text stringlengths 8 5.77M |
|---|
Background
==========
Diabetes mellitus is a chronic disease affecting 8.3% of the US population, with this percentage sharply increasing for older adults (15-20%) and often leading to serious medical complications and high healthcare costs \[[@B1]\]. Patients with diabetes are at increased risk for depression, compounding the burden of disease \[[@B2]\]. When comorbid with diabetes, depression leads to poorer health outcomes and often complicates diabetes self-management \[[@B2]-[@B5]\]. Although multidisciplinary treatments for diabetes and depression are possible, access to such care is highly limited, especially for rural-dwelling older individuals \[[@B6],[@B7]\]. It is far more common for patients with complex diabetes and depression to receive inadequate or uncoordinated treatment for these conditions \[[@B8]-[@B10]\].
Prior clinical trials for diabetes and depression suggest limited reach and modest effectiveness. Intensive programs involving depression medications and behavioral counseling (stepped care management, collaborative care) improve clinically significant depressive symptoms and quality of life in primary care patients with depression but not diabetes self-management or clinical outcomes \[[@B11]\]. Coordinated and stepped care interventions for comorbid cases appear to neglect diabetes care by relying on intervention models specific to depression management and directing intervention practices primarily toward depressive symptoms without translation to diabetes self-care \[[@B12],[@B13]\]. A few studies currently under way utilize cognitive behavioral therapy, but these are again focused on either depression \[[@B14]\] or diabetes self-care \[[@B15]\] and not on behavior change techniques that can be applied to both conditions. Thus, behavioral strategies that activate patients to perform health behaviors for both diabetes and depression hold the potential to improve both the emotional and physical health difficulties of these medically complex patients*.*
The current study used a small open trial format to examine the acceptability, feasibility and preliminary outcomes of a telephone-delivered behavioral coaching intervention for rural-dwelling older adults with uncontrolled diabetes and comorbid, clinically significant depressive symptoms. The intervention used a flexible patient-centered approach to treatment, targeting physical and emotional health issues simultaneously.
Methods
=======
Procedure
---------
All procedures for the HOPE trial were approved by the Baylor College of Medicine Institutional Review Board (IRB) and the Michael E. DeBakey Veterans Affairs (VA) Medical Center Office of Research and Development, Houston, TX.
### Participants
HOPE recruitment sought to engage rural-living older adults with uncontrolled diabetes and comorbid, clinically elevated depressive symptoms. Data from a VA patient registry was extracted to identify rural-dwelling individuals with uncontrolled type 2 diabetes mellitus, as indicated by average glycated hemoglobin (HbA1c) of 7.5 or greater and no single HbA1c marker below 7.0 over the past year. Individuals who met these inclusionary criteria were mailed an opt-out letter describing the HOPE Program. One week after the mail-out, a member of the project team called potential participants to ascertain their interest in participating. Interested individuals completed a short screening assessment, including a six-item cognitive screener, a three-item mental health screener, and the Patient Health Questionnaire-2 (PHQ-2), a validated, short version of the PHQ-9, used to screen for depressive symptoms \[[@B16]\]. A binder with detailed study information, including informed consent and print-based aids for telephone assessments, was sent to each person who met initial screening criteria. A project team member then called qualifying patients to review consent materials and obtain audio-taped consent prior to conducting a baseline assessment interview, which included a demographic questionnaire and the PHQ-9. Patients satisfying baseline depression screening requirements (i.e., PHQ-9 score of 10 or greater) were enrolled in the HOPE program, administered the remaining baseline assessment measures, scheduled for lab work (i.e., HbA1~C~ test) at their local primary care site, and mailed a HOPE program intervention workbook.
### Intervention
The HOPE intervention consisted of ten 30--45 minute sessions delivered by telephone over a 12-week period. The overall objective of HOPE was to assist participants to improve their ability to self-manage their physical and emotional health. HOPE coaches (described below) sought to assist participants to prioritize their self-care needs, and to identify and resolve barriers to effective self-care. Participants learned and practiced skills that would help them reach the goals and action plans they set for themselves to improve their self-care \[[@B17]\]. While prior clinical interventions have targeted either physical or emotional issues, HOPE extends these efforts by addressing both dimensions simultaneously \[[@B18]\].
HOPE uses a structured patient workbook to guide participants and coaches. The workbook, modeled using prior work from this group \[[@B19],[@B20]\] used a module-based approach where participants and coaches selected treatment goals and self-management skills that met the individual needs of the patient. The workbook was structured to facilitate behavioral change through collaborative goal-setting and action planning across physical and emotional health domains. It was ideographic by nature, allowing coaches to use structured information presented in physical and emotional health modules to stimulate conversation around issues of personal salience to patients, to educate patients on these issues and to build skills necessary to practice goals and action plans. Goal-setting and action planning components (e.g., worksheets to stimulate collaborative construction of high-quality goals and action plans) were incorporated throughout physical and emotional heath modules. These components were previously employed in a randomized clinical trial demonstrating that collaborative goal-setting in group diabetes clinics is associated with improved diabetes control \[[@B20]\]. In the HOPE intervention, collaborative goal setting and action planning reflected an iterative process whereby coaches assisted patients to set personally meaningful goals and action plans to meet their goals. Coaches continuously assessed goal attainment with patients, focusing on barriers and collaborative problem-solving to negate these barriers.
The coaching model for the HOPE Program was based on the 5 *A*s Model for coping with chronic illness \[[@B21],[@B22]\]. Guided by the 5 *A*s (i.e., Assess, Advise, Agree, Assist, Arrange), intervention coaches assisted participants in selecting and refining physical and emotional health goals and in developing action plans to meet their goals.
HOPE sessions and modules
-------------------------
Table [1](#T1){ref-type="table"} describes the content of session modules and the overall intervention structure by session. HOPE was structured around core concepts but also included a modular component that allowed coaches and patients to focus on physical and mental health difficulties of personal salience to the participant. The goal of this modular-based approach was to advance patient involvement and empowerment through active participation in the treatment process.
######
HOPE intervention session structure and module content
**Session\#** **Week** **Session Content** **Session Goals**
------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------- ------------------------------------------------------------ -----------------------------------------------------------------------------------------------------------
**Core Sessions**
**Session 1** **1** **Getting to Know HOPE and Your Coach**
·General introduction to the HOPE Program ·To build rapport between participant/coach
·Outline of program structure and module content ·To encourage open discussion
·Definition of roles/expectations of participant and coach are defined ·To customize a program to participants' needs
**Session 2** **2** **Setting Goals and Making Action Plans**
· Introduction to the concept of goal setting and action planning · For participant to have a foundational understanding of goal setting/action planning
· 3 rules to follow in developing a high-quality goal · To make first attempt at setting a high -quality goal
· Action Plan Checklist
**Elective Sessions**
**Module A: Managing Your Medications**
· Knowing Your Medications · For participant to better understand medication outcomes (benefits vs. side-effects)
· Choosing the Right Medication for You · To build skill: improve communication with PCP/healthcare team
· Keeping a Schedule for Taking Your Medications · To set/adjust a medication-adherence goal
**Module B: Using Thoughts to Improve Wellness**
· Recognizing How Thoughts Affect Mood and Behaviors · For participant to understand the impact thoughts have on feelings and actions
· Using Coping Statements to Improve Wellness · To build skill: coping, alternative thinking
· Increasing Positive Thinking/Decreasing Negative Thinking · To set/adjust a goal for practicing thought- monitoring strategies
**Module C: Eating a Healthy Diet**
· Controlling Carbohydrate Intake · To improve participant's knowledge of nutrition and dietary recommendations
· Increasing Fruit And Vegetable Intake · To build skill: balanced food-group servings, portion control, healthy food substitutions
· Reducing Unhealthy Fat Intake
· Limiting Portion Sizes · To set/adjust a healthy diet goal
***Sessions 3-8*** ***3-8*** **Module D: Increasing Pleasant Activities**
· Recognizing How Behaviors Affect Thoughts and Moods · For participant to understand the impact actions can have on thoughts and feelings
· Identifying Meaningful Activities · To build skill: resuming or beginning new activities of interest
· Engaging In Pleasant Activities and Being Active · To set/adjust a behavioral activation goal
**Module E: Getting Fit**
· Improving Endurance Through Cardiovascular Exercise · To educate participant about recommended exercise guidelines
· Improving Flexibility Through Stretching
· Improving Strength and Muscle Tone Through Strength Training · To set/adjust a fitness goal, considering participant's physical limitations
***Module F: Learning How to Relax***
· Understanding What Stress, Worry, and Anxiety Are · To identify stressors that impact health
· How to Use Deep Breathing to Reduce Stress and Tension · To build skill: practicing deep breathing and/or imagery exercises
· How to Use Imagery to Reduce Stress and Tension · To set/adjust a goal for incorporating relaxation techniques into participant's daily routine
***Follow-Up Sessions***
***Session 9*** ***10*** ***Adjusting Your Action Plans and Overcoming Obstacles***
· Review all previous goals and assess goal progress · For participant to reflect on accomplishments realized through the HOPE Program
· Discussion of remaining barriers/obstacles to goal success and identification of strategies for overcoming them · To build skill: overcoming barriers/obstacles
· To make final adjustments to Action Plans
***Session 10*** ***12*** ***Managing Your Resources and Final Discussions***
· Final discussions: · For participant to reflect on diabetes-care skills acquired in HOPE
· Diabetes ABCs · To prepare participant to continue goal development on his/her own, following HOPE
· Resources/support system · For participant to be satisfied with program outcomes and committed to achieving long-term health goals
· Monitoring Action Plans/tracking goal progress
· Closing remarks
### Core sessions (sessions 1 and 2)
The first two HOPE sessions educated participants about the importance of holistic diabetes self-care, emphasizing both physical health monitoring and emotional well-being as complementary dimensions of maintaining overall health. Session 1 introduced participants to the HOPE intervention and focused on rapport building by assessing feelings about diabetes and physical and emotional health challenges. In Session 2, participants learned the principles of effective goal setting and action planning and begun to apply these theoretical principles to their own situations.
### Elective sessions (sessions 3 to 8)
HOPE provided participants with the flexibility and autonomy to select from six elective physical and emotional health modules. Elective modules included: Managing Your Medications, Using Thoughts to Improve Wellness, Eating a Healthy Diet, Increasing Pleasant Activities, Getting Fit, and Learning How to Relax (*see* Table [1](#T1){ref-type="table"}). Each module incorporated skill-building techniques, didactic learning, and interactive exercises designed to facilitate goal setting and action planning. Participants chose the order in which modules were discussed, based on their preferences and self-care needs. Participants could spend two or more sessions focused on a particular module, either to build on a successful attempt at implementing an action plan, or to revise an action plan he/she was unable to practice because of unforeseen obstacles.
### Follow-up sessions (sessions 9 and 10)
In Session 9, coach/participant dyads reviewed all goals developed in prior sessions and made final action-plan adjustments, as necessary. Session 10 focused on maintaining changes post-treatment.
HOPE coaches (providers)
------------------------
Given the limited availability of mental health providers in the current medical care environment, HOPE sought to demonstrate the appropriateness of using non-expert mental health coaches. Coaches were recruited from a variety of disciplines and training levels including a clinical psychology graduate intern, a developmental psychology postdoctoral fellow, a doctoral student in public health, and a post-bachelors psychology student. A large body of literature supports the role of paraprofessionals, community health workers, and peers in the delivery of self-management coaching \[[@B23]-[@B25]\]. While none of the coaches in the current study had focused training in diabetes care, and only one coach (psychology intern) had experience treating depression, all coaches received structured training and follow-up assessment by qualified clinicians.
Coaches also interfaced with primary care providers and the broader clinical care setting using the VA's electronic medical records (EMR) system. Coaches accessed clinical patient information from the EMR to review past medical history and identify ongoing treatment plans from the primary care team in order to set coordinated clinical care goals and action plans that enabled the established treatment plan. Coaches then used standardized note templates to inform PCPs about their patients' goals and action plans. Additionally, coaches encouraged patients to communicate any further concerns to their PCPs by assisting them to set goals and action plans around doctor-patient communication. In essence, HOPE coaches functioned as clinician-extenders rather than an alternative or auxiliary provider.
Intervention fidelity
---------------------
Coaches were trained and provided with ongoing support for the intervention, structured around the HOPE workbook and larger intervention materials. All coaches received initial and ongoing training (and monitoring of cases) in the HOPE procedures via weekly group and individual supervision lead by the intervention's dual principal investigators, a medical geriatrician (Naik) proficient in primary care of diabetes and a licensed clinical psychologist (Cully) who specializes in treatment of mental disorders and comorbid chronic disease. During supervision meetings, coaches would review patients' progress and address challenges related to intervention concepts and use. Coaches also learned from their peers through discussion of issues that commonly emerged across patients (e.g., reluctance to address medication management), including the generation of potential solutions that could be used in subsequent sessions.
In accordance with standardized clinical and research protocols, coaches were specifically trained to respond to crisis situations should a patient present with suicidal ideation/intent or notable decompensation in their physical or emotional health. A suicide protocol approved by the IRB included steps to be followed by a coach should a patient report suicidal ideation or other clinical crisis information. This protocol included a cascade list of licensed mental health and medical providers to be contacted immediately by the coach in the event of a high-risk situation. Licensed providers with hospital privileges would follow up by calling the patient, assessing their emotional and physical health needs, and responding with appropriate care recommendations.
Measures
--------
All study measures were collected by a trained interviewer who remained blind to the intervention practices of the open trial.
### Glycated Hemoglobin (HbA1c)
HbA1c is a form of hemoglobin measured in lab testing to evaluate an individual's average percentage of blood glucose concentration over a 3-month period. HbA1C is the gold standard for evaluation of diabetes control, as defined by The American Diabetes Association's recommendation of HbA1c of 7% or less \[[@B26]\].
### Depression
The PHQ-9 is a well-validated assessment of depressive-symptom severity and is widely used within the VA \[[@B26]\]. Test-retest reliability of this measure demonstrates its diagnostic utility and capacity to measure significant change (sensitivity to change) in clinical settings \[[@B27],[@B28]\]. Nine items determine the presence and degree of all *Diagnostic and Statistical Manual, Fourth Edition* criteria on a Likert-type scale, ranging from 0 ("not at all") to 3 ("nearly every day"). Total scores≥ 10 represent clinically significant depressive symptoms and inter-test score differences≥ 5 suggest clinically significant change \[[@B27],[@B28]\].
### Diabetes distress
The Problem Areas in Diabetes Scale (PAID) was used to assess diabetes-specific emotional distress \[[@B29],[@B30]\]. This 20-item scale measures the extent to which living with and managing diabetes contributes to feelings of emotional burden (e.g., guilt, frustration, anger, depression). Response options range from 0 ("not a problem") to 4 ("serious problem"). Scores are transformed on a scale from 0 to 100, with higher scores reflecting greater distress. Prior research suggests that a score of 50 or greater indicates clinically significant diabetes-related distress \[[@B31]\].
Results
=======
Eight patients with a mean age of 62 years (range=58--67) were enrolled in the program. Following enrollment, an intervention coach was assigned. Intervention coaches called their assigned participants within 5 days of mailing the participant workbook to schedule their first HOPE session.
The following results section will present clinical outcome data from the HOPE trial followed by three case study reports that provide additional information about salient intervention concepts. All participant names have been changed.
Quantitative data
-----------------
Eight older individuals enrolled in HOPE, seven of whom completed the program (one did not proceed beyond session 1 because of an unrelated hospital admission). Enrolled participants were, on average, 62 years of age (range 58--67), had been living with diabetes for over 17 years, and lived over 30 miles from their primary care provider (PCP). Over 70% of the participants had received mental health treatment in the past, and over 85% were receiving insulin therapy. Table [2](#T2){ref-type="table"} contains a full listing of participant demographic characteristics. Clinical outcome data from this trial, including HbA1c, PHQ-9, and diabetes distress scores pre- and post-treatment, can be found in Table [3](#T3){ref-type="table"}. Effect sizes using Cohen\'s d (with pooled standard deviations) were found for HbA1c at post-treatment (*d=*0.36) and 6-month follow-up (*d=*0.28); PHQ-9 at post-treatment (*d=*1.48) and 6-month follow-up (*d=*1.69); and PAID at post-treatment (*d=*1.50) and 6-month follow-up (*d=*1.06).
######
Baseline characteristics of the study population
***Characteristics*** ***Value***
---------------------------------------------- --------------------
***Age in years,****M (SD)* 62.1 (2.85)
***White race,****n (%)* 4 (57)
***Male gender,****n (%)* 6 (86)
***Body mass index (BMI),****M (SD)* 34.1 (6.47)
***Years living with diabetes,****M (SD)* 17.4 (7.39)
***Distance to PCP (in miles),****M (SD), R* 33.6 (17.6), 15-70
***Prior mental health treatment,****n (%)* 5 (71)
***Receiving depression treatment,****n (%)* 4 (57)
***Receiving insulin therapy,****n (%)* 6 (86)
*M* Mean, *SD* Standard Deviation, *R* Range, *n* number of participants, *PCP* Primary Care Provider.
######
Clinical outcome data for the HOPE Pilot study cohort
***Data-Collection Timeframe*** ***Outcome Measures***
----------------------------------------------- ------------------------ ------------- -------------
***Baseline, M (SD)*** 9.73 (2.62) 14.6 (2.99) 46.8 (6.29)
***3-month, M (SD)*** 8.60 (3.56) 9.43 (3.91) 28.9 (15.6)
***Change from baseline to 3-month, M (SD)*** 1.13 (1.70) 5.14 (2.27) 17.7 (10.7)
***Effect Size, Cohen's d*** 0.36 1.48 1.50
***6-month, M (SD)*** 8.89 (3.35) 7.57 (5.03) 26.9 (25.9)
***Change from baseline to 6-month, M (SD)*** 0.84 (1.62) 7.03 (4.43) 20.4 (20.7)
***Effect Size, Cohen's d*** 0.28 1.69 1.06
*M* mean, *SD* standard deviation, *R* range;
Effect sizes measured using Cohen's *d* (0.8=large effect, 0.5=medium effect, 0.2=small effect).
*Baseline=*readings at baseline assessment;
*3-month=*readings at 3-month follow-up assessment;
*6-month=*readings at 6-month follow-up assessment.
*HbA1c* hemoglobin A1c; Lower HbA1c is consistent with better diabetes control.
*PHQ-9* Patient Health Questionnaire-9; Higher total PHQ-9 scores indicate elevated depressive symptoms.
*PAID* Problem Areas In Diabetes scale; Higher total PAID scores represent greater diabetes related distress.
Upon completion of the coaching sessions, exit interviews were conducted with each participant, rating items on a 5-point Likert scale (0=not at all, 5=very helpful). On average, participants' responses to the following items suggested strong acceptability of the HOPE program: "Overall, how would you say the HOPE program was in improving your quality of life?" (*M=*4.5, *SD=*0.756); "Overall, how would you say the HOPE program was in helping you to learn to manage your diabetes?" (*M=*4.625, *SD=*0.744); "Overall, how would you say the HOPE program was in helping you to manage stress, anxiety, and depression?" (*M=*3.375, *SD=*1.506); and "Overall, how confident are you that you will continue to use the skills in the future?" (*M=*4.5, *SD=*0.535, where 5=very confident).
Qualitative data (case study reports)
-------------------------------------
The narratives below introduce HOPE patients and illustrate coaches' use of the 5 *A*s model of coping within a chronic illness framework including focused intervention efforts related to goal setting and action planning.
### Case 1: Brian
**Case 1: Brian, age 63.** Brian, a retired Veteran, reported high diabetes interference in his daily life at baseline interview. His HbA1c, which ranged from 8.9 to 11.3 over the last year (*M=*10.9, *SD=*1.19), was 11.2 at baseline. He was also morbidly obese, suffered from sleep apnea, and had been diagnosed with Major Depressive Disorder, exemplified by his PHQ-9 baseline score of 13. He acknowledged that his diet was poor and that he had limited diabetes knowledge. Brian was admittedly doubtful at the start of the intervention of HOPE's potential efficacy in producing positive health outcomes.
After [assessing]{.ul} Brian's diabetes knowledge and concerns about the HOPE Program, his coach [advised]{.ul} him on goal-setting. Acknowledging his unstable HbA1c markers, Brian [agreed]{.ul} to set multiple diet goals, including controlling meal portion sizes, increasing fruit and vegetable intake, reducing carbohydrate intake, and keeping a food log to monitor this goal for the duration of the program. Brian was initially skeptical about the process; however, as he began successfully reaching goal-setting milestones, he became increasingly engaged in the program. Brian experienced significant goal attainment, consistently increasing the scope of his goals as he progressed, and later adding fitness and medication-adherence goals. His coach [assisted]{.ul} him in improving communication with his wife and increasing his diabetes care self-efficacy, [arranging]{.ul} a self-monitoring plan to help maintain future success and communication action plans with his PCP to help manage mild hypoglycemia symptoms with improved control. Brian realized a marked drop in HbA1c from 11.2 at baseline to 7.2 at 6-month follow- up, and a reduction in diabetes distress (PAID score improved 3.75 at 6-month follow-up). Though his depression score at baseline (13) showed clinically significant improvement at 3-month follow-up, his depressive symptoms at 6-month follow-up returned to baseline functioning, suggesting the need for additional depression intervention.
### Case 2: Laura
**Case 2: Laura, age 59** Laura was a disabled Veteran, divorced, and living alone. She entered the HOPE program with severely high HbA1c at baseline (14.8), shown to be consistent over the past year (*M=*13.5, *SD=*2.15). She disclosed that daily diabetes monitoring limited her physical activity, causing stress and anxiety. In addition, she suffered from multiple comorbidities, including Major Depressive Disorder (demonstrated by her high baseline PHQ-9 score of 19), post- traumatic stress disorder, and asthma. Prescribed an extensive list of medications, she admitted to having trouble adhering to her complicated regimen because of side-effects, financial limitations, and scheduling conflicts.
During her initial session, Laura expressed optimism for the potential outcomes of HOPE, despite some initial resistance to participate because of failures experienced in a prior diabetes education program. On the basis of Laura's extremely high diabetes numbers, her coach [advised]{.ul} her to take immediate steps to alter lifestyle choices; she [agreed]{.ul} to begin walking for 30 minutes daily, planning to increase scope and potency of this goal as she progressed. She also committed to stop eating fast food and began packing healthy snacks to carry throughout her day. However, after completing her fourth session, she experienced a stressful life event that caused her to disengage from HOPE, and she began missing and/or rescheduling coaching sessions. Given the significant barriers to goal attainment, Laura and her coach decided not to attempt any new goals. Her coach attempted to [assist]{.ul} her to overcome barriers to her initial goals. They used the remaining interactions to [arrange]{.ul} a prolonged monitoring plan and, although Laura verbally maintained commitment to finish the program, she eventually completed only five sessions. Though she reported improvements in diabetes distress at 3-month follow-up (PAID score improved by 30) and depression at 3-month follow-up (PHQ-9 score had significant improvement of 6 points), her HbA1c did not improve (increase from 14.8 at baseline to 16.1 at 6-month follow-up). By the conclusion of the pilot, her PCP had ordered a more aggressive medical intervention; yet she maintained her positive improvements related to depressive symptoms and diabetes distress.
