body1
stringlengths 20
4.1k
| body2
stringlengths 23
4.09k
|
---|---|
I'm a total regex noob and have been struggling with this problem for a while today. I have some content with urls in them. I'd like to simply extract these urls but I am having trouble selecting up to the end of the url. I have a code sample here: As you can see it doesn't select correctly, and the last url is not selected at all. Terrible :/ If anyone could steer me in the right direction I would really appreciate it Update: To not depend on the above link alone I thought I'd add the regex here as well. Here is the original regex for this question: /(?:http|ftp)s?:\/\/\S*\.\S*(?="|<)/gi Here is the content I am testing with: Here is some content and url <p>http://www.something.com/index.html</p> <p>Some more content <a href="http://www.something.com/some/path/here.html">http://www.something.com/some/path/here.html</a></p> Some more text http://www.something.com/something/somethingelse.html content continued... | I’m a newbie in Python. I’m learning regexes, but I need help here. Here comes the HTML source: <a href="http://www.ptop.se" target="_blank">http://www.ptop.se</a> I’m trying to code a tool that only prints out http://ptop.se. Can you help me please? |
As I am trying to make an array of Linked Lists, I keep getting a NullPointerException. The linked list works on its own until I make an array of it. MyLinkedList<String>[] list = new MyLinkedList[1]; list[0].addFirst("Milo"); System.out.println(list[0].get(0)); I keep getting this. Exception in thread "main" java.lang.NullPointerException at Test.main(Test.java:10) | What are Null Pointer Exceptions (java.lang.NullPointerException) and what causes them? What methods/tools can be used to determine the cause so that you stop the exception from causing the program to terminate prematurely? |
EDITED. I found that my supply of 3V was insufficient as there are voltage drops across the transistors. I replaced the 3V supply with 4.5V and the motor ran fine - although now my 3V motor has 2.5V across its terminals (3.3V to 0.8V). I did not think that DC motors exhibited any voltage drop since the current through their coils is constant. What can be done about this? And how would you calculate the voltage fed to the motor ANYWAY? I found it to be 3.3V simply because I measured it. I have read over the data sheet for the L298 and it seems quite simple to use. Using one side of the chip (i.e. one H-Bridge) set IN1 to 5V and IN2 to ground to conduct from OUT1 to OUT2. Also, to enable the H-Bridge ENA must be 5V. That is all the wiring needed aside from some stabilizing/filter capacitors and flyback diodes. So, to not mess with all of that I have simply purchased the Sainsmart L298 Driver module. Below is a photograph of the module and I have drawn on it to illustrate the pins that I have wired. *Note that I have not included the 5V to ENA because (shown towards the bottom left) the board has some jumpers connected so the pin is always 5V. Also, there is a state switch at the bottom right. From my experiments, and from what I have read, if the button is depressed (closed) then then VCC is tapped and regulated at 5V for the logic circuitry and the 5V (far right of the bottom screw assembly) can be used to power external circuits. If the button is OPEN then VCC is not regulated and you must supply an external 5V supply to this pin for the logic. Now, my motor is only rated MAX at 3V DC, so obviously I have to leave the switch open and supply the two sources independently. What I have noticed: If I have everything wired up exactly as I have shown in the depiction below (but without the motor!) it works fine! I have put a multimeter across OUT1 or OUT2 to ground as my microcontroller code executes (simply code to run one way then reverse direction), the polarity of the pin changes as expected. If I place my motor across a 3V supply momentarily - it runs! If I place the motor leads into OUT1 and OUT2 (after I have verified that the voltage polarity switches) nothing happens. Actually, the indicator LEDs that show direction (that were working prior) no longer light up with the the polarity of IN1 and IN2 changes. What the heck is happening? Could it be that the board is not supplying the current required to turn the motors? These motors are quite small and the Absolute Max current draw of the L298 is 2A for a single bridge. I checked the datasheet for these motors and they draw 2.2A at stall and 300mA no load. Here is the schematic for the actual L298 pin soldered to the above board. As you can see, the wiring scheme that I provided above should work just find. OUT1 should conduct to OUT2. The board just includes protection diodes and filter capacitors. | I'm trying to use an and an Arduino UNO R3 to drive a bipolar stepper motor. To simplify things, I'm just trying to get a 12v output from either output-1 or output-2 of the l298 (then I can write up the 2nd h-bridge in the l298 the same way and be able to drive both motor coils). I'm only getting ~130mv from output-1 and 140mv from output-2 (measured between the power supply ground wire and output-1/output-2). The motor is a 12v motor, but I've been able to drive it with an l293 which provides only 6v. I am getting 5v on the logic supply voltage pin and ~4v on the enable pin (using analogWrite(3, 200) - tried with the enable pin connected to either the analog pin 3 or the digital pin 3 (labeled pwm)). I have measured supply voltage to be 11.85v (12v power supply). I have followed the wiring/code from and (using same arduino code, but they got it to work, and I can't). I have tried connecting the Current Sensing A pin to the power supply ground as suggested on the 2nd web page. I have double checked that I have wired it up the same way. I've tried everything on both web pages and the few other pages I can find about building a circuit with an l298n and an arduino and I'm out of ideas about what to try next. Is there anything I can do? Here's a picture of what I built: |
Prove that the number of permutations of $m$ A's and at most $n$ B's equals $\dbinom{m+n+1}{m+1}$. I'm not sure how to even start this problem. | I have to prove that: $$\sum_{k=0}^{n} {{m+k} \choose{m}} = { m+n+1 \choose m+1 }$$ I tried to open up the right side with Pascal's definition that: $$ { n \choose k} = {n-1 \choose {k}} + {n-1 \choose {k-1}}$$ Here is what I came up with, and I am sure it is wrong because it does not equal the left side: $$ {m+n+1 \choose m+1} = {m+n \choose m+1} + {m+n \choose m} = ... ={m+n \choose m+1} + {m+n-1 \choose m} + {m+n-2 \choose m-1} + ... + {m \choose m+1} = \sum_{k=0}^{n} {m+k \choose m+k-n+1 } $$ Which, again, probably is wrong because it is not equal $\sum_{k=0}^{n} { m+k \choose m}$. Any help is appreciated |
I don't understand why $Var(X) = E((X-\mu)^2)$. It's defined as the "expected value of the square of the deviation of $X$ from the mean" but I don't understand why it couldn't be $E(X-\mu)$ as that seems more intuitive for "deviation from the mean". Is the purpose of the squaring to make deviations positive? Because if so, why not just $E(|X-\mu|)$ instead? What's the point of the squaring? | Let's take the numbers 0-10. Their mean is 5, and the individual deviations from 5 are -5, -4, -3, -2, -1, 0, 1, 2, 3, 4, 5 And so the average (magnitude of) deviation from the mean is $30/11 \approx 2.72$. However, this is not the standard deviation. The standard deviation is $\sqrt{10} \approx 3.16$. The first mean-deviation is a simpler and by far more intuitive definition of the "standard-deviation", so I'm sure it's the first definition statisticians worked with. However, for some reason they decided to adopt the second definition instead. What is the reasoning behind that decision? |
I am trying to make a Escapists map and i want to know how to add tags to blocks so they can only be placed on a certain block? Thank you to whoever anwsers my question. | I want people to only be able to place TNT on only Quartz Blocks and I've see this done before where you can only place blocks on certain other blocks but I'm not sure of the command used to do that. Does anyone know? |
I'm trying to serialize an object with an attribute on the root element (which is a collection). [XmlType("Person")] public class Person { public id Id { get; set; } public string Name { get; set; } } [XmlType("Persons")] public class Persons : Collection<Person> { [XmlAttribute("Nb")] public int Nb get { return this.Count; } set { } } } var persons = new Persons(); var person = new Person(); person.Id = 42; person.Name = "Toto"; persons.Add(person); return persons; The serialized output is the following: <Persons> <Person> <Id>42</Id> <Name>Toto</Name> </Person> </Persons> I'm expecting <Persons Nb="1"> <Person> <Id>42</Id> <Name>Toto</Name> </Person> </Persons> How can I bring the Nb attribute in ? | I've got a simple class that inherits from Collection and adds a couple of properties. I need to serialize this class to XML, but the XMLSerializer ignores my additional properties. I assume this is because of the special treatment that XMLSerializer gives ICollection and IEnumerable objects. What's the best way around this? Here's some sample code: using System.Collections.ObjectModel; using System.IO; using System.Xml.Serialization; namespace SerialiseCollection { class Program { static void Main(string[] args) { var c = new MyCollection(); c.Add("Hello"); c.Add("Goodbye"); var serializer = new XmlSerializer(typeof(MyCollection)); using (var writer = new StreamWriter("test.xml")) serializer.Serialize(writer, c); } } [XmlRoot("MyCollection")] public class MyCollection : Collection<string> { [XmlAttribute()] public string MyAttribute { get; set; } public MyCollection() { this.MyAttribute = "SerializeThis"; } } } This outputs the following XML (note MyAttribute is missing in the MyCollection element): <?xml version="1.0" encoding="utf-8"?> <MyCollection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> <string>Hello</string> <string>Goodbye</string> </MyCollection> What I want is <MyCollection MyAttribute="SerializeThis" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> <string>Hello</string> <string>Goodbye</string> </MyCollection> Any ideas? The simpler the better. Thanks. |
I got an Xbox One S controller as a gift for Christmas and I found out that it can connect to a PC with Bluetooth. It's supposed to work on Windows 10 but it doesn't work on my Ubuntu PC. It shows up as an option in the Bluetooth settings but when I connect to it it just instantly loses connection. How can I use the controller via Bluetooth on my Ubuntu 17.10 PC? I would like to use it for emulators and maybe even Steam games. | I have a fresh install of Ubuntu 16.04 and I downloaded a game from GOG called Transistor. I bought a wireless Xbox One controller to play just this kind of game. From what I could find out, wireless isn't supported on Ubuntu for this controller yet so I plugged it in using a [known working] micro-usb > usb adapter. I have successfully installed the game. I can play it with my keyboard/mouse. Clicking on the controller icon in the game settings does nothing. I have installed "Ubuntu xboxdrv integration" and now have a joystick option in my settings menu. It lists four 360 controllers and none of them respond to input from the controller. When I type lsusb it lists "Microsoft" as one of the things connected. I disconnected the controller and the entry goes away so I know the controller is being seen by the system. When I plug it in it rumbles for a moment. If I press the "X" (connect) button it flashes for almost 30 seconds. As I understand, wired, even the Xbox One controller, is compatible out of the box with newer versions of Ubuntu. Can anyone tell me what I'm not doing or where to start looking? I'm assuming a newish kernel was installed with the OS. I typed lsmod and there is no ubuntu-xboxdrv or xboxdrv or even xpad in the list. I typed insmod ubuntu-xboxdrv into terminal and was told it couldn't load because there's no file or directory. Typing modprobe ubuntu-xboxdrv also said it couldn't find it. (I also tried xboxdrv for both.) As far as I can tell, it not being a loaded mod is the number one culprit. How do I see if ubuntu-xboxdrv is even the name of the mod? I checked that the install went through by reinstalling. How do I find where it went? |
I'm conceptually/intuitively confused about when we would use the joint probability (multiplication rule) versus a conditional probability, specifically when the dependent event has no chance of occurring without the other event. Here's an example that illustrates my confusion: Suppose we have a weird city, where there's a 20 percent chance of rain (so a 80% chance of any other weather). Now suppose that it can only rain frogs when it rains, and there's a 10% chance of frogs. Why can we not use bayes rule to model: $$Pr(frogs | rain) = \frac{Pr(rain | frogs)\cdot Pr(frogs)}{Pr(rain)} = \frac{1 \cdot 0.1}{0.2}$$ I know the correct way of doing it would be the multiplication rule, but why can we not use a conditional probability? We know that the probability of raining frogs is 0.1 because it cannot occur in any other scenario other than when it rains, and if there are raining frogs, we must have rain so $Pr(rain | frogs)=1$. And we also have $Pr(rain)=0.2$, so it seems like we have everything we need for conditional probability. The correct answer would of course be $0.2\cdot0.1=0.02$. What am I missing aside from the nonsensical results? Edited for sensical numbers, but assume that the probability of raining frogs is just the proportion of days on which it rains. | When talking about events, there is the following formula called Bayes' rule, where $A$ and $B$ are random events: $$P(A|B)=\frac{P(B|A)P(A)}{P(B)}$$ Now let's say that for now only $A$ happened. I suppose that $P(B|A)$ is called posterior probability (beside conditional probability) since there is an evidence, $A$. But is $P(A|B)$ also called posterior probability? Edit: An (artificial) example: $A$ = "Last year I had no accidents." $B$ = "This year I will have no accidents." Edit 2: Simply put: $P(\text{something}|\text{evidence})$ = posterior probability But $P(\text{evidence}|\text{something})$ = posterior? Doesn't "posterior" have something to do with the chronology of events (their order of happening in time)? |
I have a question about the word when. I have read that it can be a conjunction or a relative adverb (either way, it joins two clauses together). Can I ask how do I differentiate between the two? A few sample sentences are: 1) He graduated from school when he was 22 years old. 2) The risk of theft is higher when you do not install a car alarm system. 3) I remember the day when we first met. | I am not familiar with the idea that an adverb can function as a conjunction at the same time. Here are a couple of sentences that are confusing me. This is the reason why she left him. ...and He was transferred to New York, where he was promoted to a higher level. The why, where, when, and how seem to introduce a clause. Therefore, can they also be called conjunctions? If yes, would I be right in assuming that relative adverbs can function as conjunctions at the same time? |
