text
stringlengths 2
560k
| meta
dict | score
float64 0
0.5
|
---|---|---|
Q:
Laravel multiple search in related tables
I have two tables related for towns and cities. (Town belongsTo City, City hasMany Town)
towns table:
id, name, city_id
cities table:
id, name
For an autocomplete ajax query, i can get results by sql query like this.
Select t.id AS townid, t.name AS townname, c.name AS cityname FROM towns t
left join cities c ON t.city_id=c.id
where t.name like '%ana%' OR c.name like '%ana%';
So i get the result witch i want. But in laravel i couldnt achieve that.
i can search in towns but without searching also city name.
$towns = App\Town::with('city')->where('name', 'like', '%ana%')->get();
A:
Try code below
$towns= DB::table('towns')
->join('cities', 'cities.id', '=', 'towns.city_id')
->select('towns.id as townid', 'towns.name as towname', 'cities.name as cityname')
->where('towname', 'like', '%ana%')
->orWhere('cityname', 'like', '%ana%')
->get();
|
{
"pile_set_name": "StackExchange"
}
| 0 |
Shemale Julia Avancini posing her sexy Curves and shows us her Big Tranny Cock !
|
{
"pile_set_name": "OpenWebText2"
}
| 0.05 |
She is so horny she need this cock
|
{
"pile_set_name": "OpenWebText2"
}
| 0.058824 |
Wake Me Up Before You Cum Cum
230 100%
|
{
"pile_set_name": "OpenWebText2"
}
| 0.051282 |
XX
|
{
"pile_set_name": "NIH ExPorter"
}
| 0.5 |
Redhead MILF
MILF with red hair with her tits out.
|
{
"pile_set_name": "OpenWebText2"
}
| 0.058824 |
08:48
Anal Slut Jane Wilde Gets Asshole used by James Deen
|
{
"pile_set_name": "OpenWebText2"
}
| 0.050847 |
Atlanta to fuck, with old men image, to fuck married women, canada nude sex with money around, sex escort contacts, nude party pics in wyoming. Sexy
and topless, holand more sexy, you in the ass in madisonville. Before and after swinger sex pics marrid couples.
|
{
"pile_set_name": "Pile-CC"
}
| 0.049808 |
HD 12:26 loading preview
Fuck my Face and Cum in my Pussy
|
{
"pile_set_name": "OpenWebText2"
}
| 0.051724 |
My match either made an extremely lucky guess or is psychic! I have always really like painting. Now I have an awesome poster of it! Thank you mystery redditor!
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
Str8 Gets Bred & Takes 2 Loads of Cum for both his holes
i bareback butt fuck this horny bitch with my super hard fat cock and then i cum in his mouth then i fuck her some more and cum deep in her hole while she wimpers i bareback butt fuck this horny bitch with my super hard fat cock and then i cum in his mouth then i fuck her some more and cum deep in her hole while she wimpers
|
{
"pile_set_name": "Pile-CC"
}
| 0.049608 |
1. Field of the Invention
The present invention relates to a memory cell suitable for applications to a highly integrated semiconductor memory and, more particularly, to a capacitor constituting a memory cell and a method of manufacturing the capacitor.
2. Description of the Prior Art
A memory cell (to be referred to as an 1T cell hereinafter) constituted by one transistor and one capacitor is known as a highly integrated semiconductor memory cell. The 1T cell is very popular because it requires a small number of constituent elements and facilitates a reduction in memory cell area.
An output voltage from a 1T cell is proportional to the capacitance value of a capacitor (to be referred to as a cell capacitor hereinafter) constituting a memory cell. For this reason, to assure the stable operation in a highly integrated arrangement, the capacitance value of the cell capacitor must be sufficiently large. To highly integrate 1T cells, cell capacitors each having a sufficiently large capacitance value in a small area are required.
A capacitor using a high-permittivity film, as described in IEDM Technical Digest 1991, pp. 823-826, is known as a typical conventional cell capacitor. This conventional cell capacitor is shown in FIG. 1.
As shown in FIG. 1, the cell capacitor has a silicon substrate 401 having a major surface. A silicon oxide film 402 is formed on the major surface of the silicon substrate 401. A plurality of contact holes are formed in the silicon oxide film 402. Impurity-doped polysilicon members 403 are buried in the plurality of contact holes, respectively. The silicon substrate 401 is electrically connected to a plurality of storage electrodes 406c each consisting of a tantalum film 404c and a platinum film 405c. A high-permittivity film 408c used as a capacitance film is formed on the entire surface including the plurality of storage electrodes 406c and the silicon oxide film 402. A counter electrode 409c is stacked on the high-permittivity film 408c to constitute cell capacitors.
In the above cell capacitors in FIG. 1, a 70-nm thick barium strontium titanate ((Ba.sub.0.5 Sr.sub.0.5)TiO.sub.3) is used as the high-permittivity film 408c, the relative permittivity is 300 or more, and the capacitance value per unit area is 40 fF/.mu.m.sup.2. When this high-permittivity film is applied to a 64-M DRAM cell, a capacitance value of 36 fF is reported in the above reference. It is therefore confirmed that a sufficiently large capacitance value is obtained in a small area.
The platinum film 405c constituting each storage electrode 405c is used to have good antioxidation properties in forming the high-permittivity film 408c. The tantalum film 404c is used to prevent platinum of the platinum film 405c from diffusing into the silicon substrate 401.
In the structure shown in FIG. 1, the high-permittivity film 408c is present between the adjacent storage electrodes 406c. The coupling capacitance between the adjacent storage electrodes 406c is calculated to be as very large as about 2.8.times.10.sup.-15 F according to a plane-parallel approximation. For this reason, in read/write access of information to the cell capacitor, the potential of each storage electrode 406c varies. This potential variation causes noise, and a stable memory operation cannot be obtained.
As a method of solving this problem, there is a cell capacitor cell structure disclosed in Japanese Unexamined Patent Publication No. 4-242971. This technique will be described with reference to FIG. 2. FIG. 2 shows the structure of two memory cells. Each memory cell has a MOS transistor and a capacitor.
The MOS transistor has first and second n-type impurity regions 207 and 208 formed in a p-type silicon substrate 201, and a gate electrode 206 stacked through a gate oxide film 203. The first n-type impurity region 207 serves as one of the source and drain regions. The second n-type impurity region 208 serves as the other of the source and drain regions. A first insulating interlayer 209, a second insulating interlayer 217, and a third insulating interlayer 220 are formed over the gate oxide film 203 and the gate electrode 206 in order as named. A bit line 221 is electrically connected to the second n-type impurity region 208 through a contact hole 240 formed in the first to third insulating interlayers 209, 217, and 220.
The capacitor has a storage electrode 212 connected to the first n-type impurity region 207 through the gate oxide film 203, a counter electrode 214, and a high-permittivity film 213 sandwiched between the storage and counter electrodes 212 and 214. The counter electrode 214 adjacent to the exposed surface is connected to an interconnection 218 through a connection hole 241.
In the memory cell having the above structure, the relative permittivity of the high-permittivity film 213 is set higher than that of the second insulating interlayer 217 to relax concentration of an electric field on the side surfaces of each storage electrode 212, thereby forming a capacitor having a high breakdown voltage. This arrangement is employed to increase the breakdown voltage. In addition, the relative permittivity of the second insulating interlayer 217 is reduced to decrease the coupling capacitance between the capacitors as described above and provide a high resistance against noise. However, since the connection holes. 241 are formed for the counter electrodes 214, respectively, the defects of the connection holes 241 directly cause defective memory cells to decrease the product yield.
A technique for reducing a coupling capacitance between capacitors without forming contact holes, which cause a decrease in product yield, in the respective counter electrodes is disclosed in Japanese Unexamined Patent Publication No. 6-85193. This technique will be described with reference to the accompanying drawings.
FIG. 3 shows the structure of these capacitors. Each capacitor has a storage electrode 306 obtained by stacking tantalum 304 and platinum 305, a high-permittivity film 308 stacked on the storage electrode 306, and a counter electrode 309. An insulating film 307 is formed between the adjacent storage electrodes 306. A silicon substrate 301 is electrically connected to each storage electrode 306 through a polysilicon member 303 buried in a corresponding contact hole formed in a silicon oxide film 302 on the silicon substrate 301. The relative permittivity of the high-permittivity film 308 is set much lower than that of the insulating film 307 to reduce the coupling capacitance between the capacitors. However, a method of manufacturing this capacitor poses a problem which degrades the reliability of the capacitor itself. This manufacturing method will be described with reference to FIGS. 4A to 4E.
First, referring to FIG. 4A, the silicon substrate 301 is thermally oxidized to form the silicon oxide film 302 thereon. Contact holes are formed using the conventional photolithography and dry etching techniques, and polysilicon is grown in these contact holes by the CVD method. In this case, phosphorus is thermally diffused in this polysilicon, and the polysilicon is etched back using dry etching to bury it in the contact holes, thereby forming first conductive members 303.
Referring to FIG. 4B, the tantalum film 304 and the platinum film 305 are stacked on the entire surface by sputtering. Barium strontium titanate ((Ba.sub.0.5 Sr.sub.0.5)TiO.sub.3) is grown at a growth temperature of 650.degree. C. by RF magnetron sputtering to form the high-permittivity film 308. A storage electrode formation resist film 310 is then formed by conventional photolithography.
Referring to FIG. 4C, the high-resistivity film 308, the platinum film 305, and the tantalum film 304 are etched by dry etching, and the resist film 310 is removed. Each storage electrode 306 is constituted by the tantalum film 304 and the platinum film 305.
Referring to FIG. 4D, the insulating film 307 consisting of a silicon oxide film is buried and deposited by CVD to planarize the upper surface to a desired degree.
Referring to FIG. 4E, the insulating film 307 is etched back by dry etching until the upper surface of the insulating film 307 is leveled with the upper surface of the high-permittivity film 308. By this etch-back process, the surface of the high-permittivity film 308 is perfectly exposed, and the film quality is degraded. That is, the high-permittivity film 308 is damaged by etching, and an impurity is mixed therein. Then the counter electrode 309 consisting of a titanium nitride film is stacked on the entire surface to obtain the capacitors shown in FIG. 3.
In this structure, the connection holes (contact holes) need not be formed in units of capacitors, unlike the above prior art, and the number of manufacturing steps can be reduced, thereby preventing a decrease in product yield in this respect. However, since the surface of the high-permittivity film 308 is exposed to an etching atmosphere which degrades the film quality, the reliability of the device is degraded as a whole.
|
{
"pile_set_name": "USPTO Backgrounds"
}
| 0 |
Grinding, sloppy bj, handjob, anal fingering and cumshot on ass in hotel
|
{
"pile_set_name": "OpenWebText2"
}
| 0.069444 |
Your source for Apex Legends Porn, Hentai and XXX
|
{
"pile_set_name": "OpenWebText2"
}
| 0.061224 |
XXX Nikyta – Busty Bitch Comes To Try Black Cocks IV175
454 60%
|
{
"pile_set_name": "OpenWebText2"
}
| 0.0625 |
MILF Julia Ann fucking in the couch with her tits
468 67%
|
{
"pile_set_name": "OpenWebText2"
}
| 0.051724 |
BIG BIG Young ASS
Now you are watching BIG BIG Young ASS porn video which was uploaded to Ass, Young porn category. Free BIG BIG Young ASS porn movie, we also have many other great porn videos which is similar to this and can be find below.
BIG BIG Young Ass 2
Big Older Cock In Tight Young Amateur Ass
Big ass old woman take young cock to ass
Big fat cock in a nice tight young ass!
Big white cock fucking young black ass
big tittied young girl needs cum in her ass
Big cock in beautiful young Russian ass
Big bear drills young studs tight ass
Big hard on dong fills Nikky'_s young pussy and ass
Big booty hot young babe drilled in ass
Big cock young guy cumming on my ass
Big musculare hunk randy jones sucks and fucks young ass
Big older cock in tight young amateur ass
Big dick fucking small young ass
big young cock for tight girlfriend's ass
big young ass
Big cock fucks young tight ass !!!
Big Cock Tight Young Ass
Big dick in a tight young ass
YOUNG SHEMALE ASS ASS ASS ASS ASS ASS !!!!!
Big old dick plug in young girl ass
Big bear drills young studs tight ass
Big butt young boys get fuck in tight ass
Young Anal Tryouts - Lisa gets two hard dicks in her young ass
Perfect young exotic slut with perky tits gets fucked in her young ass
|
{
"pile_set_name": "Pile-CC"
}
| 0.050354 |
Two femdom big strap on and fisting
|
{
"pile_set_name": "OpenWebText2"
}
| 0.057143 |
I WOKE UP HAD SEX SEX didn't get aids sex wife likes sex washed my dick didn't die sex blowjob had sex still made food
4,742 shares
|
{
"pile_set_name": "OpenWebText2"
}
| 0.060606 |
Pussy Fisting. Female Orgasm Denial. She Is Not Allowed To Cum.
|
{
"pile_set_name": "OpenWebText2"
}
| 0.063492 |
Q:
Custom Customer Account Tab
I am following Alan Storms documentation to add a custom tab to accounts page but unfortunately I am running into a hiccup. I am not able to route and load my controller when I click on my custom link tab within accounts. I can definitely add the custom tab but routing the url once I click on it is not doing anything. Running version 1.9.0.1
app/code/community/Brandster/CustomAccount/etc/config.xml
<?xml version="1.0"?>
<config>
<frontend>
<layout>
<updates>
<brandster_customaccount module="Brandster_CustomAccount">
<file>brandster_customaccount.xml</file>
</brandster_customaccount>
</updates>
</layout>
<routers>
<brandster_customaccount>
<use>standard</use>
<args>
<module>Brandster_CustomAccount</module>
<frontName>brandster_customaccount</frontName>
</args>
</brandster_customaccount>
</routers>
</frontend>
<global>
<helpers>
<brandster_customaccount>
<class>Brandster_CustomAccount_Helper</class>
</brandster_customaccount>
</helpers>
</global>
</config>
app/design/frontend/mytheme/mypackage/layout/brandster_customaccount.xml
<?xml version="1.0"?>
<layout>
<customer_account>
<reference name="customer_account_navigation">
<action method="addLink">
<name>our_new_section</name>
<path>brandster_customaccount/index/index</path>
<label>Terms & Conditions</label>
</action>
</reference>
</customer_account>
<brandster_customaccount_index_index>
<update handle="customer_account" />
</brandster_customaccount_index_index>
</layout>
app/code/community/Brandster/CustomAccount/Controllers/IndexController.php
<?php
class Brandster_CustomAccount_IndexController extends Mage_Core_Controller_Front_Action {
public function preDispatch()
{
parent::preDispatch();
$action = $this->getRequest()->getActionName();
$loginUrl = Mage::helper('customer')->getLoginUrl();
if (!Mage::getSingleton('customer/session')->authenticate($this, $loginUrl)) {
$this->setFlag('', self::FLAG_NO_DISPATCH, true);
}
}
}
app/code/community/Brandster/CustomAccount/Helper/Data.php
<?php
class Brandster_CustomAccount_Helper_Data extends Mage_Core_Helper_Abstract
{
}
A:
Your code is actually fine, you simply miss an indexAction() method in your controller. Just add
public function indexAction()
{
$this->loadLayout();
$this->renderLayout();
}
to app/code/community/Brandster/CustomAccount/controllers/IndexController.php. Please note that the folder should be named controllers and not Controllers, otherwise Magento won't find your class.
|
{
"pile_set_name": "StackExchange"
}
| 0 |
Play with her Big Tits and Cum!
tits Play with her Big Tits and Cum! sex, big Play with her Big Tits and Cum! sex, XX5D9 Play with her Big Tits and Cum! sex, boobs Play with her Big Tits and Cum! sex, ass Play with her Big Tits and Cum! sex, sexy Play with her Big Tits and Cum! sex, huge Play with her Big Tits and Cum! sex, suck Play with her Big Tits and Cum! sex, busty Play with her Big Tits and Cum! sex, cum Play with her Big Tits and Cum! sex, pornstar Play with her Big Tits and Cum! sex, amateur Play with her Big Tits and Cum! sex, blonde Play with her Big Tits and Cum! sex, XX645 Play with her Big Tits and Cum! sex, XX627 Play with her Big Tits and Cum! sex, Play with her Big Tits and Cum! sex,
|
{
"pile_set_name": "Pile-CC"
}
| 0.080282 |
58 Views0 Likes
Gaping anal fuck for big boobs pornstar slut Lena Paul. Watch Anal hardcore free HD porn video, the best hardcore porn site. Free hd hot porn sex videos on hdxtube.pw, is home of free Anal porn videos and Massage sex ...
|
{
"pile_set_name": "OpenWebText2"
}
| 0.059072 |
yes
-----Original Message-----
From: Guinn, Linda R.
Sent: Thursday, July 12, 2001 11:34 AM
To: Sanders, Richard B.
Subject: vacation
i'd like to take the week of July 30 - Aug 3 as vacation. please let me know if this time is convenient.
Linda Guinn
Enron Wholesale Services Legal Department
1400 Smith, EB 3829a
Houston, Texas 77002
713/853-6104
713/646-3393
|
{
"pile_set_name": "Enron Emails"
}
| 0 |
A population-based study of Helicobacter pylori infection in Chinese children resident in Hong Kong: prevalence and potential risk factors.
Data of Helicobacter pylori prevalence in children and its risk factors provide clues to the health authority to estimate burden of H. pylori-associated diseases usually encountered in adulthood and facilitate healthcare planning. A cross-sectional population-based study was conducted in Chinese children in elementary and high schools. Schools were selected from all three major areas of Hong Kong. H. pylori infection was defined by a positive (13)C-urea breath test. Study subjects were stratified into six age groups for estimation of prevalence. Potential risk factors were analyzed from data of self-administered questionnaires. A total of 2480 children (aged 6-19, male: 47.3%) participated in the study. Overall, 324 (13.1%) were positive for H. pylori. There was no difference in prevalence between sexes, and no statistical trend in the prevalence across the six age groups. Multivariate logistic regression identified lack of formal education of mother (OR = 2.43, 95%CI 1.36-4.34), family history of gastric cancer (OR = 2.19, 95%CI 1.09-4.41), and household member > 5 (OR = 1.57, 95%CI 1.12-2.19) to be positively associated with H. pylori infection in our children. The H. pylori prevalence of Hong Kong children is comparable to the data of developed countries. The association with family history of gastric cancer justifies further study to investigate the cost-benefit of community screening program for such children to decrease the incidence of gastric cancer in adulthood.
|
{
"pile_set_name": "PubMed Abstracts"
}
| 0 |
I WOKE UP HAD SEX SEX didn't get aids sex wife likes sex washed my dick didn't die sex blowjob had sex still made food
4,742 shares
|
{
"pile_set_name": "OpenWebText2"
}
| 0.060606 |
Supporters have discussed a new club-wide approach to equality and diversity and the possibility of education being built into the club’s sanctioning process at a fans forum which took place on April 3.
Attended by four members of club staff including Simon Thornton, diversity and inclusion manager, Susan Black, director of communications, and Lorna Duckworth, safeguarding and equality officer, the meeting lasted 90 minutes with contributions being made by forum members Paul Amann, Yunus Lunat and Steve Evans.
Red Together
Liverpool Football Club’s new approach to equality and diversity was presented by Simon Thornton who told the forum that the Red Together initiative would be “our focus from 2019-22” and that the basic premise was for it to allow supporters to work alongside the club and its workforce in delivering key objectives.
Outlining the strategy, Simon Thornton said it features a number of aims including:
The delivery of club-wide commitments to diversity and inclusion as part of our strategy
The modernisation of governance and risk processes building equality principles at every opportunity
Building an inclusive club culture
Working to improve our staff profile across a number of characteristics
Focusing on providing an inclusive fan experience
Engaging our supporters in promoting equality and role-model positive behaviour
Supporting a number of pro-equality campaigns throughout the year
Referring specifically to staff profiles, Yunus Lunat said that the document refers solely to gender when statistics would inform that race needs to be a priority given the profile of the club’s current workforce, which is not as representative as the city region in which Liverpool Football Club is based. Further, that Liverpool Football Club should seek to attract the best workforce from beyond the Liverpool region and, therefore, to rely upon the regional statistics is not a true comparison. The benchmark should be the national profiles.
Yunus Lunat added: “Sport claims to be inclusive but if it isn’t living up to that objective in its employment policies how can it stand up to scrutiny? Football’s understanding of racism has to be more than just trying to make sure that people do not suffer racist abuse when they go to matches. Bringing people into the game from different backgrounds has to be a big part of that and only when this happens will we start to see the kind of inclusivity that football clearly needs.”
In response, Simon Thornton said; “This is definitely part of our thinking. We need to look at what we can do to recruit more widely. Red Together will be central to all of this because it is a club-wide commitment to equality and diversity and it is about all aspects of the club so I can assure you that working to improve our staff profile in the coming years is a key objective.”
Paul Amann said: “I absolutely agree that you need a clear strategy, but in my view the club continues to miss a trick when it comes to being more inclusive and more representative. We are all aware of the effects that funding cuts have had on community and grassroots organisations, many of which are based in areas that the club should be doing more to reach out to, and this is something that you should definitely be looking at.
“A lot of those organisations would love to work with the club or simply be endorsed by them simply because of the power of the badge. This can happen on a very basic level via staff volunteering in local communities or it can be through partnerships but the basic principle is that the club needs a human interface and a regular presence. That would help people of various backgrounds feel that they have a connection with Liverpool Football Club beyond football and would also increase the sense that Liverpool is an organisation that they could work for.”
Susan Black replied: “Those points are really valid. If there is a feeling that people do not know how to get into LFC as an employee then it is incumbent on us all to work together to improve that sense of access. If we need to engage more directly then we absolutely can do that. This is something that we are already doing through Red Neighbours but at this stage that only applies to areas that are closest to Anfield, ie the L4, L5 and L6 postcodes. There is a lot of good work going on in this respect, career speed networking and Intu University being two prime examples, and this could easily work in other areas.”
Paul Amann added: “That would definitely be a start and it wouldn’t need to be in all areas initially, you have to run before you can walk obviously, so even if it was initially just rolled out into a couple of areas neighbouring the ones that it already happens in it would be a step in the right direction.”
Sanctioning and education
At the request of Yunus Lunat, and in light of a series of recent incidents, the club agreed to discuss the possibility of education being used as part of its sanctioning process in situations in which it may be deemed appropriate to do so.
Introducing the topic, Simon Thornton said: “Discriminatory behaviour appears to be on the rise and this is clearly a concern. The question I would like to pose in relation to this is how can we work with supporters to change things and ensure that the positive messaging about what this club and its supporters stand for is out there as much as possible? Also, in relation to Yunus’ question, would an educational element be appropriate when someone has acted discriminately?”
Yunus Lunat said: “It is becoming so toxic again, that is the reality. I don’t think it [racism] ever went away but people who are of that mindset clearly feel emboldened at the moment and this is reflected in some of the incidents that we have all seen. An initial idea for this football club would be to hold a day of inclusion which celebrates that we are one no matter what background we come from and which also serves to isolate those who do not share that mindset. It needs a big push – a game to focus on and focus minds.”
Paul Amann, Yunus Lunat and Steve Evans were all in agreement that education should be built into the sanctions process with Paul Amann commenting that “lessons will only be learned if there is some sort of educational element and restorative justice.”
Yunus Lunat added: “With a lot of sanctions processes it is a case of throw away the key and do not pass go. I am not suggesting there aren’t cases in which individuals deserve to be banned and indeed should be banned but sometimes you have to look at the behaviour and the person responsible for it and ask whether there is an opportunity for education and reform.
“In my opinion, one of the mandatory sanctions should be education either online or in person but in the case of a secondary offence a permanent ban has to be an option. It can’t just be about punishment, though, as that in isolation does not lead to a change in behaviour.”
With Spirit of Shankly (SOS) representative Phil Rowan unable to attend the forum due to work commitments, forum chair Tony Barrett confirmed that he had consulted with outgoing SOS chair James McKenna prior to the meeting. During that conversation, James McKenna confirmed that SOS would be supportive of education being added to the sanctions process.
Steve Evans said: “It has to be about education. For all of us, Liverpool Football Club is our lives and if any of us let ourselves down we should have the opportunity to prove it was a one off and that we can and will learn from it. But if it is a serious offence then the punishment has to be severe and, as Yunus said, the individual would have to be banned.”
Paul Amann said: “In terms of sanctions, a further issue that hasn’t been mentioned is consistency. The lack of consistency with which instances of racism are dealt with in comparison with instances of homophobia is something that needs to be addressed. There have been examples in which racism has been, quite rightly, dealt with severely but the same has not been the case when it comes to homophobia. There needs to be a level playing field for sanctions.
“But in relation to education and rehabilitation, I would add that if someone does go through that kind of process it would be up to the club to track their behaviour if and when they returned to the ground. I know this might be perceived as a bit ‘Big Brother’ but it is a fair response to the kind of behaviour that we are discussing as the one thing that would not be acceptable would be for it to be repeated unchecked.
“Also, a further caveat should be that if anyone who is found to have committed any kind of discriminatory behaviour is also found to be a member of a proscribed political organisation I would have no hesitation in saying they should be banned for life.”
Forum chair Tony Barrett said: “This was a very forthright forum in which supporters underlined their support for the club’s equality and diversity strategy but also called for heightened activity in this area, particularly in terms of engaging communities and addressing some of the staff profile challenges that the club is facing. There was also unanimous support for the idea of introducing an educational element into the sanctions process which will now be discussed by club officials.”
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
postulate
A : Set
variable
{xx} : A
record R : Set₁ where
field
P : A → Set
a : P xx
b : P xx
c : P xx
d : P xx
e : P xx
f : P xx
g : P xx
h : P xx
i : P xx
j : P xx
k : P xx
l : P xx
m : P xx
n : P xx
o : P xx
p : P xx
q : P xx
r : P xx
s : P xx
t : P xx
u : P xx
v : P xx
w : P xx
x : P xx
y : P xx
z : P xx
|
{
"pile_set_name": "Github"
}
| 0.063232 |
Q:
trying to read a text file in clojure and insert the data into a list or a vector
So basically my question is I was trying to read a data from a text file which is numbers like this: "1 5 3 8 9 3 23 67 90" and i wanted to read them number by number and put this in a list or a vector or array. However this is my first time coding with Clojure and that is why i am asking this question.
what i did so far is this which i am sure it is not correct.
(def nums11 (slurp "C:\\Users\\XXX\\Desktop\\100.txt"))
However this will only read the file as one string. so i decided to add this line
(clojure.string/split nums11 #" ")
is there any way to add them, after i split them, into a list or a vector or array.
or maybe there is an easy way to do this?
Thanks in advance.
A:
You are in the right path already, so I'll try to explain what's next:
The function clojure.string/split returns a vector of Strings. The vector in Clojure is a collection that implements the Java interface java.util.List so you are done if all you needed was to turn the contents of the file into a collection of Strings representing the numbers (to turn these into actual numbers, read on).
Probably you want to manipulate the elements as actual numbers. In Clojure, you'll need to use some function to turn each String into a number (say "34" into the actual number 34). There are two simple ways: using Java interop and call Integer.parseInt(...) or use a function provided by Clojure that is able to read a String and return a whatever it represents (eg. read-string).
