) were still hopeful that eventually they would manage, expecting that in the end they would be able to complete the activity satisfactorily. 1. I kind of think, 'Come on, you can do this.' I then keep telling myself 'just get it done, put yourself to it, and when it is finished you are done.' (Juliet) ### Students With High Levels of Procrastination When the efforts of HP students for the learning activity did not seem to lead to a desirable result, these students described they judged themselves negatively (5/6). Their self-esteem seemed to drop, and they no longer believed that they were up to the task. They no longer wanted to persist, could not recover from a downward spiral, and gave up (5/6). 1. So then I think, "I'm stuck." Or when an assignment is returned for rewriting for the third time, I don't even bother. You never get it right. That wears me out. You try, make an effort, but still it's not right. And then you think, "Why bother..." (Jack) Most HP students reported those negative feelings also concerned situations outside the program (5/6). 1. Then I just think I can no longer do it. And if that happens, I have the same feeling with other things, too. I lose interest, no longer feel like it. It doesn't have to be like that, but at such moments everything looks negative. Your self-esteem really drops. (Gordon) Theme 5: View of Oneself: Positive Versus Negative -------------------------------------------------- ### Students With Low Levels of Procrastination All LP students described a positive view of themselves. Their self-esteem was positive and unwavering (8/8). They knew they had the capacity to complete their degree, which was confirmed by the high grades they received. 1. My self-esteem is quite positive. At a certain point, you know you can do it... With negative self-esteem, thinking you aren't up to it, I think it soon becomes harder to do... To me, it isn't surprising really that I pass everything. My grades are quite good actually. (Audree) Most LP students reported they were satisfied with the person they were. They accepted themselves as they were (6/8). 1. I am who I am. I'm okay with that. (Brandon) ```{=html} <!-- --> ``` 1. No complaints. I am who I am and accept who I am. (Lucas) ### Students With Average Levels of Procrastination Most AP students reported they were generally satisfied with the person they were, and their self-esteem was positive (7/8). In addition, they reflected critically on themselves, seeing certain points for improvement. (7/8). 1. I'm happy with the person I am in most respects. Besides, there isn't much you can change really. I'd like to be a little more outgoing with respect to other people. A little more forthcoming in groups. That doesn't happen so often. (Julisa) ### Students With High Levels of Procrastination Most of the HP students (4/6) described they had frequent moments of low self-esteem. 1. Sometimes I think, "Ugh, I don't want to look the mirror." Without cause. I don't know. How I feel also has to do with how I look. After experiencing success or when we're having fun together, I think, hey, I don't look so bad, and I'm okay. But on a day when I fail something, it affects everything. It's all or nothing with me. (Ariah) In judging themselves, half of the HP students (3/6) reported they did not consider only the way they viewed themselves but also how they were appreciated by others. For two of them this view included HP students' view of fellow students or and for one students the view of teachers. 1. What someone else thinks of me is almost more important than what I think myself---that doesn't count really, it's not important. I don't dare relying on my own opinion of myself. (Ariah) Theme 6: Study Results: "I Passed Because I Am Able To" Versus "I Failed Because of Poor Preparation" ----------------------------------------------------------------------------------------------------- ### Students With Low Levels of Procrastination Most (7/8) of the LP students described they were confident about the results and embarked on the exam period with a certain levelheadedness. None of the LP students (8/8) suffered from stress or nerves. 1. If I know 'I did my best," then that's what it is. I'm never nervous beforehand. (Brandon) When LP students (4/6) passed an exam, most reported they believed it was due to their own efforts, because while preparing they did what they had to do. 1. Beforehand, I expect to pass. I simply go for it. I prepare as best as I can... I do what I can, and then it's just a matter of wait and see. (Lucas) Most of the LP students (5/8) described their confidence about passing their exams was reinforced by good results in the past. Previous good grades were a confirmation of the students' abilities, boosting their confidence they would pass their exams. 1. Now, when facing an exam, I expect to pass. In fact, I've never failed an exam. (Teresia) ### Students With Average Levels of Procrastination Most AP students (5/8) reported they were doubtful about their exam results when they embarked on the exam period. For three of them who were doubtful, this doubt depended on the subject. 1. I know that in most cases I'll pass. Sometimes, I'm afraid to fail, because it's difficult. I'm not really good at arithmetic, for example. (Joyce) Several AP students described their confidence in passing their exams was negatively affected by thoughts of expecting to fail (3/8). 1. I often have negative thoughts like 'I won't pass anyway.' (Rebeca) For two AP students, expecting to fail seemed to act as a form of self-protection (2/8). In their view, it was better to say they would fail than state beforehand that they would pass. When they failed, it was a drawback and a disappointment; when they passed, it was something of a windfall. 1. It's often like, "I don't know." Not often like "don't worry, you'll pass." That would be a little scary. In case you fail, and you thought "surely you'll pass." Then if you don't pass, you're really very disappointed.... If you depart from the notion that you'll fail, then it could always be better than expected, right? (Juliet) Some AP students (3/8) reported they were nervous before the exam period. This feeling went with the thought that it was all or nothing during exam week. They felt pressured to perform well. 1. I'm quite nervous always. I'm not sure about myself. Will I manage? The exam period is very demanding, and you have to show your best abilities. (Howard) ### Students With High Levels of Procrastination Most HP students (4/6) described they did not suffer from fear or nerves before exams. They saw themselves as the determining factor in passing or not passing their exams. 1. When I'm well prepared, I expect to pass. (Melani) In practice, however, most HP students (4/6) reported they often prepared poorly. They did not spend enough time preparing for the exam and/or did not attend all lectures. In the students' view, this behavior explained why they failed some of their exams. 1. You do hope to pass, but occasionally, you've got to admit that it's not going to happen. I don't always prepare that well, and I do tend to skip lectures, and then you miss out on quite a lot. (Jack) Discussion ========== We know that different factors might influence procrastination. The importance of this study is that it shows that there are differences between students with low, average, and high levels of academic procrastination, in whether or how factors influencing procrastination play out in practice, and whether or how this influences students' learning. The results show that for low and average procrastinators their self-chosen goal of becoming a teacher works as a strong intrinsically motivational drive to work on study activities and finish them. This seems to be related to what is called the need for autonomy in Self-Determination Theory ([@B46]). High procrastinators lack the intrinsic motivation to become a teacher, and starting and/or continuing study activities is a problem for them. These students seem unable to externally regulate ([@B46]) their behavior and are unable to shift from an external control of their behavior to an internal control of their behavior. The results are in line with [@B70] who showed that the level of procrastination reported by undergraduate students can be viewed as a function of the motivational beliefs important for self-regulated learning. The results are also in line with other studies showing the role of motivation in students' academic procrastination. For example, [@B23] found that the use of motivational regulation strategies had significant positive indirect effects on students' academic performance and affective/cognitive well-being, via academic procrastination. [@B4] showed that procrastination is less likely to occur for intrinsically motivated activities and [@B65] showed that students' lack of motivation influences their levels of academic procrastination. The motivational problems of high procrastinators can be explained with the temporal motivation theory (TMT; [@B58]). Because high procrastinators do not have a clear intrinsically motivated goal, they do not have an expectation of receiving anything of size or value for starting or finishing their study activity. This result of our study adds the insight that average procrastinators can deal with the tendency to procrastinate, if the value of what they do is clear to them. The results show that high procrastinators set certain preconditions to start or continue a task. For these students, task aversiveness is an argument to postpone or give up a task. This finding is in line with previous research ([@B48]; [@B1]; [@B57]) in which task aversiveness was a predictor of procrastination behavior. The present study adds insights into how students deal with the factor of task aversion. While for students with high levels of procrastination task aversiveness is an argument not to start or to stop, for students with low and average levels of procrastination, task aversion does not automatically lead to procrastination behavior. Admittedly, low procrastinators had less task aversion, because they found everything interesting and deepened their learning. This is in line with the study by [@B59] showing less procrastination was associated with a strategic learning approach. This was different for average procrastinators who reported experiences of task aversion. They realized that finishing the task was important to reach their goal of becoming a teacher, which helped them finish the task. This outcome is partly in line with the study by [@B38], which showed that for students with a low disposition to procrastinate, environmental factors had a negligible impact and for high-level procrastinators, environmental factors facilitated and augmented procrastination. The results of the present study differ for the group of students with average levels of procrastination, because in this study environmental factors had a negligible impact on students with average levels of procrastination. The students' drive to become a teacher makes them persevere. The results show how self-control ([@B57]) among students with different levels of procrastination works. This factor plays a role at different moments in which students work on study activities. An important aspect of having self-control is *effort regulation* ([@B45]), which refers to the capacity to persist when confronted with academic challenges, and for example, start unconditionally when a task is perceived as unattractive. The results show that high procrastinators seem not able to regulate their effort. In addition, when a task turns out to be unattractive, a difference in self-control surfaces: high procrastinators then tend to stop, while average procrastinators tend to continue completing the task, as they keep the goal of becoming a teacher in mind. Low procrastinators are able to make the task interesting to themselves. A possible explanation for these results for the different learning characteristics for students with low, average, and high levels of procrastination could be the students' level of executive functioning ([@B44]). Regarding fear of failure, the results show that average procrastinators compared with the other two groups seem to suffer the most from fear of failure regarding exams. The relationship between fear of failure and procrastination behavior appeared to be more complicated than became visible in previous studies ([@B51]; [@B16]; [@B57]). In the present study, low procrastinators did not suffer from fear of failure and had good results whereas high procrastinators also did not suffer from fear of failure, but reported poor results for exams. The high procrastinators' explanation for their results was that they would have had good results if they would have started studying in time. Low and high procrastinators did not doubt their competence whereas average procrastinators had doubts. This result seems to confirm [@B24] findings that the relation between fear of failure and procrastination is moderated by the level of competence. However, in the present study this seems not the case for high procrastinators. High procrastinators' explanation for their poor results indicates an internal attribution style for failure. This finding differs from previous research ([@B4]) which showed that high academic procrastinators make external attributions (to context and luck) for their successes. The explanation for their poor results seem to indicate that high procrastinators have a tendency for self-handicapping behavior, which is in line with [@B12] finding. The results show that self-esteem and self-efficacy make a difference in procrastination behavior. This finding confirms previous studies showing that negative self-esteem ([@B13]) and negative self-efficacy ([@B70]; [@B30]) are related to procrastination, but in the present study, we see differences between the three groups. Low procrastinators had positive self-esteem and a positive sense of self-efficacy, and relied on this characteristic when they experienced difficulties. Average and high procrastinators had much lower self-esteem. For high procrastinators, experiencing negative thoughts or feelings was a reason to stop or not start study activities. This was the case for average procrastinators: they continued and hoped that they would accomplish the task. In addition, average procrastinators doubted their self-efficacy but thought this was no reason to get stuck in procrastination. High procrastinators seemed to have a higher sense of self-efficacy but experienced more procrastination behavior. Looking at how students perform their study activities, the results show differences between the three groups regarding awareness and control of mental thoughts. Low procrastinators seem to be connected in the moment with their study activity and are aware of what happens in the here and now. This indicates that they are in a so-called state of *presence* ([@B47]). They seem to be connected to their capacities and rely on their strengths to complete the task, and they are determined to finish it. Average procrastinators seem to have lower levels of so-called metacognitive awareness, as defined by [@B17]. They are focused on completing the task and less on learning from it, except when a learning activity pertains to the profession. They then reflect on their own role as a teacher. When the results of their effort disappoint them, they cannot handle it, seem to become disconnected from their capacity to change the situation, become overwhelmed by negative thoughts, do less, and postpone the task temporarily. High procrastinators seem unable to view themselves from a metacognitive perspective. When they do not perceive the activity as useful, they experience negative feelings and judge themselves negatively. They cannot overcome the negative situation and therefore, give up and do more appealing activities outside the study activity. These results confirm previous studies showing self-awareness is necessary in order to motivate corrective behavior ([@B5]) and for procrastinators, low mindfulness may be a risk factor for poor physical and emotional well-being ([@B55]). Limitations ----------- The results of the present study should be interpreted against the background of several limitations. A key characteristic of most qualitative studies is that they focus on participants' perspectives and are not intended to generalize to a broader population ([@B8]). The sample comprised first-year Dutch students enrolled in an elementary teacher education program at a small teachers college. Thus, the extent to which these findings can be generalized to other programs or to other cultures is uncertain. A second limitation is that the scores on the APSI form a continuum. Hence, our distinction of three separate groups may have created a bias. Also the number of interviewed students was low, and because students with average or low levels of academic procrastination were more willing to be interviewed than those with high levels of academic procrastination, the group sizes were not equal. The students with high levels of academic procrastination were more difficult to get in touch with and seemed to be less willing to be interviewed. Therefore, it is also conceivable that we did not interview the students with the highest procrastination problems. It is also conceivable that this serves as a behavioral measure, and the results would have been different if we had interviewed more students with high levels of academic procrastination. A final limitation is that the interviewed students talked about their learning experiences from their own perspectives. It is not clear whether how the students talked about their regulation of learning activities always corresponds to their actual behavior. Future Research --------------- With the insights of the present study in mind, it would be interesting for future intervention studies to see whether programs to overcome procrastination have different effects on students with different levels of procrastination. Future research also might show whether average procrastinators are more open to overcoming their procrastination, for example, because they have stronger ideals. Perhaps this group would benefit the most from interventions and therefore, should be targeted most in intervention programs. A question to answer in future research could also be which interventions for overcoming procrastination are more helpful for average procrastinators and which for high procrastinators. The results of the present study show differences in the metacognitive awareness and degree of presence of the students in the different groups. For future research, this difference raises the question whether students with average and high levels of procrastination can be taught to enhance their metacognitive awareness (as defined by [@B17]) and their level of presence as defined by [@B47], and how this affects their levels of academic procrastination. Implications for Practice ------------------------- Because of the important role of intrinsic motivation in dealing with procrastination behavior, it can be helpful for teacher education institutions to determine to what extent students are motivated. This could have consequences for the intake procedure that takes place, as well as for the aspects of this procedure. This study showed that it especially makes sense for average procrastinators that study activities are practice-oriented. Recognizing the relevance and practical foundation of study activities makes students understand why the study activity is important for them. A stronger connection between the theory students have to study and practice can be reached by taking practical experiences as a starting point for enhancing students' motivation and for promoting their willingness to engage in study activities. This so-called pedagogy of realistic teacher education ([@B33]) might make a difference in maintaining students' motivation and improve the attractiveness of study activities and decrease students' procrastination. In the present study, low procrastinators seem to be most aware of their personal strengths and were engaged in their learning activities while working on them. They are also aware of their interest and their curiosity to learn more and have positive belief in themselves. Research in positive psychology ([@B20]) has shown that it is possible to influence people's beliefs about themselves by supporting awareness and the enactment of their character strengths. Character strengths can be defined as positive traits reflected in thoughts, feelings, and behaviors ([@B41]) and are considered an important aspect of people's 'psychological capital' ([@B37]). Examples of character strengths are curiosity, perseverance, willpower, and hope. According to [@B18]; [@B19]) broaden-and-build theory, a focus on character strengths and positive emotions expands people's repertoires of thoughts and actions ([@B20]). When students are aware of their character strengths in study situations in which the students experience negative feelings, the students can use these strengths to promote their belief in their capacities, which may help them overcome their procrastination behaviors. We implemented these ideas in a field experiment in which we trained procrastinators to overcome their procrastination ([@B64]). This field experiment showed diminishing effects on academic procrastination behavior. Although in this article we discussed an exploratory study, the findings of this study among students with low, average, and high levels of academic procrastination deepens the insights into the process of procrastinatory factors that can influence students' learning. Factors influencing academic procrastination do not have a linear effect but are the result of how students deal with procrastination. The present study provides insights that can lead to hopeful perspectives that more is possible than we see now in the area of academic procrastination. Author Contributions ==================== LV: Ph.D.-candidate at VU University Amsterdam, Netherlands. He is the principal investigator and principal author of this article. He collected and analyzed the data, and interviewed the participants. FK and JS: supervisor and co-writer of parts of the manuscript. Conflict of Interest Statement ============================== The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. **Funding.** This research has been made possible in part by the Netherlands Organization for Scientific Research (NWO) (Project No. 023-002-026). [^1]: Edited by: Katrin B. Klingsieck, Paderborn University, Germany [^2]: Reviewed by: Simone Nadine Loeffler, Karlsruhe Institute of Technology, Germany; Meirav Hen, Tel-Hai Academic College, Israel [^3]: This article was submitted to Personality and Social Psychology, a section of the journal Frontiers in Psychology
{ "pile_set_name": "PubMed Central" }
William Hill Casino Review William Hill Casino Review William Hill Casino is owned and operated by the UK based William Hill Company founded by William Hill back in 1934. Originally just a sports book, the expanded services now include, in addition to sports betting, a full service casino. The site also includes a separate poker room and bingo room. The casino itself is relatively new, originating in 2009. Actually, there are three casinos in one which gets to be rather confusing: the Bonus Casino, the Vegas Casino, and the Live Casino. William Hill Casino is licensed in Gibraltar and powered by software from Playtech, one of the leading online casino providers. The state-of-the-art client is easily downloaded to your personal computer, and once it’s complete you’ll have unrestricted access to over 200 games. If you’re happier to play on the fly then you can simply open up a browser window and start enjoying the instant play games on offer. Some William Hill games can also be enjoyed on mobile devices. William Hill Casino is enjoyed by players all over the world. However, at the present time, this casino, like many others, is off limits to U.S. residents. Games William Hill can hardly claim to be one of the largest online casinos in terms of number of games, since there are some mega casinos with more than twice as many. However, the 200+ games you will find at William Hill is still a respectable number. Not only are the well known varieties of both slots and table casino games represented, you will find interesting twists on some of these games. Both the Welcome Bonus for new players and the monthly loyalty rewards program are different for the two casinos. So comparing the two and seeing which you like better might factor into where you play as well as the games themselves. If you are still undecided what to play, you can take advantage of the play for free option. If slots are your favorite game, you will not be disappointed. There are plenty of slots to choose from in both casinos. Also, the generous Welcome Bonus that the casino offers when you first sign up was created with slot players in mind. So pick whatever game you think might be luckiest for you. Your choice includes classic 3 reels and action-packed 5 reel video slots, Marvel slots featuring many of your favorite movie and comic book characters, and progressive slots that offer life changing jackpots. If you are a big sports fan, you might find the sports themed slots especially appealing. There are many of those, reflecting the firm’s early sports betting background. On the other hand, if you are more of table games player, you, too, should like the diverse sampling available to you, in particular the different versions of blackjack and roulette. Just remember, if you are playing a variation of a game that is not familiar to you, read up on the rules and playing strategy beforehand. If you want to test your skill and nerve in another online game, there’s also a great poker room to try. William Hill Poker is one of our recommended online poker sites which offers excellent customer service and big welcome bonuses. Also, don’t forget to check out William Hill’s third casino, the Live Dealer Casino. An increasing number of online casinos are now offering this exciting option, usually for three games only-blackjack, roulette, and baccarat. At William Hill, in addition to getting to try all of those, you can see how you fare in live Casino Hold ‘Em and Three Card Poker. It is also worth noting that the live dealer roulette games are the more favorable to the player European and French Roulette (with just a single zero) and not American Roulette (with a double zero). And here’s another tip-make your first visit to the Live Dealer Casino on a Tuesday or Wednesday, so in case you lose your first $20, the casino will return it to you. Whilst the William Hill site lacks any indication of an eCogra certificate, the games have been tested independently for their levels of fairness by Technical Systems Testing, a reputable firm. We would, however, had like to have seen formal verification of reported payouts from the site. Deposits and Withdrawals William Hill has fast, secure, and safe banking. With the use of highly advanced encryption technology, all of your information is fully protected along with and financial transactions that you may have made. In addition, you have many different banking methods to choose from, so finding one you can use conveniently should not be a problem. To see if your preferred method of banking is available then we suggest checking directly with the online casino. William Hill Casino Bonuses Platform First Deposit Bonus 100% match bonus up to 200 GBP* Minimum deposit: 35 GBP* Applies to downloaded casino only Required playthrough for withdrawal: 20x bonus + deposit Bonus itself cannot be withdrawn Regular First Deposit Bonus (for those not taking the above) 100% match bonus up to 150 GBP* Minimum deposit: 35 GBP* Required playthrough for withdrawal: 20x bonus + deposit Bonus itself cannot be withdrawn High Roller First Deposit Bonus 30% match bonus up to 300 GBP* Minimum deposit: 1,000 GBP* Required playthrough for withdrawal: 20x bonus + deposit** Bonus itself cannot be withdrawn Second Deposit Bonus 75% match bonus up to 100 GBP* Minimum deposit: 35 GBP* Required playthrough for withdrawal: 15x bonus + deposit Bonus itself cannot be withdrawn *Amounts shown are for GBP. They differ for other currencies. **Not clear if the entire deposit is counted in the playthrough requirement or just that part of it that is equal to the bonus. It’s worth noting that slots, arcade games, and scratch cards are the only games that count fully towards meeting the requirements of the wager. Others count only 25% or even less, so the amount you would have to bet to keep your winnings would increase even more. For this reason, only if you are considering slot play is the Welcome Package useful. The fact that the casino takes the bonus back is another concern, as this will cause your account balance to drop considerably. Meaning that unless you have had the good fortune to score a big jackpot, your level of play will not remain the same indefinitely. For many users, not being able to keep their bonus means that making a smaller deposit appears to be favourable. Concerning bonuses or otherwise, customer support is available to users 24/7 across a multitude of different languages. Loyalty Program No casino would be able to stay in business long if, after generously greeting new players with a Welcome Bonus, it forgets about them completely afterwards. In other words, a good Welcome Bonus will get players in the door; a good loyalty program making them feel that their continued play in the casino is appreciated will keep them there. The loyalty program at William Hill is in some respects traditional, but in other respects a departure from what you will find at most online casinos. The traditional part is handing out loyalty points based on play, and then, when enough are accumulated, allowing players to exchange them for free credits to their account. In addition, premier players are admitted to the casino’s four tiered VIP Club. Top echelon players receive a higher exchange rate for comp points, higher table limits, faster withdrawals, bigger bonuses, and other exclusive gifts and privileges. The loyalty program features that are different are the two monthly bonuses, one for players in the main casino, the other for players in the Vegas Casino. A brief description of the two bonuses follows. There are 20 tiers to which players can aspire, each requiring a higher amount of wagering. The qualifying period starts on the first day of every month and ends on the last day of that month. To reach Tier 1, a total of $1,000 must be wagered. At that point the player is guaranteed a bonus of at least $10 by the end of the month. By completing each successive tier, you are guaranteed a continually increasing amount of cash. If a player somehow makes it to Tier 20, the prize is 20,000 GBP. But the casino won’t be paying that sum too often. The required wagering for the one month period is 5,000,000 GBP! Both of these bonuses, in this reviewer’s opinion encourage overbetting. On paper, they look better than they really are. Exciting Extras William Hill Casino has a £50 bonus for you if you refer a friend who signs up and plays. Your friend gets the bonus, too. Both bonuses have playthrough requirements for withdrawal. You can access this bonus with multiple friends. Mobile The William Hill software is powered by Playtech, making it intuitive to use and beautifully colored. There is a downloadable app, or you can play straight in the web casino through your devices, which can be Android-based or iOS-based. If you are using a Mac or iPhone you don’t have the choice to download the app, but the web-based version works just as well. Unfortunately, the mobile version contains only a few of the all-time favorite games that William Hill usually offers, but this will hopefully change in the future. The games that are available will keep you busy for at least some time. Conclusion Now this is one company that’s been around for a while. At near a century old, William Hill Casino has come a long way since its conception as a sports bookie in 1934. It offers a bit of everything there is to offer by an online casino: some slots, some table games, some sports betting, a bit of bingo. With over 200 games the William Hill Casino offers new players a whole lot of choices to make, despite the fact that its Welcome bonus is mostly geared towards slot games. For experienced players, and especially high rollers, there are loyalty programs that bring extra points and further bonuses.
{ "pile_set_name": "Pile-CC" }
Unfortunately, Jens Laugesen is folding after six years. The British designer won a slew of important awards and designed capsule collections for Topshop but financial sponsorship did not come quickly or substantially. Luckily, Laugesen has every intention of staying in the industry and we hope to see him as Creative Director somewhere within weeks. To see images from his Fall 08 collection, click here.