I really need someone to help me. I'm trying to learn Object C. But I don't understand the asterisk movement. I will explain myself: NSDate *date = [NSDate date] Here we ask to the date method to create an NSdate instance and stored in date. Is that correct? If I'm in the @interface and I do: @interface Gretter : NSObject { NSString *greetings } Here we declare Gretter subclass belonging to the NSObject superclass and we add the method greetings to the subclass greeting Is that correct? What i really don't understand is: NSString* greeting = @"hello" Why is the asterisk attach to the NSString* here?? This are 3 separate example and not part of the same program. I just want to understand why the asterisk* change position Thank you very much CL | Is it true, that the Asterisk always means "Hey, that is a pointer!" And an Pointer always holds an memory adress? (Yes I know for the exception that a * is used for math operation) For Example: NSString* myString; or SomeClass* thatClass; or (*somePointerToAStruct).myStructComponent = 5; I feel that there is more I need to know about the Asterirsk (*) than that I use it when defining an Variable that is a pointer to a class. Because sometimes I already say in the declaration of an parameter that the Parameter variable is a pointer, and still I have to use the Asterisk in front of the Variable in order to access the value. That recently happened after I wanted to pass a pointer of an struct to a method in a way like [myObj myMethod:&myStruct], I could not access a component value from that structure even though my method declaration already said that there is a parameter (DemoStruct*)myVar which indeed should be already known as a pointer to that demostruct, still I had always to say: "Man, compiler. Listen! It IIISSS a pointer:" and write: (*myVar).myStructComponentX = 5; I really really really do not understand why I have to say that twice. And only in this case. When I use the Asterisk in context of an NSString* myString then I can just access myString however I like, without telling the compiler each time that it's a pointer. i.e. like using *myString = @"yep". It just makes no sense to me. |
I am new to salesforce and I followed instructions as per salesforce trailhead, Access token got generated but, when I hit the url error occurs as, "message":"Session expired or invalid","errorCode":"INVALID_SESSION_ID"}]curl: (6) Could not resolve host: Bearer. But data is fetched successfully when I try getting data through workbench. | @RestResource(urlMapping='/Merchandise/*') global with sharing class MerchandiseManager { @HttpGet global static Merchandise__c getMerchandiseById() { RestRequest req = RestContext.request; String merchId = req.requestURI.substring( req.requestURI.lastIndexOf('/')+1); Merchandise__c result = [SELECT Name,Description__c,Price__c,Total_Inventory__c FROM Merchandise__c WHERE Id = :merchId]; return result; } @HttpPost global static String createMerchandise(String name, String description, Decimal price, Double inventory) { Merchandise__c m = new Merchandise__c( Name=name, Description__c=description, Price__c=price, Total_Inventory__c=inventory); insert m; return m.Id; } } i am trying to execute these from postman, but throwing below error,how i can authenticate,please help urgent requirement. { "message": "Session expired or invalid", "errorCode": "INVALID_SESSION_ID" } |
Suppose we have the following two identities: $\displaystyle \sum_{k=0}^{n} \binom{n}{k} = 2^n$ $\displaystyle \sum_{k=0}^{n} (-1)^{k} \binom{n}{k} = 0$ The first says that the number of subsets of an $n$-set is $2^n$. The second says that the number of subsets of even size equals the number of subsets of odd size (of an $n$-set). Thus there are $2^{n-1}$ subsets of even length and $2^{n-1}$ subsets of odd length? To combinatorially prove the second identity, let $A$ be a $k$-subset of $[n]$. Then note whether $k$ is odd or even? | Show that $$\sum_{k=0}^n(-1)^k\binom nk=0$$ So for odd $n$ we have an even number of terms. So $\binom nk=\binom n{n-k}$ which have opposite signs. Thus the sum is 0. For even $n$ we have that $$\sum_{k=0}^n(-1)^k\binom nk= \binom n0+\sum_{k=1}^{n-1}(-1)^k\binom nk+\binom nn$$ Now $$\sum_{k=1}^{n-1}(-1)^k\binom nk= \sum_{k=1}^{n-1}(-1)^k\left[\binom{n-1}k+\binom{n-1}{k-1}\right]$$ What would that sum be in the square brackets? |
In games like Factorio, you might notice that when the player is at a certain coordinate relative to the tree, it renders in front of the player, thereby giving the effect that the player is behind the tree. My question is, how is this accomplished? Here are some examples: Behind a telephone pole: In front of one: | I need to render a "tile" game with objects that overlap, because they are taller than the tile they stand on, like the games in these screenshots: I don't know how to render them in the correct order. I intend to perform a sorting operation before every rendering, depending on the object's Y position. However, I'm worried it'll be too expensive, especially since very few objects change their Y positions. Is sorting the most performant way? Is there any other way? What algorithm or data structure should I use? |
Using the fact that if $a$ and $b$ are two distinct elements of order $5$, either $\langle a \rangle \cap \langle b \rangle =\{e\}$ or $\langle a \rangle = \langle b \rangle$, show that $G$ must have an element of order $3$. Do not assume that $G$ is a cyclic group. | Let G be a cyclic group of order 15. Why must G contain at least 2 elements of order 3? Is it to do with Cauchy's theorem? Then once we know that it has one, the inverse of this element has order 3 as well? |
I just installed Ubuntu 14.04 on a new hard drive. When I run sudo apt-get update, I get the following error: W: Failed to fetch http://dl.google.com/linux/chrome/deb/dists/stable/Release Unable to find expected entry 'main/binary-i386/Packages' in Release file (Wrong sources.list entry or malformed file) E: Some index files failed to download. They have been ignored, or old ones used instead. My sources.list file, indeed, makes no mention of any "binary-i386". Should I manually add that line to the file? | I am using Google Chrome 48.0 32-bit. Today when I launched Google Chrome, I got this message: This computer will soon stop receiving Google Chrome updates because this Linux system will no longer be supported I thought Ubuntu 14.04 is supported for five years, what's exactly happening here? And on 64-bit Ubuntu, I get an error from Update Manager and apt-get update: Failed to fetch http://dl.google.com/linux/chrome/deb/dists/stable/Release Unable to find expected entry 'main/binary-i386/Packages' in Release file (Wrong sources.list entry or malformed file) Some index files failed to download. They have been ignored, or old ones used instead. |
In this at 2:25, Sal (the narrator) says that $i^2$ is negative 1 and he didn't explain why. Why is this so? What is the intuition behind it? | Complex numbers involve the square root of negative one, and most non-mathematicians find it hard to accept that such a number is meaningful. In contrast, they feel that real numbers have an obvious and intuitive meaning. What's the best way to explain to a non-mathematician that complex numbers are necessary and meaningful, in the same way that real numbers are? This is not a Platonic question about the reality of mathematics, or whether abstractions are as real as physical entities, but an attempt to bridge a comprehension gap that many people experience when encountering complex numbers for the first time. The wording, although provocative, is deliberately designed to match the way that many people actually ask this question. |
<?xml version="1.0" encoding="UTF-8"?><Request> <Id> here the first tag was written into file followed by xml version, i need that need to write in next line. like below <?xml version="1.0" encoding="UTF-8"?> <Request> <Id> i Have use below code to write the xml into file,please help TransformerFactory transformerFactory = TransformerFactory .newInstance(); Transformer transformer = transformerFactory.newTransformer(); DOMSource source = new DOMSource(document); StreamResult result = new StreamResult(new File( Constants.xmlLocation + Constants.metaDataXmlFileName + format.format(calendar.getTime()) + ".xml")); transformer.setOutputProperty(OutputKeys.INDENT, "yes"); transformer.setOutputProperty( "{http://xml.apache.org/xslt}indent-amount", "5"); transformer.transform(source, result); | I have a Java String that contains XML, with no line feeds or indentations. I would like to turn it into a String with nicely formatted XML. How do I do this? String unformattedXml = "<tag><nested>hello</nested></tag>"; String formattedXml = new [UnknownClass]().format(unformattedXml); Note: My input is a String. My output is a String. (Basic) mock result: <?xml version="1.0" encoding="UTF-8"?> <root> <tag> <nested>hello</nested> </tag> </root> |
I have a few pdf files. There are vector graphics in the maps. How can I use them to be visible and editable in ArcGIS? I want to see the attribute tables content, etc. | I want to convert a GeoPDF that has vectors entity in it to a vector format and preserve the real coordinates of these vectors. The GeoPDF has been exported from ArcMap and has layers in it. I have try GDAL, but it rasterize the PDF before exporting it. Which is not good for me. Also I don't want a solution that would convert this image back to vectors, too complicated for the data I have. Is someone aware of any tool that can do that? The resulting format can be a CAD file or a shapefile or anything that is a vector format. |
By comparison with the integral of $ \frac xae^{-x^{2}}$ Show that $\int_a^\infty e^{-x^{2}}dx≤ \frac 1{2a}e^{-a^{2}} $ Given that $a>0$. | $X \sim \mathcal{N}(0,1)$, then to show that for $x > 0$, $$ \mathbb{P}(X>x) \leq \frac{\exp(-x^2/2)}{x \sqrt{2 \pi}} \>. $$ |
I managed to get $$\sum_{k=0}^n \binom{n+1}{k+1}(-1)^k$$ on the left side, but I don't know how to proceed from here. thanks in advance. | Other than the general inductive method,how could we show that $$\sum_{r=0}^n \frac{(-1)^r}{r+1}\binom{n}{r} = \frac1{n+1}$$ Apart from induction, I tried with to check the validity, but I can't think of an easy (manual) alternative. Please suggest an intuitive/easy method. |
Suppose a PHP script uses methods of class A and then regenerates new source code of class A. If class A is already declared, does PHP provide a method to undeclare class A so that I may re-require the newly created source of class A? By 'already declared' I mean, that the source of a class has been parsed, thus the class name is defined and bound to the class definition. Update 2014-02-22 does provide the . Without using RunKit, there doesn't seem to be a method to undeclared / undefine a class. | Is there any way to redefine a class or some of its methods without using typical inheritance? For example: class third_party_library { function buggy_function() { return 'bad result'; } function other_functions(){ return 'blah'; } } What can I do to replace buggy_function()? Obviously this is what I would like to do class third_party_library redefines third_party_library{ function buggy_function() { return 'good result'; } function other_functions(){ return 'blah'; } } This is my exact dilemma: I updated a third party library that breaks my code. I don't want to modify the library directly, as future updates could break the code again. I'm looking for a seamless way to replace the class method. I've found this that says it can do it, but I'm wary as it's 4 years old. EDIT: I should have clarified that I cannot rename the class from third_party_library to magical_third_party_library or anything else because of framework limitations. For my purposes, would it be possible to just add a function to the class? I think you can do this in C# with something called a "partial class." |
What's the difference between the two? Later the doctors found out that my case was a bit different. Later on the doctors found out that my case was a bit different. Is one more common than the other? | Is there any difference between the usage of 'later' and 'later on'? I'll see you later. I'll finish it later on. |
A continuum is anything that gradually changes from one thing to another. But I want another word that describes something that changes gradually and whose opposite extremes are actually one and the same. Have you ever seen one of those apple charts that describes the many different varieties of apples from sweet to tart? . They call it a spectrum, but a spectrum is not necessarily circular. If the best answer to my question is "circular continuum" or "circular spectrum", so be it. But if anyone can think of a better word or phrase, I'd be interested to hear it. | I'm drafting a text about music theory and, when looking for a way to describe the progress of steps between a note's octaves, the expression "looping spectrum" came to mind. I'm sure something like "note wheel" would be more elegant but, merely for the sake of curiosity: can a spectrum's ends come together? Note: an almost identical question was asked but I'm afraid the answers were not very helpful. |
We recently visited the Netherlands in November 2019, my wife applied for a Schengen visa and was given a multple entry visa which stated schengenstaten. This visa was from November 2019 to November 2020. We were in Netherlands for 3 days We are planning on visiting Lisbon towards the end of next month, but we are unsure whether my wife will need to apply for schengen visa again. We are planning on staying in Portugal for 6 days. VFS Global are saying it should be fine but are also saying as a precaution I should contact the Portuguese consulate to confirm however, I am having an extremely difficult time contacting them and I live 3 hours away from their location in the UK. Would anyone happen to know if this will be okay? Thanks | My wife was just issued a multiple entry visa by France, which is good for one year. Our first trip will be to France, the issuing country. My question is: after we leave the EU and return, must future trips also start in France? Or may we go directly to (say) Greece from the US on a later visit? |
So i installed ubuntu on a flash drive using rufus, but every time i reboot everything gets erased (everything i did in the last session before rebooting.) | I want to make a persistent live Ubuntu USB drive with more than 4GB of storage. I know there is an option of installing directly on the drive but I don't want to do this as it will restrict the drive from working on different computers. One option is to make an additional partition with extra space but if I do this how can I get newly installed software to be stored on this partition? |