Since we need to call a function (read-string) to every element of the list of Strings representing numbers, we'll use map, a function that takes a function f and a collection xs, and calls a the function f on every element of xs, returning the result as another list.
If we glue it all together, it will be something like the following (I'll use let to give names to the intermediate results):
(let [file-contents (slurp "C:\\Users\\XXX\\Desktop\\100.txt")
nums-as-strings (clojure.string/split file-contents #" ")
numbers (map read-string nums-as-strings)]
... here the list of numbers will be on numbers; and now you can perform operations on them, such as summing all of them:
(reduce + numbers) ;; Compute the sum of all the numbers
There are a number of small details that I've glossed over, but this should put you in the right track.
|
{
"pile_set_name": "StackExchange"
}
| 0 |
1. Field of the Invention
The present invention relates to a transversal filter, and more particularly to a transversal filter having an analog shift register comprising a series input and a plurality of parallel outputs, in which an input signal can be supplied to the series input of the form of successively-sampled signal values and signals may be tapped at the parallel outputs and supplied to a summer and/or subtractor whose output signal represents the filtered signal, and in which a plurality of signal weighting devices are assigned to the stages of the shift register.
2. Description of the Prior Art
A transversal filter of the general type set forth above is known, for example, from the publication Siemens Forschungs- und Entwicklungsberichten, Vol. 7, No. 3, 1978, Springer-Verlag 1978, pp. 138-142, with particular reference to FIG. 1a. Weighting factors a.sub.0 -a.sub.n are assigned to the signal weighting devices of the individual register stages which are connected in series with the parallel outputs, the weighting factors corresponding to the filter coefficients referenced a.sub.0 -a.sub.n in the equation EQU H(z)=a.sub.0 =a.sub.1 z+a.sub.2 .multidot.z.sup.2 + . . . +a.sub.n .multidot.z.sup.n ( 1)
where H(z) represents the system function of the filtered signal and z represents the delay time which a sampled signal value experiences when traversing one stage of the shift register. It is disadvantageous, however, that the weighting factors a.sub.0 -a.sub.n can assume greatly divergent values for realizing specific filter curves, thus complicating realization of the filter circuit.
|
{
"pile_set_name": "USPTO Backgrounds"
}
| 0 |
enum E of xxx {
}
|
{
"pile_set_name": "Github"
}
| 0.055556 |
Sexy and hairy mature fuck anal assfuck troia takes hard cock in the ass all the way tits
|
{
"pile_set_name": "OpenWebText2"
}
| 0.067416 |
Fucking The Cum Out of Him
|
{
"pile_set_name": "OpenWebText2"
}
| 0.076923 |
FUCK YOU>
|
{
"pile_set_name": "Enron Emails"
}
| 0.111111 |
{#F0001_19812}
|
{
"pile_set_name": "PubMed Central"
}
| 0 |
This invention relates generally to notifications and alerts received or generated by devices such as computers, and more particularly to an architecture for managing such alerts.
The typical computer user is faced with notifications and alerts generated from many different sources. For example, an operating system may notify the user that the system is running low on memory. An electronic mail program may notify the user that he or she has received new electronic mail. A calendaring program may notify the user that he or she has an upcoming appointment. A software application may infer that a user might benefit from some assistance. A electronic news or business service may be decide that a user might like to review some information about a development in the world.
Generally, within the prior art, the user is made aware of each alert about different forms of information on an ad hoc basis, by the generating program. For example, the user may be in the middle of an important video conference taking place on the computer, yet the electronic mail program usually will dutifully alert the user to new email receivedxe2x80x94even if is junk mail, and even if the user would rather not receive such alerts because of the importance of the conference. While the user may or may not be able to change alert preferences in an individual program, he or she generally is not able to set preferences that affect all programs, system-wide, and furthermore many programs do not allow the changing of such preferences. Beyond the lack of an ability to centrally control alerts, there is a lack of methods that consider dynamically the urgency or importance of notifications and that can weigh the value of transmitting the information with the potential context-sensitive costs to the user in terms of the distraction, obstruction of limited screen real estate associated with the rendering of visual or audio notifications. Such costs can be dependent on the context, including the user""s current location (office vs. offsite location for user""s with mobile computing or paging devices), the current task at hand, and current overall focus of attention. Methods have not been available for personal computing and communications systems that have the ability to intelligently balance the value of speedy transmittal of a notification (or the costs of delaying the notification of users) with the cost of notifying users.
The situation of being faced with an intermittent stream of messages from multiple applications and messages is only likely to get worse, as the computer becomes a convergence appliance, and other devices, such as telephones, pagers, televisions, appliances, etc., communicate through the computer. For example, a telephone may alert the user to an incoming call, including the phone number of the call, while a television may alert the user to a show that he or she had previously indicated was important to watch. Thus, the user potentially faces a situation where he or she is constantly distracted by such alerts.
For these and other reasons, there is a need for the present invention.
The invention relates to an architecture for managing alerts. In one embodiment, a computerized system includes several modules and application interfaces, including an attentional-status module, a peripheral information notification and alerts module, and a notification decision making module. The notification decision making module in some embodiments can be further decomposed into a distinct rendering module. Such a system also provides in one embodiment a specific set of interfaces that allows multiple applications to publish their presence and functionality and subscribe to the architecture.
The attentional-status module continues to infer the probabilities of alternative states of attention of the user based on the monitoring of events generated or influenced by the user""s behavior and consideration of other important evidence, including the user""s calendar and time of day. In another embodiment, the module simply generates the probability that the user is currently in a state where he or she is either actively interested in reviewing alerts or becomes xe2x80x9cavailablexe2x80x9d to receive a notification with zero or minimal cost. As shorthand, the probability of being available for reviewing alerts with minimal cost is also referred to as the user-availability probability. In one embodiment, in addition to the probability distribution over the focus of attention or over the availability of the user, the attentional status module also infers a probability distribution over the period of time until the user becomes available for reviewing alerts with minimal cost. In one embodiment, this module utilizes a probabilistic model such as a Bayesian network model to infer the probabilities of alternate states of attention, the availability probability, or the probability over the period of time until the user becomes available for reviewing alerts at minimal cost.
The peripheral information notification and alerts module is to receive information, notifications, and alerts, for example, in one embodiment, from a set of application programs running on a computer, as well as from external devices such as telephones, televisions, etc. The notification decision-making module makes decisions about how, if, and when to alert the user about the information and alerts received by the peripheral information notification and alerts module, based on the probabilities generated by the attentional status module about the likelihood of alternate states of attention. In one embodiment, the system employs a decision-theoretic analysis about how and when to render an alert based on a consideration of the expected costs of interrupting the user by considering the costs of interruption for each of the possible states of attentional focus and the likelihood of each of the states. In one embodiment, this module determines the manner by which the user is alertedxe2x80x94for example, in an audio or visual manner, or on a mobile device such as a cell phone or a pager.
Embodiments of the invention provide for advantages over the prior art. A user, for example, is not confronted with different alerts made in different manners ad hoc by different sources (e.g., programs or devices). Rather, alert management is centralized and is guided by policies derived from knowledge about costs or preferences. Furthermore, in one embodiment, the expected value of transmitting an alert determines whether the user desires to be alerted, based on what the user is currently doing, for example, on the current sensed activity and his or her prior history of responding to alerts. The importance of the alerts also can determine whether the user is alerted. Finally, the notification decision-making module ensures that alerts are presented to the user in a consistent manner, regardless of the source of the alerts, and can decide in one embodiment the manner of the alert based on its importancexe2x80x94for example, a salient visual and audio alert in the case of an extremely important alert, and a pleasant, low volume audio-only alert in the case of a low-priority alert.
|
{
"pile_set_name": "USPTO Backgrounds"
}
| 0 |
no one around to rape better rape my own ass
387 shares
|
{
"pile_set_name": "OpenWebText2"
}
| 0.053571 |
Safety
Thomas Built Buses Partners with YouTube Channel on School Bus Safety
Thomas Built Buses and YouTube channel Bored Shorts created a kid-friendly video on school bus safety.
HIGH POINT, N.C. — Just in time for the back-to-school season, Thomas Built Buses has partnered with YouTube channel Bored Shorts TV to create a “Kid Snippet” video on school bus safety.
The video premiered on YouTube on Aug. 1, and has already gained thousands of views.
“School bus safety is a very serious issue that is extremely important to us,” said Caley Edgerly, president and CEO of Thomas Built Buses. “I have kids and know that sometimes, the best way to teach a child is to make the subject matter memorable. Bored Shorts is known for creating family-friendly entertainment, which is why we partnered with them to share school bus safety tips in a fun way. Through our partnership, we hope to make school bus safety top of mind as children go back to school this school year.”
The video showcases a humorous dialogue among a bus driver, teacher, and students on school bus rules: a conversation envisioned by children but acted out by adults.
“We like to see the world through the eyes of children,” said Dave Roberts of Bored Shorts TV. “That’s what makes the videos so funny. We ask children about how to be safe on a school bus and just record their thoughts. When we act out the scenes using adults, the outcome is pure magic.”
After watching the video, parents and teachers are encouraged to visit www.thomasbus.com/safetyfor a complete list of school bus safety rules to discuss with their children.
“At the end of the day, we want to be sure children across the country get to and from school safely,” Edgerly added. “Our hope is that this video serves as a platform for parents and teachers to engage in dialogue with children as they discuss the importance of being safe on and around a school bus.”
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
Break-in hoax at VP Mnangagwa’s office
Freeman Razemba Crime Reporter Vice President Emmerson Mnangagwa’s office was not broken into by thieves and the suspected objects found on the ground yesterday were a result of water leakages through the ceiling, police have confirmed.
In an interview, chief police spokesperson Senior Assistant Commissioner Charity Charamba, said this was arrived at following an analysis of the objects by police and other security agents.
“An official report was received from VP Mnangawa’s office to the effect that they had observed some abnormalities when they reported for work in the office of the Vice President.
“Following that report, a Ferret Team comprising of ZRP and other security sister organisations visited the crime scene and made an analysis. They observed that there were no visible disturbances in the office,” she said.
Snr Asst Comm Charamba said the team observed a hole on the ceiling panel on the western side of the office.
“The team observed some fallen panel chips on the carpet directly below that hole. So they conducted investigations as a team. They also summoned the Police Forensic Science experts.
“They examined the carpet area and so far initial investigations indicate that there was no evidence of drilling and the hole appeared to have been perforated by dripping water. The fibre glass within the hole was unbroken and intact suggesting that no object was used to perforate the hole,” she said.
“Also observed was an initial development of a similar hole manifesting on the same panel due to water dripping and seepage. There was a roof bolt directly above the hole. The ceiling panel in question is adjacent to the previous panel from the January 13 incident.”
Snr Asst Comm Charamba said the findings indicate that there were no signs of forced entry into the VP’s office through the door, window and ceiling.
She said the ceiling and the panel that had a hole was beyond reach from within the ceiling. Snr Asst Comm Charamba said police and other security organisations were still investigating the other cases in which VP Mnangagwa’s office was broken into by unknown culprits.
In January, there was a break-in at VP Mnangagwa’s office and Government expressed concern at continuous attempts on his life as it pledged to bring the culprits to book.
This was the sixth time unidentified culprits had tampered with VP Mnangagwa’s offices in Government and at the Zanu-PF headquarters.
VP Mnangagwa’s offices have been broken into four times at the Ministry of Justice, Legal and Parliamentary Affairs and once at Defence House when he was Defence Minister.
His offices at Zanu-PF Headquarters in Harare were broken into by unknown elements in 2014 who laced his desk with cyanide, poisoning his secretary who had to be hospitalised.
In the latest break-in at the Government Complex, the culprits drilled a ceiling panel to gain entry. There were no indications of anything stolen.
VP Mnangagwa could not be reached for a comment as he is out of the country on official business.
Related Posts
Nxaaa publicity seeking cry baby. Grow up dambudzo wakutitambudza manje. You can not have the highest office of the land that way.
sambiri
Living a hoax double life Mnangagwa tsikukuwiri!
coastman
So they have confirmed that there is a big drip in Mnangagwa’s office? I could have told them that.
Dr Newton Galileo Einsten
ZRP very clinical in detailing a non-event- even talking of “perforating a hole”- sounds like wetting water !!!! Anyway we are told investigations are on going and we will definitely hear of a detailed report there. Thanks SAC!
Handei Tione!
You mean to tell me there’s more to this perforated hole saga to warrant a detailed report? Havana chekuitaka vanhu ava…
guest
haha if he can’t tell the difference between a water leak and break in, then he’s judgment is now poor hence he’s not fit to be the next president!!
Ndinevimbo
Thought VP Mnangagwa hardly ever genuinely worked from his ‘officially’ allocated office always under scrutiny from security forces imposed by others? Those that ostensibly work there must have orders to report the slightest anomaly no matter how ridiculous.
Handei Tione!
Yeah, a water leak might require a plumber or, in this case, a roofer and not the ZRP and “other security sister organisations”.
bodo_kwete
inga ceiling yacho yanetsa iyi? Are you serious that such an office can just be that badly maintained
Chirikure
Office ya VP leaking!!! What a paradox. Are they condemning this guy to the extent of giving him a leaking office while others spend a year in a five star hotel amidst poverty and hunger among the masses. What on earth is going on?
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
Dysplasia in ulcerative colitis as a predictor of unsuspected synchronous colorectal cancer.
Endoscopic surveillance of patients with ulcerative colitis aims to prevent cancer-related morbidity through the detection and treatment of dysplasia. The literature to date varies widely with regard to the importance of dysplasia as a marker for colorectal cancer at the time of colectomy. The aim of this study was to accurately characterize the extent to which the preoperative detection of dysplasia is associated with undetected cancer in patients with ulcerative colitis. A retrospective chart review was conducted of patients undergoing surgery for colitis within the Mayo Clinic Health System between August 1993 and July 2012. Patient demographics and pre- and postoperative dysplasia were tabulated. The relationship between pre- and postoperative dysplasia/cancer in surgical pathology specimens was assessed. A total of 2130 patients underwent abdominal colectomy or proctocolectomy; 329 patients were identified (15%) as having at least 1 focus of dysplasia preoperatively. Of these 329 patients, the majority were male (69%) with a mean age of 49.7 years. Unsuspected cancer was found in 6 surgical specimens. Indeterminate dysplasia was not associated with cancer (0/50). Preoperative low-grade dysplasia was associated with a 2% (3/141) risk of undetected cancer when present in random surveillance biopsies and a 3% (2/79) risk if detected in endoscopically visible lesions. Similarly, 3% (1/33) of patients identified preoperatively with random surveillance biopsy high-grade dysplasia harbored undetected cancer. Unsuspected dysplasia was found in 62/1801 (3%) cases without preoperative dysplasia. This study is limited by its retrospective nature and by its lack of evaluation of the natural history of dysplastic lesions that progress to cancer. The presence of dysplasia was associated with a low risk of unsuspected cancer at the time of colectomy. These findings will help inform the decision-making process for patients with ulcerative colitis who are considering intensive surveillance vs surgical intervention after a diagnosis of dysplasia.
|
{
"pile_set_name": "PubMed Abstracts"
}
| 0 |
// evmone-fuzzer: LibFuzzer based testing tool for EVMC-compatible EVM implementations.
// Copyright 2019 The evmone Authors.
// SPDX-License-Identifier: Apache-2.0
#include <evmc/mocked_host.hpp>
#include <evmone/evmone.h>
#include <test/utils/bytecode.hpp>
#include <test/utils/utils.hpp>
#include <cstring>
#include <iostream>
constexpr auto latest_rev = EVMC_ISTANBUL;
inline std::ostream& operator<<(std::ostream& os, const evmc_address& addr)
{
return os << hex({addr.bytes, sizeof(addr.bytes)});
}
inline std::ostream& operator<<(std::ostream& os, const evmc_bytes32& v)
{
return os << hex({v.bytes, sizeof(v.bytes)});
}
inline std::ostream& operator<<(std::ostream& os, const bytes_view& v)
{
return os << hex(v);
}
[[clang::always_inline]] inline void assert_true(
bool cond, const char* cond_str, const char* file, int line)
{
if (!cond)
{
std::cerr << "ASSERTION FAILED: \"" << cond_str << "\"\n\tin " << file << ":" << line
<< std::endl;
__builtin_trap();
}
}
#define ASSERT(COND) assert_true(COND, #COND, __FILE__, __LINE__)
template <typename T1, typename T2>
[[clang::always_inline]] inline void assert_eq(
const T1& a, const T2& b, const char* a_str, const char* b_str, const char* file, int line)
{
if (!(a == b))
{
std::cerr << "ASSERTION FAILED: \"" << a_str << " == " << b_str << "\"\n\twith " << a
<< " != " << b << "\n\tin " << file << ":" << line << std::endl;
__builtin_trap();
}
}
#define ASSERT_EQ(A, B) assert_eq(A, B, #A, #B, __FILE__, __LINE__)
static auto print_input = std::getenv("PRINT");
extern "C" evmc_vm* evmc_create_aleth_interpreter() noexcept;
/// The reference VM.
static auto ref_vm = evmc::VM{evmc_create_evmone()};
#pragma clang diagnostic ignored "-Wzero-length-array"
static evmc::VM external_vms[] = {
#if ALETH
evmc::VM{evmc_create_aleth_interpreter()},
#endif
};
class FuzzHost : public evmc::MockedHost
{
public:
uint8_t gas_left_factor = 0;
evmc::result call(const evmc_message& msg) noexcept override
{
auto result = MockedHost::call(msg);
// Set gas_left.
if (gas_left_factor == 0)
result.gas_left = 0;
else if (gas_left_factor == 1)
result.gas_left = msg.gas;
else
result.gas_left = msg.gas / (gas_left_factor + 3);
if (msg.kind == EVMC_CREATE || msg.kind == EVMC_CREATE2)
{
// Use the output to fill the create address.
// We still keep the output to check if VM is going to ignore it.
std::memcpy(result.create_address.bytes, result.output_data,
std::min(sizeof(result.create_address), result.output_size));
}
return result;
}
};
/// The newest "old" EVM revision. Lower priority.
static constexpr auto old_rev = EVMC_SPURIOUS_DRAGON;
/// The additional gas limit cap for "old" EVM revisions.
static constexpr auto old_rev_max_gas = 500000;
struct fuzz_input
{
evmc_revision rev{};
evmc_message msg{};
FuzzHost host;
/// Creates invalid input.
fuzz_input() noexcept { msg.gas = -1; }
explicit operator bool() const noexcept { return msg.gas != -1; }
};
inline evmc::uint256be generate_interesting_value(uint8_t b) noexcept
{
const auto s = (b >> 6) & 0b11;
const auto fill = (b >> 5) & 0b1;
const auto above = (b >> 4) & 0b1;
const auto val = b & 0b1111;
auto z = evmc::uint256be{};
const size_t size = s == 0 ? 1 : 1 << (s + 2);
if (fill)
{
for (auto i = sizeof(z) - size; i < sizeof(z); ++i)
z.bytes[i] = 0xff;
}
if (above)
z.bytes[sizeof(z) - size % sizeof(z) - 1] ^= val;
else
z.bytes[sizeof(z) - size] ^= val << 4;
return z;
}
inline evmc::address generate_interesting_address(uint8_t b) noexcept
{
const auto s = (b >> 6) & 0b11;
const auto fill = (b >> 5) & 0b1;
const auto above = (b >> 4) & 0b1;
const auto val = b & 0b1111;
auto z = evmc::address{};
const size_t size = s == 3 ? 20 : 1 << s;
if (fill)
{
for (auto i = sizeof(z) - size; i < sizeof(z); ++i)
z.bytes[i] = 0xff;
}
if (above)
z.bytes[sizeof(z) - size % sizeof(z) - 1] ^= val;
else
z.bytes[sizeof(z) - size] ^= val << 4;
return z;
}
inline int generate_depth(uint8_t x_2bits) noexcept
{
const auto h = (x_2bits >> 1) & 0b1;
const auto l = x_2bits & 0b1;
return 1023 * h + l; // 0, 1, 1023, 1024.
}
/// Creates the block number value from 8-bit value.
/// The result is still quite small because block number affects blockhash().
inline int expand_block_number(uint8_t x) noexcept
{
return x * 97;
}
inline int64_t expand_block_timestamp(uint8_t x) noexcept
{
// TODO: If timestamp is -1 Aleth and evmone disagrees how to covert it to uint256.
return x < 255 ? int64_t{16777619} * x : std::numeric_limits<int64_t>::max();
}
inline int64_t expand_block_gas_limit(uint8_t x) noexcept
{
return x == 0 ? 0 : std::numeric_limits<int64_t>::max() / x;
}
fuzz_input populate_input(const uint8_t* data, size_t data_size) noexcept
{
auto in = fuzz_input{};
constexpr auto min_required_size = 24;
if (data_size < min_required_size)
return in;
const auto rev_4bits = data[0] >> 4;
const auto kind_1bit = (data[0] >> 3) & 0b1;
const auto static_1bit = (data[0] >> 2) & 0b1;
const auto depth_2bits = uint8_t(data[0] & 0b11);
const auto gas_24bits = (data[1] << 16) | (data[2] << 8) | data[3]; // Max 16777216.
const auto input_size_16bits = unsigned(data[4] << 8) | data[5];
const auto destination_8bits = data[6];
const auto sender_8bits = data[7];
const auto value_8bits = data[8];
const auto create2_salt_8bits = data[9];
const auto tx_gas_price_8bits = data[10];
const auto tx_origin_8bits = data[11];
const auto block_coinbase_8bits = data[12];
const auto block_number_8bits = data[13];
const auto block_timestamp_8bits = data[14];
const auto block_gas_limit_8bits = data[15];
const auto block_difficulty_8bits = data[16];
const auto chainid_8bits = data[17];
const auto account_balance_8bits = data[18];
const auto account_storage_key1_8bits = data[19];
const auto account_storage_key2_8bits = data[20];
const auto account_codehash_8bits = data[21];
// TODO: Add another account?
const auto call_result_status_4bits = data[22] >> 4;
const auto call_result_gas_left_factor_4bits = uint8_t(data[23] & 0b1111);
data += min_required_size;
data_size -= min_required_size;
if (data_size < input_size_16bits) // Not enough data for input.
return in;
in.rev = rev_4bits > latest_rev ? latest_rev : static_cast<evmc_revision>(rev_4bits);
// The message king should not matter but this 1 bit was free.
in.msg.kind = kind_1bit ? EVMC_CREATE : EVMC_CALL;
in.msg.flags = static_1bit ? EVMC_STATIC : 0;
in.msg.depth = generate_depth(depth_2bits);
// Set the gas limit. For old revisions cap the gas limit more because:
// - they are less priority,
// - pre Tangerine Whistle calls are extremely cheap and it is easy to find slow running units.
in.msg.gas = in.rev <= old_rev ? std::min(gas_24bits, old_rev_max_gas) : gas_24bits;
in.msg.destination = generate_interesting_address(destination_8bits);
in.msg.sender = generate_interesting_address(sender_8bits);
in.msg.input_size = input_size_16bits;
in.msg.input_data = data;
in.msg.value = generate_interesting_value(value_8bits);
// Should be ignored by VMs.
in.msg.create2_salt = generate_interesting_value(create2_salt_8bits);
data += in.msg.input_size;
data_size -= in.msg.input_size;
in.host.tx_context.tx_gas_price = generate_interesting_value(tx_gas_price_8bits);
in.host.tx_context.tx_origin = generate_interesting_address(tx_origin_8bits);
in.host.tx_context.block_coinbase = generate_interesting_address(block_coinbase_8bits);
in.host.tx_context.block_number = expand_block_number(block_number_8bits);
in.host.tx_context.block_timestamp = expand_block_timestamp(block_timestamp_8bits);
in.host.tx_context.block_gas_limit = expand_block_gas_limit(block_gas_limit_8bits);
in.host.tx_context.block_difficulty = generate_interesting_value(block_difficulty_8bits);
in.host.tx_context.chain_id = generate_interesting_value(chainid_8bits);
auto& account = in.host.accounts[in.msg.destination];
account.balance = generate_interesting_value(account_balance_8bits);
const auto storage_key1 = generate_interesting_value(account_storage_key1_8bits);
const auto storage_key2 = generate_interesting_value(account_storage_key2_8bits);
account.storage[{}] = storage_key2;
account.storage[storage_key1] = storage_key2;
// Add dirty value as if it has been already modified in this transaction.
account.storage[storage_key2] = {storage_key1, true};
account.codehash = generate_interesting_value(account_codehash_8bits);
account.code = {data, data_size}; // Use remaining data as code.
in.host.call_result.status_code = static_cast<evmc_status_code>(call_result_status_4bits);
in.host.gas_left_factor = call_result_gas_left_factor_4bits;
// Use 3/5 of the input from the and as the potential call output.
const auto offset = in.msg.input_size * 2 / 5;
in.host.call_result.output_data = &in.msg.input_data[offset];
in.host.call_result.output_size = in.msg.input_size - offset;
return in;
}
inline auto hex(const evmc_address& addr) noexcept
{
return hex({addr.bytes, sizeof(addr)});
}
inline evmc_status_code check_and_normalize(evmc_status_code status) noexcept
{
ASSERT(status >= 0);
return status <= EVMC_REVERT ? status : EVMC_FAILURE;
}
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t data_size) noexcept
{
auto in = populate_input(data, data_size);
if (!in)
return 0;
auto& ref_host = in.host;
const auto& code = ref_host.accounts[in.msg.destination].code;
auto host = ref_host; // Copy Host.
if (print_input)
{
std::cout << "rev: " << int{in.rev} << "\n";
std::cout << "depth: " << int{in.msg.depth} << "\n";
std::cout << "code: " << hex(code) << "\n";
std::cout << "decoded: " << decode(code, in.rev) << "\n";
std::cout << "input: " << hex({in.msg.input_data, in.msg.input_size}) << "\n";
std::cout << "account: " << hex(in.msg.destination) << "\n";
std::cout << "caller: " << hex(in.msg.sender) << "\n";
std::cout << "value: " << in.msg.value << "\n";
std::cout << "gas: " << in.msg.gas << "\n";
std::cout << "balance: " << in.host.accounts[in.msg.destination].balance << "\n";
std::cout << "coinbase: " << in.host.tx_context.block_coinbase << "\n";
std::cout << "difficulty: " << in.host.tx_context.block_difficulty << "\n";
std::cout << "timestamp: " << in.host.tx_context.block_timestamp << "\n";
std::cout << "chainid: " << in.host.tx_context.chain_id << "\n";
}
const auto ref_res = ref_vm.execute(ref_host, in.rev, in.msg, code.data(), code.size());
const auto ref_status = check_and_normalize(ref_res.status_code);
if (ref_status == EVMC_FAILURE)
ASSERT_EQ(ref_res.gas_left, 0);
for (auto& vm : external_vms)
{
const auto res = vm.execute(host, in.rev, in.msg, code.data(), code.size());
const auto status = check_and_normalize(res.status_code);
ASSERT_EQ(status, ref_status);
ASSERT_EQ(res.gas_left, ref_res.gas_left);
ASSERT_EQ(bytes_view(res.output_data, res.output_size),
bytes_view(ref_res.output_data, ref_res.output_size));
if (ref_status != EVMC_FAILURE)
{
ASSERT_EQ(ref_host.recorded_calls.size(), host.recorded_calls.size());
for (size_t i = 0; i < ref_host.recorded_calls.size(); ++i)
{
const auto& m1 = ref_host.recorded_calls[i];
const auto& m2 = host.recorded_calls[i];
ASSERT_EQ(m1.kind, m2.kind);
ASSERT_EQ(m1.flags, m2.flags);
ASSERT_EQ(m1.depth, m2.depth);
ASSERT_EQ(m1.gas, m2.gas);
ASSERT_EQ(evmc::address{m1.destination}, evmc::address{m2.destination});
ASSERT_EQ(evmc::address{m1.sender}, evmc::address{m2.sender});
ASSERT_EQ(bytes_view(m1.input_data, m1.input_size),
bytes_view(m2.input_data, m2.input_size));
ASSERT_EQ(evmc::uint256be{m1.value}, evmc::uint256be{m2.value});
ASSERT_EQ(evmc::bytes32{m1.create2_salt}, evmc::bytes32{m2.create2_salt});
}
ASSERT(std::equal(ref_host.recorded_logs.begin(), ref_host.recorded_logs.end(),
host.recorded_logs.begin(), host.recorded_logs.end()));
ASSERT(std::equal(ref_host.recorded_blockhashes.begin(),
ref_host.recorded_blockhashes.end(), host.recorded_blockhashes.begin(),
host.recorded_blockhashes.end()));
ASSERT(std::equal(ref_host.recorded_selfdestructs.begin(),
ref_host.recorded_selfdestructs.end(), host.recorded_selfdestructs.begin(),
host.recorded_selfdestructs.end()));
// TODO: Enable account accesses check. Currently this is not possible because Aleth
// is doing additional unnecessary account existence checks in calls.