### Case 3: Daniel
**Case 3: Daniel, age 62** Daniel was a disabled Veteran, divorced, and living alone at the time of treatment initiation. At baseline, he reported feeling stuck in daily routines (e.g. poor diet, lack of exercise) that he considered unhealthy. He also reported problems falling and staying asleep, which interfered with the daytime activities necessary to effectively manage his diabetes. His moderately high baseline markers for HbA1c (8.8) and PHQ-9 (14) were likely a result of these factors. He felt a great deal of stress and worry over potential complications of his condition, especially because several of his family members had experienced diabetes-related complications. Additionally, he found social situations that involved eating to be difficult, given his dietary restrictions, and admitted to occasional interpersonal difficulties caused by low frustration tolerance and poor stress management.
In [assessing]{.ul} Daniel, his coach recognized lifestyle problems common to uncontrolled diabetes and [advised]{.ul} that simple lifestyle modifications would make a big difference in overall well-being. The dyad [agreed]{.ul} to begin with a fitness goal of walking ¼ mile 5--6 days per week, which Daniel successfully increased to 1 mile as he progressed through the program. In addition to addressing physical goal barriers, such as pain from a leg injury that caused sleep problems, Daniel's coach [assisted]{.ul} him by helping him identify emotional concerns that could impede goal attainment. Daniel became open to practicing relaxation techniques during coaching sessions and established a goal to incorporate them in his daily life. In [arranging]{.ul} for prolonged goal maintenance, his coach emphasized the need to identify barriers to his goals and encouraged him to share his diabetes experiences with others to help improve his social connections. At the conclusion of the treatment, Daniel realized notable 6-month changes, including moderate yet clinically significant improvement in HbA1c (drop of 0.9 from baseline) and marked reductions in depression (PHQ-9 score improved 14 points) and diabetes distress (PAID score improved 37.5 points).
Discussion
==========
The HOPE program is a structured, theory-driven psychosocial intervention that uses telephone-based behavioral health coaching to promote lifestyle changes for improved diabetes control and reduced depressive symptoms in older rural-dwelling patients. Initial data from the HOPE program suggest that the multifaceted intervention, as designed, may generate positive outcomes for both physical and emotional aspects of diabetes self-care. Patient-level data and qualitative interviews post-treatment suggest that patients responded positively to the collaborative goal setting and action-planning process. Prior diabetes and depression interventions have typically shown positive outcomes for either diabetes or depression markers, but not both \[[@B32]-[@B39]\]. Under these more narrowed aims, structured behavioral intervention strategies have been demonstrated to be more effective at improving glycemic control than traditional diabetes education programs in patients with diabetes for at least two years \[[@B40]\]. In contrast, the HOPE program demonstrated an ability to cultivate positive outcomes across all clinically relevant measures, including diabetes-related distress, in a group of medically complex patients with an average diabetes duration of 17 years. Changes in clinical outcomes may be related to reductions in diabetes-related distress, measured by the validated PAID instrument \[[@B41]\]. These findings, derived through the application of a simple telephone-based protocol delivered by non-expert coaches, extend the results seen in more resource-intensive interventions targeting diabetes and depression \[[@B42]\].
Common among the HOPE pilot cohort was the initial selection of more traditional diabetes lifestyle goals (e.g. diet and exercise), rather than emotional health goals. On the whole, participants were initially reluctant to discuss topics related to emotional well-being, possibly because they did not want to appear vulnerable, or due to lack of awareness and understanding of a potential connection to self-management and physical health. Those participants who did engage around affective goals were usually encouraged to do so by their coaches when they encountered goal barriers that could not be overcome through physical health changes alone. It may have been this private individualized attention from coaches and the built-in process of building rapport that eventually encouraged goal-setting around emotional health issues. Prior research has shown individual education to be superior over group education and usual care in reducing HbA1c, further supporting this notion \[[@B43]\]. Importantly, outcome data from the trial suggest that, although emotional health concerns were not always addressed overtly, especially at the onset of treatment, depressive symptoms may be reduced, as evidenced by the 6-month effect size for PHQ-9 scores (*d=*1.70).
Participants were also generally hesitant to discuss their diabetes medication regimens including associated side-effects, unless hypoglycemia-related issues arose during the program. If this happened, coaches helped participants to identify and monitor hypoglycemia-related events and construct action plans with PCPs to address this potentially dangerous side-effect. Thus, the HOPE program may be an effective method of addressing hypoglycemia-related events that arise during diabetes interventions.
The pilot cohort completion rate indicated high patient acceptability and satisfaction with the HOPE intervention. HOPE holds the potential to be implemented in clinical practice and the use of non-experts as coaches may reduce potential \"translational\" difficulties including limited mental health provider availability and other time and resource limitations common to the use of behavioral change interventions. HOPE may be especially suitable for older adults with multiple chronic conditions. The telephone-based nature of the program increases access to care for vulnerable rural-dwelling individuals who may be unable or unwilling to travel to and from a central treatment site due to functional limitations or a lack of social support \[[@B44]\]. Importantly, HOPE was structured to support and sustain aging in place initiatives that promote independent living among older adults. The HOPE protocol also fosters self-efficacy with chronic self-management by encouraging, supporting, and providing practice for participants to engage in proactive coping and skill development efforts that initiate and sustain behavioral change. Coping skills prevent and alleviate stress allowing older adults to preserve resources that are susceptible to aging-related losses and declines \[[@B45]\]. Previous research also highlights the importance of perceived control as a key component of successful aging \[[@B46],[@B47]\]. Our study corroborates previous research \[[@B48]\] suggesting that middle-aged and older adults can learn, integrate, and practice proactive coping skills. Using these skills, it appears that the rural-dwelling adults in our study were able to take charge of their own health and better position themselves for future health challenges.
Limitations and future research
-------------------------------
A number of limitations in the present study should be acknowledged. While participants in the HOPE trial realized notable positive clinical changes, the small sample size and lack of control group limit the generalizability and interpretation of study clinical outcomes. Although effect sizes were maintained at 6-months, time constraints to complete the pilot did not allow for longer-term follow-up sessions to promote maintenance of goal attainment. A larger trial could allow for a more comprehensive examination of the HOPE intervention using a larger sample size, intervention control group, and lengthier follow-up to evaluate long-term self-management behaviors.
It is important to note that the age cohort (range=58--67) of our pilot participants may have led to greater intervention acceptability and better clinical outcomes than would be realized with an older age group. However, due to the complexity and severity of conditions experienced by this cohort at baseline, our results show promise for the potential of clinical improvements in others treated within the HOPE program.
Lastly, we did not seek direct PCP engagement in the treatment process, although coaches did communicate goal progress through passive notes in patients' electronic medical records and were aware of PCPs' treatment plans as documented in medical records. Increased interface with participants' PCPs above the standard chart notes could increase provider engagement and may have helped guide tailored intervention plans for each patient potentially further personalizing treatment. We acknowledge there are potential difficulties inherent in engaging clinicians, particularly clinician availability and willingness to participate. Future work should focus on developing a system that would further facilitate sharing of information between PCPs and HOPE coaches.
Experiences from the HOPE open pilot suggest that patients with severe depressive symptoms and/or long-standing mental health issues, such as Major Depressive Disorder or post-traumatic stress disorder, may be poor candidates for HOPE, as they require mental health treatment beyond the scope of this intervention. Future studies should examine the association between severity of depression and other mental health comorbidities in response to treatment and potential need for a stepped-care approach.
Conclusion
==========
Overall, HOPE demonstrated clinically meaningful improvements in diabetes control, depressive symptoms, and diabetes distress over a 6-month period, using a tele-coaching intervention. HOPE appears to be a feasible and potentially cost-effective, telephone-delivered coaching intervention targeting high-risk older patients with comorbid diabetes and depression. Because older adults experience increased obstacles (e.g. financial limitations; lack of transportation/inability to self-transport; comorbid/unrelated health conditions restricting mobility) to participation in clinic-based diabetes protocols, HOPE may provide a viable option to reach geographically isolated or disparate populations with limited access to comprehensive diabetes and mental health care. While HOPE cannot replace the need for basic primary care, it does provide a potentially critical adjunct for aging patients with treated but uncontrolled diabetes and depression. A larger study with lengthier follow-up and greater PCP engagement is needed to support and extend the findings of this pilot.
Competing interests
===================
The authors declare that they have no competing interests relating to the HOPE project or this manuscript.
Authors' contributions
======================
The authors' responsibilities were as follows- AN and JC: conception and design of intervention, drafting and revisions to the article. CW: behavioral coaching, drafting and revisions to the article. MA, SR, and BL: behavioral coaching and revisions to the article. LS: study coordination and revisions to the article. All authors read and approved the final manuscript.
Pre-publication history
=======================
The pre-publication history for this paper can be accessed here:
<http://www.biomedcentral.com/1471-2318/12/37/prepub>
Acknowledgments
===============
This study is funded by a research grant from the VA Mental Illness Research, Education, and Clinical Center (MIRECC) Behavioral Coaching for Rural Veterans with Diabetes and Depression Pilot Study Program H-26812. Additional support was provided with resources and use of facilities at the Houston VA Health Services Research and Development Center of Excellence (HFP90-020) at the Michael E. DeBakey VA Medical Center. Dr. Naik is also supported by National Institute on Aging Career Development Award (K23AG027144-5) and by a Doris Duke Charitable Foundation Clinical Scientist Development Award. The U.S. National Institute of Aging and Department of Veterans Affairs had no role in the design and conduct of the study; the collection, management, analysis and interpretation of the data; or the preparation, review or approval of the manuscript. The views reflect those of the authors and not necessarily those of the Department of Veterans Affairs/Baylor College of Medicine or the National Institute on Aging.
The authors thank Mark Kunik and Melinda Stanley for their insights and expertise in the development of this pilot study; and Sonora Hudson and Levi Herman for their careful reviews of the final draft of this manuscript.
|
Introduction {#sec1-0268355518785482}
============
The possible complications discussed by physicians with patients prior to varicose vein (VV) treatment vary.^[@bibr1-0268355518785482],[@bibr2-0268355518785482]^ The "major" and most frequently occurring complications are usually discussed. However, no uniformity exists on which specific major complications should be discussed.
Understanding and agreeing upon which major complications to discuss with patients would harmonize how physicians inform their patients and obtain informed consent. This would also help physicians to engage patients in shared decision-making, if multiple similarly effective treatment options are available. However, for effective shared decision-making to take place, it is crucial that patients are aware of the possible major complications to be able to adequately balance the benefits and harms of the available treatment options.
In a joint venture the American Venous Forum and the Society of Interventional Radiology developed reporting standards to harmonize and standardize the reporting of postintervention complications.^[@bibr3-0268355518785482]^ These reporting standards facilitate the comparison of results between studies and improve the overall quality of clinical research on venous disease. However, this document was not designed to specify those specific major complications that should be discussed with patients in the consulting room.
We therefore set out to reach consensus on which specific complications following VV treatment are major and which are minor using the expert opinions of VV physicians throughout Europe and North America.
Methods {#sec2-0268355518785482}
=======
Delphi method {#sec3-0268355518785482}
-------------
The Delphi method is a widely recognized iterative process designed to achieve consensus from a group of experts using a series of questionnaires interspersed with feedback. Electronically distributed questionnaires are predesigned and completed by experts. Subsequent questionnaires are adapted based on the results of the previous version. The process stops when consensus is reached.^[@bibr4-0268355518785482]^
Experts {#sec4-0268355518785482}
-------
With the permission of the organizers of the 2015 VEITH symposium and via the Dutch Society for Vascular Surgery, we invited European and North American vascular surgeons, dermatologists, and phlebologists to participate in this electronic Delphi study.
Listing of complications {#sec5-0268355518785482}
------------------------
The list of possible complications was composed by presenting both 30-day and long-term complications of sclerotherapy, foam sclerotherapy, endovascular procedures, and open surgery.^[@bibr5-0268355518785482][@bibr6-0268355518785482][@bibr7-0268355518785482][@bibr8-0268355518785482][@bibr9-0268355518785482][@bibr10-0268355518785482][@bibr11-0268355518785482][@bibr12-0268355518785482][@bibr13-0268355518785482][@bibr14-0268355518785482][@bibr15-0268355518785482][@bibr16-0268355518785482]--[@bibr17-0268355518785482]^ We extracted all complications from reference articles in the Cochrane systematic review on VV treatment of Nesbitt et al.^[@bibr18-0268355518785482]^ Since the different treatment options for VV have many possible complications in common, these complications were all included in one questionnaire. The first round started with a total of 20 complications.
Treatment complications can lead to mild, moderate, or severe sequelae. Therefore, all complications were described extensively, based on the three-tiered severity scoring system from reporting standards for other vascular diseases.^[@bibr19-0268355518785482][@bibr20-0268355518785482]--[@bibr21-0268355518785482]^ For example, the complication "arteriovenous fistula" is divided into a "mild" level arteriovenous fistula if no additional intervention is required, a "moderate" level if endovascular repair is required, and a "severe" level if surgical repair is required. If the complication or its severity was not stated in the reporting standards, we used the Clavien--Dindo classification^[@bibr22-0268355518785482]^ together with information from the reference articles or daily practice. A few complications had only two levels of severity, for example discoloration that resolves after six weeks and permanent discoloration. To avoid ranking bias when composing the surveys, the complications were presented in alphabetical order.
Composing the surveys {#sec6-0268355518785482}
---------------------
As is shown in [Figure 1](#fig1-0268355518785482){ref-type="fig"}, the differing levels of complication severity were introduced in a stepwise manner to avoid extensive surveys containing all 20 complications, each with up to three levels of severity. Figure 1.Flowchart to introduce different severity levels of complications into the five DISCOVAR Delphi rounds.
The first Delphi round started by presenting the moderate level of severity for complications. If the physicians rated this moderate level as a minor complication, the assumption was made that the corresponding mild level would also be deemed minor. In the next round the experts were asked to rate the severe level of this complication. Similarly, if the experts rated a moderate complication as major, the severe level was also deemed major. The experts were then asked to rate the mild level of the same complication in the next round.
For complications with only two levels of severity, the choice whether to start the first Delphi round with the mild or the severe level was made randomly. When consensus was reached on one level of severity, the same assumptions as mentioned in the previous paragraph were made. For instance, if a severe level was deemed to be a minor complication, the mild level was also assumed to be minor as well and vice versa.
If consensus was not reached in the first round, the physicians were asked to rate the same complication again in the next round. In subsequent rounds, each complication was now presented accompanied by the percentages of agreement obtained from the previous round. This allowed physicians to adjust their own rating based on the ratings of others.
Study conduct {#sec7-0268355518785482}
-------------
SurveyMonkey (San Mateo, California, USA), an online survey tool, was used to develop and distribute the surveys. The complications presented in the survey were rated by the physicians using a 5-point Likert scale, ranging from 1 (definitely minor) to 5 (definitely major). If at least 80% of physicians rated a complication with a Likert score of 1 or 2, this complication was considered to be minor. Likewise, if 80% of the physicians rated a complication with Likert score 4 or 5, this complication was considered to be major.
During the first round, the physicians were able to propose any additional complications they considered to be missing from the survey. These complications were then included in the second round. In each round, physicians were given at least two weeks to respond to the survey.
Four Delphi rounds were planned as this was considered sufficient for reaching consensus. However, after fourth round we added a fifth round to ask physicians to rate the remaining complications that had not been presented in previous rounds due to the stepwise manner of introducing the complications.
Data analysis {#sec8-0268355518785482}
-------------
The internal consistency of the first Delphi round was calculated using Cronbach's alpha using IBM SPSS Statistics version 23 (Armonk, New York, USA). A Cronbach's alpha outcome of 0.7 or higher is considered to be acceptable and an outcome of 0.9 or higher is considered excellent.^[@bibr23-0268355518785482]^
Results {#sec9-0268355518785482}
=======
For this Delphi study we invited 43 vascular surgeons, five dermatologists, and one phlebologist to participate. Eleven vascular surgeons and one phlebologist accepted our invitation and participated in the first round (response rate of 24%). The physicians performed a median number of 300 (range 200--1500) VV interventions annually. Physicians from the first Delphi round were affiliated to medical centers in the United States of America, Austria, the United Kingdom, and the Netherlands. Six vascular surgeons and one phlebologist participated in the final round (14% response rate).
In the first round, physicians proposed the following additional complications: contact allergy, arteriovenous fistula, transient ischemic attack or stroke, and incomplete obliteration. The Cronbach's alpha score was 0.93.
[Table 1](#table1-0268355518785482){ref-type="table"} provides the list of the 12 major and 12 minor complications of VV treatment on which the physicians reached consensus. Online Appendix A shows the complete list of complications with the level of consensus achieved. The physicians did not reach consensus on some complications. For instance, no consensus was reached on complications such as cellulitis, hyperpigmentation still present after 12 months, superficial wound infection requiring oral antibiotics, and posttreatment pain requiring analgesics for two weeks. Table 1.List of complications on which consensus was reached for varicose vein treatment.Major1Allergic reaction requiring treatment to be aborted and medication to be started or to treatment being aborted and ventilator support as a result of medication2Cellulitis requiring hospital admission for treatment with IV antibiotics or IV antibiotics and ICU support due to hemodynamic instability3Deep wound infection requiring surgical debridement4Hemorrhage requiring one blood transfusion, blood transfusion and limited surgical or endovascular interventions or massive transfusion and extensive surgical intervention5Pulmonary embolism requiring anticoagulant therapy or surgical therapy due to hemodynamic instability6Skin necrosis requiring surgical debridement or split skin graft7Arteriovenous fistula formation requiring endovascular repair or surgical repair8Deep venous thrombosis requiring long-term anticoagulant therapy or lytic therapy9Lymphocele requiring drainage or lymphorrhea with permanent debilitating edema or continuous lymphorrhea10First-degree thermal injury requiring no additional treatment, second-degree thermal injury requiring a topical agent, or third-degree thermal injury requiring surgical intervention11Transient ischemic attack resolved within 24 h or stroke resulting in mild or temporary cognitive function impairment or stroke with permanent disability and inability to live independently12Permanent discolorationMinor1Discoloration that resolves after six weeks2Ecchymosis that limits the patient to wearing posttreatment compression stockings3Erythema self-limiting after two weeks4Posttreatment pain requiring no additional treatment5Superficial thrombophlebitis requiring analgesics for two weeks or no additional therapy6Telangiectatic matting requiring additional sclerotherapy or endovenous therapy or no additional therapy7Contact allergy to plaster requiring use of a different plaster8Incomplete obliteration requiring reintervention or no additional intervention9Migraine including migraine aura, requiring triptan therapy after sclerotherapy10Hyperpigmentation resolved within 12 months11Paresthesia resolved within 12 months12Posttreatment pruritus causing skin rash due to scratching[^2]
Discussion {#sec10-0268355518785482}
==========
Our Delphi study shows that physicians reached consensus on 12 major and 12 minor complications of VV treatment. The consensus on these complications may assist physicians when informing patients about the associated potential risks of the VV treatments for which the patient is eligible.
To decide which complications should be discussed with patients prior to treatment remains a difficult but important topic. On the one hand, physicians want their patients to be fully informed about their possible treatment options. On the other hand, physicians do not want to frighten or overwhelm patients by presenting every potential complication.^[@bibr24-0268355518785482]^ For example, most VV physicians will not discuss the risk of stroke with permanent disability after foam sclerotherapy due to an air embolism in patients with a patent foramen ovale.^[@bibr25-0268355518785482]^ Nevertheless, many patients do want more information than is given by their physicians.^[@bibr26-0268355518785482]^
Legislation on informed consent in the United Kingdom requires physicians to discuss the risks a reasonable person in the patient's position would deem of significance or the risks deemed of significance by this particular patient.^[@bibr27-0268355518785482]^ In the Netherlands, the Royal Dutch Medical Association (KNMG) provides information on informed consent, which is also based on court rulings. The KNMG states that complications occurring in more than 1% of patients must be discussed, in addition to those major complications that occur less often.^[@bibr28-0268355518785482]^ Unfortunately, both the UK and Dutch laws and professional societies do not provide detailed information about the type of major or significant complications physicians need to discuss. Also for minor complications, perhaps the arbitrary cutoff point of 1% should be lower for VV treatment, since it is often performed for non-limb-threatening symptoms or cosmetic reasons.
The consensus reached in our study appears to provide an appropriate group of major complications to discuss with patients. However, this is currently only based on what physicians deem to be major complications for discussion with the patient. Future studies should analyze if patients agree that these are the complications they want to be informed about. Combining the physician's view and the patient's view may help to close the physician--patient information gap^[@bibr29-0268355518785482]^ and could empower VV patients to engage in shared decision-making. This seems particularly relevant for VV patients because of the existence of several treatment options, including no treatment (at least initially). All these options have their merits and disadvantages and can be weighed against the patients' burden of disease. Thus, information should be provided about complications that might influence a reasonable patient's view on a treatment.^[@bibr30-0268355518785482]^ The consensus list of major complications from our Delphi study may assist VV physicians on deciding which complications to discuss with their patients.
The strengths of this study are first of all that the participating physicians were experienced and originated from four different countries practicing Western medicine. This suggests that the results of our study are valid for a wide range of Western countries. Second, the items in our first survey round had a high Cronbach's alpha score. This indicates that the questions asked belonged to a single construct, which is likely since all items were about possible complications after VV treatment. Third, the list of complications was quite comprehensive, since few additional complications were added based on the suggestions of the physicians.
One of the limitations of this study may first be the limited number of physicians that participated in our Delphi study and the withdrawal of five out of 12 experts after the first round. However, the literature suggests that the more participants, the lower the possibility of reaching consensus. Panel sizes of 5--30 participants are recommended.^[@bibr4-0268355518785482]^ Hence, we believe our panel size was sufficient throughout the Delphi rounds. Second, none of the invited dermatologists participated in our study. Thus, unfortunately, no insight was gained into the expert opinion of dermatologists with regard to which complications from VV treatment they would deem minor or major. Perhaps, this absence of participating dermatologists may have led to an underestimation of the severity of cosmetic complications. Third, only physicians practicing Western medicine were invited. It is unclear whether involving participants from non-Western countries would have altered the consensus reached here.
In conclusion, this Delphi study rendered international consensus about which complications of VV treatment are considered minor and which major. This consensus may help to harmonize the information that physicians discuss with their patients prior to VV treatment.
Collaborators in the DISCOVAR study in alphabetical order {#sec11-0268355518785482}
=========================================================
We would like to thank the following experts for participating in our Delphi study as part of the venous DISCOVARstudy group.
SA Black^1^, JR Boyle^2^, K Gibson^3^, MS Gohel^2^, JA Lawson^4^, MH Meissner^5^, MC Mooij^4^ and HJ Welch^6^
^1^Department of Vascular Surgery, Guy\'s and St Thomas Hospital, London, UK
^2^Department of Vascular Surgery, Addenbrooke\'s Hospital, Cambridge, UK
^3^Lake Washington Vascular Surgeons, Bellevue, USA
^4^Centrum Oosterwal, Alkmaar, The Netherlands
^5^Department of Surgery, University of Washington Medical Center, Seattle, USA
^6^Department of Vascular Surgery, Lahey Hospital and Medical Center, Burlington, USA
Supplementary Material
======================
###### Online Appendix A
Declaration of Conflicting Interests {#sec16-0268355518785482}
====================================
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding {#sec17-0268355518785482}
=======
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This study was funded by the AMC Foundation which was not involved in any way in the study design, data collection, data analysis, or interpretation of results.
Ethical approval {#sec18-0268355518785482}
================
Ethical approval was not applicable. This article is a Delphi study in which only the expert opinion of vascular surgeons was used.