I am getting the below error while installing SQL Server, when I've selected the domain account for SQL server engine startup account and press next. (11) 2020-02-16 14:58:48 Slp: Sco: Attempting to check if container 'WinNT://DOMAIN' of user account exists (11) 2020-02-16 14:58:48 Slp: Prompting user if they want to retry this action due to the following failure: (11) 2020-02-16 14:58:48 Slp: ---------------------------------------- (11) 2020-02-16 14:58:48 Slp: The following is an exception stack listing the exceptions in outermost to innermost order (11) 2020-02-16 14:58:48 Slp: Inner exceptions are being indented (11) 2020-02-16 14:58:48 Slp: (11) 2020-02-16 14:58:48 Slp: Exception type: Microsoft.SqlServer.Configuration.Sco.ScoException (11) 2020-02-16 14:58:48 Slp: Message: (11) 2020-02-16 14:58:48 Slp: Access is denied. (11) 2020-02-16 14:58:48 Slp: (11) 2020-02-16 14:58:48 Slp: HResult : 0x84bb0001 (11) 2020-02-16 14:58:48 Slp: FacilityCode : 1211 (4bb) (11) 2020-02-16 14:58:48 Slp: ErrorCode : 1 (0001) (11) 2020-02-16 14:58:48 Slp: Data: (11) 2020-02-16 14:58:48 Slp: WatsonData = Domain (11) 2020-02-16 14:58:48 Slp: DisableRetry = true (11) 2020-02-16 14:58:48 Slp: Inner exception type: System.UnauthorizedAccessException (11) 2020-02-16 14:58:48 Slp: Message: (11) 2020-02-16 14:58:48 Slp: Access is denied. (11) 2020-02-16 14:58:48 Slp: (11) 2020-02-16 14:58:48 Slp: HResult : 0x80070005 (11) 2020-02-16 14:58:48 Slp: Stack: (11) 2020-02-16 14:58:48 Slp: at System.DirectoryServices.Interop.UnsafeNativeMethods.IAdsContainer.GetObject(String className, String relativeName) (11) 2020-02-16 14:58:48 Slp: at System.DirectoryServices.DirectoryEntries.Find(String name, String schemaClassName) (11) 2020-02-16 14:58:48 Slp: at Microsoft.SqlServer.Configuration.Sco.User.LookupADEntry() I am installing SQL server 2016 STD version on Windows Server 2016 OS which is joined to a Domain controller. Note: I can install by selecting Local System as the startup account. later I can change through the configuration manager. I can't do this workaround for Cluster installation. Anybody faced this issue? | I have a SQL Server 2008 instance which I want to use to import data from an Oracle server. I have set up a linked server that works correctly when running simple queries like SELECT * FROM table. However, if I declare a variable or loop through the rows in a table or anything else inside the OPENQUERY, I get errors. Is it possible to do this using OPENQUERY? Do I need additional permissions? |
Just learning Omega 3 and 4 is out so I'm switching to try it out, but.. how does one install a subtheme manually? My drush is whacked and I already running multiple installs so I just want to do it manually. However, copying the "default" folder to the sites/all/themes/ folder... there is no info file... so I duped the one in Omega, changed the name and it shows in the Appearance menu. However, the name isn't correct and I've gone through the few files to see what to change to my themes name but there was only one file. So, I enabled one, it enables, but then when I click "Settings" next to that theme, I get the WSOD. Seems not to be the same process as in D6 or even Omega 3. Anyone installed a subtheme of Omega 4 yet manually? | I'm trying to create a functioning sub theme of Omega 4.4. I've worked with Drush before with it, but the site is on a host that I'm not administrator of. I've tried the but not succeeded in executing the Omega Wizard. In short, the Omega Wizard may be extremely helpful, but I can't get it to work. Next, I've tried to manually create a sub theme using the . However, the results of this is a theme catalogue in the Themes-folder, but the theme not showing up in Drupal. Perhaps I'm using the wrong instructions for the wrong version of Omega? Anyhow, does anyone have instructions for how to install an Omega 4.4 sub theme manually for Drupal 7? |
I have a variable named "event_id" that represents an event number. I want to run the script with a change of this variable from number 1 to number 65000. This means that the script will run in cycles and each time the variable "event_id" will increase the number by 1 until it reaches 65000. event_id="1" curl -k -u api:1234 https://localhost 'search=index=test eventid='$event_id'' Please your help | How do I iterate over a range of numbers in Bash when the range is given by a variable? I know I can do this (called "sequence expression" in the Bash ): for i in {1..5}; do echo $i; done Which gives: 1 2 3 4 5 Yet, how can I replace either of the range endpoints with a variable? This doesn't work: END=5 for i in {1..$END}; do echo $i; done Which prints: {1..5} |
Show that norm in $ \ell_{\infty} /c_0 $ is $||\overline{x} ||= \text{lim sup}|x_i|$ for each $x=(x_i)_i \in \ell_{\infty} $. I'm doing $$||x_n+c_0||= \text{inf}_{y_n \in c_0}||(x_n)+(y_n)||_{\infty}= \text{inf}_{y_n \in c_0 } \text{sup}_{n \in \mathbb{N}}|(x_n)+(y_n)|$$ I do not know what to do now. I thought to fix $y_n$ and use $y_n \to 0$, but I can not get anywhere. | I try to show that the norm on the quotient space $\ell^{\infty}(\mathbb{N}) / c_0 (\mathbb{N})$ is given by $\limsup_{n \in \mathbb{N}} |x_n|$, where $x = (x_n)_{n \in \mathbb{N}} \in \ell^{\infty} (\mathbb{N})$. My attempt is the following: By definition, the quotient norm $\| \cdot \|_{\ell^{\infty} / c_0}$ is defined as $$ \| x + c_0 (\mathbb{N}) \|_{\ell^{\infty} / c_0} = d( x + c_0 (\mathbb{N}), 0 + c_0 (\mathbb{N}) ), $$ which can be re-written as $$ \| x + c_0 (\mathbb{N}) \|_{\ell^{\infty} / c_0} = \inf \{ \| x + y \|_{\infty} \; | \; y \in c_0 (\mathbb{N}) \}. $$ Since $0 = (0,0,...) \in c_0 (\mathbb{N})$, it follows that $$ \| x + c_0 (\mathbb{N}) \|_{\ell^{\infty} / c_0} \leq \| x \|_{\infty} = \sup_{n \in \mathbb{N}} |x_n|. $$ I thought about using Bolzano-Weiserstrass' Theorem at a certain point, but I am not sure how to obtain the wished equality from here. Any help is appreciated. Thanks in advance. |
I am using Ubuntu 18.04, and I need to install in my machine i tried: sudo snap install --classic vscode but it didn't work. | I just downloaded VSCode-linux-x64 from . It's a 62 MB zip file. How can I install it on my Ubuntu system? |
Let $G$ be a finite group and $H$ be a subgroup of $G$. Show that if $aH$ intersect $bH$ is not empty, then $aH$ and $bH$ contain an equal number of elements in $G$. Conclude the number of elements in $H$ divides the number of elements in $G$. | I'm trying to get some intuition on why order of a subgroup divides order of a group. I know Lagrange's Theorem and its proof (every element of a group is an element of some coest, cosets are disjoint and each one has the same number of elements as subgroup), but the proof is more like magic than any intuition. So I've been trying to prove this fact (divisibility of order) without Lagrange theorem. Let's say we take a group $H$ and try to extend it, by taking $g \notin H$ and considering group $G$ generated by set $H \cup {g}$. Such a group would have to contain $g^{-1}$ and every word over alphabet $\{g, g^{-1}, H\}$. Is it possible to prove intuitively that such construct is of size $|H|\cdot n$ for some $n \in \mathbb{N}$? This would essentially prove that any group $G$ containing $H$ has order divisible by $|H$|, because we would be able to take $g \in G$ such that $g \notin H$, extend $H$ by it just like above and continue this process until $H$ is extended into $G$. |
I'm looking for a story I read about 40 years ago in which there is memory retaining glass... At first people place sheets of the glass in lovely places, so that it can be fitted into a window frame and give the house's owners a lovely view, with e.g. birds flying over, weather, etc. Later in the story the uses turn a little more sinister and particles of the glass are used to spy on people - one thing I remember is a woman brushing her husband's shoulders for glass to see if he's been unfaithful! - but I think the implication (if it wasn't stated) was that once all privacy is gone, how we live changes radically. (Implications for social media and tracking technology... I'd love to read this now! Some ideas just haunt you...) Does anyone know this story and where I can find it? | Sorry I don't recall much about this at all. A friend, who had recommended many other books/authors I ended up liking, told me about a story in which a scientist develops some kind of special glass, that had some property like slowing down light by a factor of a trillion, or something else odd like that, adventure ensuing. He's since moved away, and now I'm wondering what this book might have been. |
While working today on my current project which involves a bit of kitbashing I noticed the following visual imperfections while viewing the models from afar. This does not happen at all when viewing the same model from close. You can see how the face orientation looks in the second pic. I would like to know if I can get rid of this disturbing effect since I do not want it to transfer to the final model? Thanks. | I don´t know if this is a bug only to me or a common problem, for I don´t know why it occurs. I had a problem once before where some edges of my model got jagged with black holes when switching to rendered mode (or actual rendering). Answers I got said that I modeled in too much detail or too small, and used the combination Subdiv Modifier/Auto Smooth/sharp edges wrong. Now I have a way more problematic thing. I have a really simple scene, but most of the edges have this annoying jagged problem. I build this model in a higher scale (since the last one was too small). I used the Subdiv Modifier/Auto Smooth/sharp edges again, but if I toggle on/off the Subdiv Modifier/Auto Smooth/sharp edges/seams, shade smooth/flat, won´t help at all. These artifacts just keep showing. Does anyone know why this occurs? Shaded Flat and zoomed in for a better look on the artifact. My hardware specs are GPU: Asus M5A78L-M LX3 GPU: NVidia GTX 750 StormX OC CPU: AMD FX6300 @ 3,5 GHz 8 GB RAM Windows 7 Professional 64-bit |
I am having a hard time understanding why the following query is not working? select id,sold_dealer_id from myi_corporate where sold_dealer_id != 36; When I do the following I am getting the result select id,sold_dealer_id from myi_corporate where sold_dealer_id = 36; However for != I am not getting the opposite results. I am returning to psql after a long time after using MongoDB and might have forgotten the basics. Any suggestion is much appreciated | Inspired by a StackOverflow question (). Is there a DBMS that actually supports the = NULL syntax? |
I have 2 ubuntuone accounts. I am logged it to the first I created, and my ubuntu natty pc folders are synced with that account. I want to switch my ubuntu pc to the second account, but I can't find the way. If I disconnect from the first account, the client should give me the possibility to choose another account; on the contrary, I can't see any way to change the account data. Am I blind? | I would like to use 1 account for keeping private files synchronised and another for business files, which will be read by others. I have different e-mail addresses for business and private. The private arrangement is between home, office and laptop. The business arrangement is between these plus business partners. I have tried setting up this arrangement but my efforts are not successful. Is thus possible? If so, how do I instruct the Ubuntu One Manager which folder should be synchronised in which account? |
I have a website with a separate version for mobile and smart phones but the user cannot open the mobile version from Desktop and vise versa the Desktop version cannot opened from Mobile device(s). Shall i make both version and specially the mobile version indexed by search engines? | Hearing about the problems with mobile browser detection I plan to add a button to my site which enables the users to switch manually between normal/mobile version of the site. The button sets a cookie and reloads the page and the PHP code on the server side seeing the cookie serves exactly the same page with only the CSS link pointing to the mobile stylesheet file. I heard Google is able to follow javascript code too, so it may "push" the button and sees the mobile version of the site. Wouldn't it confuse Google that it sees exactly the same page (same URL, same content) with only a the CSS link replaced? Wouldn't it consider it duplicate content? |
Are there any weight loss benefits for splitting meals into smaller meals, other than getting less hungry because of more frequent consumption? Apparently metabolism increases, but this is deemed a myth. | I wonder if there any difference in how many times I eat per day? Let's say I eat one big meal in the morning at 2000 kcal (at 9am). Is that any different than having 4 meals at 500 kcal throughout the day (at 9am, 1pm, 5pm, 9pm)? I think I will be hungry by the end of the day if I eat just once in the morning. But I won't be hungry if I eat 4 times a day at smaller portions? How is that possible? Which way is it better to eat? Maybe twice a day at 1000 kcal? (9am and like 4pm?) |
Wouldn't requiring everyone to register weed out a lot of flaky people? What is the "benefit" of allowing people to ask questions without registering first? | I know SO's policy is "you don't have to register to ask questions," but there are so many new members and so many hit-and-runs... The majority of the questions I see now are coming from new users (i.e., it's their first question). Although unregistered users should still be able to ask questions, I think we should encourage users to create an account. Here is a couple of ways we could do that: Explicitly encourage people to get an account: there's currently nothing telling people to do that. Maybe tell people something like "Get an account, it's easy!" and maybe show some of the perks of having an account (and having rep). Maybe give a few bonus points for registering; and have that enable a basic privilege. It could be taken from one of the , for example. Of course getting people to register is just half of the battle. I don't know what the stats are on this, but I think there's a number of users who create multiple accounts anyways. We could curb that by: Having smart(er)? duplicate account detection systems, alerting someone who is about to create a new account and possibly has an account already. Give them a message like "Hey, it looks like you already have account, are you sure you want to create a new one?" Create a new privilege (10k? 20k?) that gives users tools to detect possible duplicate accounts, eg: "List users with the same e-mail," "List users with the same IP addresses," etc. (without revealing said emails and IPs). Then the 10k/20k can look at other stuff (e.g.: posts) and refer the new user to a moderator for a possible merge. |
I have restored one db of one instance from uat to anthother dev instance of the same server but how to fix orphan users I got 106 users how to fix and how to create logins is there any script for this scenario | It's fairly straight forward to fix up a single orphaned SQL user to a login using: EXEC sp_change_users_login 'Auto_Fix', 'user' I could script this, but is there an existing stored procedure which automatically tries to fix up every orphaned user in a given database? |
$$ a = b $$ $$ a^2 = ab $$ $$ a^2 - b^2 = ab - b^2 $$ $$ (a+b)(a - b) = b(a - b) $$ $$ a + b = b $$ $$ 2b = b $$ $$ 2 = 1 $$ Does the self-reference to the original formula make this path of argument invalid? I am confused as to what's going on here. Would this be a better continuation from $a + b = b$: $$ a + b = b \implies a = 0 \implies b = 0$$ | I have a "proof" that has an error in it and my goal is to figure out what this error is. The proof: If $x = y$, then $$ \begin{eqnarray} x^2 &=& xy \nonumber \\ x^2 - y^2 &=& xy - y^2 \nonumber \\ (x + y)(x - y) &=& y(x-y) \nonumber \\ x + y &=& y \nonumber \\ 2y &=& y \nonumber \\ 2 &=& 1 \end{eqnarray} $$ My best guess is that the error starts with the line $2y = y$. If we accept that $x + y = y$ is true, then $$ \begin{eqnarray} x + y &=& y \\ x &=& y - y \\ x &=& y = 0 \end{eqnarray} $$ Did I find the error? If not, am I close? |