// ASSERT(std::equal(ref_host.recorded_account_accesses.begin(),
// ref_host.recorded_account_accesses.end(), host.recorded_account_accesses.begin(),
// host.recorded_account_accesses.end()));
}
}
return 0;
}
|
{
"pile_set_name": "Github"
}
| 0 |
Q:
jenkind build from dockerfile appear docker: Error response from daemon: oci runtime error: container_linux.go:235
When I build the job from my Dockerfile in Jenkins
I got the error like "docker: Error response from daemon: oci runtime error: container_linux.go:235" when the console try to exec the docker images.
My Jenkins is built by Dockerfile. Reference is https://medium.com/@gustavo.guss/jenkins-building-docker-image-and-sending-to-registry-64b84ea45ee9.
FROM jenkins/jenkins:lts
USER root
RUN apt-get update && \
apt-get -y install apt-transport-https \
ca-certificates \
curl \
gnupg2 \
software-properties-common && \
curl -fsSL https://download.docker.com/linux/$(. /etc/os-release; echo "$ID")/gpg > /tmp/dkey; apt-key add /tmp/dkey && \
add-apt-repository \
"deb [arch=amd64] https://download.docker.com/linux/$(. /etc/os-release; echo "$ID") \
$(lsb_release -cs) \
stable" && \
apt-get update && \
apt-get -y install docker-ce
RUN apt-get install -y docker-ce
RUN usermod -a -G docker jenkins
USER jenkins
My Jenkins output like the below. The error is return after succeed build the images.
Successfully built b9afd9ecb148
docker: Error response from daemon: oci runtime error: container_linux.go:235: starting container process caused "chdir to cwd (\"/var/jenkins_home/workspace/Integration-Es-Contracts\") set in config.json failed: no such file or directory".
FATAL: Failed to run docker image
A:
I found the issue is related to the permissions.
|
{
"pile_set_name": "StackExchange"
}
| 0 |
Jojo Kiss Can Ride Cock With Her Pussy And Asshole
209 75%
|
{
"pile_set_name": "OpenWebText2"
}
| 0.050847 |
If ISIS was telling the truth when it claimed responsibility for Friday's Paris terror attacks, then this represents a "major shift in ISIS's global strategy," according to Will McCants.
McCants is the director of the Brookings Institution's Project on US Relations With the Islamic World and the author of The ISIS Apocalypse — one of the best books to date on the group. I called him on Saturday to try to understand what lessons about ISIS we should draw from the Paris attacks if indeed the group is responsible as both it and the French government say.
McCants cautioned that we still don't know a lot about the Paris attacks. But in recent weeks, he says, ISIS has launched a suicide attack against an area in Lebanon where Hezbollah is strong. It's also suspected of bombing a Russian civilian airliner in Egypt. These attacks together, he says, suggest that ISIS is lashing out. It's been losing territory in Syria and Iraq, and this might be a response — an effort to deter further intervention against it by showing foreign powers that they'll pay a price.
If McCants is right, then the Paris attacks suggest that we could be at a watershed moment for ISIS. What follows is a transcript of our conversation, edited for length and clarity.
Zack Beauchamp: If the Paris attack was, as it seems, done by ISIS, what would this tell us about their strategy?
Will McCants: It would tell us that they are willing to hit their primary enemies in foreign places where they are most vulnerable, and note that all three of those attacks [Paris, Beirut, Russian airliner] were not on government sites. They were on civilians, they were all complex, and they were all high casualty.
If ISIS directed this plot in Paris, it's also a shift in its operational focus and capability. Before this, they had satisfied themselves with trying to inspire attacks. But anyone skilled who's abroad, they were primarily trying to attract them to Syria and Iraq for state building. This would suggest that they have changed their focus and are willing to direct more resources to foreign operations.
"They may have been developing this capability for quite some time, and it's only now that they are unleashing it"
Zack Beauchamp: Why would ISIS start devoting resources to international terrorism now, when previously it's focused much more on taking and holding territory in Syria and Iraq?
Will McCants: We can't know for sure. I can come up with some plausible reasons, but it's completely guesswork.
One type of explanation is that this is primarily about recruits and keeping momentum going. You could say that this is part of the broader struggle to displace al-Qaeda as the head of the global jihad — think of it as part of a competition with them for recruits. They've also been losing some territory, and are trying to mitigate those losses by focusing people's attention abroad with a mind to attracting recruits.
Another explanation is that they want to deter further military action against its strongholds in Syria and Iraq, so they are going after some of their primary enemies.
Or you could say that that they've had international terrorist intentions all along, but they never had the capability or the opportunity.
Any of those is plausible, so the challenge is for us trying to make sense of it on the outside. We just don't know what's going on in their own internal deliberation, and we might not know for years. If you look at the aftermath of 9/11, we didn't know exactly why they had undertaken those attacks for years.
Zack Beauchamp: Of those explanations that you've offered, which one do you think is the most plausible?
Will McCants: I guess if this were just about an attack in Europe, you might say that it is in reprisal for the attacks being carried out in Syria and Iraq. I don't see this as necessarily part of the propaganda effort or the war with al-Qaeda, because they've already succeeded in attracting far, far more recruits.
Given the target of a major enemy in Europe, in light of attacks on Russian civilians and an Iranian ally in Lebanon, it seems to me that this has to do with the war to expand its territory in Syria and Iraq. It is putting its major adversaries on notice that if they continue to impede its state building, they will pay a price.
"If we don't know why ISIS did these things, we risk making some major blunders that play into its hand"
Zack Beauchamp: ISIS has recently lost a fair amount of territory in Iraq and Syria. If this shift in strategy is real, is it born out of weakness?
Will McCants: I don't know that you could say it's weakness because they're still pretty strong. But they have lost something like 25 percent of their territory.
I think it has made the calculation that it can no longer pursue its expansion strategy in Syria and Iraq without changing the calculations of the enemies currently halting its expansion. These attacks would be a way of inflicting costs on them.
Zack Beauchamp: How reasonable a calculation on their part is this? French President François Hollande's rhetoric after the attack gives the impression that France is likely to intensify its bombing efforts in Syria and Iraq rather than scale them back.
Will McCants: Yeah. I think attacks like these are going to give France, Iran, Russia, and the United States common cause in curtailing the ISIS advance. Especially if these plots go back to ISIS central — if they have operatives that were trained and financed from headquarters in Raqqa.
I think those governments are going to determine enough is enough. They have had other priorities in the destruction of ISIS, and that might change their calculations. If that is the intent of ISIS, to deter them from further military action, I anticipate it will have failed because we are going to see a lot more military action against ISIS.
Zack Beauchamp: How would you want the French and American governments to think about their military response to this attack?
Will McCants: The challenge for governments in responding to this kind of stuff is to wait until you know exactly what your enemy is trying to provoke you to do. If we don't know why ISIS did these things, we risk making some major blunders that play into its hand.
Think about 9/11. Al-Qaeda told us vaguely in the propaganda, "You're the crusaders, and we want to get you out of here." But the real strategy behind the attacks wasn't revealed for a few years, and they came from internal al-Qaeda memoranda that later surfaced. In the aftermath of the 9/11 attacks, we didn't understand then that Al-Qaeda was dearly hoping for a large military deployment so that it could bog us down and win this propaganda war.
We made the right decision early on — that went against al-Qaeda — by going in Afghanistan. But we made a different decision in Iraq, and it played into their hands. There's a similar worry here, and without knowing exactly why ISIS undertook these attacks, we risk dancing to their tune.
"We're not talking about al-Qaeda hiding out in Pakistan. We're talking about an actual government that has money to put behind plots and has very motivated people, many of them with European passports."
Zack Beauchamp: You mentioned earlier that it's not obvious that this was planned from ISIS headquarters. This seems like a very sophisticated attack. How do you assess the likelihood that this was centrally planned versus something that ISIS sympathizers in and around Paris set up on their own?
Will McCants: Because it's so complicated, both in terms of the timing and coordination, it goes against the idea that these were just some guys who decided to pick up weapons and wreak havoc. It strongly suggests some training abroad, at least by some of the members, if not direct coordination.
I'm also mindful, Zack, that this comes at the end of two weeks where we have seen two other high-profile, high-casualty, complex attacks on Russia with the airliner and on Hezbollah with the attack in Beirut. One guy in Beirut whose suicide bomb failed to detonate said that he was sent there by ISIS directly. That history — together, then, with the complexity of the Paris attacks — suggests to me that ISIS Central has a guiding hand in this.
But look, all of that could prove to be wrong. Only diligent intelligence work is going to find out the truth of it. But if you have to read tea leaves, that would be my guess.
Zack Beauchamp: What's striking to me is it just didn't seem, previously, that ISIS had the capability to plan this type of international attack. Does this tell us something, if it was in fact centrally planned, about ISIS's capabilities that we didn't understand previously?
Will McCants: Yeah. I mean, if this does go back to ISIS Central, it suggests that they were shifting resources toward developing a foreign operation capability. I remember there was an article from a few months ago, reporting from anonymous intelligence sources, saying that they were thinking about this kind of shift, but we didn't see it in their targeting or attack strategy. They may have been developing this capability for quite some time, and it's only now that they are unleashing it.
Even if it's not centrally planned, it's very bad. If they're not even trying to coordinate this kind of stuff, and their affiliates or fan boys can do it on their own, it's quite troubling.
But if the Paris attack was centrally directed, it's even worse. ISIS is a state that has millions of dollars that it can spend on these kinds of operations.
We're not talking about al-Qaeda hiding out in Pakistan. We're talking about an actual government that has money to put behind plots and has very motivated people, many of them with European passports that can carry them out. That's a real problem for the counterterrorism security apparatus if ISIS has indeed shifted its goal or strategy. That's the first thing to determine: Did ISIS Central do this? Did they do all three?
Watch: Syria's civil war, explained
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
Q:
How to retrieve value from subquery in main query?
I would like to retrieve dtmPost in the main query. I tried a.dtmPost after ai.strID, but it didn't work. I am not sure whether or not it's possible to do so without making big changes. Is my assumption correct?
SELECT p.strMed,
d.lngAKey,
ai.strID
FROM tblP p RIGHT JOIN tblV v
ON p.lngPKey = v.lngPKey INNER JOIN tblD d
ON v.lngVKey = d.lngVKey INNER JOIN tblAI ai
ON d.lngAKey = ai.lngAKey
WHERE dtmEff between
(SELECT MAX(a.dtmPost) AS dtmPost
FROM (SELECT dtmPost
FROM tblPBIH pbih
WHERE pbih.lngAKey = d.lngAKey
UNION
SELECT dtmPost
FROM tblPBI pbi
WHERE pbi.lngAKey = d.lngAKey
) a)
AND (SELECT MAX(a.dtmPost) AS dtmPost
FROM (SELECT DATEADD(D, 10, pbih.dtmPost) AS dtmPost
FROM tblPBIH pbih
WHERE pbih.lngAKey = d.lngAKey
UNION
SELECT DATEADD(D, 10, pbi.dtmPost) AS dtmPost
FROM tblPBI pbi
WHERE pbi.lngAKey = d.lngAKey
) a)
I came up with the following and it works, but is there any other way that is better?
DECLARE @X date, @Y date
SET @X =(SELECT MAX(a.dtmPost) AS dtmPost
FROM (SELECT dtmPost
FROM tblPBIH pbih
WHERE pbih.lngAKey = d.lngAKey
UNION
SELECT dtmPost
FROM tblPBI pbi
WHERE pbi.lngAKey = d.lngAKey
) a)
SET @Y =(SELECT MAX(a.dtmPost) AS dtmPost
FROM (SELECT DATEADD(D, 10, pbih.dtmPost) AS dtmPost
FROM tblPBIH pbih
WHERE pbih.lngAKey = d.lngAKey
UNION
SELECT DATEADD(D, 10, pbi.dtmPost) AS dtmPost
FROM tblPBI pbi
WHERE pbi.lngAKey = d.lngAKey
) a)
SELECT p.strMed,
d.lngAKey,
ai.strID,
@X AS dtmBackDate
FROM tblP p RIGHT JOIN tblV v
ON p.lngPKey = v.lngPKey INNER JOIN tblD d
ON v.lngVKey = d.lngVKey INNER JOIN tblAI ai
ON d.lngAKey = ai.lngAKey
WHERE dtmEff > @X
AND dtmEff <= @Y
Thanks for all your help.
A:
From what I can see the only difference between your 2 dates is 10 days, so there is absolutely no reason to do the query twice.
This is a version of the query reworked. As we have no test data I have no idea if there are typos, but you should get the idea. You could else write it using CTEs if you prefer.
I also swapped your right join to a left join as I personally never use right join, but that might just be personal preference.
SELECT p.strMed,
d.lngAKey,
ai.strID,
dates.dtmPost AS dtmBackDate
FROM tblV v
INNER JOIN tblD d ON v.lngVKey = d.lngVKey
INNER JOIN tblAI ai ON d.lngAKey = ai.lngAKey
LEFT JOIN tblP p ON p.lngPKey = v.lngPKey
INNER JOIN (
select lngAKey, max(dtmPost) dtmPost from
(
SELECT lngAKey, dtmPost
FROM tblPBIH pbih
WHERE pbih.lngAKey
UNION
SELECT lngAKey, dtmPost
FROM tblPBI pbi
WHERE pbi.lngAKey
) q
group by lngAKey
) dates on dates.lngAKey=d.lngAKey
WHERE dtmEff > dates.dtmPost
AND dtmEff <= DATEADD(D, 10, dates.dtmPost)
|
{
"pile_set_name": "StackExchange"
}
| 0 |
Two horny bitches get fucked by this one big cock
|
{
"pile_set_name": "OpenWebText2"
}
| 0.061224 |
1. Introduction {#sec1-materials-11-00376}
===============
Although origami is a type of traditional art where a piece of flat paper is folded into a 3D object, the notion of origami is widely explored nowadays to provide innovative solutions to the problems of compacting large objects into a small volume of space. For instance, applications of origami can be found in the airbags for automobiles, cartons and shopping bags, and photovoltaic solar cells with shape changing ability. However, the packing process is often challenging and may lead to an increase in the infrastructure cost since new equipment may be required if any changes in folding design are needed. Therefore, the idea of active origami is intriguing as it can help to reduce the investment needed for the folding equipment.
Active origami is defined as a design to create an origami object that has the ability to self-fold or self-unfold \[[@B1-materials-11-00376]\]. The structure is first printed using a 3D printer and then is driven by an external stimulus to reprogram its shape or properties over time. 4D printing is the printing of a dynamic 3D structure that is capable of changing its shape over time \[[@B2-materials-11-00376],[@B3-materials-11-00376]\]. In order to do that, smart materials are 4D printed by using fused deposition modelling of single or double layer print \[[@B4-materials-11-00376],[@B5-materials-11-00376]\], 3D projection and laser stereolithography (SLA) \[[@B6-materials-11-00376]\], digital light processing printing (DLP) \[[@B7-materials-11-00376]\], PolyJet technology \[[@B8-materials-11-00376]\] or Selective Laser Melting (SLM) \[[@B9-materials-11-00376]\]. For example recently, there has been research performed on the design of origami by using SMPs (Shape Memory Polymers), light activated polymers \[[@B10-materials-11-00376]\], and shape memory alloys \[[@B11-materials-11-00376],[@B12-materials-11-00376]\].
Moreover, with the recent improvement in the multi-material printing technology of additive manufacturing \[[@B13-materials-11-00376]\], multiple materials can be positioned precisely in terms of micrometer scales without any constraints on the geometric complexity of the manufactured 3D components \[[@B3-materials-11-00376],[@B14-materials-11-00376]\]. Reversibility of SMP has also been reported \[[@B15-materials-11-00376]\]. In addition, this advancement of technology allows complicated 3D components with non-uniform material distributions and multifunctional performance to be produced as well.
Additional research on printed active composites has also been carried out to have a better understanding of the impact of fiber volume fraction and fiber orientation (loading direction) on complex shape programming and recovery. The maximum bending angle of hinges was determined to decrease monotonically with respect to the inclined angle between the fiber and the loading direction which affects the axial strain of embedded fibers. This physical response characteristic parameter was implemented to achieve shape programming and recovery in complex structures \[[@B16-materials-11-00376]\].
Another research area to concentrate on is to understand and achieve controlled sequential folding or shape recovery of the active origami \[[@B17-materials-11-00376],[@B18-materials-11-00376],[@B19-materials-11-00376]\]. As the design of the origami becomes more complex, folding of the active origami parts at the same instant might cause the different folding parts to interfere with each other before the folding process is complete. Moreover, very little research has been done on the study of controlled sequential shape recovery of SMPs or *active origami*.
However, all the current 4D printed origami structures fold or unfold in a similar way without overlapping of the folding lines. Folding and unfolding of structures are essential in 4D printing. Usually, structures fold or unfold along a certain axis. A folding line is defined as a segment of the folding axis on the structure. In a simple structure such as a hinge, there is only one folding line. In a structure involving multifolding, there are multiple folding lines. However, these folding lines may or may not overlap or cross each other (see [Figure 1](#materials-11-00376-f001){ref-type="fig"}). [Figure 1](#materials-11-00376-f001){ref-type="fig"}a shows a typical configuration of folding lines of current 4D printed origami structures. Crossfolding is defined as a multifolding in which at least two folding lines within the same plane overlapseach other ([Figure 1](#materials-11-00376-f001){ref-type="fig"}b). [Figure 1](#materials-11-00376-f001){ref-type="fig"}c shows a design with a combination of overlapping and non-overlapping folding lines.
Crossfolding allows the deformation of a structure to be doubled i.e., saving 50% of the space in a single fold. In this research, four different materials (VeroWhitePlus, DM8510, DM8520, and DM8530) and three different axes (X, Y, and Z) are selected to explore the feasibility of printing and programming crossfolded smart structures as well as to characterize crossfolded structures. Mechanical properties of single material and multimaterials are first analyzed and then crossfolded single material structures and multimaterial structures are designed to achieve higher complexity. The rule of mixture for multi-materials is used to predict the overall Young's Modulus of the structure based on the moduli of the individual constituents and their volume fractions. Single material specimens are used to determine the shape recovery characteristics for using the microforce test. A hole was designed at the crossing point to study its effect on stress concentration.
2. Materials and Methods {#sec2-materials-11-00376}
========================
The materials used in this research are based on two basic proprietary materials provided by Stratasys (Eden Prairie, MN, USA), namely TangoBlackPlus (TB) and VeroWhitePlus (VW). Compared to TB, which is rubbery and has a great extent of elongation, VW is a rigid and opaque material that has high Young's modulus, great tensile strength, and 10--25% of elongation before break. TB liquid resin comprises urethane acrylate oligomer, exo-1,7,7-trimethylbicyclo hept-2-yl acrylate, methacrylate oligomer, polyurethane resin, and photoinitiator. VW liquid resin consists of isobornyl acrylate, acrylic monomer, urethane acrylate, epoxy acrylate, acrylic monomer, acrylic oligomer, and photoinitiator. By mixing these two materials, new materials possessing different glass transition temperatures (T~g~) can be obtained. In this research, four materials, VW and three mixtures from VW and TB (DM8510, DM8520, and DM8530) were used. All three mixtures are Stratasys' proprietary digital materials (DM), with VW as the primary component and TB the secondary component. The percentage of TB in each has not been released by Stratasys, but the order is known as follows: DM8510 \< DM8520 \< DM8530 (highest percent of TB) \[[@B20-materials-11-00376],[@B21-materials-11-00376]\].
2.1. Preparation of Single Material Specimens and Tensile Test {#sec2dot1-materials-11-00376}
--------------------------------------------------------------
All specimens used in this Microforce mechanical testing were printed using Objet 500 Connex 3 Polyjet printer (Stratasys, Eden Prairie, MN, USA). The four materials used are VeroWhitePlus, DM8510, DM8520, and DM8530. Five specimens were 3D printed for each material. Among the four materials, DM 8510, DM 8520, and DM 8530 are digital materials that are combinations of two materials. They all have VeroWhitePlus as primary material and TangoBlackPlus as secondary material. The difference is that the percentage of TangoBlackPlus material increases from DM 8510 to DM 8530 (refer to [Appendix B](#app2-materials-11-00376){ref-type="app"} and [Appendix C](#app3-materials-11-00376){ref-type="app"}).
According to the ASTM D638 standard, for rigid and semi-rigid plastics, type I and type II specimens are to be used with materials having a thickness of 7 mm \[[@B22-materials-11-00376]\]. Type III specimen must be used for material having a thickness greater than 7 mm, while type IV specimen is to be used when there is a need to compare materials in different rigid cases \[[@B22-materials-11-00376]\]. Type V specimen is to be used for material having a thickness of 4 mm or less \[[@B22-materials-11-00376]\]. Thus, for the specimen used in this tensile test, ASTM D638 type V was chosen and is shown in [Figure 2](#materials-11-00376-f002){ref-type="fig"}.
The MTS Criterion Model 43 machine from MTS Systems Corporation in the United States was used for this microforce test. The specimen was clamped with alignment and held without any slippage to the grips. The load was measured using a load cell and the displacement of the crosshead was set to be 3.5 mm. The heating chamber of the machine was used to heat up the specimen to 70 °C and maintain the temperature.
A thermocouple was used to monitor the surface temperature of the specimen for 10 min. This was to ensure complete heat transfer across the specimen.
A temperature-controlling water tank was used for reheating the specimen after measuring the elongation.
2.2. Calculation of Shape Recovery for Single Material Specimens {#sec2dot2-materials-11-00376}
----------------------------------------------------------------
[Figure 3](#materials-11-00376-f003){ref-type="fig"} shows the steps of the shape setting method which were used to determine the shape recovery characteristics for single material specimens.
- For every specimen of four different materials, the specimen was held using tensile grips at a room temperature of 25 °C.
- The displacement of the crosshead was set to 3.5 mm and the load calibration was applied.
- The chamber was heated to an equilibrium temperature of 70 °C and tensile testing was performed.
- After the tensile test was completed, the chamber temperature was reduced to 25 °C with the specimen still being held by tensile grips and the change in length was measured.
- The specimen was placed in a hot water batch of 70 °C for shape recovery and the change in length was measured again.
After the final gauge length L~f~ was measured, the percent elongation was calculated using the formula:
Similarly, the gauge length L~r~ after recovery by reheating was measured and the percent recovery was calculated using the formula:
The original gauge length L~o~ is 7.62 mm.
Percentage of recovery rate is defined by the following:
2.3. Design and Crossfolding of Single Material Smart Structures {#sec2dot3-materials-11-00376}
----------------------------------------------------------------
Based on the tensile test results, DM8530 material had near 100% recovery. Therefore it was selected to study the influence of hinge thickness in the multifolding process. A series of tests were conducted using DM8530 material. All the selected four materials display good and similar shape recovery properties (See [Figure 14](#materials-11-00376-f014){ref-type="fig"} later). Therefore we used DM8530 as a representative of the four for cross-foldability study. We expected the other three materials to perform the same way as DM8530 when 4D printed. There were 12 specimens of Length × Width × Thickness = (60 × 15 × 1.5) mm. Each specimen was designed with two crossed folding lines as shown in [Figure 4](#materials-11-00376-f004){ref-type="fig"}, For folding line 1, the thickness (note: not the width of the channel) was 0.1 mm, 0.3 mm, and 0.5 mm thickness and for folding line 2, the thickness was a constant of 1.0 mm. There were two samples with hole and two samples without hole for each thickness. A hole was designed at the crossing point to eliminate the overlapping crossfolding region.
Results for design and crossfolding of single material smart structures are described in [Section 3](#sec3-materials-11-00376){ref-type="sec"}.
2.4. Preparation of Multimaterial Specimens for Tensile Test {#sec2dot4-materials-11-00376}
------------------------------------------------------------
According to the ASTM D638 standard, the specimen dimensions are given in [Figure 5](#materials-11-00376-f005){ref-type="fig"}.
Different material combination information is given in [Table 1](#materials-11-00376-t001){ref-type="table"}. In each combination, two materials were combined symmetrically along the X-axis, Y-axis, and Z-axis (here the Z-axis refers to the axis normal to the XY plane). [Table 2](#materials-11-00376-t002){ref-type="table"} shows the specimen material composition.
ASTM D638 standard tensile tests were performed on all specimens at a room temperature of 25 °C.
The testing speed was given as 3 mm/min to comply with ASTM D638, which gave a strain rate of $1.25 \times 10^{- 3~}s^{- 1}$.
2.5. Rule of Mixtures for Multimaterial Specimens {#sec2dot5-materials-11-00376}
-------------------------------------------------
The rule of mixtures is a mathematical expression which describes some properties of the composite in terms of the properties, quantity, and arrangement of their constituents \[[@B23-materials-11-00376]\]. It can be used to predict the overall Young's Modulus of the mixture based on the moduli of the individual constituents and their volume fractions \[[@B24-materials-11-00376]\]. The properties, i.e., Young's Modulus, are proportional to their volume fractions of the components and lie between the pure component values \[[@B25-materials-11-00376]\]. In this research, different multi-materials can be approximated as composites to obtain predicted Young's Modulus. Two established methods were practiced to calculate the Young's Modulus of the mixtures, namely iso-strain and iso-stress. The two simple models widely used are the Voigt iso-strain model and the Reuss iso-stress model ([Figure 6](#materials-11-00376-f006){ref-type="fig"}) \[[@B26-materials-11-00376]\].