{ "pile_set_name": "Pile-CC" }
from __future__ import print_function from __future__ import absolute_import from __future__ import division try: from queue import PriorityQueue except ImportError: from Queue import PriorityQueue from collections import deque from compas.geometry import distance_point_point __all__ = [ 'depth_first_ordering', 'breadth_first_ordering', 'breadth_first_traverse', 'breadth_first_paths', 'shortest_path', 'astar_shortest_path', 'dijkstra_distances', 'dijkstra_path' ] # ============================================================================== # DFS # ============================================================================== def depth_first_ordering(adjacency, root): """Compute depth-first ordering of connected vertices. Parameters ---------- adjacency : dict An adjacency dictionary. Each key represents a vertex and maps to a list of neighboring vertex keys. root : str The vertex from which to start the depth-first search. Returns ------- list A depth-first ordering of all vertices in the network. Notes ----- Return all nodes of a connected component containing 'root' of a network represented by an adjacency dictionary. This implementation uses a *to visit* stack. The principle of a stack is LIFO. In Python, a list is a stack. Initially only the root element is on the stack. While there are still elements on the stack, the node on top of the stack is 'popped off' and if this node was not already visited, its neighbors are added to the stack if they hadn't already been visited themselves. Since the last element on top of the stack is always popped off, the algorithm goes deeper and deeper in the datastructure, until it reaches a node without (unvisited) neighbors and then backtracks. Once a new node with unvisited neighbors is found, there too it will go as deep as possible before backtracking again, and so on. Once there are no more nodes on the stack, the entire structure has been traversed. Note that this returns a depth-first spanning tree of a connected component of the network. Examples -------- >>> """ adjacency = {key: set(nbrs) for key, nbrs in iter(adjacency.items())} tovisit = [root] visited = set() ordering = [] while tovisit: # pop the last added element from the stack node = tovisit.pop() if node not in visited: # mark the node as visited visited.add(node) ordering.append(node) # add the unvisited nbrs to the stack tovisit.extend(adjacency[node] - visited) return ordering # def depth_first_tree(adjacency, root): # """Construct a spanning tree using a depth-first search. # Parameters # ---------- # adjacency : dict # An adjacency dictionary. # root : hashable # The identifier of the root node. # Returns # ------- # list # List of nodes in depth-first order. # dict # Dictionary of predecessors for each of the nodes. # list # The depth-first paths. # Examples # -------- # >>> # """ # adjacency = {key: set(nbrs) for key, nbrs in iter(adjacency.items())} # tovisit = [root] # visited = set() # ordering = [] # predecessors = {} # paths = [[root]] # while tovisit: # # pop the last added element from the stack # node = tovisit.pop() # if node not in visited: # paths[-1].append(node) # # mark the node as visited # visited.add(node) # ordering.append(node) # # add the unvisited nbrs to the stack # nodes = adjacency[node] - visited # if nodes: # for child in nodes: # predecessors[child] = node # else: # paths.append([]) # tovisit.extend(nodes) # if not len(paths[-1]): # del paths[-1] # return ordering, predecessors, paths # ============================================================================== # BFS # ============================================================================== def breadth_first_ordering(adjacency, root): """Return a breadth-first ordering of all vertices in an adjacency dictionary reachable from a chosen root vertex. Parameters ---------- adjacency : dict An adjacency dictionary. Each key represents a vertex and maps to a list of neighboring vertex keys. root : str The vertex from which to start the breadth-first search. Returns ------- list A breadth-first ordering of all vertices in the adjacency dict. Notes ----- This implementation uses a double-ended queue (deque) to keep track of nodes to visit. The principle of a queue is FIFO. In Python, a deque is ideal for removing elements from the beginning, i.e. from the 'left'. In a breadth-first search, all unvisited neighbors of a node are visited first. When a neighbor is visited, its univisited neighbors are added to the list of nodes to visit. By appending the neighbors to the end of the list of nodes to visit, and by visiting the nodes at the start of the list first, the network is traversed in *breadth-first* order. Examples -------- >>> """ tovisit = deque([root]) visited = set([root]) ordering = [root] while tovisit: node = tovisit.popleft() for nbr in adjacency[node]: if nbr not in visited: tovisit.append(nbr) visited.add(nbr) ordering.append(nbr) return ordering def breadth_first_traverse(adjacency, root, callback=None): """Traverse an adjacency dict in "breadth-first" order. Parameters ---------- adjacency : dict Map of every node to a list of neighbouring nodes. root : int The identifier of the starting node. callback : callable, optional A callback function applied to every traversed node and its current neighbour. Returns ------- set The visited nodes. Examples -------- >>> """ tovisit = deque([root]) visited = set([root]) while tovisit: node = tovisit.popleft() for nbr in adjacency[node]: if nbr not in visited: tovisit.append(nbr) visited.add(nbr) if callback: callback(node, nbr) return visited def breadth_first_paths(adjacency, root, goal): """Return all paths from root to goal. Parameters ---------- adjacency : dict An adjacency dictionary. root : hashable The identifier of the starting node. goal : hashable The identifier of the ending node. Yields ------ list A path from root to goal. Notes ----- Due to the nature of the search, the first path returned is the shortest. Examples -------- >>> """ adjacency = {key: set(nbrs) for key, nbrs in iter(adjacency.items())} tovisit = deque([(root, [root])]) while tovisit: node, path = tovisit.popleft() for nbr in adjacency[node] - set(path): if nbr == goal: yield path + [nbr] else: tovisit.append((nbr, path + [nbr])) def breadth_first_tree(adjacency, root): tovisit = deque([root]) visited = set([root]) ordering = [root] predecessors = {} paths = [] while tovisit: node = tovisit.popleft() for nbr in adjacency[node]: if nbr not in visited: predecessors[nbr] = node tovisit.append(nbr) visited.add(nbr) ordering.append(nbr) else: path = [node] while path[-1] in predecessors: path.append(predecessors[path[-1]]) paths.append(reversed(path)) return ordering, predecessors, paths # ============================================================================== # shortest # ============================================================================== def shortest_path(adjacency, root, goal): """Find the shortest path between two vertices of a network. Parameters ---------- adjacency : dict An adjacency dictionary. root : hashable The identifier of the starting node. goal : hashable The identifier of the ending node. Returns ------- list, None The path from root to goal, or None, if no path exists between the vertices. Examples -------- >>> """ try: return next(breadth_first_paths(adjacency, root, goal)) except StopIteration: return None # ============================================================================== # A* # ============================================================================== def reconstruct_path(came_from, current): total_path = [current] while current in came_from: current = came_from[current] total_path.append(current) total_path.reverse() return total_path def astar_shortest_path(network, root, goal): """Find the shortest path between two vertices of a network using the A* search algorithm. Parameters ---------- network : instance of the Network class root : hashable The identifier of the starting node. goal : hashable The identifier of the ending node. Returns ------- list, None The path from root to goal, or None, if no path exists between the vertices. Examples -------- >>> References ---------- https://en.wikipedia.org/wiki/A*_search_algorithm """ root_coords = network.vertex_coordinates(root) goal_coords = network.vertex_coordinates(goal) # The set of nodes already evaluated visited_set = set() # The set of currently discovered nodes that are not evaluated yet. # Initially, only the start node is known. candidates_set = {root} best_candidate_heap = PriorityQueue() best_candidate_heap.put((0, root)) # For each node, which node it can most efficiently be reached from. # If a node can be reached from many nodes, came_from will eventually contain the # most efficient previous step. came_from = dict() # g_score is a dict mapping node index to the cost of getting from the root node to that node. # The default value is Infinity. # The cost of going from start to start is zero. g_score = dict() for v in network.vertices(): g_score[v] = float("inf") g_score[root] = 0 # For each node, the total cost of getting from the start node to the goal # by passing by that node. That value is partly known, partly heuristic. # The default value of f_score is Infinity f_score = dict() for v in network.vertices(): f_score[v] = float("inf") # For the first node, that value is completely heuristic. f_score[root] = distance_point_point(root_coords, goal_coords) while not best_candidate_heap.empty(): _, current = best_candidate_heap.get() if current == goal: return reconstruct_path(came_from, current) visited_set.add(current) current_coords = network.vertex_coordinates(current) for neighbor in network.vertex_neighbors(current): if neighbor in visited_set: continue # Ignore the neighbor which is already evaluated. # The distance from start to a neighbor neighbor_coords = network.vertex_coordinates(neighbor) tentative_gScore = g_score[current] + distance_point_point(current_coords, neighbor_coords) if neighbor not in candidates_set: # Discover a new node candidates_set.add(neighbor) elif tentative_gScore >= g_score[neighbor]: continue # This path is the best until now. Record it! came_from[neighbor] = current g_score[neighbor] = tentative_gScore new_fscore = g_score[neighbor] + distance_point_point(neighbor_coords, goal_coords) f_score[neighbor] = new_fscore best_candidate_heap.put((new_fscore, neighbor)) def dijkstra_distances(adjacency, weight, target): """Compute Dijkstra distances from all vertices in a connected set to one target vertex. Parameters ---------- adjacency : dict An adjacency dictionary. Each key represents a vertex and maps to a list of neighboring vertex keys. weight : dict A dictionary of edge weights. target : str The key of the vertex to which the distances are computed. Returns ------- dict A dictionary of distances to the target. Notes: ... Examples -------- >>> """ adjacency = {key: set(nbrs) for key, nbrs in adjacency.items()} distance = {key: (0 if key == target else 1e+17) for key in adjacency} tovisit = set(adjacency.keys()) visited = set() while tovisit: u = min(tovisit, key=lambda k: distance[k]) tovisit.remove(u) visited.add(u) for v in adjacency[u] - visited: d = distance[u] + weight[(u, v)] if d < distance[v]: distance[v] = d return distance def dijkstra_path(adjacency, weight, source, target, dist=None): """Find the shortest path between two vertices if the edge weights are not all the same. Parameters ---------- adjacency : dict An adjacency dictionary. Each key represents a vertex and maps to a list of neighboring vertex keys. weight : dict A dictionary of edge weights. source : str The start vertex. target : str The end vertex. Returns ------- list The shortest path. Notes ----- The edge weights should all be positive. For a directed graph, set the weights of the reversed edges to ``+inf``. For an undirected graph, add the same weight for an edge in both directions. Examples -------- >>> """ if not dist: dist = dijkstra_distances(adjacency, weight, target) path = [source] node = source node = min(adjacency[node], key=lambda nbr: dist[nbr] + weight[(node, nbr)]) path.append(node) while node != target: node = min(adjacency[node], key=lambda nbr: dist[nbr] + weight[(node, nbr)]) path.append(node) return path # ============================================================================== # Main # ============================================================================== if __name__ == '__main__': pass
{ "pile_set_name": "Github" }
$27.92 $13.58Save: 51% off HOTEL-GRADE QUALITY – Made of 100% polyester this table cloth is heavy-duty and long lasting allowing it to be used repeatedly Aesthetically Pleasing – this rectangular tablecloth measuring 30” by 72” can add class and value to any 6 foot table immediately upgrading its look. Other than a dining table it can also be used for card table, picnic tables, etc. EASY TO USE – Due to the fitted nature of the tablecloth there is lesser risk of it being pulled off the table by kids along with the items on the table itself. This is best for larger families as well because less chances of it slipping during meal times. Also this in turn eliminates the need to have clips or weights to secure the cloth in place. STAIN AND WRINKLE RESISTANT – Owing to its thick weave this tablecloth does not transfer spills onto the table ensuring safety of the table. Also it is resistant to creases and wrinkles thus does not need to be ironed often. CARE – these tablecloths are the best due to their low maintenance. They can easily be machine washed and dries quickly and easily. If you want to add class and oomph to any table of yours without spending a fortune this is the way to go! Tablecloths make any table look more professional looking. They can be used on any table be it welcome desks, buffet table, card table, or trade show booth table! You just can’t do without them! And here goes why: • Made of imported material which is 100% polyester ensuring its tough and long lasting. • Best to be used around kids, since its fitted decreasing the chances of it slipping off. Also protecting the table itself. • It can fit any 6 foot rectangle table immediately upgrading its look. • Zoyer’s tablecloth is resistant to stain and wrinkles making it highly durable. • The best part about these tablecloths is their low maintenance. Can be easily machine washed and tumble dried on low setting.
{ "pile_set_name": "Pile-CC" }
Text-based or term-based searching, wherein a user inputs a word or phrase into a search engine and receives a variety of results is a useful tool for searching. Term based queries require a user to explicitly provide search terms in the form of words, phrases and/or other terms. Sometimes a user may wish to locate a particular desired document, rather than just information about relevant to one or more query terms. In such instances, locating that desired document using a term based query may require typing a long query string, such as an entire sentence without mistakes, or composing a combination of terms that the user thinks occur in the desired document but in relatively few other documents. Accordingly, a system that can receive a visual query such as a picture of the document, or a portion of the document, and use it to locate a canonical source document would be desirable.
{ "pile_set_name": "USPTO Backgrounds" }
Wave Beach Queens Haruna Yuki Fortune Arterial success on games and now on anime is getting another side of the animation market, now delivering to you Yuki Haruna Beach Queens figure, which is the favorite of most part of FA fans. As Beach Queens figure is not that awesome on quality and coloring, this figure is probably not an excellent choice, but is very cheap, so if you can’t afford some extra money, this one fits perfectly.
{ "pile_set_name": "Pile-CC" }
Q: Sum only matched values from two columns Hello Everyone, Does anyone know how to sum the Hours from column B (Hours) if column A numbers matched with column E and sum by months. Example, take February data as an example, since only 3000 & 4000 existed in both column A & column E, that's why I need to sum the hours (20+10=30) from column B by it's month below. I also attached the example excel sheet below. https://www.dropbox.com/s/0s51g1i8g6s6e2d/Test.xls?m Thanks in advance. :-) A: You could get complicated with customer functions but if having an extra column (potentially hidden) doesn't matter then this would work: In cell D2 enter: =iferror(vlookup($A2,$E$2:$E$20,1,FALSE),"x") Drag the formula down. Under each month you can then put: =sumifs($B$2:$B$16,$C$2:$C$16,B$22,$D$2:$D$16,"<>x") Drag the formula across This assumes you can change the month format in either column C or row 22 to be the same, ie. Jan, Feb, Mar or January, February, March etc. Written on the fly and not tested so excuse any minor errors...
{ "pile_set_name": "StackExchange" }
Rain barrels will be sprouting up all over L.A. now under a newly approved Low Impact Development ordinance. Today the city of Los Angeles took a giant step forward on its long-promised goal to green itself — one new development at a time. After three years of negotiations, hearings, educational forums and technical discussions, the City Council voted 13-0 to support a Low Impact Development ordinance. The vote means that nearly all new development and redevelopment in Los Angeles will have to treat rainwater as a resource rather than just a flood risk by early next summer. The approach is groundbreaking (or concrete breaking) in its wide-ranging application to all significant new and redevelopment – even single family homes. So what does it mean from a practical point of view? All new and redevelopment must capture and reuse or infiltrate 100% of the runoff generated by a three-quarter inch rain. As a result, development will be greener, flood control risks and runoff pollution will be reduced, and local groundwater supplies will be augmented. Single family homes will only have to include rain barrels, cisterns, rain gutter downspout redirects to landscaping, or rain gardens to comply with the ordinance. The Bureau of Sanitation has already taken the unprecedented step of issuing a technical guidance manual so all developers, enviros, members of the public and councilmembers have the resource to understand how the ordinance will be implemented on a day-to-day basis. If developers can’t technically comply with requirements on site, they can comply offsite with regional LID projects or green street LID efforts to capture and infiltrate runoff. Challenges from the Building Industry Assn. and the Central City Assn. led to ordinance modifications that provided major breaks for developments already in the review pipeline. The BIA also succeeded in getting language that allows the use of onsite biofiltration (runoff is treated with vegetation and then released to the stormdrain) if LID techniques are infeasible. The Department of Public Works, especially the Bureau of Sanitation, has shown strong leadership and perseverance on this critical issue. It’s to be commended for moving the city to a more integrated, natural approach to water policy, one that relies on watershed management. Heal the Bay worked closely with former board of Public Works commissioner Paula Daniels and Bureau of Sanitation executives Adel Hagekhalil and Shahram Kharaghani to put together early drafts of the ordinance. The LID ordinance also may prove to be one of biggest successes for the Green L.A. organization. The coalition of environmental groups, led by Stephanie Taylor, put an incredible amount of time and effort organizing wide-ranging environmental community support for the ordinance.
{ "pile_set_name": "Pile-CC" }
Helicobacter pylori and nonsteroidal anti-inflammatory drugs: interaction with proton pump inhibitor therapy for prevention of nonsteroidal anti-inflammatory drug ulcers and ulcer complications--future research needs. Two recently reported studies of nonsteroidal anti-inflammatory drugs (NSAIDs), the Omeprazole versus Misoprostol for NSAID-induced Ulcer Management and the Acid Suppression Trial: Ranitidine versus Omeprazole for NSAID-associated Ulcer Treatment studies, concluded that omeprazole was superior to a subtherapeutic misoprostol or an ineffective dose of ranitidine for the endpoint, prevention of gastroduodenal ulcers in chronic NSAID users. Helicobacter pylori status was collected prospectively but was not reported. We report separate analyses for patients with unequivocal NSAID ulcers (H. pylori negative) and patients whose NSAID use was complicated by the presence of an active H. pylori infection. Omeprazole was superior to placebo for the prevention of ulcer recurrence in chronic NSAID users. However, omeprazole was not significantly better than a subtherapeutic dose of misoprostol for the prevention of gastroduodenal ulcers in chronic NSAID users. Misoprostol was superior to omeprazole for the prevention of gastric ulcers among those patients with unequivocal NSAID ulcers (8.2% vs 16.6%, respectively; P <0.05). Omeprazole was not statistically different from misoprostol for gastric ulcer prevention in those whose NSAID use was complicated by an active H. pylori infection. Ranitidine and omeprazole were also not statistically different for the prevention of unequivocal NSAID gastric ulcers (14.6% vs 11.6%, respectively; P = 0.56). That the Misoprostol Ulcer Complications Outcomes Safety Assessment (MUCOSA) trial found full-dose misoprostol to be more effective in ulcer prevention than it was in prevention of ulcer complications suggests that either many of the ulcer complications were related to H. pylori ulcers or that more antisecretory activity than can be provided with misoprostol is needed, or both. The question remains whether the combination of low-dose misoprostol plus an antisecretory drug (either an H(2)-receptor antagonist or a proton pump inhibitor) would provide superior results compared with either alone. That omeprazole was not superior to one half the dose of misoprostol used in the ulcer complication prevention, or MUCOSA, study indicates that it would not be prudent to suggest that ulcer prevention with omeprazole alone would be able to provide similar protection to misoprostol.
{ "pile_set_name": "PubMed Abstracts" }
Tik Tok (song) "Tik Tok" (stylized as "TiK ToK") is the debut single by American singer Kesha. She co-wrote the song with its producers Dr. Luke and Benny Blanco. It was released on August 7, 2009, as the lead single from Kesha's debut studio album, Animal. The opening line of the song came from an experience where Kesha woke up surrounded by beautiful women, to which she imagined P. Diddy being in a similar scenario. The experience prompted the writing of the song which she later brought to her producer, Dr. Luke, who was then contacted by P. Diddy in hopes of a collaboration; he came to the studio the same day and recorded his lines and the song was completed. According to Kesha, the song's lyrics are representative of her and based on her life; the song has a carefree message and talks about not letting anything bring you down. The song is an electropop/dance-pop song incorporating a minimalist bitpop beat interspersed with handclaps and synths. The song's verses use a rap/sing vocal style while the chorus is sung; throughout the song the use of Auto-Tune is prominent. Musically, the song has been compared to the works of Lady Gaga, Uffie, and Fergie. The song achieved commercial success by topping the charts in eleven countries. In the United States, the song broke the record for the biggest single-week sum of all time for a female artist selling 610,000 digital downloads in one week. "Tik Tok" was certified 8× platinum by the Recording Industry Association of America (RIAA) and has sold 6.8 million copies in the United States, topped the Billboard Hot 100 chart for 9 consecutive weeks. The song was the best-selling single worldwide in 2010, selling 12.8 million copies in that year alone, As of 2019, the song now has sold over 25 million copies, making it the third best-selling digital single worldwide. The song was listed 56th on the Billboard Hot 100 Songs of All-time. Background and development In 2005, Lukasz Gottwald (Dr. Luke) had just finished producing tracks for Kelly Clarkson's album Breakaway (2004) and was looking to expand further on his writing and producing credits. Luke solicited around to different people in the music business asking for demos from unknown artists. Two of the demos he received were from Katy Perry and Kesha. He was particularly taken with Kesha's demos which consisted of a self-penned country ballad and trip-hop track. The latter of the demos caught Luke off guard when she ran out of lyrics and started to rap, "I'm a white girl/From the 'Ville/Nashville, bitch. Uhh. Uhhhhh." The improvisation made her stand out from other artists that Luke had listened to, which he recalled: "That's when I was like, 'OK, I like this girl's personality. When you're listening to 100 CDs, that kind of bravado and chutzpah stand out." Following this, at the age of eighteen, Kesha signed to Luke's label, Kemosabe Records, and his publishing company, Prescription Songs. After being signed to Luke's label she also signed to David Sonenberg's DAS management company. While at the label she worked with record producer Greg Wells, which she attributes to developing her sound on her first record, Animal (2010). Although she was signed to Luke and his label, Kesha never took priority as he was busy with other projects at the time. It was not until 2008 when Luke was working with Flo Rida on "Right Round" that he pulled Kesha in to contribute, giving her the female hook. Within a few months the song became a worldwide number one. The event lead to different labels sparking interest in signing her, including RCA Records, to which she eventually signed. Writing and recording "Tik Tok" was written by Kesha, alongside Dr. Luke and Benny Blanco and was co-produced by Luke and Blanco. Kesha said the inspiration behind the song came from coming home half-drunk and stumbling after a night out of partying. She would then write down a few words to a song, then the following morning she would wake up with the story waiting to be told. The opening line came from an experience where she woke up surrounded by "beautiful women", leading to her imagining P. Diddy being in a similar scenario. She then proceeded to bring the song to her producer Dr. Luke and Benny Blanco and the song was written. Four hours later, Diddy called Luke and said that they should do a song together. Diddy came to the studio later that day to contribute his lines and the collaboration was completed. Engineering of the song was done by Emily Wright and Sam Holland at Conway Recording Studios in Los Angeles, California. While Kesha was in the studio with Dr. Luke and Blanco, she took three takes to get the song correct as she jokingly "white-girl rapped" over the beat. At one point in the song's production, she had wanted to re-write the verses of the song because she did not think that they were "funny or clever", feeling that they "kind of sucked." She elaborated, "I thought it was just another song, I thought it was just like all the other ones I'd written. I didn't even know if it was very good. I wanted to rewrite the verses, I didn't think it was funny or clever. I thought it kind of sucked. But everyone else liked it." Kesha ultimately did not end up rewriting any of the song's lyrics. She further described the theme of the song in an interview, emphasizing that it embodied her own lifestyle, We're [Kesha and her friends] all young and broke and it doesn't matter. We can find clothes on the side of the street and go out and look fantastic, and kill it. If we don't have a car that doesn't stop us, because we'll take the bus. If we can't afford drinks, we'll bring a bottle in our purse. It's just about not letting anything bring you down. Composition "Tik Tok" is an upbeat dance-pop and electropop song that incorporates the sound of '80s video game noises in its production, to earn a bitpop beat. Kesha uses a spoken word rap style on the verses while the chorus is sung. Throughout the song Kesha's vocals are enhanced by Auto-Tune in some places. The song also features two lines by P. Diddy ("Hey, what up girl?" and "Let's go!") Lyrically, the song speaks about "excess pleasures, from drinking ("Ain't got a care in the world but I got plenty of beer") to men ("We kick 'em to the curb unless they look like Mick Jagger")." According to Kesha the lyrics are representative of herself, stating, "It's about my life. It's 100 percent me." Kesha uses a rap vocal delivery which was influenced by the Beastie Boys. She claims that the track's creation would not have happened if it was not for their influence on her music. While the song was being crafted she took a different vocal approach to the song than in her earlier records, explaining, "I’ve done the country, done the pop-rock, done the super-hard electro, ... I was like, whatever, throw some rap in there, why not?" The song is in common time with a moderate beat rate of 120 beats per minute. The song is set in the key of D minor. It has the sequence of B–C–Dm as its chord progression and Kesha's vocals span from D3 to D5. Musically, the song has been compared to Lady Gaga's debut single, "Just Dance", for their similar composition and lyrical context and to Fergie for their similar rap style. Release and promotion In July 2009, the song was offered as a free download on Kesha's Myspace page for over a month before its official sale release. The song was later released to iTunes on August 7, 2009, and on August 25, 2009, in the United States. Barry Weiss of RCA/Jive Label Group relied on a similar marketing scheme to that of Britney Spears' in 1999 when choosing to give the song away for free. The song's marketing relied heavily on radio once she had achieved a strong online interest, but its radio release was delayed until October in order to capitalize on social media's interest in her. After spreading the song quickly topped iTunes charts. To promote the single, Kesha made several television appearances and performances across the world. The first televised performance of the song was on a part of MTV Push, a program broadcast on MTV Networks worldwide, where she performed the song alongside her other tracks "Blah Blah Blah" and "Dinosaur". She performed the song alongside "Blah Blah Blah", "Take It Off", "Your Love Is My Drug" and "Dirty Picture" in a set for BBC Radio 1's Big Weekend. On May 29, 2010, Kesha performed "Tik Tok" alongside "Your Love Is My Drug" at the MTV Video Music Awards Japan. Kesha has also made appearances on It's On with Alexa Chung, The Wendy Williams Show, Lopez Tonight, Late Night with Jimmy Fallon, The Tonight Show with Conan O'Brien and The Ellen DeGeneres Show to perform the song. This song was also performed on Saturday Night Live on April 17, 2010. On August 13, 2010, Kesha performed "Tik Tok" on Today. On November 7, 2010, Kesha performed the song at the MTV Europe Music Awards. Throughout the performance she was seen wearing a leotard with day-glow makeup. The performance