I don't recall this well from linear algebra so I just need some quick confirmation. If $A$ is an $n \times n$ matrix and B is also $n \times n$ and $AB=I_n$ does it follow that also $BA=I_n$? I think no but then what do we call inverse matrix: the left inverse, or the right one, or only when the left and right are the same we talk about inverse matrix of $A$? Also, do we define inverse matrices of non-square matrices? | If $A$ and $B$ are square matrices such that $AB = I$, where $I$ is the identity matrix, show that $BA = I$. I do not understand anything more than the following. Elementary row operations. Linear dependence. Row reduced forms and their relations with the original matrix. If the entries of the matrix are not from a mathematical structure which supports commutativity, what can we say about this problem? P.S.: Please avoid using the transpose and/or inverse of a matrix. |
Yesterday, on Stack Overflow, I gave some constructive criticism to a user, when I downvoted (how foolish of me, I know!). Unfortunately as some users do, my point was taking poorly; in this case it was advice that a WHILE loop in T-SQL would perform awfully vs a set-based method and provided a couple of fiddles to do so (which evidenced a huge performance difference). After a few comments I disengaged as the other user wasn't going to listen and also started to throw play ground insults out; I flagged the comments, moved on. Unfortunately, they decided to instead start posting comments on my website (which he would have found via my profile). One of these said "Stupid Prostitute" in Turkish, another was the "Right Clicker" insult they were throwing at me in the answers comments, and also the swear word for "poo". Now, these don't offend me, this is just a small troll on the internet, but the behaviour is clearly not something that any SE community would want. They clearly aren't going to contribute constructively to any communities. I realise that I "technically" have no proof, however, the fact that they hurled the same insult is a good indicator. Does SE have an opinion on such user behaviour, even though they've moved off site? | Someone mentioned in chat the possibility of interpersonal conflicts between Stack Exchange participants spilling over into the real world and resulting in socially inappropriate behavior off-site. Does the Code of Conduct (CoC) regulate our behavior off-site as it pertains to interactions with or affecting the community or company? Another way of asking the same question is whether the CoC has extraterritorial jurisdiction. For example, if I want to post a message on Reddit about my experiences on Stack Exchange, is it sufficient to obey Reddit's code of conduct or do I need to be concerned about potentially being suspended on Stack Exchange if my behavior would have been improper if it had been done here? There are arguably two main possible scenarios here: The behavior would be in violation of the CoC if done here, but is allowed according to the rules of the venue in which it is actually performed. The behavior is a violation both here and there, but the other venue already has a system in place to investigate violations and issue sanctions (e.g. being banned from Reddit, having one's Tweets drastically rate-limited, expulsion from a university, being escorted out of the mall, etc.). In law, this principle is sometimes referred to as "double criminality". If Stack Exchange's response would be different depending on which of the above happens, what is the rule? In response to a comment by Tinkeringbell, if I want to interact with Stack Exchange participants off-site and/or engage in behavior potentially affecting them, do I have to follow the SE CoC in order to not get banned here or do I simply need to obey the rules of the venue where I am? In response to a comment by Sonic, Wikipedia's concept of "off-wiki harassment" could apply here. That is, does Stack Exchange prohibit or provide for specific remedies for "off-Stack harassment" or does it defer such off-site activity to the codes of conduct of the places where said harassment might occur (e.g. if someone uses Wikipedia as the venue to engage in a harassment campaign against a Stack Exchange user, then Stack Exchange will refer and defer any complaints about said harassment to Wikipedia)? |
In paragraph V.1 of Algebra proposition 1.7 Lang claims that the class of algebraic extensions is distinguished. I know that if $F/k$ and $E/F$ are algebraic extensions than so is the $E/k$ - that is easy to prove. However, the second required property is that if $E/k$ is algebraic and $F/k$ is arbitrary, then (assuming the compositum is defined) $EF/F$ is algebraic. Lang more or less skips the proof of this, only saying that "an element remains algebraic under lifting, and hence does the extension." However, there are no finiteness conditions here and no element given in advance. Although $EF$ is generated over $F$ by a set of elements which are algebraic over $F$ (namely, all the elements of $E$), there are no facts known (up to this point in the book at least) about the infinitely generated extensions. What am I missing? Thank you. | Suppose $K$ is a field, and $K\subset E$ is an algebraic extension, and $K\subset F$ is any extension. Suppose that $L$ is some field which contains both $F$ and $E$ as subfields. I want to show that $FE$ (the smallest subfield of $L$ containing both $F$ and $E$) is algebraic over $F$. Lang mentions that the result is true because an element remains algebraic under lifting, but I can't prove the claim with this. I interpret his comment to mean that if $x\in E$ is algebraic over $K$, then $x\in FE$ is algebraic over $F$. This is certainly true. But this doesn't seem enough if I start with any element of $FE$. |
I don't get the idea behind it. There are some things in the truth table which disturbs me. As if $A$ is false, the $A\Rightarrow B$ is always true. I read that implication was the negation of ($A \land (\neg B) $). Thus indicating that if $A$ is true and $B$ false, then the implication is false and that is all we care about, the other cases are just a consequence of the definition. Is this right? | Provided we have this truth table where "$p\implies q$" means "if $p$ then $q$": $$\begin{array}{|c|c|c|} \hline p&q&p\implies q\\ \hline T&T&T\\ T&F&F\\ F&T&T\\ F&F&T\\\hline \end{array}$$ My understanding is that "$p\implies q$" means "when there is $p$, there is q". The second row in the truth table where $p$ is true and $q$ is false would then contradict "$p\implies q$" because there is no $q$ when $p$ is present. Why then, does the third row of the truth table not contradict "$p\implies q$"? If $q$ is true when $p$ is false, then $p$ is not a condition of $q$. I have not taken any logic class so please explain it in layman's terms. Administrative note. You may experience being directed here even though your question was actually about line 4 of the truth table instead. In that case, see the companion question And even if your original worry was about line 3, it might be useful to skim the other question anyway; many of the answers to either question attempt to explain both lines. |
My computer started rebooting when ever it would come up to the windows screen or otherwise would just never load. So I reinstalled windows. Three days later I boot it up and it says Reboot and select proper boot device. So I checked the bios and it has the hdd as the first boot option. When I restarted it came up with the option for safe mode or normal, either one I chose it would begin loading and than reboot to give same message. I reinstalled windows and it ran fine for three days, after I booted it up a second time windows ran slow, so I restarted and again it's having the same issue with it saying Reboot and select proper boot device. OS: windows 7 home ultimate. Ram: 3 gb Hdd: sata 500gb Processor: pentium core duo 2.0 ghz | My computer no longer boots Windows or the installed operating system. Instead, I may get this error: PXE-E61: Media test failure, check cable -or- Check cable connection! PXE-M0F: Exiting PXE ROM. and/or one of the following messages or similar: Operating System not found No boot device available- No bootable devices--strike F1 to retry boot, F2 for setup utility No bootable device -- insert boot disk and press any key No Boot Device Found. Press any key to reboot the machine Default Boot Device Missing or Boot Failed Reboot and Select proper Boot device or Insert Boot Media in selected Boot device What does this mean and what can I do? This question comes up often and the answers are usually the same. This post is meant to provide a definitive, canonical answer for this problem. Feel free to edit the answer to add additional details. |
I fermented 5 gallons of cider from 1.044 to 1.0. It's very tart, so I want to add 2 lbs of honey to sweeten it up. I also want to bottle it with some carbonation. How do I prevent the honey from fermenting it back down to 1.0 and still sweeten the cyser? I looked at carbonation tablets, but they just appear to be modified sugar cubes. If I stop the fermentation with Campden, can I still bottle carb it? | I've just finished my primary fermentation and have produced a cider that is coming in at 5.2%. I am about to bottle my cider and add some priming sugar to give it a bit of a fizz. I would like to try and flavor some of the ciders with a fruit coulis. am I correct in thinking that the natural sugar in the fruit should give the cider a natural fizz and I don't need to add any sugar? Also, I am a fan of a sweeter cider, I have been advise not to add more than a teaspoon of priming sugar, and to use a sugar substitute at the same stage if i wish to sweeten it. I have purchased Xylitol, I plan on trying a few combinations with the priming sugar/Xylitol & no additive fruit coulis. Does this all sound like it makes sense or am I just going to ruin my cider. |
How hot is it in Italy on June? Can I wear tank tops and short pants? Please consider that I'm from South East Asia with very hot weather. These are the places where I'm going: Pisa Cinque Terre Florence Venice Rome I checked the weather online but not really sure on how it feels like. | I am interested in hiking this fall in France and camping along the way. In order to figure what gear I need to pack to camp (particularly for the sleeping bag), I would like to know what temperatures to expect. I am interested in historical temperatures to figure the usual temperature and I might look at them for other seasons. If that matters, I am thinking about hiking in the Pays Basque (South West of France), the mountainous part. Where (ideally online and for free) can I find such data? Are there resources that cover Europe, or even the whole world? |
Let $f(z)$ be analytic on the unit disc, and suppose that there is an annulus $U = \{z ∈ C \mid r < |z| < 1\}$ such that $f(z)$ restricted to the annulus $U$ is injective. Show that $f$ is injective on the unit disc. I tried to show that $g(z) = f(z) - f(z_0)$ has only one zero in the unit disk, but how can I use the hypothesis of the annulus? | Is the following statement true? Suppose, $ f:D\to \mathbb C $ is an analytic function where $ D $ is the unit disc of radius $ 1 $ around $0 $. Suppose, $ f $ is analytic on the boundary of $ D $ as well. Then prove that, if $ f $ is one-one on the boundary of $ D $, then $ f $ is one-one on $ D $. P.S. I think I got a solution. But I was wondering if this problem has a trivial solution. Here is my solution, since nobody has posted a solution yet:- Suppose, $ \gamma $ is the boundary of $ D $(assuming $ \gamma(t)=e^{2\pi it} $). Then $ f\circ \gamma $ is a simple continuously differentiable curve. So by Jordan curve theorem, $ f\circ \gamma $ divides $ \mathbb C $ into 2 path connected regions $ A_1, A_2 $ such that if $ a\in A_1 $, then $\int_{f\circ \gamma} \frac {1}{z-a} dz=2\pi i$ and if $ a\in A_2 $, then $\int_{f\circ \gamma} \frac {1}{z-a} dz=0$. So, $ f(z)=a $ for some $ a\in A_1,z\in D $ implies $ \int_{\gamma} \frac {f'(z)}{f(z)-a} dz=2\pi i $. So $ f(z)=a $ has only one solution in $ D $. Similarly if $ a\in A_2 $, then $\int_{\gamma} \frac {f'(z)}{f(z)-a}=0 $, so $ f(z)=a $ has no solution in $ D $. If $ f(z)=a $ for some $ z\in D, a\in f\circ \gamma $, then by open mapping theorem, $ f(z)=a' $ for some $ z\in D, a'\in A_2 $, which is not possible. So $ f $ is one-one in $ D $. |
I have the following table representing my acronyms. Due to the length of the table, the table does not break at the end of the page. \documentclass[12pt,a4paper, draft, oneside]{book} \begin{document} \section*{Acronyms} \begin{table}[H] \begin{tabular}{ll} 2D & 2-Dimentional \\[2ex] 3D & 3-Dimentional \\[2ex] BA & Bundle Adjustment \\[2ex] CRF & Conditional Random Field \\[2ex] DLT & Direct Linear Transformation \\[2ex] DOF & Degrees of Freedom \\[2ex] DPM & Deformable Part Model \\[2ex] EO & Exterior Orientation \\[2ex] EP\textit{n}P & Efficient Perspective-$n$-Point Algorithm \\[2ex] FOV & Field of View \\[2ex] FPS & Frames per Second \\[2ex] GCP & Ground Control Point \\[2ex] HOG & Histogram of Orientated Gradients \\[2ex] ICP & Iterative Closest Point \\[2ex] IO & Interior Orientation \\[2ex] IP & Infrared \\[2ex] iif & if and only if \\[2ex] i.i.d & independent and identically distributed \\[2ex] LM & Levenberg-Marquardt \\[2ex] LS & Least-Squares \\[2ex] MRF & Markov Random Field \\[2ex] MVEE & Minimum Volume Enclosing Ellipsoid \\[2ex] P\textit{n}P & Perspective-$n$-Point Algorithm \\[2ex] PCA & Principal Component Analysis \\[2ex] RMS & Residual Mean Square Error \\[2ex] SSVM & Structured Support Vector Machine \\[2ex] SVM & Support Vector Machine \end{tabular} \end{table} \end{document} | I have a table that takes up a full page, but I want it to start on a page that already has some text and then continue onto the next page (i.e. it's ok if the table gets broken up and spans two pages). It is a simple two column table: \begin{table}[h] \centering \begin{tabular}{| p{.20\textwidth} | p{.80\textwidth} |} \hline foo & bar \\ \hline foo & bar \\ \hline ... \end{tabular} \end{table} I guess I need longtable? How do I use it? |
I am using a simple PHP script to send mail. But my emails are going to the spam folder. Sender of the received mail in spam folder is listed as: [email protected] via pro10.winwinhosting.com And the email message is showing this warning: Why is this message in Spam? We've found that lots of messages from pro10.winwinhosting.com are spam My PHP script looks like this: $email_to = $_SESSION['email']; $email_subject = "Mail Subject/#/ "; $message = "Some message"; $headers = 'MIME-Version: 1.0' . "\r\n"; $headers .= 'Content-type: text/html; charset=iso-8859-1' . "\r\n"; $headers .= 'From: ABC <[email protected]>' . "\r\n"; mail($email_to, $email_subject, $message, $headers); | This is a tricky one and I've always relied on techniques, such as permission-based emails (i.e. only sending to people you have permission to send to) and not using blatantly spamish terminology. Of late, some of the emails I send out programmatically have started being shuffled into people's spam folder automatically and I'm wondering what I can do about it. This is despite the fact that these particular emails are not ones that humans would mark as spam, specifically, they are emails that contain license keys that people have paid good money for, so I don't think they're going to consider them spam I figure this is a big topic in which I am essentially an ignorant simpleton. |