As the name implies, iso-strain requires the composite components to undergo the same deformation strain, whereby the load direction is the same as the fiber direction \[[@B27-materials-11-00376]\]. In our case, the whole specimen is the composite. Material 1 can be approximately treated as a matrix while material 2 can be approximately treated as a fiber. Iso-strain can be applied to the multi-material printing orientation of the X-axis and Z-axis (XY plane) as illustrated below in [Figure 7](#materials-11-00376-f007){ref-type="fig"} and [Figure 8](#materials-11-00376-f008){ref-type="fig"}. Both materials undergo the same deformation strain.
For the iso-strain condition, the Young's Modulus of the composite can be calculated by Equation (4) \[[@B28-materials-11-00376]\]:$$E_{c} = E_{m}V_{m} + E_{p}V_{p}$$
In our case, the equation is modified to the following Equation (5):$$E_{s} = E_{m1}V_{m1} + E_{m2}V_{m2}$$
Young's Modulus for material 1 and 2 are known separately from previous tests. Volume fractions are 50% for matrix (material 1) and fiber (material 2). Since $V_{m1} = V_{m2} =$ 50%, the equation can be rewritten in the following form:$$E_{s} = V_{m}\left( {E_{m1} + E_{m2}} \right)$$
Hence, the choice of material 1 or material 2 as matrix or fiber will not affect the result. Young's Modulus for the specimen can then be calculated.
On the other hand, iso-stress refers to the condition whereby load is applied normal to the orientation of the fibers \[[@B27-materials-11-00376]\]. The normal stresses for matrix and fibers are the same. This condition can be applied to the multi-material printing orientation of the Y-axis as illustrated in [Figure 9](#materials-11-00376-f009){ref-type="fig"}. Since both materials have the same cross-section, upon application of the load, they will have the same normal stress according to Equation (7):$$\sigma = \frac{F}{A}$$ where *F* is the force applied and *A* is the cross-sectional area \[[@B29-materials-11-00376]\].
For the iso-stress condition, Young's Modulus of the composite can be calculated by Equation (8) \[[@B28-materials-11-00376]\]:$$E_{c} = \frac{E_{m}V_{f} + E_{f}V_{m}}{E_{m}E_{f}}$$
In our case, the equation is modified to the following Equation (9):$$E_{c} = \frac{E_{m1}V_{m2} + E_{m2}V_{m1}}{E_{m1}E_{m2}}$$
Similarly, Young's Modulus for material 1 and 2, known separately from previous tests and volume fractions, are both 50%:$$E_{c} = \frac{E_{m1} + E_{m2}}{E_{m1}E_{m2}}V_{m}$$
Hence again, it does not matter whether material 1 or material 2 is treated as a matrix or a fiber.
2.6. Design and Crossfolding of Multimaterial Smart Structures {#sec2dot6-materials-11-00376}
--------------------------------------------------------------
There are two types of folding: folding at not more than 90° and folding at more than 90°. Crossfolding requires the first folding angle to be close to 180° before the second fold. Given a rectangular shape, there are two ways to cross fold: (1) fold on the short edge on folding line 1 and then the long edge on folding line 2 ([Figure 10](#materials-11-00376-f010){ref-type="fig"}); [Figure 11](#materials-11-00376-f011){ref-type="fig"} shows the crossfolded structure using method 1. (2) fold on the long edge first and then the short edge in [Figure 12](#materials-11-00376-f012){ref-type="fig"}. Both methods were tested with a variation of thickness: 0.1, 0.3, 0.5, 1, 1.5, 2 mm. The size of 0.1 mm is the thinnest possible for manual handling after PolyJet printing.
For this structure, it was created by the first fold along folding line 1, followed by folding along folding line 2. The bottom hinge was subsequently folded outwards. Materials with different glass transition temperatures (T~g~) were chosen and placed according to their movement.
Opposite from method 1, method 2 was created by folding along fold line 2 across the structure, followed by folding along fold line 1. The bottom hinge was subsequently folded inwards.
[Figure 13](#materials-11-00376-f013){ref-type="fig"} shows the crossfolded structure using method 2.
The results for design and crossfolding of multimaterial smart structures are described in [Section 3](#sec3-materials-11-00376){ref-type="sec"}.
3. Results and Discussion {#sec3-materials-11-00376}
=========================
3.1. Shape Recovery of Single Material Specimens {#sec3dot1-materials-11-00376}
------------------------------------------------
The recovery rates (in percentage) of four different materials are shown in [Figure 14](#materials-11-00376-f014){ref-type="fig"}. DM8530 achieved the highest recovery rate whilst VeroWhitePlus had the lowest recovery rate. Due to the better recovery property, DM8530 should have a better ability to take the multi-folding process.
3.2. Recovery of Crossfolded Single Material Smart Structures {#sec3dot2-materials-11-00376}
-------------------------------------------------------------
The programming procedure is as follows: set and maintain the water temperature at 70 °C. Put the specimen in the hot water for 2 min until the whole specimen becomes soft. Take out the specimen and fold vertically first, followed by folding horizontally. Then, put the folded specimen in the hot water again until it fully recovers. Repeat the programming stage and folding of the same specimen until it cracks and record the maximum folding times.
### 3.2.1. Thickness of Folding Line 1 = 0.5 mm, Folding Line 2 = 1 mm {#sec3dot2dot1-materials-11-00376}
As shown in [Figure 15](#materials-11-00376-f015){ref-type="fig"} and [Figure 16](#materials-11-00376-f016){ref-type="fig"}aߝe, the sequence of the unfolding showed that 0.5 mm (folding line 1) opened earlier than 1.0 mm (folding line 2) due to the rapid response to thermal stimulus before the specimen was fully unfolded. The folding line 1 of 0.5 mm unfolded first in both cases, no matter how the folding sequence was done. This result was expected. The heat transfer was faster when the material was thinner, hence an earlier response. This result suggested that given the same unfolding sequence of folding line 1 and folding line 2, there were at least two ways to fold the structure into a compact form. In other words, crossfolding can increase the variety of smart structures.
[Figure 17](#materials-11-00376-f017){ref-type="fig"} shows that folding was easier when there was a hole in the center of the specimen, since the specimen with a hole eliminates the overlapping crossfolding region better than the specimen without a hole. It should be noted that the hole is the stress concentration region when it is subject to loading. However, in this cross-folding case, the hole is not subject to tensile load when folded. The hole replaces the stress concentrated region and hence leads to better cross-foldability.
As shown in [Figure 18](#materials-11-00376-f018){ref-type="fig"}, a repeated test was performed for the same specimen and it started to break at the fourth time of programming. Similarly, it was observed that a hole in the center eliminated the overlapping crossfolding region and reduced cracks.
### 3.2.2. Thickness of Folding Line 1 = 0.3 mm, Folding Line 2 = 1 mm {#sec3dot2dot2-materials-11-00376}
In [Figure 19](#materials-11-00376-f019){ref-type="fig"}, [Figure 20](#materials-11-00376-f020){ref-type="fig"} and [Figure 21](#materials-11-00376-f021){ref-type="fig"}, similar behaviors were observed except that in the repeated test, the specimen started to break at the second time of programming as shown in [Figure 22](#materials-11-00376-f022){ref-type="fig"}.
### 3.2.3. Thickness of Folding Line 1 = 0.1 mm, Folding Line 2 = 1 mm {#sec3dot2dot3-materials-11-00376}
Similar behaviors were observed as shown in [Figure 23](#materials-11-00376-f023){ref-type="fig"} and [Figure 24](#materials-11-00376-f024){ref-type="fig"}, except that in the repeated test the specimen started to break at the first time of programming as shown in [Figure 25](#materials-11-00376-f025){ref-type="fig"}.
The results of single material crossfolding are summarized in [Table 3](#materials-11-00376-t003){ref-type="table"}.
0.1 m, folding sequence 2 + 1 with hole and without, not recorded due to breakage.
3.3. Analysis of Tensile Test Results for Multimaterial Specimens {#sec3dot3-materials-11-00376}
-----------------------------------------------------------------
Crossfolding of the multimaterial structure is different from crossfolding of the single material structure, because material interfacial bonding in the multimaterial structure may play a role in shape setting. There is a concern that fractures or delamination may occur at the interface of different materials during shape setting. Therefore analysis of the mechanical properties of the multimaterial specimens is necessary.
### 3.3.1. Stress-Strain Curves {#sec3dot3dot1-materials-11-00376}
At room temperature of 25 °C, stress-strain curves for material combination of VeroWhitePlus and D8510 are shown in [Figure 26](#materials-11-00376-f026){ref-type="fig"}, [Figure 27](#materials-11-00376-f027){ref-type="fig"} and [Figure 28](#materials-11-00376-f028){ref-type="fig"} for the X, Y, Z axis. Other stress-strain curves and results are attached in [Appendix A](#app1-materials-11-00376){ref-type="app"}. For a combination of VeroWhitePlus and D8510, [Figure 26](#materials-11-00376-f026){ref-type="fig"} shows the stress-strain curves. The curves show the tensile results of six specimens of the same multi-material combination.
When two materials were combined symmetrically along the X-axis, the stress-strain curve was obtained as shown in [Figure 26](#materials-11-00376-f026){ref-type="fig"}.
When two materials were combined symmetrically along the Y-axis, the stress-strain curve was obtained as shown in [Figure 27](#materials-11-00376-f027){ref-type="fig"}.
When two materials were combined symmetrically along the Z-axis, the stress-strain curve was obtained as shown in [Figure 28](#materials-11-00376-f028){ref-type="fig"}.
As observed, the red curve (\#2) was likely an outlier as the curve deviated too much from the rest. After removing it, [Table 4](#materials-11-00376-t004){ref-type="table"} shows the averages obtained from the remaining five curves.
### 3.3.2. Theoretical Calculation versus Experimental Data {#sec3dot3dot2-materials-11-00376}
After calculations based on rule of mixture, the following results were obtained as shown in [Table 5](#materials-11-00376-t005){ref-type="table"}. For Young's Modulus, all experimental values were lower than predicted values. One possible reason is the imperfect interfacial bonding that weakened the bond as discussed under single material investigation. Moreover, the rule of mixtures applies to composites embedded with long and continuous fibers. Our multi-material conditions are just an approximation of rule of mixtures situations as our fiber (material 1 or material 2) is not embedded in the composite. Materials were printed side by side, which resulted in less restraining force applied on the matrix from the fibers, hence making the specimen easier to deform (smaller Young's Modulus). Additionally, the material in the experiments was not long enough to be classified as a long fiber. The general aspect ratio (length to diameter) of a long fiber should be at least 200 \[[@B30-materials-11-00376]\]. Moreover, Young's Modulus of the X-axis was greater than Z-axis. According to the rule of mixtures, the X-axis and Z-axis should give the same Young's Modulus. The reason could be that Z had a larger contact surface between the two different materials. When these two different materials were not 100% bonded, it allowed increased slippery movement and made the specimen more elastic (smaller Young's Modulus). In addition, the direction of the bonding layer mattered. For the X-axis, the bonding direction was the same as the tensile test direction, whereas for the Y-axis, the bonding direction was perpendicular to the tensile test direction. As a result, the stronger part of the X-axis specimen took most of the elastic deformation. However, the stronger part of the Y-axis specimen was compressed by the weak part below it in the tensile test. Hence, different moduli were observed in the X-axis and Y-axis.
### 3.3.3. Rupture Location and Interfacial Bonding Strength {#sec3dot3dot3-materials-11-00376}
For the Y-axis, the following ruptures were obtained ([Figure 29](#materials-11-00376-f029){ref-type="fig"}). Young's Modulus and Ultimate Tensile Stress decreased in the order: VeroWhitePlus \> D8510 \> D8520 \> D8530. All three specimens did not break at the interface of the stronger and weaker materials but always at the weaker material. Since all specimens broke at the weaker material, not at the bonding, it meant that the interfacial bonding transmitted stress over to the weaker material. This observation corresponded to the test results and findings from Ge, Sakhaei, Lee et al. \[[@B8-materials-11-00376]\]. This result showed that the possibility of delamination or fracture at the interface of different materials during shape setting was negligible. It should be noted that the reference used for comparing bonding is different. When compared with weak and strong materials, the strength is ranked in the following order: weak material (rubber-like) \< bonding \< strong material (rigid-like). Hence all specimens broke at the weak material. However, if bonding is compared across different contact areas like [Section 3.3.2](#sec3dot3dot2-materials-11-00376){ref-type="sec"}, the larger the contact area, the poorer the bonding quality.
### 3.3.4. Effect of the Material Combination Axis {#sec3dot3dot4-materials-11-00376}
The material combination axis is the axis along which two materials are symmetrically combined. It is to be noted that the material combination axis can have a significant effect on maximum strain and Young's modulus of all material combinations, but a mixed effect on Ultimate tensile strength (UTS). As shown in [Figure 30](#materials-11-00376-f030){ref-type="fig"}, the material combinations suggested an inconsistent effect on UTS. The combination of DM8520 and DM8530 had lower UTS values. It might be related to the increased rubbery content in the materials, since the combination of DM8510 and DM8520 also showed slightly lower UTS values. The rubbery content in each material increased in the following order: VeroWhitePlus \< DM8510 \< DM8520 \< DM8530.
The material combination axis effect on maximum strain at 25 °C is shown in [Figure 31](#materials-11-00376-f031){ref-type="fig"}. Clearly, the combination axis did affect the maximum strain. For all the different materials, the maximum strain increased in the order: Y-axis \< X-axis \< Z-axis. The reason was that the Z-axis had the most surface contact between two materials, allowing more slippery plastic deformation.
Shown in [Figure 32](#materials-11-00376-f032){ref-type="fig"} are the material combination axis effects on Young's Modulus, which were briefly mentioned in [Table 5](#materials-11-00376-t005){ref-type="table"} earlier. For the Young's Modulus, it decreases in the order: X-axis \> Y-axis \> Z-axis. The reason was the imperfect interfacial adhesion between the two materials. During 3D printing, the thermoset polymer's properties give material irreversible cross-links after heating and curing. As 3D printing is line by line, there is a very high chance that the previous line is heated and half cured. When the next line is printed beside the first line, the bonding between these two lines is not 100% as cured materials cannot be bonded perfectly onto the previous layer. It is physical bonding between the two lines, instead of chemical bonding within the individual lines. This applies to different material boundary as well. Between material 1 and material 2, the first printed material would be cured after the second material was printed beside it, resulting in imperfect bonding at the material boundary which weakens the bonding and makes the specimen more elastic by allowing more slippery movement. Longitudinal adhesion along the loading direction was stronger than the transverse adhesion to the loading direction (see [Section 3.3.2](#sec3dot3dot2-materials-11-00376){ref-type="sec"}). This was the reason for the specimen with X-axis (longitudinal loading) orientation having a greater Young's Modulus value than Y-axis (transverse loading).
3.4. Recovery of Crossfolded Multimaterial Smart Structures {#sec3dot4-materials-11-00376}
-----------------------------------------------------------
[Figure 33](#materials-11-00376-f033){ref-type="fig"} shows the folding line 3 of the petiole (stem) at the lower end of the petal, which involved just the bending of a single material into a bud shape. [Figure 34](#materials-11-00376-f034){ref-type="fig"} shows the folding line 2 of the petal which involved the folding of two different materials with different T~g~. [Figure 35](#materials-11-00376-f035){ref-type="fig"} shows the material placement and the axes of crossfolding of the structure. Fully folded structures are presented in [Figure 11](#materials-11-00376-f011){ref-type="fig"} and [Figure 13](#materials-11-00376-f013){ref-type="fig"} as shown earlier in [Section 2.6](#sec2dot6-materials-11-00376){ref-type="sec"}.
[Table 6](#materials-11-00376-t006){ref-type="table"} shows the variation of the different thicknesses of the structure. The upper boundary (maximum) thickness 0.5, 1.0, 1.5, 2.0 mm and lower boundary (minimum) thickness 0.1, 0.3 mm were printed. The different T~g~ materials were allocated to the structure. The structure represented the petal in a simplified geometric form instead of a curved shape for experimental purposes so that the observation of minor changes could be recorded accurately. However, if pressure was applied for folding line 3 or folding line 2, the structure could not be accurately controlled due to manual manipulation. The thickness of the structure was relevant when designing the flower with the combination of the basic designs \[[@B20-materials-11-00376]\]. From the experiment, it was observed that the thicker the folding line 3 on the structure, the longer it took for the structure to recover its original geometry. This was because a longer time was required for the center of a thicker sample to be heated to above its T~g~, which lengthened the overall recovery time. Similar to the folding line 3, it was observed that the thicker the folding structure, the longer it took for the structure to recover to its original geometry. The stem folded along folding line 1 had a constant thickness, therefore it was not included in [Table 6](#materials-11-00376-t006){ref-type="table"}.
The experiment showed that the thinner the thickness, the quicker the response time and the recovery rate for folding line 2 of the petal was longer than for the folding line 3 of the petiole.
The multi-component strip of thickness 1 mm was 3D printed and programmed into the folded structure. Different materials were applied to the designed location on the strip to mimic the petal. Thermal stimulus was applied to activate the structure according to the material T~g~ and it was shown that for both methods, crossfolding was achievable in the experiments conducted.
In [Figure 36](#materials-11-00376-f036){ref-type="fig"}c--h, DM8530 had a lower T~g~ than DM8510. It can be seen that the sequence of the unfolding showed that DM8530 (darker grey) opened earlier than DM8510 (white material) with a higher T~g~ for the material to respond to thermal stimulus.
In method 2, folding line 2 first and then folding line 1, it was observed that a turning movement was created by the folding sequence. This depended on the folding order and material allocation on the strip.
This was similar to the cross folding method 1. It was due to the lower T~g~ of DM8530. It can be seen that the sequence of the unfolding at [Figure 37](#materials-11-00376-f037){ref-type="fig"}d--h showed that the darker grey area (DM8530) opened earlier than the white material (DM8510).
4. Conclusions {#sec4-materials-11-00376}
==============
For single material structures, a series of tests was conducted using specimens with different folding lines l and hinge thickness for the multi-folding process. The structures with smaller thicknesses recovered first independent of the folding sequence. Folding line l hinge of 0.5 mm thickness could only be folded three times, while 0.3 mm thickness could only be folded once prior to fracture cracks. The structure with 0.1 mm thickness had very low structural strength, as it was not able to recover back or even broke at the first folding. All specimens with a hole in the center eliminated the overlapping crossfolding region and reduced fracture cracks in the double folded region. For multimaterial structures, combining multimaterial components along different axes did affect the maximum strain and Young's modulus of the composite, but the effect on UTS was mixed. A flower petal with sequential unfolding of multimaterial structures was designed. A combination of overlapping and non-overlapping folding lines was successfully demonstrated. Different thicknesses at different folding lines resulted in different recovery times. Overall, the development of design guidelines for accessing material cross-foldability was accomplished. Although crossfolding was possible in 4D printing, the radius of curvature during folding needs to be further minimized in the future. In future work, more precise predictions may be obtained by investigating 0.2 and 0.4 mm hinge thicknesses and observing the folding times before material failure. Finally, a complex origami structure will be investigated, which combines overlapping folding structures of single and multi-materials components. The potential applications of this preliminary research may include architectural kinetic façade and deployable space structures.
This research is supported by the Singapore Centre for 3D Printing (SC3DP), which is funded by the Singapore National Research Foundation.
Joanne Ee Mei Teoh, Jia An, Chee Kai Chua and Yong Liu conceived and designed the experiments; Joanne Ee Mei Teoh, Xiaofan Feng and Yue Zhao performed the experiments; Joanne Ee Mei Teoh, Xiaofan Feng and Yue Zhao analyzed the data; Joanne Ee Mei Teoh and Jia An wrote the paper.
The authors declare no conflict of interest.
**Multi-Material Stress--Strain Curves and Property Data**
For D8510, D8520:
X-axis:
{#materials-11-00376-f0A1}
Y-axis:
{#materials-11-00376-f0A2}
Z-axis:
{#materials-11-00376-f0A3}
For D8520, D8530:
X-axis:
{#materials-11-00376-f0A4}
Y-axis:
{#materials-11-00376-f0A5}
Z-axis:
{#materials-11-00376-f0A6}
materials-11-00376-t0A1_Table A1
######
D8510, D8520 combination thermal-mechanical properties.
Parameter X-Axis Y-Axis X-Axis
------------------------------- --------- -------- --------- -------- --------- --------
Ultimate Tensile Stress (MPa) 37.791 ± 2.7 36.753 ± 2.9 36.202 ± 2.6
Maximum Strain (%) 41.910 ± 7.5 39.341 ± 6.1 53.617 ± 12.5
Young's Modulus (MPa) 582.590 ± 48.5 499.329 ± 69.3 497.307 ± 53.6
set 2, abnormal data, removed from calculation.
materials-11-00376-t0A2_Table A2
######
D8520, D8530 combination thermal-mechanical properties.
Parameter X-Axis Y-Axis Z-Axis
------------------------------- --------- -------- --------- -------- --------- --------
Ultimate Tensile Stress (MPa) 29.202 ± 1.9 23.727 ± 2.4 27.650 ± 2.1
Maximum Strain (%) 43.882 ± 9.1 36.114 ± 5.1 60.440 ± 11.8
Young's Modulus (MPa) 496.813 ± 35.0 417.935 ± 60.8 413.767 ± 63.5
set 2, abnormal data, removed from calculation.
VeroWhitePlus material sheet
{#materials-11-00376-f0A7}
DM 8510, DM 8520 and DM 8530 material sheet
{#materials-11-00376-f0A8}
materials-11-00376-t0A3_Table A3
######
VeroWhitePlus.
Sample No. After Tension (mm) Percent Elongation (%) After Recovery (mm) Percent Recovery (%)
------------ -------------------- ------------------------ --------------------- ----------------------
1 28.06 10.7777 25.98 97.4339
2 28.00 10.5409 26.09 96.9996
3 28.12 11.0146 26.10 96.9601
4 28.25 11.5278 26.04 97.1970
5 28.20 11.3304 26.03 97.2365
Average 28.13 11.0383 26.05 97.1654
materials-11-00376-t0A4_Table A4
######
DM8510.
Sample No. After Tension (mm) Percent Elongation (%) After Recovery (mm) Percent Recovery (%)
------------ -------------------- ------------------------ --------------------- ----------------------
1 28.10 10.9356 25.75 98.3419
2 28.22 11.4094 25.82 98.0655
3 28.40 12.1200 25.83 98.0261
4 28.46 12.3569 25.83 98.0261
5 28.09 10.8962 25.80 98.1445
Average 28.25 11.5436 25.81 98.1208
materials-11-00376-t0A5_Table A5
######
DM8520.
Sample No. After Tension (mm) Percent Elongation (%) After Recovery (mm) Percent Recovery (%)
------------ -------------------- ------------------------ --------------------- ----------------------
1 28.36 11.9621 25.70 98.5393
2 28.29 11.6857 25.72 98.4603
3 28.20 11.3304 25.73 98.4208
4 28.15 11.1330 25.72 98.4603
5 28.35 11.9226 25.73 98.4208
Average 28.27 11.6068 25.72 98.4603
materials-11-00376-t0A6_Table A6
######
DM8530.
Sample No. After Tension (mm) Percent Elongation (%) After Recovery (mm) Percent Recovery (%)
------------ -------------------- ------------------------ --------------------- ----------------------
1 28.10 10.9356 25.34 99.9605
2 28.57 12.7912 25.43 99.6052
3 28.16 11.1725 25.48 99.4078
4 28.38 12.0411 25.50 99.3289
5 28.36 11.9621 25.50 99.3289
Average 28.31 11.7805 25.45 99.5263
materials-11-00376-t0A7_Table A7
######
Glass transition temperatures of four materials used in the present research \[[@B20-materials-11-00376]\].
Material Transition Temperature (T~g~)
--------------- -------------------------------
VeroWhitePlus 55.6 °C
DM 8510 53.5 °C
DM 8520 51.6 °C
DM 8530 47.4 °C
{#materials-11-00376-f001}
{#materials-11-00376-f002}
{#materials-11-00376-f003}
{#materials-11-00376-f004}
{#materials-11-00376-f005}
{#materials-11-00376-f006}
{#materials-11-00376-f007}
{#materials-11-00376-f008}
{#materials-11-00376-f009}
{#materials-11-00376-f010}
{#materials-11-00376-f011}
{#materials-11-00376-f012}
{#materials-11-00376-f013}
{#materials-11-00376-f014}
{#materials-11-00376-f015}
{#materials-11-00376-f016}
{#materials-11-00376-f017}
{#materials-11-00376-f018}
{#materials-11-00376-f019}
{#materials-11-00376-f020}
{#materials-11-00376-f021}
{#materials-11-00376-f022}
{#materials-11-00376-f023}
{#materials-11-00376-f024}
{#materials-11-00376-f025}
{#materials-11-00376-f026}
{#materials-11-00376-f027}
{#materials-11-00376-f028}
{#materials-11-00376-f029}
{#materials-11-00376-f030}
{#materials-11-00376-f031}
{#materials-11-00376-f032}
{#materials-11-00376-f033}
{#materials-11-00376-f034}
{#materials-11-00376-f035}
######
Method 1---the sequence of unfolding from (**a**) Folded specimen (**b**) DM8530 (dark grey) unfolding (**c**--**e**) Unfolding of DM8520 along folding line 2 (**f**) DM8510 unfolding (**g**) VeroWhitePlus unfolding (**h**) Specimen fully unfolded.


{#materials-11-00376-f037}
materials-11-00376-t001_Table 1
######
Material information.
---------------------------------------------------------------------------------
Axis for Material Combination Materials Ratio Printing Orientation
------------------------------- ----------------- -------- ----------------------
X-axis VW, DM8510\ 50:50\ Along X-axis
DM8510, DM8520\ 50:50\
DM8520, DM8530 50:50
Y-axis VW, DM8510\ 50:50\ Along X-axis
DM8510, DM8520\ 50:50\
DM8520, DM8530 50:50
Z-axis VW, DM8510\ 50:50\ Along X-axis
DM8510, DM8520\ 50:50\
DM8520, DM8530 50:50
---------------------------------------------------------------------------------
materials-11-00376-t002_Table 2
######
Specimen material composition.
-------- ----------------------------------
X-axis 
Y-axis 
Z-axis 
-------- ----------------------------------
materials-11-00376-t003_Table 3
######
Single material crossfolding.
---------------------------------------------------------------------------------------------------------------------------------------------------------------
Horizontal Hinge Thickness Folding Sequence Open Sequence Maximum Folding Times Crack with Visual Inspection
---------------------------- ------------------ --------------- ----------------------- ------------------------------ ------- --------------------------------
0.5 mm With hole 2 + 1 1 + 2 3 Less 1 = Folding line 1\
2 = Folding line 2\
Maximum folding times\
(Number of times cross-folded)
1 + 2
Without hole 2 + 1 More
1 + 2
0.3 mm With hole 2 + 1 1 + 2 1 Less
1 + 2
Without hole 2 + 1 More
1 + 2
0.1 mm With hole 2 + 1 NA NA Break
1 + 2 1 + 2 Less
Without hole 2 + 1 NA Break
1 + 2 1 + 2 More
---------------------------------------------------------------------------------------------------------------------------------------------------------------
materials-11-00376-t004_Table 4
######
VeroWhitePlus, DM8510 combination thermal-mechanical properties.