Guarantor {#sec19-0268355518785482}
=========
DTU.
Contributorship {#sec20-0268355518785482}
===============
SMLM: study design, data collection, data analysis, writing. FES: study design, data collection, writing. DAL: study design, data collection, data analysis, writing. RB: study design, data collection, data analysis, writing. DTU: study design, data collection, data analysis, writing. All authors reviewed and edited the manuscript and approved the final version of the manuscript.
[^1]: The details of the collaborators are given at the end of the article.
[^2]: ICU: intensive care unit; IV: intravenous.
|
10:20 pm - IN WHICH I SAY "DUDES" AND "LADIES" A LOTWhere does one buy a good pair of well-fitting, durable, good corduroys which both men and women can wear?
I am serious. Where do these magical unisex corduroy pants exist, and how can we get some?
I'll go back a bit. Sonya and I like wearing corduroy. Who doesn't? Corduroy pants are comfortable; they're pleasing, they come in reassuring dark colors, and they make great sounds when you drag a comb across 'em. I am envious of Sonya's dark green corduroy jacket. It is a lovely jacket which she wears very well and doesn't fit me so I don't ask to wear it. I can't quite say Sonya is envious in return of my corduroy pants, but damned if we haven't discovered another one of those lousy gender disparity things that this country so loves. While shopping for goddamn pants, of all things.
The thing is that I'm a dude, right. And I can walk into a store such as, say, Sears, or LL Bean, or Eddie Bauer (though, honestly, I'd rather walk a mile somewhere else rather than step into Eddie Bauer) and say "HELLO I AM A DUDE WHERE ARE THE PANTS." And off I go to the section with corduroy pants for dudes, and they're in reassuring dark colors, and as long as I accurately remember my waist size this month I'm gonna be fine with whatever I pick out and if not, I either keep the receipt or I use a belt.[1]
But apparently clothing options aren't the same for ladies as they are for dudes. HOLY CRAP WHAT A TOTAL REVELATION WHO KNEW?[2] But when Sonya and I embarked on CORDUROY QUEST 2013 a few weeks back, we ended up on a sartorial adventure which ended with me down a hunnerd bucks and Sonya fuming at the entire fashion industry.
The nice places like LL Bean and Land's End what make nice corduroy pants for men also make corduroy pants for women. That is nice. What is not nice, however, is that LL Bean and Land's End make corduroy pants only for women who like to look all feminine and such. This is why their pants for ladies are offered with capri-style cuffs which look absolutely hideous but promise to give you "slim ankles", and with a little spandex in the waist so it'll stretch and not make the ladies look all fat and ugly and a bad baby birthin' prospect or whatever fear is currently being spread by advertising.
This is not to say that looking all feminine and such is bad. I know many people who look all feminine and such and do a very good job of it; I have never once heard any of them complain about fat ankles in corduroy pants. So, um, there's that.
Again, to contrast: Dude Corduroy Pants: Simple cut, 100% cotton, nice colors. Ladies' Corduroy Pants: Not-simple cuts, always with Spandex added to "give it a touch of stretch", and in colors that range from Golf Course Midway Green to something which could best be described as Unfortunate Baby Spoor. (I believe Land's End calls it "curry". Okay, then: Unfortunate Baby Curry.)
Sonya, however, does not dress overly femme, nor is she given to wearing clothing which looks as if an entire maternity ward has been sick on it. She has a three-piece men's tweed suit in which she looks terrific, but that suit was made long, long ago. Her favorite corduroy pants, made by LL Bean back when they actually had the notion that not all women want to dress alike, are not long for this world. She would like to buy corduroy pants which do not have Spandex, which will not give her slim ankles, and which will come in the darker, muted colors which we both like. But for all we've looked, we can't find anything.
She cannot wear much of the corduroy for dudes, though, because while that would make things much, much easier, it appears to be a simple fact of anatomy that dudes and ladies have differently-shaped hips and the pants cut for dudes are now specifically cut for dude hips. Sonya and I share a lot but we apparently don't share the same size hips, so my dude pants are a no-go. (They're also a few sizes too large, but THAT'S WHAT BELTS ARE FOR)
So what is there to do? Where can one go to buy corduroy pants for women who don't want femme pants? Simple cut, good fit, 100% cotton, and made of good, sturdy corduroy material? (The other thing we noticed while looking through catalogs and stores was that pants for ladies are made much less sturdier than pants for dudes. Because apparently dudes are so manly and rugged they'll wear their corduroy down bare before you know it, doing such manly and rugged things as walking in pants or sitting down at a computer.)
This is an important question and, if a solution is found, will put our minds to ease once we know there's at least one corduroy pants-maker out there who is cool with the idea of ladies who don't want to look like Laura Petrie. I mean, not that Laura Petrie wasn't hot, but I am not in love with Laura Petrie; I am in love with a woman who wants to wear simple corduroy pants.
I've never been much concerned with clothing as long as A. it fits, B. it covers up parts that'd get me arrested in public, and C. it's clean; now I know why. This is stoopid, Barney. This is really, really stoopid.
1. Forethought? Ha! Changing rooms are only to be used in the most dire of circumstances. I can't even begin to explain the neuroses behind this one because I really don't know what they are, only that I break out in a cold sweat when contemplating trying on multiple articles of clothing in a changing room.
2. I will be honest; I have not given much thought to ladies' clothing beyond that which I have had to wear for theatrical pursuits and whatnot. I know how to buy pantyhose that works for baseball mascot costumes (did I ever tell the tale of the Hatfield Hen in this here journal?) and I know that playing a nun so doesn't involve shopping for women's clothes because all you need is a big wimple and a form-hiding robe.
China has spoiled me forever, I suspect. My first inclination is to say "Come to China, take a pair of the pants you want the new pants to be like, and have a bunch of corduroy copies made". While I imagine you could do the same in America, it'd be hellishly expensive.
Instinctively I'd go for more outdoorsy brands, as their women's trousers tend to be more comfortable and have useful things like pockets. I guess Howies for the US? I don't know other comparable brands. In the UK I'd see if Fat Face had anything in (their cords in-store are sort of brushed and soft this season tho').
My impression is [and a quick search of their website seems to confirm] that for anything not exclusively outdoorsy, LL Bean has jumped entirely onto the "women's clothes must be different! feminine!" bandwagon.
Yeah, and more's the pity because LL Bean was for years the place to go for good outdoorsy clothing for both men and women, and even better if you could travel to the big store in Freeport. Now on the women's side of things, they're turning into a Down East Old Navy. It's the enormous touristy cruise ship Sonya and I saw in Casco Bay; looking "nice, I guess" and adhering very little to the overall philosophy of the place.
Apart from reduced durability, what's the practical problem with stretch? I like it for the extra comfort and freedom of movement. (I hate most other things in women's trousers though. And aren't we supposed to be having a 90s revival by now? Why are all the trousers so damn skinny?)
Sonya has a thin build and likes an academic look with loose-fitting trousers, and a decent pair of corduroys will allow a good share of movement. They don't have to all be tight and skinny cut; they just are, which is aggravating.
I'm pretty femme-y, so I have no advice on the pants thing. Just wanted to say that I suspect part of the reason for spandex-in-everything is to compensate for the lousy fit you get in mass-produced clothing. I will now shove my soapbox to the back of my closet before I climb on it.
Tough to find any without spandex or "elastine", but. Kohl's apparently has a few that might be suitable; Amazon has a Woolrich that might do; and there's a site called Gander Mountain that might have an option, though the one I found was sold out. Maybe calling them on the phone, I dunno.There was a Sierra Trading Post pant that has spandex but looks otherwise OK--I know, not her first choice.
That's all I can come up with in 15 minutes. Apologies, but I am behind on my naptime.
In agreeing with the Gaps suggestion. Actually my favorite pair of cords that I just butchered for parts today was from Old Navy, from 10? Years ago. Thrift stores might work. I was thinking Levi stores / outlets, in that their denim is generally a good product and they do practical products well. Something like j crew might work. I got a "boyfriend" jacket from them that was really stellar: practical, water-resistant, not femme. I've seen some pants for women that are more "boot cut", less tight. Hm. Will think on it. What about osh kosh, or a western wear store? Or Ben Davis?
She would like to buy corduroy pants which ... will not give her slim ankles
This made me laugh out loud. Let no one ever break the news to her that ... she actually HAS slim ankles.
I do understand, though. She doesn't want pants that imitate manacles on those slim ankles.
I too greatly admire her corduroy jacket.
Alas, I have no solutions. Clothes buying sucks, and gendered clothes really suck bigtime. Buying men's trousers and then tailoring them to fit at the waist (i.e., buying ones that are large enough to go over women's hips... which will then be too big in the waist, and then taking in the waist) might be an answer, but it's a lot of work, unless you happen to have a tailor friend. |
But the BBC's Juliana Liu in Hong Kong says crowds on Connaught Road in the Central district on Thursday morning were at their lowest ebb since the protest began.
Organisers have attributed this to sheer exhaustion, as the demonstration stretches into its fifth day, she says.
Media captionThe US and China expressed different views about events in Hong Kong
'High hopes'
The protesters include students, supporters of pro-democracy group Occupy Central and others angered by the initial police response to rallies at the weekend, which included using tear gas.
Mr Wang, the most senior Chinese official to speak openly on the matter, said: "Hong Kong affairs are China's internal affairs. All countries should respect China's sovereignty. For any country, for any society, no-one will allow those illegal acts that violate public order."
Image copyrightAFPImage caption
Protesters have been sleeping on roads around government buildings for several days
But he said he believed Hong Kong authorities had "the capability to properly handle the current situation in accordance with the law".
Mr Kerry said the US supported universal suffrage in Hong Kong, adding he hoped local authorities would "exercise restraint and respect for the protesters' right to express their views peacefully".
In China, state TV said Hong Kong's police should be supported in their attempts to "restore the social order as soon as possible".
An editorial in the Chinese Communist Party's newspaper People's Daily on Thursday called the situation "chaos".
"Hong Kong has for many years enjoyed peace and harmony. It now sees the emergence of this embarrassing 'chaos', and the root cause lies with a few people who are disrespecting the law.... 'chaos' denies Hong Kong residents their prosperity, goes against their wishes, and is not what all Chinese people wish to see or what we can tolerate."
Juliana Liu, BBC News, Hong Kong
The senior Chinese leadership has set out clear limits on who can run for the position of chief executive, Hong Kong's top leader, in 2017.
The rules make it virtually impossible for anyone not trusted by the Chinese government to stand for election.
As a result, the protesters accuse Beijing of reneging on decades of vows to give Hong Kong people genuine democracy.
But although there is widespread anger that Beijing may have violated the spirit of the agreements it has made, there is intense debate over whether it has violated the letter of the law. |
Firefox only has eyes for Android
Things you might also like
There are still no plans to bring Firefox to the iPhone or iPad and Jay Sullivan, Mozilla's VP of Products, has also told Pocket-lint that we can also forget about the browser landing on the BlackBerry PlayBook as a native app anytime soon.
"We haven't seen any change there," he said at a MWC briefing in Barcelona, referring to Mozilla's relationships with Apple and RIM. "There are no plans for PlayBook or iOS."
Sullivan was keen to stress that Firefox was completely committed to the Android app for its mobile aims and said the new Google Chrome for Android browser wouldl not mean an end to its Google based-endeavours.
"Right now, aside from Boot to Gecko, we're really focused on Android," he said. "It's really got the market share, it's where people are and we're off to a good start.
"We've shipped something like a little over 8 million downloads of the Firefox browser for Android and we have a new update that's coming up with some massive performance increases including Flash click to play."
When we asked if Google may make it more difficult for third-party browsers going forward in order to promote its Android Chrome version, Sullivan said: "I don't see that happening. We like to see a competitive browser market and I think Google does too. There are several browsers for Android and Chrome only runs with Ice Cream Sandwich."
We also questioned the Mozilla big cheese on whether Firefox was concerned with Google's growing share on the desktop with the regular Chrome browser.
"We probably added 100 million users in the last year so we're continuing to grow," he argued. "We're approaching 500 million users, so we're doing fine. The competition is good, it's been great competing with Chrome and we're pushing each other on JavaScript performance, on web graphics, on HTML5 compatibility. It's always been the case between us, Safari, Opera and Chrome. And even IE9 is a reasonable browser.
"We love it. We like to compete. We have an impact on the web as we have a seat at the table. And, as long as we have that seat and we're making our users happy then we're happy." |
Customs Trouble in Croatia
Capt. Rupert Parkhouse of the yacht M/Y Daydream ran into some unexpected trouble recently in Croatia that resulted in the loss of a charter and hefty fines before an appeal was granted.
Parkhouse bunkered 17,000 liters of fuel in Nice that was colored blue-green, which is the norm in France to identify it as being tax free. After a couple stops, he arrived five-and-a-half days later in Split, Croatia, to pick up charter guests.
Daydream was cleared in, took a berth at the marina, and then the captain was approached by customs officials who asked to take a sample from the tanks.
That’s when the trouble began.
Blue-colored fuel in Croatia is reserved for use by Croatian fishing boats and there arose some suspicion that the fuel was obtained illegally within the country.
The next morning the Split customs officials informed the captain that the yacht had committed an offense by having blue-green fuel in the tanks, that fines had to be paid before the yacht was able to move, and that no guests could join the boat.
All the while working with his agent, BWA Yachting, the captain paid the initial fines, which were 10% of the legal maximum. Later in the day he learned that the yacht would be further fined €48,315, calculated at a rate of 10 Kuna/liter of tank capacity.
Parkhouse provided Customs with the bunkering note for the fuel that day, as well as the supplier’s invoice and the fuel’s technical specifications, but it didn’t seem to make a difference, he says.
At that point the appeal process began and the yacht was prohibited from moving.
The captain stated in an Aug. 26 email, seven days after the fuel samples were initially taken by Customs, that: “The authorities do not seem to now dispute that we bought the fuel legally in France. The issue seems to be that we had (and still have) blue-green diesel in the tanks. This is apparently a prohibited color in Croatia…”
Two weeks later BWA Yachting issued a statement that the matter had been resolved in the yacht’s favor. The appeal was granted and all proceedings and fines against the yacht had been suspended.
The decree made on September 10 says the Port Customs Branch in Split made a series of omissions during its inspection, including the absence of a laboratory analysis of the fuel sample taken that would have established that the fuel was indeed purchased in France.
Although this story ends happily, the yacht suffered a lot of inconvenience during the matter.
The moral of the story? As BWA states: “It is pertinent for the yachting community to note that yachts traveling in Croatian waters with colored duty-free fuel have a copy of the invoice on board to prove such purchase.”
Do you have any colorful fuel stories to share? Leave your comments below. |
Quantum Code Crawford is making a comeback and continuing to deceive, mislead and victimize innocent day-traders looking to trade binary
Quantum CodeAPP video is so easy to use, Anyone with no experience can start making money with Quantum Code APP the next few hours! Now is Your time! Quantum Code is a 100% FREE legit video that will trade on the binary options trading industry with just One click. Quantum Code by Crawford is fully automated Binary Trading System video and places the winning trades for you!
Quantum Code
According to Michael Crawford CEO, “The Quantum Code is currently reaching successful binary options trade percentages that are unmatched by any other Binary Options Trading video 2016 that are available and it’s all thanks to the sophisticated code that drives the entire Quantum Code video.”
Thousands of new binary trader have flooded into the Quantum Code members area due to the successful trade ratio that the Quantum Code APP is currently reaching high profits rate up to 97% and Crawford claims “The Quantum Code video has the power and has proven to reach as high as 97% successful trades for a number of our beta-testers.”
There is still a Big question about how the Quantum Code video operates and actually provides such high rate of success when investing within the binary options industry.
What is Quantum Code?
The Quantum CodeAPP software was developed with the user in mind and is able to “completely take control of the binary options trading process” by finding and automating the trades for the investor. There are a number of investors reaching over $20,000 per day using the live trading signals provided by Quantum Code APP.
Quantum Code system by Michael Crawford is a binary options trading APP that has been designed to analyze the market for opportunities to replicate the trades. It provides different secret strategies that ultimately help traders to make thousands of dollars just for a few dollars. it automatically searches the most profitable trades. The APP also provides an analysis of market conditions for operators to know what should be the next step. The Quantum Code focuses on the current market and find profitable trades for you on complete autopilot. When the Quantum Code software finds the profitable trading position that will give you an alert so you can contact your Quantum Code broker options and place the trade in second. Quantum Code will give you more winning trades and more profits and have a rate of return of 100% without any loss.
New Binary Options Trader can plug into live Michael Crawford Quantum Code binary trading signals and begin receiving real-time alerts instantly so they don’t have to spend Time learning the ins and outs of binary investing.
The recent feature that has been added to the Quantum Code APP is the automation feature which will completely control the trading by placing the trades at the Quantum Code broker without any users complaints. This is a major driving factor behind the buzz of Quantum Code APP and the thousands of new traders that continue to join in Quantum Code on a daily basis.
How Does Quantum Code APP Work?
The Quantum Code APP is going to find the best trading opportunities that will give you the ability to earn up to 97% profit per successful trade. The second the Quantum Code video software use sophisticated algorithms and ultra-high-speed networks in order to deliver maximum profits for every trade.
There are a limited number of investment options when it comes to binary and those are the “call” or the “put.” Quantum Code APP tells the trader to place a call the option is going to move upward by Signals of expiration while the put means the option will most likely be moving downward.
Quantum Code APP is 100% guaranteed and not any Scam video system. It is being considered to be the most advanced trading bot that has ever existed. You are guaranteed to make money once you begin utilizing it to your advantage. One of the great things about Quantum Code APP is that its database is updated every ten seconds. The Quantum Code video helps you to always attain the most profitable market opportunities.
The point behind Quantum Code APP is to take out the guess work and learning curve to trading binary options. By following the signals that the APP provides traders can begin investing with little to no background in binary options.With this video system you continually get huge money. When the APP detects a winning trade the trade will stick as normal until the trade has expired and you bank a tidy money earning continually growing your investment. This happens over and over and over again. This happens only Quantum Code APP. You will not find this technology anywhere else in the world.
What’s It Going To Take To Get Start With Quantum Code APP?
Any new investor that wants to get started with the APP will need to invest with an accepted binary options trading broker. Quantum Code APP is currently only accepting a number of binary options brokers depending on where are traders live around the world. The list of accepted brokers is available after the trader enters their details on the official Quantum Code APP website.
What Is a Binary Options Broker?
Anyone interested in trading binary options will need an account with an accepted Binary Options trading broker. Quantum Code broker is the platform that allows you to place trades and before you can place a single trade you will need to open and fund your trading account with a broker that works with Quantum Code. The minimum investment is typically $250 but this can range depending on the broker chosen.
How To Make Quantum Code Crawford Work For You?
The second you fund your Quantum Code binary options trading account you’ll get your instant download link for Quantum Code Crawford video software. At that Time you can download Quantum Code APP, start receiving live binary trading signals, and place your first binary options trade.
Immediately Quantum Code APP tells the trader to place a trade they will head over to their options broker and place the exact trade that the software suggested. Continue following the live trading signals to reach the 97% successful trades ratio that a number of Quantum Code Crawford system beta-testers were able to accomplish.
Here’s the simple secret steps to take to reserve your free copy of Quantum Code APP
1) Head to the official Quantum Code site and reserve your copy by signing up
2) Fund your account with one of the accepted Quantum Code brokers
3) Download the Quantum Code APP and start using the free copy today
Quantum Code is currently offering an instant trading bonus and interested investors should visit the official website to find out more.
Quantum Code APP Overview:
By using Michael Crawford-Quantum Code App live trading signals investors don’t need to have years of experiences in binary options investing to begin seeing success. As soon as the APP is downloaded it will go to work doing the tedious work of finding and placing trades on autopilot. The Quantum Code video is reaching 97% success for beta-testers which is unmatched in the binary Niche. QUANTUM CODE LAUNCH CRAWFORD
If the investor does not have too much technical knowledge it’s still easy to “plug & play” using Quantum Code video. There is an instant trading bonus that is only available at the official Quantum Code website Quantum-Code.co so click the link below to Claim Your $1K Quantum Codevideo Bonus and To Download Your Free Copy Of Quantum Code APP By Michael Crawford Now : http://www.pheromoneadvantagereview.com/QC
Post navigation
Your email address will not be published. Required fields are marked *
Comment
Name *
Email *
Website
Notify me of follow-up comments by email.
Notify me of new posts by email.
WHO I AM
Hi! I am Diana Jacob, creator of this site. Welcome to my reviews website for pheromone advantage review. I created this website system to express my opinion on health fitness weight loss,erectile dysfunction (ED) and money making book and help people make an informed decision before they join honest website review. Because there are so many scams on the internet nowadays, its really difficult to know what actually works. In fact when I came across my official website, I was skeptical myself. I’ve cut through all the hype and revealed the facts that will help you decide whether these glowing reviews is right for you or not. Feel free to go through my website and get to know more about pheromone advantage . If you have any questions, please go to the contact page. Thanks for visiting my website! |
Internet speed guarantees must be realistic, says Ofcom Published duration 6 October 2017
image copyright Getty Images image caption Ofcom wants internet providers to give users more realistic information about speeds
Internet users are to be granted more rights on connection speeds as Ofcom imposes tougher rules on how ISPs advertise broadband services.
The proposals give consumers the right to exit contracts penalty-free if speeds fall below a guaranteed minimum.
Ofcom says there is a mismatch between what is advertised, and the speeds customers receive.
But experts say speeds are affected by different factors, and are not strictly a measure of connection to a device.
public consultation is currently being conducted until 10 November.
Easy way out
Gillian Guy, chief executive of Citizens Advice, said: "Many people seek our help each year because their slow and intermittent broadband service falls short of what their contract promised.
"For most people, a reliable broadband connection is a necessity, so when they don't get what they've paid for they should always have a quick and easy way out of their contract."
She said: "These changes are an important step in giving consumers more power to hold their broadband provider to account for poor service."
Ofcom's existing broadband code of practice requires ISPs to provide consumers with an estimate of the internet speed they can expect from their service.
image copyright Getty Images image caption Many different factors can influence browsing speeds on a computer or tablet
If the proposed rules pass consultation, broadband providers will need to be much more specific about the speeds customers will receive and will have to set a guaranteed minimum speed for each package.
This could mean current estimates of "up to 17Mbps" become "a minimum of 10Mbps".
If the speed falls below the guaranteed minimum, under the new rules, the ISP will have one month to fix the problem, and if it cannot be fixed, the customer can terminate the contract without penalty.
Right to know
A BT spokesperson said: "We remain firmly supportive of Ofcom's voluntary code of practice on broadband speeds, including the latest proposed changes which we hope will make things even clearer for our customers. We have been working with Ofcom and other ISPs to improve the code."
"We support the emphasis on customers knowing what broadband speeds will be delivered at peak times and we are happy to commit to letting customers leave without penalty if they don't reach their minimum guaranteed speeds and we can't fix the issue within a month."
When broadband connections become slow and intermittent, consumers often use speed tests in order to see what connection speeds they are actually receiving.
image copyright Eyewire image caption The changes will mean users of higher-speed links get better estimates of speed
But it is a complex issue, according to a technology expert.
Andrew Ferguson, editor of Think Broadband, said: "The code-of-practice changes are very welcome, but it's clear from years of experience that broadband providers are not deliberately and systematically ripping off the customer.
"The biggest problem for an ISP is balancing the desires of the marketing department against what consumers are actually experiencing every day. These rules, once implemented, should help to force providers to be more honest with their customers," said Mr Ferguson.