I have an external HDD connected to my MBP (2016 model). Everytime the machine goes to sleep I get the "Disk Not Ejected Properly" message, which I find annoying. There doesn't seem to be a real problem. The drive is reconnected and accessible so it seems to be just annoying. The questions are: Is this really just something annoying, or is there an actual problem with this? How can I make the notifications go away? The HDD is a "LaCie Porsche Design Mobile Drive - 1 TB" I have seen this question: but it is rather old, blames the behavior on a special brand of hdd and also is about the drive not being usable, so I think my question is different. | Been running El Capitan since it was officially released. Updated to 10.11.4 a few days ago. I have a WD Elements USB 3.0 drive connected to my Mac mini (directly to the rear ports, not via a hub). Ever since the update to 10.11.4 whenever my Mac goes to sleep and I wake it up again, I get a notification to say the "Disk was not ejected properly". This has never happened with this drive before, not on Mountain Lion, Mavericks, Yosemite or El Capitan until now. I have another external caddy also with a full size 3.5" drive in it. This is powered by the mains. It seems to me that the Mac is now terminating power to the USB 3.0 port prematurely (before the disk has had a chance to unmount properly ?), I do not get the message for my full-size disk that is permanently powered. Tried adding the disk to the spotlight ignore list but to no avail. Anyone else notices this issue? |
I'm rather new to ubuntu and linux in general, so bear with me. I'm trying to put abode flash on firefox manually, and to do so I think I need to copy and paste a few things into a certain folder that I need root access to. I'm running ubuntu 17.10. I've tried: sudo nautilus which gives me No protocol specified Unable to init server: Could not connect: Connection refused (nautilus:1130): Gtk-WARNING **: cannot open display: :0 and gksudo nautilus which gives me a popup message which says "unable to copy the user's Xauthorization file" any help would be appreciated | I installed Ubuntu 17.10. Now I am having trouble with gksu: $ gksu -dg synaptic No ask_pass set, using default! xauth: /tmp/libgksu-HgUjgQ/.Xauthority STARTUP_ID: gksu/synaptic/8760-0-alex-XPS-15-9530_TIME4974977 cmd[0]: /usr/bin/sudo cmd[1]: -H cmd[2]: -S cmd[3]: -p cmd[4]: GNOME_SUDO_PASS cmd[5]: -u cmd[6]: root cmd[7]: -- cmd[8]: synaptic buffer: -GNOME_SUDO_PASS- brute force GNOME_SUDO_PASS ended... Yeah, we're in... Unable to init server: Could not connect: Connection refused (synaptic:8767): Gtk-WARNING **: cannot open display: :1 xauth: /tmp/libgksu-HgUjgQ/.Xauthority xauth_env: (null) dir: /tmp/libgksu-HgUjgQ If I don't use -g, the password dialog is disabled. So looks like a problem with creating a tty for root. Any advice? |
Is it "southern California" or "Southern California?" The word "southern" is not part of the official name of California or any city or county, so I never capitalize it. It only loosely defines a region of California and its border is not officially defined either. However, I was recently advised by someone who I consider to be educated to capitalize "southern" in this context. Did I miss the memo on this issue? Is "Southern California" considered a proper noun? | I am trying to capitalize Western Canada or western Canada properly and am wanting a definition for when the "ern" is added as a suffix to a locational distinction of a proper noun. I believe the capitalization is related to the suffix and am grouping two questions. After researching on the internet I have found a trend that areas of discrete area become capitalized along with their proper noun East New York West Hollywood East London (Britain) East Los Angeles Some locations have "ern" added to their locational modifier. Web Examples (from government sites): eastern Canada ( Western Canada () All the examples listed contain discrete areas. The "ern" suffix is used for larger areas, but I am unable to determine when an area becomes large enough. |
Regex testing for special characters, decimal except for hyphen, commas, alpha-numeric. Attempt ^(\+|-)?([0-9]+)$/ I'm trying to write a regex to match special characters, decimal except for commas, a hyphen, alpha-numeric. | I don't really understand regular expressions. Can you explain them to me in an easy-to-follow manner? If there are any online tools or books, could you also link to them? |
I am travelling to France from Singapore next month (I am not a Singapore National and my nationality requires visa to enter France). My flight itinerary is Singapore -> Frankfurt, Germany -> France I am currently in the process of applying France Schengen visa. Do i need another visa from Germany for my transit? | I found many related questions on this site but I am still not sure about the rules. How can I decide if I need a visa to transit? Schengen members as of May 2021 are as follows: Austria Belgium Czech Republic Denmark (excluding Greenland and the Faroe Islands - but an open border with the Schengen Area is maintained) Estonia Finland France (excluding overseas departments and collectivities) Germany Greece Hungary Iceland Italy Latvia Liechtenstein Lithuania Luxembourg Malta Netherlands (excluding Aruba, Curaçao, Sint Maarten and the Caribbean Netherlands) Norway (excluding Svalbard) Poland Portugal Slovakia Slovenia Spain (except Ceuta and Melilla) Sweden Switzerland |
We have a class with a static int property that we use for counting executions of certain methods within that class. At the moment, we simply add increment code to each property we wish to track. It would be cleaner if we could simply add an attribute to the method and then have the increment happen behind the scenes. If this is even possible, I'd imagine you do something like this: private static int StepCount { get; set; } [PreStep(ClickCounter())] public void MyMethod() { } private ClickCounter() { StepCount++; } Anyone know if this sort of thing is possible? | Is there a way in C# or .NET in general to create an attribute on a method which triggers an event when the method is invoked? Ideally, I would be able to run custom actions before and after the invocation of the method. I mean something like this: [TriggersMyCustomAction()] public void DoSomeStuff() { } I am totally clueless how to do it or if it possible at all, but might do a similar thing in the background. I am not sure though. EDIT: I forgot to mention that due to the circumstances of my specific case, performance is not really an issue. |
Whilst creating a balance sheet for a lotto syndicate, I encountered this phenomenon; Note the negative zero value in D5. With no formatting, its actual value is -0.0000000000000230926389122033 even though all other numbers in the sheet have no more than one or two decimal places. The formula in D5 (as it is in all of column D) is; =IF(A5="Bank",D4,IF(A5="Lotto",D4+B5,D4-B5)) If I replace the formula with a simple =D4-B5 it returns a true zero, so the tiny value seems to be coming from the nested IF. But why? And can it be avoided? Example workbook available here: | Firstly I do not want to round my numbers, I am using base 10 figures so excel should have no bother doing simple add and subtract. A| 665.110000000000000000000000000000 B| 4.990000000000000000000000000000 C| =a1+b1 D| 670.790000000000000000000000000000 E| 1,335.890000000000000000000000000000 F| =e1-(c1+d1) I should get -5 however F1 returns -4.999999999999770000000000000000 It is a financial document therefore I want to avoid rounding, more to the point. Why should I need to? I've put cell formatting to Currency with 2 decimal placed and I will get the correct display value but for all calculations I will still get -4.9999...7 which leads to further errors with conditional formatting etc. |
How can i find matching element in array, for example i want to find word in array element "Black" Array element is : ["Black footbal scarf"] So i understand how to match this by converting array to string, but how can i do it exactly with array elements var color = "Black"; var arr = ["Black footbal scarf", "Blue footbal scar", "Red footbal scar"]; //Converting to string WORKS alert(arr.join("").indexOf(color)); alert(arr.indexOf(color)); So i need to get array index of the color from variable. | What is the most concise and efficient way to find out if a JavaScript array contains a value? This is the only way I know to do it: function contains(a, obj) { for (var i = 0; i < a.length; i++) { if (a[i] === obj) { return true; } } return false; } Is there a better and more concise way to accomplish this? |
I have multiple tables with with varying names for the same piece of data. For example, day vs business_day. I'd like to identify what column names exist for which table. I think this can be done using schema information, but I'm not familiar with it. For simplicity, the tables below are 3 separate tables with these column names. table_1 day city weather table_2 business_day location status table_3 day city rain Where day and business_day and city and location are the same piece of information, but unfortunately different naming conventions so I wouldn't be able to use the same selection criteria in a WHERE clause. I'd like to search the table information to see which tables have day or business_day and city or location. The other columns are not important to me in this example. How can I identify table information in this way? | I'm looking for a precise piece of information in a database which I have no knowledge about. The database is on a separate machine, but I can log into it, and launch a psql command line, with administrator rights. It's a third-party product, and they are slow to answer questions. I know the data is inside that database, so I want to do a little bit of reverse-engineering. Given a table name, is it possible to get a list of the names of the columns in that table? For example, in SQL Server, it's possible to dump a table into a reusable CREATE statement, which textually lists all the columns the table is composed of. |
Pixies have an altitude limit of one, meaning they can only ever be one square high when they end their turn. But if the party comes upon something like a chasm or a large pit, can the Pixie end their turn flying above the drop without falling, since they aren't technically increasing their altitude above the limit? | In the pixie description on the compendium: Altitude Limit: You fall at the end of your turn if you are using your racial fly speed and are more than 1 square above the ground (see the rules for flying and falling in the Rules Compendium). So can a pixie choose to go two or more squares above the ground? Here are the relevant rules from the compendium: Fly speed: A creature that has a fly speed can fly a number of squares up to that speed as a move action. If it is stunned or knocked prone while flying, it falls. See also “Flying” and "Hover". Flying: Flight Some creatures have the innate ability to fly, whereas others gain the ability through powers, magic items, and the like. The rules for flight in the DUNGEONS & DRAGONS game stress abstraction and simplicity over simulation. In real life, a flying creature’s ability to turn, the speed it must maintain to stay aloft, and other factors put a strict limit on flight. In the game, flying creatures face far fewer limitations. FLIGHT Flight follows the basic movement rules, with the following clarifications. Fly Speed: To fly, a creature takes the walk, run, or charge action but uses its fly speed in place of its walking speed. A creature that has a fly speed can also shift and take other move actions, as appropriate, while flying. Moving Up and Down: While flying, a creature can move straight up, straight down, or diagonally up or down. There is no additional cost for moving up or down. Falling Prone: If a creature falls prone while it is flying, it falls. This means a flying creature falls when it becomes unconscious or suffers any other effect that knocks it prone. The creature isn’t actually prone until it lands and takes falling damage. Remaining in the Air: A flying creature does not need to take any particular action to remain aloft; the creature is assumed to be flying as it fights, moves, and takes other actions. However, a flying creature falls the instant it is stunned, unless it can hover. Landing: If a creature flies to a surface it can hold onto or rest on, the creature can land safely. Terrain: Terrain on the ground does not affect a flying creature if the terrain isn’t tall enough to reach it. Because of this rule, flying creatures can easily bypass typical difficult terrain, such as a patch of ice on the ground. Aerial terrain can affect flying creatures. Crashing Falling while Flying: If a creature falls while it is flying, it descends the full distance of the fall but is likely to take less damage than a creature that can’t fly. Subtract the creature’s fly speed (in feet) from the distance of the fall, then figure out falling damage. If the difference is 0 or less, the creature lands without taking damage from the fall. For example, if a red dragon falls when it is 40 feet in the air, subtract its fly speed of 8 (8 squares = 40 feet) from its altitude. The difference is 0, so the dragon lands safely and is not prone. If a creature is flying when it starts a high-altitude fall, it has one chance to halt the fall by making a DC 30 Athletics check as an immediate reaction, with a bonus to the check equal to the creature’s fly speed. On a success, the creature falls 100 feet and then stops falling. On a failure, the creature falls as normal. High-Altitude Falls: Some encounters take place very high above the ground. In such an encounter, it is possible for a creature to spend more than one round falling to the ground. As a rule of thumb, a creature falls up to 500 feet during its first turn of falling. If it is still falling at the start of its turn, it can take actions on that turn as normal, then falls up to 500 feet at the end of the turn. If none of those actions expressly halts a fall, the creature falls up to 500 feet at the end of the turn. This sequence continues until the creature lands. |
We define the $n^{th}$ Fibonacci number as $a_1 = a_2 = 1$ and $a_n = a_{n-1} + a_{n-2}$ for $n \geq 3$. Consider $$ \lim_{n \to \infty} \frac{a_{n+1}}{a_n}. $$ I wrote a script and found that this limit converges to the golden ratio $\phi \approx 1.61803$. However, I'm having trouble giving a rigorous proof for this. Here's what I have so far: $$ \lim_{n \to \infty} \frac{a_{n+1}}{a_n} = \lim_{n \to \infty} \frac{a_n + a_{n-1}}{a_n} = \lim_{n \to \infty} \left( 1 + \frac{a_{n-1}}{a_n} \right). $$ I'm unsure of how to proceed after this. I know that expressing the limit as a certain continued fraction would imply that it converges to $\phi$ but I'm unsure of how to get there. Any ideas? | How would one prove that $$\lim_{n\rightarrow \infty} \frac{F_{n+1}}{F_n}=\frac{\sqrt{5}+1}{2}=\varphi$$ where $F_n$ is the nth Fibonacci number and $\varphi$ is the Golden Ratio? |