Parameter X-Axis Y-Axis Z-Axis
------------------------------- --------- -------- --------- ------- --------- -------
Ultimate Tensile Stress (MPa) 38.273 ±2.2 38.335 ±1.8 38.354 ±2.2
Maximum Strain (%) 50.795 ±6.3 46.465 ±3.4 55.247 ±12.3
Young's Modulus (MPa) 628.281 ±38.8 557.266 ±48.6 552.231 ±63.9
materials-11-00376-t005_Table 5
######
Young's Modulus comparison for multi-material combination.
------------------------------------------ ------------------------------------------ ----------------------------------------- ----------------------------------------- ------------------------------- ------------------------------------------------------------------------------------------------------------ ------------------------------------------------------------------------------------------------------------------------------------------ -----------
$\mathbf{E}_{\mathbf{V}\mathbf{W}}$\ $\mathbf{E}_{\mathbf{D}\mathbf{M}8510}$\ $\mathbf{V}_{\mathbf{V}\mathbf{W}}$ $\mathbf{V}_{\mathbf{D}\mathbf{M}8510}$ **Material Combination Axis** $\mathbf{E}_{\mathbf{P}\mathbf{r}\mathbf{e}\mathbf{d}\mathbf{i}\mathbf{c}\mathbf{t}\mathbf{e}\mathbf{d}}$\ $\mathbf{E}_{\mathbf{E}\mathbf{x}\mathbf{p}\mathbf{e}\mathbf{r}\mathbf{i}\mathbf{m}\mathbf{e}\mathbf{n}\mathbf{t}\mathbf{a}\mathbf{l}}$\ **Error**
**(MPa)** **(MPa)** **(MPa)** **(MPa)**
818.479 742.110 0.5 X 780.295 628.281 ± 38.8 19.5%
Y 778.426 557.266 ± 48.6 28.4%
Z 780.295 552.231 ± 63.9 29.2%
$\mathbf{E}_{\mathbf{D}\mathbf{M}8510}$\ $\mathbf{E}_{\mathbf{D}\mathbf{M}8520}$\ $\mathbf{V}_{\mathbf{D}\mathbf{M}8510}$ $\mathbf{V}_{\mathbf{D}\mathbf{M}8520}$ **Material Combination Axis** $\mathbf{E}_{\mathbf{P}\mathbf{r}\mathbf{e}\mathbf{d}\mathbf{i}\mathbf{c}\mathbf{t}\mathbf{e}\mathbf{d}}$\ $\mathbf{E}_{\mathbf{E}\mathbf{x}\mathbf{p}\mathbf{e}\mathbf{r}\mathbf{i}\mathbf{m}\mathbf{e}\mathbf{n}\mathbf{t}\mathbf{a}\mathbf{l}}$\ **Error**
**(MPa)** **(MPa)** **(MPa)** **(MPa)**
742.110 693.520 0.5 X 717.815 582.590 ± 48.5 18.8%
Y 716.993 499.329 ± 69.3 30.4%
Z 717.815 497.307 ± 53.6 30.7%
$\mathbf{E}_{\mathbf{D}\mathbf{M}8520}$\ $\mathbf{E}_{\mathbf{D}\mathbf{M}8530}$\ $\mathbf{V}_{\mathbf{D}\mathbf{M}8520}$ $\mathbf{V}_{\mathbf{D}\mathbf{M}8530}$ **Material Combination Axis** $\mathbf{E}_{\mathbf{P}\mathbf{r}\mathbf{e}\mathbf{d}\mathbf{i}\mathbf{c}\mathbf{t}\mathbf{e}\mathbf{d}}$\ $\mathbf{E}_{\mathbf{E}\mathbf{x}\mathbf{p}\mathbf{e}\mathbf{r}\mathbf{i}\mathbf{m}\mathbf{e}\mathbf{n}\mathbf{t}\mathbf{a}\mathbf{l}}$\ **Error**
**(MPa)** **(MPa)** **(MPa)** **(MPa)**
693.520 546.235 0.5 X 619.878 496.813 ± 35.0 19.9%
Y 611.129 417.935 ± 60.8 31.6%
Z 619.878 413.767 ± 63.5 33.3%
------------------------------------------ ------------------------------------------ ----------------------------------------- ----------------------------------------- ------------------------------- ------------------------------------------------------------------------------------------------------------ ------------------------------------------------------------------------------------------------------------------------------------------ -----------
materials-11-00376-t006_Table 6
######
Recovery time of folding line 3 and folding line 2.
Thickness (mm) Time to Recover (s) (Temperature: 70−73 °C)
---------------- --------------------------------------------- ----------
0.1 N/A 0.7
0.3 0.9 1.1
0.5 1.8 4
1 2 5
1.5 8 11
2 11 Breakage
|
{
"pile_set_name": "PubMed Central"
}
| 0 |
Our Efflorescence bouquet is bursting into bloom with a gorgeous collection of pink flowers! Let love bloom with this lovely arrangement of gerberas, roses, tulips, lilies and other spring favorites. Call us or order spring flowers online 24 hours a day!
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
Sexy Latina Cassidy Banks first hardcore scene. This hot slut gets fuck and does some hot titty fucking action.
|
{
"pile_set_name": "OpenWebText2"
}
| 0.054054 |
Wokha district administration sports meet
Hundreds of staff and well-wishers turned up to witness the first ever Wokha district administration staff sports meet which got underway here at public ground, Wokha Friday.
DC Wokha Vyasan R, who declared the sports meet open, urged the participating teams and individuals to take part in the various events with a competitive and sportsmanship spirit. PA to DC Wokha YM Odyuo offered the invocation at the short opening ceremony which was chaired by EAC Sanis Shaying Sheu.
Teams and individuals from Wokha district administration staff are competing in events categorized for both men and women.
Five men teams consisting of officers, ministerial, ADC Bhandari, Dobashis, and drivers and grade IV staff are competing in the disciplines of running race, football, volleyball, basketball and tug of war while two women teams consisting of LDAs and UDAs and typists and grade IV staff are competing in the disciplines of running race, football penalty shoot-out and volleyball.
The sports meet will culminate on Saturday with SP Wokha Limasunep Jamir gracing the closing ceremony as chief guest.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
.x..
.x.x
x.x.
..x.
|
{
"pile_set_name": "Github"
}
| 0.1 |
Akali From Behind Doggy Pussy and Ass
|
{
"pile_set_name": "OpenWebText2"
}
| 0.054054 |
Gennady Bukharin
Gennady Ivanovich Bukharin (; born 16 March 1929) is a retired Soviet sprint canoeist. He won the individual 1000 m and 10,000 m events at the 1958 World Championships and placed third in both at the 1956 Olympics.
References
External links
Article on Gennady Bukharin's 90th birthday
Category:1929 births
Category:Living people
Category:Canoeists at the 1956 Summer Olympics
Category:Soviet male canoeists
Category:Olympic canoeists of the Soviet Union
Category:Olympic bronze medalists for the Soviet Union
Category:Olympic medalists in canoeing
Category:Russian male canoeists
Category:ICF Canoe Sprint World Championships medalists in Canadian
Category:Medalists at the 1956 Summer Olympics
|
{
"pile_set_name": "Wikipedia (en)"
}
| 0 |
Warming up --------------------------------------
clamp_a XXX i/100ms
clamp_b XXX i/100ms
clamp_a XXX i/100ms
clamp_b XXX i/100ms
clamp_a XXX i/100ms
clamp_b XXX i/100ms
Calculating -------------------------------------
clamp_a XXX (XXX%) i/s - XXX
clamp_b XXX (XXX%) i/s - XXX
clamp_a XXX (XXX%) i/s - XXX
clamp_b XXX (XXX%) i/s - XXX
clamp_a XXX (XXX%) i/s - XXX
clamp_b XXX (XXX%) i/s - XXX
Comparison:
XXX
|
{
"pile_set_name": "Github"
}
| 0.056561 |
Attractive And Beauty Blow-Job Doggyfuck And Spunk On Ass.
|
{
"pile_set_name": "OpenWebText2"
}
| 0.051724 |
Taiwan President Defends China Policy ahead of Xi Meeting
Taiwan's President Ma Ying-jeou Wednesday defended his policy of rapprochement with China ahead of a meeting between Chinese leader Xi Jinping and the chairman of the island's ruling party, saying it had brought peace despite fears of Beijing's increasing influence.
Xi is expected to meet Eric Chu, who succeeded Ma as chairman of the China-friendly Kuomintang party, in Beijing on Monday.
A group of 20-odd demonstrators from the radical anti-China opposition Taiwan Solidarity Union (TSU) rallied in central Taipei against the meeting, alleging Chu could betray Taiwan's interests.
"Chu would be ditched by Taiwan people and the Kuomintang pay a dear price if he reached an agreement with Xi sacrificing the interest of Taiwan people," TSU chief Huang Kun-hui warned in a statement.
Ma, the initiator of rapprochement with China since 2008, however said Chu should meet with Xi and keep on track the "One China" policy which has paved way for the improved ties.
"I met with chairman Chu recently. We agreed on that," he told reporters at the island's top China policy decision-making body Mainland Affairs Council.
"The past seven years saw the spirit of 'One China' being implemented and unchanged, although some differences had erupted. In this way, ties have been pulled closer," Ma said.
He was referring to the controversial "consensus" with Beijing, under which both Taipei and Beijing agreed there was only one China although each insists it represents the whole country.
"The consensus is not a cure-all, but indeed it has helped maintain the status quo and brought peace and prosperity," Ma said.
"To Taiwan, the biggest significance of this is that regarding the most sensitive 'one China' issues, it created a political platform acceptable for two sides."
The two split in 1949 at the end of a civil war, and Beijing still considers Taiwan part of its territory awaiting reunification, by force if necessary.
Ties improved markedly after Ma came to power in 2008, pledging to beef up trade and tourism links. He was re-elected in 2012.
But public sentiment in Taiwan has turned against the Beijing-friendly approach, with voters saying trade deals have been agreed in secret and not benefited ordinary citizens.
In March last year around 200 students occupied parliament for more than three weeks in protest against a controversial services trade pact, while thousands rallied in support of what became known as the "Sunflower Movement".
The KMT suffered its worst-ever showing in local polls in November -- seen as a barometer for presidential elections in 2016.
However, Ma said earlier this month that ties with Beijing were "back to normal", and that government surveys showed opposition to the pace of rapprochement was declining.
Source: Agence France Presse
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
AstraZeneca plc (AZN) - Get Report shares fell sharply in the opening hour of trading in London Thursday after it was reported that Teva Pharmaceuticals (TEVA) - Get Report was courting the CEO of Britain's second-biggest drugmaker.
Shares dropped the most in nearly two years and were marked 4.5% lower at 8:45 London time and changing hands at 4,949 pence each, trimming their three-month gain to around 5.5%.
Israel-based Teva is expected to name AstraZeneca CEO Pascal Soriot, Reuters reported citing Israeli financial news website Calcalist.
Soriot has apparently met with Teva's search committee and chairman and has agreed to take the job, Calcalist reported Wednesday.
Soriot would be filling the shoes of Erez Vigodman who stepped down in February after a string of costly acquisitions, along with delayed drug launches, sent Teva shares plummeting and led to calls for management and structural changes, including a possible split into separate generic and branded medicine units.
Chief Financial Officer Eyal Desheh also resigned at the end of June.
According to Calcalist Soriot is expected to earn twice as much as Vigodman and receive a bonus upon signing the contract, estimated at about $20 million.
Teva shares were up 4.18% om Tel-Aviv at 11,490 Israeli shekels.
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
Old Man Dominated by sexy hot babe in old young femdom hardcore fucking
old Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, young Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, man Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, teen Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, sexy Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, men Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, vs Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, kiss Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, hot Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, fucking Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, cum Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, grandpa Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, femdom Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, hardcore Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, babe Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex, Old Man Dominated by sexy hot babe in old young femdom hardcore fucking sex,
|
{
"pile_set_name": "Pile-CC"
}
| 0.06426 |
Is War such a bad thing?
It is a common belief that war is evil, we have all pretty much heard speeches and read essays on why it is so bad. But you never hear any speech or essay justifying the good that can come out of war such as newer technologies, economic prosperity, and a common purpose to unite a divided people. For example, World War II pulled the American economy out of the Great Depression, and created a large number of jobs in order to produce weapons, supplies, ships, aircraft, and every other necessity needed to fight a war. The American people back home were working around the clock to keep up production, and all the people basically worked, ate, defecated, and slept and repeated the cycle over and over again. They dedicated all their time to support the war effort, and gave up any free time they had available. This led to the people saving their hard-earned money, since they had no time to figure out ways to spend it other than to buy their basic necessities. After the end of the war, production shifted from mass-producing war supplies to mass-producing consumer goods, which of course made such goods relatively cheap, and the people just kept buying and buying stuff they did not really need with all the money they had saved up from years of hard-work. It led to economic boom that had never been seen before in history, all thanks to war.
Not only can war lead to economic prosperity, but it also leads to the development of new and advanced technologies that were originally created to try to one-up the enemy. The entire American space program relied on captured German technology from World War II, specifically rocket technology and the likes. The space program led the people to a new scientifc frontier, and greatly expanded our knowledge to the understanding of the universe. For thousands of years, humanity thought only the heavens were accesible by the gods, but thanks to technology, we claimed the heavens. In the immortal words of Buzz Aldrin, “one small step for man, one giant leap for mankind,” again something that could only have been made possible by war.
And let us not forget, war creates a common purpose. After the onset of World War I, the German people were defeated, and utterly left in ruins. Their economy collapsed, jobs were scarce, and the people were left in shambles. Then comes along a young Austrian by the name of Adolph Hitler, and he basically gathers the German people, and tells them what they want to hear: everything is going to be alright, it is your not fault that such tragedy has befallen you, do not worry. Of course, there is no doubt that Hitler’s actions were questionable, but he united the people under the common purpose of reclaiming what they believed was rightfully theirs, that being most of Europe, by waging war against everbody else. And it worked, war united the German people and made them strong again, by giving them a common purpose.
I am not arguing that war is the best thing in the world, but it is idiotic to think that no good can come out of it. History is littered with examples that great things can come out from such a barbaric practice. And not to mention, it is also stupid to believe that humans can just stop waging war, it is in our nature to fight, and we have been fighting since our very beginnings, and we will continue to keep fighting until we are no more.
Related Posts
Tags
Share This
1 Comment
There is no doubt that there are some perks to warfare, as you have noted with you example of World War II helping America out of the Great Depression. However, these economic booms and technological advances are not the goals of war; the purpose of warfare is to defeat the enemy, these days by any means necessary. Is it worth the huge loss of life? The immeasurable grief inflicted upon countless families? These were important questions after World War I, when millions of lives were lost and we still weren’t done fighting. And you mention war brings a nation together with a common purpose; what about when Germany lost World War II? Germany today still has to deal with their destructive past; a common purpose for the bad is worse than no common purpose at all.
I know you know that “war is not the best thing in the world,” but to suggest that war should be seen as a good thing is naive. No destruction, no death should be taken lightly, whether or not it is in our nature.
Leave a Comment
Mission Statement
"I'm as mad as hell and I am not going to take it anymore" is a desperate call to action by Peter Finch in the 1976 motion picture Network against those who are driven to use their power against the people. This forum is dedicated to three principles. First, reasonable people should not have to be driven to madness before taking action against unreasonable and unjust policies that destroy the ability to self-govern. Second, that reason should guide our decision making ending in virtuous action. Third, "we the reasonable people" must be compelled to take action by changing the hearts and minds of those who seek to destroy the United States of America's timeless principles of equality beginning from the time of creation, sanctity of human life, and elected government's duty to protect our right to self-govern.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
Radial scar of the breast: Is it possible to avoid surgery?
Breast radial scar (RS) management remains controversial. The need for surgical excision is supported by the concern of an associated high-grade lesion missed in the biopsy. The aim of this study was to assess histologic upgrade rate after a percutaneous biopsy, to determine if vacuum assisted biopsy prevents the need for subsequent RS surgical resection and to evaluate the upgrade risk factors. This was a uni-institutional retrospective study of consecutive patients with RS histologically diagnosed from January 2010 to December 2015. A total of 113 cases of RS were diagnosed. We verify that there was a histologic upgrade in 22 (19.5%) cases. The upgrade risk factors were the type of biopsy performed, the presence of atypia, the presence of calcifications and the number of fragments obtained in the biopsy (p < 0.05). The biopsy type was vacuum assisted in 25 (22.1%). The upgrade rate in the vacuum assisted biopsy group was 4.0%, whereas in the standard core needle biopsy group was 23,9% (p = 0.041). We demonstrated that the risk of upgrade after a RS diagnosis depends on the type of biopsy performed, the presence of atypia, the presence of calcifications and the number of fragments obtained. When a standard core biopsy is performed the risk of upgrade and malignancy is not negligible, and surgery is indicated. When the biopsy is vacuum assisted, the risk of upgrade and malignancy is significantly decreased and so the indication for excisional biopsy seems not to be so imperative.
|
{
"pile_set_name": "PubMed Abstracts"
}
| 0 |
Tag Archives: press release
The Fantasy Network, a joint venture of Legendarium Media friends The Forge Studios, along with Arrowstorm Entertainment and Zombie Orpheus Entertainment, is set to launch in 2017. The Network is setting itself up to be a one stop shop for all things fantasy, from syndicated, to new, and original content. Each partner will be contributing their own libraries of content ...
TUCSON, AZ, February 18, 2016 – Today, Legendarium Media, LLC, an entertainment news and online publishing company, announced a partnership with The Forge Studios, LLC. The Forge Studios will take over management of the Legendarium News site under the leadership of Ron Newcomb as the newly-appointed Chief Operating Officer of Legendarium Media, LLC, operating under the supervision of Erik Yeager, ...
FOR IMMEDIATE RELEASE September 22, 2014 Legendarium Media Launches with Two Feature Films Tucson, AZ. Legendarium Media, LLC, a Tucson based fantasy and science fiction media and production company announced today that Mark Ostley will step away from his position at the Middle-earth Network and the company’s new Legendarium Media brand will be launched with the production of two feature ...
Wolf J. Sherrill of “Rise of the Fellowship” joins the cast of the new action fantasy web series, “The Rangers” which is currently in development. The web series is about a special force of soldiers, known as Rangers, who were founded long ago by King Aenarion to guard and watch the borders of the Kingdom of Olaran. Each web based ...
From the offcial LOTRO Players press release; LOTRO Players is proud to present the official song for Fellowship Walk 2013. The Fellowship Walk is a yearly walk in Lord of the Rings Online to raise money for Child’s Play charity. This years Fellowship Walk hopes to raise $5,000 for the charity. The Fellowship Walk starts September 22nd and runs until ...
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
The Fourth (the Fourth Penis) Anal Sex Of This Year
|
{
"pile_set_name": "OpenWebText2"
}
| 0.058824 |
Busty Tranny Doing 69 with her Boyfriend
|
{
"pile_set_name": "OpenWebText2"
}
| 0.05 |
xx 9 0
xx 10 0
xx 11 0
xx 12 0
xx 13 0
xx 14 0
xx 15 0
xx 16 0
xx 17 0
xx 18 0
xx 19 0
xx 20 0
|
{
"pile_set_name": "Github"
}
| 0.126316 |
xxx
.x
.x
.x
|
{
"pile_set_name": "Github"
}
| 0.071429 |
Check out our new site Makeup Addiction
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
Teleportation machine broke down better drink my own piss
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
We kicked their ass.
|
{
"pile_set_name": "Enron Emails"
}
| 0.05 |
fuck you
|
{
"pile_set_name": "Enron Emails"
}
| 0.125 |
Comments
Lin wrote, "Indonesia has several hundred local languages (from about 300 ethnic groups), and Bahasa Indonesia is the official national language.
The song is from West Sumatra, which has its own specific local language… In Indonesia we always sing the songs in their original languages.
The first version (Kampuang Nan Jauh Di Mato) is the original verse in the West Sumatran language. The second one (kampung jauh di mata) is its translation in Bahasa Indonesia (the national/official language), not the Indonesian version, since we never sing the song other than their original language.
The language of the song is called 'Bahasa Minangkabau' or 'West Sumatran Language' or 'Minangkabau language', all three have the same meaning. 'Minang' stands for Minangkabau. Minang is used as a popular unofficial term. Minangkabau is an ethnic name, such as the Minangkabau people. West Sumatra is the Province (or maybe State in the US).
People outside West Sumatra usually use a different term for the language such as 'Bahasa Padang' or 'Padang Language'. It's very common, but it's wrong. Because Padang is just a city, the capital city of West Sumatra Province. I have to tell you this, just in case you talk about this issue with other friends whom ever visited or live in Indonesia before."
Lin also wrote, "The West Sumatran people are known as good traders and travelers since a long time ago. So many of them made a living and raised their family in other regions. All over Indonesia you can find people who are originally West Sumatran.
This traditional song shows how they missed their home village in West Sumatra so much...
I think this song can also shows us how we connected to those who suffered from the 7.9 magnitude earthquake (on September 30, 2009) in West Sumatra, Jambi and other surrounding damaged areas. It breaks my heart to see how such a beautiful areas could be in such devastation, especially for the people who lived there... My heart goes out to them."
Thanks and Acknowledgements
Many thanks to Lin Fadelan for contributing and translating this song, for the photos and for such interesting commentary. Thanks to Harri Saptadi for the score and to Monique Palomares for the midi.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
Ramundberget Skarsvallen 4 beds
100 %
Cabins & apartments |Cottages with apartments located near both eateries and lifts.
Accommodation in cottages which house apartment with 4-10 beds. Bright and nice apartments with good standard and furnishings for convenient self-catering.
All have their own sauna to enjoy after a great day on the slopes or in the trail, fully equipped kitchen, drying cabinet and storage for skis and sleds. Some of the apartments have a fire stove.
Here you can park just outside the door, making it extra convenient for those with small children.
Like we said, here you stay in the very centre of the village. Just around the corner are top-class restaurants, après-ski, alpine spa, pool, grocery store, Topsport, an illuminated ski track and much more to make your alpine holidays complete.
Directions:
Directions: Road 84 from Sveg towards Röros. Take a right where Funäsdalen begins, see roadsign for Bruksvallarna, Ramundberget.
Check-in: Not before 16:00. Check-out not after 10:00.
If you arrive after reception has closed, there's a key in a red mailbox at the entrance to Fjällgården. If arriving after 20:00, please let reception know on tel.: +46 (0)684 - 66 88 30.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
Lexxi Steele Gets Two Cocks To Fuck Her Pussy
388
|
{
"pile_set_name": "OpenWebText2"
}
| 0.06 |
Q:
How to print underlined string in console output in java
I want to know if there is any way to print the underlined text on console using java String class.
A:
You can only rely on how the String is interpreted by your console. For example, in bash, you can do something like inserting your string between escape sequences \033[1m and \033[0m (for bold):
\033[1mInsert your String here\033[0m
You should read the documentation of your favorite console.
|
{
"pile_set_name": "StackExchange"
}
| 0 |
Cum to me playing with my pussy:) (F)
|
{
"pile_set_name": "OpenWebText2"
}
| 0.054054 |
President Trump on Thursday backed away from his proposal to send the Manhattan terrorist suspect to Guantanamo Bay, and said justice might be delivered to Sayfullo Saipov more quickly in the United States.
"Would love to send the NYC terrorist to Guantanamo but statistically that process takes much longer than going through the Federal system ... There is also something appropriate about keeping him in the home of the horrible crime he committed. Should move fast. DEATH PENALTY!" Trump tweeted Thursday morning.
Would love to send the NYC terrorist to Guantanamo but statistically that process takes much longer than going through the Federal system... — Donald J. Trump (@realDonaldTrump) November 2, 2017
...There is also something appropriate about keeping him in the home of the horrible crime he committed. Should move fast. DEATH PENALTY! — Donald J. Trump (@realDonaldTrump) November 2, 2017
White House press secretary Sarah Sanders told reporters on Wednesday afternoon that Trump would consider designating Saipov as an "enemy combatant," but said his earlier comment about sending him to the island prison was not intended to be serious.
"I believe he was addressing his frustration with the lengthy process that often comes with a case like this," Sanders told reporters at the White House.
Due to Guantanamo's longer-than-normal court process, Trump believes the 29-year-old green card recipient may see justice faster if he is processed in one of the states he has resided or in New York, where the crime was committed.
Late Wednesday, Trump reiterated his calls for Saipov to be sentenced to death if convicted of killing eight people and wounding 12 others by running people down with a truck Tuesday.
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
//////////////////////////////////////////////////////////////////////////
// Mapper176 //
//////////////////////////////////////////////////////////////////////////
class Mapper176 : public Mapper
{
public:
Mapper176( NES* parent ) : Mapper(parent) {}
void Reset();
BYTE ReadLow ( WORD addr );
void WriteLow( WORD addr, BYTE data );
void Write(WORD addr, BYTE data);
// For state save
BOOL IsStateSave() { return TRUE; }
void SaveState( LPBYTE p );
void LoadState( LPBYTE p );
protected:
BYTE reg5000;
BYTE reg5001;
BYTE reg5010;
BYTE reg5011;
BYTE reg5013;
BYTE reg5FF1;
BYTE reg5FF2;
BYTE we_sram;
BYTE SBW, sp_rom;
private:
};
|
{
"pile_set_name": "Github"
}
| 0 |
lucky fuck
|
{
"pile_set_name": "Enron Emails"
}
| 0.1 |
user system total real
mul XXX XXX XXX (XXX)
pow XXX XXX XXX (XXX)
|
{
"pile_set_name": "Github"
}
| 0.112676 |
SEXY MILF FUCKS AND SUCK HER BOYFRIENDS COCK AFTER HE GETS OUT OF THE SHOWE
|
{
"pile_set_name": "OpenWebText2"
}
| 0.053333 |
watch me suck off a dildo like it was your cock and cum
watch me suck off a dildo like it was your cock and cum
|
{
"pile_set_name": "OpenWebText2"
}
| 0.071429 |
Filigrams: A New Type of Pretty Picture (2000) - vmorgulis
http://www.chiark.greenend.org.uk/~sgtatham/filigram/
======
alvin0
looks similar visually to "Patterns in modular Arithmetic" not sure if they
are mathematically same though.
[http://maxwelldemon.com/2011/11/20/22-1-patterns-in-
modular-...](http://maxwelldemon.com/2011/11/20/22-1-patterns-in-modular-
arithmetic/)
|
{
"pile_set_name": "HackerNews"
}
| 0 |
NOTICE: NOT FOR PUBLICATION.
UNDER ARIZ. R. SUP. CT. 111(c), THIS DECISION DOES NOT CREATE LEGAL PRECEDENT
AND MAY NOT BE CITED EXCEPT AS AUTHORIZED.
IN THE
ARIZONA COURT OF APPEALS
DIVISION ONE
SOUTHWEST FARM SERVICES, LTD. PARTNERSHIP, an Arizona
limited partnership Plaintiff/Appellee,
v.
ROBERT BURNS and JEANNE BURNS, husband and wife dba ROBERT
BURNS ARCHITECTS, INC., Defendants/Appellants.