Many factors can influence browsing speeds, he said. These include
how wi-fi signals travel around a home
how well ethernet cables work
how computers handle net protocols
whether a computer can process higher speeds
anti-virus software
peak-time congestion
"What I'm trying to get the general public to understand is that when they say a guaranteed speed, it's usually just to that broadband router, but not to your PC or device," Mr Ferguson told the BBC.
"A speed test is not your connection speed. Sometimes the speed is affected by distance limits, and sometimes it's physics."
Peak speeds
Ofcom is keen to change the existing rules because current protections apply mostly to broadband over copper-based phone lines, since buildings located far away from the cabinet on the street or the local exchange often receive lower speeds.
However, customers on cable or fibre networks can also experience problems during peak times, when many people in the area are using the network at the same time.
Often, said Mr Ferguson, the estimates that ISPs give of speed are for times when few other people are browsing.
The rule changes will demand that ISPs guarantee better peak speeds for all and be more realistic about what service consumers will get.
Andrew Glover, chairman of the Internet Services Providers' Association told the BBC: "Ispa supports the consultation and the direction of travel that is being proposed by Ofcom.
"The speed of a connection is clearly important for consumers, and while our members are offering faster and faster speeds across the nation, a lot of factors can affect the speed that individual consumers can achieve.
"Some of these factors are outside the control of the provider but we fully agree with Ofcom that speeds need to be communicated in a transparent manner." |
44. Let i = 18 - z. Let y be 6/i - (-4 - -7). Solve 3*p = -2*c - 2, -c + y*p + 10 = -4*p for c.
2
Suppose -3*o = -7*o. Let c(v) = -v + 25. Let a be c(25). Solve a*b - 4*m = 3*b - 4, o = -b + m - 1 for b.
0
Let s be (2 - 12/5) + (-128)/(-20). Let c be s*(-2 + 1)*7/(-14). Solve 8 = c*m - f, 0*m - 4*f = -5*m + 18 for m.
2
Let x be (((-15)/(-9))/(-5))/(6/(-54)). Solve 11 - 27 = 4*k - 3*t, x*t = 0 for k.
-4
Let m be ((-4)/4 + 3)/1. Solve 3*p + 26 = -p - m*a, 4*p - 5*a = -5 for p.
-5
Let q = -163 - -167. Solve -q*k = 2*z + 6, 2 = -2*z + z - 3*k for z.
-5
Let f(l) = -l**3 + 10*l**2 + 11*l - 8. Let t be f(11). Let v = -3 - t. Suppose -3*j + 51 = 15. Solve -v*b + 0*b - 3*h = 1, -3*b = -2*h + j for b.
-2
Let j = -36 + 21. Let q(s) = -s**2 - 15*s + 5. Let o be q(j). Solve 5*x = o*b + 25, x - 4*b - 21 = b for x.
1
Let i(v) = -3 + 0*v - 8*v + 7*v. Let z be i(-8). Solve 2*u + 0*u + 23 = z*f, 0 = 5*u + 20 for f.
3
Suppose -c - 1 - 3 = 0, -4*o + 32 = -c. Suppose 2*a + a = -3*k + 6, a + 4*k = -o. Solve 3*w = 6*w, -a*n = 3*w - 15 for n.
3
Suppose 9*d = 5*d + 120. Let c = d - 16. Solve c = 4*g + 2*a, 2*a - 2 = -2*g + 6 for g.
3
Suppose -r = 38 - 42. Solve 9 = -4*g - 3*k, -4*k = r*g + 12 - 0 for g.
0
Let m(v) = v**3 + 7*v**2 - 7*v + 9. Let t be m(-8). Solve o - 3*c = 6, t = 3*o - 3*c - 5 for o.
0
Let c be (-3)/1 - -5 - 11. Let d = c - -14. Let q be 17/153 + (-88)/(-18). Solve 0 = 4*u + d*t + 5, -q*t + t = 5*u + 4 for u.
0
Let i = 18 - 14. Suppose -5*r + 27 = 5*g - 4*g, -i = -2*g. Solve -r*u + 4 + 11 = -3*q, -u + 3 = 2*q for q.
0
Let b = 53 - 19. Let q be 4/20 + b/5. Suppose -g = -q + 4. Solve -g = 3*n + 3*x + 3, 4*x = -5*n - 11 for n.
-3
Let x(j) = 0*j**2 - 1 + 3*j + 0*j - 4 + j**2. Let l be x(-6). Suppose 3*n = 4*n - 2. Solve -n*r = -3*z + 9, 4*r + 0*z - z + l = 0 for r.
-3
Let r be (-1)/4*(-63 - -63). Solve -4*d + 4*j = 12, r = -4*d + 2*j - 2 for d.
2
Suppose 10 = 2*w + 8*x - 11*x, 3*w + x - 15 = 0. Solve w*a - 5*y = 0, 3*a - 17 + 9 = y for a.
4
Let z = -253 - -258. Solve -z*v - 20 = 3*i, -5*v - 8 - 12 = i for v.
-4
Suppose 0 = -37*j + 19*j + 90. Solve -w - n = w - 4, 4*w = -j*n + 14 for w.
1
Suppose 0 = 8*o - 23*o + 75. Solve 4*j + 6 + 6 = 0, -o*w + j = 12 for w.
-3
Let d(g) = 8*g + 1. Let n(v) = 41*v + 5. Let s(q) = -11*d(q) + 2*n(q). Let x be s(-1). Solve -h + 3*h = -x*o - 20, -5*h + 2*o + 8 = 0 for h.
0
Suppose 0 = -4*o - 3*o + 91. Suppose -12*i + o*i = 2. Solve 4*y = -r - 23, i*r + 2*y = -9 - 7 for r.
-3
Suppose 0*k = -5*k + 1245. Let i be k/9 - 3/(-9). Let m be 14/i - 78/(-4). Solve -n = -0*n, -4*g = n - m for g.
5
Let j(d) = 7*d - 3*d - 5 - 2*d - 1. Let g be j(5). Solve -5*a = 5*l + 35, 0*l + g*a - 2 = 2*l for l.
-5
Suppose 5*q - 5*s = -110, 116 = -2*q - 3*q + 2*s. Let n = -34 - q. Let d(k) = -k**2 - 11*k - 8. Let g be d(n). Solve 9 - g = 4*r + 3*b, -2*b = -10 for r.
-2
Let k = -60 - -90. Let l = -28 + k. Solve -1 = -c + 5*o - 0, l*o + 3 = 3*c for c.
1
Suppose 0 = 3*i - 3*s - 3, -4*i + 1 = -2*s + 3. Let k be (35/10)/(-7) + (-7)/i. Solve j - 4 = -k*q, -3*j = -q - 2*q - 12 for q.
0
Let h = -107 - -187. Let g = h + -55. Solve -5*d - g = -2*p, 3*d = -2*p + 2*d + 7 for p.
5
Suppose 0 = 2*w - 4*w + 4. Let j(x) = -x**3 - 5*x**2 - 8*x - 14. Let f be j(-4). Solve 2*u + w*u = 8, -u = c - f for c.
0
Let p(x) = -x + 14. Let g = -7 + 17. Let y be p(g). Solve 4 = -y*j + 12, 4 = -4*t + 4*j for t.
1
Let a(t) be the first derivative of -2*t**2 + 21*t - 14. Let y be a(4). Solve 4*f + 4*p + 29 = p, 2*f - 5 = y*p for f.
-5
Let l be (((-2)/1)/(-2))/((-16)/(-176)). Let x = l - 9. Solve -2*n = -x*u + 20, n + 6 = 2*u - 9 for u.
5
Let f be (-3)/5 + 170/(-50) - -56. Let k = f - 47. Solve k*i - i - 2*g = -16, -5*i - 5*g - 35 = 0 for i.
-5
Suppose s = 3*s - 6. Let y(z) = -z**3 - 6*z**2 - 10*z + 1. Let m be y(-5). Suppose -r = -s*r + m. Solve -16 = -3*b - n - 4, 2*b - n - r = 0 for b.
5
Let c be -1 - 8 - -15 - (-6)/(-2). Let p be (-75)/(-7) + (-2)/(-7). Solve -4*y - 5 = -2*k + 9, -4*y + c*k = p for y.
-5
Let g(x) = 4*x**2 + x - 1. Let p be (-6)/4 - 10/(-4). Let z be g(p). Solve 0 = -5*r - 4*s - 23, 2*r = z*s + 2 for r.
-3
Let h = 82 - 74. Solve 0 = -5*d - 5*o + 40, -4*d + 2*o + 0*o = -h for d.
4
Suppose x + d - 67 = 0, -x - 2*x - 4*d = -202. Let f = 120 - x. Suppose -u = -10*u + f. Solve z - u = -3*s + 6, -s = 5*z - 18 for s.
3
Let h = -218 - -223. Solve -3*a + 3 = -2*a, 0 = -5*y + h*a - 15 for y.
0
Suppose -5*n = 4*v, -5*v = 2*n + n + 13. Solve 7*g - 6 = 2*g - w, -n*g + 3*w + 20 = 0 for g.
2
Let h be (3 - 1)/(-2) + 0 - -4. Suppose 3*x - t = 15, h*x = 6*x + 3*t - 15. Let o = 4 + 6. Solve 2*p - o = -0*p, x*p - 31 = -2*w for w.
3
Let h = -34 + 39. Suppose -q + 3 = -f + 4, -q + 17 = h*f. Solve -2*u = -4*x - q, -4*u = -2*u + 2*x + 10 for u.
-3
Let q be -6*-1*((-4)/2)/(-2). Suppose 4 = -4*m + q*m. Solve -4*j - m*p + 6 = 0, j - 4*p - p = 29 for j.
4
Suppose 0 = 7*g - 36 - 41. Suppose g*w = 7*w. Solve -4*i - 16 = 4*t, 0 = 3*i - w*i - 5*t - 12 for i.
-1
Let g be 2/(-7) - 58/(-203). Solve -r - s - 2*s - 2 = g, 2*s = 5*r - 24 for r.
4
Let x = 395 + -392. Let a be 48/(-9) + (-2)/(-6). Let z = a + 8. Solve 2*r = 4*t - 3*r + 7, -15 = -x*t - z*r for t.
2
Let w(d) = -d**3 - d**2 + d. Let p be w(-2). Solve -4 = 3*k + 2*z - 7, -k = -p*z + 7 for k.
-1
Suppose 101 = 25*c - 24. Solve -2*q - 3*w = 2*w - 15, 3*w = -2*q + c for q.
-5
Let n(h) = -h**3 - 8*h**2 - 3*h - 20. Let j be -1*(-2 - -6 - -4). Let y be n(j). Let s be 6/(-1 - (-9)/7). Solve o - w + 4 = 0, y*o - 5*w = -0*o - s for o.
1
Suppose -2*u + 26 + 10 = 4*d, -5*u - 3*d = -125. Suppose 2*w + 10 = 0, r - u = 3*w + w. Solve -4*z = 2*q + r - 18, 5*q = -3*z + 18 for z.
1
Let m(l) = l**3 + 7*l**2 - l - 6. Let c be m(-7). Let f = -3 - c. Let w = f + 6. Solve w*x - d = 2, -4*x - 2*d = -d + 8 for x.
-1
Let l be (8/(-24))/((-2)/18). Suppose 0 = 4*x - 8, -l*x = y - 6. Solve 3*f - 12 + 2 = -c, y = 4*f + 4*c - 24 for f.
2
Suppose 0 = -28*n + 21*n + 14. Solve 4*b - 16 = 4*f, 0*f = n*f - 5*b + 20 for f.
0
Let q = 106 - 82. Suppose 0 = -q*z + 17*z + 140. Solve -3*o - z = -n + o, o = -5 for n.
0
Let r(f) = f**2 - 6*f + 9. Let d be r(5). Solve d*n = 2*q + n + 1, 3*q - 3 = 3*n for q.
4
Let o(x) = 12*x + 195. Let v be o(-16). Let l = 3 + 5. Solve k = v*s - 1, 4*k + 4 = l*s - 4*s for s.
0
Suppose 0 = -1866*c + 1869*c. Solve -3*l = -d + 6 - 16, -5*l + 5*d = c for l.
5
Let h(k) = k**3 - 3*k**2 - 2*k - 5. Let r be h(4). Solve -4*f - 19 = -3*x, 0 = 5*x + 2*f - r + 6 for x.
1
Let p(s) = -s**2 - 11*s + 29. Let w be p(-13). Solve 0 = -l - w*m + 3, 3*m - 4 = -2*l + 2 for l.
3
Let b(r) = r**3 + 11*r**2 - 7*r + 65. Let q be b(-12). Solve -3*f + 4 = -j - q, j + f - 3 = 0 for j.
0
Let f be 6/(-3)*21/(-14). Solve w + 5 = -m, -2 - f = -w + 4*m for w.
-3
Suppose -4*y - 18 = -4*h - 6, 9 = 2*y + h. Solve l - 10 = y*f, 2*l - f = -4*f - 8 for l.
2
Let p(d) = 19*d + 139. Let q be p(-7). Solve -5*b + 3*y = q*y - 22, 0 = 4*y + 4 for b.
5
Let j(r) = 0*r + r - 8*r - 5 + 3*r. Let m be j(-4). Solve -4 = v + 3*k + 3, k = 3*v + m for v.
-4
Let r = -34 - -52. Let h = -6 + r. Solve -3*d + h = -4*p, 3*d + 0*p = -4*p - 12 for d.
0
Let s(d) = d**2 + 6*d + 13. Let o(l) = -l**3 - 8*l**2 + 8*l - 13. Let c be o(-9). Let z be s(c). Solve 5*y - 10 = -0*g + z*g, 4*y + 4*g - 8 = 0 for y.
2
Let b = -85 - -72. Let a = b + 16. Solve -a*o - 14 = -0*o + 4*j, -4*o + 5*j + 33 = 0 for o.
2
Let n = 594 - 594. Solve n*o - 3*o + 5*v - 3 = 0, 3*v = -3*o + 21 for o.
4
Let s be 204/26 - 58/(-377). Solve 4*f - 5*c + 13 = s*f, -2*f - 3*c = -9 for f.
-3
Let j be (0 - 12/(-3))*1 + 1. Solve 20 = -5*x - 5*l, 3*l - 29 = j*x - l for x.
-5
Let k(d) = -205*d + 340. Let s(n) = 12*n - 20. Let i(j) = 2*k(j) + 35*s(j). Let m be i(3). Solve -m = -7*q + 3*q + 2*g, -2*q - 4*g - 10 = 0 for q.
1
Let g be (-13)/(-3) - (-4)/6. Let l(s) = 2*s**2 + 12*s - 491. Let w be l(13). Solve 0 = -5*m - 0 - g, w*z + 5*m = -14 for z.
-3
Suppose -u - h + 2*h = 4, -2*u - h + 7 = 0. Let y = 196 - 191. Solve 5*a + u = b, 0 = 5*b + a + y + 16 for b.
-4
Let d be ((-276)/8 - 3)*2/(-3). Let w be ((-5)/d*0)/(-1). Solve o = -4, w = 5*u - u + 4*o + 4 for u.
3
Let r(j) = -j + 1. Let y(m) = -3*m + 5. Let n(h) = 5*r(h) - y(h). Let d be n(-9). Suppose -3*l - 6 = -d. Solve l = 2*t, 5*v + 10 = 3*t + 2*t for v.
0
Suppose -3*x - 128 = -35*x. Let r(g) = 24*g**2 + g + |
Thursday, May 14, 2009
MemOriEs Of a diStaNt paSt
Speaking to a friend who's very close to heart~ th 1st to comment on every blog :P~, made me realise the fact that India is a country any1 would fall in love with. Im a Malaysian and I dont look at myself as a NRI or a half indian or whatsoever. True, i speak tamil. and my anchestors were from Tamil Nadu. True that th traditions I adhere to are those from India. True that i am seen as an Indian.True that i have a soft spot for India and i stand up against anyone attempting to even say anything negative about India. BUT, Im a Malaysian at th end of th day~owh, im not even going to get to th racial problem in Malaysia at th moment~
Coming back to India. My 1st experience with India and Indian was when i went there to pursue my Degree~i was 19+. All alone in a foreign land. Leaving behind all familiar faces, known lanes, Uncles and Aunties, friends who meant th world to me, to live in a foreign land, amongst strangers. A country i had NO one in. A place i have never considered my own. A place where i was solely known by my looks and nothing else!
My 1st week was filled with deep regret and depression. But th Indian atmosphere is so colourful that it doesnt let you be down for too long. I made friends~ friends for life~though we may be oceans apart, they are th best set of people ive ever known. True, Indian friendship is different from th Malaysian friendship (yeah~ even friendship differs with th geographical location :P)
As time passed, I started Living life in India. My first experience at Independence~though i was still financially dependent :p~ I used to wonder why people fought for independence~ i no longer wonder~ I lived a life i couldnt have lived anywhere else. A life where i was known for who i am. Defined by solely my name and not my Fathers. Spent every day doing what i pleased without having to bother about anyone(no 1 knew my parents bck thr :P). My first brush with Pani Puri~a snack which i consider th greatest of all Snacks~
Pani Puri has been th one food i cant get enough of. I used to stay up studyin all night long before the exams(yeah, 1 day before th exam) and think of Breakfast At Bakery and Pani Puri's in th noon :). And always wanted to collect some Pani sample of th pani puri and agar plate it! Hell yeah, im sure th CFU will easily be higher that 10000~ and yet everytime, i gobble up a plate n wait for th cuka~i forgot how its pronounced ~
haih! i miss my bangalore~mind you, i dont miss th whole of bangalore or th whole of india! i just miss th Bangalore i know and th Indians i came across. Th indians gave me a new identity. Th indians made me believe in me! Th bangalore that has given me so much of independence, so much of love and joy, Th bangalore that has thought me how to love, and expect nothing in return. Th Bangalore i Love.
If I could return back to Bangalore, i Would. even if none of my friends are there anymore., i would go back to Bangalore! A place i call home, after th one in Klang. A place im familiar with. A place that puts me to ease. A place i dnt need to worry about anything. A place where i can walk and walk and walk, and not be alone.. A place where my Soul meets its match.. |
And that was where Deantra Belvin, 21, was headed with a gun concealed in his pants pocket. A server spotted the weapon, security pounced, and in the scuffle, Belvin lost control of the gun. It discharged -- shooting him, quite literally, in the foot. "It's almost comical," Farrell said, "but it's not."
Because of the club's surveillance system and multiple security guards, staff quickly controlled the situation, Farrell said. "We had him apprehended within minutes," he said. "This was a bad situation that I think everyone controlled beautifully."
No one else was injured. Belvin was transported to a local hospital with an injury that was not life-threatening, according to New Orleans police.
Police said Belvin will be booked with illegally discharging a firearm, illegal possession of a firearm, possession of a firearm with a controlled and dangerous substance, possession of a firearm in an alcoholic-beverage outlet, and criminal damage to property.
While police did not say what the controlled substance was, records of his arrest show Belvin had a Schedule II drug, which includes opiates and cocaine.
After the incident, Farrell said he and his team scrambled to clear out the
club and re-open within 90 minutes.
"Through Mardi Gras you're going to
be open 24 hours," Farrell said. "People are on the streets until 7 or 8 in the morning." |
Multiresonant behavior in nearly degenerate four-wave mixing: the ac Stark effect.
We have experimentally studied the effects of pump-probe detuning in nearly degenerate four-wave mixing. The data show multiresonant behavior as a function of the pump-probe detuning at both low and high intensities. At low intensities, the structure is the result of Doppler motion. At high intensities, five-peak structure is observed and is explained by the standing-wave modulation of the ac Stark splitting of the atomic levels. |
using UltimaXNA.Core.Diagnostics.Tracing;
using UltimaXNA.Core.Network;
using UltimaXNA.Ultima.Data;
namespace UltimaXNA.Ultima.Network.Server.GeneralInfo {
/// <summary>
/// Subcommand 0x19: the serial of the mobile which the extended stats must be applied to.
/// </summary>
class ExtendedStatsInfo :IGeneralInfo {
public readonly Serial Serial;
public readonly StatLocks Locks;
public ExtendedStatsInfo(PacketReader reader) {
int clientFlag = reader.ReadByte(); // (0x2 for 2D client, 0x5 for KR client)
Serial = reader.ReadInt32();
byte unknown0 = reader.ReadByte(); // (always 0)
byte lockFlags = reader.ReadByte();
// Lock flags = bitflags 00SSDDII
// 00 = up
// 01 = down
// 10 = locked
// FF = update mobile status animation ( KR only )
if (lockFlags != 0xFF) {
int strengthLock = (lockFlags >> 4) & 0x03;
int dexterityLock = (lockFlags >> 2) & 0x03;
int inteligenceLock = (lockFlags) & 0x03;
Locks = new StatLocks(strengthLock, dexterityLock, inteligenceLock);
}
if (clientFlag == 5) {
Tracer.Warn("ClientFlags == 5 in GeneralInfoPacket ExtendedStats 0x19. This is not a KR client.");
// If(Lock flags = 0xFF) //Update mobile status animation
// BYTE[1] Status // Unveryfied if lock flags == FF the locks will be handled here
// BYTE[1] unknown (0x00)
// BYTE[1] Animation
// BYTE[1] unknown (0x00)
// BYTE[1] Frame
// else
// BYTE[1] unknown (0x00)
// BYTE[4] unknown (0x00000000)
// endif
}
}
}
}
|
Q:
Bipartite Graph or not
I wonder if this graph a bipartite or not. As I found B-C-J is an odd-length cycle however when I draw the BFS no edge join the samen layer. Thanks
A:
It's exactly what you said, BCJ makes a cycle so it cannot be a bipartite graph.
There are another cycles, like EGABC.
You cannot have odd-length cycles in bipartite graphs, because it would mean that 2 vertices in the same side would be connected to each other.
|
Posts by MB
The final race in my Tri-ple Triathlon crown was the Ironman World Championships in Kona. After 70.3 Worlds, I flew home for a week then headed out to Kona early for a heat training camp with Siri and the team. The block in Kona couldn’t have gone better. My injury healed up and by race week in Kona I was acclimated, healthy, and ready to fly. To help illustrate my race day in Kona, my trusty best friend Keiki offered to act out the day in illustrations for me. I got up just before 4am and forced down some bread and eggs. I was so excited to get going and race morning started with some extra drama as a centipede bit Eric on our way to Starbucks. When I did arrive to the pier, I got stuck into the process of getting my bike ready for a long day. I did a little pre-race jog to loosen up things and the necessary pre-race toilet then got into the water. I lined up to the far left all by myself. I had a good start as I learned the creep from the best, Julie Dibens. Into the swim, I felt good sitting behind what I thought was the two leaders except I was being bashed by the swimmer next to me every stroke. I fought for my position but Ms. Basher wouldn’t let me go ahead of her so I settled behind her. On the way home, I was disappointed to see the swimmer in front of me had lost the feet. I pulled around and swam hard the last 900 meters to try to keep in contact with the leaders. Out of the swim, I was pleased to see that I wasn’t too far behind. It was time to ride. This race being the first Ironman I have ever been rested for I went a bit nut-bar during the first 10K of the bike where I am usually pretty conservative. I bridged up the gap to Jodie in the first two miles of the bike. When I pulled ahead to take the lead, Jodie was having none of it. She let me stay ahead for maybe a minute then re-passed me yelling that I wasn’t to go to the front if I was going to slow. Properly chastened yet again by Jodie, I let her take the lead knowing that I could help take the lead later in the race when she finally would let me go to the front. After another 10K Meredith went to the front and again I could tell Jodie was having none of it. Only this time, I could see the official eyeballing Jodie who eager to get the pace back up was sitting a hair too close to Meredith for a hair too long. I didn’t have long to ponder that as...