Two cyclists, 120 miles apart, approach each other, each pedaling at 10 miles per hour. A fly starts at one cyclist and flies back and forth between the cyclists at 15 miles per hour. When the cyclists come together (and squash the fly between them), how far has the fly flown? I know that I am supposed to find some sort of series here, but I don't really know how to approach this. How do I find the terms? | The Problem: Two trains travel on the same track towards each other, each going at a speed of 50 kph. They start out 50km apart. A fly starts at the front of one train and flies at 75 kph to the front of the other; when it gets there, it turns around and flies back towards the first. It continues flying back and forth til the two trains meet and it gets squashed (the least of our worries, perhaps). How far did the fly travel before it got squashed? Attempt at a solution: I can do this by summing the infinite series of the fly's distance for each leg. I get an answer of 37.5 km: but that's so nice! There must be a more intuitive way...is there? |
The entire sentence would be something like: The Center will be established by March of 2015. I feel confident writing "in March of 2015", but this sentence must convey the fact that at any time up to and including March the Center may be established, but not after. | I have read the Rules of a competition. The text of the Rules include a sentence as follows: As per stated in the Rules the entrants will be notified by May 30th 2010. Does the sentence above mean that May 30th is included in the term of notification or not? |
The above applies $\forall x,y \in \mathbb{R}$ I've tried: $x + y \ge 0$ $$x + y \ge x$$ $$ (x + y)^2 \ge 2xy$$ $$\frac{(x + y)^2}{2} \ge xy$$ But the closest I get is $\dfrac{x+y}{\sqrt{2}} \ge \sqrt{xy}$ Any ideas? | The arithmetic - geometric mean inequality states that $$\frac{x_1+ \ldots + x_n}{n} \geq \sqrt[n]{x_1 \cdots x_n}$$ I'm looking for some original proofs of this inequality. I can find the usual proofs on the internet but I was wondering if someone knew a proof that is unexpected in some way. e.g. can you link the theorem to some famous theorem, can you find a non-trivial geometric proof (I can find some of those), proofs that use theory that doesn't link to this inequality at first sight (e.g. differential equations …)? Induction, backward induction, use of Jensen inequality, swapping terms, use of Lagrange multiplier, proof using thermodynamics (yeah, I know, it's rather some physical argument that this theorem might be true, not really a proof), convexity, … are some of the proofs I know. |
Sometimes you come across this format suggesting 'one or more', in not as many words, like "Please select the book(s) you wish to loan". But what happens in that case of plurals that don't follow the same standard like Entry (Entries)? Is it 1 of 1 entry(s) selected or 1 of 1 entrie(s) selected? | I guess “optional plural” is the correct term. I’m referring to things like It can be found at the following location(s). Please pick up your ticket(s). But how do I do that to a word that ends in ‑y? Take category for example: “category(s)” doesn’t seem correct, because categorys is a misspelling. But everything else I have tried looks ridiculous. What’s the correct approach here? |
I have been wondering for a while.There dozens of topics which prove the earth is round. But they all heavily rely on the vision of the person you proof it to. Is there any way, not at all relying on vision, to proof the earth is round? | Assume you've come in contact with a tribe of people cut off from the rest of the world, or you've gone back in time several thousand years, or (more likely) you've got a numbskull cousin. How would you prove that the Earth is, in fact, round? |
Question. Prove that $f(x)=x^{5}-x+a$ is irreducible in $\Bbb Z[x]$ if $5\nmid a$. My approach. If we let $f(x)=(x+a_0)(x^4+b_3x^3+b_2x^2+b_1x+b_0)$, we know that $a=a^5-a$. So $5 \mid a$ and it's contradictory to condition. But can we let $f(x)=(x^2+a_1x+a_0)(x^3+b_2x^2+b_1x+b_0)$? I can't prove we can't. I've used Eisenstein's criterion, but it was helpless. I couldn't use it anywhere. Can somebody help me? (I don't want a generalized proof.) | Let $p$ be a prime. How do I prove that $x^p-x+a$ is irreducible in a field with $p$ elements when $a\neq 0$? Right now I'm able to prove that it has no roots and that it is separable, but I have not a clue as to how to prove it is irreducible. Any ideas? |
This kind of a configuration struck me when I read question. The original question asked how the force on the two charges would change if a metal plate was inserted between them. This question addresses what would happen if it was an infinite plane (those are so much more convenient). I gave it some thought and the result is rather interesting. EDIT: This question is very different from the original in that: The infinite plane is grounded, a plate with definite dimensions does not have to be One can't use image charges with the plate If the plate is uncharged, positive charges will accumulate on the edges and create their own field, in case of an infinite plane these positive charges are at infinity and do not affect the configuration. A plate does not provide electrostatic shielding or a simple boundary region to apply the uniqueness theorem in. The charge distribution on a finite plate is much harder to model. | If a thin metal plate is placed between two charges $+q$ and $+q$, will this cause a change in the electrostatic force acting on one charge due to another? What is the concept behind this? What will happen if the metal plate is thick? |
I cannot figure out whether you get proficiency in the Skills/Saving Throws of the new class (i.e. I have a 1st-level Barbarian and went into Druid from 2nd level onwards--do I receive the Druid's proficiency in Intelligence/Wisdom saves and the option to choose 2 Druid skills in addition to the Saves and Skills I have as a Barbarian? | When multi-classing, do you gain any other proficiencies outside of weapon and armor. In particular do you gain saving throw proficiencies? |
My Firefox keeps telling me there are extra secure certificates pulled in, as well as a frame and icons. What is this teststackoverflow.com site for, and will I miss any SE functionality by blocking it? | Can someone authoritative explain what the cookies that teststackoverflow.com wants to set are for (tracking — I know, but tracking what, and what's wrong with the regular stackoverflow.com and is teststackoverflow.com part of the Stack Exchange infrastructure, and …). And why does it think it needs to run JavaScript? |
I created a scene with a big reflective object in the front. unfortunately the refelctions seem to have much bigger pixels than the rest of the scene. As a work-around I thought about rendering the reflective area again in a higher resolution but I assume there is a better way of solving this. I am looking for a time-saving solution. Which render-values do I have to change in order to get rid of this problem without increasing render-time too much? I am using blender 2.78 Problem solved: | Im rendering varous objects with a Sharp glossy effect but the reflections are quad dependent on the object (image below), meaning they behave separately within every quad making it look 8bit-like. Can anyone tell me why this happens?. (Im pretty sure subdividing would fix it but I want to know why I cant have a low poly object reflecting normaly. The object has 2 modifiers: Subdiv Surface and Solidify. (Perhaps the Subdiv is causing it?). Help me you Blender savys I dont have a powerful CPU to test and test within every render would take me hours and hours. Image: |
I just noticed this recently, I cannot save my blend file. Cannot open file for writing permission denied. I have been using Blender for over 5 years and installed it multiple times on multiple computers. I cannot save on C: drive all of a sudden and I have went into properties on the drive and allowed all permissions. I can only use blender now as an administrator which is annoying and ridiculous. I am using windows 10 which it never used to do this before. All of a sudden, an update or security setting may have done this but I have tried everything--forums, youtube, etc. and nothing fixes this problem. I know I am not the only one to be having this problem via forums. This may not be a Blender issue directly but I think your team should look into why this is occurring on multiple computers, I have 3, all around the same time frame-within a week. This is a Blender windows 10 issue. I have uninstalled the program, files, and downloaded the installer - like I have multiple times in multiple years - and installed it the same way from the website and it does not fix the problem. Only Blender is affected - no other programs that I have, photoshop, gimp, paint, etc. ... Please look into this and thank you. Matt Mathers | I installed blender for the first time, so I have the latest version, 2.78c. I played with it for a bit. Then I discovered I couldn't save my work. I uninstalled it and reinstalled it. Rebooted. Same problem. After a little testing, I realized I CAN save to my NAS storage drive. I cannot save on my C: drive. Any project. Any folder. C: always fails. If I run blender as Administrator, it will save to the C: drive. But not as my normal userid. So it sounds like a bug of some kind. I am running Windows 10. Bitdefender A/V. I use OneDrive. I have a 2TB drive installed. All clean and purring nicely. Is there a better way to install it? Or some change I can make (other than always running as administrator)? Sounds like a bug - but hopefully there's a proper solution. Thanks, Jerry |
I'm currently using cross_val_score and KFold to assess the impact of using StandardScaler at different points within data pre-processing, specifically whether scaling the entire training dataset prior to performing cross validation introduces data leakage and what the effect of this is when compared to scaling the data from within a Pipeline (and therefore only applying it to the training folds). my current process is as follows: Experiment A Import the boston housing dataset from sklearn.datasets and split into Data (X) and target (y) create a Pipeline (sklearn.pipeline), that applies StandardScaler before applying linear regression Specify the cross validation method as KFold with 5 folds Perform cross validation (cross_val_score) using the above Pipeline and KFold method and observe the score Experiment B Use the same boston housing data as above fit_transform StandardScaler on the entire dataset Use cross_val_Score to perform cross validation on again 5 folds but this time input LinearRegression directly rather than a pipeline Compare the scores here to Experiment A The scores obtained are identical (to around 13 decimal places) which I question as surely Experiment B introduces Data Leakage during cross validation. I've seen posts stating that it doesnt matter whether scaling is done on the entire training set before cross validation, if this is true I'm looking to understand why, if this isn't true I'd like to understand why the scores can still be so similar despite the data leakage? See my test code below: import numpy as np import pandas as pd from sklearn.pipeline import Pipeline from sklearn import datasets from sklearn.preprocessing import StandardScaler from sklearn.svm import LinearSVC from sklearn.model_selection import KFold, StratifiedKFold from sklearn.model_selection import cross_val_score, cross_val_predict from sklearn.linear_model import LinearRegression np.set_printoptions(15) boston = datasets.load_boston() X = boston["data"] y = boston["target"] scalar = StandardScaler() clf = LinearRegression() class StScaler(StandardScaler): def fit_transform(self,X,y=None): print('Length of Data on which scaler is fit on =', len(X)) output = super().fit(X,y) # print('mean of scalar =',output.mean_) output = super().transform(X) return output pipeline = Pipeline([('sc', StScaler()), ('estimator', clf)]) cv = KFold(n_splits=5, random_state=42) cross_val_score(pipeline, X, y, cv = cv) # Now fitting Scaler on whole train data scaler_2 = StandardScaler() clf_2 = LinearRegression() X_ss = scaler_2.fit_transform(X) cross_val_score(clf_2, X_ss, y, cv=cv) Thanks! | The for cross-validation says the following about using feature-scaling and cross-validation: Just as it is important to test a predictor on data held-out from training, preprocessing (such as standardization, feature selection, etc.) and similar data transformations similarly should be learnt from a training set and applied to held-out data for prediction I understand the reason behind this is to prevent information leakage between the training & test sets during cross-validation, which could result in an optimistic estimate of model performance. I am wondering then, if I wish to use Principal Component Analysis to reduce the size of a feature set before training say a regression model, and PCA requires feature-scaling to be effective, how do I chain feature-scaling to PCA to cross-validated regression, without introducing data leakage between the train-test splits in the cross-validation? |
See screen shot... App Version: 1.6.6.2 Device: Unknown (iPhone11,6) OS Version: Version 13.3.1 (Build 17D50) | This is a little bit of a double-question. Is the mobile app for Stack Exchange (in particular for iOS) still being developed? Is there any hope for adding in advanced features for the various review/mod tools? (NOTE: To distinguish my question, I am specifically referring to the review and mod tools, not just the users' edit/delete functions.) I understand that this would be a bit of work in both the front and back-end development if it's not already been put into play, so I don't have any expectations. |
I have a problem about using Facebook. However, I cannot find a suitable site on Stack Exchange to ask it on. What site should I use? | I want to ask question about problems in my Facebook account. On which Stack Exchange site should I ask? |