No. 1 CA-CV 12-0808
FILED 3-27-2014
Appeal from the Superior Court in Maricopa County
No. CV2010-092562
The Honorable Emmet J. Ronan, Judge
AFFIRMED
COUNSEL
Grant & Vaughn, P.C., Phoenix
By Kenneth B. Vaughn, Sharon R. Sprague
Counsel for Plaintiff/Appellee
Jeffrey M. Zurbriggen, P.C., Phoenix
By Jeffrey M. Zurbriggen
Counsel for Defendants/Appellants
SOUTHWEST v. BURNS
Decision of the Court
MEMORANDUM DECISION
Judge Lawrence F. Winthrop delivered the decision of the Court, in which
Presiding Judge Patricia A. Orozco and Judge Kenton D. Jones joined.
W I N T H R O P, Judge:
¶1 Robert and Jeanne Burns, doing business as Robert Burns
Architects, Incorporated, appeal from a judgment and award of attorneys’
fees in favor of Southwest Farm Services, Limited Partnership on a breach
of contract claim. For the reasons stated below, we affirm.
FACTUAL AND PROCEDURAL BACKGROUND
¶2 Southwest Farm Services, Limited Partnership
(“Southwest”) is a hay brokering business. In August 2006, Southwest
contracted with Robert Burns Architects, Incorporated, 1 for the
development of a preliminary project site plan to develop property owned
by Southwest and intended for business operations (the “Preliminary Site
Plan Contract”). The price of services in the Preliminary Site Plan
Contract was $5,600. In October 2006, Southwest contracted with Burns to
provide more comprehensive architectural and engineering services
related to the construction of buildings (the “Construction Design
Contract”). In this contract, Southwest hired Burns to design and provide
construction documents and engineering services for several buildings, a
gate entry, and walls on the property. The price of services in the
Construction Design Contract was $182,950, payable in six payments
pursuant to a schedule set forth in the contract.
¶3 Southwest paid Burns $165,970.51 through June 2009. This
included approximately $5,600 Southwest paid Burns on the Preliminary
Site Plan Contract prior to signing the Construction Design Contract.
Although Burns furnished preliminary site plans and later revised those
1 Robert Burns entered the contract doing business as Robert Burns
Architects, Inc. Southwest later learned the corporation had been
dissolved in 2002 and filed an amended complaint alleging that Robert
Burns and the marital community were personally liable for the breach of
contract. We refer to the defendants collectively as “Burns.”
2
SOUTHWEST v. BURNS
Decision of the Court
site plans, Burns never delivered to Southwest final, signed, and sealed
construction documents under the Construction Design Contract. Robert
Burns testified that he would have delivered signed and sealed documents
upon receipt of the final payment, which never occurred.
¶4 In October 2009, Southwest notified Burns that it considered
Burns to be in material breach and demanded delivery of final
construction documents in exchange for payment of the $10,959.49 balance
due on the contract or a refund of the money Southwest paid Burns.
Burns did not respond. Southwest made a second identical demand in
March 2010, to which Burns also did not respond.
¶5 Southwest then filed a complaint for breach of contract.
Burns answered and counterclaimed for breach of contract, bad faith, and
unjust enrichment. At a one-day bench trial, the trial court received
evidence of Burns’ invoices to Southwest and payment from Southwest to
Burns. The court also heard testimony from Michael Perez, Southwest’s
limited partner and manager, and Robert Burns. The trial court ruled that
final payment to Burns on the Construction Design Contract was not due
until there was “100% completion of the construction documents and
submitt[al] to Maricopa County and approval of the building permit by
Maricopa County.” The trial court found that no final, signed, and sealed
plans had been submitted and there was no approved building permit.
The trial court concluded that Southwest did not breach the Construction
Design Contract because the final payment was not yet due. The court
rejected Burns’ claim that its nonperformance was justified as well as
Burns’ claim for unjust enrichment on the Construction Design Contract,
finding that Southwest could no longer use the work performed by Burns.
However, the trial court implicitly found that Burns had completed the
Preliminary Site Plan Contract by reducing Southwest’s claimed damages
by the value paid for services under that contract.
¶6 The court awarded Southwest a judgment of $160,330.85,
$65,467.70 in prejudgment interest, and $48,431.90 in attorneys’ fees.
Burns filed a timely notice of appeal. We have appellate jurisdiction
pursuant to Arizona Revised Statutes (“A.R.S.”) section 12-2101(A)(1)
(West 2014). 2
2 We cite the current Westlaw version of the applicable statutes and
rules unless revisions material to this decision have since occurred.
3
SOUTHWEST v. BURNS
Decision of the Court
DISCUSSION
I. Breach of Contract
¶7 Burns argues the trial court erred when it concluded that
Burns breached the Construction Design Contract by failing to submit
final plans to Maricopa County and by failing to obtain an approved
building permit. 3 Interpretation of a contract is a question of law to be
decided de novo. Polk v. Koerner, 111 Ariz. 493, 495, 533 P.2d 660, 662
(1975). On appeal, we view the evidence in the light most favorable to
supporting the judgment and will accept the trial court’s findings of fact
absent clear error. Id. at 494, 533 P.2d at 661.
¶8 Arizona courts strive to enforce contracts according to the
parties’ intent. Taylor v. State Farm Mut. Auto. Ins. Co., 175 Ariz. 148, 152,
854 P.2d 1134, 1138 (1993). “In ascertaining the parties’ intent, the court
will look to the plain meaning of the words as viewed in the context of the
contract as a whole.” United Cal. Bank v. Prudential Ins. Co. of America, 140
Ariz. 238, 259, 681 P.2d 390, 411 (App. 1983).
¶9 Burns contends that the scope of work detailed in the
Construction Design Contract did not require it to submit final plans to
Maricopa County or obtain an approved building permit. The contract’s
compensation and payment schedule, however, states that Southwest
shall make its fifth payment “[u]pon 100% completion of the construction
documents and Submittal to Maricopa County” and the final payment
“[u]pon approval of the building permit by Maricopa County.” Burns
contends that these provisions only triggered payments and did not
require Burns to submit final plans or obtain a building permit. Our
adoption of Burns’ interpretation of the scope of work language contained
within the contract would render the language in the compensation and
payment schedule meaningless. The payments are dependent upon Burns
completing the items listed in the schedule. If Burns was not obligated to
provide these services, this language would be superfluous.
¶10 Burns also argues it was not obligated to submit final plans
or obtain a building permit because the parties had orally modified the
Construction Design Contract and a valid novation occurred. The contract
required that all requests for changes to the contract “shall be in writing,”
3 It is undisputed that Burns never delivered final construction
documents or a building permit approved by Maricopa County.
4
SOUTHWEST v. BURNS
Decision of the Court
and Burns admitted there was no written modification of the contract.
Likewise, there was no evidence of any other agreement between the
parties supporting any claim for novation. Thus, these arguments fail.
¶11 Burns also contends the parties extended his time to perform
under the Construction Design Contract when Southwest asked Burns to
obtain an agriculture exemption for the property. However, Southwest’s
Perez testified the property had the agriculture exemption when he
purchased it in 2004. Although Burns testified to the contrary, the trial
court explicitly rejected Burns’ testimony as not credible, accepting
instead Perez’s testimony that the property always had an agriculture
exemption. We defer to the judgment of the trial court on this matter. See
Estate of Reinen v. N. Ariz. Orthopedics, Ltd., 198 Ariz. 283, 287, ¶ 12, 9 P.3d
314, 318 (2000) (citations omitted) (stating the “credibility of a witness’
testimony and the weight it should be given are issues particularly within
the province of the” finder of fact). 4
¶12 For these reasons, we affirm the trial court’s conclusion that
Burns breached the contract.
II. Burns’ Waiver Defense
¶13 On appeal, Burns argues Southwest’s conduct waived any
obligation Burns had to provide final, signed, and sealed documents,
because Southwest paid Burns in full through June 2009, purposefully
delayed the project due to the bad economy, and actually used the
construction design plans for the current buildings ultimately constructed
on the subject property after Burns was discharged from the project.
Under Arizona Rule of Civil Procedure 8(c), “In pleading to a preceding
pleading, a party shall set forth affirmatively . . . waiver[] and any other
matter constituting an avoidance or affirmative defense.” Having failed to
plead this defense in its answer or specifically allege a waiver within its
4 It is unclear from the briefing whether Burns is really contending
that its efforts helped Southwest preserve the existing agriculture
exemption. However, this alternate reading of Burns’ confusing argument
is not material to our evaluation. The uncontested facts are: (1)
Southwest made repeated demands on Burns to provide final, sealed
plans under the Construction Design Contract, (2) these demands were
ignored, and (3) no such plans were ever provided. As a result, the
evidence at trial more than supports the verdict and judgment as to
breach.
5
SOUTHWEST v. BURNS
Decision of the Court
counterclaim, Burns is precluded from raising the defense of waiver on
appeal. See Parks v. Am. Cas. Co. of Reading, Pa., 117 Ariz. 339, 342, 572 P.2d
801, 804 (1977), disapproved on other grounds in Darner Motor Sales, Inc. v.
Universal Underwriters Ins. Co., 140 Ariz. 383, 387-88, 682 P.2d 388, 392-93
(1984). We therefore decline to reach the merits of Burns’ waiver defense.
III. Burns’ Counterclaim for Unjust Enrichment
¶14 Burns counterclaimed asserting unjust enrichment, arguing
that it was entitled to compensation for the services it provided prior to
any breach.
Unjust enrichment occurs when one party has and retains
money or benefits that in justice and equity belong to
another. . . . To recover on a claim for unjust enrichment, a
claimant must show (1) an enrichment, (2) an
impoverishment, (3) a connection between the two, (4) the
absence of justification for the enrichment and
impoverishment and (5) the absence of any remedy at law.
Loiselle v. Cosas Mgmt. Grp., LLC, 224 Ariz. 207, 210, ¶ 9, 228 P.3d 943, 946
(App. 2010) (quotations and citations omitted).
¶15 Citing Trustmark Ins. Co. v. Bank One, Ariz. NA, 202 Ariz. 535,
542, ¶ 34, 48 P.3d 485, 492 (App. 2002), Southwest contends that Burns
cannot pursue a counterclaim for unjust enrichment because the doctrine
of unjust enrichment is not available where there is a specific contract
governing the parties. However, we find the immediate case consonant
with Adelman v. Christy, 90 F. Supp. 2d 1034 (D. Ariz. 2000) where the
litigant asserted unjust enrichment as an alternative theory of recovery in
the event it was deemed the breaching party. See Adelman, 90 F. Supp. 2d
at 1045. Thus, we will consider the trial court’s denial of Burns’ unjust
enrichment counterclaim.
¶16 The trial court found Southwest did not receive any benefit
from the work Burns performed on the Construction Design Contract
because that work was of no use to Southwest without the final, signed,
and sealed documents. On appeal, we view the evidence in the light most
favorable to supporting the judgment and will accept the trial court’s
findings of fact absent clear error. Polk, 111 Ariz. at 494, 533 P.2d at 661.
¶17 The record supports the trial court’s finding that Southwest
did not receive any benefit from the work Burns performed on the
Construction Design Contract. Contrary to Burns’ assertion, the record
6
SOUTHWEST v. BURNS
Decision of the Court
does not demonstrate Burns obtained the property’s agriculture
exemption. Burns did not provide Southwest with a set of final plans that
could be used to obtain bids from contractors and financing from lenders;
even at trial, Burns failed to offer final plans into evidence. Therefore, the
work Burns may have done on the Construction Design Contract did not
benefit Southwest, and Burns’ reliance on Cracchiolo v. Carlucci, 62 Ariz.
284, 157 P.2d 352 (1945), is misplaced.
¶18 Burns also argues Southwest received a benefit from
“grading and drainage” plans from Burns. Although the Construction
Design Contract included a $55,600 professional fee for “civil engineering
for grading and drainage analysis,” the record does not demonstrate
whether Burns provided that service. Perez testified that Southwest had
to hire its own contractor to draw up a grading and drainage plan because
Burns failed to provide one. Perez also testified that Southwest told Burns
the amount “of dirt that needed to be moved and where, and all he did
was put it on his paper and send it to the county and got it approved.”
Because the trial court was in the best position to determine the weight of
the evidence and the credibility of the witnesses, see Estate of Reinen, 198
Ariz. at 287, ¶ 12, 9 P.3d at 318, we conclude the trial court did not err in
denying Burns’ counterclaim for unjust enrichment related to grading and
drainage plans under the Construction Design Contract.
¶19 Burns also argues that Southwest relied on Burns’ site plans
pursuant to the Preliminary Site Plans Contract for the layout of its
current operations. The record demonstrates Burns provided Southwest
with preliminary site plans. Burns then revised the site plans twice at
Southwest’s request because the site plans as originally drafted were
inconsistent with and would not preserve the preexisting agriculture
exemption. In mid-October 2007, the revised site plans were accepted by
the County. As such, Burns did provide Southwest with approved site
plans for which Southwest paid $5,639.66 under the Preliminary Site Plan
Contract. Because Burns had provided a discernible benefit to Southwest
and was entitled to retain the $5,639.66 paid for these services, the trial
court apparently did not include that amount in the $160,330.85 judgment
against Burns.
¶20 Burns appears to argue that a May 2008 invoice for
$27,791.68 is evidence of the value of Burns’ work on the revised site
plans, because the invoice refers to a bill from November 2007
immediately after Burns completed that work. Although Burns had the
burden of proof on a claim of unjust enrichment, Burns did not offer the
November 2007 bill in evidence. See e.g., Loiselle, 224 Ariz. at 210, ¶ 9, 228
7
SOUTHWEST v. BURNS
Decision of the Court
P.3d at 946 (App. 2010) (emphasis added) (“To recover on a claim for
unjust enrichment, a claimant must show . . . (1) an enrichment [and] (2) an
impoverishment . . . .” (quotations and citations omitted)).
¶21 The missing November 2007 bill presents two problems for
Burns’ claim of unjust enrichment. First, because only two items on the
May 2008 invoice reference the November 2007 bill, it is unclear from the
record whether the entire May 2008 invoice includes the value of the site
plan revision related to the Preliminary Site Plan Contract or whether the
invoice includes civil engineering services related to the Construction
Design Contract. Because the trial court specifically found that Southwest
received no value from the Construction Design Contract, Burns does not
have a viable claim of unjust enrichment on any portion of the invoice
related only to that contract.
¶22 Second, although there are two items on the May 2008
invoice that reference the missing November 2007 bill and total $2,940.49,
without the November 2007 bill in evidence Burns cannot show these
items are for revision of the site plans. On this record, we therefore
conclude that the trial court did not err by finding that Burns was
adequately paid for services rendered pursuant to the Preliminary Site
Plan Contract.
IV. Community Liability
¶23 While Jeanne Burns appeared as a party, Burns contends the
judgment against the marital community’s property is erroneous because
there was no evidence regarding the relationship between the corporation
and the marital community. Burns admits that Robert and Jeanne are
married and that Robert Burns Architects, Inc. was dissolved in 2002.
Neither spouse objected to the entry of judgment against both defendants.
Therefore, we will not consider this argument for the first time on appeal.
See Englert v. Carondelet Health Network, 199 Ariz. 21, 26-27, ¶ 13, 13 P.3d
763, 768-69 (App. 2000) (issues not raised below are not generally
considered on appeal).
V. Southwest’s Failure to Mitigate Damages
¶24 Burns argues that the trial court erred by failing to address
the issue of damage mitigation. “[W]hether the injured party violated his
duty to mitigate damages is a question of fact for the trier of fact, when
there is conflicting evidence on the question.” Fairway Builders, Inc. v.
Malouf Towers Rental Co., Inc., 124 Ariz. 242, 256, 603 P.2d 513, 527 (App.
1979) (citations omitted). Burns argues Southwest had the burden to
8
SOUTHWEST v. BURNS
Decision of the Court
mitigate damages. However, as the party in breach, Burns has the burden
of showing that “mitigation was reasonably possible, but was not
reasonably attempted.” N. Ariz. Gas Serv., Inc. v. Petrolane Transp., Inc., 145
Ariz. 467, 477, 702 P.2d 696, 706 (App. 1984) (citation omitted).
¶25 As a threshold matter, Southwest argues Burns waived this
issue by not including mitigation in the joint pretrial statement or closing
arguments. However, Burns raised mitigation as an affirmative defense in
its answer. Burns also questioned Perez about Southwest’s ability to
obtain financing, and Burns testified that the location of the improvements
on Southwest’s property followed his site plans. Thus, Burns sufficiently
raised the mitigation issue at trial, and we do not find waiver.
¶26 Burns suggests that Southwest failed to mitigate damages by
not applying for financing after 2006 and by using the site plans. No
request for written findings of fact or conclusions of law was made upon
the trial court pursuant to Arizona Rule of Civil Procedure 52(a).
Therefore, on appeal, this court “must presume that the trial court found
every fact necessary to support the judgment.” Berryhill v. Moore, 180
Ariz. 77, 82, 881 P.2d 1182, 1187 (App. 1994). Perez testified he could not
apply for a loan without final, signed, and sealed plans that would allow
him to obtain a bid from a contractor. This testimony supports the
implicit conclusion that Southwest did not fail to mitigate damages by not
applying for a loan. Also, as discussed above, Southwest paid Burns for
its work on the site plans, thereby mitigating Southwest’s damages and
any compensable injury attributable to Burns related to its work on the
site plans.
VI. Attorneys’ Fee Awards
¶27 Burns argues the trial court erred in awarding attorneys’ fees
to Southwest as there was no basis in fact or law for the award. Burns’
argument is premised upon its position that Southwest breached the
contract. Having affirmed that Burns, not Southwest, was the breaching
party, we also affirm the award of attorneys’ fees to Southwest pursuant
to A.R.S. § 12-341.01(A), which authorizes an award of fees to the
successful party in a contract action.
¶28 We also reject Burns’ argument that the award was
erroneous because the trial court failed to make sufficient findings of fact.
Southwest requested fees pursuant to A.R.S. § 12-341.01, which does not
require written findings of fact supporting the award, only that the
underlying matter arise out of a contract. The parties did not request
9
SOUTHWEST v. BURNS
Decision of the Court
written findings of fact or conclusions of law pursuant to Arizona Rule of
Civil Procedure 52. Therefore, the trial court did not err in failing to make
detailed findings of fact in support of its award of attorneys’ fees to
Southwest.
¶29 Both parties request an award of attorneys’ fees on appeal.
Southwest was the successful party on appeal in this action arising out of
a contract. Therefore, we award Southwest its reasonable attorneys’ fees
and costs upon compliance with ARCAP 21(a). See A.R.S §§ 12-341.01(A)
and 12-342(A) (authorizing an award of costs on appeal to prevailing
party).
CONCLUSION
¶30 We affirm the judgment in favor of Southwest on its breach
of contract claim and the rejection of Burns’ counterclaims. We also affirm
the award of attorneys’ fees to Southwest and award Southwest its
reasonable attorneys’ fees and costs on appeal upon compliance with
ARCAP 21(a).
:MJT
10
|
{
"pile_set_name": "FreeLaw"
}
| 0 |
Suddenly he cum in my pussy and then cum again - Close-up 4K
|
{
"pile_set_name": "OpenWebText2"
}
| 0.05 |
INTRODUCTION {#sec1}
============
Influenza is an acute respiratory tract infection caused by influenza viruses. The most commonly involved genera are influenza viruses A and B \[[@ref1]\]. Influenza A viruses are further divided in subtypes -- mainly A(H1)pdm09 and A(H3) in recent influenza seasons -- and influenza B viruses are classified in lineages. In the Northern hemisphere, these viruses are responsible for the yearly influenza epidemic that infects a substantial proportion (\~20%) of the population during winter \[[@ref2]\]. Although most cases of infection will be asymptomatic or suffer a relatively mild illness, the large numbers of infected inviduals result in large numbers of severe cases and deaths every season \[[@ref1], [@ref3]\].
The epidemiology of seasonal influenza is influenced by age on different levels. First, the highest notification rates are usually reported in younger age groups \[[@ref4], [@ref5]\]. Second, the clinical presentation of the disease varies across age groups \[[@ref1], [@ref2]\]. The typical sudden onset of fever accompanied by headache, malaise, myalgia and upper respiratory symptoms seen in adults and adolescents is not as often observed in children or elderly people \[[@ref1]\]. Third, adults aged ⩾65 years are more at risk for complications, hospitalizations and death \[[@ref6], [@ref7]\]. Fourth, there is some evidence that some age groups play a more prominent role in transmitting the virus. It has been suggested that children may play an important role in household transmission \[[@ref8]\], that they may even be a driver for the spread of influenza epidemics, although the magnitude of children\'s contribution remains controversial \[[@ref9]\]. Finally, immunity against influenza is likely to differ across age groups because of different previous exposure to influenza viruses as highlighted during the 2009 pandemic when elderly people were less affected \[[@ref10]\], different vaccination policies \[[@ref11]\] and different vaccine effectiveness \[[@ref12]\]. Seasonal vaccination is recommended for risk groups, including the elderly, in most European Union/European Economic Area (EU/EEA) countries, but children are included only in a minority of Member States \[[@ref11]\]. Low vaccine effectiveness has been reported in recent influenza seasons, especially in older age groups \[[@ref12]\].
Circulating influenza strains influence the age distribution of infection, disease and severe outcomes of each season. A recent study carried out in the UK showed that the risk of symptomatic disease tends to decrease with age for influenza A and children have higher rates during influenza B waves \[[@ref2]\]. The A(H1)pdm09 subtype appears to have infected children first with adolescents and young adults being significantly affected only in the second wave of the 2009 pandemic \[[@ref2]\]. Some influenza subtypes, such as influenza A(H3N2), could be associated with a higher severity, especially in older age groups \[[@ref13], [@ref14]\] and in long-term healthcare facilities \[[@ref15]\]. Influenza types and subtypes may have an impact on the age distribution of hospitalized cases \[[@ref16], [@ref17]\], but this is not well documented in primary care.
Influenza surveillance in Europe, with the integration of clinical and virological data as its cornerstone, has a long history \[[@ref18]\]. Virological and syndromic surveillance data \[mostly influenza-like illness (ILI) but also acute respiratory illness (ARI)\] are collected through national networks of sentinel primary-care providers. Aggregated numbers by age group are available for ILI/ARI, but not for the virological data.
The objectives of this study were to (*a*) describe age-specific differences in the distribution of influenza viruses for the influenza season 2012/2013, and (*b*) compare age distributions of influenza-positive sentinel cases and ILI/ARI cases.
METHODS {#sec1-1}
-------
The surveillance of influenza in Europe is performed by the European Influenza Surveillance Network (EISN) under the coordination of the European Centre for Disease Prevention and Control (ECDC) \[[@ref16]\].
At the end of the influenza season 2012/2013, all EISN laboratories were invited to submit a subset of their data for this season. The variables were limited to reporting week, patient age and influenza type and subtype. For the purpose of this analysis, both dual influenza infections and infections with influenza virus type C were excluded. ILI and ARI data for the 2012/2013 season were obtained from the European Surveillance System (TESSy) database hosted at ECDC. EISN members are recommended to use the EU case definitions for ILI and ARI \[[@ref19]\]. If both ILI and ARI were available, ILI was preferred. The age groups analysed were 0--4, 5--14, 15--64 and ⩾65 years.
For the description of the influenza season 2012/2013, pooled virological data was extracted from TESSy for the 29 EISN countries.
Age distributions of influenza-positive sentinel cases and ILI or ARI notifications were compared at country level. Influenza type and subtype distribution between age groups was compared at European level. In countries with age-specific specimen denominator data, the proportion of influenza-positive specimens was compared across age groups at country level. Overall dominance of virus type and subtype was compared with age-specific dominance at country level. Dominance was defined as a proportion of an influenza virus type or subtype ⩾60%.
Testing of differences was done with *χ*^2^ or Fisher\'s exact tests with the level of significance set at *P* \< 0·05.
RESULTS {#sec2}
=======
Participating countries and available data {#sec2-1}
------------------------------------------
Twelve of 29 EISN Member States reported age-specific data for 7890 positive specimens during the reporting period from week 40/2012 to week 20/2013. Most participating countries reported ILI cases, but France and Bulgaria only reported ARI ([Table 1](#tab01){ref-type="table"}). In nine countries, ILI/ARI data were available by age group ([Table 1](#tab01){ref-type="table"}). Nine countries were able to provide denominators with the number of tests performed ([Table 2](#tab02){ref-type="table"}). Twenty-one co-infections and two cases with a positive test for influenza virus type C were excluded. Information on age was not available for 18 cases from six countries. Finally, 7849 cases (99%) were kept in the analysis. Table 1.Age distribution of influenza-positive sentinel specimens and ILI/ARI cases by country, 12 European Union countries, influenza season 2012/2013Reporting countryType of surveillanceProportion of specimens and cases by age group, total number of specimens and casesComparison between age distributions in confirmed influenza and ILI/ARI cases (*P* values)0--4 yr (%)5--14 yr (%)15--64 yr (%)⩾65 yr (%)*N*BulgariaSpecimens184435379\<0·01ARI cases212450599 565DenmarkSpecimens613756171\<0·01ILI cases131859107358FranceSpecimens26274252602\<0·01ARI cases3424357162 536GreeceSpecimens114436988n.a.[\*](#tfn1_2){ref-type="table-fn"}ILI casesLithuaniaSpecimens1027549367n.a.ILI casesLuxembourgSpecimens1630504353n.a.ILI casesThe NetherlandsSpecimens516709387\<0·01ILI cases131059182149PortugalSpecimens4137671930·67ILI cases510768221SlovakiaSpecimens932562133\<0·05ILI cases1828486225 559SloveniaSpecimens1538452338\<0·01ILI cases736552541SpainSpecimens12325342651\<0·01ILI cases173445517 741SwedenSpecimens5147474870·62ILI cases5137391302[^1][^2] Table 2.Age distribution of the proportion of influenza-positive specimens by country, nine European Union countries with age-specific specimen denominator data, influenza season 2012/2013Reporting countryProportion of influenza-positive specimens/tested specimens by age groupComparison between positivity rates (*P* values)0--4 yr (%)5--14 yr (%)15--64 yr (%)⩾65 yr (%)Total (%)Bulgaria14/94 (15)35/141 (25)28/164 (17)2/21 (10)79/420 (19)0·15France668/1767 (38)700/1140 (67)1095/2203 (50)139/298 (47)2602/5 408 (48)\<0·01Greece10/33 (30)39/85 (46)32/67 (48)7/16 (50)88/201 (44)0·39The Netherlands21/130 (16)60/122 (49)271/776 (35)35/148 (24)387/1176 (33)\<0·01Portugal7/14 (50)26/45 (58)149/205 (73)11/61 (18)193/325 (59)\<0·01Slovakia12/19 (63)43/72 (60)75/106 (71)3/7 (43)133/204 (66)0·25Slovenia49/158 (31)128/194 (66)153/242 (63)8/11 (73)338/605 (56)\<0·01Spain317/773 (41)836/1352 (62)1401/2562 (55)97/256 (38)2651/4943 (54)\<0·01Sweden26/101 (26)66/121 (55)360/1217 (30)35/209 (17)487/1648 (30)\<0·01
Influenza season 2012/2013 {#sec2-2}
--------------------------
At the EU/EEA level, the 2012/2013 influenza season started about week 49/2012, had a prolonged peak between week 4/2013 and week 8/2013 and lasted until week 16/2013 ([Fig. 1*a*](#fig01){ref-type="fig"}). The epidemic peak occurred in week 6/2013, when 1632 of the 2607 sentinel swabs collected (63%) tested positive for influenza virus in 29 countries. From week 40/2012 to week 20/2013, these 29 countries tested 33 819 specimens, of which 15 744 (47%) tested positive for influenza virus. Fig. 1.Number of influenza-positive sentinel specimens and percentage\* by type, (sub)type and week. (*a*) European Union/European Economic Area (EU/EEA), (*b*) 12 EU countries†, week 40/2012 to week 20/2013. (\* Percentages are displayed in weeks where at least 50 influenza-positive specimens were reported; † Bulgaria, Denmark, France, Greece, Lithuania, Luxembourg, The Netherlands, Portugal, Slovakia, Slovenia, Spain, and Sweden.