The hard competitive race in Hyvee left me like a wounded soldier shot in the butt. I hobbled around the entire week before 70.3 Worlds not sure if I would be able to bike or run. At the start of the week, Siri and I decided to table the issue and what and see what happened. As the week wore on I was getting treatment and finally able to bike almost normally and start jogging very slowly by Thursday. Siri and I decided to give it a try on race day and go as long as the pain didn’t get any worse. Race morning was cold and crisp more fall than summer. I woke up early and made my way to the bike transition. At least the swim looked warmed than the air with a nice steam coming off the scenic lake in Mt. Tremblant. The wetsuit swim would be nice and cozy both temperature wise and congestion as neoprene usually promises that things will be bunched together. I lined myself up at the far right side hoping that would help me stay out of the fray. It worked and I was able to get out fast and only saw Annabelle out faster to my left. Then as the faster swimmers pulled through I was able to slot in sitting comfortably behind Jodie and Helle. Out of the swim, I saw that we had a great group of strong athletes who I knew were all amazing cyclists. Right away the pack was very aggressive and I had trouble getting to the front. When I did, it only lasted for a minute as both Jodie and Daniela weren’t have any of it. I settled in for the long hard course in Mt. Tremblant as I knew the short hills in town were my strength but the stronger girls would make me suffer out on the highway with the longer less steep grades. I struggled as I thought I would on the way home and was completely dropped off and had to slowly work my way back up to Jodie and Helle only to be dropped again. I ended up riding the majority of the second half of the bike on my own at some points seeing the other girls but mostly chasing solo. It was a relief to pace the bike myself and meter out my energy to have enough to ride strong through the roly-poly out and back section that composed the last 20K of the bike ride. I averaged 235 watts for the bike ride, and was so pleased to see that I held the power through the entire ride. Off the bike, I noticed that my glute had really tighten up and wasn’t sure if I would be able to complete the run. I shortened my stride and tried to just increase my cadence and not push...
I love racing in Hyvee; the organization and event team do an amazing job every year of putting together an incredible race for the professionals. I was there in 2008, 2009, and 2010 when it was still an ITU race. This year was my first trip back to Hyvee, and it was just as memorable as a 5150/WTC event. Siri and I approached Hyvee with the goal of coming into the event very fit but un-rested since our target races were 70.3 Worlds and Kona. While it may have impacted my top gear, the body is incredibly resilient and often even without much rest I can still get a very hard effort out on race day. As a bonus, Hyvee is one of the few truly professional races where there is no downside to racing as every professional competitor walks away with a great paycheck at the end. Almost makes our sport seem well professional! Race day in Hyvee was exciting. The short races are always full-gas from the gun especially with super-fish in the race like Sara McLarty and Lauren Brandon. I had a decent swim getting only a bit bashed around a bit at the first buoy, but I was able to get past the fray with some dolphin diving on the way to the second buoy. After the first two buoys the swim settled down and I got into a comfortable rhythm sitting on feet. I raced onto the bike and went full gas from the start. My legs didn’t feel bad but I didn’t have the spark in my legs that I had in Kansas. I was very impressed with the bike legs of Jodie Swallow and Alicia Kaye. I wasn’t able to keep their pace as they bridged up to the leader Helle Frederickson. I rode solo the first two laps of the bike with some girls behind. During the second half, we picked up some of the faster swimmers and Lauren Goss pulled up to ride staggered. It was perfect as she kept our pace high during the end of the bike. Onto the run, I saw we only a small group and had a nice gap to the next girls on the road. Off the bike, my run legs felt average at best and a bit more sluggish than I would have liked. II did my best to push through the run – happy it was only 10K. With about two miles to go, all the pushing can back to bite me as I felt a strain deep in my glute. All year I have had some trouble with that muscle but I managed to train and race gingerly to not aggravate the issue. This time I was not so lucky. The last two miles of the run were a bit tough as the muscle strain prevented me from pushing and extending...
It has been over 3 weeks since the finale of my “Tri-ple Crown” the Kona Ironman World Championships. As the title of this blog would suggest, I have been slowly trying to swallow a season that hasn’t quite been what I desired. Time and distance don’t always provide answers but do inevitably allow a clearer view of the entirety of a season. Over the next week, I will release a recap of each part of the Tri-ple Crown starting with my race in Hyvee 5150 Championships, moving on to the 70.3 World Championships, the Ironman World Championships, and finishing with a summary of everything I learned this year that will help both you and me in our 2015 season. My triathlon triple crown started with the ambition to toe the start line at the three biggest championship races in non-drafting triathlon. But of course I had my personal goals to get a top ten in Hyvee, a top five in 70.3 Worlds, and a top 3 in Kona. I scrappily managed to achieve the first two goals but fell quite short of my final goal. As always, the results don’t tell the full story so I’ll cover all the gritty details in my race reports. If you played in my Tri-ple Crown Contests, Don’t forget to check my Facebook fan page to see if you are a BIG winner and thank you for playing!...
I have found that fueling is not a one-solution problem. In my experience, there is not a simple answer that works forever with every person in all race conditions. As I get more experienced at long distance racing, I have found that what I need during a race is different as my everyday diet changes, my training changes, and depending on race conditions. I need to adapt and adjust each year to find the best solution for my current body. Starting with what hasn’t changed. I do think that everyday nutrition is essential for helping to fuel and recover from training. On top of trying to eat as well as I can, I take First Endurance Multi-Vitamin and HP Optygen. Since I started taking these two daily, I have been more resilient physically and healthier. I don’t think that is a coincidence. In my first Ironman of this season, Ironman Melbourne, I screwed up in attaching my fuel to my bike and lost all my planned fuel except my two bottles of First Endurance EFS, only about 300 calories of fuel. I had to overcome and adapt but I ended the bike completely empty despite drinking the two EFS bottles and taking three bottles on course and drinking about another 400 calories from those combined bottles. It wasn’t enough calories for the 6 hours. But I found that taking EFS liquid shot flask and a banana right away in the first few miles of the run gave me 500 calories and I was able to finish the run feeling stronger and with more energy than ever before. I learned that it is never too late to fix the fueling. If you bonk, just take the time to force it in and you’ll come around. In my first race of the season, Panama 70.3, I had two EFS drink bottles and more fuel that I needed attached in supplemental gel and food attached to my bike. Unfortunately, I struggled with an unknown illness that caused me to throw up during the entire bike ride. In addition to myself, several other professional competitors in the race had a similar problem. I believe there was either a bug going around, something I ate before the race was bad, or I swallowed too much sea water during the Panama canal swim. It is hard to judge my nutrition strategy under the circumstances. The only nutrition I was able to keep down during the event was one bottle of EFS. The fact that in those hot and humid conditions that I was able to finish the race using only one bottle of EFS drink goes to show how incredible that solution is in hot humid conditions. Conversely in my most recent race, 70.3 St. George I adjusted my race morning nutrition and race day mix and had as near perfect race nutrition as possible. ... |
Mar 6 Skidservice Celebration
Thursday night at the Spa was a memorable one. A variety of clubs dedicated to improving the local and broader community were represented at Skidservice Celebration on March 5, 2015. This event was sponsored by the Office of Community Service programs and NRHH, the National Residence Hall Honorary. Free pizza was served and tickets were handed out to all purveyors for entrance into a Chipotle raffle. Live performances by some of Skidmore’s best talent, including the Accents, the Stomping Soles, Rithmos, Ujima, AKT, and the Gospel Choir entertained a crowd curious about what community outreach opportunities our campus has to offer.
Julia Diamond ‘15, a sociology major, was at the event to share information about Fight Club. Fight Club is a campus mediation service provided by students trained in conflict resolution strategies. They offer a safe and confidential space for their fellow peers who are going through difficulties in their interpersonal relationships and would like to come to a resolution. Said Diamond, “I just love watching people work through things logically and knowing that I helped them do that.”
Students participating in one of this year’s Alternative Spring Break programs called Safe Passage were present at the Celebration to fundraise for their service trip to Guatemala, as well as to recruit any individuals interested in participating in the future. In March of 2015, a handful of volunteers will be journeying to this South American country to mentor 4th and 7th grade Guatemalan children through an afterschool program. They have been meeting regularly throughout the spring semester in preparation for their trip; during these meetings, the volunteers have been planning lesson plans for the children. Jessa Henschel ‘17, a psychology major, shared her excitement about being able to reach out. Said Henschel, “We’re going to be doing team building activities, leadership activities, and teaching some of our own skills to the kids.” They are still fundraising for the trip and have a place online for supporters to donate: http://www.gofundme.com/Skidmoreinguatemala
Club members from Skidmore’s branch of UNICEF were promoting an iPhone app called the UNICEF Tap Project. This app tracks how much you play with your phone, and donates a day’s worth of clean water to deprived areas for every fifteen minutes you don’t touch your device. Jamie Scherzer ‘17, studio art and business double major, vice president of UNICEF, spoke about how much of a difference a little more clean water can make in some places. Scherzer explained, “Water-borne diseases are a huge problem. Sometimes all people have access to is really dirty water and they get ill from it. Also, governments in some countries that have water crises are making water a private utility, and so they’re putting even more restrictions on the access to local clean water.” To learn more about the Tap Project and to download the app, visit http://www.unicefusa.org/mission/survival/water/tap-project.
Jingling Zhang ‘17, a psychology and business double major, is a member of NRHH who was at the Celebration. Zhang said, “I think Skidmore has a lot of community service clubs, and some of them I had never known before. I definitely checked out some new clubs tonight.”
Most Recent Post
The Skidmore News looked into why three female political science professors are leaving Skidmore this year, and found that they are departing feeling satisfied about their teaching here and looking forward to what's ahead.
The flyers were first passed around to people unexpectedly on Broadway on the evening of February 10th. The same pamphlets were later found on a number of car windshields near downtown Saratoga the following morning.
Debates regarding free speech continue to be held on Skidmore's campus, especially in light of recent discussions regarding the potential to bring a controversial speaker to campus. Junior Carissa Jaehnert weighs in with her opinion. |
Q:
When chace clear not found 404
i create new project angular
ng new apps
and build production
ng build --prod
in route
import { HomeComponent } from './home/home.component';
import { AboutComponent } from './about/about.component';
const routes: Routes = [
{path:'', component:HomeComponent},
{path:'about', component:AboutComponent},
];
but, when i'm hosting in localhost with xampp server when clear chace and refresh page error exception 404
Not Found
The requested URL /office/about was not found on this server.
A:
We have two way for deployment angular application on IIS first is
using Hashing Strategies and another is using web.config.
Using Hashing Strategies you will get # in url. But It'll not break the url or display 404 error, if user refersh the page or press F5 button.
e.g.
In Main module use useHash:true.
@NgModule({
imports: [RouterModule.forRoot(routes,{useHash:true})],
exports: [RouterModule]
})
And second way without using Hashing Strategies. But we need configure it on IIS level and code level as well.
Step 1: On IIS level, you should need to check the url-rewrite functionality is allowed or not. if not then you need to download rewrite_2.0_rtw_x86.exe or rewrite_2.0_rtw_x64.exe for 86 or 64 bit operating system. And then run as administrator level.
Step 2: Create a web.config file and copy and paste the below code.
<?xml version="1.0" encoding="utf-8"?>
<configuration>
<system.webServer>
<rewrite>
<rules>
<rule name="Angular Routes" stopProcessing="true">
<match url=".*" />
<conditions logicalGrouping="MatchAll">
<add input="{REQUEST_FILENAME}" matchType="IsFile" negate="true" />
<add input="{REQUEST_FILENAME}" matchType="IsDirectory" negate="true" />
</conditions>
<action type="Rewrite" url="/index.html" />
</rule>
</rules>
</rewrite>
</system.webServer>
</configuration>
Step 3. copy the web.config file and paste it where you application hosted on root level.
|
近藤ゆかり最新番号
【DUVV-009】徳島で見つけた田舎ピュア娘が中出しAVデビュー 近藤ゆかり</a>2014-09-25豊彦$$$豊彦企画117分钟 |
CIA Director Mike Pompeo Michael (Mike) Richard PompeoOvernight Defense: Pentagon redirects pandemic funding to defense contractors | US planning for full Afghanistan withdrawal by May | Anti-Trump GOP group puts ads in military papers Overnight Defense: House Democrats unveil stopgap spending measure to GOP opposition | Bill includes .6B for new subs | Trump issues Iran sanctions after world shrugs at US action at UN Navalny calls on Russia to return clothes he was wearing when he fell ill MORE will face the Senate Foreign Relations Committee on Thursday as he seeks to become President Trump Donald John TrumpOmar fires back at Trump over rally remarks: 'This is my country' Pelosi: Trump hurrying to fill SCOTUS seat so he can repeal ObamaCare Trump mocks Biden appearance, mask use ahead of first debate MORE’s next secretary of State.
Pompeo, who was nominated after former Secretary of State Rex Tillerson Rex Wayne TillersonGary Cohn: 'I haven't made up my mind' on vote for president in November Kushner says 'Alice in Wonderland' describes Trump presidency: Woodward book Conspicuous by their absence from the Republican Convention MORE was fired, would have to hit the ground running on a number of hot-button issues around the world, from the war in Syria to a historic U.S.-North Korea summit to the fast-approaching deadline on the Iran nuclear deal.
He’ll also likely have to answer for his House record as a hawk who took controversial stances on issues such as torture, as well as whether or not he will challenge any of Trump’s positions.
ADVERTISEMENT
Pompeo is expected to face a difficult battle for confirmation. He was confirmed as CIA director on a 66-32 vote that included support from 14 Democrats. But some Democrats have indicated they may not support him this time around.
And one of the Foreign Relations Committee’s Republicans has already announced his opposition, meaning Pompeo could be voted down in committee if he gets no Democratic votes.
Here are five things to watch as Pompeo works to win over senators.
What’s his position on Russia?
Trump has been accused of being too soft on Moscow and has lashed out at the various investigations into possible collusion between his campaign and Russia during the presidential election.
Meanwhile, the two nuclear powers are staring each other down and trading threats over Syria, where Syrian President Bashar Assad, who's backed by Moscow, is suspected of carrying out another chemical weapons attack against civilians.
Pompeo will likely face questions over his position on Syria, his record when it comes to Russia and whether he agrees with Trump’s criticisms of the investigations into the campaign, particularly amid rising concerns over the fate of special counsel Robert Mueller Robert (Bob) MuellerCNN's Toobin warns McCabe is in 'perilous condition' with emboldened Trump CNN anchor rips Trump over Stone while evoking Clinton-Lynch tarmac meeting The Hill's 12:30 Report: New Hampshire fallout MORE.
ADVERTISEMENT
Pompeo found himself at the center of several incidents related to the matter while serving as CIA director. The agency had to walk back his October comment that Russia’s meddling didn’t affect the outcome of the election; the intelligence community has made no such assessment.
At Trump’s behest, Pompeo also reportedly met with a former intelligence official pushing a disputed theory that the Democratic National Committee hack was an inside job, rather than done by the Russians. And Pompeo raised eyebrows in January when he met with two top Russian spy chiefs, one of whom is subject to U.S. sanctions.
How will he handle North Korea?
The administration is in the midst of planning a historic meeting between Trump and North Korean leader Kim Jong Un that the White House says will take place in May or June.
As CIA director, Pompeo is already in the thick of it, reportedly taking the lead on back-channel communications with Pyongyang to lay the groundwork for the summit.
But senators will want to know how he’ll handle North Korea as the U.S.’s top diplomat. In particular, Pompeo made waves last year for comments many inferred as supporting regime change.
"It would be a great thing to denuclearize the peninsula, to get those weapons off of that, but the thing that is most dangerous about it is the character who holds the control over them today," Pompeo said at the Aspen Security Forum in July.
"So from the administration's perspective, the most important thing we can do is separate those two. Right? Separate capacity and someone who might well have intent and break those two apart," he said.
Does he support rolling back the Iran deal?
Another issue that would face Pompeo immediately after he steps in the door at Foggy Bottom is the Iran nuclear deal — or, depending on how fast he is confirmed, the potential fallout from the U.S. withdrawing.
Trump set a May 12 deadline for European allies to agree to improve the nuclear accord, with the ultimatum that the U.S. will essentially withdraw by refusing to renew sanctions waivers.
While a member of Congress in 2016, Pompeo argued that the Iran deal “virtually guaranteed that Iran will have the freedom to build an arsenal of nuclear weapons.” Following Trump’s election but before he became CIA director, Pompeo said he looked “forward to rolling back this disastrous deal.”
But, as senators have noted, being a congressman and being secretary of State are two different things. As such, they’ll press him on whether he still wants to roll the deal back and what the administration’s latest thinking is as the deadline approaches.
How will he address the torture question?
ADVERTISEMENT
One senator on the committee — maverick Rand Paul Randal (Rand) Howard PaulSecond GOP senator to quarantine after exposure to coronavirus GOP senator to quarantine after coronavirus exposure The Hill's Morning Report - Sponsored by National Industries for the Blind - Trump seeks to flip 'Rage' narrative; Dems block COVID-19 bill MORE (R-Ky.) — has already indicated that he will oppose Pompeo on the basis of his past support for the use of "enhanced interrogation techniques" now commonly characterized as torture.
Pompeo will almost certainly face a repeat of the grilling that lawmakers on the Senate Intelligence Committee gave him on the topic during his confirmation for CIA director.
At the time, he told lawmakers that he would "absolutely not" comply with an order from the president to resume the use of techniques like waterboarding — but noted that "I can't imagine that I would be asked that" by President Trump, who on the campaign trail publicly called for the resumption of torture.
Human rights organizations have already raised alarms over Pompeo as secretary of State, calling for serious scrutiny of his past record on the issue.
From his former post on the House Intelligence Committee, Pompeo condemned new Obama administration rules limiting government interrogators to techniques in the Army Field Manual — regulations that are up for review this year.
Will he tackle the reports of low morale at State?
Pompeo will almost certainly be pressed on the issue of morale at the State Department, which by all accounts plummeted under Tillerson. Career staffers complained of being marginalized, sidelined and cut out of the policymaking process under the former top diplomat, who did not enjoy an in-sync relationship with the president and whose department restructuring effort was expected at one point to make dramatic staffing cuts.
ADVERTISEMENT
A number of career and appointed positions at the department still remain vacant.
It’s unclear whether Pompeo wants to continue with Tillerson’s reorganization plan. State Department spokeswoman Heather Nauert said after Pompeo’s nomination that the department would compile information for him and that he can “choose what he wants to do with it.”
But some at State have reportedly viewed Pompeo with a certain amount of hope that his close relationship with the president will herald a more robust role for Foggy Bottom.
Updated April 12 at 7:51 a.m. |
/* $OpenBSD: if_trunk.c,v 1.30 2007/01/31 06:20:19 reyk Exp $ */
/*
* Copyright (c) 2005, 2006 Reyk Floeter <reyk@openbsd.org>
* Copyright (c) 2007 Andrew Thompson <thompsa@FreeBSD.org>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include <sys/cdefs.h>
__FBSDID("$FreeBSD$");
#include "opt_inet.h"
#include "opt_inet6.h"
#include <sys/param.h>
#include <sys/mbuf.h>
#include <sys/fnv_hash.h>
#include <net/ethernet.h>
#if defined(INET) || defined(INET6)
#include <netinet/in.h>
#endif
#ifdef INET
#include <netinet/ip.h>
#endif
#ifdef INET6
#include <netinet/ip6.h>
#endif
static const void *
m_ether_tcpip_hash_gethdr(const struct mbuf *m, const u_int off,
const u_int len, void *buf)
{
if (m->m_pkthdr.len < (off + len)) {
return (NULL);
} else if (m->m_len < (off + len)) {
m_copydata(m, off, len, buf);
return (buf);
}
return (mtod(m, char *) + off);
}
uint32_t
m_ether_tcpip_hash_init(void)
{
uint32_t seed;
seed = arc4random();
return (fnv_32_buf(&seed, sizeof(seed), FNV1_32_INIT));
}
uint32_t
m_ether_tcpip_hash(const uint32_t flags, const struct mbuf *m,
const uint32_t key)
{
union {
#ifdef INET
struct ip ip;
#endif
#ifdef INET6
struct ip6_hdr ip6;
#endif
struct ether_vlan_header vlan;
uint32_t port;
} buf;
struct ether_header *eh;
const struct ether_vlan_header *vlan;
#ifdef INET
const struct ip *ip;
#endif
#ifdef INET6
const struct ip6_hdr *ip6;
#endif
uint32_t p;
int off;
uint16_t etype;
p = key;
off = sizeof(*eh);
if (m->m_len < off)
goto done;
eh = mtod(m, struct ether_header *);
etype = ntohs(eh->ether_type);
if (flags & MBUF_HASHFLAG_L2) {
p = fnv_32_buf(&eh->ether_shost, ETHER_ADDR_LEN, p);
p = fnv_32_buf(&eh->ether_dhost, ETHER_ADDR_LEN, p);
}
/* Special handling for encapsulating VLAN frames */
if ((m->m_flags & M_VLANTAG) && (flags & MBUF_HASHFLAG_L2)) {
p = fnv_32_buf(&m->m_pkthdr.ether_vtag,
sizeof(m->m_pkthdr.ether_vtag), p);
} else if (etype == ETHERTYPE_VLAN) {
vlan = m_ether_tcpip_hash_gethdr(m, off, sizeof(*vlan), &buf);
if (vlan == NULL)
goto done;
if (flags & MBUF_HASHFLAG_L2)
p = fnv_32_buf(&vlan->evl_tag, sizeof(vlan->evl_tag), p);
etype = ntohs(vlan->evl_proto);
off += sizeof(*vlan) - sizeof(*eh);
}
switch (etype) {
#ifdef INET
case ETHERTYPE_IP:
ip = m_ether_tcpip_hash_gethdr(m, off, sizeof(*ip), &buf);
if (ip == NULL)
break;
if (flags & MBUF_HASHFLAG_L3) {
p = fnv_32_buf(&ip->ip_src, sizeof(struct in_addr), p);
p = fnv_32_buf(&ip->ip_dst, sizeof(struct in_addr), p);
}
if (flags & MBUF_HASHFLAG_L4) {
const uint32_t *ports;
int iphlen;
switch (ip->ip_p) {
case IPPROTO_TCP:
case IPPROTO_UDP:
case IPPROTO_SCTP:
iphlen = ip->ip_hl << 2;
if (iphlen < sizeof(*ip))
break;
off += iphlen;
ports = m_ether_tcpip_hash_gethdr(m,
off, sizeof(*ports), &buf);
if (ports == NULL)
break;
p = fnv_32_buf(ports, sizeof(*ports), p);
break;
default:
break;
}
}
break;
#endif
#ifdef INET6
case ETHERTYPE_IPV6:
ip6 = m_ether_tcpip_hash_gethdr(m, off, sizeof(*ip6), &buf);
if (ip6 == NULL)
break;
if (flags & MBUF_HASHFLAG_L3) {
p = fnv_32_buf(&ip6->ip6_src, sizeof(struct in6_addr), p);
p = fnv_32_buf(&ip6->ip6_dst, sizeof(struct in6_addr), p);
}
if (flags & MBUF_HASHFLAG_L4) {
uint32_t flow;
/* IPv6 flow label */
flow = ip6->ip6_flow & IPV6_FLOWLABEL_MASK;
p = fnv_32_buf(&flow, sizeof(flow), p);
}
break;
#endif
default:
break;
}
done:
return (p);
}
|
/*
* Driver for the Conexant CX25821 PCIe bridge
*
* Copyright (C) 2009 Conexant Systems Inc.