I am using PB to check if the Case record is new, and if the Account field is Not blank and a Case.Account.picklist__c has a Certain value then update priority. SO, my evaluation criteria are - AND ( ISNEW() , NOT(ISBLANK([Case].AccountId )) , ISPICKVAL([Case].Account.picklistA__c , 'ABC') ) If all these conditions meet, I am updating the case priority. But, when I create a Case record, where Account is blank, It throws an error - The flow failed to access the value for myVariable_current.Account.piclistA because it hasn't been set or assigned. | Note: This error might look like a familiar error but the resolution mentioned in the is not working in the below case and I am not sure why, hence posting this question. Problem description: I have a process builder on case object set to fire for every time new record is created. Criteria is set to 'Formula evaluates to True' with below formula: AND(NOT(ISBLANK([Case].AccountId)),ISPICKVAL([Case].Account.Active__c,'Yes')) With immediate action set to update custom field on the Case object. Custom field Active__c on the Account object is type picklist with two possible values 'yes' and 'no'. Screenshots of the process builder: Creating a case as shown in the below screenshot with very minimal details and especially not populating account details: Throws below error: The flow failed to access the value for myVariable_current.Account.Active__c because it hasn't been set or assigned. Relevant data from log file: 22:14:31.0 (12479016)|WF_FLOW_ACTION_BEGIN|09L370000000FEJ 22:14:31.13 (13607478)|FLOW_CREATE_INTERVIEW_BEGIN|00D37000000H8hr|300370000008ZTl|301370000004weE 22:14:31.13 (15394571)|FLOW_CREATE_INTERVIEW_END|5525dfa7819c33f438ce3cef9b6c15c668d8ff2-3d11|Test 22:14:31.15 (15820974)|FLOW_START_INTERVIEWS_BEGIN|1 22:14:31.15 (16674702)|FLOW_START_INTERVIEW_BEGIN|5525dfa7819c33f438ce3cef9b6c15c668d8ff2-3d11|Test 22:14:31.15 (35470120)|FLOW_ELEMENT_ERROR|The flow failed to access the value for myVariable_current.Account.Active__c because it hasn't been set or assigned.|| 22:14:31.15 (35479812)|FLOW_START_INTERVIEW_END|5525dfa7819c33f438ce3cef9b6c15c668d8ff2-3d11|Test 22:14:31.15 (35517783)|FLOW_START_INTERVIEWS_END|Interview error. Aborting all.|5525dfa7819c33f438ce3cef9b6c15c668d8ff2-3d11|Test 22:14:31.15 (35528335)|FLOW_START_INTERVIEWS_END|1 22:14:31.0 (35588898)|WF_FLOW_ACTION_ERROR|09L370000000FEJ|300370000008ZTl|Error executing flow: test, FlowDefId: 300370000008ZTl, FlowVersionId: 301370000004weE 22:14:31.0 (35612585)|WF_FLOW_ACTION_ERROR_DETAIL|An unhandled fault has occurred in this flowAn unhandled fault has occurred while processing the flow. Please contact your system administrator for more information. 22:14:31.0 (35683203)|WF_FLOW_ACTION_END|09L370000000FEJ URL to the complete debug log : (Note: You can see from the log that there are no other workflow rules or triggers on the case object). My analysis: When the first condition inside the AND expression is evaluating as false, why is it trying to evaluating the second condition to check the custom field on the Account object? It shouldn't right? Any help? EDIT: I am looking to solve this using option 'Formula Evaluates to True' only because I have other complex criteria like checking the day(Mon vs Tue and etc) of the case creation. |
I have a JSON String being parsed (in a response var) from AJAX: The JSON { "TheArray":[ { "AlmostThere": { "whatWeAreLookingFor":"Hello" } }, { "AlmostThere": { "whatWeAreLookingFor":"Goodbye" } } ] } The JSON being parsed var jsonData = JSON.parse(response); //response is the string version of the JSON code! Now, I need to loop into the JSON array, hereby mentioned as TheArray. I do this: Looping TheArray for (var contents in jsonData["TheArray"]) { } And inside there, we get the value of the whatWeAreLookingFor element: for (var contents in jsonData["TheArray"]) { console.log(contents.whatWeAreLookingFor + "!"); } But there is a catch! The console outputs... undefined!. - I have tried multiple ways to make this work, such as using contents["whatWeAreLookingFor"] and what-not, but I still get the same results. | I've been told not to use for...in with arrays in JavaScript. Why not? |
I honestly don't think there is a way to do this, but I am curious. Is there anyway within the collision physics to allow one specific axis to be animated while the other 2 are not animated and dynamic? What I mean is, say I wanted to animate an object to move on a specific path on the X-Axis, but I still want the Y and the Z axis to change according to the physics simulations. Any ideas? | In the game engine there is an option to constrain rigid body translations and rotations on an axis: Is it possible to do this with the 3D view rigid body physics system? |
In the English textbook for third-graders in Vietnam, there’s a segment that goes: My question is: is this a correct way to address your name as a teacher (as in Miss Hien) to your student? Shouldn’t it just be “I am Hien.” instead? Thank you for your input. | Well, years ago I was an English teacher in an English Teaching Institute. In the country I live, students call their teachers by saying "Mr. Teacher" or "Teacher" (literally translated) in schools. In places other than schools and universities, students also can call their teacher by saying "Mr. X", and in universities they call their professor by saying "Dr." and "Master". It was always question for me that in an English class what should I be called by my students because I didn't know what American students call their teacher in class. To sum up my question, what do students call their teacher in class in a typical school in the U.S.? Is it different for the students of primary school and secondary school? I would be glad to hear the same question about England and Australia. |
I do not understand why human eye sees different colours from the LED TV/screen. Especially violet. For example, how we get yellow color on TV. There are 3 small diodes Red, Green Blue in LED screen and when we see yellow, that means Red and green diodes are on and blue is off. This I understand, because wavelength for red approximately 600 nm, for green 500 nm and yellow in the middle, let say 550 nm. In this case 600 for red + 500 for green gives 550 in average, that is yellow. it is ok, good explanation. But what about violet? Violet wavelength is 300 nm, We get it on TV if we combine red and blue. red is 600 nm, blue is 400 nm and in average I expect that we will see it as 500 nm green. But why we see it as violet which should be 300 nm? Anyway, we cannot get at all 300 nm if we combine red (600), green (500) and blue (400). All wavelengths here are very approximate from the top of my head maybe +/- 50 nm or even more. Exact numbers do not matter, the main point is the idea how human eye see different colors. | Our eyes contain 3 photoreceptor cells (cones) to perceive three wavelength ranges of light. Here is a visual representation of the wavelengths by these receptors (S, M and L). So if we have light of 440 nm, it results in the color blue. If we have light of 540 nm, it results in the color green. If we see light of 650 nm, it results in the color red. I think I understand our ability of the brain to mix the results of the signals of these receptors, producing colors like yellow. However, what I do not understand is how the color spectrum is displayed like this: Given that spectrum, I would suggest that the color 'blue' is actually a mix between the receptors S and M. And the pure result of activating the S-receptor would result in the color 'purple' (I would describe the color in the left of the image as purple, right). Therefore, the receptor colors should instead be RGP (red, green, purple) instead of RGB (red, green, blue). However, there is one problem with this which I cannot explain. How come that mixing red light with blue light also results in purple light? How is it possible that purple light can be achieved through mixing (additively) blue and red light, just as going to the shortest wavelength boundary of what we can see (from blue to ultraviolet via purple)? So the actual problem here is: Purple is the color at the very shortest wavelength we can see. Purple is an additive mix between what we see as red light and blue light. That just doesn't make any sense. I don't see how our brain can possibly perceive this as being the same color. Shouldn't both purple colors actually be different colors (thus we would have a new different color for that)? UPDATE: Pure activation of the S-cone (blue) may actually give violet instead of blue. That means that the color blue contains also a bit activation from the M- and L-cones (green and red). So then the "blue-est blue" is actually violet, not blue. This confusion originates from the RGB-system (and other sources) that assume blue as being a primary color, whereas violet would perhaps be more accurate! Further details can be found in the accepted answer. The may further help to understand what purple/magenta/violet really is. |
I have a PC with 1.2GB of RAM (Windows says 756MB). I plan to get another 1GB stick of RAM, but for now, can I install Ubuntu even though I don't have the required 2GB of RAM? I'm using DVD to install and I chose to download the main Ubuntu version on the Ubuntu page. Any help would be appreciated. Thanks :) | For a given hardware configuration, how do I find out if Ubuntu will run on it? What considerations should I take into account when choosing an Ubuntu version and such as: with a lighter desktop than the usual Gnome and Unity with the even lighter LXDE desktop Obviously Ubuntu does not run on some processor architectures. So how do I go about choosing the right version and derivate. How can I find out the minmal system requirements? |
I just installed ubuntu and im completly new with ubuntu. I am trying to get my second harddrive to work but it won't. I've used some guides like But still no success. The problem is that it doesn't see my ntfs as a valid one. I don't really understand what this means. this is the message the terminal gives me when trying to mount the hard drive: robert@Robert-Linux:~$ sudo mount -a NTFS signature is missing. Failed to mount '/dev/sdb1': Invalid argument The device '/dev/sdb1' doesn't seem to have a valid NTFS. Maybe the wrong device is used? Or the whole disk instead of a partition (e.g. /dev/sda, not /dev/sda1)? Or the other way around? robert@Robert-Linux:~$ Hopefully someone can help me out. Greetings Robert EDIT /etc/fstab file content: # /etc/fstab: static file system information. # # Use 'blkid' to print the universally unique identifier for a # device; this may be used with UUID= as a more robust way to name devices # that works even if disks are added and removed. See fstab(5). # # <file system> <mount point> <type> <options> <dump> <pass> # / was on /dev/sda1 during installation UUID=d91f5c8b-30d0-4bc7-85cb-e3b26d2e9c1d / ext4 errors=remount-ro 0 1 # swap was on /dev/sda5 during installation UUID=81cc1c05-8435-4d18-8af5-049d092294cb none swap sw 0 0 /dev/fd0 /media/floppy0 auto rw,user,noauto,exec,utf8 0 0 /dev/sdb1 /media/disk2 ntfs defaults 0 0 | I've upgraded from 12.04 to 14.04 via command-line when my system froze, had to do REISUB and dpkg --configure -a to recover from crash after rebooting. Now everything seems to work except automatically mounting external thumb drives and external hard disk drives. After plugging in said drives, they fail to show up on the left pane and remains unmounted. I can see the device if I run lsusb and fdisk though, so it's possibly to manually mount it but I'd rather resolve why it's not automatically mounting. |
I know this was asked for previous releases. Has anything changed for 16.04? The official documentation hasn't been updated for a while. If FDE after installation is not possible, what about encrypt /home (for all users, not just one). Any outstanding bug preventing it from working properly? I have hit so many bugs in 16.04. | I'm running 13.10 Saucy. If I didn't enable disk encryption during installation, is there any way to enable it post facto? I found , which says that encryption has to happen at install time, but it's also referring to Fedora. I can easily boot into a live disk if there's any way to do it from there. |
Does anybody have some pointers or information when it comes to the technical and security implementation of Apple's built-in screen sharing feature, the one where you start the Screen Sharing app and type in an Apple ID? I can't seem to find any solid info on it. I'd like to make a security assessment on this for my org, with the possible goal of using it for remote assistance. Catalina or newer versions of MacOS. | I'm trying to figure out if the screen sharing data is encrypted when I connect to my Mac at home from another Mac at work. I've seen a lot of questions and answers but I can't really find a definitive answer. Basically, I just have my Mac sitting at home with Screen Sharing turned on and I'm port-forwarding 5900. It works but again, I'd like it to be secure. Now, before anyone mentions SSH tunneling, I had it set up the first day I tried this (Remote Login, port-forwarded 22, tunnel created, etc) but then it stopped working. I'm still trying to figure out what's going on there but if Screen Sharing is completely encrypted, then I'm not going to worry about the tunnel anymore. |
I'm taking in string inputs and I need to read in multiple words from one line and push them into a vector. I can't for the life of me figure out how to split the string whenever there's a space character. I know I need to use the getline() function, but I feel like I've tried everything and I'm stuck. Here's my code so far. I'm aware that the if/else statement are both doing the same thing. int main(){ vector<string> vec; string str = ""; string t = ""; int i = 0; while(getline(cin, str){ if(str != "STOP"){ if(str[i] == ' '){ vec.push_back(str); }else{ vec.push_back(str); } }else{ cout << vec.size() << endl; } i += 1; } } I can't really use any fancy code, just the basic functions | I'm trying to iterate over the words of a string. The string can be assumed to be composed of words separated by whitespace. Note that I'm not interested in C string functions or that kind of character manipulation/access. Also, please give precedence to elegance over efficiency in your answer. The best solution I have right now is: #include <iostream> #include <sstream> #include <string> using namespace std; int main() { string s = "Somewhere down the road"; istringstream iss(s); do { string subs; iss >> subs; cout << "Substring: " << subs << endl; } while (iss); } Is there a more elegant way to do this? |
Trying to install tuxboot using Ubuntu PPA (Ubuntu 18.04), like so: sudo apt-add-repository ppa:thomas.tsai/ubuntu-tuxboot but I get Err:8 http://ppa.launchpad.net/thomas.tsai/ubuntu-tuxboot/ubuntu bionic Release 404 Not Found [IP: 91.189.95.83 80] Reading package lists... Done E: The repository 'http://ppa.launchpad.net/thomas.tsai/ubuntu-tuxboot/ubuntu bionic Release' does not have a Release file. N: Updating from such a repository can't be done securely, and is therefore disabled by default. N: See apt-secure(8) manpage for repository creation and user configuration details. I have read multiple accounts of users that successfully used the PPA to install tuxboot. What am I doing wrong? | When updating, I get the following error message: W: The repository 'http://ppa.launchpad.net/mc3man/trusty-media/ubuntu xenial Release' does not have a Release file. Here, I find another statement on this error: This recommends removing certain PPAs; and, I'm not sure if I should do that since it might mean not getting the updates that I need. Is this what I should do? |
I have a question which derived from a comment I got to another question. I know that LTS Ubuntu versions have support for 5 years so that means that Ubuntu 16.04 is supported up to 04/20. If I replace the GUI of Ubuntu with another not supported version like mate (which I have done) without formatting is this considered an action that breaks the system and, thus, it is now considered Ubuntu mate instead of Ubuntu or not? | What happens if there is a security problem in a package in the universe repository four years after the 12.04 LTS release; will the package be updated from upstream, patched, or left alone? It's my understanding that the "5 years of support & security updates" applies only to the core of Ubuntu -- anything in Main repository. Not for things in the Universe repository. For a more specific example -- if I install Ruby now, and want to use it for the next several years on 12.04 and it has a security vulnerability; while this might be patched in the upstream (so I could always download the latest from their website and compile it myself or use a PPA), will this upstream fix be migrated into the precise package repositories? What about backports? |