Similarly, in the 12 participating countries, the 2012/2013 influenza season started about week 49/2012, had a prolonged peak between week 4/2013 and week 8/2013 and lasted until week 16/2013 ([Fig. 1*b*](#fig01){ref-type="fig"}). In week 7/2013, at the peak of the epidemic, 892 of the 1336 sentinel swabs collected (67%) tested positive for influenza virus. From week 40/2012 to week 20/2013, the 12 participating countries tested 16 508 specimens, of which 8076 (49%) tested positive for influenza virus.
In the 12 participating countries as well as in all EU/EEA countries, the distribution of influenza virus (sub)types over the season showed an overall predominance of influenza B virus with an increase over time (\~70% of influenza-positive specimens were B virus for week 13/2013). Influenza A(H1)pdm09 virus peaked in week 2/2013 when it accounted for 40% of all influenza-positive specimens while the proportion of A(H3) virus was near or below 20% for most of the season ([Fig. 1*a*](#fig01){ref-type="fig"}, [*b*](#fig01){ref-type="fig"}).
Influenza detections and clinical diagnoses by age group {#sec2-3}
--------------------------------------------------------
Of the nine countries for which ILI/ARI data were available by age group, seven had an age distribution based on influenza-positive sentinel specimens that was statistically different from the one observed for ILI/ARI ([Table 1](#tab01){ref-type="table"}). With the exception of Slovenia, the proportion of influenza-positive specimens in the ⩾65 years age group was systematically lower than the proportion of ILI/ARI.
The proportion of tested specimens by age group was statistically different from the one observed for ILI/ARI in all eight countries for which both number of tested specimens and ILI/ARI data were available by age group. However, in all these eight countries the 15--64 years age group accounted for both the highest number of ILI/ARI and tested specimens.
The proportion of influenza-positive specimens significantly differed accross age groups in six of the nine countries that provided age-specific specimen denominator data ([Table 2](#tab02){ref-type="table"}). In some countries, substantial differences were observed as for The Netherlands, where 16% of specimens were positive in the 0--4 years group compared to 49% in the 5--14 years group.
Distribution of influenza virus type and subtype by age group {#sec2-4}
-------------------------------------------------------------
Of the 7849 positive specimens reported with information on age, 1227 (16%) were from the 0--4 years age group, 2161 (28%) from 5--14 years, 4067 (52%) from 15--64 years and 394 (5%) from cases aged ⩾65 years. In cases aged 5--14 years, 75% tested positive for influenza B virus whereas all other age groups had an even distribution of influenza A and B viruses ([Fig. 2](#fig02){ref-type="fig"}). Of the influenza A viruses subtyped, A(H1)pdm09 viruses dominated over A(H3) viruses in all cases up to age 64 years (68% *vs*. 32% overall) whereas in those aged ⩾65 years, A(H3) viruses dominated (65% *vs*. 35%). Overall, the distribution of the virus types and subtypes were significantly different in age groups (*P* \< 0·0001). Fig. 2.Influenza virus type and subtype distribution by age group, 12 European Union countries, influenza season 2012/2013.
In most countries, dominant virus (sub)type varied accross age groups ([Tables 3](#tab03){ref-type="table"} and [4](#tab04){ref-type="table"}). Of note, a predominance of influenza B virus was observed in most countries (10/12) in the 5--14 years age group while no clear pattern emerged in the other age groups. Spain was the only country where predominance of the same type was observed in all age groups. Table 3.Age distribution of influenza-positive specimens by influenza virus (sub)type and country, 12 European Union countries, influenza season 2012/2013Reporting countryVirus (sub)type0--4 yr (%)5--14 yr (%)15--64 yr (%)⩾65 yr (%)Total (%)BulgariaA(H1)pdm096 (43)5 (14)8 (29)1 (50)20 (25)A(H3)03 (9)3 (11)06 (8)A unsubtyped02 (6)002 (3)B8 (57)25 (71)17 (61)1 (50)51 (65)Total14 (100)35 (100)28 (100)2 (100)79 (100)DenmarkA(H1)pdm091 (10)011 (9)012 (7)A(H3)6 (60)5 (23)47 (36)5 (50)63 (37)A unsubtyped00000B3 (30)17 (77)71 (55)5 (50)96 (56)Total10 (100)22 (100)129 (100)10 (100)171 (100)FranceA(H1)pdm09173 (26)95 (14)322 (29)17 (12)607 (23)A(H3)122 (18)99 (14)225 (21)56 (40)502 (19)A unsubtyped14 (2)9 (1)45 (4)4 (3)72 (3)B359 (54)497 (71)503 (46)62 (45)1421 (55)Total668 (100)700 (100)1095 (100)139 (100)2602 (100)GreeceA(H1)pdm094 (40)8 (21)16 (50)1 (14)29 (33)A(H3)6 (60)28 (72)13 (41)6 (86)53 (60)A unsubtyped00000B03 (8)3 (9)06 (7)Total10 (100)39 (100)32 (100)7 (100)88 (100)LithuaniaA(H1)pdm0923 (61)31 (31)99 (50)6 (18)159 (43)A(H3)5 (13)11 (11)5 (3)3 (9)24 (7)A unsubtyped7 (18)14 (14)49 (25)5 (15)75 (20)B3 (8)43 (43)44 (22)19 (58)109 (30)Total38 (100)99 (100)197 (100)33 (100)367 (100)LuxembourgA(H1)pdm0921 (38)26 (24)83 (47)1 (7)131 (37)A(H3)1 (2)1 (1)6 (3)1 (7)9 (3)A unsubtyped12 (22)14 (13)27 (15)9 (64)62 (18)B21 (38)66 (62)61 (34)3 (21)151 (43)Total55 (100)107 (100)177 (100)14 (100)353 (100)The NetherlandsA(H1)pdm096 (29)4 (7)78 (298 (23)96 (25)A(H3)11 (52)12 (20)54 (20)16 (46)93 (24)A unsubtyped00000B4 (19)44 (73)139 (51)11 (31)198 (51)Total21 (100)60 (100)271 (100)35 (100)387 (100)PortugalA(H1)pdm091 (14)6 (23)87 (58)7 (64)101 (52)A(H3)1 (14)1 (4)4 (3)1 (9)7 (4)A unsubtyped00000B5 (71)19 (73)58 (39)3 (27)85 (44)Total7 (100)26 (100)149 (100)11 (100)193 (100)SlovakiaA(H1)pdm096 (50)5 (12)18 (24)029 (22)A(H3)1 (8)5 (12)13 (17)1 (33)20 (15)A unsubtyped2 (17)2 (5)7 (9)011 (8)B3 (25)31 (72)37 (49)2 (67)73 (55)Total12 (100)43 (100)75 (100)3 (100)133 (100)SloveniaA(H1)pdm0922 (45)24 (19)82 (54)5 (63)133 (39)A(H3)3 (6)6 (5)12 (8)021 (6)A unsubtyped03 (2)003 (1)B24 (49)95 (74)59 (39)3 (38)181 (54)Total49 (100)128 (100)153 (100)8 (100)338 (100)SpainA(H1)pdm0958 (18)78 (9)371 (26)11 (11)518 (20)A(H3)10 (3)17 (2)58 (4)12 (12)97 (4)A unsubtyped6 (2)8 (1)11 (1)2 (2)27 (1)B243 (77)733 (88)96 16972742009 (76)Total317 (100)836 (100)1 401 10097 1002 651 100SwedenA(H1)pdm0911 (42)11 (17)151 (42)3 (9)176 (36)A(H3)11 (42)12 (18)89 (25)13 (38)125 (26)A unsubtyped1 (4)015 (4)2 (6)18 (4)B3 (12)43 (65)106 (29)16 (47)168 (34)Total26 (100)66 (100)361 (100)34 (100)487 (100)TotalA(H1)pdm09332 (27)293 (14)1326 (33)60 (15)2011 (26)A(H3)177 (14)200 (9)529 (13)114 (29)1020 (13)A unsubtyped42 (3)52 (2)154 (4)22 (6)270 (3)B676 (55)1616 (752059 (51)197 (50)4548 (58)Total1227 (100)2161 (100)4068 (100)393 (100)7849 (100) Table 4.Dominant influenza virus type or subtype by age group and country, 12 European Union countries, influenza season 2012/2013Reporting countryOverall dominant[\*](#tfn4_1){ref-type="table-fn"} type or subtypeDominant type or subtype by age group0--4 yr5--14 yr15--64 yr⩾65 yrBulgariaBNoneBBNoneDenmarkNoneA(H3)BNoneNoneFranceNoneNoneBNoneNoneGreeceA(H3)A(H3)A(H3)NoneA(H3)LithuaniaNoneA(H1)pdm09NoneNoneNoneLuxembourgNoneNoneBNoneNoneNetherlandsNoneNoneBNoneNonePortugalNoneBBNoneA(H1)pdm09SlovakiaNoneNoneBNoneBSloveniaNoneNoneBNoneA(H1)pdm09SpainBBBBBSwedenNoneNoneBNoneNone[^3]
DISCUSSION {#sec3}
==========
In Europe, the influenza season 2012/2013 was characterized by a co-circulation of three influenza virus types and subtypes, offering a good opportunity to determine whether the distribution of types and subtypes differs accross age groups \[[@ref20]\].
Our findings suggest that the overall distribution of types and subtypes may mask substantial differences between age groups. Thus, A(H3) -- a subtype frequently associated with a higher morbidity than the previous seasonal A(H1) and B viruses \[[@ref13], [@ref14]\] -- was especially prevalent in cases aged ⩾65 years. Conversely, influenza B virus predominated in children aged 5--14 years, which supports prevous findings from Germany and the UK \[[@ref2], [@ref21]\]. The remaining age groups experienced a more evenly distributed mixed season of A and B viruses. Of note, country-specific profiles of dominance and age-specific proportions of influenza virus types and subtypes were markedly different.
Age-specific influenza surveillance data should be interpreted with caution. In most countries, the age distribution of ILI/ARI differed from the age distribution of cases with confirmed influenza. Our findings suggest that sampling strategies may have slighly differed accross age groups. The relative overrepresentation of positive specimens collected in adults aged 15--64 years may be suggestive of differences in health-seeking behaviour. Since both clinical and virological indicators are collected through the same sentinel scheme, there are at least two additional possible explanations. First, the contribution of other respiratory pathogens differs across age groups. Besides influenza A and B viruses, parainfluenza virus and respiratory syncytial virus (RSV) contribute to ILI estimates \[[@ref22]\]. Specifically, the burden of RSV in children aged \<5 years is now well established \[[@ref23]\] and there is increasing evidence suggesting that it might also cause a substantial amount of illness in the elderly \[[@ref24]\]. Second, the varying proportion of positive specimens across age group could be explained by differential virus shedding by age or virus (sub)type. A recent study carried out in Germany could not find any evidence supporting this latter hypothesis \[[@ref25]\]. Regardless of the reason why age distributions differs between clinical and confirmed cases, this study reminds us that ILI/ARI rates by age group should be interpreted very cautiously in the absence of virological data. In countries where ILI/ARI data are not available by age group, influenza surveillance would therefore benefit from collecting virological data by age group.
If confirmed over several influenza seasons, these findings may have important implications for vaccination policies. The first objective of influenza vaccination is to prevent severe disease and death. It is now well established that elderly people have the highest mortality risk and therefore constitute a well-identified risk group \[[@ref26]\]. Previous studies have suggested that the extension of vaccine coverage to younger age groups would increase protection in the elderly \[[@ref27], [@ref28]\]. In seasons with different dominating strains accross age groups, the impact of such an extension may well be limited.
The relatively low number of specimens collected in some countries was an important limitation of this study, as some statistical analyses were not possible. For the same reason, it was not possible to look at the dynamics of transmission across age groups. In addition, such analysis would probably have to include several seasons. This study also underlined the need to document the sampling strategies in EISN countries as the selection of patients to be swabbed may not be systematic in all surveillance schemes.
The overall distribution of influenza viruses in the 29 EISN Member States under surveillance was similar to the one observed in the 12 countries participating in this study, suggesting that our findings may also be valid for the rest of the EISN Member States.
CONCLUSION {#sec4}
==========
This study demonstrates the added value of including age group data in routine virological influenza surveillance because they provide a better indication of the age-specific distribution of influenza infection and its causative virus types and subtypes than pooled virological data or age-specific ILI/ARI rates. With better estimates of the burden of influenza in different age groups, it would help identify target groups for preventive measures. Last, similar data collection in the coming years could help improve our understanding of the dynamics and transmission of influenza. Such data would not necessary have to be collected every week, but could be collected once after every season. This would also constitute a step towards a more integrated clinical and virological influenza surveillance.
We thank collaborators from the European Influenza Network (EISN) and from the European Reference Laboratory Network for Human Influenza (ERLI-Net). We are particularly grateful to Ani Teodosieva (Bulgaria), Thea Kølsen Fischer, Jesper Rønn, Bente Andersen (Denmark), Anne Mosnier, Martine Valette, Isabelle Daviaud, Françoise Stoll Keller, Jean-Marie Cohen, the GROG network (France), Andreas F. Mentis, Afroditi Moutousi (Greece), Matthias Opp (Luxembourg), Gé Donker, Marit de Lange, Pieter Overduin, Marcel Jonges (The Netherlands), Pedro Pechirra, Patricia Conde, Paula Cristovão, Baltazar Nunes (Portugal), Amparo Larrauri, Francisco Pozo, Concha Delgado, Silvia Jiménez-Jorge, Inmaculada Casas, the Spanish Influenza Surveillance System (Spain), and Chantal Quinten (ECDC).
None.
[^1]: ILI, Influenza-like illness; ARI, acute respiratory illness.
[^2]: Comparisons were not applicable (n.a.) where syndromic cases were not reported by age group.
[^3]: Dominance was defined as ⩾60%.
|
{
"pile_set_name": "PubMed Central"
}
| 0 |
Busty Tranny Doing 69 with her Boyfriend
|
{
"pile_set_name": "OpenWebText2"
}
| 0.05 |
Asian Anal Sex Penetrating and Cumming in Her Tight Asshole
Asian anal sex penetrating and cumming in her tight asshole - amateur nude anal sex video.
100% (3 votes) Duration: 4min 46sec Submitted: 6 years ago
More Anal Porn Videos and Anal Sex Pictures
|
{
"pile_set_name": "OpenWebText2"
}
| 0.058594 |
Products in the Target Marketing Directory
The Bagwell Marketing staff has been providing solutions to marketing problems for businesses of all sizes throughout the United States and in Puerto Rico for over thirty years. When we talk about our role as “your marketing partner®,” we mean that you have a one stop resource for virtually... Read More
At Acadia we talk to customers everyday from a wide range of industries. The two questions that surface most often are, "How do we keep our sales pipeline full of quality leads in the current economy?" and "How do we implement a process to track and manage the activity?" Acadia will work with... Read More
Sharper sales execution with data-driven science. Give reps the tools and insight to sharpen execution and accelerate win rates. Arm sales for more wins with intelligent opportunity scoring and visualization, dynamic recommendations based on the sales situation, real time tracking, analytics... Read More
Working with thousands of customers around the world means that ExactTarget knows a thing or two about one-to-one marketing. The account management team applies the expertise and lessons learned from our broad customer base to your email marketing program. Quite simply, our team understands... Read More
Identify key elements that impact your ability to market your products and solutions in your key target accounts The information you have about your customers and prospects has a huge impact on the success of all your marketing and sales initiatives. Certain information can also be used to... Read More
B2B sales cycles are long and complicated — in part because each sale includes multiple decision makers. This necessitates marketing that is as targeted and relevant as possible. And that’s where Account-Based Marketing (ABM) comes into play. ABM allows you to reach and engage with your target... Read More
Accounting & System Development by Accessible Business Consultants. Accessible Business Consultants is a full service consulting firm dedicated to the development and expansion of your small to medium size business. Expand your business' presence with a professional business development... Read More
Accu Trak™ is our real-time reporting tool that tracks opened emails, clickthroughs, replies, unsubscribe requests, and non-deliverables. It provides easy-to-understand analytics for all your email marketing and is conveniently built into the Admail.net system. Remove requests and... Read More
B2B media planning is in crisis due to the economic downturn. Data confirms a significant disparity between where B2B marketing investments and where B2B companies are finding success. Watch this Webinar to learn how to re-evaluate your channel investments to determine their true contribution to... Read More
When your company is considering making an acquisition, it is essential that you are armed with as much knowledge as possible. Usually, acquisition targets are new to the potential purchaser, making the level of uncertainty even greater. Acquisition studies form an integral part of the due... Read More
We encourage our clients to think differently about their B2B web sites. Your site should be more than a brochure and collection of articles, white papers, and landing pages. It can serve as a flexible gateway to personalized content. It should help customers or partners connect with you on... Read More
Most salespeople know that every interaction with a contact can move them closer to a sale. When your contact reaches out to you, you need to know about all of the interactions that they’ve had with your company. Refresh your memory with incommand’s Activity Recorder feature. This captures... Read More
AD:60 is a close-knit team of advertising, media and interactive experts based in New York with 10 years of award-winning experience. Formed out of a shared desire to create products worth believing in, we value collaborative, meaningful working partnerships that result in quantitative success... Read More
Make a mural. Suspend it. Create a countertop product display. ADBOX® can handle it. With brilliant graphics printed on high-grade e-flute, ADBOX is incredibly lightweight and comes flat packed. It’s eco-friendly and makes a big impact on your audience but not the environment. From the... Read More
Not sure what size table you'll have at your trade show? Here is the adjustable trade show tablecloth you can use at all of your shows! Made from 100% polyester for wrinkle resistant and machine washable, for easy care. Read More
"Admail XP is easy to use email marketing software that provides you with easy setup Sign-up Form, CAN SPAM compliance, and tracks campaign delivery, unsubscribes, replies, and opened emails. Admail XP gives you access to List Builder™, a seamless data capture sign-up form for the people... Read More
AdStand is a unique strategic tool for communication and campaign planning. It has evolved from our “AdBox®” product and was developed to be printed via various methods in any quantity. The sturdy base means that it will hold up to in-store use. AdStand comes in a flat package for optimized... Read More
Advance Product Designer is an online product designer tool that allows your customers to create their own printable designs that they can use on the products they order. It can be used by any ecommerce entrepreneur looking to sell custom printed products like t-shirts, trousers, caps, cards,... Read More
Packed with revolutionary segmentation, customization, and integration tools, ExactTarget's Advanced Edition email marketing software is designed to withstand the rigors of the most sophisticated marketers—and the most demanding consumers. Interactions: From remarketing campaigns to price... Read More
There are many different factors to evaluate when fine tuning a Web sites performance and effectiveness. Here are just a few examples of reporting that Webolutions uses to ensure maximum profitability and performance. -Campaign management – It is important to know what and how each marketing... Read More
Advertising is a constantly evolving field that lets you offer a more controlled message. It’s an important element in any B2B marketing program, whether for building awareness or generating leads. Advertising has grown beyond traditional magazine placements to include online banners,... Read More
A CGT Advertising Campaign blends creative ingenuity with market awareness to produce imaginative, unusual and unforgettable combinations of images and messaging. We never settle for ordinary because we know how to deliver the extraordinary. That’s why our clients rely on us to find the... Read More
Trade advertising is a valuable way to reinforce messages with critical audiences. Advertising for our clients ranges from ongoing programs that maximize frequency to single, compelling ads in trade show programs or special editions of publications. Our services include: Media Planning -... Read More
These days, B2B advertising is different, especially when the offering is technically complex. Though the emergence of alternative media channels has pushed traditional B2B advertising to the background, you can still create the awareness and action needed to build momentum for your... Read More
Most advertising agencies and web designers think and speak in the First Person. They say, “I can do Flash. I know JAVA. I cost an arm and a leg.” Some firms are farsighted enough to speak in the Second Person. Typically, they spend most of their time asking about you and your company. “How can... Read More
When it comes to the art of communication, we know what we’re talking about. Our writers and designers are driven by strategy and inspired by creativity. In a world of constant distractions, we create messaging that turns heads and stops consumers in their tracks. Messaging that stirs people —... Read More
Webolutions' marketing and advertising division specializes in the creation of strategic marketing plans and the subsequent campaign management. We work with our clients to achieve any number of goals including: -Increasing Sales -Brand Name Recognition -New Product Launches -Changing Company... Read More
Bagwell Marketing has 40 years of experience serving clients in retail, financial services, rent-to-own and in other industries. We handle both business-to- business and consumer advertising. Clients range in size from “mom and pop” businesses to major corporations. We are also specialists in... Read More
Estey-Hoover Inc., founded in 1975, is a full service AAAA agency with the experience and personnel to handle every facet of advertising and communications, whether in newspapers, television, radio, direct mail, outdoor, video, point of purchase, consumer and trade magazines, Internet,... Read More
Affinity Express is the leading multi-shore and onsite provider of high-volume advertising and marketing production solutions for interactive and print media, with hundreds of publishing, marketing services, retailer and corporate clients. Affinity Express delivers services 24 hours per day and... Read More
Looking for key chains, coffee cups, plastic bags, or trade show giveaways? We have over 500,000 advertising promotional products. Most items can be imprinted with your company name, company logo or message. Read More
Market research and market intelligence play an important role before, throughout and following the life of a direct mail or advertising campaign. When advertising is at the initial development stage, B2B International can obtain input from the potential target audience through exploratory... Read More
Advertising solutions that cultivate business relationships while turning prospects into profits, full-service or as needed. Discover the difference in your sale from structured campaigns, proven advertising experience, and a selling oriented approach. Read More
Profit Rank will launch and manage an affiliate marketing program in 1 or several affiliate networks. Affiliate marketing is a true pay for performance channel. Only pay when you sell a product or generate a lead. Read More
The right affiliate marketing program can provide a well-balanced media buying strategy to drive quality traffic to your site – be it through email, display, search, social, or other forms of desired media. We can help you build reach while minimizing financial risks with a proven results-driven... Read More
Our affiliate network is generating new business prospects for hundreds of Internet merchants. Our merchants are turning these prospects into long-term, loyal customers. If you are looking to increase your repeat customer base, consider joining our network of affiliate members. A membership... Read More
Detail oriented Freelance Graphic Designer for print & web media, with over 10 years of experience in delivering innovative ideas to meet client requirements within specified deadlines; catering to domestic and international markets. Proven skill set in all phases of graphic coordination, with... Read More
Customer support is an essential part of any business. One of the best ways for today's companies to ensure a great customer experience is to outsource customer calls to an experienced support call center-which allows them to save valuable time that can be spent on business operation. 31West... Read More
Our Agency Database contains detailed profiles of close to 15,000 U.S. and international agencies, including clients, fields of specialization, and much more. View a Sample Agency, Submit Your Agency or Update Your Agency's Listing. Read More
Our Ailment Sufferers lists and companion Prescription Drug Users lists let health marketers reach out to households with specific ailments. Diabetes, heart disease, high cholesterol, back pain, COPD and allergies are some of the options we have available. Read More
List Management is a service provided by All Access List Management, a subsidiary of Mazzone Marketing Group, which brings list owners and list renters together. This division will help you get mailers to test your data; and follow up to get repeat usage, which leads to increased revenue. We can... Read More
Did you know that the extremely popular Americano Thermal Mug is actually made in Britain? This fantastic travel mug has a durable double-walled design and a huge range of colour options - including two brand new colours with the stunning Americano Midnight mugs. Americanos feature a large... Read More
The Automated Marketing Platform is an on-demand web-based SaaS application designed to create integrated cross-media marketing campaigns for a group of distributed agents (Insurance, Retail, Real Estate) through direct mail, SMS, email and the web. AMP's main advantage is to roll-out of... Read More
The initial stage of the analytics process is always one of discovery—a planning phase in which we seek to understand how analytics can answer your business questions. Guided by this understanding, we provide recommendations suited to your unique goals. Upon collecting relevant data, we report... Read More
Analytics Maestro® extends Budget Maestro reporting capabilities by bringing the power and flexibility of enterprise-class OLAP (online analytical processing) reporting to the desktop. Extracting key data from Budget Maestro, including all General Ledger data, this financial analytics tool... Read More
New York City Pet Photographer Animal Photography Bring out the personality of your pet! Tozzophoto has specialized in exciting and expressive documentary style animal photography since 1994. Roy’s photographs capture your dog, cat, or other pet in candid moments, within their... Read More
Apogee Results is the largest independent, b2b-focused search & online agency in N. America. Founded by former alums of McKinsey, Dell, Hoover's / D&B, Travelocity, and successful VC-backed outfits, Apogee Results integrates best-of-class SEO and SEM with all the other key components of a... Read More
You can use Force.com code to add business logic to applications, write database triggers, and program controllers in the user interface. Force.com code has tight integration with the database, query language, and Web services. An Eclipse-based IDE Force.com includes an Eclipse-based IDE... Read More
Give your team unmatched sales opportunities. Research shows executives who make buying decisions reveal that personal relationships are still the most influential aspect of a buying decision. Increase closing rates with personal meetings. 3D2B Business Development Specialists can set... Read More
The most popular service that we offer to our clients is B2B appointment setting, in which our telesales agents will schedule an appointment for you or your sales team with a qualified decision maker that is educated and interested in your product or service. Whether you are looking to cut... Read More
Appointment Setting is absolutely crucial to most companies. It is particularly beneficial to companies with smaller sales forces. There is also a distinct difference and skill set between closers and prospectors. Some salespeople are comfortable with scheduling their own appointments but the... Read More
Associations, because they exist to leverage the size of their membership to achieve specific goals, benefit enormously from the social networking and collaboration capabilities of today’s web portals. The goals for most Associations reside in three areas: Improving the business climate for... Read More
With more than 25 years of audio production experience, Levy Production Group is your one-stop shop for audio post production in Las Vegas. Audio production is the process of creating sound for moving images. A great commercial or corporate video uses audio production to set the mood and... Read More
You will quickly save money and obtain top results compared with expanding your own inbound call center, buying new call center technology or adding staff. Our network of 50+ call centers (link opens new window) across the U.S., plus in Canada has over 2000 seats standing ready. With small and... Read More
The LeadManager™ sales automation solution from Velocify includes automated email marketing campaign management and execution features designed to save time and improve conversion rates for sales forces. The solution automatically sends prescribed lead nurturing email and text messages at... Read More
Business transactions can be more than a quick exchange of goods and services: ask the right questions, and a basic transaction becomes a valuable opportunity to enhance your business. Automated phone surveys help you make the most of these opportunities by pinpointing the richest information... Read More
Automatically Cut Costs and Improve Service With Our Automated Call Center Services! Cut costs, reach out to more people and improve customer service with AnswerNet's rugged, easy to implement and highly scalable Automated Call Center Services & Solutions. Each of our programs is backed by a... Read More
Looking for a new vendor?