* Authors <shu.lin@conexant.com>, <hiep.huynh@conexant.com>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
*
* GNU General Public License for more details.
*/
#include <linux/module.h>
#include "cx25821.h"
/********************* GPIO stuffs *********************/
void cx25821_set_gpiopin_direction(struct cx25821_dev *dev,
int pin_number, int pin_logic_value)
{
int bit = pin_number;
u32 gpio_oe_reg = GPIO_LO_OE;
u32 gpio_register = 0;
u32 value = 0;
/* Check for valid pinNumber */
if (pin_number >= 47)
return;
if (pin_number > 31) {
bit = pin_number - 31;
gpio_oe_reg = GPIO_HI_OE;
}
/* Here we will make sure that the GPIOs 0 and 1 are output. keep the
* rest as is */
gpio_register = cx_read(gpio_oe_reg);
if (pin_logic_value == 1)
value = gpio_register | Set_GPIO_Bit(bit);
else
value = gpio_register & Clear_GPIO_Bit(bit);
cx_write(gpio_oe_reg, value);
}
EXPORT_SYMBOL(cx25821_set_gpiopin_direction);
static void cx25821_set_gpiopin_logicvalue(struct cx25821_dev *dev,
int pin_number, int pin_logic_value)
{
int bit = pin_number;
u32 gpio_reg = GPIO_LO;
u32 value = 0;
/* Check for valid pinNumber */
if (pin_number >= 47)
return;
/* change to output direction */
cx25821_set_gpiopin_direction(dev, pin_number, 0);
if (pin_number > 31) {
bit = pin_number - 31;
gpio_reg = GPIO_HI;
}
value = cx_read(gpio_reg);
if (pin_logic_value == 0)
value &= Clear_GPIO_Bit(bit);
else
value |= Set_GPIO_Bit(bit);
cx_write(gpio_reg, value);
}
void cx25821_gpio_init(struct cx25821_dev *dev)
{
if (dev == NULL)
return;
switch (dev->board) {
case CX25821_BOARD_CONEXANT_ATHENA10:
default:
/* set GPIO 5 to select the path for Medusa/Athena */
cx25821_set_gpiopin_logicvalue(dev, 5, 1);
mdelay(20);
break;
}
}
|
Total knee arthroplasty in patients with substantial deformities using primary knee components.
Although advocated for severe varus and valgus deformities, constrained implant designs are associated with a number of disadvantages in total knee arthroplasty (TKA). Combining a minimally invasive surgical approach with an interchangeable posterior stabilized (PS) implant design may allow adequate soft tissue balancing with a minimal amount of constraint and without residual instability. Retrospectively 51 patients operated with the minimally invasive far medial subvastus approach for severe varus or valgus deformity, who underwent primary TKA with a fully interchangeable PS implant (Vanguard, Biomet Inc., Warsaw IN, USA) between 2009 and 2013 were examined. Soft tissue releases was performed using a piecrust needling technique. Preoperative alignment and surgical parameters were collected for all patients. All patients underwent preoperative and follow-up radiographic assessment and completed a battery of clinical assessments. All procedures were performed successfully, with alignment improving from a preoperative mean (SD) varus deformity of 165° (3°) and a mean (SD) valgus deformity of 196° (4.5°) to an overall mean (SD) postoperative mechanical alignment of 179.5° (3.0°). Nine patients had postoperative varus, while three patients had a postoperative valgus deviation from neutral alignment >3°. The mean change in joint line position in extension was -0.0 ± 0.6 mm. Clinical scores at final follow-up were excellent for both groups. Good TKA outcomes can be achieved in patients with substantial varus or valgus deformities using a combination of a minimally invasive far medial subvastus approach, interchangeable PS implants and soft tissue releases with a piecrust needling technique. III. |
JavaScript must be enabled in order for you to use this site. However, it seems JavaScript is either disabled or not supported by your browser. Enable JavaScript by changing your browser options, and then try again.
If you’re shopping for an upright vacuum, browse the selection from Grainger first. Clean everything from hard floors to thick carpets with these commercial vacuums. Choose the path width, from 10”W up to 30”W, that’ll necessitate the least number of passes without being too cumbersome for the space being vacuumed. You’ll find vacuums that come with disposable bags as well as bagless vacuum cleaners that collect dust and dirt in a cylindrical container you can empty right into the trash. Many vacuums include some form of filtration, such as HEPA filters, to capture particulates. Rely on Grainger to supply you with a wide range of upright vacuum choices to help you keep your facility clean and tidy. |
European grants: the experience of cafebabel.com
Alexandre HEULLY - Communication Manager of cafebabel.com
Could you please present your structure and the special features that make CafeBabel original among the European media ?
Cafebabel.com is the first European magazine translated in 6 languages on Internet (English, French, Dutch, Spanish, Polish and Italian) that targets the « eurogeneration », young Europeans from 18 to 30 years old. Created in 2001 by Erasmus students, cafebabel.com is an association based on the concept of quality participative journalism, which aims at conciliating the energy of participative action with a professional journalism.
Lire_La_Suite
Could you please present your structure and the special features that make CafeBabel original among the European media ?
Cafebabel.com is the first European magazine translated in 6 languages on Internet (English, French, Dutch, Spanish, Polish and Italian) that targets the « eurogeneration », young Europeans from 18 to 30 years old. Created in 2001 by Erasmus students, cafebabel.com is an association based on the concept of quality participative journalism, which aims at conciliating the energy of participative action with a professional journalism.
Today, the association is made of more than 1000 voluntary contributors through all Europe that work on the editorial content, and 12 employees in Paris and Warsaw in charge of the edition and coordination work. The aim of cafebabel.com is to contribute to the emergence of a European public opinion and to give current events a European perspective.
You have been financed by European grants . Which funding programme did you apply for and what process did you follow? Have you met any difficulty ?
Cafebabel.com succeeded in obtaining various European aids. Among them, a notable example was a grant from the Youth Programme ; thanks to our multinational team, we have been able to obtain this aid more easily. We have been allowed a functioning grant from the Directorate General for Education and Culture in 2005 under the Support to Organisations and Civil Societies with a European interest ; the process has been a little bit longer and more complicated because of the stricter eligibility criteria, notably the obligation to have an employee with at least one year's service. Others funds helped us, still through the Directorate General for Education and Culture as part of the Active Citizenship financed actions , and recently we solicited the European Parliament support for our 2009 elections project.
We were aware of these grants thanks to our research on Internet. It is important to have people dedicated to applications on a full-time basis, because this kind of work demands time and strictness. Deadlines are often short so you have to be really reactive. Moreover, important resources must be planned for writing activity reports, and especially for financial reports which are often significant.
What do you think about the communication on European fundings? Do you think it reaches potential project leaders enough?
European Institutions work with a transparency culture. Information is sometimes excessive, but it is systematically available on EU websites. We are also keen on stressing the high availability showed by our contacts in the Directorates General during the application process. These grants have been a significant element for our development, which is why I think it is important for project leaders to make a monitoring work on released calls for proposals.
Notice: Undefined variable: interviewList in /var/www/site/countries.welcomeurope.com/apps/frontend/modules/interview/templates/showSuccess.php on line 67
Notice: Undefined variable: news in /var/www/site/countries.welcomeurope.com/apps/frontend/modules/interview/templates/showSuccess.php on line 90
Notice: Trying to get property of non-object in /var/www/site/countries.welcomeurope.com/apps/frontend/modules/interview/templates/showSuccess.php on line 90
Hide |
Ngati Koroki Kahukura, a small Waikato iwi, has signed a deed of settlement with the Crown covering all historic Treaty claims. Treaty Negotiations Minister Christopher Finlayson said the actions of the Crown had "led to the economic, social, environmental and cultural degradation" of the iwi as he announced the $3 million settlement.
It also vests the Maungatautari scenic reserve with the iwi while ensuring public access. It was the 10th deed of settlement inked this year.Minister 'ignored' Novopay system test
The Government spent more than $1 million on consultants as part of a switchover of teachers' payroll to Novopay, including $650,000 on testing the system. Labour's Chris Hipkins said the money spent on the testing was "completely ignored", with neither Education Minister Hekia Parata nor associate minister Craig Foss asking to see the results. The results showed less than half the users were comfortable with the system.
SkyCity happy with fewer pokies in convention deal
SkyCity chief executive Nigel Morrison has revealed the company wants fewer pokie machines in return for building a convention centre at its Auckland casino than previously signalled. Speaking on RadioLive, Mr Morrison said the company wanted "around 300" additional gaming machines, down from previous hints from the Government that it was seeking 450 more. The deal is also expected to include an extension to SkyCity's gaming licence.
Horan urges Speaker hopefuls to get in touch
With all the talk of who MPs will elect as the next Speaker, Brendan Horan clearly feels a bit left out. On Wednesday he wrote to Maurice Williamson, David Carter and Tau Henare, explaining that he had read in The Dominion Post that the rivals for the Speaker's chair "have been talking up their credentials to all and sundry".
"Equally, as an independent Member of Parliament, I look forward to hearing from you in due course." |
[Comparative sensitivity of 2 carboxylesterases from the reindeer liver to various inhibitors].
The sensitivity to the inhibitor of two forms of reindeer liver carboxylesterases differing in electrophoretic mobility and conventionally termed as "slow" and "fast" forms were investigated. The rate constants for the interaction of organophosphorous irreversible inhibitors--diisopropylfluorophosphate (DPP) and two methylthiophosphonic acid thioesters--C5H11O(CH3)P(O)S(CH2)SCH2C(O)OCH3 (Sh-205) and, C8H17O(CH3)P(O)S(CH2)SCH2C(O)OCH2 (Sh-207)--with the "fast" form are hundreds of times as high as those with the "slow" one. The rate constants for irreversible carbamate inhibitor interaction byehone with both carboxylesterase forms were approximately equal to 1.2 X 10(3) M-1 X min-1 and 2.0 X 10(3) M-1 X min-1, respectively. The reversible inhibitors potassium benzylate and kathapin also inhibited the "fast" carboxylesterase form in the indophenylacetate (IPA) hydrolysis reaction (770 and 1700-fold, respectively). On the contrary, N-methylpiperidinyl ester of benzyl acid inhibited the "slow" form three times stronger. Carbophos reversibly inhibited IPA hydrolysis in the presence of both enzyme forms, but the carboxyester carbophos group was hydrolyzed at a measurable speed only by the "slow" form. |
The White House would forge ahead with military action in Libya even if Congress passed a resolution constraining the mission, Secretary of State Hillary Clinton said during a classified briefing to House members Wednesday afternoon.
Clinton was responding to a question from Rep. Brad Sherman (D-CA) about the administration's response to any effort by Congress to exercise its war powers, according to a senior Republican lawmaker who attended the briefing.
The answer surprised many in the room because Clinton plainly admitted the administration would ignore any and all attempts by Congress to shackle President Obama's power as commander in chief to make military and wartime decisions. In doing so, he would follow a long line of Presidents who have ignored the act since its passage, deeming it an unconstitutional encroachment on executive power.
...............
The War Powers Act of 1973, passed in the aftermath of the Vietnam War, puts limits on the ability of the President to send American troops into combat areas without congressional approval. Under the act, the President can only send combat troops into battle or into areas where ''imminent'' hostilities are likely, for 60 days without either a declaration of war by Congress or a specific congressional mandate.
34. The constitution has a clause to specifically prevent standing armies.
Which has been ignored longer than anybody here has been alive, and only Congress is supposed to authorize war, so yes, we have torn the Constitution to pieces, even if most of the tears have been pre-Obama, this is only another one, a bit more damaging coming from a purported "liberal" and winner of the Nobel Peace Prize.
Our nation had better address the violations of the Constitution, somehow. Either by amending it to reflect current reality or, better, cutting back on Executive power. Otherwise, nobody knows where the power of the President stops.
I didn't think it was necessary for me to cite it. It's easy enough to find in the Constitution online and use a browser that has a "find" feature, but you didn't even look. You just presumed I was lying or misinformed. Here:
Article 1, Section 8, Clause 12:
"To raise and support Armies, but no Appropriation of Money to that Use shall be for a longer Term than two Years;"
Why would it limit the appropriation to two years after it says Congress has that power? The Constitution doesn't make another specific limit like this on any other power of Congress. It doesn't make it on the Navy, whose Clause is immediately below. That looks like a limit on a standing army to me.
What's the election cycle on the House of Representatives? Two years. In other words, the House (where appropriation bills have to start) doesn't have the power to extend an appropriation for an army (not a military intervention or a war, but the army itself) for two years. Meaning also people would get to vote between the time it forms an army and its next appropriation.
If you're going to say we can't limit executive power by legal means, you might as well just flush the Constitution, because that's the idea behind the entire document. Not doing that is the same view of executive power dictatorships take. Why wouldn't every branch of government need this "flexibility" to "help" the president? Remember, the Constitution is there to prevent dictatorship, and it's odd that you see the necessity for loosening restraints on the Office of government that naturally threatens it the most.
And given Obama's enthusiastic grasping and extension of executive powers that Dubya pioneered, I'd say dictatorship is exactly the threat now.
There are two other places where the Constitution looks decidedly anti-standing army. One of them is the Second Amendment, and if you look at the first draft of it, in the Constitution of Virginia written by Thomas Jefferson, you see that.
Really, if this is the current reality where we need an expensive standing army, we should amend the Constitution to reflect that. Keeping it the way it is just invites disrespect for the rest of it, where whole sections can be declared "impractical."
Sorry to hear it though not surprised unless they make good on their promises to not get more involved. I'm not especially confident that they'd do that dispite what they claim given their steady drift to the right.
The gopers are hopeful to get a goper into the Prez office. In trying to impeach Prez O they would eff up what they desire the most, total control and one is the ability to go to war w/o approval from congress. Y'know they are itching to attack Iran.
So what if impeaching Obama would hinder the goal of formally establishing an imperial presidency that can go to war without congressional approval?
Of course, they would ever think of impeaching him for violating the constitution, well, not a real violation of the constitution, any way. They'll impeach him for a blow job. And if that isn't true, then they'll make it up and suborn perjury with a video tape provided by Andrew Breitbart and funded by the Koch brothers.
30. To be fair the extent of their stance has been that if Obama does it, it must be for a reason
Edited on Wed Mar-30-11 07:02 PM by liberation
and thus perfectly reasonable. Which is why these New Dems are totally different from the Old Republicans who used to support whatever Bush did, because it must have been for a reason, and thus perfectly reasonable.
I am frankly very entertained, it is amusing to see a Dem president implement a military intervention (we do not have wars anymore) and seeing some of the die hard Dems use some of the very same justifications (language even) than the die hard Republicans used during the run up to Iraq.
36. it will be even more entertaining when the self-fufilling prophecy of president palin..
rears it's fugly head. will the people who support our actions in afghanistan and libya because of a democratic admin still support them? or will the hypocrisy be on full display (again) as their views flip 180 degrees?
We would all expect any republican to thumb his nose at Congress this way. Or a professional triangulator like Clinton who constantly tried to act like a Republican. It looks like the only time Obama isn't a coward is when he's emulating Clinton, or his hero Reagan, and setting himself up against the left.
72. Not so simple. Start with the Constitution, which gives Congress the
Edited on Thu Mar-31-11 01:54 PM by No Elephants
EXCLUSIVE power to raise armies and navies (then being the only kind of troops known), the EXCLUSIVE power to declare war and the EXCLUSIVE power to fund wars (or anything else). And, subject to the foregoing exclusive powers of Congress, the President has Constitutional power as Commander in Chief of the troops (though Congress has power.
(That way, a good portion of the people who voted to declare war will answer for their votes at the polls within two years, at most.)
So far, so good, from the Continental Congress until 1950-1962 or so.
However, then came the Korean "Police Action" and the Vietnam Something or Other, where Presidents got us involved in wars without so much as a "by your leave" to Congress, raising serious Constitutional "questions, to put it euphemistically. So, we got the War Powers Resolution of 1963.
Btw, anything passed by Congress and signed by the President (or veto overridden) as the Constitution provides IS a law, regardless of whether they call it "law" or "resolution" or "Harry." However, as with any law, the question arises, "Is the War Powers Resolution a Constitutionally valid law, or does the War Powers Resolution conflict with/violate the Constitution?"
Some say, "It's Constitutional." Some say, "No, it provides for an unconstitutional delegation to the President of Congress' EXCLUSIVE power to declare war." Still others say, "No, it's an unconstitutional restriction on the powers of the President as Commander in Chief."
And, now, we have the Executive Branh not only starting a war without a delaration of war by Congress, as required by the Constitution, but also saying it will ignore Congress if Congress says "Stop," as the War Powers Resolution of 1963 gives Congress the power to do.
However, Obama consulted with the leadership of both the house and senate before taking action...and then there's this...Senate Resolution 85 which passed on march, 1st unanimously...
(7) urges the United Nations Security Council to take such further action as may be necessary to protect civilians in Libya from attack, including the possible imposition of a no-fly zone over Libyan territory;
After Bush and Iraq it's easy to fear presidential power but you have to consider that Afghanistan had congressional preapproval and turned out just as bad and in neither case did congress ever formally declare war, nor will you see congress formally declare war again because they recognised with the war powers act that having a presidential scapegoat made politics easier for congress.
So, the GOP finds themselves being the peaceniks verses a purportedly weak, Democratic president? I never thought I'd see the day. I can't wait for them to organize sit ins and marches for peace, armed to the teeth. This is Vietnam: The Farce.
47. Obama was "lecturer in law" was not a "professor", and there is a difference.
Professors of law are subject to the "publish or perish" rule of all academics. Lecturers are generally exempt, and are more like adjuncts.
Obama has not published any significant legal scholarship on this or any other legal topic. If he had, I'm sure that we would have heard about it by now. At Harvard in his day, members of the Law Review were not forced to submit legal scholarship to be published in the Law Review. This appears to be different from many law reviews and journals, particularly that of Yale, Harvard's competitor, where at the time Obama was in law school, each member of the Law Journal had to write a substantial piece of legal scholarship that was of publishable quality.
It has been reported that a friend of his from the Law Review, who is now a real professor at Georgetown Law School, that Obama found the Constitution to be a flawed document, but I don't recall that the professor disclosed details of Obama's views, which I think would be helpful here.
In sum, Obama was not a professor and published no material that would give us a real idea of how his legal mind works or what his theory of the Constitution actually is.
86. Many think that the War Powers Act is unconstitutional, BUT that analysis
Edited on Thu Mar-31-11 03:33 PM by No Elephants
cuts both ways. Please see Reply 72 (as amended by Reply 80).
Since he's a former law professor, perhaps people will listen this time."
Obama has had no He's had no legal education beyond 3 years of law school, like any lawyer who did not pursue his or her educatiion beyod law school.
Obama then got a job as a lawyer and a part-time job teaching Constitutional law, which he did for a number of years (10?). None of that does means Obama is at the level of a constitutional law scholar or expert.
Lifelong Constitutional law scholars disagree about the War Powers Resolution. What in hell would make someone who taught Constitutional law on a part time basis the final authority on these issues?
103. You don't think there are "boots on ground" in Libya? CIA wears Sneakers?
Yeah...there's a bridge in Brooklyn that's for sale. We already have American Educated "Shadow Government" we allowed back into Syria that is in place to "manage the coup" if and when Ghaddafi leaves. So, this is already Orchestrated. It was in the NeoCons Plan back under Bush.
The sad thing is that Obama and Hillary are following the NeoCon Plan. I didn't vote for Obama for MORE NEO-CONS! Did YOU?
I'm amazed she would say something this dumb. While it's true that every president since 1973 has regarded War Powers as unconstitutional, definitely not without justification, this kind of comment only makes Congress mad for no good reason. I don't mean just the idiots on the right, but everybody. This is patronizing to an equal branch of government. I'm rather ambivalent on the whole Libya bit myself, or maybe just indecisive, but this is not a situation where you tell Congress to go to hell. Libya just doesn't justify a fight with Congress over War Powers. The difference between who wins and loses there is extremely important to Libyans, but it will minimal impact on most Americans' lives.
97. "The White House would forge ahead with military action in Libya..."
....Hillary knows it doesn't matter what the Constitution says about war as long as fat tony and the fascists control the game....
....every Washington politician understands that the President declares war and we schmucks pay for them....it's called a 'division of labor'....how else would we ever be able to maintain our assembly line of perpetual war....
Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators
Important Notices: By participating on this discussion
board, visitors agree to abide by the rules outlined on our Rules
page. Messages posted on the Democratic Underground Discussion Forums are the
opinions of the individuals who post them, and do not necessarily represent
the opinions of Democratic Underground, LLC. |
Trump's approval improves, yet Dems still lead for the House Donald Trump’s job approval rating advanced to its second-highest of his career
Donald Trump’s job approval rating advanced to its second-highest of his career in a new ABC News/Washington Post poll, but not by enough to erase a double-digit Democratic lead in midterm election vote preferences.
Boosted by comparatively strong ratings on the economy, Trump has 41 percent approval for his work in office overall, up from 36 percent in late August. Still, 54 percent disapprove – a problem for the Republican Party, given that most potential voters say they’re looking for candidates who share their opinion of the president.
See PDF for full results, charts and tables.
Democratic candidates for the House lead Republicans by 11 percentage points among registered voters, 53-42 percent. That holds among likely voters across a range of turnout scenarios, with 12- to 14-point Democratic leads. It’s difficult for Democrats to hold their vote share in the shift from registered to likely voters, especially in midterms – a testament to Democratic motivation this year.
The Democrats’ advantage reflects a wide gender gap in this poll, produced for ABC by Langer Research Associates. Women who are registered to vote support Democratic candidates by 59-37 percent, while men split about evenly, 46-48 percent. That, in turn, reflects these women’s more negative views of Trump – they’re 16 points more apt than men to disapprove of his work in office. As reported Friday, they’re also more critical of his latest Supreme Court nominee, Brett Kavanaugh.
If it holds on Election Day, the current 24-point gender gap in House vote preference would be the widest on record for a midterm election in exit polls dating back to 1982 (albeit slightly; it was 21 points in 1994 and 20 in 2014).
Women also now express a disproportionate sense of urgency: Seventy percent say it’s more important to them to vote this year than in past midterms, more than the 62 percent of men who say so. In August it was even, 65 percent in both groups.
While this survey points to continued tailwinds for the Democrats, some results offer hope to the GOP. One is the bump in Trump’s approval; the other is that fewer registered voters now say they’d rather see the Democrats win control of the House, to act as a check on Trump – still a majority, 54 percent, but down from 60 percent in late August.
Issues
Still, the Democrats’ midterm advantages are reflected across a range of issues. Health care is the most striking: The public by a broad 53-35 percent trusts the Democratic Party more than the Republicans to handle this issue, and 82 percent call it highly important in their vote, matching the economy in the top slot for potential vote impact.
Perhaps echoing the Kavanaugh controversy, Americans trust the Democrats over the GOP to handle “equal treatment of men and women in U.S. society” by an even wider margin, 55-29 percent – and 76 percent call this especially important in their vote.