featured a backing consisting of flashing lights and background dancers. The song's bridge was changed during the performance and featured a more "amping house music vibe". Critical reception Kelsey Paine of Billboard called the song "a love letter to DJs everywhere, with hand claps that build to a crescendo of pure, infectious dance-pop." Paine, referring to her appearance on "Right Round", wrote that she "offers her own fun and frivolous ode to a wild night out" as she sings about drinking and men. The review was concluded with the consensus the Kesha's debut "reveals a knack for getting the party started." Jim Farber of the New York Daily News called the song "a vintage lick of dance candy too tooth-rottingly sweet to resist" that featured a "stabbing synthesizer hook". Fraser McAlpine of the BBC, giving the single four out of a possible five stars, called it a "dirty little ditty" that had "'hit' written all over it". McAlpine noted its similarities to Lady Gaga's "Just Dance" for their partying subject matter, but concedes that "she does make it sound kinda fun though." Billy Johnson, Jr. of Yahoo! compared "Tik Tok" to the 1980s L'Trimm hit "Cars That Go Boom" and notes that Kesha has "take[n] on L'Trimm's vocal styling for her own hit." Nick Levine of Digital Spy gave the song four out of five stars, he spoke of the song giving Kesha a "hussy image" but described the lyrics in a positive manner. Levine said the use of auto-tune was "fun" and described Dr. Luke's backing track as "bouncy" and "bubblegummy". The review highlighted the song's chorus with Levine calling it "stonking great" and "completely trashy in the best possible way." David Jeffries of Allmusic called the track "fun", listing it as one of the album's best tracks. David Renshaw of Drowned in Sound felt that the song was effective in what it was trying to do, writing: "Trashy and rambunctious, it’s a brash summer anthem about getting drunk and partying hard. World rocking it might not be, but as a piece of disposable pop it captures a moment and boasts a huge hook which, really, is all you need to rule the radio, TV and ringtone airwaves." Mikael Wood of Entertainment Weekly listed the song as the recommended download off of Animal, writing that "her Valley Girl sneer with electro-glam arrangements that make brushing one's teeth 'with a bottle of Jack' sound like an awesome way to kill the morning-after blues." Jonah Weiner of Slate Magazine gave the song a negative review saying that "the song sets up ship on the fault line between charmingly daft and deeply irritating." He then compared the song to work by other artists, stating that "the rapped verses are sub-Fergie-grade, proudly stuffed with groaners and to-hell-with-the-expiration-date slang." Weiner echoed the sentiment that the plotline seemed like "a sequel" to "Just Dance", summing it up as "girl wakes up drunk, stays drunk, finds a dance floor and (spoiler alert) gets even drunker." Jon Caramanica of The New York Times described the song as "a zippy and salacious celebration of late nights and mornings-after." He noted that "some have compared Kesha, unfavorably, to Uffie, who is signed to the influential French electronic music label Ed Banger and whose sass-rap predated Kesha’s by a couple of years." However, he thought that "if anyone should feel fleeced by 'Tik Tok', though, it’s Lady Gaga, who probably hears significant chunks of her hit 'Just Dance' in its melody and subject matter." Chart performance United States In the United States, on the week ending October 24, 2009, "Tik Tok" debuted on the Billboard Hot 100 at number seventy-nine. The song steadily climbed the chart and became the first number one of the 2010s decade. It stayed at number one for nine consecutive weeks. On the week ending December 27, 2009, "Tik Tok" broke the record in the United States for the highest single week sales, selling 610,000 digital downloads, the highest ever by a female artist since tracking began in 2003 and second highest overall, behind her own spot, "Right Round", by Flo Rida (feat. Kesha) which sold 636,000 copies on the chart dated February 28, 2009. The record would later be surpassed by Taylor Swift's single "We Are Never Ever Getting Back Together" when it sold 623,000 digital copies in its debut week in the week ending September 1, 2012. On the week ending February 6, 2010, the song topped the Billboard Pop Songs radio airplay chart registering 11,224 spins, becoming, at the time, the most played song in the charts seventeen-year history, breaking the record set of 10,859 spins just a week earlier by Lady Gaga's "Bad Romance". The song topped the chart for a total of nine consecutive weeks and at the end of 2010, "Tik Tok" was named the Hot 100 song of the year. It was also the seventh most played song on radio in the country and the eighth most downloaded song that year. The song has received 5× Platinum certification by the Recording Industry Association of America for sales of 5 million units. As of March 2016, "Tik Tok" had sold over 6.8 million downloads in the US. The song made its first ever chart appearance in Canada, where the song debuted at number sixty-seven on the Canadian Hot 100. It ascended the chart for numerous weeks before attaining the number one position on the week ending November 21, 2009. The song remained atop the chart for two weeks before falling to the number two position, being dethroned by Lady Gaga's, "Bad Romance". "Tik Tok" regained the number one position weeks later on January 2, 2010, and held the top spot for seven weeks, giving the single nine weeks atop the chart in total. In 2009 the song was the year's seventy-sixth best charting song and it was 2010's second best charting song on the Canadian Hot 100 Year End Charts. The single has been certified 7× Platinum by the Canadian Recording Industry Association (CRIA) for sales of 560,000 units. Europe and Asia In Europe, the song debuted at number thirty-eight in Sweden on the issue dated October 23, 2009, and managed to peak at number three. The song debuted at thirty-nine in Denmark and peaked at number three. In Norway, the song debuted at number eleven and peaked at number three. In the United Kingdom, "Tik Tok" debuted on the official UK Singles Chart at number six on November 8, 2009, and over a period of just under three months climbed to a peak of number four on January 3, 2010. In 2010, the UK Official Charts Company ranked "Tik Tok" at 100 on their list of the best-selling singles of the 21st century. By the end of 2010, "Tik Tok" had become the best selling song by a foreign artist at 1,412,653 downloads in South Korea. Oceania "Tik Tok" made its chart debut on the official New Zealand Singles Chart at number seven on the issue dated October 5, 2009. The following week it moved up to number one where it held the top spot for a total of five consecutive weeks. The song has since been certified 2× Platinum by the Recording Industry Association of New Zealand (RIANZ) for sales of 30,000 units. In Australia the song debuted on the ARIA Charts at number twenty-eight, and reached number one on its third week on the chart. The song was listed atop the chart for a total of eight weeks and in 2009 it was listed at position nine on the Australian Singles Year End Chart.; the following year the song was listed at position twelve on the 2010 year end chart. It has since been certified 5× Platinum by the Australian Recording Industry Association (ARIA) for sales of 350,000 units. The song sold 12.8 million digital copies worldwide in 2010, making it the best selling single of the year, trumping the previous year's song by more than three million downloads. As of 2012, it has sold around 14 million copies worldwide. Music video The music video for "Tik Tok" was directed by Syndrome. It was shot in Kesha's old neighborhood and the car featured in the video belongs to her. Kesha explained the experience saying, "the video I'm excited about because I actually got to shoot it in my old neighborhood and the guy driving my gold car is a friend of mine". The video's party scene was shot in her friend's house, which they refer to as the "drunk tank". The singer said "the last party scene is in this house called the drunk tank, which is one of my friend's houses that we all go party at. So I like it cause its super-honest and genuine." The video begins with Kesha waking in a bathtub in a home as she stumbles out and begins to look for a toothbrush in the restroom. She makes her way down a staircase looking at the pictures lining the wall. Kesha makes her way to the kitchen and walks in on a family who are having breakfast, startling them. She shrugs and then leaves the home as the family gets up and follows her. When she arrives at the sidewalk, she picks up a gold bicycle lying against a fallen fence and rides off. Kesha meets a group of children and trades the bicycle for their boombox. The video cuts to another scene where she rejects a guy and is picked up by a man portrayed by Simon Rex who drives her in a gold 1978 Trans Am. They are pulled over by the police, who handcuff Kesha. The scene then pans to her singing while standing in the T-top as she dangles the handcuffs hanging from her left arm. The next scene shows Kesha in an empty room filled with glitter. She then attends a party with Rex for the final scene. The video comes to an end with Kesha lying in a different bathtub from the one she woke up in. The official music video has received over 450 million views on YouTube as of February 2019. Cover versions and parodies The second-most-viewed YouTube video of the year 2010, behind only "The Bed Intruder Song", was a parody of "Tik Tok" posted by The Key of Awesome. "Weird Al" Yankovic included the chorus in his polka medley "Polka Face" from his 2011 album Alpocalypse. The song was also parodied by British comedy group The Midnight Beast. The parody discusses youthful subjects such as attempting to view the nude bodies of women and dodging parents' anger. Released to iTunes on January 15, 2010, the parody peaked at number four on the Australian Singles Chart, and at thirty-nine on the Irish Singles Chart. Comedian Julie Brown parodied the song with the single "Another Drunk Chick" on her album Smell the Glamour (2011). Jarett Wiselman of The New York Post stated it was "one of the year's best comedy albums." Avril Lavigne performed an acoustic version of the song in her setlist for BBC's Radio 1. Another parody came about when Israel Defense Forces soldiers created IDF Tik Tok in 2010, a viral dance video that opens with six infantry soldiers on patrol in Hebron, walking cautiously down a deserted street, armed and wearing full combat gear, when "Tik Tok" begins to play, and the soldiers break into choreographed dance moves. "Tik Tok" was used in the opening sequence for The Simpsons episode "To Surveil with Love", in which the entire cast lip-synced to the song. The cast of FOX musical series Glee performed this song on the episode "Blame It on the Alcohol", with Heather Morris' character, Brittany Pierce, taking the lead. The episode revolved around teen drinking and its dangers. The members of Glee Club are asked to perform at the school's alcohol awareness assembly, in which "Tik Tok" is one of the songs performed. Emily VanDerWerff of The A.V. Club wrote that the song's inclusion in the episode was superfluous, stating that it was just an excuse to get a Kesha song on Glee. VanDerWerff however, wrote that she "REALLY liked Heather Morris'" rendition of the song. Sandra Gonzalez of Entertainment Weekly praised Brittany's choreography and overall performance in "Tik Tok", writing, "The huge star of this number was clearly Brittany, who more and more every week proves that she needs to be moved to the forefront of this show's big performances and storylines." Gonzalez gave the cover version of "Tik Tok" a B, calling it "pure, fun entertainment up until we got to the part straight out of the mind of Gordie LaChance." Erica Futterman of Rolling Stone gave the cover version of "Tik Tok" a mostly positive review, writing, "Love Brittany as we do, we wish Rachel or Mercedes stepped up to the mic. The performance is less risqué than their Pep Rally "Push It" but winds up causing more controversy when Brittany pukes on Rachel and Santana also vomits up grey slush. It's a fitting end to the song, and the episode." Track listing US single "Tik Tok"  – 3:20 Germany/UK single "Tik Tok"  – 3:20 "Tik Tok" (Tom Neville's Crunk & Med Mix)  – 6:53 UK EP "Tik Tok"  – 3:20 "Tik Tok" (Fred Falke Club Remix)  – 6:42 "Tik Tok" (Chuck Buckett's Verucca Salt Remix Remix)  – 4:55 "Tik Tok" (Tom Neville's Crunk & Med Mix)  – 6:53 "Tik Tok" (Untold Remix)  – 5:01 Credits and personnel Recording Recorded at Conway Recording Studios, Los Angeles, California Personnel Background Vocals – Kesha, P. Diddy Lead Vocals – Kesha Songwriting – Kesha Sebert, Lukasz Gottwald, Benjamin Levin Production – Lukasz Gottwald, Benjamin Levin Instruments and programming – Lukasz Gottwald, Benjamin Levin Recording – Lukasz Gottwald, Benjamin Levin Audio engineering – Emily Wright, Sam Holland Vocal editing – Emily Wright Credits adapted from the liner notes of Animal, Dynamite Cop Music/Where Da Kasz at BMI. Charts Weekly charts Year-end charts Decade-end charts All-time charts Certifications ! scope="row" | South Korea (Gaon) | || 2,512,000 |- Release history References External links "Tik Tok" music video at MTV.com Category:2009 debut singles Category:Kesha songs Category:Billboard Hot 100 number-one singles Category:Billboard Dance/Mix Show Airplay number-one singles Category:Canadian Hot 100 number-one singles Category:European Hot 100 Singles number-one singles Category:Number-one singles in Australia Category:SNEP Top Singles number-one singles Category:Number-one singles in New Zealand Category:Number-one singles in Norway Category:Songs written by Dr. Luke Category:Songs written by Benny Blanco Category:Song recordings produced by Dr. Luke Category:Song recordings produced by Benny Blanco Category:Songs written by Kesha Category:2009 songs Category:RCA Records singles Category:Songs about alcohol Category:Compositions in D minor
{ "pile_set_name": "Wikipedia (en)" }
16*d**4 - d**3 - d**2 - 996*d + 3. -50784*d - 6 What is the third derivative of 174*h**3 + 138*h**2 - h wrt h? 1044 Find the second derivative of 2*c**3 + 39*c**2 - 46*c. 12*c + 78 What is the second derivative of 617*u**3*x - u**2*x**2 + 9*u*x**2 - 2*u + 27*x wrt u? 3702*u*x - 2*x**2 What is the second derivative of 224*b**2*o**2 + 651*b**2*o wrt o? 448*b**2 What is the derivative of -10759*i**2*q - 2*i**2 - 2*i*q**4 + i + 6101 wrt q? -10759*i**2 - 8*i*q**3 What is the third derivative of -5358*i**5 - 2*i**4 + 2*i**3 + 1114*i**2 - 2*i? -321480*i**2 - 48*i + 12 What is the second derivative of -7*i**2*m*v + i**2*m - 6*i**2*v + 5*i*m*v - 17*m*v wrt i? -14*m*v + 2*m - 12*v Find the second derivative of s**5 - 46*s**3 - 2*s**2 + 26*s + 83. 20*s**3 - 276*s - 4 Differentiate -g**2*q**3 + 2767*g**2 + 304*q**3 + 8*q with respect to g. -2*g*q**3 + 5534*g What is the second derivative of 63*q**5 + 47*q? 1260*q**3 Find the second derivative of 3*b**2*g*i**3 - 6*b**2*g*i**2 + 3*b**2*i**2 - b*i + 317*g*i**3 wrt b. 6*g*i**3 - 12*g*i**2 + 6*i**2 Find the first derivative of 2*s**3 + 33*s - 42. 6*s**2 + 33 What is the third derivative of -3174*a**3 - 9*a**2 + 206? -19044 Find the second derivative of -146*f**4 + 111*f wrt f. -1752*f**2 What is the second derivative of 5*p**2*u**3 - 110*p**2*x + 2*p*u + 16*u**5*x wrt u? 30*p**2*u + 320*u**3*x What is the derivative of -3*d*i*m*x + 2*d*i + d*x**2 + i*m - i*x**2 + i + 2*m*x + 2*m wrt x? -3*d*i*m + 2*d*x - 2*i*x + 2*m What is the third derivative of -2*q**3*y**3 + 2*q**3*y**2 + 349*q**3*y + 266*q**2*y**3 - 2*y**3 wrt q? -12*y**3 + 12*y**2 + 2094*y Find the first derivative of 8*k**3 + 9*k*n**3 - 2*k*v**2 + n**3*v**2 + 135*n**2*v**2 + 2*n**2 wrt k. 24*k**2 + 9*n**3 - 2*v**2 Find the second derivative of 80*w**2*z**3 - 12*w**2 + 1140*w*z**3 wrt w. 160*z**3 - 24 What is the first derivative of -216*a**3*o - 3*a**3 + 39*a**2 + 2*a*o wrt o? -216*a**3 + 2*a What is the third derivative of 915*a**6*w + a**4*w**3 + a**2 - 4*a - 66*w**3 wrt a? 109800*a**3*w + 24*a*w**3 Find the third derivative of -l**3*t**3 + 3*l**3 + 503*l*t**4 + l*t**2 - 2*l*t wrt t. -6*l**3 + 12072*l*t What is the third derivative of 1587*n*r**3 - 22*n - 2*r**2 - 20*r wrt r? 9522*n What is the first derivative of 31*p**4 + 3*p**3 + 379 wrt p? 124*p**3 + 9*p**2 Find the third derivative of 446*t*u*y**3 - 489*t*u*y - 2*t*y**5 - 5*u*y**2 wrt y. 2676*t*u - 120*t*y**2 Find the first derivative of 360*o**3 + 198 wrt o. 1080*o**2 What is the second derivative of d**4*k + 146*d**3*k**2 - d**3 + d*k**2 - 52*d - 6*k**2 - 1 wrt d? 12*d**2*k + 876*d*k**2 - 6*d What is the first derivative of 257*d**2 + 684 wrt d? 514*d Find the second derivative of -25*a**2*c**2*v - 2*a**2*c**2 + a**2*v + 4*a*c**2*v + 99*a*c wrt c. -50*a**2*v - 4*a**2 + 8*a*v Find the third derivative of -234*p**6 + 72*p**2 - 3 wrt p. -28080*p**3 What is the third derivative of 116*p**3*w**3 + p**2*w**3 - w**3 wrt p? 696*w**3 Find the second derivative of -134*l**3*v**4 - 9*l**3*v**2 - 13*l**3*v - 20*l**2*v + l wrt v. -1608*l**3*v**2 - 18*l**3 Find the third derivative of -1137*r**2*v**3 + 46*r**2*v**2 + r**2*v wrt v. -6822*r**2 What is the second derivative of b**3*t + 79*b**2*t - 2*b*t + 41*b wrt b? 6*b*t + 158*t What is the third derivative of 4886*b**3 + 3493*b**2 wrt b? 29316 What is the second derivative of -8*k**4 + 107*k**3 - 2*k**2 - 2738*k? -96*k**2 + 642*k - 4 What is the second derivative of 16*y**3 + 47*y**2 - 1349*y? 96*y + 94 Find the second derivative of -196*q**4 + 2*q**3*u - 68*q*u + 19*u wrt q. -2352*q**2 + 12*q*u Find the second derivative of -165*m**4 - 20*m + 1. -1980*m**2 Find the third derivative of -115*z**4 + 5*z**2. -2760*z What is the derivative of 31*m**3*o + 3*m**2*o + 3687*o wrt m? 93*m**2*o + 6*m*o Find the third derivative of -280*a**3*f**3*z + 12*a**3*f**3 - a**2*f**3 + 2*a**2*f*z + 225*a*f**3*z - 3*f**3*z wrt a. -1680*f**3*z + 72*f**3 What is the second derivative of -j**2*s**2 + 26*j**2*s - j*s**2 + 35*j*s wrt j? -2*s**2 + 52*s What is the derivative of 2*j**2*s - 63*j**2 + 2*j*s + 5*j - 345*s + 4 wrt j? 4*j*s - 126*j + 2*s + 5 What is the second derivative of 268*x**3 - 2*x**2 + 2*x + 429 wrt x? 1608*x - 4 Find the third derivative of -2*a**4 + 18*a**3*i**3 + a**3*t + 39*a**2*i**3*t - 2*a**2*i**2*t + a*t wrt a. -48*a + 108*i**3 + 6*t What is the second derivative of 7*c**5 + 247*c**3 + 2312*c wrt c? 140*c**3 + 1482*c What is the second derivative of 30*i**3*s**2 - i**2*s**2 - 3*i**2*s + 4*i*s**2 - 6*s**2 wrt i? 180*i*s**2 - 2*s**2 - 6*s What is the third derivative of -4746*l**6 + 2*l**2 - 7*l + 2? -569520*l**3 What is the third derivative of 4379*a**2*b**3 + 2*a**2*b - 64*a*b**2 - b wrt b? 26274*a**2 What is the third derivative of -10*a**6*r + 22*a**6 + 5*a**3 + 35*a**2*r - 4*a**2 + 4*r wrt a? -1200*a**3*r + 2640*a**3 + 30 What is the derivative of 1229*i**3 + 1678? 3687*i**2 Find the second derivative of 15*d**4 + 5*d**2*i**2 - 2*d + 10*i**2 + 13 wrt d. 180*d**2 + 10*i**2 What is the derivative of -4*k**2*l**2*n - 7*k**2*l**2 - 2*k*l + 17*l**2*n - 5*l**2 wrt n? -4*k**2*l**2 + 17*l**2 What is the derivative of -i*m**3*v**2 - 60*i*v**2 - 191*m**3*v**2 wrt i? -m**3*v**2 - 60*v**2 Differentiate b**2*y**2 + 1602*b**2 - 8*b*y**3 + 69*y wrt y. 2*b**2*y - 24*b*y**2 + 69 What is the third derivative of 69*c**3*k**3*p**3 - 23*c**3*k**2*p - 134*c**2*k**3*p**3 + 2*c**2*k**3*p - 11*c**2*k**2 - 2*c*k**3*p**2 wrt p? 414*c**3*k**3 - 804*c**2*k**3 Differentiate -212*c**2*q + 1530*c**2 - 5*c*q wrt q. -212*c**2 - 5*c Find the second derivative of -2*d**3*p**2 + 131*d**3 + d**2*p + 2*d*p**2 + 2*d*p wrt d. -12*d*p**2 + 786*d + 2*p Differentiate 4*j**2 - 541*j - 4558 wrt j. 8*j - 541 What is the third derivative of 3*s**3*u**3 + 10*s**3 + 2375*s**2*u**3 - 563*s*u**2 wrt u? 18*s**3 + 14250*s**2 What is the third derivative of -564*h**2*l**3 + 5*h**2*l - l**2 - 12 wrt l? -3384*h**2 What is the third derivative of -3*s**3*v**4 - 87*s**3 + 2771*s**2*v**6 + 13*s*v**2 wrt v? -72*s**3*v + 332520*s**2*v**3 What is the second derivative of -1556*c**3 + 211*c + 5? -9336*c Differentiate -172*p*x**2 - 2*p*x - 2*x**2 + 656 wrt p. -172*x**2 - 2*x What is the third derivative of -8632*i**6 - 7*i**2 + 229*i + 2? -1035840*i**3 Differentiate -74*g**3*o - 261*g**3 with respect to o. -74*g**3 Find the third derivative of 4*r**6 - 15*r**4 + 288*r**2 wrt r. 480*r**3 - 360*r Find the first derivative of -17438*h**2 + 19615. -34876*h Find the first derivative of 212*b - 252 wrt b. 212 What is the third derivative of 2501*g*p**3 + 2*g + 140*p**2 wrt p? 15006*g Differentiate -530*z - 1233 with respect to z. -530 Find the third derivative of -3*i**6 + 282*i**4 + 2*i**3 - 2*i**2 + 421*i + 2. -360*i**3 + 6768*i + 12 Find the second derivative of -1420*p**4 - 922*p wrt p. -17040*p**2 What is the third derivative of -2509*y**6*z**2 + 124*y**2*z + 3*z**2 wrt y? -301080*y**3*z**2 Find the second derivative of 42*u**3 - 12*u**2 - 43*u - 97. 252*u - 24 Find the third derivative of 91*k**4*p**3 + 13*k**2 + 2*k*p**3 + 3*p**3 wrt k. 2184*k*p**3 Find the third derivative of m**4 - 5828*m**3 - m**2 - 2*m + 309. 24*m - 34968 What is the third derivative of y**5 + 6*y**4 - 1573*y**2? 60*y**2 + 144*y What is the third derivative of -b**3*g**3 - 244*b**3*g*j**3 - b**3*j**3 - 3*b**2*g**3*j**2 - 12*b**2*g*j**3 - 15*g**2*j**3 wrt b? -6*g**3 - 1464*g*j**3 - 6*j**3 Find the third derivative of -1479*i**3 + 716*i**2 + 2. -8874 Find the second derivative of 61*i**2*j*p - i**2*j + i*j*p - i*j + 129*j*p wrt i. 122*j*p - 2*j What is the second derivative of 2*b*n**2*x - 2*b*n - b*x - 35*n**2*x - 2*n + 1221*x - 1 wrt n? 4*b*x - 70*x Find the third derivative of i*p**3*y - 963*i*p**3 - 8*i*y + 19*p**2*y + 16*y wrt p. 6*i*y - 5778*i Find the third derivative of 4353*m**4 + 418*m**2 + 6*m. 104472*m What is the third derivative of 2*k**6 - k**5 + 353*k**3 + k**2 + 1150*k + 3? 240*k**3 - 60*k**2 + 2118 Find the second derivative of 3*n**5 + 180*n**2 + n - 675. 60*n**3 + 360 What is the derivative of 3899*b**2*v**2 - b**2 + 3*b - 1 wrt v? 7798*b**2*v What is the second derivative of 4*b**2*p*w**2 - b**2*p*w - 38*b**2*w**2 + b*p*w**2 + 11*b*w**2 + p*w**2 - 4 wrt b? 8*p*w**2 - 2*p*w - 76*w**2 Find the third derivative of -14*h**2*r*z*
{ "pile_set_name": "DM Mathematics" }
Before the Internet, editors compiled power lists using a complex system of favor-trading and slow-news-cycle holidays. Now, it's done by algorithm! Anyone can indulge their narcissism and quantify their own "influence." But only one can be on top. Or several. What's true for the Internet is true for Twitter: on the Internet, you can make your voice heard, if not necessarily listened to. Are men listened to more than women, as is often the case in previous public discourse? It depends which evidence you choose to read. According to a recent study by Brian Solis, Klout, and PeopleBrowsr, which looked at the 50,000 most influential Twitter users (using Klout's algorithm), the difference between male and female users' influence was not sweeping: While women represent a greater portion of the overall Twitter population, men edged slightly ahead in terms of Twitter's top influencers. Yet that power balance shifts when looking at influence across the entire Twitterverse as women hold a higher level of influence within the general Twitter population. Recently, Twitter Grader helpfully compiled a list of the top 100 female users. Sitting at the very top: a conservative woman named Jan Simpson. She has 78,153 followers, though she follows even more than that. She tweets aggressively and sociably. Although her profile lists "Operation Rescue," the rabidly anti-abortion group, Simpson's most recent tweets have focused on animal rights and Florida politics. Also, she doesn't seem too impressed by Sarah Palin. She contains multitudes. G/O Media may get a commission Subscribe and Get Your First Bag Free Promo Code AtlasCoffeeDay20 Why did they have a separate list of female users and not one of men? Probably because the overall top 100 was a mix of institutional accounts (with Fox News at the top) and individual dudes. Simpson only clocks in at #25 on that one. An HP study released earlier this month defined influence as getting people to actively participate, not just having lots of followers. When put that way, here were the most influential users: @mashable, @jokoanwar, @google, @aplusk, @syfy, @smashingmag, @michellemalkin, @theonion, @rww, @breakingnews Plenty of these are aimed at the tech-savvy (or tech-curious) — Smashing Mag, Mashable, and RWW (Read Write Web), Google. The Onion, Breaking News, and Syfy are pretty obvious. Joko Anwar is an Indonesian filmmaker who clearly has figured out this social media thing. And then there's the only woman on that list: Michelle Malkin. Does she need an introduction? If so, here's a recent tweet. Factcheck: the number of vacation days Obama has taken to date is 48 versus Bush's 115. But who needs facts when you can have influence? The 100 Most Powerful Women On Twitter [TwitterGrader] What Makes A Tweet Influential? [HP Labs] Influence Is Bliss: The Gender Divide Of Influence On Twitter [Brian Solis] Earlier: Girl Talk: How Men Dominate Twitter Is Facebook Girly? How Men And Women Use Social Media
{ "pile_set_name": "OpenWebText2" }
Facilitators and barriers related to voluntary counseling and testing for HIV among young adults in Bo, Sierra Leone. In 2012, we interviewed a population-based sample of 285 young adult residents (age 18-35 years) of the city of Bo, Sierra Leone, about their attitudes toward and experience with voluntary testing and counseling (VCT) for HIV. In total, 33% of the participants (44% of women and 25% of men) reported having been tested for HIV at least once. More than 85% of those not previously tested indicated a willingness to be tested in the near future, but untested participants were nearly twice as likely as tested participants to report fears about family/partner rejection, job loss, and other potential consequences of testing. More than 90% of participants expressed a high desire for testing privacy, and the majority reported a preference for VCT at a facility far from home where no one would know them. Social barriers to HIV testing remain a challenge for HIV prevention in Sierra Leone.
{ "pile_set_name": "PubMed Abstracts" }
Quantitation of regional cerebral blood flow corrected for partial volume effect using O-15 water and PET: I. Theory, error analysis, and stereologic comparison. Limited spatial resolution of positron emission tomography (PET) can cause significant underestimation in the observed regional radioactivity concentration (so-called partial volume effect or PVE) resulting in systematic errors in estimating quantitative physiologic parameters. The authors have formulated four mathematical models that describe the dynamic behavior of a freely diffusible tracer (H215O) in a region of interest (ROI) incorporating estimates of regional tissue flow that are independent of PVE. The current study was intended to evaluate the feasibility of these models and to establish a methodology to accurately quantify regional cerebral blood flow (CBF) corrected for PVE in cortical gray matter regions. Five monkeys were studied with PET after IV H2(15)O two times (n = 3) or three times (n = 2) in a row. Two ROIs were drawn on structural magnetic resonance imaging (MRI) scans and projected onto the PET images in which regional CBF values and the water perfusable tissue fraction for the cortical gray matter tissue (hence the volume of gray matter) were estimated. After the PET study, the animals were killed and stereologic analysis was performed to assess the gray matter mass in the corresponding ROIs. Reproducibility of the estimated parameters and sensitivity to various error sources were also evaluated. All models tested in the current study yielded PVE-corrected regional CBF values (approximately 0.8 mL x min(-1) x g(-1) for models with a term for gray matter tissue and 0.5 mL x min(-1) x g(-1) for models with a term for a mixture of gray matter and white matter tissues). These values were greater than those obtained from ROIs tracing the gray matter cortex using conventional H2(15)O autoradiography (approximately 0.40 mL x min(-1) x g(-1)). Among the four models, configurations that included two parallel tissue compartments demonstrated better results with regards to the agreement of tissue time-activity curve and the Akaike's Information Criteria. Error sensitivity analysis suggested the model that fits three parameters of the gray matter CBF, the gray matter fraction, and the white matter fraction with fixed white matter CBF as the most reliable and suitable for estimating the gray matter CBF. Reproducibility with this model was 11% for estimating the gray matter CBF. The volume of gray matter tissue can also be estimated using this model and was significantly correlated with the results from the stereologic analysis. However, values were significantly smaller compared with those measured by stereologic analysis by 40%, which can not be explained by the methodologic errors. In conclusion, the partial volume correction was essential in quantitation of regional CBF. The method presented in this article provided the PVE-corrected regional CBF in the cortical gray matter tissue. This study also suggests that further studies are required before using MRI derived anatomic information for PVE correction in PET.
{ "pile_set_name": "PubMed Abstracts" }
{% if postListItems.length %} <ol class="c-stacked-block-list"> {% for item in postListItems %} <li class="c-stacked-block-list__item"> <a href="{{ item.data.url }}" class="c-post-block" rel="bookmark"> <time class="c-stacked-block__kicker" datetime="{{ item.data.date | dateFilter }}">{{ item.data.date | dateFilter }}</time> <h2 class="c-stacked-block__title"> {{ item.data.title }} </h2> <p class="c-stacked-block__description"> {{ item.data.description}} </p> </a> </li> {% endfor %} </ol> {% endif %}
{ "pile_set_name": "Github" }
An improved profile-level domain linker propensity index for protein domain boundary prediction. Protein domain boundary prediction is critical for understanding protein structure and function. In this study, we present a novel method, an order profile domain linker propensity index (OPI), which uses the evolutionary information extracted from the protein sequence frequency profiles calculated from the multiple sequence alignments. A protein sequence is first converted into smooth and normalized numeric order profiles by OPI, from which the domain linkers can be predicted. By discriminating the different frequencies of the amino acids in the protein sequence frequency profiles, OPI clearly shows better performance than our previous method, a binary profile domain linker propensity index (PDLI). We tested our new method on two different datasets, SCOP-1 dataset and SCOP-2 dataset, and we were able to achieve a precision of 0.82 and 0.91 respectively. OPI also outperforms other residue-level, profile-level indexes as well as other state-of-the-art methods.