Choose any category below to get started and compare price quotes for free.
Research
Take advantage of the wealth of insight and information available from industry experts in Target Marketing Directory. From product listings with links to vendor product pages to free white papers and press release downloads, you are sure to find the knowledge you need.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
require('./dummy');
var xxx = 0;
xxx
|
{
"pile_set_name": "Github"
}
| 0.054054 |
xxx xxx
xxx xxx
xxx xxx mel
xxx xxx bwk me
xxx xxx ken him someone else
xxx xxx srb
xxx xxx lem
xxx xxx scj
xxx xxx rhm
xxx xxx shen
xxx xxx a68
xxx xxx sif
xxx xxx pjw
xxx xxx nls
xxx xxx dmr
xxx xxx cda
xxx xxx bs
xxx xxx llc
xxx xxx mb
xxx xxx ava
xxx xxx jrv
xxx xxx bin
xxx xxx greg
xxx xxx dict
xxx xxx lck
xxx xxx rje
xxx xxx lwf
xxx xxx dave
xxx xxx jhc
xxx xxx agf
xxx xxx doug
xxx xxx valerie
xxx xxx jca
xxx xxx bbs
xxx xxx moh
xxx xxx xchar
xxx xxx tbl
xxx xxx s
xxx xxx tgs
xxx xxx met
xxx xxx jck
xxx xxx port
xxx xxx sue
xxx xxx root
xxx xxx bsb
xxx xxx jeg
xxx xxx eag
xxx xxx pdj
xxx xxx tpc
xxx xxx cvw
xxx xxx rwm
xxx xxx avg
xxx xxx eg
xxx xxx jam
xxx xxx dl
xxx xxx lgm
xxx xxx cmb
xxx xxx jwr
xxx xxx gdb
xxx xxx marc
xxx xxx usg
xxx xxx ggr
xxx xxx daemon
xxx xxx mihalis
xxx xxx honey
xxx xxx tad
xxx xxx acs
xxx xxx uucp
xxx xxx raf
xxx xxx adh
xxx xxx kec
xxx xxx craig
xxx xxx donmac
xxx xxx jj
xxx xxx ravi
xxx xxx drw
xxx xxx stars
xxx xxx mrg
xxx xxx jcb
xxx xxx ralph
xxx xxx tom
xxx xxx sjb
xxx xxx haight
xxx xxx sharon
xxx xxx chuck
xxx xxx dsj
xxx xxx bill
xxx xxx god
xxx xxx sys
xxx xxx meh
xxx xxx jon
xxx xxx dan
xxx xxx fox
xxx xxx dale
xxx xxx kab
xxx xxx buz
xxx xxx asc
xxx xxx jas
xxx xxx trt
xxx xxx wsb
xxx xxx dwh
xxx xxx ktf
xxx xxx lr
xxx xxx dlc
xxx xxx dls
xxx xxx jwf
xxx xxx mash
xxx xxx ars
xxx xxx vgl
xxx xxx jfo
xxx xxx rab
xxx xxx pd
xxx xxx jns
xxx xxx spm
xxx xxx rob
xxx xxx egb
xxx xxx hm
xxx xxx mhb
xxx xxx aed
xxx xxx cpb
xxx xxx evp
xxx xxx ber
xxx xxx men
xxx xxx mitch
xxx xxx ast
xxx xxx jfr
xxx xxx lax
xxx xxx nel
xxx xxx blue
xxx xxx jfk
xxx xxx njas
xxx xxx 122sec
xxx xxx ddwar
xxx xxx gopi
xxx xxx jk
xxx xxx learn
xxx xxx low
xxx xxx nac
xxx xxx sidor
xxx xxx
xxx xxx running tcsh [cbm]:/:/bin/tcsh
xxx xxx V Administration:/usr/admin:/bin/sh
xxx xxx Diagnostics:/usr/diags:/bin/csh
xxx xxx
xxx xxx Tools Owner:/bin:/dev/null
xxx xxx
xxx xxx
xxx xxx Activity Owner:/usr/adm:/bin/sh
xxx xxx Files Owner:/usr/adm:/bin/sh
xxx xxx Spooler Owner:/var/spool/lp:/bin/sh
xxx xxx Activity Owner:/auditor:/bin/sh
xxx xxx Database Owner:/dbadmin:/bin/sh
xxx xxx Killian (DO NOT REMOVE):/tmp:
xxx xxx Killian (DO NOT REMOVE):/tmp:
xxx xxx Daemon and Fsdump:/var/rfindd:/bin/sh
xxx xxx Setup:/var/sysadmdesktop/EZsetup:/bin/csh
xxx xxx User:/usr/demos:/bin/csh
xxx xxx User:/usr/tutor:/bin/csh
xxx xxx Space Tour:/usr/people/tour:/bin/csh
xxx xxx Account:/usr/people/guest:/bin/csh
xxx xxx Account:/usr/people/4Dgifts:/bin/csh
xxx xxx nobody uid:/dev/null:/dev/null
xxx xxx no access:/dev/null:/dev/null
xxx xxx nobody uid:/dev/null:/dev/null
xxx xxx Owner:/usr/spool/rje:
xxx xxx change log:/:
xxx xxx distributions:/v/adm/dist:/v/bin/sh
xxx xxx Manual Owner:/:
xxx xxx call log [tom]:/v/adm/log:/v/bin/sh
xxx xxx oot EMpNB8Zp56 0 0 Super-User,,,,,,, / /bin/sh
xxx xxx oottcsh * 0 0 Super-User running tcsh [cbm] / /bin/tcsh
xxx xxx ysadm * 0 0 System V Administration /usr/admin /bin/sh
xxx xxx iag * 0 996 Hardware Diagnostics /usr/diags /bin/csh
xxx xxx aemon * 1 1 daemons / /bin/sh
xxx xxx in * 2 2 System Tools Owner /bin /dev/null
xxx xxx uucp BJnuQbAo 6 10 UUCP.Admin /usr/spool/uucppublic /usr/lib/uucp/uucico
xxx xxx ucp * 3 5 UUCP.Admin /usr/lib/uucp
xxx xxx ys * 4 0 System Activity Owner /usr/adm /bin/sh
xxx xxx adm * 5 3 Accounting Files Owner /usr/adm /bin/sh
xxx xxx lp * 9 9 Print Spooler Owner /var/spool/lp /bin/sh
xxx xxx auditor * 11 0 Audit Activity Owner /auditor /bin/sh
xxx xxx dbadmin * 12 0 Security Database Owner /dbadmin /bin/sh
xxx xxx bootes dcon 50 1 Tom Killian (DO NOT REMOVE) /tmp
xxx xxx cdjuke dcon 51 1 Tom Killian (DO NOT REMOVE) /tmp
xxx xxx rfindd * 66 1 Rfind Daemon and Fsdump /var/rfindd /bin/sh
xxx xxx EZsetup * 992 998 System Setup /var/sysadmdesktop/EZsetup /bin/csh
xxx xxx demos * 993 997 Demonstration User /usr/demos /bin/csh
xxx xxx tutor * 994 997 Tutorial User /usr/tutor /bin/csh
xxx xxx tour * 995 997 IRIS Space Tour /usr/people/tour /bin/csh
xxx xxx guest nfP4/Wpvio/Rw 998 998 Guest Account /usr/people/guest /bin/csh
xxx xxx 4Dgifts 0nWRTZsOMt. 999 998 4Dgifts Account /usr/people/4Dgifts /bin/csh
xxx xxx nobody * 60001 60001 SVR4 nobody uid /dev/null /dev/null
xxx xxx noaccess * 60002 60002 uid no access /dev/null /dev/null
xxx xxx nobody * -2 -2 original nobody uid /dev/null /dev/null
xxx xxx rje * 8 8 RJE Owner /usr/spool/rje
xxx xxx changes * 11 11 system change log /
xxx xxx dist sorry 9999 4 file distributions /v/adm/dist /v/bin/sh
xxx xxx man * 99 995 On-line Manual Owner /
xxx xxx phoneca * 991 991 phone call log [tom] /v/adm/log /v/bin/sh
|
{
"pile_set_name": "Github"
}
| 0.086824 |
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<!-- Mirrored from test.csswg.org/suites/css2.1/20110323/xhtml1/line-height-014.xht by HTTrack Website Copier/3.x [XR&CO'2010], Thu, 05 Apr 2012 10:54:49 GMT -->
<head>
<title>CSS Test: Line-height using points with a minimum plus one value, 1pt</title>
<link rel="author" title="Microsoft" href="http://www.microsoft.com/" />
<link rel="help" href="http://www.w3.org/TR/CSS21/visudet.html#propdef-line-height" />
<link rel="help" href="http://www.w3.org/TR/CSS21/visudet.html#leading" />
<meta name="flags" content="96dpi ahem" />
<meta name="assert" content="The 'line-height' property sets a minimum plus one length value in points." />
<style type="text/css">
</style>
</head>
<body>
<p>Fontsize: 2in</p>
<p style="FONT-SIZE: 2in">xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx</p>
<p>Lineheight: 1in</p>
<p style="line-height: 1in">xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx</p>
<p>Lineheight: 3in</p>
<p style="line-height: 3in">xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx xxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxxxxx xxx xxx xxx xxx xxx xxx xxx xxxxxx xxxxx</p>
</body>
<!-- Mirrored from test.csswg.org/suites/css2.1/20110323/xhtml1/line-height-014.xht by HTTrack Website Copier/3.x [XR&CO'2010], Thu, 05 Apr 2012 10:54:49 GMT -->
</html>
|
{
"pile_set_name": "Github"
}
| 0.066519 |
package com.github.triplet.gradle.androidpublisher.internal
import com.github.triplet.gradle.androidpublisher.EditManager
import com.github.triplet.gradle.androidpublisher.GppAppDetails
import com.github.triplet.gradle.androidpublisher.GppImage
import com.github.triplet.gradle.androidpublisher.GppListing
import com.github.triplet.gradle.androidpublisher.PlayPublisher
import com.github.triplet.gradle.androidpublisher.ReleaseNote
import com.github.triplet.gradle.androidpublisher.ReleaseStatus
import com.github.triplet.gradle.androidpublisher.ResolutionStrategy
import com.google.api.client.googleapis.json.GoogleJsonResponseException
import com.google.api.services.androidpublisher.model.AppDetails
import com.google.api.services.androidpublisher.model.Listing
import org.slf4j.LoggerFactory
import java.io.File
internal class DefaultEditManager(
private val publisher: InternalPlayPublisher,
private val tracks: TrackManager,
private val editId: String
) : EditManager {
override fun getAppDetails(): GppAppDetails {
val details = publisher.getAppDetails(editId)
return GppAppDetails(
details.defaultLanguage,
details.contactEmail,
details.contactPhone,
details.contactWebsite
)
}
override fun getListings(): List<GppListing> {
return publisher.getListings(editId).map {
GppListing(
it.language,
it.fullDescription,
it.shortDescription,
it.title,
it.video
)
}
}
override fun getImages(locale: String, type: String): List<GppImage> {
return publisher.getImages(editId, locale, type).map {
GppImage(it.url + HIGH_RES_IMAGE_REQUEST, it.sha256)
}
}
override fun findMaxAppVersionCode(): Long {
return tracks.findHighestTrack()?.releases.orEmpty()
.flatMap { it.versionCodes.orEmpty() }
.max() ?: 1
}
override fun findLeastStableTrackName(): String? {
return tracks.findHighestTrack()?.track
}
override fun getReleaseNotes(): List<ReleaseNote> {
return tracks.getReleaseNotes().map { (track, notes) ->
notes.map { ReleaseNote(track, it.language, it.text) }
}.flatten()
}
override fun publishAppDetails(
defaultLocale: String?,
contactEmail: String?,
contactPhone: String?,
contactWebsite: String?
) {
publisher.updateDetails(editId, AppDetails().apply {
this.defaultLanguage = defaultLocale
this.contactEmail = contactEmail
this.contactPhone = contactPhone
this.contactWebsite = contactWebsite
})
}
override fun publishListing(
locale: String,
title: String?,
shortDescription: String?,
fullDescription: String?,
video: String?
) {
publisher.updateListing(editId, locale, Listing().apply {
this.title = title
this.shortDescription = shortDescription
this.fullDescription = fullDescription
this.video = video
})
}
override fun publishImages(locale: String, type: String, images: List<File>) {
publisher.deleteImages(editId, locale, type)
for (image in images) {
println("Uploading $locale listing graphic for type '$type': ${image.name}")
// These can't be uploaded in parallel because order matters
publisher.uploadImage(editId, locale, type, image)
}
}
override fun promoteRelease(
promoteTrackName: String,
fromTrackName: String,
releaseStatus: ReleaseStatus?,
releaseName: String?,
releaseNotes: Map<String, String?>?,
userFraction: Double?,
updatePriority: Int?,
retainableArtifacts: List<Long>?
) {
tracks.promote(TrackManager.PromoteConfig(
promoteTrackName,
fromTrackName,
TrackManager.BaseConfig(
releaseStatus,
userFraction,
updatePriority,
releaseNotes,
retainableArtifacts,
releaseName
)
))
}
override fun uploadBundle(
bundleFile: File,
mappingFile: File?,
strategy: ResolutionStrategy,
didPreviousBuildSkipCommit: Boolean,
trackName: String,
releaseStatus: ReleaseStatus?,
releaseName: String?,
releaseNotes: Map<String, String?>?,
userFraction: Double?,
updatePriority: Int?,
retainableArtifacts: List<Long>?
) {
val bundle = try {
publisher.uploadBundle(editId, bundleFile)
} catch (e: GoogleJsonResponseException) {
handleUploadFailures(e, strategy, bundleFile)
} ?: return
uploadMappingFile(bundle.versionCode, mappingFile)
tracks.update(TrackManager.UpdateConfig(
trackName,
listOf(bundle.versionCode.toLong()),
didPreviousBuildSkipCommit,
TrackManager.BaseConfig(
releaseStatus,
userFraction,
updatePriority,
releaseNotes,
retainableArtifacts,
releaseName
)
))
}
override fun uploadApk(
apkFile: File,
mappingFile: File?,
strategy: ResolutionStrategy,
mainObbRetainable: Int?,
patchObbRetainable: Int?
): Long? {
val apk = try {
publisher.uploadApk(editId, apkFile)
} catch (e: GoogleJsonResponseException) {
handleUploadFailures(e, strategy, apkFile)
return null
}
mainObbRetainable?.attachObb("main", apk.versionCode)
patchObbRetainable?.attachObb("patch", apk.versionCode)
uploadMappingFile(apk.versionCode, mappingFile)
return apk.versionCode.toLong()
}
override fun publishApk(
versionCodes: List<Long>,
didPreviousBuildSkipCommit: Boolean,
trackName: String,
releaseStatus: ReleaseStatus?,
releaseName: String?,
releaseNotes: Map<String, String?>?,
userFraction: Double?,
updatePriority: Int?,
retainableArtifacts: List<Long>?
) {
if (versionCodes.isEmpty()) return
tracks.update(TrackManager.UpdateConfig(
trackName,
versionCodes,
didPreviousBuildSkipCommit,
TrackManager.BaseConfig(
releaseStatus,
userFraction,
updatePriority,
releaseNotes,
retainableArtifacts,
releaseName
)
))
}
private fun uploadMappingFile(versionCode: Int, mappingFile: File?) {
if (mappingFile != null && mappingFile.length() > 0) {
publisher.uploadDeobfuscationFile(editId, mappingFile, versionCode)
}
}
private fun Int.attachObb(type: String, versionCode: Int) {
println("Attaching $type OBB ($this) to APK $versionCode")
publisher.attachObb(editId, type, versionCode, this)
}
private fun handleUploadFailures(
e: GoogleJsonResponseException,
strategy: ResolutionStrategy,
artifact: File
): Nothing? = if (
e has "apkNotificationMessageKeyUpgradeVersionConflict" ||
e has "apkUpgradeVersionConflict" ||
e has "apkNoUpgradePath"
) {
when (strategy) {
ResolutionStrategy.AUTO -> throw IllegalStateException(
"Concurrent uploads for app ${publisher.appId} (version code " +
"already used). Make sure to synchronously upload your APKs such " +
"that they don't conflict. If this problem persists, delete your " +
"drafts in the Play Console's artifact library.",
e
)
ResolutionStrategy.FAIL -> throw IllegalStateException(
"Version code is too low or has already been used for app " +
"${publisher.appId}.",
e
)
ResolutionStrategy.IGNORE -> LoggerFactory.getLogger(EditManager::class.java).warn(
"Ignoring artifact ($artifact)")
}
null
} else {
throw e
}
class Factory : EditManager.Factory {
override fun create(publisher: PlayPublisher, editId: String) = DefaultEditManager(
publisher as InternalPlayPublisher,
DefaultTrackManager(publisher, editId),
editId
)
}
private companion object {
const val HIGH_RES_IMAGE_REQUEST = "=h16383" // Max res: 2^14 - 1
}
}
|
{
"pile_set_name": "Github"
}
| 0 |
Sexy BBW Wife gives sloppy BJ and gets cum in her mouth
|
{
"pile_set_name": "OpenWebText2"
}
| 0.054545 |
An old lady in her late 80s doesn't like dissonant music. It's hardly the most astonishing sentence one could write. Many old people probably share her distaste. But when the old lady in her late 80s is Queen Elizabeth II it's the sort of revelation that sparks interest and debate.
That's especially true when the news comes from the man who holds - though only until he steps down in March - the ancient title Master of the Queen's Music. Sir Peter Maxwell Davies - plain Max to the musical world - spills this particular can of royal beans in an interview with the Times today. "It would be foolish not to take on board that the Queen doesn't like dissonant music. She has stated that very plainly," he is reported as saying.
Actually, it's hardly a revelation. It has long been widely inferred - even if not precisely known - that the Queen isn't big on music of any kind at all, so Max's comments that he would be a fool to rub her up the wrong way by composing dissonant music for royal occasions don't change the way we think about the Queen and her hinterland. The truth is that she has never shown any great interest in classical or popular music either.
All this fits with the image that we have of the Queen as essentially an unintellectual person — the image that Alan Bennett so artfully overturned in his book The Uncommon Reader, in which Her Maj suddenly gets an interest in the novel and discovers the world of Ivy Compton-Burnett and Jean Genet. The equivalent would be if she suddenly started turning up unannounced at London Sinfonietta concerts or at the Huddersfield Festival, which as far as I know she never has.
But it would be a mistake to suppose that the Queen is a musical philistine. There's no evidence of that, and she has, from time to time, been exposed to a lot more live music than most people. She may not have fallen in love with what she's heard, but it doesn't necessarily follow that she knows nothing. After all, not all of us have the connection that comes with having someone like Max (and, before him, Malcolm Williamson and Arthur Bliss) whom we appoint to write music for us.
Benjamin Britten was never Master of the QM, but the Queen undoubtedly recognised the stand-out importance in British life of the principal British composer of the postwar era. She is thought to have disliked Britten's Coronation opera Gloriana in 1953 - as many others did too at the time - but it did not deter her from putting the seal of approval on Britten's Aldeburgh festival by opening the Snape Maltings concert hall in 1967 and then returning to reopen it in 1970 after the hall was badly damaged by fire.
The truth, as one would expect from her role in life, is that the Queen is a cultural conservative. So are most of her family, with arguable exceptions like her cousin the Duke of Kent, who is to be seen at chamber music concerts at the Wigmore Hall quite often. Her mother, the Queen Mother, was more musical than her father, and her eldest son, Prince Charles, has Edwardian tastes in music (he made a TV documentary about Hubert Parry) as in most other things. They may not know much about music, but they know what they like and - even more - what they dislike.
|
{
"pile_set_name": "OpenWebText2"
}
| 0 |
Cross Removed from Chapel at Afghanistan Base
Cross Removed from Chapel at Afghanistan Base
A large cross outside a chapel at Camp Marmal, an isolated base in northern Afghanistan, was taken down, prompting outrage from some American troops stationed there, POLITICO reports. When asked what had happened to the cross, the base chaplain said simply, "I had to take it down." Pentagon spokesman Commander William Speaks said the removal was "in accordance with Army regulations" since the Army chaplain manual prohibits permanent display of religious symbols. However, service members said they found great comfort in the chapel and the cross outside. "Not having it there is really upsetting," one said. "Seeing the cross [was] a daily reminder of my faith." Two soldiers said the removal was an attack on Christianity, and noted that there had been no complaints from Muslims -- there are two mosques on the base -- or Jews, who conducted a service in the chapel without objection. "We would just like to know where the line is," an Army serviceman said. "The chaplains wear different religious symbols on their uniforms depending on which religion they are. Is that the next thing to be targeted?"
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
BBC News fuck her right in the pussy
|
{
"pile_set_name": "OpenWebText2"
}
| 0.055556 |
Cancerous ovarian stem cells: obscure targets for therapy but relevant to chemoresistance.
Chemotherapy with platinum and taxanes is the first line of treatment for all epithelial ovarian cancer (EOC) patients after debulking surgery. Even though the treatment is initially effective in 80% of patients, recurrent cancer is inevitable in the vast majority of cases. Emerging evidence suggests that some tumor cells can survive chemotherapy by activating the self-renewal pathways resulting in tumor progression and clinical recurrence. These defined population of cells commonly termed as "cancer stem cells" (CSC) may generate the bulk of the tumor by using differentiating pathways. These cells have been shown to be resistant to chemotherapy and, to have enhanced tumor initiating abilities, suggesting CSCs as potential targets for treatment. Recent studies have introduced a new paradigm in ovarian carcinogenesis which proposes in situ carcinoma at the fimbrial end of the fallopian tube to generate high-grade serous ovarian carcinomas, in contrast to ovarian cortical inclusion cysts (CIC) which produce borderline and low grade serous, mucinous, endometrioid, and clear cell carcinomas. This review summarizes recent advances in our understanding of the cellular origin of EOC and the molecular mechanisms defining the basis of CSC in EOC progression and chemoresistance. Using a model ovarian cancer cell line, we highlight the role of CSC in response to chemotherapy, and relate how CSCs may impact on chemoresistance and ultimately recurrence. We also propose the molecular targeting of CSCs and suggest ways that may improve the efficacy of current chemotherapeutic regimens needed for the management of this disease.
|
{
"pile_set_name": "PubMed Abstracts"
}
| 0 |
Dalny Marga W Sunglasses Get North Anal Milf Troia Culo Takes Hard Cock In The Ass All The Way Tits
|
{
"pile_set_name": "OpenWebText2"
}
| 0.050505 |
lucky fuck
|
{
"pile_set_name": "Enron Emails"
}
| 0.1 |
Webcam Slut Pumps her Pussy then Fucks it with a Huge Dildo
|
{
"pile_set_name": "OpenWebText2"
}
| 0.050847 |
---
abstract: 'During recent collaboration with colleagues to revise our institution’s general-education curriculum, I encountered many perceptions of what we mean by [*the Natural Sciences*]{}. I was surprised to find that perceptions of scientific pedagogy varied significantly among the scientific disciplines, especially concerning issues of philosophy of science and epistemology, manifested in the approaches to teaching theoretical concepts and their development. These realizations suggest that Physics occupies a singular role in college curricula, introducing students, even at the introductory level, to the acquisition of knowledge by theoretical means and the assessment of theory based on experimental evidence.'
author:
- 'M.E. McCracken'
bibliography:
- 'note.bib'
title: ' [**The Two Subcultures: The teaching of theory and Physics’ place in the college curriculum** ]{} '
---
|
{
"pile_set_name": "ArXiv"
}
| 0 |
Fundraising Through Facebook
Friends and Family Grant Patient's Birthday Wish through Facebook
Just over two weeks before his 51st birthday, Stuart Berwick received a message from Facebook Causes: “Your birthday is coming up. Why not celebrate by asking your friends and family to support a cause that’s important to you and create a Facebook Birthday Wish?” Within minutes Stu had set up his Facebook Birthday Wish, set a fundraising goal, and sent his first (of many) messages to family and friends about this fun and unique way to say “Happy Birthday!”
Facebook Causes
Facebook Causes is an application that helps individuals leverage their social network to effect positive change. Any Facebook user can create a cause, recruit their friends to that cause, keep everyone who supports the cause up-to-date on issues and, last but not least, raise money directly through the cause to support a registered U.S. 501(c)(3) nonprofit or Canadian registered charity.
Stu became an active participant in PHA’s Facebook Cause in January 2010. Up until then, he had primarily used Facebook for fun, games and limited socializing. “I realized I had wasted a year,” Stu says, and from that moment forward he pledged to himself to find every single PH patient on Facebook.
As Stu made more contacts on Facebook, he built his network of PH Facebook friends, which in turn helped him find more and more PHers all across the world. “My ultimate goal,” Stu says, “is to become the clearing-house for PH information on Facebook.” At this point, Stu is so well-known in the PH Facebook community that he no longer has to seek out patients — they find him through his many PH-related activities on Facebook, such as his Facebook Causes activities.
Stu's Birthday Wish
Stu originally set a modest $250 goal for his Facebook Birthday Wish. And, thanks to generous donations from family, friends and his many online PH friends, Stu exceeded his original goal in just a week. But Stu didn’t stop there. He continued to send messages to everyone he knew — those who used Facebook and those who didn’t — asking them to make a donation to PHA in honor of his birthday. By the close of his Facebook Birthday Wish, Stu had raised $410 for PHA from 12 donors. “There is nothing anyone could buy me that equals their making a gift to PHA,” Stu says. “Not even close.”
Stu’s campaign wasn’t without its challenges. For 10 days during his Birthday Wish, he experienced technology problems at home and was without Internet access. “I’m going to do so much better next time,” Stu says. “My Internet issues have been resolved, and now my Facebook network is so much larger. Who knows how much I’ll be able to raise!”
Other Ways to Raise Funds with Family and Friends
Facebook isn’t the only way you can ask friends and family to support a cause so important to you. PHA has two programs that are similar to Facebook Birthday Wishes: Web of Friends, which gives you a personal fundraising page where you can share your PH story and ask others for donations to PHA, and In Honor of Our Lives, a special program for incorporating PH fundraising in personal milestone celebrations.
To learn more about Facebook Birthday Wishes, Web of Friends, In Honor of Our Lives or the many other ways you can help raise funds for PH research and patient and family services, contact Maggie Bahrmasel at Giving@PHAssociation.org or call 301-565-3004 x756.
The information provided on the PHA website is provided for general information only. It is not intended as legal, medical or other professional advice, and should not be relied upon as a substitute for consultations with qualified professionals who are familiar with your individual needs.
|
{
"pile_set_name": "Pile-CC"
}
| 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.