The Democrats also lead in trust to change the way Washington works (45-35 percent, also highly important to 76 percent), as well as to handle immigration (50-38 percent, highly important to 70 percent) and Supreme Court nominations (49-38 percent, with 66 percent calling it highly important).
The Republicans are more competitive on two remaining issues – a close 41-45 percent Democratic-Republican split in trust to handle the economy, and 45-42 percent on taxes. Typically, when the Democrats are competitive on taxes, the GOP has a problem.
With voter registration still open, these results are among all adults. But they’re highly similar among registered and likely voters alike. (There are two exceptions: The Democrats’ lead on immigration narrows in some likely voter models, and the importance of Supreme Court nominations gains.)
In a more general measure, the Democratic Party has an 8-point lead over the Republican Party, 45-37 percent, in trust to handle the main problems facing the country. This, too, holds among registered and likely voters alike. And it includes a shift by gender: In 2014, women divided by 41-36 percent, Democratic-Republican, on this question; now it’s 53-32 percent among women. Results among men are unchanged in the same period – 37-42 percent then and now.
Trump
Trump, for his part, has the highest approval rating of his career for handling the economy, 49 percent, with 46 percent disapproving. But his overall approval has remained in a 36-42 percent band since he took office, averaging 38 percent – the lowest average approval for a president in his first 20 months in office in polling dating back to Harry S. Truman.
Similarly, at 41 percent today, Trump’s approval rating is the lowest for a president heading into his first midterm election since Truman in 1946. (Truman’s party lost 54 House seats.)
Trump’s low approval is a substantial problem for his party. Among registered voters who disapprove of the president, 64 percent say it’s extremely or very important to them to support a candidate who shares their opinion of him. Among those who approve of Trump, 57 percent say the same. That 7-point gap was not present last month. Moreover, the fact that Trump is 10 points more unpopular than popular among registered voters (53-43 percent) puts his party at a disadvantage.
2006
Vote preference of 53-42 percent, D-R, looks not at all like the 2014 midterms, when ABC/Post polling at this point showed an essentially even 46-44 percent split, or 2010, when it was 47-43 percent. Instead it highly resembles 2006, a 54-41 percent result at about this time.
The Republican Party gained 13 House seats in 2014 and 63 in 2010. In 2006, the Democrats gained 31. They need 23 this year to win control.
Another result adds to this evidence – an evaluation of the leanings of political independents, who have accounted for a plurality of Americans in annual averages in nine of the last 10 years. In ABC/Post polls across 2014, independents on average leaned slightly toward the Republican Party – 37 percent toward the Democrats, 41 percent toward the GOP. In 2010 it was dead even, 42-42 percent. In 2006, by contrast, independents leaned Democratic by 17 points. And this year they’ve done so by a 14-point margin, 46-32 percent.
Turnout and Overvote
The Democrats, to be sure, also can find grounds to worry. Their support is strongest among minorities and young adults, groups that tend to have lower turnout in midterm elections. It’s also focused in urban areas, where the Democrats generally already control House seats; specifically, registered voters favor Democratic candidates by 63-31 percent in cities, vs. an essentially even 49-46 percent in suburbs and 44-53 percent in rural areas.
That suggests a Democratic overvote in districts they already hold, and other evidence backs it up. In districts rated as solid or likely Republican by the ABC News Political Unit, Republican candidates lead by 55-40 percent. In districts rated as solid or likely Democratic, Democrats lead, by a much larger margin – 68-28 percent – more than they need in these locales. And in the 66 House districts rated as only leaning either way, or as tossups, it’s a 46-47 percent D-R race.
That said, this poll suggests a higher than typical midterm turnout, which should advantage the Democrats. Among all registered voters, 76 percent say they’re certain to vote next month, vs. 63 percent at this time in 2014 and 70 percent in 2010. While voting intention is high across the board, that’s especially the case among Democrats and Democratic-leaning independents, nonwhites and 18- to 39-year-olds.
Voter Groups
Shifts among groups tell an important part of the story. Conservatives favor Republican House candidates by a wider margin – 58 points – than in ABC/Post polls at this point in any of the past three midterm elections. (It was 49, 46 and 38 points in 2014, 2010 and 2006.) But moderates favor Democrats by 30 points, triple the margin in 2014, double what it was in 2010, and about matching its 2006 level. Liberals, for their part, favor Democrats by a vast 76 points.
Whites favor Republican candidates by 6 points, compared with 18 points in 2014 and 12 in 2010; whites were +4 Democratic at this point in 2006. It’s among nonwhites that Democrats take their advantage, with a 46-point lead in a group that accounts for 32 percent of registered voters and anywhere from 27 to 30 percent of likely voters.
Democratic candidates have a 21-point lead among college graduates, 58-37 percent, again similar to 2006 and far from what essentially were dead heats among graduates in 2014 and 2010. But Democrats have a scant +4 edge among nongraduates, similar in this case to 2014 and 2010 and well off the 2006 polling, +13. Since nongraduates account for nearly two-thirds of the population, the Democratic weakness there represents a threat.
That said, the Democrats have some surprising comparative strengths. They trail the GOP by 9 points in rural areas of the country, as noted; that compares with 26- and 17-point deficits at this point in rural America in 2014 and 2010. By region, the Democrats are especially strong in the comparatively liberal Northeast, a 27-point lead, again far more than in 2014 or 2010 and quite similar to 2006.
But it’s independents, the quintessential swing voters, who may matter most. They currently favor Democratic candidates by 14 points, 52-38 percent. Independents by contrast were +4 and +13 Republican at this stage in 2014 and 2010. Now they look – yet again – as they did in 2006.
Methodology
This ABC News/Washington Post poll was conducted by telephone Oct. 8-11, 2018 among a random national sample of 1,144 adults, with 65 percent reached on cell phones and 35 percent on landlines. Results have a margin of sampling error of 3.5 points for the full sample, including design effects due to weighting. Partisan divisions are 33-26-35 percent, Democrats-Republicans-independents.
The survey was produced for ABC News by Langer Research Associates of New York, N.Y., with sampling, data collection and tabulation by Abt Associates of Rockville, Md. See details on the survey’s methodology here. |
'We train our boys to be killing machines, then prosecute them when they kill!'
President Trump came under fire after tweeting on Saturday about Maj. Mathew Golsteyn, a former Green Beret who is on trial for killing an unarmed Afghan man in 2010.
Trump tweeted, “The case of Major Mathew Golsteyn is now under review at the White House. Mathew is a highly decorated Green Beret who is being tried for killing a Taliban bombmaker. We train our boys to be killing machines, then prosecute them when they kill!” Trump’s tweet came after a segment on Fox News went over the case.
Golsteyn admitted to killing a suspected Taliban bomb maker in a CIA polygraph when he was applying for a job with the intelligence agency in 2011. In the CIA interview, Golsteyn said he buried the Afghan man’s remains and later dug them up and burned them.
The Army initially dismissed the case, but it was re-opened in 2016 after Golsteyn again admitted to killing the man in an interview with Fox News.
In May, Trump pardoned a former Army lieutenant who was convicted of killing an unarmed Iraqi man in 2009.
Some of the outrage over Trump’s tweet was not about him potentially pardoning a suspected war criminal, but instead focused on Trump using the term “killing machines.”
Bill Kristol responded to Trump’s tweet and said, ” ‘We train our boys to be killing machines.’ No we don’t. And it’s beyond disgusting that an American president would say this about our military. Shouldn’t senior military leaders set the record straight?” |
Field of the Invention
The present invention relates to an information processing apparatus, a control method therefor, and a storage medium.
Description of the Related Art
An MFP which is an information processing apparatus equipped with communication functions is known. The MFP has a plurality of communication devices for implementing the communication functions, such as a wired LAN (local area network) device which carries out wired LAN communications and a wireless LAN device which carries out wireless LAN communications (see, for example, Japanese Laid-Open Patent Publication No. 2003-319461). Lately, from the standpoint of security and others, there has been an increasing demand for MFPs capable of using networks in accordance with intended uses, and MFPs using different communication devices for respective networks are under development. Such MFPs are equipped with a plurality of communication lines such as a main line and a sub line. For example, communications using an external apparatus and a wired LAN device, which are connected to one network, are carried out on the main line. Communications using an external apparatus and a wireless LAN device, which are connected to the other network different from the above network, are carried out on the sub line. The main line supports communications using the Internet, whereas the sub line does not support communications using the Internet but only supports communications using a local network. When an external apparatus which is a communication destination is designated, the MFP equipped with the main line and the sub line (hereafter referred to as “the multiline MFP”) determines which one of the main line and the sub line is to be used and carries out communications with the external apparatus on the selected line (see, for example, Japanese Laid-Open Patent Publication No. 2013-207541).
The multiline MFP uses a proxy server, which is configured in advance, when carrying out communications via the Internet. In a case where, for example, a proxy server on the main line is configured, the multiline MFP accesses this proxy server when starting communication with an external apparatus designated as a communication destination. By using this proxy server, the multiline MFP is able to carry out communications on the main line with the connected external apparatus via the Internet.
In the above described multiline MFP, however, there may be a case where communication with a desired external apparatus is impossible when the proxy server on the main line is configured. For example, even when an external apparatus on the sub line is designated as a communication destination, the multiline MFP tries to access the configured proxy server on the main line when starting communication with the external apparatus. Since the proxy server does not exist on the sub line, an access error occurs in the multiline MFP, and as a result, the multiline MFP cannot carry out communications with the external apparatus. Namely, the conventional MFPs have the problem that communication with a desired external apparatus becomes impossible due to settings on a proxy server. |
Would-be dictators looking forward to a new reign of benevolence — or malevolence — in Tropico 6 are going to find themselves in charge of a restive population that’s a lot more complicated in its feelings, its productivity, and even has a memory.
“Fully simulated Tropicans,” is what Tropico 6 will promise, said Johannes Pfeiffer, a senior content designer with Limbic Entertainment, which last year took over the series from Haemimont Games, which built Tropicos 3, 4 and 5. Past versions of the game always implied that everyone in the population had a life, a goal, an opinion of the leader, but the streamlined way in which the game handled this made the population a lot easier to control. In Tropico 6, Pfeiffer said, every citizen of the player’s banana republic has a life, goals and expectations in it, and is more responsive to the things making her or him happy or unhappy.
Related
“Where we looked at the strong points of the game, one was the feeling of having the Tropicans as a part of your empire, and how they enjoy or don’t enjoy living in your banana republic.” Pfeiffer told me. “We wanted to make it comprehensible to the player what they are up to, how they feel, how they work and what theyre up to there.
“It may be a trickier approach, but a lot of our community was asking for this, and we wanted to follow through,” Pfeiffer said.
Past Tropico games were not so detailed with the citizenry, Pfeiffer explained. Probably the best example of “emulated’ Tropicans versus “simulated” Tropicans could be seen in their workplace productivity. In Tropico 5, buildings continued to produce at a rate commensurate with their manpower whether the workers were in the building or not. Tropico 6, said Pfeifer, will take into account the time employees are not at work, and productivity will reflect that.
Keep an eye on the traffic
This means armchair autocrats will have to concern themselves with both commute times into work and neighborhood amenities afterward, much like the city-building cousins that inspired the first game. I played Tropico 5 for almost 100 hours in the sandbox mode, developing a very manicured island utopia with rigid residential, business and entertainment districts, and didn’t worry much about how far dock workers had to go to get to their job so long as that building was at capacity. From the sounds of it, not only will I need housing near the waterfront, I’ll need some good old fashioned dockside bars for when the afternoon whistle blows.
“The Tropicans will now have a memory of what’s available to them, and what’s within reach,” Pfeifer said. “It not only helps with visually shaping the city and making it more interesting, it also benefits the Tropican individually, in a comprehensible outcome.”
This all plays into what I have long considered Tropico’s big power proposition: You can be rich, or you can be powerful, but you probably won’t be both. The more developed, wealthy and economically diverse Tropico becomes, the more involved the constituency is, often in the form of direct challenges to El Presidente’s authority. You can go into Tropico with a very simple vision for success, and the better you are at it, the more your subjects will try to change your priorities. Keeping the military happy while not getting them/us into any disastrous adventures was a constant problem for my dictator.
Tropico 6 will place a renewed focus on El Presidente and their cult of personality
On the other hand, consolidating power and cracking down usually led to broad unhappiness, which meant lower productivity and a greater need to rely on expensive, outside resources (importing goods or bringing in educated workers) which were expensive and often unsustainable alternatives.
Crackdowns, imprisonments, banishments, discreditings and even assassinations, which were always chortle-inducing options for troublesome citizens, are going to spider-web through the victim’s family for generations, Pfeiffer said. In past Tropicos, such activities would usually manifest as the hostility of a political faction that El Presidente didn’t care for in the first place. That said, El Presidente will for the first time be able to establish a kind of penal colony, like Guantanamo Bay, Cuba (“or Australia!” smirked Pfeiffer) in which the country imports prisoners from other nations and manages them for an appropriately cynical fee.
Domestically, it may be tempting to imprison the unemployed and put them to work in that new prison-labor system. Just realize that no one in that person’s family is ever going to support your regime. Do it to enough in the population and you could have a serious coup threat on your hands. In Tropico 5, quashing rebellions, even with an armed and deadly intervention, were less of a problem to El Presidente than a superpower invasion or an unhappy military tossing him out.
“The overall idea is we want t provide different opportunities for how you can address the game,” Pfeiffer said. “It’s wy we don’t go for one linear narrative where you go through all of the ages.”
Tropico 6 will still have a campaign mode spread across different island settings, somewhat similar to Tropico 5, in which the player has to complete a shorter-term goal specific to one of four distinct eras. The longer-playing proposition will be in the sandbox mode, with just as many win parameters and customizable options as the previous games. It may take the player into some areas they haven’t considered before, such as spending nothing for public safety and relying on deals with shady crime lords to keep the population in line.
Grid View Limbic Entertainment/Kalypso Media
Limbic Entertainment/Kalypso Media
Limbic Entertainment/Kalypso Media
Limbic Entertainment/Kalypso Media
Limbic Entertainment/Kalypso Media
Limbic Entertainment/Kalypso Media
Limbic Entertainment/Kalypso Media
Limbic Entertainment/Kalypso Media
Limbic Entertainment/Kalypso Media
Limbic Entertainment/Kalypso Media
Limbic Entertainment/Kalypso Media
Limbic Entertainment/Kalypso Media
Limbic Entertainment/Kalypso Media
Limbic Entertainment/Kalypso Media
What it won’t have anymore is the dynasty system. The player’s will is now exressed through a single, immortal El Presidente. Pfeiffer said players of Tropico 5 either didn’t fully understand the options available to them as they raised future generations of leaders, or just didn’t care to manage that lineage. While placing total control in the hands of someone who can live for a century or more may puncture a sense of immersion or reality, Pfeiffer said the decision was justifiable in how it, again, makes El Presidente and their cult of personality a stronger focus.
Pfeiffer is aware that some of the preview videos of the game have shown something that is refined and a little more visually interesting than past Tropicos but doesn’t seem to play much differently, especially in the way it still straddles different historical eras. He promised that Tropico 6 was indeed a new game — rebuilt from scratch in Unreal Engine 4. Limbic Entertainment started over, he said, because it had built other strategy games within Unreal and found the toolsets it used to be useful for something like Tropico.
Tropico 6 does not yet have a specific release window, other than some time later this year, on PlayStation 4, Windows PC and Xbox One. There are plans for a beta but it’s unclear so far if this will be a public or private test. |
1. Technical Field
The following description relates to one or more techniques for accessing contents open to the public on a network.
2. Related Art
There are various kinds of contents open to the public on a network. Further, there are servers on the network which open to the public content summary information that includes a URL and a title of each of the contents. A feed is cited as an example of the content summary information. A format such as RSS (Resource Description Framework Site Summary) and Atom is generally applied to the feed.
A terminal device has been known which is configured to acquire RSS feeds (each of which contains an image of an article as well) from a plurality of RSS servers and display a list of titles of the articles. When a title of an article is selected from the list, the terminal device displays thereon the title, a description, and an image of the article, and a link (button) to a web page of the article. Then, when the link button is selected, the terminal device acquires and displays information contained on the web page. |
A typical adult does not brush his or her teeth adequately, nor does the typical adult floss his or her teeth with the frequency recommended by dentists. Gingivitis is usually caused by bacterial plaque that accumulates in the spaces between the gums and the teeth and in calculus that forms on the teeth. The bacteria produce foreign chemicals and toxins that cause inflammation of the gums around the teeth. This inflammation can cause deep pockets between the teeth and gums and loss of bone around teeth otherwise known as periodontitis. Since the bone in the jaws holds the teeth into the jaws, the loss of bone may cause teeth to become loose, and eventually fall out. If the inflammation in the gums becomes especially well-developed, it can invade the gums and allow tiny amounts of bacteria and bacterial toxins to enter the bloodstream. Studies suggest this can result in a generalized increase in inflammation in the body cause possible long term heart problems. Periodontitis has also been linked to diabetes, arterosclerosis, osteoporosis and pre-term low birth weight babies. Bacteria and bacterial toxins are carried by tooth brushes, and brushing alone may cause the germs to remain in the mouth if the tooth brush is not sanitized between uses.
There is a need for a device that will hold and sanitize toothbrushes. The use of common antiseptic mouthwashes in combination with brushing, even if the brushing is otherwise inadequate, will kill harmful bacteria, and improve oral hygiene. The device should therefore encourage the use of mouthwash, and facilitate improved sanitation of toothbrushes. |
Abstract: Transition of care from the intensive care unit (ICU) to the ward is usually an indication of the patient’s improving clinical status, but is also a time when patients are particularly vulnerable. The transition between care teams poses a higher risk of medical error, which can be mitigated by safe and complete patient handoff and medication reconciliation. ICU readmissions are associated with increased mortality as well as ICU and hospital length of stay (LOS); however tools to accurately predict ICU readmission risk are limited. While there are many mechanisms in place to carefully identify patients appropriate for transfer to the ward, the optimal timing of transfer can be affected by ICU strain, limited resources such as ICU beds, and overall hospital capacity and flow leading to suboptimal transfer times or delays in transfer. The patient and family perspectives should also be considered when planning for transfer from the ICU to the ward. During times of transition, families will meet a new care team, experience uncertainty of future care plans, and adjust to a different daily routine which can lead to increased stress and anxiety. Additionally, a subset of patients, such as those with new technology, require additional multidisciplinary support, education and care coordination which can contribute to longer hospital LOS if not addressed proactively early in the hospitalization while the patient remains in the ICU. In this review article, we describe key components of the transfer from ICU to the ward, discuss current strategies to optimize timing of patient transfers, explore strategies to partner with patients and families during the transfer process, highlight patient populations where additional considerations are needed, and identify future areas of exploration which could improve the care transition from the ICU to the ward.
Introduction
Transition of care, defined as admission to, transfer between, or discharge from a healthcare facility or hospital ward, places the patient at risk for experiencing medical error and increases feelings of uncertainty, stress and anxiety in patients and families (1-3). One particularly challenging transition of care is the transfer from the intensive care unit (ICU) to the ward. This transition typically occurs when patients are clinically recovering from a critical illness, yet require ongoing acute inpatient care. While the patient usually remains in the same healthcare facility, there is often a change in the care team. The ward physicians, nurses, pharmacists, social workers (SWs), and care managers may be less familiar with the details of the patient’s initial presentation and course of their critical illness. Furthermore, care protocols and patient monitoring on the wards are usually different from the ICU, which can contribute to caregiver uncertainty and anxiety (4). Studies in adults transitioning from the ICU to the ward suggest that this transition can be associated with incomplete or inaccurate physician handoffs and medication reconciliation errors (5-8). Inconsistencies may be exacerbated by delayed or night-time discharges. Furthermore, patients with chronic illness, particularly those with new technology dependence after discharge, are at increased risk for medical errors, prolonged hospitalization and ICU readmissions.
This review article highlights the various challenges associated with transition from the ICU to the ward, identifies gaps in the pediatric literature on this topic, and discusses some potential interventions and strategies to decrease medical error, strain, and caregiver stress during this transition.
Physician handoffs from ICU to ward team
The handoff of patient care between medical providers is an important component of a comprehensive transition of care from the ICU to the ward. The National Academy of Science (formerly Institute of Medicine) highlights effective communication among providers, particularly at vulnerable times like care transitions, as an important aspect of safe, timely, and effective care (9). Details of the physician handoff process should be carefully considered, including which providers should be involved, when the handoff should occur, key content that can be communicated efficiently, and documentation requirements.
Inconsistencies with handoffs
Studies in adult and pediatric patients reveal inconsistencies in providing effective handoffs prior to transition of care from the ICU to ward team. In a prospective study of ten Canadian hospitals, the mean agreement of patient issues between last ICU note and first ward note was only 42% (6), indicating gaps in communication between teams. Similarly, at a large pediatric institution, reliable verbal resident handoff was lacking from the ICU to ward team, with only 76% of patients having completed physician handoff prior to transfer (5). To address this inconsistency, a multidisciplinary team used quality improvement methods to drive the implementation of a standardized, reliable process with interventions including: education regarding the value of an effective handoff, creation of an electronic health record (EHR) template to drive communication, and feedback to providers. Through these efforts, handoff between providers rose to 100%, ensuring that every child leaving the ICU would be met by a receiving team that was familiar with the care plan (5).
Handoff tools
The Center of Excellence on Quality of Care Measures for Children with Complex Needs suggest that transition notes should include two key elements: comprehensive problem lists and treatment plans for each problem (2). The use of EHR templates can drive standard documentation practice at time of transition (5). A validated handoff tool should be considered to ensure key elements are not missed. One such tool that is used at many pediatric institutions nationwide is the I-PASS mnemonic, which includes the following elements: Illness severity, Patient summary, Action list, Situation awareness and contingency plans, and Synthesis by receiver (10). In a multi-center study, the I-PASS handoff tool was associated with a significant decrease in medical errors and preventable adverse events (10). Furthermore, I-PASS has been successfully applied to ICU-to-ward team transitions in pediatric patients (5,11). In one such study, the incorporation of the I-PASS mnemonic in provider handoff between a cardiac ICU (CICU) and the ward team led to more timely and efficient handoffs, improved safety culture survey results, and improved provider and family satisfaction with information conveyed (11).
Medication reconciliation
Medication reconciliation is another aspect of the care transition in which preventable errors may occur. In 2005, the Joint Commission designated inpatient medication reconciliation as a national patient safety goal to reduce medication related errors and adverse events (1). The commission identified transitions of care as an independent risk factor for medication related errors (1).
Medication errors
An ICU stay can increase the risk of incorrect medication reconciliation. Critically ill patients are often initiated on new classes of medications (e.g., respiratory treatments, stress ulcer prophylaxis) upon admission to the ICU while their chronic home medications are temporarily discontinued. Furthermore, ward physicians caring for patients recovering from critical illness are often hesitant to make medication changes until they become comfortable with the patient’s trajectory. The absence of an established checkpoint to re-evaluate the patient’s medication list upon improvement in their clinical status can result in inappropriate continuation of short term medications or discontinuation of chronic medications throughout hospitalization and even after hospital discharge.
For instance, studies in the adult literature report an increased incidence of unintentional discontinuation of chronic pre-admission medications among adults admitted to an ICU (7,12). Specific medications including antiplatelet and anticoagulant medications, inhalers, levothyroxine, gastric acid blocking agents and statins were demonstrated to have a higher risk of discontinuation for patients admitted to the ICU compared to those with only ward admissions (12). On the other hand, 20–30% of adults initiated on short term antipsychotic therapy for ICU delirium have these medications incorrectly prescribed upon discharge from the hospital (13-15). Medications such as bronchodilators and proton pump inhibitors initiated during critical illness are often inappropriately continued after hospital discharge as well (8).