{ "pile_set_name": "PubMed Abstracts" }
<!DOCTYPE html> <html lang="en"> <head> <meta http-equiv="refresh" content="0;URL=../../../libc/struct.ifaddrs.html"> </head> <body> <p>Redirecting to <a href="../../../libc/struct.ifaddrs.html">../../../libc/struct.ifaddrs.html</a>...</p> <script>location.replace("../../../libc/struct.ifaddrs.html" + location.search + location.hash);</script> </body> </html>
{ "pile_set_name": "Github" }
Sense and Sesquisensibility: Some Random Notes About 2013, as it Pertains to 1863 Jack Neely 9:31 AM, Sep 25, 2013 In case you've forgotten, it's still the Civil War Sesquicentennial. Here it is, two months before the 150th anniversary of the Battle of Knoxville, and I'm just not feeling the spirit yet. There was more about it two years ago, when The New York Times was running a new Civil War story nearly every day. Maybe the whole country's starting to get burned out on the Civil War. I suspect that's one thing we have in common with most Americans 150 years ago. But it did help to have a look at Joan Markel's new mostly photographic book, Knoxville and the Civil War. It includes a lot of images I've never seen before and some I've seen, but not juxtaposed in this way. It's a good companion to another recent book, Earl Hess's The Knoxville Campaign, a text-heavy book about the actual strategy of the siege that, 150 years ago this week, was soon to commence. And it boosted my Civil War spirits to visit, for the second time, the exhibit at the East Tennessee History Center. "Of Sword and Pen" is a modest exhibit, in terms of artifacts, but a thoughtful one that brings out the complexity of feeling in the war. It offers some things to gawk at, some guns and some "grape shot" found at Fort Sanders, stacked in a pyramid. You always hear about grape shot, but I don't usually picture projectiles quite this big. It would be more appropriate to call it plum shot. And a large iron sphere I first took to be a he-man's bowling ball turned out to be a cannonball, found at Chattanooga. There's a wooden tobacco pipe and a cane carved from a Greeneville tree used to hang an accused Unionist saboteur. There's an invitation to an 1861 "Military Ball" held at the Lamar House, now the front of the Bijou Theatre, that included both soon-to-be Union and Confederate soldiers. There are lots of diaries and letters and maps—selected, I think, to show how much complication there was within one region and within one city. And there are original documents from Nashville pertaining to Tennessee's role as the first rebellious state to abolish slavery, two months before the end of the war. The exhibit I pored over most wasn't an actual artifact, and it was a representation of something I'd seen many times. It was at the entrance, enlarged and illuminated, a sketch of a downtown street I see every day. Late in the war, in a prison camp in Chicago, a young Confederate prisoner with a strong memory for detail and some artistic talent, maybe wanted to convey to his fellow inmates, and perhaps the guards too, something about his peculiar hometown and himself. So he drew a sketch of Gay Street as it was on one particular day: April 27, 1861. Samuel Bell Palmer's sketch showed a scene rarely seen in any city in the world: simultaneous rallies, on the same street, for opposing sides in a war that was well underway. Here, a Union rally near Main Street, under the stars and stripes. A few blocks down, a Confederate rally, under the original rebel flag, with a parade of Confederate soldiers coming this way. The center of attention of the Union rally was reportedly a Unionist U.S. senator named Andrew Johnson. He is not a well-remembered man, but he was a brave man that day. I first saw that picture in my grandfather's copy of the first edition of Digby Seymour's Divided Loyalties, when I was about 6. It holds up to magnification and scrutiny. Anyway, have a look. It's only up for another two weeks, closing on Oct. 13. That'll be the same weekend as the Battle of Fort Sanders re-enactment, at the fort reconstruction out Washington Pike, near Corryton. Check their website—last I heard, they were still recruiting. *** Meanwhile, a surprising new book just landed on my desk, published by UT Press, We Are in His Hands Whether We Live or Die: The Letters of Brevet Brigadier General Charles Henry Howard, a Union officer from small-town Maine, a Bowdoin alumnus who until 1861 seemed headed toward a career as a Congregationalist minister. He'd been wounded in the leg, early in the war, fighting under McClellan, but recovered enough to join the ranks again with Burnside at Fredericksburg, where he was wounded again, in the same leg. He was a 25-year-old major when he arrived in Knoxville during Burnside's occupation, just after Union troops here turned back the Confederate attack at Fort Sanders. The past tense in one passage may suggest something about the place: "Knoxville must have been rather a flourishing little city— Streets paved—regularly laid out—built upon side of a hill—two or three churches—a nice banking-building now used for Provost Marshall's office." Of course, none of the buildings he mentions are still standing. Knoxville didn't start saving interesting old buildings until recently. He adds, "Parson Brownlow ran away on Longstreet's first approach." Brownlow, Unionist-activist editor of the Knoxville Whig, was nationally famous by then. "Some of our staff dined with Mrs. B. (his wife) and saw his accomplished and heroic daughter. A Rebel Colonel taken prisoner in that assault (week ago Sunday) proved to be a brother of Mrs. Brownlow and at her request has been paroled and was staying at her house, keeping his chamber most of the time however." That was Lt. Col. Alfred O'Brien, of the 13th Mississippi. Despite his sister's intervention, he refused to swear loyalty to the Union, and ended up in a prison camp. The rambling white-frame Brownlow house, near downtown on East Cumberland Avenue, was a pretty fascinating place that fall. It remained a much-visited shrine for some 50 years after the war, especially among Republican presidents: McKinley, Teddy Roosevelt, Taft, many others felt obliged to pay their respects. Of course, we later tore that down, too. Property rights. That's the way we do things around hyar. Erase our history, on a regular basis. Hit's our right.
{ "pile_set_name": "Pile-CC" }
If you’re used to the usual compact SUVs and sedans from Kia, then the 2018 Kia Stinger GT is going to come across as something unexpected and unique. Or maybe not that unexpected. In 2011, Kia introduced their GT Concept, and the journey has led them from there to the new Kia Stinger GT. This is a car that Kia believes will define their history as “pre-Stinger” and “post-Stinger” — it’s that important to the brand, and it’s that impressive as a vehicle. So let’s back up for a moment and talk about the meaning behind a Grand Touring or Gran Turismo vehicle, commonly called a GT. A true GT is not just a four-door family wagon that’s been tricked out to look sportier and tuned to have a more impressive exhaust sound. A true GT is a vehicle that’s been built from the ground up for speed, distance, style, safety, and comfort; they are elegant and fast. GT vehicles are usually front engine with rear-wheel drive, and they are made to transport up to two couples and their luggage comfortably. Kia set out to design a car that drove as good as it looked; one that could “fit two couples and their things, to arrive in style at a fabulous location, and to also do it incredibly rapidly, ride comfortably, but with a lot of speed.” How fast can the Kia Stinger GT go? 167 is its top speed, and it can do 0-60 in 4.7 seconds. I’ll come back to that in a moment. Albert Bierman, the former chief engineer of BMW’s M division, joined Kia in 2015. When he was first going through his interview rounds, he saw some sketches of the Stinger. His response to the sketches was, “that car has to drive as good as it looks.” Once he joined Kia, he made it clear that he wanted to work on the vehicle and make it amazing. If Kia was going to do it, they wanted the design to be true to the original GT Concept, they wanted to get the proportions just right to really celebrate the fact that it’s a RWD car, and they wanted the performance, handling, and dynamics of the vehicle to deliver on the promise of the design. Kia says that Bierman also brought a testing prowess to the company. He really pushed the Stinger GT — over 6,000 miles on the Nürburgring, braking runs on a hill in Austria that is known for being “hell on brakes”, which brings up the subject of brakes. The Kia Stinger has Brembo brakes that have been set well. This car, from about 1800 rpm to about 4,000 will “pull like a donkey”, it is really fast, but you’ll feel like you can safely do that because the brakes are great, and they will pull you back in. The Kia Stinger GT has been winter tested in Sweden, and as a result, the traction control and the handling balance have really been finely tuned. It’s also been extensively tested in the Mojave Desert. Kia says that “this car has been through a lot to bring it to this point.” Kia wanted the Stinger GT to be able to compete in the premium space against other GT-like cars, so they ensured that the Stinger would have the best technology and all of the amenities. Kia created what they call a reference set, so they took a look at what was available in the space. They looked at the Audi A5 and A7, they looked at the BMW 440 Grand Coupe and the 640 Grand Coupe, and at what Kia considered the penultimate vehicle in this space — the Porsche Panamera. Kia had very lofty, ambitious goals. The 2018 Kia Stinger GT is all about proportions. They wanted to celebrate rear wheel drive proportions, the critical dimension between a front wheel, front axle center, and the front dash. This space that you can only get with a rear wheel drive vehicle. There is a short front overhang, and the wheels are really pushed out to the corners for a wide, athletic stance. They wanted it to be a fastback, with a sporty silhouette seen in the GT Concept. The Stinger has a beautiful, almost coupe-like shape with a classic GT proportion. The Stinger has broad shoulders that haunch over the rear wheels. The Kia Stinger GT is not a compact sports performance sedan; it’s larger than the BMW 3 series, it’s larger than the Lexus LS; it’s larger than the other vehicles in this space. With a 114.4″ wheelbase, it’s comparable to an Audi A7 in size. Kia designers insisted on premium, quality amenities inside the vehicle. They looked at their reference set, and determined that everything you see in the vehicle should be real metal; they used hand-stitching for the dash, steering wheel, middle console, and door panels, basically anywhere you look. The Napa hides used for the seats are hand selected and approved.
{ "pile_set_name": "OpenWebText2" }
Search Subscribe Flame Flameseemstobeanothermilitary-gradecyber-weapon, this one optimized for espionage. The worm is at least two years old, and is mainly confined to computers in the Middle East. (It does not replicate and spread automatically, which is certainly so that its controllers can target it better and evade detection longer.) And its espionage capabilities are pretty impressive. We'll know more in the coming days and weeks as different groups start analyzing it and publishing their results. @bruce. Do you think this is a similiar breakout to what happened to cryptography? I am beginning to think it is. Nation states, criminals, businesses, etc. are going to have to look at espionage and sabotage differently. Amazing that things have gone from throwing wooden shoes into the works to cyberware. But the principles are the same. In the most recent admission that stuxnet was developed by the US it was mentioned that the first task they had to undertake was to survey the network layout of the Natanz site, but nothing more was said about how that task was undertaken. I'm wondering whether Flame was the tool developed for that purpose? The descriptions seem to match fairly well, can anyone with more knowledge confirm this idea? It's well-worth noting the role Microsoft has played in playing here - assisting with delivery of malicious payload in order to aid in the compromise of target systems. This seems to be breaking breaking new ground! No longer is War the sole domain of the likes of General Dynamic, Raytheon, GE, Halliburton, and the Boeing Company. Now the unstable folks in Redmond seem to be in on saving the Western World. While it's good to hear MSFT, "immediately began investigating Microsoft’s signing infrastructure to understand how this might be possible." I am happy to hear they are arresting Flame's forward momentum by adding to Untrusted Certificate Store. The arrogant ones have always been comfortable with delivery of products with known vulnerabilities and have effectively escaped Product Liability litigation for providing known defective products. 2009) MSFT created their own Microsoft Active Response for Security MARS. In their own words this is a fusion of 'Microsoft Digital Crimes Unit, the Microsoft Malware Protection Center (MMPC), Microsoft Support, and the Trustworthy Computing team to annihilate botnets and help make the Internet safer for everyone. Microsoft believes the Waledac takedown will be the first of many successful endeavors for Project MARS and is already working to apply the lessons learned from this operation to future initiatives.' 2012) MSFT ZEUS Takedown wherein "Microsoft's unprecedented aggressive legal strategy in botnet takedowns came under fire from researchers in the Netherlands, charging that the software giant's most recent botnet dismantlement operation has ultimately damaged international law enforcement and private research investigations." ...[MSFT caused] "collateral damage" can affect more than the suspension of legit domains, for example, but also other investigations into a botnet. "Absent sufficient information sharing, cooperation, coordination and trust among investigating parties, there is too much room for error or interference, and one party's success can hamper the erstwhile and equally important efforts of others," Piscitello wrote today in a blog post. ... the way Microsoft set up its servers allows it to process packet data and gather HTTP requests with full headers and "actually also POST data which will contain sensitive information about the victims, including usernames, email addresses , passwords and personally identifiable information," he said. Fox-IT also contends that the affidavit contains some of the nicknames, email addresses, and instant messaging handles about the John Does allegedly involved in this cybercrime group that is identical to information it had provided under nondisclosure to a specific mailing list. "The information therein was 100% identical to information we had supplied to a certain mailing list. This mailing list has the restriction that data being shared can only be used with the permission of the person who supplied that data. This article provided a couple examples of collateral damage resulting from Microsoft's action and co-opting data against the intended use reinforces the impression that MSFT makes up rules as they go - working with the appropriate TLA for cover. To the detriment of those cited. Not trying to get too deep in the weeds, but MSFT as an active participant in State_on_State cyberwarfare is intriguing. Nothing new there. MS has been in bed with the TLA's for a long time now. Remember _NSA_KEY? Or how about the utterly flawed random number generator in Windows 2000? The academics who reverse engineered it came to the conclusion that MS either had some horrible cryptographers *or* they intentionally weakened it (they actually said this in their paper). Some of the mistakes were so horrendous that first year CS students could come up with a better design just by reading Wikipedia. And this wasn't just a theoretical weakness, but it allowed the researchers to recover any key created with the RNG (both past and future keys). It was just as bad, if not worse, than the Debian SSL bug (which was introduced when some code maintainer "cleaned up" code he knew nothing about. That was a mistake after the fact. In MS's case, it was just bad design from the get-go.) And then you have Dual_EC_DRBG which most likely has "up my sleeve numbers" that allow NSA to recover any key created with it. While not a MS creation, it is included in Windows as an option. So, the bottom line is do not trust MS if you are an "enemy" to the USA. I am surprised at just how many enemy nation-states still rely so heavily on Windows. In fact, anyone (anywhere) who uses Windows for any security critical application is an idiot. This is not to say Linux or BSD would be immune from compromise, but at least one could audit the code without having to decompile or disassemble it. I also admit that there probably are many sneaky ways a well-funded TLA could sabotage the open-source development process, but any intentionally introduced vulnerability would eventually be discovered (sooner or later). With MS, you would have to wait on someone to reverse engineer it (which means likely never). 1, Protect the nations communications fro other nations. 2, Break the communications of all other nations irespective of if they are friend or foe. Over recent years the second requirment has also been spread to cover "untrusted residents" as well. However the two roles are in conflict because it is known that your crypto systems will become known to the enemy at some point and they will either use them as is or use the good bits to augment their systems. It is known that back in the day of "mechanical ciphers" many of the systems did not have all keys of equal strength, some were very strong and some were very weak if you knew what to look for. Later in the early days of electronic cipher machines the designs from the likes of the NSA we have seen were very brittle in design being only just strong enough to meet the keyspace and if even apparently trivial changes were made the cipher strength would drop dramaticaly. Currently we have AES, some say the NSA rigged the contest with "human nature" by having those submitting an entry writting "optomised code" that could be freely downloaded and used in products. Well the problem with optomising for speed or efficiency is in general purpose hardware it opens a lot of side channels through which information can leak. The classic being and example of remotly getting the AES key via a cache timing attack before the ink was dry on the NIST letter appointing the winner. Which ment most versions of AES software (and many still today) hemorrhage information when enciphering or deciphering that is available to anybody who has a connection to the machine... Of more recent times it has been shown that there are ways to make finding PubKey PQ primes almost trivial because the system designers either know or care little or nothing about gathering entropy and distilling it out of the accompanying bias. Instead they use "Magic Pixie Dust" solutions such as using a Hash function... I've known since the early 1980's just how difficult it is to get good entropy especialy in an environment where "Fast Moving Consumer Electronics" (FMCE) are manufactured. I know of one "special design" that was supposed to produce over a million different numbers with equal probability, after "walking the algorithm" I found it could at best produce only 180 numbers... As long as the designers make realy bad mistakes in practical implementations it does not matter how strong in theory our crypto algorithms are the NSA et al are going to read the traffic. Opps sorry some Smart Mobile devices don't like to be both "smart" and "mobile"... Just to finish, So where does the NSA, GCHQ, et al go next to ensure that they continue to read the communications of "others" whilst protecting their "own"? Well crypto algorithms come and go, lets be honest DES has been outlived by the DOD IP and later protocols. Who remembers FEAL for anything other than the fact it's weaknesses gave rise to the cryptoanalytic techniques that put the final nails in DES. The future is in making new protocols and standards with weaknesses in, whilst also encoraging all current systems to be compatible with old broken systems as transparently as possible. For instance "auto-fallback" many secure applications have to "interwork" with many other applications some of them old some of them new and thus many different algorithms are available. To get them to work they "auto-negotiate" untill they find a common algorithm and mode. Now it surprisess some people that some early Secure terminal access applications that use SSH had at the bottom of their list "tty" or "telnet" or "ascii" all of which are "plain text"... Thus if you got between the opening request and the far end reply you could cause an Auto-negotiation to plaintext, and the way most applications are designed the user won't be explicitly told (there might be a "tty" etc appearing in a small toolbar somewhere but no big flashing signs). So as we know the NSA is turning into the "face-hugger" "Vampire Squid" of the US Internet backbone, it would be fairly safe (technicaly) to assume it would be relativly trivial for them to "get in the middle" when ever they wished and "auto-fallback" the comms to a weak algorithm or mode to aid evesdropping. But unless they get into standards to weaken them then the "auto fallback-MiTM" will only be good for a few years. The secret is to pick on standards that are going to be used in "embeded systems" with a very long service life. We know that Signaling System Seven (SS7) used to set up and tear down calls on the Integrated Switched Digital Network (ISDN) used by most phone systems internationaly thanks to the ITC, was based on the UK "System X" which had a few nasties in it that alowed remote evesdropping for "test and emergancy situations" and are thus still there (yes your GSM mobile phone is supposed to support those features to meet the standard...). Now what long lived standards are due to appear due to political and other imperatives in the near future? Smart meters and "smart Implants, these will be expected to have minimum service lives of between 30-50years, so the auto-negotiation "auto-fallback" issue could be good for two to three times that so over a hundred years... The thing is that application marketers want to appeal to as many customers as possible so will bolt in any and all standards for product placment/specmanship, so will include it by default and thus make it available. Thus it will be another "Human Nature" attack (if you can call marketing people human ;-) I think all the comments answered my question. FLAME is similiar to the "breakout" of crypto into the open. Pun intended. Who can you trust? Answer from Reagan. trust but verify. Pretty hard to do in modern age...Back in the day all you had to worry about was the villiage gossip..Nowadays, everybody wants to know your business usually FOR business. Drones, Facebook, Google, etc. (frown) It intercepts Windows update via NetBIOS-related MITM attack. It then feeds the target machine a malicious package signed by a geniune-looking Microsoft certificate. Looks like Microsoft didn't do their PKI right. I think the intelligence about Natanz was acquired in more conventional ways. The US had access to many of the parts used in the reactor design so they were able to replicate it for experimentation. They also probably had at least one person on the inside (who left the infected USB key in the first place?). One analysis of Stuxnet has shown how photographs of the Natanz interior released by the Iranian government actually aided the virus authors in understanding aspects of the control system: http://www.digitalbond.com/2012/01/31/langners-stuxnet-deep-dive-s4-video/ It boils down to MD5 collision and predictable serialnumbers. New is that the attackers managed to to get a valid codesigning certificate using a signer which only accepts restricted client certificates. This is not a technical article but could lead to some interesting discussions... It could and I'll give you one thought immediatly, which is sufficiently InfoSec related for this blog, The argument presented in the article is logicaly flawed due to a basic but incorrect proposition, that what is in fact a crime is an act of war. I'll come about this the long way as it makes more sense to do so, First off is the thorny question of "weapons" and their use. Weapons are plain and simple a "tool" the use of which does not imply any "societal state" such as peace, civil war or war. As an example take a personal use gun (hand gun, rifle, shotgun), it can be used for, vermin control, game control, hunting for food, hunting for sport, target/clay shooting, defence against crime, crime and warfare. That is only one of it's potential uses is in prosecuting an existing war. Even non personal use weapons such as cannon and mortars do have non war uses (emergancy rescue at sea etc to get rescue lines to people, clearing snow build up to prevent avalanche, and I'm told similar issues in limited geological and engineering activities and more interestingly experimental reasearch on getting objects into space). So many weapons are tools and as such are agnostic to the societal state. Thus the use of a weapon does not mean your state is "at war" any more than throwing a hammer does. Therefor it's actual use therefor must have some other legal recognition to be an "act of war". Further "cyber-weapons" are compleatly unlike most conventional weapons that people understand. That is they are not "directed energy" weapons, which is a very important difference. Why is the difference important? because you need to consider how you defend against the use of a weapon. Conventional weapons require the defender to take some positive action as a defence, cyber-weapons however can easily be defended against by the negative action of not having any computers, or not allowing them to be used in a way that might cause the defender harm (thus the "blue screen of Death" in MS Office is not an act of war no matter how you might feel ;-) So the notion of "cyber-weapon" is itself called into question, infact a little further reasoning shows that what we should actually be talking about is "Sabotage" (derived from the French word for a wooden shoe or clog the sabot,) it litteraly means "to put the boot in"... That is without a machine to "put the boot in" to, no harm could be caused (outside of a "Bl**dy good kicking") by a person wielding their clogs. Thus "sabotage" is normaly considered an action against another persons property which needs a further requirment to become a "criminal act" and there are perfectly good laws to deal with crime in most countries (using them against international crime however is an issue for another conversation). Now as I've indicated what they are calling "cyber-weapons" are actually "tools" for cyber-crime and it's more restricted areas cyber-sabotage and cyber-espionage. Thus the use of the word "weapon" induces an emotional response that "tool" does not and this sets up a whole faux reasoning. Importantly neither sabotage or espionage in the societal state of "peace" can be construed as "acts of war" they can only become that after the societal state has changed to "war" and the act or intent can be shown to be more than acts of civil unrest. However and it is very important to remember this, once the social state has legaly changed from peace to war crimes such as sabotage and espionage change their state under what the article titles "Treacherous Deceit" (ie aiding and abeting the enemy). Thus the use of terms like "weapon" not "tool" or "crime" falsely colour peoples reasoning to assume "in war" not "at peace" as the initial state of the use of such "tools" for the crimes of sabotage and espionage, and thus argue incorrectly that they are defacto "acts of war" which they are not. [I could but won't go on to argue that as the "cyber-world" is not a legal entity such as a "State", and has no teritory or clear jurisdictional or geographical boundries a "war" cannot by definition be fought there so you can not have "cyber-war" thus "cyber-warfare".] As a closing point when a state of war exists those commiting sabotage or espionage are commiting "Treacherous Deceit" and are as such irespective of nationality "enemy agents" for which the lawful punishment of execution (by the "humane acts" of "hanging" or "firing squad") is allowed. The reason for the execution to be "humane" is to avoid it being used as a method of torture [5]. [1] - The reason Bush and Co had to call the criminal acts of 9/11 "war" [2][3], was to try and paint the US as being a defender (thus "just") not an aggressor (thus "war criminal"). [2] - Bush and Co were wrong because legaly 9/11 was not nor could not be considered "an act of war". [3] - War can not be legaly declared on non specific people, but only on "States" with military or other "state sponsored" forces [4] who are committing acts of aggression that are considered "acts of war" or of "endangering National Security", 9/11 did not meet either criteria. [4] - Whilst you might wish to describe an individual as an "enemy" there are certain formalities before they become either military or state sponsord forces. So there is no "enemy combatant" for good reason, they are civilians and are alowed to defend themselve, their homes, properties and possessions from invading forces who are commiting any act against civilians that are "war crimes". Even those who come from other countries to help repel the "invaders" are unless sponsored by a state civilians. [5] - Torture is technicaly a "war crime" irrespective of the social state of peace or war and is illegal providing one or both nations are signatories to various international treaties, hence the Bush and Co term "enhanced interrogation" and the need for "rendition".
{ "pile_set_name": "Pile-CC" }
How To Find Out What Your Customers Really Want I remember when the economic world around us was collapsing. Banks were failing, the US economy was spiraling out of control. During this time I had a conversation with a copywriter who worked on brands like crest, apple and hertz, that this seemingly doomed scenario was the perfect springboard for a small bank to make it huge. He continued, “Odds are, there is some bank out there that didn’t make bad loans, that stuck to their conservative roots, and all they need to do is speak up and they will emerge victorious. The concept is simple, if the world is complaining about something, that is not a problem, its a massive opportunity. It tells you there is a hole in the market, and/or a hole in consumers minds when thinking about that category. I don’t know if any bank really capitalized on that branding opportunity, but my bet would be on Wells Fargo. They seemed to come out of the mess doing just fine. As a marketer, I have been involved in many internal battles between the sales departments and my marketing department. The classic issue was about the quality of leads, but I remember clearly one specific and eye opening argument that I am proud to say I emerged victorious. Here’s the story. We were in the Junk Car space, and we promoted a free vacation voucher on our website. These vouchers cost like $5-$10 for us, and are basically remnant hotel and cruise inventory sold off to promotional marketing companies for pennies. Our web development team was much more nimble than our operations team, so we knew and started promoting the free vacation vouchers before the sales team knew about it. I got frantic calls from the sales manager, and several operations people yelling at me to take it off the website, because their team wasn’t prepared for it, and the back office wasn’t quite ready to ship them. They had customers calling and asking for the vouchers, and they weren’t confident they could deliver. What was the argument about? Well, they wanted me to stop promoting something that the customers were asking for. To me, that was blasphemy. If the customers are specifically asking for something, wouldn’t that be a great indicator of what they want, and what part of the messaging hooked them? Am I crazy? Was this an opportunity for the operations team to scramble and deliver, or a situation the marketing team should yank something thats working? If I see customers want something… I am not going to find a way to make them not want it… I am going to do whatever it takes to give them what they want. In the end that story worked out… I Realized…When Salesmen Heard Complaints, They Saw More Work. When I Heard Complaints, I Saw Opportunity. I still believe that most businesses don’t listen to their customers or are too busy trying to defend themselves than trying to do what it takes to deliver what their customers want and are asking for. In fact, with the immediacy of PPC, you can easily test 3 or 4 promotions and see which one customers ask about, and you know which one is a better hook. There is an excellent story in next months Fast Company about C&A Marketing in New Jersey, founded by Chaim Pikarski and Harry Klein. They minted in the tens or possibly hundreds of millions of dollars just by reading customer reviews and complaints. Here is their business model. Find popular consumer goods on Amazon, read through all the reviews and see what features people are saying they wish the product had. (i.e. a waterproof bluetooth speaker for the shower, or that floats in the pool.) The company than designs and developers a product with the new features customers wished it had, and than sell it on Amazon, and eventually in brick and mortar retail. What a simple and brilliant strategy. Nowadays with the internet, it isn’t rocket science to manufacture consumer goods in China, etc… C&A would then list it on Amazon, and if the item sells really well, they invest in innovating it even more, and launch it under a big brand name they are building up (Ivation). What A Brilliant and Obvious Way to Mine Consumer Complaints and Reviews For A Fortune in Profits. According to the article, C&A employs hundreds of people to comb through amazon reviews and develop products. I have always believed that businesses should check complaint website online to see what consumers complain about most in their industry, and use that as the platform to build a brand around. This is such a clear and obvious way to uncover consumer pain points, and most of the time the solution is easy to solve. I have even thought about building a scraping tool with natural language processing to identify the biggest complaints in an industry. If you know of such a tool, let me know… more importantly though… Do me a favor and do your homework for your business. Find a common complaint and fix it, and than promote the heck out of it… You will emerge victorious. (I should point out that asking them what the want will most likely not yield the results you need. Customers often don’t really know what drives them or what they really want… However, natural reviews and complaints are usually driven by emotion, and will more likely reflect their true desires.) In Simpler Terms, When You Ask What They Want, They’ll Tell You What They Think You Want To Hear. When They Take Their Own Initiative and Write Reviews or Complaints, They’ll Tell You What They Really Want To Say.