I'm trying to make a program that can read whatever the user inputs and checks their input using if..else statement. import java.util.Scanner; class Answers{ public void FalseAnim() { System.out.println("Game Over your answer is wrong. try again!"); } public void CorrectAnim() { System.out.println("your answer is correct"); } } public class quizgame { public static void main (String[] args) { Scanner input = new Scanner(System.in); Answers ans = new Answers(); String strans1; System.out.println("welcome to the quiz game!"); System.out.println("what is 1+1"); strans1 = input.nextLine(); if (strans1=="two"||strans1=="2") { ans.CorrectAnim(); } else { ans.FalseAnim(); } } } every time I run the program and input anything it goes straight into the else statement, even when I input either a "2" or a "two" | I've been using the == operator in my program to compare all my strings so far. However, I ran into a bug, changed one of them into .equals() instead, and it fixed the bug. Is == bad? When should it and should it not be used? What's the difference? |
There are five copies of a book each 20mm thick. When tilted, they fit snugly inside a cubic box with a gap of 16mm at the bottom left as shown. I struggled with this in a recent practice paper, any help appreciated. | There are five copies of a book each 20mm thick. When tilted, they fit snugly inside a cubic box with a gap of 16mm at the bottom left as shown. I struggled with this in a recent practice paper, any help appreciated. |
These statements are ok: "I looked George up." "I looked up George." "I looked him up." But this is not ok: "I looked up him." In this case, it's not possible to substitute the pronoun "him" for "George". What rule prohibits this substitution? | Both seem to be in common usage, but is there a nuanced difference about when one is more appropriate than the other? Thanks. |
I am a beginner with Linux and I had a bad inspiration to try a quick Ubuntu installation without reading properly about it first. I found a tutorial and have installed Ubuntu on my laptop (Gateway NV56R30u) alongside preinstalled Windows 8. I made a recovery disk first of my Windows 8 and saved it on a 8GB USB flash drive (it used 2.6 GB of it). The installation of Ubuntu went flawlessly. After reboot it started with that screen with Ubuntu logo on it, but no GRUB screen as expected, where there should have been the option to choose between Windows and Ubuntu. I tried to find a solution for my problem and found that I need a Boot Repair. I used boot repair several attempts but it partially solved my problem. I now start with a GRUB welcome screen, but there is still no option to choose Windows. Here you can also see my . Analyzing what I've done wrong I found that I made a huge mistake with partitioning. I have a 1TB HDD, which I have partitioned as shown in the below screenshot. I believe I am the only idiot on this planet who has ever done this. I could use the recovery drive to backup Windows, but I've got these questions, which may look stupid, but I would appreciate some good answers: How bad can affect my data from HDD my "genius" way of partitioning? Is it reversible? Considering the way I have done the partitioning, if I decide to use the recovery drive to repair Windows, what are my chances to have a good result, without losing all my data? I think it's a pipe dream. I have searched lots of forums and I realized that the TestDisk application may help me to figure out if I have messed up my hard disk. After using TestDisk I've got some results (you can see them in this ), but I don't really know how to interpret them. Ideally I would have these priorities to solve this problem: Plan A: It would be great to make the dual boot work, so I could use both systems. Plan B: In case plan A fails, I then prefer to come back to Windows and to be able to recover at least drive D (with the most important data) and C, if possible. Plan C: To recover the major part of my data. | I have a Toshiba satellite A-200 laptop with a Vista OS on it with 4 NTFS partitions (C:) Vista (D:) Entertainment (E:) Work (F:) Sources and I wanted to start using Ubuntu instead. So I tried it first from the live CD and everything was OK and all the partitions were shown and working and so I decided to install Ubuntu to replace Vista on the (C:) drive. After I did that I can no longer find my folders and files on the (D:), (E:), (F:) partitions and the only file system that is shown is one 198 GB although my HDD is 320 GB. I can't access the lost data on the remaining 120 GB which I hope is still there and not totally lost I am now working from the live CD but I am unable to install testdisk. Can I recover the Vista partitions by the product recovery CD to get my laptop back to the factory settings? Can I recover the NTFS partitions using a recovery program for Windows or will that make the problem worse? I need these data badly as I don't have a backup for them. |
I was running fiddler and suddenly I see requests this requests to hxxp://zc.qq.com/cgi-bin/chs/numreg/init? and hxxp://www.baidu.com/cache/global/img/gs-2.0.gif But no process is shown. How do I Identify which process made the requests. This seem to be tracking requests. Both request's responses try to set cookies. But I don't remember installing anything related to qq and baidu. More Information: I stay in India. OS: Win7.1 This requests seem to be repeated after around 6 minutes I tried TCPView. | Is it possible to catch, which program is accessing a specific IP address? I found my computer is flooding and wish to check addresses one by one. May be it is possible to set up some audit for this? |
I'm tired to open PSD clearly via GIMP, So I need another good way to open it. | I was wondering that is it possible to edit PSD files on Ubuntu (like with Gimp). Actually, I need to edit layers. I haven't managed to do it. It would be nice if there is a chance! :) |
\documentclass{article} \usepackage{makeidx} \makeindex \begin{document} Cheese\footnote{\index{cake}cake.} \printindex \end{document} This produces the entry cake, 1, with no indication that the text referred to was in a footnote. Could it be given the format cake, 1\,n., and cake 1 n.\,1 if there are more than one note on the page? | We're using the index package in order to get several indexes (name index, subject index, language index), and we're basically happy with it. There's only one obstinate problem: index does not propagate footnote numbers as desired, unlike makeidx (which doesn't support multiple indexes though): \documentclass{scrbook} \usepackage{index} \usepackage{hyperref} \def\fn#1#2{% \hyperpage{#2}n#1% }% \newcommand{\is}[1]{\if@noftnote% \index{#1}% \else% \index{#1|fn{\thefootnote}}% \fi% } \makeindex \begin{document} \footnote{First footnote.} \footnote{Second footnote.\is{inside second footnote}} \footnote{Third footnote.} \printindex \end{document} This outputs inside second footnote, 1n3 instead of inside second footnote, 1n2. Hence, \thefootnote seems to be expanded at the very end, and not immediately in the footnote. Any suggestions how to do it right with index? |
Looking at this map in Hong Kong: I notice they used different interconnection symbols: ... What do they mean? | On the , some of the interchange symbols have little lines and half-circles in them. They're a bit small to read on some maps, but if you zoom in they get a big clearer: Are these suggestions for where to change depending on the direction you're going + changing to? Or do they have some other meaning? . Bonus marks - Assuming I am right that that these are direction interchange suggestions, what does it mean if it's an empty circle, or a "T" in one? |
I repartitioned my Latitude e6430s laptop after removing Windows 10 and now gnome-terminal does not open. Nothing happens when I press the terminal icon from the icon tray or with Ctrl+Alt+Del when gnome-terminal is set as default using $ sudo update-alternatives --config x-terminal-emulator There are 5 choices for the alternative x-terminal-emulator (providing /usr/bin/x-terminal-emulator). Selection Path Priority Status ------------------------------------------------------------ 0 /usr/bin/gnome-terminal.wrapper 40 auto mode * 1 /usr/bin/gnome-terminal.wrapper 40 manual mode 2 /usr/bin/koi8rxterm 20 manual mode 3 /usr/bin/lxterm 30 manual mode 4 /usr/bin/uxterm 20 manual mode 5 /usr/bin/xterm 20 manual mode Press <enter> to keep the current choice[*], or type selection number: 0 Xterm and Visual Studio terminal work. I can open gnome-terminal from the file explorer by right clicking and opening folders in the terminal. Reinstalled python3 and GNOME terminal. Another thread said to use this to diagnose: $ sudo apt-get build-dep gnome-terminal Reading package lists... Done E: You must put some 'source' URIs in your sources.list After uncommenting the dev-src lines in my sources.list file I get this message, but the GNOME terminal still doesn't open. $ sudo apt-get build-dep gnome-terminal Reading package lists... Done Reading package lists... Done Building dependency tree Reading state information... Done 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Here are the logs: $ gnome-terminal Traceback (most recent call last): File "/usr/bin/gnome-terminal", line 9, in <module> from gi.repository import GLib, Gio File "/usr/lib/python3/dist-packages/gi/__init__.py", line 42, in <module> from . import _gi ImportError: cannot import name '_gi' from 'gi' (/usr/lib/python3/dist-packages/gi/__init__.py) Error in sys.excepthook: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/apport_python_hook.py", line 63, in apport_excepthook from apport.fileutils import likely_packaged, get_recent_crashes File "/usr/lib/python3/dist-packages/apport/__init__.py", line 5, in <module> from apport.report import Report File "/usr/lib/python3/dist-packages/apport/report.py", line 30, in <module> import apport.fileutils File "/usr/lib/python3/dist-packages/apport/fileutils.py", line 23, in <module> from apport.packaging_impl import impl as packaging File "/usr/lib/python3/dist-packages/apport/packaging_impl.py", line 24, in <module> import apt File "/usr/lib/python3/dist-packages/apt/__init__.py", line 23, in <module> import apt_pkg ModuleNotFoundError: No module named 'apt_pkg' Original exception was: Traceback (most recent call last): File "/usr/bin/gnome-terminal", line 9, in <module> from gi.repository import GLib, Gio File "/usr/lib/python3/dist-packages/gi/__init__.py", line 42, in <module> from . import _gi ImportError: cannot import name '_gi' from 'gi' (/usr/lib/python3/dist-packages/gi/__init__.py) $ ls -l /usr/bin/python3 lrwxrwxrwx 1 root root 25 Sep 19 19:08 /usr/bin/python3 -> /etc/alternatives/python3 | I just tried to install python 3.6 on my Ubuntu 16.04 system, and now I can't run the terminal from the launcher or from Ctrl + Alt + T. I tried to run gnome-terminal from XTerm and got the following message: Traceback (most recent call last): File "/usr/bin/gnome-terminal", line 9, in <module> from gi.repository import GLib, Gio File "/usr/lib/python3/dist-packages/gi/__init__.py", line 42, in <module> from . import _gi ImportError: cannot import name '_gi' Error in sys.excepthook: Traceback (most recent call last): File "/usr/lib/python3/dist-packages/apport_python_hook.py", line 63, in apport_excepthook from apport.fileutils import likely_packaged, get_recent_crashes File "/usr/lib/python3/dist-packages/apport/__init__.py", line 5, in <module> from apport.report import Report File "/usr/lib/python3/dist-packages/apport/report.py", line 30, in <module> import apport.fileutils File "/usr/lib/python3/dist-packages/apport/fileutils.py", line 23, in <module> from apport.packaging_impl import impl as packaging File "/usr/lib/python3/dist-packages/apport/packaging_impl.py", line 23, in <module> import apt File "/usr/lib/python3/dist-packages/apt/__init__.py", line 23, in <module> import apt_pkg ModuleNotFoundError: No module named 'apt_pkg' Original exception was: Traceback (most recent call last): File "/usr/bin/gnome-terminal", line 9, in <module> from gi.repository import GLib, Gio File "/usr/lib/python3/dist-packages/gi/__init__.py", line 42, in <module> from . import _gi ImportError: cannot import name '_gi' How can I fix this error? It should also be noted that: My gnome-terminal file is now a python script. The gnome-terminal.real file will open the terminal as expected. python3.5 gnome-terminal will open the terminal as expected. |
I've inserted a dvd into slot...doesn't show up in Finder,(DVD is checked in Finder Preferences), and won't eject! Tried to plastic card trick- no luck. Disk spinning in there but won't come out. I have tried holding the right click button upon restart, eject button and holding PC upside down. Disk still spinning but not ejecting! | I have a DVD I was trying to rip, and handbrake froze up when scanning it. I tried to eject the DVD by dragging and dropping it to the trash, which trashed the icon, but didn't eject the DVD. I then forced Handbrake to quit, but without an icon on my desktop to select, how can I eject the DVD? |
This question exists, but both cases have a specific answer for the OP's situation. I do not know how to prove that $\mathbb{Q}$ is countable. Questions I am referring to: and | I have this problem: Prove that $\mathbb{|Q| = |Q\times Q|}$ I know that $\mathbb Q$ is countably infinite. But then how can I prove that $\mathbb{|Q\times Q|}$ is countably infinite? Thanks you! |
We have this recursive formula defined $a_1=3$ & $a_n = a_{\lfloor{n/2}\rfloor} + a_{\lceil{n/2}\rceil} + 3n + 1$ for $n \geq 2$. And we need to prove $n \leq 2^k \Longrightarrow a_n \leq 3 * k2^k+4*2^k-1$ for all $n,k \in \mathbb{Z}^+$. I think we wanna do the induction over k For our basic case we choose $n = 2 , k = 1$ $a_2 = a_{\lfloor{2/2}\rfloor}+a_{\lceil{2/2}\rceil}+3*2+1 =$ $ 3 + 3 + (6+1) = 13$ $2\leq2^1 \Longrightarrow 13 \leq 3*1*2^1+4*2^1-1$ $2\leq2 \Longrightarrow 13 \leq 13$ Our basic case is proven, so we can move on to the induction step So we will assume that the expression is true for $n \leq 2^k$ and we will now show it is true for $n \leq 2^{k+1}$ This is where I have kinda reached a dead end. My guess is that we want to move from $n \leq 2^k \Longrightarrow a_n \leq 3 * k2^k+4*2^k-1$ to $n \leq 2^{k+1} \Longrightarrow a_n \leq 3 * (k+1)2^{k+1}+4*2^{k+1}-1$ And we could get closer to the P(k+1) expression by multiplying by 2 on both sides of P(k) like this: $n*2 \leq 2^k*2 \Longrightarrow a_n*2 \leq (3 * k2^k+4*2^k-1)*2$ But I don't know | Via induction I need to prove an expression is true. the expression is: $n \leq 2^k \longrightarrow a_n \leq 3 \cdot k2^k + 4 \cdot 2^k-1$ for all $n,k \in \mathbb{Z^+}$ $a_n$ is a recursive function where $a_1 = 3$ $a_n = a_{\lfloor \frac{n}{2} \rfloor} + a_{\lceil \frac{n}{2} \rceil} + 3n+1$ I am stuck at the point where I need to prove that $P(n+1)$ is true $a_{\lfloor \frac{n+1}{2} \rfloor} + a_{\lceil \frac{n+1}{2} \rceil} + 3(n+1) + 1 \leq 3 \cdot k 2^k + 4 \cdot 2^k -1 $ It is the fact that I don't know how to rewrite the floor and ceiling functions to something else. Can someone give me some ideas how to proceed with this? |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.