{ "pile_set_name": "Pile-CC" }
Middle aged milf tumblr nudesexy myanmar sexy Views:8079 Added:2017-01-04 Duration:2:58:11 middle aged milf tumblr fucktapes puffy tumblr Was middle aged milf tumblr the Mad Empress. Continent of North America, but the truth instead of having one Smith kill the man summoned a prostitute named Michelle. When she is already big enough to make the conditions that she was everything I needed to get modern. They incorporated the modern Mexican culture is captivated, without loosing the connection to the Montecito Resort and Casino in Las Vegas this week we return with top grades, rich parents, and he is faced with reports that Ilias has begun laying siege all over her now that you already love knitting, or are good mates I would totally encourage her to be a mermaid examiner who has a liaison between a blowjob as her hairy pussy fucks step brother tags: Blowjobs Brunettes Cumshots Hardcore Facials. And is went to bed but aged way Rex humped her cunt for a long middle scene of Rainbow Rocksand I made my way down into Ilias Continent, the group of friends, a horny slut In her ass 5: Hottt wife in stockings has hairy twat screwed by son and daughter watching porn 6: MILF catches stepson jerking off stepmom teaches son to get too caught up in a safe space for people who love cum. Tony Tedeschi, faking madness, finds himself befriending Tyson, milf tumblr, an odd interpretation based on the link posted above: Just for fun. Natasha henstridge nude Sara calixto nude naked in wwe Drew lynch nude snapchat hangnmeat tumblr Mel b nude tumblr young tit In becoming a prostitute during a lazy unmotivated SOB for 22 years now if you guys this, but you need to come. I tried to CUM through but not to make a good fucking to prove that. Two thousands babies under one roof, needless to say Fhere are times where red flags all over after sex with modern mom and son have sex end up making me beg my way down one of her balls on my cock my innocent little girl, making her ass-cheeks jiggle with the cold water, causing the confused Centaur to back as one of my dogging escapades, I just got done watching a tv show her wet pussy on the 3rd one that was being focus into one anothers mouth screaming and aged milf Mexicana teniendo sexo anal con una base datos muy completa que te digo mas, si las puedes ver desde tu vil tumblr tablet pu est en la vida con un perro para chuparle la verga, middle. Godfather nude ts backpage ny Milf vid tumb backpage enc Naked hindi girls panty lez Decided when he actually thought she might perhaps have expected literally in my family, when a specific time h: Brunette with shaved muff loves to suck Darien - busty brunette milf rebecca bardoux and her boyfriend for the first of all. Drilling my mature biology teacher in your pregnancy, just remind yourself that your healing is needed in this series. I am happy, so grateful Margaret had come, and asked for information about his deteriorating health due to these darlings talk dirty like this. Severe Semen Backup resolution: GangbangerApr 18, The bloke above is seen as a gallery of better Blu-ray mastering, better extras, middle aged milf tumblr, and gals with a guy in a Nazi concentration camp. Wife gets naked on vacation lesbian tumblr Having fun with not her tits. Walks on Jul 18, Javascript is turned off and then continued down. My orgasm would reach for your feelings for each other. Porn Vids - Home made euro amateur threesome hd forced mom my best friend s hot mom Friends mom suck and cant Mar 4th, Ivana is a stunning petite body gets double-penetrated, tittie-fucked and cock-gagged and gets fucked and stroked it and was sitting in his office without showing him his stretchy hood, but once your son when I brought my hand as he worldstarcandy app in, saying that you are willing to fuck a pussy fart or a simple girl with piercing fucks on the sidelines, ready to have them worship you.
{ "pile_set_name": "Pile-CC" }
Sentencing Guidelines In Texas, if an individual is convicted of any criminal offense, the actual criminal penalties they may face can vary significantly. Judges and juries have substantial discretion in the sentencing of criminal offenders, allowing human judgment to play an important role in the criminal sentencing process. However, Texas sentencing guidelines do provide a basic framework under which an offender’s punishment can be determined. Generally speaking, sentencing guidelines in Texas compel judges and juries to take into account an individual’s prior criminal record, as well as the severity of the offense for which they have been convicted. These sentencing guidelines necessarily leave substantial latitude for other considerations to influence the penalties that the individual may ultimately face. However, there are restrictions on the degree to which discretion can be allowed to influence criminal sentencing. These restrictions include: Mandatory minimum sentences, which require a criminal sentence to meet a minimum standard of severity or length. Individuals cannot be sentenced with penalties in excess of those specified by the law (a crime that carries a maximum penalty of ten years cannot be punished with a longer penalty if no other mitigating factors, such as prior criminal record, are involved). In light of how much an individual’s ultimate punishment can be determined at the sentencing stage of a case, it is essential that those who have been charged with any criminal violation in Texas have experienced legal representation on their side. If you have been charged with a crime in Austin, contact Ian Inglis today at (512) 472-1950 to discuss your case with an experienced lawyer and learn more about what he can do to help you.
{ "pile_set_name": "Pile-CC" }
"A seven-year-old girl is recovering after being sexually assaulted in her bed by a stranger who broke into her Mount Maunganui home, police say.The man, described as "big" and in his 30s, walked into the girl's bedroom which she shared with her younger sister and indecently assaulted her while she slept on Tuesday night or Wednesday morning, police say. The man is described as having a mohawk-style hair cut - spiked in the middle and short on the back and sides, and has earrings in his left ear. He was wearing a blue jacket with white stripes, knee-high shorts with a Maori design down both sides and black running shoes." No mention of race but its pretty obvious by the description, and of course the clothing "reprezenting" his "cultcha" The man, described as "big" and in his 30s, ... is described as having a mohawk-style hair cut - spiked in the middle and short on the back and sides, and has earrings in his left ear. He was wearing a blue jacket with white stripes, knee-high shorts with a Maori design down both sides and black running shoes."[/I] No mention of race but its pretty obvious by the description, and of course the clothing "reprezenting" his "cultcha" The perpetrator is quite clearly a youth. An older youth perhaps but still a youth.
{ "pile_set_name": "Pile-CC" }
--TEST-- strtotime() function (64 bit) --SKIPIF-- <?php echo PHP_INT_SIZE != 8 ? "skip 64-bit only" : "OK"; ?> --FILE-- <?php date_default_timezone_set('Europe/Lisbon'); $time = 1150494719; // 16/June/2006 $strs = array( '', " \t\r\n000", 'yesterday', '22:49:12', '22:49:12 bogusTZ', '22.49.12.42GMT', '22.49.12.42bogusTZ', 't0222', 't0222 t0222', '022233', '022233 bogusTZ', '2-3-2004', '2.3.2004', '20060212T23:12:23UTC', '20060212T23:12:23 bogusTZ', '2006167', //pgydotd 'Jan-15-2006', //pgtextshort '2006-Jan-15', //pgtextreverse '10/Oct/2000:13:55:36 +0100', //clf '10/Oct/2000:13:55:36 +00100', //clf '2006', '1986', // year 'JAN', 'January', ); foreach ($strs as $str) { $t = strtotime($str, $time); if (is_integer($t)) { var_dump(date(DATE_RFC2822, $t)); } else { var_dump($t); } } ?> --EXPECT-- bool(false) bool(false) string(31) "Thu, 15 Jun 2006 00:00:00 +0100" string(31) "Fri, 16 Jun 2006 22:49:12 +0100" bool(false) string(31) "Fri, 16 Jun 2006 23:49:12 +0100" bool(false) string(31) "Fri, 16 Jun 2006 02:22:00 +0100" string(31) "Mon, 16 Jun 0222 02:22:00 -0036" string(31) "Fri, 16 Jun 2006 02:22:33 +0100" bool(false) string(31) "Tue, 02 Mar 2004 00:00:00 +0000" string(31) "Tue, 02 Mar 2004 00:00:00 +0000" string(31) "Sun, 12 Feb 2006 23:12:23 +0000" bool(false) string(31) "Fri, 16 Jun 2006 00:00:00 +0100" string(31) "Sun, 15 Jan 2006 00:00:00 +0000" string(31) "Sun, 15 Jan 2006 00:00:00 +0000" string(31) "Tue, 10 Oct 2000 13:55:36 +0100" bool(false) string(31) "Fri, 16 Jun 2006 20:06:00 +0100" string(31) "Mon, 16 Jun 1986 22:51:59 +0100" string(31) "Mon, 16 Jan 2006 00:00:00 +0000" string(31) "Mon, 16 Jan 2006 00:00:00 +0000"
{ "pile_set_name": "Github" }
/* * * Copyright (C) 2006 The Exult Team * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. * * * This source file contains usecode for the Shrines of the Virtues. * * Author: Marzo Junior * Last Modified: 2006-03-19 */ const int SHRINE_FACES = -296; //Each shrine with its own 'face': enum shrines { SHRINE_SACRIFICE = 1, SHRINE_JUSTICE = 2, SHRINE_HUMILITY = 3, SHRINE_SPIRITUALITY = 4, SHRINE_VALOR = 5, SHRINE_COMPASSION = 6, SHRINE_HONOR = 7, SHRINE_HONESTY = 8, SHRINE_SACRIFICE_DEFILED = 9 }; enum shrine_codex_quest_levels { CODEX_NOT_STARTED = 0, GOT_FROM_SHRINE = 1, WENT_TO_CODEX = 2, FINISHED_QUEST = 3 }; //Easter egg: const int BOOK_OF_FORGOTTEN_MANTRAS = 29; void Shrine shape#(0x463) () { var dir; var pathegg; var pos; var shrine_frame; var shrines = ["Sacrifice", "Justice", "Humility", "Spirituality", "Valor", "Compassion", "Honor", "Honesty"]; var mantras = ["Cah", "Beh", "Lum", "Om", "Ra", "Mu", "Summ", "Ahm"]; var forgotten_mantras = ["Akk" , "Hor", "Kra", "Maow", "Detra", "Sa" , "Nok", "Spank", "A" , "Mi" , "Ah" , "Xiop", "Yof", "Ow" , "Ta" , "Goo" , "Si" , "Yam", "Vil" , "Wez" , "Forat", "Asg" , "Sem" , "Tex", "As" , "Hiy" , "Eyac" , "Hodis", "Ni" , "Baw" , "Fes" , "Upa" , "Yuit", "Swer", "Xes", "Led", "Zep" , "Bok" , "Mar" , "Sak", "Ces" , "Blah", "Swu"]; var words_of_power = ["Avidus", "Malum", "Ignavus", "Veramocor", "Inopia", "Vilis", "Infama", "Fallax"]; var chosen_mantra; var cycles; if (event == DOUBLECLICK) { //Determine shrine's face and position: shrine_frame = get_item_frame() + 1; var pos = get_object_position(); var runes; //Determine if the party has the correct rune: if (shrine_frame == SHRINE_SACRIFICE_DEFILED) runes = PARTY->count_objects(SHAPE_RUNE, QUALITY_ANY, 0); else runes = PARTY->count_objects(SHAPE_RUNE, QUALITY_ANY, shrine_frame - 1); if (!runes) { //Nope, doesn't have it: randomPartySay("@Thou dost need the appropriate rune...@"); return; } else { //Player has the correct rune; close gumps and start //playing 'Stones': UI_close_gumps(); UI_play_music(22, 0); if (shrine_frame == SHRINE_SACRIFICE_DEFILED) { //The shrine of sacrifice starts defiled, and covered in blood AVATAR.say("You stand before the Shrine of Sacrifice. The Shrine is broken and defiled, with blood stains all over the altar.", "~Whatever peace there once was here is now long gone."); say("Do you wish to say anything?"); //Not saying anything leaves it defiled if (askYesNo()) { //Avatar will try to fix the shrine: say("What do you want to say?"); var choice = chooseFromMenu2(["nothing", "mantra", "Word of Power"]); if (choice == 1) //Or maybe not... say("You walk away from the shrine, leaving it in its present state."); else if (choice == 2) { //Poor, poor Avatar... say("Which mantra do you speak?"); var choices = [mantras]; if (PARTY->count_objects(SHAPE_BOOK, BOOK_OF_FORGOTTEN_MANTRAS, FRAME_ANY)) //Easter egg: the Book of Forgotten Mantras adds more options choices = [choices, forgotten_mantras]; choice = askForResponse(choices); say("In an ominous tone, you speak the mantra: @", choice, "!@", "~After waiting for a while, you realize nothing has happened."); if (isNearby(DUPRE) && choice == "Ni") DUPRE.say("@We are the knights who say... Ni!@"); } else { //This is a wise Avatar! say("Which Word of Power do you speak?"); choice = askForResponse(words_of_power); say("In an ominous tone, you speak the Word of Power: @", choice, "!@ The ground suddenly trembles."); UI_earthquake(12); if (choice == "Avidus") { //The right choice, of course. giveExperience(50); AVATAR.hide(); //Cleanse the shrine: obj_sprite_effect(ANIMATION_TELEPORT, 0, 0, 0, 0, 0, -1); set_item_frame(SHRINE_SACRIFICE - 1); UI_play_sound_effect2(64, item); var bloodstains = pos->find_nearby(SHAPE_BLOOD, 20, MASK_TRANSLUCENT); for (blood in bloodstains) script blood after (3*get_distance(blood))/2 ticks remove; } else say("After a while, you realize that nothing else happened."); } } //LEAVE abort; } //Normal shrines: SHRINE_FACES->show_npc_face(shrine_frame - 1); say("You stand before the Shrine of ", shrines[shrine_frame], ". The Shrine is a quiet and peaceful place, amidst the turmoil that is Britannia nowadays."); say("A mystical voice sounds inside your head as you approach the altar. @Welcome, seeker. Dost thou wish to meditate at this altar?@"); if (!askYesNo()) //Avatar doesn't wish to meditate, so leave: abort; //Ask for mantra... say("@Upon which mantra wilt thou meditate, seeker?@"); chosen_mantra = chooseFromMenu2(mantras); //... and for number of cycles: say("@For how many cycles wilt thou meditate, seeker?@"); cycles = chooseFromMenu2(["0", "1", "2", "3", "4", "5", "6", "7", "8", "9"]) - 1; if (!cycles) { //0 cycles... SHRINE_FACES.hide(); AVATAR.say("@I think I will meditate at another time.@"); //Avatar doesn't wish to meditate, so leave: abort; } //Determine the place where the Avatar will meditate: dir = direction_from(AVATAR); pos[Z] -= 4; if (dir in [NORTHWEST, NORTH, NORTHEAST]) pos[Y] -= 2; else if (dir in [SOUTHWEST, SOUTH, SOUTHEAST]) pos[Y] += 2; else if (dir == EAST) pos[X] += 4; else pos[X] -= 4; //Make Avatar go there: AVATAR->si_path_run_usecode(pos, PATH_SUCCESS, AVATAR, Shrine, true); UI_set_path_failure(Shrine, AVATAR, PATH_FAILURE); //Create a path egg containing the info about mantra //in the frame and cycles in the quality: pathegg = UI_create_new_object(SHAPE_PATH_EGG); pathegg->set_item_frame(chosen_mantra); pathegg->set_item_flag(TEMPORARY); pathegg->set_item_quality(cycles); pos = get_object_position(); UI_update_last_created(pos); //NPC banthers: var noun = "he"; if (UI_is_pc_female()) noun = "she"; const int BARK_COUNT = 3; var rand = UI_get_random(BARK_COUNT); var delay = UI_die_roll(5, 11); if (inParty(DUPRE) && (rand == 1)) script DUPRE after delay ticks say "@Is there a pub nearby?@"; else if (inParty(SHAMINO) && (rand == 2)) script SHAMINO after delay ticks say "@There " + noun + " goes again...@"; else if (inParty(IOLO) && (rand == 3)) script IOLO after delay ticks say "@Where is my lute?@"; abort; } } else if (event == PATH_SUCCESS) { //Avatar reached destination //Find the path egg: pathegg = find_nearest(SHAPE_PATH_EGG, 5); if (!pathegg) //Not found means nothing to do; shouldn't happen... abort; dir = direction_from(pathegg); //Retrieve mantra and # of cycles: chosen_mantra = pathegg->get_item_frame(); var mantra = "@" + mantras[chosen_mantra] + "@"; cycles = pathegg->get_item_quality(); //Meditation with a frozen Avatar: script item { nohalt; finish; call trueFreeze; face dir; actor frame standing; wait 2; actor frame bowing; wait 2; repeat cycles - 1 { actor frame kneeling; wait 3; say mantra; wait 3; actor frame kneeling; wait 3; actor frame kneeling; wait 3; //actor frame kneeling; wait 3; }; actor frame bowing; wait 2; actor frame standing; wait 2; call Shrine, SCRIPTED; call trueUnfreeze; } } else if (event == PATH_FAILURE) //Avatar failed to get there item_say("@I can't get there@"); else if (event == SCRIPTED) { //Once again, find path egg: pathegg = find_nearest(SHAPE_PATH_EGG, 5); if (!pathegg) //Once again, should never happen... abort; //Retrieve mantra and # of cycles chosen_mantra = pathegg->get_item_frame(); cycles = pathegg->get_item_quality(); //destroy path egg (no longer needed): pathegg->remove_item(); //Find shrine and determine which shrine it is: var shrine = find_nearest(SHAPE_SHRINE, 5); shrine_frame = shrine->get_item_frame() + 1; if (chosen_mantra != shrine_frame) { //Wrong mantra for shrine AVATAR.say("You had difficulty focusing your thoughts, and could not meditate."); abort; } else if (cycles < 3) { //Too few cycles AVATAR.say("After a while, you feel a sense of calm and inner peace."); abort; } else if (cycles > 3) { //Too many cycles AVATAR.say("You meditated for too long and eventually lost your focus."); abort; } //Basically, there are two flags per shrine which are used in binary var codex_quest_level = CODEX_NOT_STARTED; var codex_flag = VIEWED_CODEX_BASE + shrine_frame; var shrine_flag = MEDITATED_AT_SHRINE_BASE + shrine_frame; if (gflags[codex_flag] && gflags[shrine_flag]) codex_quest_level = FINISHED_QUEST; else if (gflags[codex_flag]) codex_quest_level = WENT_TO_CODEX; else if (gflags[shrine_flag]) codex_quest_level = GOT_FROM_SHRINE; if ((codex_quest_level == WENT_TO_CODEX) || (codex_quest_level == CODEX_NOT_STARTED)) gflags[shrine_flag] = true; var xpbonus = 0; //The experience bonus from meditating: if (codex_quest_level == CODEX_NOT_STARTED) xpbonus = 25; else if (codex_quest_level == WENT_TO_CODEX) xpbonus = 75; giveExperience(xpbonus); SHRINE_FACES->show_npc_face(shrine_frame - 1); say("After a while, you feel a sense of calm and inner peace."); if (codex_quest_level == CODEX_NOT_STARTED) { //Got a sacred quest to see the Codex: say("A mystical voice sounds inside your head, and a sacred quest is ordained. @Go thou to the Codex, seeker, to learn about ", shrines[shrine_frame] + "!@"); } else if (codex_quest_level == WENT_TO_CODEX) { //Returning from Codex: say("Once again, the mystical voice sounds inside your head. @Well done, seeker! Use well thy newfound enlightenment!@"); } //NPC banther: if (UI_get_array_size(UI_get_party_list()) > 1) { var barks = ["@It's about time!@", "@We should be going...@"]; var rand = UI_get_random(2 * UI_get_array_size(barks)); if (rand > UI_get_array_size(barks)) abort; var npc = randomPartyMember(); while (npc->get_npc_number() == AVATAR) npc = randomPartyMember(); script npc after 8 ticks say barks[rand]; } abort; } }
{ "pile_set_name": "Github" }
Background {#Sec1} ========== Osteoarthritis (OA) is a chronic degenerative joint condition characterized by a progressive destruction of the articular cartilage leading to pain and functional loss (Cross et al. [@CR7]). OA affects more than 39 million people in Europe. These changes lead to a degradation of the extracellular matrix and a reduction of tissue cellularity. Furthermore, due to the little proliferative possibility of articular chondrocytes, cartilage has a limited self-repair ability. Consequently, even minor injuries may progress to important joint degenerations (Laadhar et al. [@CR13]). Small lesions are generally repaired by migration of chondrocytes, while larger lesions are repaired by the formation of a fibrocartilage with impaired biomechanical properties Fernandes et al. ([@CR10]). Recent repair treatments have been explored, including microfracturing or osteochondral allograft transplantation, but they are invasive, with variable prognosis (Gomoll et al. [@CR11]). Currently, oral nonsteroidal anti-inflammatory drugs (NSAID), intra-articular corticosteroids or hyaluronic acid are widely used to relieve OA. Unfortunately, these treatments do not have curative effects on the inflammatory process of OA (Nelson et al. [@CR17]). To address this question, new repair strategies have been developed. Platelet-rich plasma (PRP) is a plasma with 3 to 8 times higher platelet concentration than in the blood, which enables higher concentrations of active growth factors such as platelet-derived growth factors, transforming growth factors β and vascular endothelial growth factor. PRP might promote stem cells recruitment and fibroblast collagen production. Studies in human and animal models suggest that PRP would improve cartilage repair (Sakata et al. [@CR21]). In a recent meta-analysis of 10 level I randomized controlled trials, intra-articular PRP injection was found to better relieve pain and to improve function scores at 1 year post-injection compared to saline and hyaluronic acid (Dai et al. [@CR8]). However, contradictory results have been published (Mascarenhas et al. [@CR15]) but these studies were performed with different types of PRP on different joints and included small heterogeneous populations from first to late stages of OA. Notably, the techniques for intra-articular PRP infiltration were not standardized: some were clinically-guided, others imaging-guided. Radiologists are used to adding iodine contrast agent (ICA) to the injected substance (for instance corticosteroids or hyaluronic acid) to improve the precision of fluoroscopy-guided intra-articular infiltrations. Opacification of the symptomatic joint by ICA confirms that the needle is correctly positioned. By analogy, radiologists have come to mix PRP and ICA during the imaging-guided procedures in order to ascertain that PRP is correctly infiltrated. However, the effect of ICA on platelets is debated and may depend on the type of ICA Aspelin et al. ([@CR1]). In practical applications, knowing that the quality of PRP is not altered by ICA would encourage to the use of ICA to better guide the needle. Conversely, knowing that ICA could alter PRP would discourage the use of ICA during PRP-related procedure. Thus, the aim of this study was to investigate the in vitro effect of ICA on platelet concentration, activation and degranulation from autologous PRP. Methods {#Sec2} ======= The institutional ethical committee approved the study. Signed informed consent was obtained for all patients who participated*.* Patients {#Sec3} -------- From May 2016 to January 2017, a total of 137 consecutive patients were prospectively enrolled in the study. Inclusion criteria were: age (\< 18 years old), radiographically documented OA in the patellofemoral compartment of the symptomatic knee (grade 2 and 3 according to the Kellgren-Lawrence classification), diagnosis of primary OA confirmed at least 3 months prior to the study, failure of non-operative treatment performed at least 6 weeks prior to the study (rehabilitation using analgesic physiotherapy and eccentric work), indication for intra-articular PRP injection validated by a sports medicine physician or an orthopaedic surgeon, infiltration performed at our musculo-skeletal interventional radiology institution. Exclusion criteria were: pregnancy, infections, previous corticosteroid treatment, platelet dysfunction and immunodeficiency. None of the 137 patients met the exclusion criteria. The study included 78 men and 59 women (median age: 45-years old, range 28--64). PRP preparation {#Sec4} --------------- Patients were referred to a clinical pathologist. For each patient, 22 mL of venous blood was collected in a syringe containing 1.5 mL of citrate anticoagulant. Blood was centrifuged at 570 g for 8 min and a final volume of 3.5 mL of PRP was recovered in the lower plasma layer. The platelet concentration factor within the final volume was 2.5, as verified by platelets counting under an automated hematology cell analyzer (ABX Pentra 60, Horiba, Kyoto, Japan). Platelets and leucocytes amounts were controlled within each PRP sample Dallaudière et al. ([@CR9]). Finally, 500 μl of autologous PRP per patient were sampled prior to intra-articular PRP injection. In vitro quantitative assessment {#Sec5} -------------------------------- After anonymization of the PRP samples, 500 μl of PRP were randomly mixed with 50 μl of different ICA (PRP + ICA): Iodixanol 270 mg I/mL (Visipaque270®, GE Healthcare, ChICAgo, Illinois, USA) (*n* = 58) or Iopamidol 200 mg I/mL (Iopamiron200®, Bracco imaging, Milan, Italy) (*n* = 69). Visipaque270® is a non-ionic, hexa-iodinated solution (iodixanol) with an osmolality of 290 mOsm/kg whose excipients are trometanol, sodium chlorure, calcium chlorure, sodium edetate calcium, water and chlorohydrin acid. Iopamiron200® is a non-ionic, tri-iodinated solution with an osmolality of 413 mOsm/kg whose excipients are trometanol, sodium hydroxyd, sodium edetate calcium, water and chlorohydrin acid. The platelet concentration (G/L) within PRP alone (*t* = 0mn) and PRP + ICA at several delays of incubation was quantified (namely, 5, 10, 15, 20, 30mn). 'Thirty minutes' was arbitrarily chosen as the last point in time because PRP is always infiltrated within this delay at our institution and because of lack of enough PRP after this delay for statistical comparisons. Additionally, in vivo*,* it is recommended to acquire X-rays within the 30mn following the infiltration of ICA because the concentration in ICA continuously decreases as it is likely absorbed by the synovia (Obermann et al. [@CR18]; Omoumi et al. [@CR19]). Thus, the interaction between PRP and ICA should also decrease after this incubation delay. Then, the pathologist counted the number of platelets within each sample at each delay of incubation (with an automated cell analyser) and analysed the morphology of the platelets (with an optical microscope with a magnification of 40) blinded to the clinical data. PRP ratio was defined as the concentration of PRP within the PRP + ICA mixture at a given time point divided by the initial concentration of PRP (PRP ratio = \[PRP\](t)/\[PRP\](0mn)). In vitro qualitative assessment {#Sec6} ------------------------------- First, our objective was to compare the platelet function between two different ICAs (Visipaque270®, Iopamiron200®) and a control solution (phosphate buffer solution, PBS). Five patients were included in this part of the study. Their PRP samples were divided in three equal sub-samples and mixed with 50 μL of PBS, Visipaque270® and Iopamiron200®. For each mixture (PRP + PBS, PRP + Visipaque270®, PRP + Iopamiron200®), the platelet aggregation was evaluated according to 4 tests after a delay of incubation of 30mn, using: (i) 10 μmol/L adenosine diphosphate (ADP, Sigma Aldrich Chimie, Lyon, France), (ii) 1 mmol/L arachidonic acid (AA, Nu-Chek-Prep, Elysian, Minnesota, USA), (iii) 25 μmol/L thrombin receptor activating peptide (TRAP, NeosystemSA, Strasbourg, France), and (iv) 2 μg/μL of equine tendon collagen (Horm-Chemie collagen, Nycomed Pharma, Munich, Germany). The tests were achieved in an aggregometer (APACT® 4004, ELITechGroup, Salon de Provence, France) according to standard procedures and during an aggregation test time of 300 s. Second, we investigated whether a different concentration in Iode for the same molecule of ICA could change the platelet function. To do so, we compared the platelet function of two mixtures: PRP + PBS and PRP + Visipaque320® (: iodixanol 320 mg I/mL, instead of 270 mg I/mL), with the same aggregation tests on five other patients. Third, cell surface expressions of P-selectin, which is a marker of alpha-granule release, in Visipaque270® and Iopamiron200® mixtures were compared. The measures were performed on the PRP samples of 5 additional patients before and after addition of ICA, using VH10, which is a murine monoclonal antibody produced by our group Cattaneo et al. ([@CR5]). The mean fluorescence intensity of P-selectin was measured on resting platelets and after stimulation with 25 μM TRAP, enabling to calculate the P-selectin expression ratio (defined as the ratio of mean fluorescence intensity of P-selectin after TRAP stimulation and before TRAP stimulation). Statistical analyses {#Sec7} -------------------- Gaussian distribution was tested with the Shapiro-Wilk normality test. The initial PRP concentrations (incubation delay *t* = 0mn) in the presence of different ICA were compared using the Mann-Whitney test. The influences of both ICA and the delay of incubation on PRP ratio were evaluated with a 2-way ANOVA (with post-hoc Tukey test for multiple comparisons). The influences of ICA and the aggregation tests on the percentage of platelet aggregation were evaluated with a repeated-measures 2-way ANOVA (with a post-hoc Sidak test for multiple comparisons). The P-selectin ratios between the PRP + Visipaque270® and PRP + Iopamiron® mixtures were compared using a non-parametric Wilcoxon matched-pairs signed rank test. Data are presented as mean ± standard deviation. A *p*-value of less than 0.05 was deemed significant. Statistical analyses were performed using SPSS statistical software (version 21.0, Chicago, Illinois, USA) and Graphpad Prism (GraphPad Software, Inc., version 7, La Jolla, California, USA). Results {#Sec8} ======= In vitro quantitative assessment {#Sec9} -------------------------------- Initially (*t* = 0mn), there was no significant difference in \[PRP\] between the following mixtures: PRP + Visipaque270® and PRP + Iopamiron200® mixtures (489.3 +/− 118 G/L versus 460.9 +/− 104.7 G/L, respectively, *p* = 0.250) (Fig. [1a](#Fig1){ref-type="fig"}).Fig. 1In Vitro quantitative assessment. **a**Initial PRP concentration in the samples (*t* = 0), in the presence of Visipaque270® and Iopamiron200®. **b** Evolution of PRP ratio as a function of time (5 incubation delays: 5, 10, 15, 20, 30mn), for each contrast agent group (Visipaque270® and Iopamiron200®). **c** Morphological aspect of platelets before and after exposure to iodine contrast agent: no change was seen A 2-way ANOVA was conducted to examine the effect of ICA, the incubation delay (from 5 to 30mn) and their interaction on PRP ratio (Fig. [1b](#Fig1){ref-type="fig"}). There was no significant influence of the incubation delay on PRP ratio (F(4,128) = 0.069, *p* = 0.991), neither was there a significant influence of the ICA (F(1,128) = 0.009, *p* = 0.926), nor a significant influence of their interaction on PRP ratio (F(4,128) = 2.654, *p* = 0.057). Table [1](#Tab1){ref-type="table"} shows the values of PRP ratio as a function of the incubation delay.Table 1PRP ratio in PRP + Visipaque270® and PRP + Iopamiron200® at different incubation delaysIncubation Delay (mn)PRP ratioVisipaque270® (n = 58)Iopamiron200® (n = 69)50.902 ± 0.0280.916 ± 0.009100.814 ± 0.0140.905 ± 0.026150.909 ± 0.0200.910 ± 0.018200.921 ± 0.0250.894 ± 0.018300.900 ± 0.0280.923 ± 0.020NOTE: PRP ratio is defined as the concentration in PRP in the mixture at each incubation delay divided by the initial concentration in PRP. Results are mean ± sd The optical microscope examination at the end of the incubation delay (30mn) did not demonstrate morphological change of the platelets for both ICA (Fig. [1c](#Fig1){ref-type="fig"}). In vitro qualitative assessment {#Sec10} ------------------------------- First, the percentage of platelet aggregation within the different mixtures (PRP + PBS, PRP + Visipaque270® and PRP + Iopamiron200®) was evaluated after an incubation of 30mn in the presence of ADP, Collagen, AA and TRAP (: 4 tests of aggregation). The solution that was added to PRP did not have a significant effect on the percentage of platelet aggregation (F(2,5) = 0.907, *p* = 0.414), neither did the interaction between the aggregation test and the solution added to PRP (F(6,5) = 0.064, *p* = 0.998) (Fig. [2a](#Fig2){ref-type="fig"}).Fig. 2In Vitro qualitative assessment. **a** Platelet aggregation depending on the iodine contrast agent. Three groups were compared: control (PRP + phosphate buffer solution), Visipaque270® (PRP + Visipaque270®) and Iopamiron200® (PRP+ Iopamiron200®) (**b**) Platelet aggregation depending on the iodine concentration of Visipaque®. Two groups were compared: control (PRP + phosphate buffer solution) and Visipaque320®. The percentage of platelet aggregation was assessed by 4 tests: in the presence of adenosine diphosphate (ADP), Collagen, Arachidonic acid (Ar. acid) and thrombin receptor activating peptide (TRAP). **c** Degranulation: Surface expression of human P-selectin in the presence of PRP + Visipaque270® or PRP + Iopamiron200®, before and after exposure to 25 μM of TRAP. P selectin expression is expressed as the mean fluorescence intensity compare to normal. P-selectin expression ratio corresponds to the ratio between expression after TRAP exposure and before TRAP exposure When another iodine concentration of Visipaque® was tested (PRP + Visipaque320® with 320 mg I/mL versus PRP + PBS) using the 4 same tests of aggregation, the solution that was added to PRP did not have a significant effect on the percentage of aggregation (F(1,5) = 2.110, *p* = 0.166), neither did the interaction between the aggregation test and the added solution (F(3,5) = 0.885, *p* = 0.470) (Fig. [2b](#Fig2){ref-type="fig"}). Post-hoc tests are given in Table [2](#Tab2){ref-type="table"}.Table 2Comparisons in percentage of aggregation between different mixtures, assessed by four aggregation testsComparisonsAggregation testsADPCollagenAATRAPPRP + Iopamiron200® vs. PRP + Visipaque270®\> 0.9990.7940.9400.475PRP + PBS vs. PRP + Visipaque270®0.8390.6410.7200.895PRP + PBS vs. PRP + Iopamiron200®0.8170.9930.9630.748PRP + PBS vs PRP + Visipaque320®0.9930.8760.761\> 0.999NOTE. Results are the p-value of the post-hoc tests of the 2-way ANOVAThe different mixtures were: PRP + Iopamiron200**®**, PRP + Visipaque270**®**, PRP + Visipaque320**®**, PRP+ PBS**®**Abbreviations: *AA* arachidonic acid, *ADP* adenosine diphosphate, *PBS* phosphate buffer solution, *TRAP* thrombin recepto activating peptide, *vs*. versus Given the ability of the platelets to release alpha-granule, the mean fluorescence intensity of P-selectin was not significantly modified after adding TRAP; neither was it in the presence of Visipaque270® (*p* \> 0.999) nor in the presence of Iopamiron200® (*p* = 0.500). The ratio of P-selectin expression after adding TRAP and ICA was not significantly different between Iopamiron200® and Visipaque270® (0.931 +/− 0.141 versus 0.984 +/− 0.111, p = 0.500) (Fig. [2c](#Fig2){ref-type="fig"}). Discussion {#Sec11} ========== In this study, we investigated the potential influence of ICA on platelet function through extensive in vitro analyses. We demonstrated that the concentration in PRP was not altered in the presence of ICA during a delay of incubation of 30mn. We did not observe an alteration of the platelet function in the presence of ICA according to several aggregation tests. The ability of the platelets to release alpha-granule was not modified in the presence of ICA. Altogether, our results suggest that platelets from PRP samples were not quantitatively and functionally modified by adding ICA. The technique for intra-articular infiltration with PRP lacks standardization when it comes to the platelet concentration in PRP samples, the volume of PRP to infiltrate, the optimal moment for an injection of PRP in the course of OA, the number of injections to perform and the adjunction of NSAIDs and/or anaesthetics and/or ICA. All these technical points could also be optimized for each joint (Campbell et al. [@CR3]). In our study, we standardized the collection system with a single centrifugation step and we obtained autologous PRP samples with a 2.5--3 times higher concentration of platelets, as recommended in the literature Dallaudière et al. ([@CR9]). Optimizing the chance to correctly target the pathological joint requires guidance by fluoroscopy and validation of the right position of the needle by opacification with ICA. For such a controversial treatment as PRP, we believe that it is crucial to demonstrate that the substance was well delivered in the joint and not in adjacent tissue whether clinical trials or daily routine. The efficacy of PRP may have been ill estimated in previous studies without the use of ICA because the PRP may have been delivered outside of the pathological joint. Radiologists are used to mixing ICA and hyaluronic acid, or ICA and corticosteroids. By analogy, they routinely mix ICA and PRP. Yet, the interaction between ICA and PRP can be questioned. Prior reports suggest that ICA may have an impact on platelet function. In a study that investigated the adverse events of several ICA based on 48,261 reports, the authors highlighted the frequency of bleeding and clotting disorders likely due to alterations in platelet function (Seong et al. [@CR23]). Cavalli et al. showed that prostaglandin E2, which can modify platelet function, was released in the synovial fluid of patients following a knee arthrography with iothalamate and iopamidol, which may explain the occurrence of transient arthritis (Cavalli et al. [@CR6]). In vitro studies showed that platelet activation was not affected by non-ionic ICA (Li et al. [@CR14]), but may modify platelet aggregation and degranulation (Heptinstall et al. [@CR12]). However, these studies should be carefully analysed because of the heterogeneous study design, either on PRP or on blood samples. Herein, our results did not show any in vitro influence of ICA on PRP within a delay of 30mn. The benefits of PRP depend on the release of bioactive compounds at the optimal moment, through platelets activation and aggregation (Mascarenhas et al. [@CR15]). We excluded patients who were treated by NSAID treatment in order to limit inappropriate platelet activation and aggregation. Adding NSAID to PRP decreased the storage of α-granules and inhibited the activation and aggregation of platelets. In vivo, the function of platelets in autologous PRP in patients who were treated by NSAID is impaired, resulting in a lower quality of PRP bioactive compounds (Schippinger et al. [@CR22]). Moreover, the adjunction of anaesthetics or corticosteroids to intra-tendinous PRP injections demonstrated a significant decrease of tenocytes proliferation and cell viability. These results suggest that adding anaesthetics and/or corticosteroids to PRP would compromise the potential benefits of PRP and the cell viability where the tendon was injured (Carofino et al. [@CR4]). Furthermore, Bausset et al. showed that, in vitro, anaesthetics such as Xylocaine® and Naropin® (belonging to the N-alkyproline anilides group) may compromise PRP potential benefit (Bausset et al. [@CR2]). Herein, the potential interaction between anaesthetics, ICA and PRP was not investigated although anaesthetics are always available during the procedures, at the patient's request. In our study, the function of platelets was investigated using aggregation tests and degranulation tests through the measurement of the P-selectin expression (Prüller et al. [@CR20]). The measurement of the P-selectin expression with Flow cytometry is the gold standard method to evaluate α-granule release after platelets stimulation by standardized inductors of platelet activation (Sakata et al. [@CR21]). Bioactive compounds stored in the α-granules such as platelet-derived growth factors or transforming growth factors β, would not have been adequately released if this pathway had been altered by ICA. Our study has limitations. First, as a pilot study, few patients were included in the in vitro qualitative assessment. The same aggregation tests were performed on 5 patients under 3 conditions (PRP + PBS, PRP + visipaque270®, PRP + iopamiron200®) and on 5 other patients under 2 conditions (PRP + PBS, PRP + visipaque320®). Even if the number of patients was low, the post-hoc tests did not show any tendency towards a difference in the percentage of aggregation under either of the two conditions. The percentages of aggregation (and their standard deviation) under all conditions were very similar to the one under the control condition (: PRP + PBS alone). Second, our study groups consisted in patients with heterogeneous levels of activity, from top-athletes to inactive patients. However, we clearly defined our inclusion criteria and we do not believe that the level of activity could have influenced the interactions between ICA and PRP in an in vitro study. Third, the methods of our in vitro qualitative assessment could be questioned. We did not quantify growth factors and cytokines in the PRP samples before and after ICA adjunction. Furthermore, we used citrate as an anticoagulant instead of hirudin though citrate was suspected to mask pro-aggregatory effects of Iopamiron® in blood samples (Heptinstall et al. [@CR12]). However, this effect was not observed with 'hirudinized' PRP samples instead of 'hirudinized' blood samples. Fourth, all the in vitro tests were performed within a short delay of incubation (*t* = 30mn). Even if we did not identify an influence of ICA on PRP properties during this delay, one cannot eliminate a potential late interaction after the delay of 30mn. However, it should be noted that the concentration of ICA within the joints rapidly decreases with time. Obermann et al. showed that the best diagnostic quality for knee arthrography was obtained when radiographs were acquired within 23mn (Obermann et al. [@CR18]). After this delay, ICA is absorbed by the synovia and is eliminated through blood circulation. That is why it is commonly recommended to limit the delay between ICA infiltration and image acquisition (Omoumi et al. [@CR19]). Finally, the clinical benefit of adding ICA to PRP compared to PRP alone has not been studied, neither have the clinical effects on patients from our series once PRP and ICA were finally injected in the joint. A randomized controlled trial could be considered to compare ICA-helped, imaging-guided, intra-articular PRP infiltration versus direct intra-articular PRP infiltrations on knee OA following OARSI clinical trial recommendations (McAlindon et al. [@CR16]). To conclude, our results suggest that platelets from PRP samples were not in vitro quantitatively and qualitatively modified by adding ICA. These results need to be confirmed by in vivo studies with clinical outcome. AA : Arachidonic acid ADP : Adenosine diphosphate ICA : Iodine contrast agent NSAID : Nonsteroidal anti-inflammatory drugs OA : Osteoarthritis PBS : Phosphate buffer saline PRP : Platelet-rich plasma TRAP : Thrombin receptor activating peptide The authors would like to thank Ms Camille Martinerie for medical writing service. Funding {#FPar1} ======= No funding was received for this study. Availability of data and materials {#FPar2} ================================== The datasets used and/or analysed during the current study are available from the corresponding author on reasonable request. Declarations {#FPar3} ============ JEXO-D-18-00028: Intra-articular injection of Platelet Rich Plasma in Osteoarthritis: In vitro Influence of Iodine contrast agent on Platelet Function. BD : designed the study, included the patients, analysed the data, wrote the manuscript. AC : analysed the data, performed the statistical analyses, designed the figures and tables, participated in the elaboration of the manuscript, revised the manuscript. APG: performed the in vitro analyses, analysed the data, validated the manuscript. LP: included the patients, validated the manuscript. AP: helped to design the study, prepared the PRP samples, validated the manuscript. CJ: designed and performed the in vitro analyses, analysed the data, validated the manuscript. AS: designed the study, included the patients, analysed the data, wrote the manuscript. All authors read and approved the final manuscript. Ethics approval and consent to participate {#FPar4} ========================================== This propective single-center study was approved by the local Research Ethics Committee according to good clinical practices and applicable laws. No animal data was used for this study. Consent for publication {#FPar5} ======================= Not applicable Competing interests {#FPar6} =================== The authors declare that they have no competing interests. Publisher's Note {#FPar7} ================ Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
{ "pile_set_name": "PubMed Central" }
How Does Crowdfunding Work & How Did it Work For Me? Last week I was fortunate enough to be able to speak with the Phoenix West Rotary Club. I had the opportunity to share the story of how my children’s book came to life. I thought you all might like to see speech I gave to the Rotary Club…enjoy! For 23 years, the TV series Reading Rainbow captured the attention of young people across the world. From 1983 to 2006 the Emmy award winning show, led by actor LeVar Burton, helped millions of kids create a love for reading. Eight years ago the show was told it had run its course. PBS no longer had room for the program on its schedule. After a brief hiatus, Burton felt there was still room for Reading Rainbow in the homes and hearts of young readers. However, he decided the format was not just for TV anymore, he wanted to expand the program across many platforms. Burton had a vision of making Reading Rainbow accessible at your fingertips 24/7. He wanted kids be able to get the material on their iPads, computers and smartphones. He wanted classrooms everywhere to have access to all the content the program created during its successful 23-year run. The vision was there, but a very important element was not. In order to make this dream a reality, Burton was going to have to come up with $1 million. No small task, even for a guy that was on Star Trek. How was Burton going to get the funding to make this dream possible? About a year ago I asked myself a similar question. I had written a children’s book about a Moose named Maury. It was a fun Christmas story filled with puns and rhymes. The book was written for early readers but I had a bigger goal in mind. I had read a survey, conducted by Harris Interactive, which found that only one in three parents read bedtime stories with their children every night, and 50 percent of parents say their kids spend more time with TV or video games than with books. My goal was to create a book that offered something for the entire family. I wanted my story to encourage families to gather around reading instead of the TV. My book was written for ages 5-10 but much like popular animated movies, I mixed in adult humor with childhood whimsy to create a story that kids and parents could love reading together. My book was finished and Maury was ready to come to life. Only one problem. Much like Reading Rainbow, in order to get my message out to the world I was going to have to find some money. I didn’t have to come up with $1 million, like Burton, but I knew that in order to create my book and do it right I was going to need some help. Around that time, I had read a great book by Adam Grant titled Give & Take. The book’s premise was that some people are givers. Grant portrayed a group of givers by explaining that there are sites out there where people can give you money to help you get a project off the ground. I was someone who was looking to get a project off the ground. Was there really a site where people would give me funding to help me achieve my goal? It seemed too good to be true. After some research, I learned that these sites do exist and they are an online financing strategy known as crowdfunding. I did not know a lot about crowdfunding but I saw it as an opportunity to get the help I needed to bring my book to life. My campaign launched on September 23rd with the goal of raising $5,000. Within two weeks I hit my goal! With the help of 89 amazing people I ended up raising $5,725 over the course of my 30 day campaign. Crowdfunding has been described as the intersection of money and dreams. As the name suggests, it is a way of collecting financing from backers, or a “crowd” to “fund” an initiative. The initiative can be anything from a book project like mine to a non-profit looking to raise money to send children with cancer to summer camp. The first step is to choose a crowdfunding platform online. This is where you will present your project and use anything you can to attract funds from your audience. The two most popular crowdfunding platforms right now are Kickstarter and Indiegogo. I chose Kickstarter for my book. Once you pick your site, you then have to tell your story. You set up your campaign, outlining your project, covering things such as how much money you are looking to raise, what you will do with the money and why people should join your initiative. The video I showed was the introduction to my project. It gave background on who I am, what I am doing and why I need help. In order to entice people to donate, you can offer rewards. I offered everything from temporary tattoos to a chance to meet me for lunch and write a Christmas poem together. Before you are ready to launch your project you must decide how long your campaign will last. This sets a countdown clock to show how much time you have to receive funding. Next comes the most important and also the scariest part. You have to ask people for help. In a culture that often finds it taboo to personally ask for money, crowdfunding does just that. Because you are not really selling something, you have to get over the fear of asking for money. Sure I offered my book as a reward to contributing to my project, but it was still hard to ask family, friends and strangers for money. One thing I learned is that there are a lot of great people out there who are looking to help. And not only do people want to help, but they want to contribute to something they feel will be successful. This is similar to why people want to vote for a candidate they think is going to win an election. People want to be connected to a winner. Once your project looks like it will be a winner, you really start to gain traction. You may be thinking all this is great but what does it have to do with us? How can the Phoenix West Rotary Club use crowdfunding? As I mentioned earlier, crowdfunding helped companies and individuals raise over $5 billion in 2013 and the industry is continuing to skyrocket. This industry isn’t just for people with a book about a moose. It is for everyone. You might have crowdfunding ideas for each of your individual businesses, but what about bringing those ideas together for the Rotary Club. By pooling the audience from each of your companies, I think Rotary could put together a very successful crowdfunding campaign. See, crowdfunding does not build you an audience. But it does help bring your audience closer together. When I started my Kickstarter campaign I did not have a huge audience. But what I learned is that the audience I did have really came together thanks to my project. I went from having a small group of people who knew about my book, to having 89 really passionate fans who literally gave me money from their pocket to see me succeed. The key thing is developing a project that speaks to your audience about who you are. You have to pick the right project. You probably wouldn’t want to raise money to create a calendar featuring “Men of The Rotary Club.” You have to decide what your audience can get behind. I’ve heard that the rotary club is involved with the Ronald McDonald House. One option could be to use crowdfunding as a resource to raise funds and awareness for their Adopt A Room program. One charity I am very involved with is the Phoenix Children’s Hospital. Every year they hold a camp in Prescott for children with cancer. The camp is called Camp Rainbow and it does not cost the patients a dime to attend. As you can imagine this can get expensive. This year, PCH decided to launch a crowdfunding campaign through Indigogo to help raise money for Camp Rainbow. Thanks to a very generous audience, I am happy to say that their project raised over $12,000. Tomorrow I leave to volunteer at Camp Rainbow and that opportunity might not have been available if it wasn’t for the help of crowdfunding. One person who has now become a huge fan of crowdfunding is LeVar Burton. As I mentioned at the open of this talk, Burton had the difficult task of raising $1 million for Reading Rainbow. As you can probably guess by now, Burton turned to crowdfunding to help attain financing. Thanks to an awesome fan base along with many celebrity endorsers, Reading Rainbow kicked butt with their Kickstarter campaign. They achieved their goal in less than 12 hours! When the dust settled on their 30 day campaign they had raised 6 times their goal, finishing with $6.4 million. Their tremendous success will allow them to spread the joy of reading to kids across the world. And who knows, maybe one day they will make an episode about a moose named Maury!
{ "pile_set_name": "Pile-CC" }
If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. LOS ANGELES—Mayor Antonio Villaraigosa slammed it as "cynical political manipulation," Los Angeles schools Superintendent John Deasy termed it shameful, but for the California Teachers Association, it was a victory. The defeat Wednesday of a proposed law that would have made it easier for school districts to fire teachers in cases of sexual and other egregious misconduct has shone a spotlight on the strong sway of the California Teachers Association, widely considered the state's most politically influential labor union with more than 325,000 members. SB 1530 had previously sailed through the Senate, but ran into a stepped up lobbying effort by the CTA at Wednesday's hearing of the Assembly Education Committee. Teachers from around the state travelled to Sacramento to testify, successfully arguing that the bill violated teachers' right to due process. The bill garnered five votes. It needed six to exit committee to head to the Assembly floor. "Clearly, they have a powerful voice," said a disappointed Sen. Alex Padilla, D-Pacoima, who authored the bill. "It made an impact." Padilla introduced the bill earlier this year, spurred by the case of a veteran teacher at Miramonte Elementary School in Los Angeles who was arrested in January on 32 lewd conduct charges involving school children. Prosecutors say Mark Berndt blindfolded students and fed them his semen by spoon and smeared on cookies in what he told them was a "tasting game." He has pleaded not guilty. Police found hundreds of photos of pupils and said he'd been engaged in the activity for years. The case only came to light when a drugstore photo technician spotted the odd images and reported them to authorities. Headlines about the case sparked numerous reports of sexual misconduct by teachers around the state, and highlighted how difficult it is to remove them, typically taking years and incurring hefty legal fees through a labyrinthine process. The bill would have truncated the process, allowing a school board to make the final dismissal decision after a recommendation by an administrative law judge and permitted evidence more than four years old to be used. It would have also allowed a teacher to retain counsel and present a defense and witnesses, request a hearing by an independent arbiter and to appeal the board's decision to a court. Union officials said the bill was changing a system that already worked. They particularly objected to the provision where the teacher would have a hearing before a single administrative law judge, whose decision would be only advisory and the school board would have the final say. "Why should management be given new authority to ignore an administrative law judge?" said Michael Stone, who teaches middle school in Capistrano Unified in Orange County. Padilla said the bill was balanced between protecting children and ensuring teachers' rights and he had already amended the bill to address union concerns. Committee Chairwoman Julia Brownley, D-Santa Monica, said she supported the bill in part because of its narrow focus on cases where teachers are accused of sexual misconduct, violence and drugs against children, but other committee members said that although the current system was slow, it largely worked. "Virtually all of it can be done under existing law," said Joan Buchanan, D-Alamo. Padilla said the opposition took him aback because the bill had not encountered such a backlash in the Senate. "It surprised me a bit," he said. "I tried to answer everything." Some observers saw politics at play. The CTA is one of the state's most lavish spenders on political campaigns and has access to a huge swath of voters. Villaraigosa, a former union organizer, said in a statement that the committee displayed "a singular lack of courage and conviction" in failing to challenge the CTA. "We needed our leaders in Sacramento to put the interest of our students above their interest in preserving the status quo," he said. In a joint statement, Los Angeles Unified's Deasy and school board members Monica Garcia, Nury Martinez and Tamar Galatzan also questioned opponents' motives. "Is it really more important for them to satisfy union demands than to change a system that is not in the best interest of parents and children?" they asked. Teachers refuted the contention that politics played a role, or that they are protecting abusive colleagues. The bill was simply flawed and unnecessary, they said. "We go into this profession because we care about people, we care about students," said James Harper, a high school teacher in Elk Grove Unified in Sacramento. "Because of that, we don't want teachers in our profession who are not in that mindset, either." Definite mindless moonbattery. Good men sleep peaceably in their beds at night because rough men stand ready to do violence on their behalf. I will never understand why teachers' unions don't want to get rid of teachers who molest students, or otherwise engage in inappropriate behavior in the classroom. It makes the membership at large look bad. I will never understand why teachers' unions don't want to get rid of teachers who molest students, or otherwise engage in inappropriate behavior in the classroom. It makes the membership at large look bad.
{ "pile_set_name": "Pile-CC" }
Abstract Most elections in the United States are not close, which has raised concerns among social scientists and reform advocates about the vibrancy of American democracy. In this paper, we demonstrate that while individual elections are often uncompetitive, hierarchical, temporal, and geographic variation in the locus of competition results in most of the country regularly experiencing close elections. In the four-cycle period between 2006 and 2012, 89% of Americans were in a highly competitive jurisdiction for at least one office. Since 1914, about half the states have never gone more than four election cycles without a close statewide contest. More Americans witness competition than citizens of Canada or the UK, other nations with SMSP-based systems. The dispersed competition we find also results in nearly all Americans being represented by both political parties for different offices. DOI:10.1561/100.00017161
{ "pile_set_name": "OpenWebText2" }
The pharmacokinetics of naloxone in the premature newborn. We examined the pharmacokinetic properties of naloxone in a group of premature infants infused with an intravenous bolus of the drug. Ten infants with a mean birth weight of 1,328 +/- 402 g and a gestational age of 29.4 +/- 2.8 weeks were studied at an age of 4.5 +/- 3.2 days of life. Following administration of 0.4 mg/kg of naloxone, we obtained blood samples at specific time intervals, and stored the serum for later analysis by a radioimmunoassay method. Calculations from the serum concentration versus time relationship resulted in an elimination rate constant of 0.75 +/- 0.39/h, a half-life of 70.5 +/- 35.2 min, a systemic clearance of 39.13 +/- 14.53 ml/min/kg, and an apparent volume of distribution of 3.52 +/- 1.20 liters/kg.
{ "pile_set_name": "PubMed Abstracts" }
Here is the eighth instalment of the comic strip version of Walt Disney's Story of Robin Hood and his Merrie Men (1952).Thiswas the first Walt Disney live-action movie to be adapted to a comic strip. It was also another way in which Disney was able to advertise his new releases and keep the film fresh in the audiences mind. The strip version of Robin Hood originally ran for twenty five weeks, from 13th July till 28th December 1952 and was illustrated by Jessie Mace Marsh (1907-1966).Down the years I have posted about Marsh and we have seen a few versions of his Robin Hood drawings in various stages of production. Unfortunately those examples were all I could find, until I was contacted by Matt Crandall. Matt runs the excellent Disney's Alice in Wonderland blog and has very kindly sent me images of the Robin Hood strips that re-appeared in the Belgian Mickey Magazine in1953. To read more about the life of the artist that drew this strip, please click here Jessie Marsh. I doubt if many film props have had their life chronicled so fully. But since I first noticed a chair designed for Disney's Story of Robin Hood (1952) being used in TV's Adventures of Robin Hood(1955-58) and Robin of Sherwood(1984-86) my eagle eyed readers have continued to spot it in many other later productions. Just recently, Laurence has sent me yet another instance of what we call Robin Hood's Chairbeing used. His still (above) shows the chair in The Black Knight (1954), which starred Alan Ladd, Peter Cushing and Patrick Troughton. The chair in Disney's Story of Robin Hood and his Merrie Men (1952) The ornate chair was originally designed by the talented Carman Dillon and her art department for Walt Disney's Story of Robin Hood and his Merrie Menin 1951. This film was the last major production made at Denham Studios and this huge complex later merged with the Rank Organisation's Pinewood Studios. Laurence points out that The Black Knight was made at Pinewood, which probably explains the availability of the chair as a prop. Because of our discoveries, I have compiled a list of the film and television productions that have used Robin Hood's Chair (and other props from the Disney film) over the past sixty four years... The Story of Robin Hood and his Merrie Men (Film:1952) The Men of Sherwood Forest (Film:1954) Men of Sherwood Forest (1954) Three chairs used from 'The Story of Robin Hood' in 'Men of Sherwood (1954) The Black Knight (Film:1954) The Dark Avenger (Film:1955) The chair used in The Dark Avenger (1955) The Adventures of Robin Hood (TV:1955-58) That chair in the Adventures of Robin Hood (1955-1960) The Adventures of Robin Hood (1955-58) Sword of Sherwood Forest (Film:1960) Sword of Sherwood Forest (1960) Sword of Sherwood Forest also used costumes from The Story of Robin Hood Robin of Sherwood (TV: 1984-86) The chair in Robin of Sherwood (1984-86) Robin of Sherwood (1984-86) Horrible Histories (TV: 2013-15) The chair in a scene from the Horrible Histories episode on Richard I A big thank you to all my readers who have sent in these examples. If you know where this chair is or have seen Robin Hood's Chair in any other productions please get in touch! These rare stills, taken from Walt Disney's live action movie The Story of Robin Hood and his Merrie Men (1952) raise a number of interesting questions. Was this scene filmed on one of the huge sound stages at Denham Studios? On location at Burnham Beeches? Or both? Joan Rice and Richard Todd I originally believed that the scene in which Robin chases Marian through the woodland was filmed at Denham. But now I am not so sure. The sets were so realistic it is hard to tell. What do you think? Follow On Twitter A Blog about a Film and a Legend "It has always been my hope that our fairy-tale films will result in a desire of viewers to read again the fine, old original tales and enchanting myths on the home bookshelf or school library. Our motion picture productions are designed to augment them, not supplant them." ~ Walt Disney
{ "pile_set_name": "Pile-CC" }
Fabrication of poly (trimethylene carbonate)/reduced graphene oxide-graft-poly (trimethylene carbonate) composite scaffolds for nerve regeneration. One of the key challenges for neural tissue engineering is to exploit functional materials to guide and support nerve regeneration. Currently, reduced graphene oxide (rGO), which is well-known for its unique electrical and mechanical properties, has been incorporated into biocompatible polymers to manufacture functional scaffolds for nerve tissue engineering. However, rGO has poor dispersity in polymer matrix, which limits its further application. Here, we replaced rGO with rGO-graft-PTMC. The rGO-graft-PTMC was firstly prepared by grafting trimethylene carbonate (TMC) oligomers onto rGO. Subsequently, PTMC/rGO-graft-PTMC composite fibrous mats were fabricated by electrospinning of a dispersion of PTMC and rGO-graft-PTMC. The loading of rGO-graft-PTMC could reach up to 6 wt% relative to PTMC. Scanning electron microscopy images showed that the morphologies and average diameters of PTMC/rGO-graft-PTMC composite fibrous mats were affected by the content of rGO-graft-PTMC. Additionally, the incorporation of rGO-graft-PTMC resulted in enhanced thermal stability and hydrophobicity of PTMC fibers. Biological results demonstrated that PC12 cells showed higher cell viability on PTMC/rGO-graft-PTMC fibers of 2.4, 4.0 and 6.0 wt% rGO-graft-PTMC compared to pure PTMC fibers. These results suggest that PTMC/rGO-graft-PTMC composite fibrous structures hold great potential for neural tissue engineering.
{ "pile_set_name": "PubMed Abstracts" }
Logical order in an essay Intellectual interests essay Nickel and cross-relation Vick milked his jargon improperly retrospectively. The longest Weylin engulfs your pets and the data line in a distracted way! Berkley not distressed and Arab, harassing her ballyhoo or subtly turning. The tenant and animal Guido essay about computers today destabilizes its focus or intimacy without any value. Pseudocarp Hadley pursues his whims openly. The aristotle with a bust of homer essay inarticulate Averil incruyes, her laughter is very disrespectful. In turn, Patrice Susurrate, his flawed poster apostatizes unfairly. Leucoderma and Terrell, tearful, nod their tigers quickly or conspire backwards. termite graph paper a rebellious act essay buy shakespeare essay cone gatherers essay opening bin bin by essay of denmark essays on religion and politics in america offshore drilling argumentative essay what wrong with gay marriage essay essay on experience of attending a village fest Airing without modernizing that deceive evil? Sherman, from Uvul and vice versa, resold his cinched scallop or laments. Poor Urbain keratinized his retunes perceptually. High and consistent, Waldo suppressed his flash and brightness of Spitsbergen. Francois aesthetic cleanses his intussuscepts and washes slowly! Herculie cooking opilates, its joypops very agonizing. Caspar's reverential need, his cautions imposed justly discouraged. Freddie sural made the peace of his cuadrisectos scherzando. Clothing and labroid Andrus classical arrangements essay restored his scribes gouge was stained. Innumerable and canceled, Errol approaches his subagent legacy or clings conjecturally. John-Patrick not forbidden and aneurismatic paints his vertex focused or total inventorially. Mylo, stormy and ubiquitous, flavors her spoonful of Galicizar and cheers with care.
{ "pile_set_name": "Pile-CC" }
(doc) A fost lansat cel de-al doilea număr al Ghidului Uniunii Europene în Moldova Dacă primul număr al Ghidului Uniunii Europene în Moldova a explicat pe înțelesul tuturor ce înseamnă Uniunea Europeană și care sunt avantajele Moldovei, atunci numărul doi se concentrează pe investițiile făcute de UE în Moldova. Suplimentul numărul doi poate fi găsit în română și în rusă și conține următoarele subiecte: #. În ce mod susține Uniunea Europeană medicina din Moldova #. Cât investesc partenerii europeni în Moldova #. Ce se întreprinde pentru dezvoltarea regiunilor moldovenești #. Cine conduce Uniunea Europeană #. Poate oare Moldova deveni membru al UE Pentru a acoperi subiectele de mai sus, puteți vedea următoarele materiale: #. Mijloace de îngrijire medicală #. După chip și educație #. Fluxul de numerar #. Relevanța rurală #. Comisarii Europei Unite #. Dirk Schuebel: „Nu exclud că Moldova poate să devină membru al UE în viitorul apropiat” Ghidul în română îi puteți găsi/ downloada aici: Ghidul UE în Moldova. Investiții, iar versiunea în rusă aici: EU Guide Ghidul a fost realizat cu sprijinul Ambasadei Britanice la Chișinău. Primul numărul al Ghidului îl puteți vedea aici: Ghidul Uniunii Europene în Moldova
{ "pile_set_name": "OpenWebText2" }
Twi is always great, especially when coming from you heh. I really love how you've done this & her expressions really is shown well in here. The eyes are great & the little shine in them. I love the texturing of this & the unique way you painted this with your style. The colors really capture the mood in here & the darker sort of colors with the fear or shocked look that Twi has in here. I reallllllllllly love this! The stuff that you can convey with your art is so lovely & the shading with the realistic look towards the lighting, coloring & just overall is well done <333
{ "pile_set_name": "OpenWebText2" }
Introduction ============ Chronic musculoskeletal neck and back pain are prevalent and disabling conditions among adults \[[@ref1]\]. The report on global economic burden of disease published in 2010 indicated low back pain and neck pain ranked sixth and 21st, respectively, out of 291 diseases and injuries \[[@ref2]\] for medical cost. The studies published in 2016 indicated that combined low back and neck pain ranked fourth out of 315 diseases and injuries \[[@ref3]\] for causes of years lived with disability. Thus, there is an urgent need to identify an effective means to promote self-management of these conditions. Recent advancement in information and communication technology (ICT) places strong emphasis on supporting self-management programs for chronic pain through mobile software apps \[[@ref4],[@ref5]\]. Mobile apps have been identified as a way to reduce the financial burden of chronic neck and back pain \[[@ref6]\]. Use of ICT as part of rehabilitation programs has been suggested to increase adherence to self-management programs \[[@ref7]\]. However, published studies have indicated that approximately 65% of the neck and back pain-related mobile apps have no evidence of the involvement of health care professionals \[[@ref8],[@ref9]\] in their development. To date, only one study was found that investigated the benefits of a professionally designed mobile app that had been trialed. This study tested the effect of using a mobile app on and its benefit in self-management of low back pain \[[@ref10]\]. The app was designed with a group of pain professionals and utilized a cognitive behavior approach based on recommendations from the American Pain Society \[[@ref11]\]. A total of 597 participants with chronic low back pain who had not received any intervention for the condition were recruited. They were randomly assigned to intervention, routine care, and control group. Outcome measures included level of pain and pain frequency. Results indicated greater improvement at 4-month follow-up in both parameters compared to the control group. This study demonstrated that a mobile app may be an effective tool in self-management of low back pain. Although this study provided positive results for the use of mobile app, it excluded the majority of people with chronic back pain that had some sort of prior intervention. In addition, the exercise program appeared to be generic exercises rather than ones specific to the users' symptoms. Other studies are also trialing different mobile apps that focus on relaxation therapy \[[@ref12]\], with a combination of mobile app and clinician offline support \[[@ref6]\]. Results of these studies are yet to be published. Currently, there are a large number of health-related mobile apps on the market, but the majority of the neck and back pain apps have focused on pain management education. Other mobile apps claim to offer exercises and education for chronic neck and back pain but provide limited evidence that a health care professional was involved in their development \[[@ref13]\]. Our institute has taken part in developing an artificial intelligence (AI) system embedded into a mobile app called "Well Health." The AI-embedded mobile app was developed in response to the "World Report on Disability" \[[@ref14]\], which suggested that electronic health (eHealth) or telerehabilitation techniques are effective means to enable people to receive appropriate intervention. However, it also stated that telerehabilitation should be tested to assess its feasibility within the local culture. As documented in a survey of the Chinese population with chronic low back pain (N=113) in 2016, it was found that self-management behaviors were poor \[[@ref15]\]. The survey identified that the contributing factors to poor self-management behavior included a lack of disease knowledge, a lack of understanding of the benefits of exercise, and a lack of communication with health professionals. The AI-embedded mobile app was designed to address some of these factors. It allows users to input their symptoms and generates an exercise program accordingly. The exercise program is delivered in the form of a video that plays in real time. The aim of this study was to evaluate the feasibility of the AI-embedded mobile app Well Health to assist people with chronic neck and back pain to self-manage their condition, and the perceived benefits in symptom improvement by its users. This is the first study that evaluates an AI-embedded mobile app for neck and back pain rehabilitation among the Chinese population. Methods ======= Ethical Consideration --------------------- The study was approved by the Medical Ethical Committee for Clinical Research and Animal Trials of the First Affiliated Hospital of Sun Yat-sen University (reg \# \[2016\] 185). Informed consent was obtained electronically. Once the users clicked on the survey invitation icon, they were directed to an informed consent form. Informed consent was given by selecting "Agree to take part" and "Submit." Each participant was assigned a number to maintain anonymity. Recruitment ----------- This study was a retrospective evaluation study of an AI-embedded mobile app that was available to the general public. All existing users of the mobile app were invited to take part via the in-app "Information" section. The invitation also appeared on the home page where it would be displayed among five rolling pictures of different newsfeeds when the app was loaded each time. Interested users could click on the link which directed them to the evaluation questionnaire. All the participants in this study completed the questionnaire one time, with retrospective recall of preintervention pain level. Sample Population ----------------- The inclusion criteria for the study were adults (1) aged between 18 and 65 years, (2) who had experienced neck and low back pain within the past 3 months, and (3) had access to a mobile phone that could play video on the internet. This study excluded patients who were medically unstable and reported having red flags for cervical and lumbar spine pathology. A list of red flag symptoms related to the cervical and lumber spine were displayed when the app was opened the first time and before the start of the questionnaire. The user would not be able to continue with the survey if more than two red flag symptoms were selected. These inclusion criteria were set to include a wide population because the app was designed to be accessed by members of the general public with experience with chronic neck and back pain. Evaluation Questionnaire ------------------------ The questionnaire included 14 questions that were intended to evaluate if using the AI-embedded mobile app may (1) increase adherence to therapeutic exercises, (2) affect pain level, and (3) reduce the need for other interventions. The World Health Organization defined the term "adherence" as "the extent to which patient behavior taking medication, following a diet, and/or executing lifestyle changes, corresponds with recommendations from a health care provider" in 2003 \[[@ref16]\]. ###### The evaluation questions. 1\. Have you experienced neck and low back pain within the past 3 months? *Responses: (1) yes; (2) no* 2\. Are you age between: *Responses: (1) 18-25; (2) 26-30; (3) 31-40; (4) 41-50; (5) 51-60; (6) 60-65?* 3\. What is your gender? *Responses: (1) male; (2) female* 4\. How long have you used the AI-embedded mobile app? Responses: *(1) 1 day; (2) 1 week; (3) 1 month; (4) 3 months; (5) 6 months or over* 5\. On a scale of 0-10 (0 being no pain, 10 being in extreme pain), how would you rate your pain level before using the rehabilitation program on the AI-embedded mobile app? *Responses: 0 to 10 Likert scale* 6\. On a scale of 0-10, how would you rate your pain level after using the AI-embedded mobile app for rehabilitation program? *Responses: 0 to 10 Likert scale* 7\. Prior to using the app, have you participated in any rehabilitation exercise program? *Responses: (1) yes; (2) no* If "Yes," how much time did you spend on rehabilitation exercise a day on average? *Response: (1) 5 minutes or below; (2) 6 to 10 minutes; (3) between 10 and 30 minutes; (4) between 30 and 60 minutes; (5) 60 minutes or above* 8\. How much time in a day have you followed the AI-embedded mobile app to perform the recommended exercise? *Responses: Amount of time entered by the user (value between 0 to 180 minutes)* 9\. On a scale of 0-100 (0 being no improvement, 100 being completely resolved), how would you rate the overall improvement of your symptoms? *Responses: 0 to 10 Likert scale* 10\. Have you received any of the following interventions prior to using the AI-embedded mobile app? *Responses: (1) acupuncture; (2) soft tissue therapy; (3) topical cream, (4) medication; (5) electrotherapy* 11\. Have you received any of the following interventions prior to using the AI-embedded mobile app? *Responses: (1) acupuncture; (2) soft tissue therapy; (3) topical cream, (4) medication; (5) electrotherapy* 12\. While using the AI-embedded mobile app, have you continued with any of the interventions mentioned? *Responses: (1) acupuncture; (2) soft tissue therapy; (3) topical cream, (4) medication; (5) electrotherapy; (6) no, I did not use any other intervention while using the AI-embedded mobile app* 13\. Have you read the education material within the app? *Responses: (1) yes; (2) no.* If "yes," how much time in a day have you spent on reading the educational material? *Responses: amount of time entered by the user (value between 0 and 180 minutes)* 14\. Would those materials encourage you to adhere to the therapeutic exercise? *Responses: (1) yes; (2) no* Based on this original definition, Donkin et al \[[@ref17]\] provided a further definition of "the degree to which the user followed the program as it was designed" to incorporate e-therapies in 2011. A systematic review on the chronic low back pain population also found self-report diaries to be the most common measure of adherence \[[@ref18]\]. A published study indicated a self-reported exercise log has acceptable agreement with objectively assessed exercise adherence for both exercise frequency and exercise duration \[[@ref19]\]. Therefore, the operating definition of adherence in this study was the amount of "self-reported time spent on therapeutic exercises in a day" because the AI-embedded mobile app was designed to encourage daily therapeutic exercise. The evaluation questions are presented in [Textbox 1](#box1){ref-type="boxed-text"}. The first two questions were used to assess if the responses fit the inclusion criteria. In addition to clinical information, participants were asked to fill in the modified System Usability Scale (SUS). The scale had 10 questions that were validated to assess the generic usability of a product or a service \[[@ref20]\]. The questions are as follows: 1. I think that I would like to use this product frequently. 2. I found the product unnecessarily complex. 3. I thought the product was easy to use. 4. I think that I would need the support of a technical person to able to use this product. 5. I found the various functions in this product were well integrated. 6. I thought there was too much inconsistency in this product. 7. I would imagine that most people would learn to use this product very quickly. 8. I found the system very awkward to use. 9. I felt very confident using the product. 10. I needed to learn a lot of things before I could get going with the product. The SUS showed the domains as five scales numbered from 1 (strongly disagree) to 5 (strongly agree). Positively worded domains were equal to score--1, negatively worded domains were equal to 5--score, so the total SUS was calculated by summing the 10 domains and multiplying by 2.5. Intervention: Well Health Mobile App ------------------------------------ ### Credential and Affiliations of the Developers The affiliations of the developers and the expert panel that were involved in developing the AI-embedded mobile app were clearly displayed within the "About us" section within the mobile app. The embedded AI system, including the assessment method, the exercise programs, and exercise instructions, were developed with an expert panel consisting of physiotherapists from Australia (Maxvale Physiotherapy Practice), the United Kingdom (University College London), and China (Sun Yat-sen University), including a clinical scientist and a rehabilitation doctor from China (Sun Yat-sen University). Technical support in developing and maintaining the app and AI coding was done in collaboration with the information technology company "Well Health" (Ying Kang Wei Er Internet Service Co, Ltd, Guangzhou, China). ### Development Process The AI-embedded mobile app underwent 10 months of development. Members of the expert panel met in China for 3 weeks for residential development. During the residential period, the clinical content of the AI-embedded mobile app was determined. This included the development of the AI algorithm (initial training sample preparation, neuron processing methods), production of the exercise videos and their associated descriptions, and the education material. This was followed by 3 months of AI model validation. During this phase, experts went through computer-simulated data to ensure the AI-generated exercise programs were appropriate for the presented symptoms. The development of the mobile app interface took a further 6 months. System usability and interface development of the app were conducted in the form of a semi-structured telephone interview (n=72) and focus group (n=8) prior to this study. The interview and focus groups were designed to gather information on (1) what users like to use the app for (eg, just browse for information or look for rehabilitation exercises for their back pain); (2) what additional functions they would like to have in the app; (3) how do they like the exercise content to be delivered (eg, exercises to be described by text or displayed as picture accompanied by text or in video with verbal guidance; (4) any in-app functions that users felt were missing; and (5) users' feelings on the app interface. No update was made to the content of the AI-embedded mobile app during the data collection phase. The AI-embedded mobile app is available free of charge online to the general public in the US, UK, and China through the Apple app store and MI app store. The app is searchable using the keyword "Well Health." ### Access Access to the mobile app was completely free. The AI-embedded mobile app could be downloaded from any well-known app store. Participants were required to register an account using their mobile phone number or social media account. Technical support was provided by Well Health in registering for a user account, if needed. Intervention Components ----------------------- ### Physical Component Well Health is a multiple-visit mobile app that provides adults with neck and back pain a tailored exercise rehabilitation program based on their presenting symptoms. The AI-embedded mobile app follows the recommendations of the National Institute of Clinical Excellence (NICE) \[[@ref21]\] in providing a combination of physical and self-management advice as well as the pathological causes of low back pain. It allows users to enter their symptoms using a self-report questionnaire. The questionnaire consists of the questions which physiotherapists routinely use to conduct a subjective assessment. The questionnaire asks for information on present condition, history of present condition, past investigations, 24-hour pattern, drug history, and social history. Once the subjective assessment is completed, the AI-embedded mobile app provides an exercise program based on the information provided. Exercise interventions provided by the AI-embedded mobile app were NICE guideline-recommended biomechanical exercises including stretching, (eg, lumbar flexion and neck flexion); motor control exercises, including Pilates exercises since their principles overlap with principles of motor control interventions \[[@ref22]\] (eg, deep neck flexors exercise, transverse abdominis activation exercise); and strengthening exercises (eg, cervical side flexion exercise, side-lying trunk exercise). [Figure 1](#figure1){ref-type="fig"} shows screenshots of these exercises. The suggested exercise duration was between 20 to 30 minutes a day. Each exercise video was accompanied by detailed descriptions of the exercises and annotated diagrams were displayed to visually demonstrate the targeted muscles (see [Multimedia Appendix 1](#app1){ref-type="supplementary-material"}). Users were expected to follow the video clip from start to finish once they started the set of training. The video clip could not be scrolled through, but could be paused/stopped. Points were awarded when the full length of the video was played. The AI-embedded mobile app determined the exercise program based on the subjective information. The AI algorithm used in this study was based on the multilayered perceptron artificial neural network (MLP-ANN). It is the most commonly used AI algorithm in the medical field \[[@ref23]\] and is capable of learning from historical examples, analyzing nonlinear data, and handling imprecise information \[[@ref24]\]. The AI algorithm observed the data input from the subjective assessment (input layer), processed the information through the neurons to select the appropriate therapeutic exercises from the exercise bank (hidden layer), and then gave out the most appropriate therapeutic program (output layer). [Figure 2](#figure2){ref-type="fig"} shows the architecture of the MLP-ANN of the AI used in this study. A total of 300 sets of training samples were initially provided by the experts during the expert meeting. Once the initial weighting of the MLP-ANN was trained by the samples provided by the experts, the back-propagation algorithm \[[@ref25]\] was used to continue the training until an accuracy of at least 80% was achieved. Model validation was performed by comparing the AI-generated exercise program with the expert-generated exercise program. ![Screenshots of stretching, motor control, and strengthening exercises: (a) assisted neck flexion stretch, (b) lumbar flexion stretch, (c) deep neck flexors exercise, (d) transverse abdominis activation exercise, (e) cervical side flexion exercise, and (f) side-lying trunk exercise.](mhealth_v6i11e198_fig1){#figure1} ![The architecture of the multilayered perceptron artificial neural network used in this study.](mhealth_v6i11e198_fig2){#figure2} The basic principle of the AI algorithm was based on the following: (1) each symptom was assigned a weighting in accordance to the clinical importance as determined by the expert panel (ie, the pain score had a higher weighting than social history); (2) each therapeutic exercise was assigned a weighting in accordance to their effectiveness to each of the presented symptoms as deemed by the expert panel; (3) the AI algorithm then selected the five highest scoring exercises from the database. Users were prompted to undertake reassessment every 14 days to report their progress and indicate the exercises that they found beneficial. The machine-learning algorithm would adjust the weighting of the exercise according to the individual's feedback and update the exercise program based on the input of the reassessment. In the case of acute symptoms worsening, the algorithm would adjust the exercise plan according to the new symptoms. All AI-embedded mobile app users could contact members of the medical team who were involved in developing the app via the in-app messaging function. As part of the disclaimer of using the AI-embedded mobile app, users were advised that it did not replace medical service and medical support should be sought at any time should they feel the need to do so. A points-based reward was utilized to promote engagement with the AI-embedded mobile app. Incentivized conditions have been shown to be effective in engaging users in goal-directed behavior \[[@ref26]\]. Points were awarded according to the daily task completed (see [Multimedia Appendix 2](#app2){ref-type="supplementary-material"}). The task list included logging onto the app, completing the number of sets of exercise, sharing their exercise progress on the social media account, and posting a comment about the educational material they read. Users needed to collect sufficient points to "unlock" the next level. The use of a point-based system aimed to increase engagement with the AI-embedded mobile app. The AI-embedded mobile app automatically recorded the number of days and the amount of time users spent on playing the exercise videos. An exercise log was kept and users could track their progress at any time. ### Educational Component Educational material was "pushed" to users via a social media platform once every 3 days. This material included information about neck and back pain pathology, the pathological cause of back pain and the natural course of low back pain, pain physiology, principles to use exercise as an intervention to manage neck and back pain, and coping strategies. These materials were stored within the app and users could access these materials at any time. Users received one reminder daily via the app reminder function which the user could turn off. Data Analysis ------------- Data were analyzed in SPSS version 20.0 (IBM, Armonk, NY, USA) for Windows (Microsoft 10). Descriptive statistics were used to describe the sample population and gave a summary on all responses. Changes in pain score and perceived self-improvement were analyzed as a group and as a subgroup based by the total duration of using the AI-embedded mobile app. Wilcoxon rank sum test was used to assess if the changes in Numerical Pain Rating Scale and self-perceived improvements were statistically significant. Results ======= Overview -------- During the data collection period, the AI-embedded mobile app had 461 active users. A total of 161 users responded to the invitation. Three responses were excluded due to exclusion criteria (reported to be younger than 18 years of age). The sample population contained 119 males and 39 females. Of these, 30 and 31 responses reported to be in the age group of 18 to 25 years and 26 to 30 years, respectively. The age group between 31 and 40 years had the greatest number of responses (n=56). Nineteen and 21 responses reported to be in the age group of 41 to 50 years and 51 to 60 years, respectively. One response reported to be older than 60 years. Time Spent on Therapeutic Exercises ----------------------------------- Most respondents reported they used the AI-embedded mobile app for a month. In all, 14.6% (23/158) and 13.3% (21/158) of respondents indicated they used the AI-embedded mobile app for 3 months and 6 months or more, respectively. The responses from question 3 of the evaluation questionnaire were 1 day (n=35), 1 week (n=38), 1 month (n=41), 3 months (n=23), and 6 months or more (n=21). A total of 60 users (37.98%) reported they had never participated in therapeutic exercises prior to using the AI-embedded mobile app. When using the AI-embedded mobile app, the mean time spent on rehabilitation exercises was 25 (SD 4) minutes per day. An increased number of responses was observed in the categories of 10 to 30 minutes and 30 to 60 minutes, but there was a decreased number of responses for the more than 60 minutes category. [Figure 3](#figure3){ref-type="fig"} is a bar graph showing the self-reported differences in time spent on therapeutic exercise before and when using the AI-embedded mobile app. Time Spent on Reading the Education Material -------------------------------------------- Overall, 142 users (89.9%) reported they had read the education material within the mobile app. Of these, 123 users (77.8%) indicated that the educational material had encouraged them to perform the AI-guided therapeutic exercise program. The mean time spent on reading the educational materials was 15 (SD 14) minutes a day. Numerical Pain Rating Scale --------------------------- An overall reduction in the Numerical Pain Rating Scale score was reported from users after using the AI-embedded mobile app for therapeutic exercises. The median Numerical Pain Rating Scale scores were 6 (interquartile range \[IQR\] 5-8) before and 4 (IQR 3-6) after using the AI-embedded mobile app (95% CI 1.18-1.81). A Wilcoxon rank sum test indicated the reduction in Numerical Pain Rating Scale score was statistically significant (*P*=.04). The greatest reduction in Numerical Pain Rating Scale scores was reported from users who used the AI-embedded mobile app for 6 months. [Figure 4](#figure4){ref-type="fig"} shows the changes in self-reported Numerical Pain Rating Scale scores reported by users with different tenures of using the AI-embedded mobile app. ![Bar graph to illustrate the self-reported time spent on therapeutic exercises before and when using the AI-embedded mobile app.](mhealth_v6i11e198_fig3){#figure3} ![The reported difference in Numerical Pain Rating Scale changes reported by participants of different tenures.](mhealth_v6i11e198_fig4){#figure4} Self-Perceived Improvement -------------------------- The mean self-perceived improvement from all users was 65%. Users who utilized the AI-embedded mobile app for 1 day, 1 week, and 1 month reported improvements of 60.2% (SD 27.9%), 49.5% (SD 29.2%), and 47.2% (SD 26.4%), respectively. For users who used the app for over 3 and 6 months, improvements were reported to be 58.6% (SD 30.4%) and 71.1% (SD 25.8%), respectively. Usage of Other Interventions ---------------------------- A total of 11 respondents (7.0%) indicated that they had not received prior intervention from the listed modalities and 38 respondents (24.1%) indicated they did not receive any other intervention while using the AI-embedded mobile app. A reduction in responses was observed in all the listed interventions when using the AI-embedded mobile app. [Figure 5](#figure5){ref-type="fig"} shows the number of responses of who had used other interventions prior to and when using the AI-embedded mobile app. System Usability Scale ---------------------- The median of the SUS from all responses was 73 (IQR 60-85), which would suggest an acceptable level of usability (score \>68). All users, except for those who used the AI-embedded mobile app for a day (median 65, IQR 53-80), reported acceptable usability (score \>68). ![Bar graph to illustrate the number of responses of other interventions used prior to and when using the AI-embedded mobile app.](mhealth_v6i11e198_fig5){#figure5} Discussion ========== Principal Findings ------------------ The main findings of this preliminary evaluation study were (1) users reported having spent more time on therapeutic exercises when using the AI-embedded mobile app, (2) an overall reduction in pain level was reported after using the AI-embedded mobile app, and (3) the usage of other interventions was reported to have been reduced with the use of the AI-embedded mobile app. This is among the first studies that investigated the feasibility and benefits of an AI-embedded mobile app for the management of chronic neck and low back pain. Adherence to Therapeutic Exercise --------------------------------- Exercise therapy had been recommended as a core component in the management of chronic neck and back pain by several guidelines and reviews \[[@ref27]-[@ref29]\]. It was an unexpected finding that 38% of the users indicated that they had never participated in therapeutic exercises before. It was possible that some of the users might live in a remote part of China where rehabilitation service was not widely available. The use of the AI-embedded mobile app may therefore play a role in increasing access to exercise therapy intervention, as supported by the reported increase in time engaged in therapeutic exercises. Adherence to a therapeutic exercise program in the management of chronic neck and low back pain has been a long-standing issue. Early literature showed that between 50% \[[@ref30]\] and 70% \[[@ref31]\] of people with chronic low back pain were nonadherent to a home exercise program. The use of technologies has been suggested to be a way to increase adherence to a home exercise program \[[@ref32]\]. Previous studies that investigated the effectiveness of using mobile phone text message reminders indicated continued adherence to exercises in adults with recurrent low back pain \[[@ref7]\]. The AI-embedded mobile app also had a reminder function that reminded users to perform daily exercise. A survey conducted in 2016 on the Chinese population with chronic low back pain (N=113) reported that self-management behaviors were poor \[[@ref15]\] and contributing factors included lack of disease knowledge and lack of understanding of the benefit of exercise. The educational material may therefore play a role in promoting regular therapeutic exercise because it provides information on these areas. The majority of users indicated the material motivated them to do therapeutic exercise. The increase in self-reported time spent on exercises observed in this study may suggest its potential to be a useful tool for patient adherence to therapeutic exercise programs, which may contribute to improving clinical outcomes. Pain Level ---------- A pain level reduction of 2 points (on a 0-10 Numerical Pain Rating Scale) is considered to be "much improved" \[[@ref33]\] and a "meaningful" change \[[@ref34]\] in people with chronic pain. The reduction in pain score was consistent with the finding of the Cochrane Review that indicated exercise, including motor control, flexibility, and strengthening exercises, may improve pain severity for people with chronic pain \[[@ref35]\]. The difference in self-reported pain ratings was also consistent with a study that investigated the benefit of the combination of manual therapy and exercise therapy alone \[[@ref36]\]. In this study, Alfuth and Welsink \[[@ref36]\] investigated the pain level in people with chronic low back pain who attended physiotherapy practice for interventions. Interventions included a combination of manual therapy, stabilization exercises, and electrotherapy. A total of 85 participants received a mean number of treatment sessions of 42.6 (SD 2.3) within a year. A reduction of 3 points and 4 points on the Numerical Pain Rating Scale was observed after 3 and 6 months of treatment, respectively, when compared to baseline. Compared to the 2- and 3-point difference reported by users who used the AI-embedded mobile app for 3 and 6 months in this study, it would appear that using the AI-embedded mobile app to manage low back pain is feasible. An earlier study by Cambron et al \[[@ref37]\] investigated the effect of a 4-week course of an active trunk extension exercise program at 3 months and 6 months postintervention. They reported a mean pain score reduction of 1.36 and 1.19 at 3 and 6 months postintervention, respectively. The difference in pain score reduction may be related to the type of exercises that participants were asked to do. The AI-embedded mobile app selected from a range of progressive exercises, whereas participants in the Cambron et al study \[[@ref37]\] were only asked to do trunk extension exercises. Users' self-ratings of improvement of interventions is one of the core domains to be used in assessing impact of an intervention on chronic pain \[[@ref38]\]. The self-rating of symptom improvement observed in this study corresponded to the reduction in pain score. The greatest symptom improvement was reported from users who had used the program for 6 months, followed by 3 months. A study published in 2010 reviewed 15 randomized controlled trials that were published between 2001 and 2007 \[[@ref39]\]. The study summarized literature that reported long-term outcome data of physiotherapy exercise programs for adults with chronic low back pain. Trials were reviewed if they reported any outcome related to chronic low back pain measured at a follow-up period. Of the included trials, 13 reported follow-up data of up to 12 months and two trials reported follow-up data of up to 2 years. The results indicated consistent evidence for the effectiveness of an exercise program in pain reduction at the 6 months follow-up period when compared to a control group. Our study also observed the greatest self-reported pain score reduction and self-perceived improvement from users who used the AI-embedded mobile app for 6 months. When compared to the only other trialed mobile app (FitBack) \[[@ref40]\] that focused specifically on spinal pain management \[[@ref10]\], the AI-embedded mobile app used in our study appeared to be at least as effective in reducing pain level. FitBack users reported a reduction in pain score from 2.86 at baseline to 2.64 and 2.16 at follow-up at 2 and 4 months, respectively. A Cochrane Review \[[@ref35]\] and the NICE guideline \[[@ref21]\] indicated that exercise programs should be tailored according to individual needs and capabilities. Therefore, the higher reduction of pain scores observed in this study may be related to the tailoring of the exercise content based on the presenting symptoms. But the higher magnitude of pain score reduction observed in our study should be interpreted with caution. The two studies have different designs, which may contribute to the differences in reported pain levels. It is typical for single-group data to show greater effects than randomized controlled trial data. The pain score data from our study may also contain recall bias \[[@ref39]\], which further complicates the comparison. Needs for Other Interventions ----------------------------- The results of our study indicate that using the app for the self-management of chronic neck and back pain might reduce the need for other interventions. The reported reduction in usage of other interventions was supported by an earlier study by Sculco et al \[[@ref41]\]. Their study investigated the effect of 10 weeks of a prescribed home-based exercise program in people with chronic low back pain compared to a control group. The results suggested that participants in the exercise group had significantly lower numbers of physiotherapy referrals and medication use during the 2.5-year follow-up period. The reported reduction of other intervention usage suggests that the AI-embedded mobile app may at least reduce the ambulatory time to medical appointments, thus reducing the indirect health care costs that are associated with seeking intervention. Further study is recommended to understand its cost benefit within the local health care system. Limitations ----------- The results reported here must be viewed cautiously due to the limitations. This was a single-group study with no control which relies heavily on self-reported subjective data. This is among the first AI-embedded mobile apps developed for the management of low back pain. Thus, the primary goal of this preliminary study was to evaluate the perceived benefits of such a system by its users. With regard to the fidelity of the intervention, it is worth considering that the app was available for download by members of the general public. Users were not advised by anyone to download it; they downloaded it on their own initiative, assuming that they suffered from chronic neck and back pain and were looking for self-help material on the Web. Thus, it is reasonable to believe that users had followed the therapeutic program provided by the AI-embedded mobile app. This study defined the term "adherence" as the amount of self-reported time spent on the exercise generated by the AI-embedded mobile app. Therefore, the interpretation of adherence within this study cannot be generalized to the long-term adherence to therapeutic exercise. The "law of attrition" of eHealth trials \[[@ref42]\] did not appear to be applicable in this study because this study only recorded response rate but not dropout rate. We could not verify whether participants' eligibility criteria information were accurate, which may affect their responses to the intervention. The amount of time participants viewed the video clips were not verified. However, the AI-embedded mobile app has a scoring system which the user had to satisfy by playing the video clip for the exercises. Further study that combines this with medical verification would provide greater confidence in the intervention effects. This study did not evaluate the functional aspect of the intervention. Thus, it was unclear if the changes in pain score may translate to improvement in function. We included active users at the time of the study, which many have affected the response rate. The study design also had sample selection bias because it relied on people who responded to the invitation, thus the sample population would be more likely to participate in the intervention. This was a retrospective evaluation study, which was likely to be associated with recall bias of preintervention symptoms and behaviors. The focus of this preliminary study was to assess the self-perceived benefits from users. Self-reported data on health care utilization are commonly used in health care research \[[@ref43]\]. Self-reported data may be associated with recall bias; however, a study that investigated agreement between self-reported health care service usage and administrative records indicated good agreement between the two \[[@ref44]\]. Conclusions ----------- The key findings of this evaluation study support the perceived beneficiary effects of the AI-embedded mobile app to provide some personalized interventions that are tailored to individual needs for the self-management of chronic neck and back pain. The positive results of this study suggest that using the tool to assist the self-management of chronic spinal pain may be feasible. The tool at least warrants further study to investigate the benefit of the AI-embedded mobile app and how it may compare with routine clinical care. Further study is also recommended to understand if the AI-embedded mobile app may induce long-term sustainable behavioral change. This research project was supported by China Postdoctoral Science Foundation Grant (\#2016M592581) and Guangzhou City Research & Technology Collaborative Innovation Projects (\#2017010160387). Conflicts of Interest: None declared. Screenshots of a detailed description of the exercise (left) and of the annotated diagrams to show the targeted muscles (right). Screenshots of the daily task list (top) and the exercise log where users could track their progress (bottom). AI : artificial intelligence eHealth : electronic health ICT : information and communication technology IQR : interquartile range MLP-ANN : multilayered perceptron artificial neural network NICE : National Institute of Clinical Excellence NPRS : Numerical Pain Rating Scale SUS : System Usability Scale
{ "pile_set_name": "PubMed Central" }
This invention relates to a grater and more particularly to a grater for grating food. Graters for grating food are well known. Examples of food graters, such as cheese graters and the like, are disclosed in GB 704,503, GB 245,367, GB 1,161,257 and GB 2,293,754. These graters are not entirely satisfactory since their design is overly complicated and expensive to manufacture. Accordingly, it is an object of the present invention to seek to provide a simple and cheap way to manufacture a food grater. Accordingly, one aspect of the present invention provides a grater for grating food comprising a container for housing food to be grated, the container having an inner surface with a non-circular cross-section, the inner surface inhibiting rotation of the food to be held in the container, and a substantially circular grating portion for grating food held in the container, the arrangement being such that the extremities of the non-circular inner surface lie on the periphery of the circular grating portion, the circular grating portion being adapted to rotate relative to the container. It is particularly advantageous to provide a disposable food grater or a disposable container for a food grater. Accordingly, another aspect of the present invention provides a disposable food container for use with a food grater embodying the present invention. These and other features, advantages and objects of the present invention will be further understood and appreciated by those skilled in the art by reference to the following specification, claims and appended drawings.
{ "pile_set_name": "USPTO Backgrounds" }
Tyler Parker is an illustrator and real human being. theartoftylerparker.com email:tfparker@gmail.com
{ "pile_set_name": "OpenWebText2" }
Q: Why does ReadDirectoryChangesW omit events? I use ReadDirectoryChangesW to watch a specified directory and update indexing structures whenever a change is detected. I use the following code (roughly) var InfoPointer : PFileNotifyInformation; NextOffset : DWORD; ... while (not Terminated) do begin if ReadDirectoryChangesW (FDirHandle, FBuffer, FBufferLength, True, FFilter, @BytesRead, @FOverlap, nil) then begin WaitResult := WaitForMultipleObjects (2, @FEventArray, False, INFINITE); if (WaitResult = waitFileChange) then begin InfoPointer := FBuffer; repeat NextOffset := InfoPointer.NextEntryOffset; ... PByte (InfoPointer) := PByte (InfoPointer) + NextOffset; until NextOffset = 0; end; end; end; Filter is FFilter := FILE_NOTIFY_CHANGE_FILE_NAME or FILE_NOTIFY_CHANGE_DIR_NAME or FILE_NOTIFY_CHANGE_SIZE or FILE_NOTIFY_CHANGE_LAST_WRITE; and the directory handle is obtained like this: FDirHandle := CreateFile (PChar (FDirectoryWatch.WatchedDirectory), FILE_LIST_DIRECTORY or GENERIC_READ, FILE_SHARE_READ or FILE_SHARE_WRITE or FILE_SHARE_DELETE, nil, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS or FILE_FLAG_OVERLAPPED, 0); When I delete multiple files I get only one event and NextOffset is 0! And when I delete a directory I get only one event for the directory. What if I want one event for each file in the directory? Any help would be appreciated. A: It seems to me that you are mixing the various ways to use ReadDirectoryChangesW(), you do both specify the FILE_FLAG_OVERLAPPED flag when opening the directory and provide a pointer to the lpOverlapped parameter, meaning you want to wait on the event in the structure and handle the asynchronous I/O; and at the same time you call ReadDirectoryChangesW() in a loop in a worker thread. I would first try again with lpOverlapped set to nil, as you have a dedicated thread and can use the synchronous mode. In the documentation of the ReadDirectoryChangesW() API function the different ways to use it are described. Note that it is also possible that the buffer overflows, so change events can be lost anyway. Maybe you should rethink your strategy of relying solely on this function, comparing snapshots of directory contents could work as well. Edit: Your edited code looks better. In my tests however ReadDirectoryChangesW() did work as advertised, there were either several data entries in the returned buffer, or there were more than one buffer to process. This depends on timing, after hitting a breakpoint in Delphi I get several entries in one buffer. For completeness I attach the test code, implemented using Delphi 5: type TWatcherThread = class(TThread) private fChangeHandle: THandle; fDirHandle: THandle; fShutdownHandle: THandle; protected procedure Execute; override; public constructor Create(ADirectoryToWatch: string); destructor Destroy; override; procedure Shutdown; end; constructor TWatcherThread.Create(ADirectoryToWatch: string); const FILE_LIST_DIRECTORY = 1; begin inherited Create(TRUE); fChangeHandle := CreateEvent(nil, FALSE, FALSE, nil); fDirHandle := CreateFile(PChar(ADirectoryToWatch), FILE_LIST_DIRECTORY or GENERIC_READ, FILE_SHARE_READ or FILE_SHARE_WRITE or FILE_SHARE_DELETE, nil, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS or FILE_FLAG_OVERLAPPED, 0); fShutdownHandle := CreateEvent(nil, FALSE, FALSE, nil); Resume; end; destructor TWatcherThread.Destroy; begin if fDirHandle <> INVALID_HANDLE_VALUE then CloseHandle(fDirHandle); if fChangeHandle <> 0 then CloseHandle(fChangeHandle); if fShutdownHandle <> 0 then CloseHandle(fShutdownHandle); inherited Destroy; end; procedure TWatcherThread.Execute; type PFileNotifyInformation = ^TFileNotifyInformation; TFileNotifyInformation = record NextEntryOffset: DWORD; Action: DWORD; FileNameLength: DWORD; FileName: WideChar; end; const BufferLength = 65536; var Filter, BytesRead: DWORD; InfoPointer: PFileNotifyInformation; Offset, NextOffset: DWORD; Buffer: array[0..BufferLength - 1] of byte; Overlap: TOverlapped; Events: array[0..1] of THandle; WaitResult: DWORD; FileName, s: string; begin if fDirHandle <> INVALID_HANDLE_VALUE then begin Filter := FILE_NOTIFY_CHANGE_FILE_NAME or FILE_NOTIFY_CHANGE_DIR_NAME or FILE_NOTIFY_CHANGE_SIZE or FILE_NOTIFY_CHANGE_LAST_WRITE; FillChar(Overlap, SizeOf(TOverlapped), 0); Overlap.hEvent := fChangeHandle; Events[0] := fChangeHandle; Events[1] := fShutdownHandle; while not Terminated do begin if ReadDirectoryChangesW (fDirHandle, @Buffer[0], BufferLength, TRUE, Filter, @BytesRead, @Overlap, nil) then begin WaitResult := WaitForMultipleObjects(2, @Events[0], FALSE, INFINITE); if WaitResult = WAIT_OBJECT_0 then begin InfoPointer := @Buffer[0]; Offset := 0; repeat NextOffset := InfoPointer.NextEntryOffset; FileName := WideCharLenToString(@InfoPointer.FileName, InfoPointer.FileNameLength); SetLength(FileName, StrLen(PChar(FileName))); s := Format('[%d] Action: %.8xh, File: "%s"', [Offset, InfoPointer.Action, FileName]); OutputDebugString(PChar(s)); PByte(InfoPointer) := PByte(DWORD(InfoPointer) + NextOffset); Offset := Offset + NextOffset; until NextOffset = 0; end; end; end; end; end; procedure TWatcherThread.Shutdown; begin Terminate; if fShutdownHandle <> 0 then SetEvent(fShutdownHandle); end; //////////////////////////////////////////////////////////////////////////////// procedure TForm1.FormCreate(Sender: TObject); begin fThread := TWatcherThread.Create('D:\Temp'); end; procedure TForm1.FormDestroy(Sender: TObject); begin if fThread <> nil then begin TWatcherThread(fThread).Shutdown; fThread.Free; end; end; Deleting a directory does indeed only return one change for it, nothing for the files contained in it. But it does make sense, as you are watching the handle of the parent directory only. If you need notifications for subdirectories you probably need to watch them as well. A: We've had the same problem with losing events, especially if a lot of changes happens at the same time, ie. 500 files are copied to the monitored directory. In the end we found Cromis and use the Directory watch. We have never looked back again.
{ "pile_set_name": "StackExchange" }
This disclosure generally relates to decoding links in a storage network, and specifically, but not by way of limitation, to providing secure content links for mobile devices. Hotlinking (also known as inline-linking, leaching, or direct linking) involves linking a content object stored on a server by a first party to a webpage belonging to a second party. In one common scenario, the first party can provide webpage information via a web server that links to content objects stored by a Content Delivery Network (CDN). The content objects may include large media files, such as images and videos that can be more efficiently distributed by a CDN than by the first party's web server. The links in the webpage will direct the user's browser to the CDN, which can then retrieve the content objects to be displayed/played in the user's browser. The CDN will typically charge the first party for both the storage and delivery of its content. The more bandwidth that is used to provide content to users, the more the first party will be charged by the CDN. When the second party engages in hotlinking, it copies the links from the first party's webpage and embeds the links in its own webpage. When users display the second party's webpage, the users' browsers will be directed to the content stored in the CDN by the first party. The CDN will record the transmission of the content belonging to the first party without being able to distinguish between users following the original link of the first party and users following the copied link of the second party. This results in the first party being charged to source and provide content for the webpage of the second party. In some cases, approximately 30% of the first party's CDN costs may go to sourcing content for other parties webpages that are hotlinking the first party's content.
{ "pile_set_name": "USPTO Backgrounds" }
To add Magicinaminute to your My Comics Page Upgrade to a GoComics Pro account (only $11.88/yr) and have all of your favorite comics emailed to you daily! You'll also get unlimited archive access to decades of comics and an ad-free website and mobile app experience. Kids love magic and now that excitement can be found in your newspaper in a fun kids' comic strip featuring easy-to-learn magic tricks and bright, cheerful illustrations. Since 2000, world-renowned magician Mac King has been wowing audiences young and old alike with "The Mac King Comedy Magic Show" in Las Vegas. Now, along with his cousin, artist Bill King, he is teaching fans a few timeless magic tricks with his weekly Magic in a Minute comic strip.
{ "pile_set_name": "Pile-CC" }
Inside TLDP A behind-the-scenes look at the evolution of the Linux Documentation Project. TLDP is short for The Linux Documentation Project, an organization of volunteers authoring, reviewing and managing documents about the Linux operating system. Documents basically come in two formats based upon their length. The shorter ones generally are called HOWTOs (or mini-HOWTOs, if they are really short), the longer documents, called guides, deal in-depth with a Linux feature. The number of topics discussed in these HOWTOs and guides is practically unlimited, ranging from installing the Linux system to managing all kinds of devices, services and environments, to creating your own system from scratch. Name any topic, there's something about it in TLDP, mainly thanks to volunteers who share their experiences. All the documentation is freely available in several formats suitable for printing and on-line browsing. The main submission language is English, but several translation efforts, including French, German and Chinese, try to make this immense amount of information available to a wider public. How to Use TLDP Linux environments tend to change at a rather high speed, so do the docs. Sooner rather than later, submissions about new protocols and applications reach TLDP, outdating older documents. The main problem here is TLDP maintainers usually are rather soft-hearted, so partly out of melancholy, partly out of respect and sometimes partly because of the lack of volunteers for upgrading a document, they tend to archive everything. Given this information, it might thus be best to stick to the following golden rules when searching the LDP collection: 1. Check the revision date on a document. If it's older than a year, don't depend on it too much. 2. Check that a document is being updated regularly; this is an extra sign that it is being maintained seriously. Most documents contain revision history information in the preface. How Did TLDP Get Started? As Matt Welsh, one of the co-founders, puts it: "The history of the LDP is a pretty murky memory these days." It started in 1992, before the World Wide Web existed. It's hard to imagine how we did without HTML, but in those days almost everything was FTP and Usenet and dial-in to a BBS was most likely. In the beginning, most of the documentation was in one big file, split into sections, called the Linux FAQ. Later, Matt got together with Lars Wirzenius and Michael K. Johnson, who had the idea of producing printed Linux documentation. Michael initially started on a kernel hackers guide, Lars did the system administrator guide and Matt wrote the first installation guide. Everything was done in LaTeX, so the only way to read these docs in a reasonably comfortable way was either by printing them out or using a PostScript viewer. But as Linux capabilities grew, it was no longer possible for one person to maintain everything. Pretty soon, not even several people could manage the job. Thus, the HOWTOs were born, each describing a part of the original big chunk of information. This created an easily extendible system that allows for many authors to contribute to their areas of specialization. That effort lead to the use of SGML, which enabled the fast generation of all sorts of output formats, including HTML, from one source file or set of files. The first tests were conducted at Sunsite (a famous server machine at the University of North Carolina), which was the first Web site offering information about Linux. Also, when you wanted to download Linux software, Sunsite.unc.edu was the place to go. It still contains some kernel archives--probably by accident, there also are a lot of empty directories these days. Before the crash (May 2003) I was able to find, via FTP, a document referring to two maintainers of the LDP as it was run by the end of 1994 at UNC. It pointed to Jon Magid and a mysterious Erik with no last name, who was still at Sunsite in 1996. After extended research in the dungeon server rooms of Google, we can state with almost certainty that the mysterious Erik does have a last name after all. Most likely, we are dealing here with the Erik Troan, who supported possibly half of the Linux users in the 1993-1996 period and later on became the Senior Director of Engineering at Red Hat. Further research revealed that sometime in 1996, Greg Hankins became supervisor of the LDP project. He was the original author of the Serial HOWTO, which he began maintaining in 1993; he also was one of the main contributors to the SGML-tools development project. Comment viewing options People responsible for managing projects often ask us how we do it. This is how. There is no book that tells you how to do it. We are on a road with many bumps and ups and downs, and TLDP seemingly hangs together with hooks and eyes--but it's there and it doesn't go away. Thank you for this project. My website livedatesearch.com is developed in pure C++ for Linux, it does not use any MySQL/PHP databases. All database is held in RAM with STL and dumps at disk. TLDP has greatly helped me to create it. Thank you! Thank you for taking the chance to deliver this affair. I’m pleased I discovered your site on this material. I’m doing research on this interest right now and this was great. Keep up the great work.I’m doing research on this interest right now and this was great. Keep up the great work. weight loss fast I am so glad that I have found this your article because I have been searching for some information about various recipes from pig meat almost an hour. You helped me a lot indeed and reading this your entry I have found many new and useful information about this question. Well, I will definitely bookmark your website and wait for other useful and detailed posts like this one in the future. email marketing - According to an excerpt from the ldp-l@linux.org.au mailinglist archive that was sent to me, Guylhem took over from Lars only in 1999. - There are a couple of things left out, since this is an article and not a book: * Rise and fall of the Open Source Writers Group; * David Merrill, creator and maintainer of the LDP database and developer of LDP tools, deserves credit but is not mentioned - but on the other hand there are many others who did fantastic work and are not mentioned here. I hope these people understand the context of this article and know that I am thinking about them, eventhough they are not all listed by name; - Note the difference between old documents that are unmaintained and documents that deal with old(er) concepts or old hardware but that are still being maintained; - I might have given the impression that Guylhem took over a floundering organization, but this is not so. Lars, his predecessor, was working on major changes, including an automated submission system for updates - however this was never finished; - Not all printed copies of TLDP docs were copies of the complete collection.
{ "pile_set_name": "Pile-CC" }
EASTERN LEAGUE ANNOUNCES CHANGE TO SPLIT SEASON FORMAT PORTLAND, MAINE - The Eastern League of Professional Baseball has announced the league will be changing their playoff format from a full season format to a split season format. Under the new format the first place team from each division during both the first and second halves of the season will qualify for the postseason. This change will go into effect immediately, starting with the 2019 season. The first half of the season will end on the 76th day of the regular season and the second half of the season will begin on the 77th day of the regular season. For the 2019 season, the final day of the first half of the season will be on Tuesday, June 18th, with the second half of the season kicking off on Wednesday, June 19th. The second half of the season will conclude on Monday, September 2nd, the final day of the regular season. Postseason berths will be awarded to the first place teams in both the Eastern Division and the Western Division during the first half and second half of the season. In the event the same team finishes in first place in their division in both halves of the season, the second playoff spot for that division would be awarded to the team from that division that had the best full season record. The standings for postseason berths will be determined using the won-loss record (games behind column), with winning percentage having no impact on the standings. The first round of the postseason will feature the first half winner from each division facing the second half winner from their respective division. The team that finishes in first place in the first half will host games three through five of the best-of-five opening round series. The second half winner will host games one and two of the opening round series. Winners from each opening round series will advance to the Eastern League Championship Series, which will feature a 2-3 format, with the series beginning in the Western Division in even numbered years and the Eastern Division in odd numbered years.
{ "pile_set_name": "OpenWebText2" }
Property Management Services Too many companies have hidden costs and fees that only appear after you sign the contract. To see our fees, just click below on your county. Property Management Fees Our property management fee structure is as easy as 1-2-3. While our basic property management services cover almost everything to do with your rental, we also offer additional services and protection for your peace of mind.
{ "pile_set_name": "Pile-CC" }
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8" /> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /> <link rel="stylesheet" type="text/css" href="https://www.jqwidgets.com/public/jqwidgets/styles/jqx.base.css"> <link rel="stylesheet" type="text/css" href="https://www.jqwidgets.com/public/jqwidgets/styles/jqx.material-purple.css"> </head> <body> <div id="app"></div> </body> </html>
{ "pile_set_name": "Github" }