Pharmacist involvement
Development of a structured medication reconciliation process, specifically at ICU discharge, could mitigate some of these preventable medication errors. In two adult ICUs in the Netherlands, medication reconciliation completed shortly before transfer of patients from the ICU to the ward, was associated with a decrease in medication transfer errors from 45% to 15% (16). In this study, the ICU physician and pharmacist created a “best possible ICU medication discharge list”, which contained recommendations regarding timeline for continuation of new medications as well as a list of chronic pre-admission medications that were discontinued in the ICU. This study suggests that clinical pharmacist involvement in transfer medication reconciliation could contribute to decreased medication errors, similar to previous studies evaluating pharmacist participation in medication reconciliation at hospital admission or discharge (17).
Strategies to reduce inappropriately long courses of antipsychotics for ICU delerium include implementation of an algorithm to evaluate patients who are candidates for antipsychotic discontinuation based on delerium scores, as well as creation of a pharmacy-driven electronic handoff tool at ICU discharge. In adults, these interventions were associated with lower rates of antipsychotic prescription at the time of ICU discharge (14,18).
While data regarding medication reconciliation in critically ill children is sparse, children are at higher risk of medication related errors as compared to adults given their need for weight-based dosing and formulation (19). Critically ill children with medical complexity, particularly those taking multiple pre-admission medications, chronic respiratory medications, and chronic non-invasive ventilation have been found to have an increased risk of incorrect medication reconciliation at ICU admission or transfer (20). Future work in pediatrics is needed to quantify medication reconciliation errors around ICU discharge and also to test various improvement initiatives to streamline the reconciliation process during transfer.
Timing of transfer
ICU beds are a necessary and valuable resource for managing patients with life-threatening illnesses, but they are also expensive. ICU strain, defined as demand for ICU beds in excess of supply, can lead to delayed or refused ICU admissions and cancelled elective surgical procedures (21). Strained ICUs are also at risk for providing suboptimal care and experiencing higher rates of adverse events, unplanned ICU readmissions and death (21). This creates pressure to transfer patients out of the ICU in a timely fashion. Multiple studies have examined the impact of adult and to a lesser extent pediatric ICU discharged timing on patient outcomes.
Nighttime transfers
Nighttime ICU discharge is defined as discharge from the ICU at night or “after-hours”, although the time-specific definition often varies by institution and study (22). Nighttime discharge is 1 of 4 most common indicators of ICU strain (21). In adult literature, nighttime discharges have been examined for their impact on adverse patient outcomes including mortality (22-26), unplanned readmission to the ICU (23,24), and hospital LOS (23-25). While data are conflicting, some studies have demonstrated increased hospital mortality for patients following nighttime ICU discharges when adjusted for factors including comorbidities and illness severity (22,24,25). Conversely, weekend ICU discharge has not been associated with increased hospital mortality (22). These studies had similar discrepant results in terms of association between nighttime discharge association and hospital length of stay (LOS) [longer (23) vs. unchanged (24) vs. shorter (25)] and unplanned readmission [higher (23) vs. unchanged (24)]. Discrepancies in the studies’ results are likely due to differences in definitions of nighttime or weekend discharge, local health system, patient population, disease severity, therapy limitations, sample size and study design (22).
The pediatric literature is less robust, and nighttime discharge from the pediatric ICU (PICU) has only been examined in the context of unplanned readmission to the PICU. In 2013, a large retrospective cohort study utilizing the Virtual PICU Systems database (VPS) which included 73 participating North American PICUs, found that discharge time between 4:00 pm and 8:00 am was associated with a higher risk of ICU readmission (27). A similar study also published in 2013, but incorporating more recent data using the same VPS database (now consisting of 90 PICUs), contradicted this association between nighttime discharge and readmission (28). A single site retrospective case control study by Kotsakis et al., found that unplanned readmission was associated with discharge outside their goal discharge time (6:00 am and 11:59 am) on univariable analysis, but this association was no longer significant with multivariable analysis. They still concluded that discharge time of day was one of the few modifiable factors, along with the Pediatric Logistic Organ Dysfunction (PELOD) and Bedside Pediatric Early Warning Signs (BedsidePEWSTM) scores at time of discharge which may decrease ICU readmissions (29).
ICU discharge delays
While nighttime discharge can sometimes represent premature discharge from the ICU, delay in discharge to the ward also can have negative impact. Discharge delays can lead to increased cost, misallocation of resources (30), and place patients at increased risk for ICU-acquired infections which independently influence mortality and additional discharge delays (22). Communication may also fail because provider handoffs typically occur when patients are ready for transfer but infrequently when they actually move between units (30). Discharge delays are more likely to occur at night (22,31) and are associated with high hospital census (31). The most common reason for delayed transfer is lack of ward bed availability (22,31,32). Other reasons include lack of bed/room appropriate for infectious contact precautions, change of primary service (i.e., surgery to medicine) and lack of available patient attendant or sitter (31).
Quality improvement techniques have been leveraged to reduce discharge delay. Kibler et al. improved the transfer process from their ICU to the medical/surgical ward which resulted in decreased average transfer time from 6 hours to <1.4 hours, decreased number of patients experiencing extreme delays (>12 hours), decreased nursing overtime, and improved patient satisfaction scores (33). In this study, implementation of a flag within the EHR when a transfer order was placed, eliminating an external transfer team, utilizing an ICU staff member to communicate need for room cleaning, and ongoing reviews when ICU transfer took >1 hour led to achievement of these metrics (33). In a systematic review of interventions that improve clinical handover between ICU and ward professionals, van Sluisveld et al. found that an ICU liaison nurse (LN), described in the literature as a nurse charged with coordinating care and serving as a liaison between providers in the ICU, providers on the ward, and the patient and family, was shown to reduce discharge delay in 3 out of 4 studies (34).
Readmissions to the PICU
Most patients transferred from the ICU to the ward continue to improve and eventually are discharged to home, however a subset of these patients are readmitted to the ICU. The Society of Critical Care Medicine (SCCM), the National Association of Children’s Hospitals and Related Institutions, and the National Quality Forum advocate that early unplanned readmission to the ICU, defined as readmission less than 48 hours from ICU discharge, should be used as a quality metric (35). The growing body of literature on ICU readmissions describes the rate, timing, and characteristics of patients with unplanned readmissions, utilization of transition programs to bridge the transition to the ward and development of clinical markers to predict readmission.
Patient population
Between 2.5–5.4% of PICU discharges will have an unplanned PICU readmission (27,29,36,37) with approximately 1/3 to 1/2 of PICU readmissions occurring within the first 48 hours (27,36). Patients readmitted to the ICU are at higher risk of mortality and have longer ICU and hospital LOS (Table 1). There is varying data regarding the most common diagnoses to require early unplanned PICU readmission, although respiratory and infectious illnesses are consistently found to be the most frequent primary diagnosis categories (27,36). Interestingly, among CICU patients, respiratory diagnoses were the most common reason for readmission, accounting for 42.9% of readmissions, followed by cardiac diagnoses which accounted for 40.2% of readmissions (38). Studies have demonstrated with varying concordance other factors associated with readmission. Factors which have been associated with unplanned PICU readmissions include young age, presence of at least one chronic health condition (27,36), discharge from the ICU outside of the hours of 8:00 am–4:00 pm (27) and discharge from the ICU on respiratory support or sedating medications (36).
Prediction tools
Given the increased morbidity and mortality of patients requiring readmission to the ICU, prediction models to help identify patients at highest risk for readmission have been explored. There are few validated scores in the adult literature. These include the Sabadell score which is a subjective measure by the ICU physician to predict overall prognosis following discharge (39) and multivariable algorithms described by Badawi and Breslow (40). The SWIFT score, which utilizes five variables including original source of ICU admission, ICU LOS, PaO2/FiO2, Glascow Coma Scale, and PaCO2 to predict risk of readmission, has demonstrated mixed results predicting ICU readmission in adults (41,42). Attempts to apply the SWIFT score to pediatrics have not been successful (43).
Two prediction tools which have been developed in pediatrics include the PROPER risk predictive score (43) and a validated risk stratification tool developed by Linton et al. (44). The PROPER risk predictive score uses seven objective categories to predict ICU readmission (Table 2) (43). This score predicted early readmissions with a sensitivity of 81% and positive predictive value of 0.5; however it has not been formally validated, and may not be generalizable as it has only been studied in a single center (43). Linton et al. describe an eight factor tool which includes six objective measures and two subjective measures scored by an ICU or LN (Table 2) (44). When the subjective scores were incorporated, patients with 5 or more of these risk factors had a 100% risk of readmission while those with 1 or fewer risk factors had only a 3% chance of readmission, however when the authors removed the subjective components the positive and negative predictive, values decreased (44). These studies highlight the difficulty of accurately predicting which patients will be readmitted, emphasizing the importance of clinical judgement in identifying at risk patients.
Transition programs
Implementation of transition programs including the utilization of a LN, a critical care outreach team, or medical emergency team (MET) have also been studied as a means to decrease unplanned PICU readmission. These programs utilize staff trained in ICU care to perform routine patient evaluations within the first 48 hours following ICU discharge. In general, studies evaluating transition programs have been small single center studies. While studies evaluating adult transition programs demonstrate mixed results, a meta-analysis demonstrated that transition programs decreased ICU readmission but did not improve the in-hospital mortality rate (45). These findings were primarily driven by a study by Ball et al. which described use of a critical care outreach team that was associated with a decrease in ICU readmission by 6.4% as well as a reduction of in-hospital mortality by 6.8% (46). The data on transition programs for pediatric hospitals is sparse. One single-center study evaluating the benefit of a LN demonstrated a decrease in unplanned PICU readmission from 5.4% to 4.8%, however this did not reach statistical significance (37). Despite not statistically significantly decreasing readmission rate, ward nurses surveyed felt that the role was helpful and over 80% of parents surveyed felt the PICU LN decreased the stress of transition to the ward (37). On the other hand, another single center study evaluating the utility of routine MET assessments in the 48 hours following PICU discharge demonstrated a decrease in unplanned PICU readmissions from 6.8% prior to the initiation of an MET team to 2.0% once the MET team was initiated (47).
Family transition
Hospitalization of a child is a source of anxiety and stress for parents and families. ICU admissions can be even more stressful due to the severity of the child’s medical needs and risk to life. It has been reported that between 10–50% of parents have post-traumatic stress disorder following a child’s admission to the PICU (48-50). Furthermore, families report significant stress during transitions of care (3). The physiological and/or psychosocial distress experienced by patients or families during the transfer from a familiar environment to an unfamiliar one has been labeled ‘transfer anxiety ’or ‘relocation stress’. There are three types of transfer anxiety: (I) primary, relating to time and place of transfer; (II) expectant, relating to preparation quality and (III) fright after transfer, relating to expectations after transfer (51).
Parents’ ability to participate in care and be present for a hospitalized child are important in providing ideal care but can be difficult when families experience stress and lack of information sharing from the care team (3,52). Inclusion of caregivers via clear communication, empathy, education and providing of resources can help prepare parents and caregivers and keep them involved in their child’s care. A systematic review aimed at describing interventions to support parents through an acute hospitalization identified 12 randomized control trials (53). The most common interventions focused on coping and emotional support, including Creating Opportunities of Parent Empowerment (COPE). These supportive interventions were feasible to implement in the majority of the included studies and, most importantly, were valued by parents. Further, parents who received the coping support interventions had lower anxiety and stress symptoms than controls, although depression symptoms were similar between groups (53).
Perceptions of transition
Perceptions of patients and healthcare staff about ICU to ward transfer can also lend important learnings. Stelfox et al. conducted a multicenter prospective cohort study of adult patients transferred from an ICU to the ward with the aim of assessing perceptions about ICU to ward transfer (30). They conducted standardized surveys of patients, nurses, and physicians from both the ICU and ward. Patients were more likely to report satisfaction with transfer when they had their questions answered, met the ward physician prior to transfer, and were assessed by a nurse within 1 hour of ward arrival (30). All groups recommended that transfer delays be minimized and to avoid night transfers. In this study, 1 in 4 patients awaiting transfer had a major care plan change, further highlighting the importance of updated and repeated communication for delayed transfers (30).
Written information
In addition to supporting coping and emotional well-being of families, many studies have focused on development and standardization of information to help prepare families for transition. Two common strategies are written information and LNs. The use of a written letter with accompanying verbal explanation was evaluated in a group of fifty biological parents of children admitted to the ICU for the first time for an acute illness. Half of the families received the letter and verbal explanation in the 24–48 hours before transfer while the other half received standard care that did not include either of these. Measurement of parental anxiety and stress using a validated scoring system before the information was shared and at time of transfer demonstrated decreased anxiety at time of transfer for the intervention group (54).
A similar program developed a PICU discharge brochure created with family input. The most important information for families in this program included the name and location of the ward they were going to and being informed of the plan for transfer ahead of time. The families also reported wanting information about the ward team members’ names. Feedback obtained via surveys suggested that most families found the use of this brochure to be helpful or very helpful (55). Another hospital trialed a brochure and a standard transfer checklist to be used by the bedside nurse. The use of these tools resulted in increased parental report of feeling prepared for transfer in a timely manner (56).
Transition care providers
Care providers dedicated to patient transition between the ICU and ward have been leveraged to improve the patient and family experience. LNs may be used to support families during the physical time of transition. This role begins with the preparation component and extends to face-to-face check-ins with the patient and family after transfer. The liaison serves to extend the knowledge of the PICU and ensure ward nurses are prepared and well-informed about the patient’s needs. They also ensure patient care plans have been communicated between the PICU and ward teams. Lastly, due to their familiarity to the patient and family, they can assist the family in answering any questions that arise in the transition (37,57). Outcomes have been promising, with one study showing lower PICU readmission after initiating the LN transition role, and >98% of staff and families reporting that the LN made a positive impact on the transition process (37). Other studies have taken a more proactive approach. At Wake Forest Baptist Hospital, providers have trialed the implementation of a dedicated transfer team, including a hospitalist physician, nurse leader and bed logistic personnel, who travel to the ICU each morning to introduce the ward team to the family, obtain a verbal handoff from the ICU and assess stability for transfer for any patient who is predicted to transfer to the wards in the next 24 hours (58).
Children with new technology
Children with chronic respiratory failure and new technology dependence present additional challenges to the medical team when transferring from the ICU to the ward. Children with chronic respiratory failure often have complex needs with multisystem involvement (59). These children with medical complexity (CMC) may require enteral feeding tubes, tracheostomy tubes, home ventilators, suction machines or other equipment in the home. The number of children with chronic respiratory failure and dependence on home ventilation has increased, as has the frequency of hospitalization for CMC (60,61). The cost of care for a ventilator-dependent child in an ICU is significantly higher than the cost of care on the ward (62). While some children with chronic respiratory failure may be discharged directly from the ICU, more CMC are being transitioned home from less-costly ventilator wards. When an older child with new technology dependence is transferring from the PICU, caregivers may already have some familiarity with caring for a child with complex medical needs. When an infant is transferring from the neonatal ICU (NICU), families will also be adjusting to the stress of bringing a child home for the first time regardless of the need for medical equipment in the home. The additional needs of the child with new technology dependence require multidisciplinary involvement in planning for a safe and efficient transition to home.
In addition to the child’s medical status, several other factors will determine the readiness of a child with new technology dependence to transition to home, including: (I) caregiver education; (II) durable medical equipment availability; (III) home nursing availability; (IV) home readiness; and (V) financial resources (63). One or more medical or social factors can significantly delay a child’s transition to home (64). Initiation of early discharge coordination to address these factors in the ICU, prior to transfer to the wards, can reduce the overall hospital LOS without increasing readmission rates (65). With an eye on eventual transition to home, the transition of the child to the ward may require the involvement of a discharge planner, SW, family educator and case worker in addition to the other members of the medical team. Ideally, these team members will meet the family in the ICU as soon as it is determined that the child will require medical equipment in the home to discuss education requirements and the process of transitioning to home.
Education
Children with tracheostomies should have at least two caregivers fully educated on the child’s routine and emergency care (66). Education should be initiated in the ICU whenever possible. Caregivers of children going home with medical equipment should have every opportunity to participate the care of the child to gain experience with the new equipment and to troubleshoot equipment that is not working as expected. Education incorporating videos or simulation can also be considered, if the family is open and ready to learn. If education is initiated in the ICU, progress should be documented in a standardized fashion so that the education plan can be continued by the team on the wards. Additionally, helping families understand the extent of education required to care for their child at home prior to transitioning to the ward will help to set expectations and avoid conflicts on the wards.
Durable medical equipment
Early contact with a durable medical equipment company to order and arrange for the delivery of home medical equipment is important to avoid delays in discharge to home. Longitudinal involvement by the accepting medical team and discharge coordinator while the child is in the ICU may help to identify equipment needs at the time of discharge. If the process of arranging for home equipment is initiated in the ICU, it is important for this information to be shared with the medical team and discharge coordinator on the wards. A list of home equipment should be standardized and available to all staff.
Home nursing
In many parts of the country, there is a critical lack of home nursing available to families with children dependent on technology (67). While not all children going home with new medical equipment will require home nursing, some populations are especially dependent on home nursing to allow for a safe transition to home. Children dependent on a tracheostomy tube and home ventilator should be attended to by an awake and trained caregiver 24 hours a day, which almost always necessitates the presence of a nurse in the home (68). Beginning the search for home nursing while the child is in the ICU can reduce the overall hospital LOS. Delaying the search for home nursing can result in extending hospitalization by weeks to months.
Home environment
Involvement of a SW at the time of transition from the ICU to the ward is important when considering eventual transition to a safe environment out of the hospital. The family’s barriers to a safe discharge home should be identified early. Families with children with new dependence on technology need to consider the appropriateness of their home and means of transportation. An older child who is immobile and newly dependent on a tracheostomy tube and ventilator may be more difficult to care for if the family lives on the third floor of a building without an elevator. This is not only an additional burden on the family, but is also especially important to consider as that child may need to be quickly attended to by emergency medical services personnel in the home. SWs can be instrumental in helping a family identify and mitigate such barriers. Durable medical equipment companies may also assess the home and evaluate the space needed for equipment, electrical capacity and other safety concerns. If a safe home environment cannot be secured, alternative means for discharge, including long-term care, should be considered.
Financial resources
Providers, often SW team members, should help the family to identify financial resources to cover medical needs including home equipment and home nursing. Insurance coverage should be verified early in the process. If a Medicaid waiver program is available, applications should be submitted at an appropriate time to ensure timely coverage for needed resources. Any conversations with private insurance, managed care programs or case managers occurring while the child is in the ICU should be documented and communicated to the medical team and SW at the time of transition to the wards.
Discussion and future directions
Care team recognition that the transition from ICU to the ward can be one of the most stressful periods during a hospitalization is key to providing care to this vulnerable population of patients. For patients and families, this is a time of increased uncertainty. While improved health is likely the trigger for transfer out of the ICU, families have likely become accustomed to the ICU culture, including the higher level of care, more frequent monitoring and different policies/rules (54). The anxiety around this adjustment can be significant and can impact families’ ability to participate in care on the wards. For patients with new technology dependence, families are faced with the added challenges of learning new care needs and equipment as well as the additional psychosocial stresses including securing home nursing, adapting the home environment and financial strain that comes with new technology dependence (27). Promising studies utilizing LNs to bridge transition periods have demonstrated decreased family stress and anxiety (44). Preliminary research exploring the use of hospitalist physicians and nurse leaders to improve the ICU-to-floor transition is being evaluated to understand the impact on ICU LOS, family satisfaction and ICU readmission (58). Further work should continue to explore strategies to improve family experience during transitions of care.
Timing of ICU discharge is an important consideration in ensuring a smooth transition to the wards. Based on the literature, there may be an increased risk of mortality and unplanned ICU readmission for nighttime discharges, as well as negative impact from transfer delays. Both nighttime transfer and delayed discharge-to-ward often reflect limited bed capacity (22) and ICU strain (21). Therefore, the decision to transfer a patient out of the ICU is a challenging balance of benefits and risks, particularly for patients with complex chronic conditions.
Risk stratification of patients and the development of future predictive scoring systems may prevent negative outcomes (i.e., unplanned readmissions) from a premature or delayed discharge from the ICU. Preliminary studies of prediction tools have involved objective criteria combined with LN assessments (54). Ongoing development of ICU readmission prediction tools is needed as readmission increases hospital and ICU LOS and is associated with increased mortality (36,43-45,47,48). Accurate prediction tools would allow providers to better prepare families for transfer and provide more focused support to the ward team and nurses surrounding the care of patients with higher risk of ICU readmission.
Current studies also demonstrate that patient handoffs from the ICU-to-ward are not always complete (2,3). Handoff tools that include a comprehensive problem list with treatment plans (2) and emphasize needs to happen in the next 24–48 hours rather than just the summary of the clinical course (58) should be evaluated as a strategy to improve clarity on treatment plans. In the adult literature, lack of clarity regarding medication plans has been shown to lead to inadvertent discontinuation of home medications (8,9) as well as inappropriate continuation of medications initiated in the ICU (10-14). The pediatrics literature is sparse necessitating further investigation of current practices for medication reconciliation in critically ill children and their association with medication errors and patient harm. This could inform the development and evaluation of interventions to reduce medication error at the time of ICU discharge in children, particularly for children with medical complexity. Structured, pharmacist-driven handoff tools that contain plans for medication re-initiation or discontinuation after resolution of critical illness could serve to reduce medication errors at hospital discharge. Incorporating an ICU discharge medication plan into the verbal handoff to physicians and nurses on the general ward could empower the ward team to proactively reduce medication related errors in this population.
Conclusions
Patient handoffs, medication reconciliation, timing of transfer, risk of readmission, preparing the family, and education on new medical needs are all factors that should be considered when transitioning patients from the ICU to the ward. The challenges of ICU strain may impact optimal transfer timing. However, ongoing exploration of the use of LNs, standardized handoff tools and development of readmission risk assessment tools are promising strategies to improve the ICU to ward transfer process and should be continued. Future studies should focus on initiation of education on new technologies while in the ICU, exploration of pharmacist-led medication reconciliation processes, and innovative ways to improve the family experience during ICU to ward transfer.
Acknowledgements
None.
Footnote
Conflict of Interest: The authors have no conflicts of interest to declare.
Bosma LBE, Hunfeld NGM, Quax RAM, et al. The effect of a medication reconciliation program in two intensive care units in the Netherlands: a prospective intervention study with a before and after design. Ann Intensive Care 2018;8:19. [Crossref] [PubMed]
Sherman JM, Davis S, Albamonte-Petrick S, et al. Care of the child with a chronic tracheostomy. This official statement of the American Thoracic Society was adopted by the ATS Board of Directors, July 1999. Am J Respir Crit Care Med 2000;161:297-308. [PubMed] |
Q:
How to download an artifact with its dependencies to a specified directory - without pom.xml - using Maven?
What I need to do is to download an artifact from my internal repository (currently Nexus) with all its dependencies, to a specified directory. And that without actually downloading the source code (and using its pom.xml): I need to just run a plain maven command from the shell and access the binaries in my repository.
I don't need to download the dependencies to my local repository (the behaviour of the dependency:get / dependency:copy plugins), I want the artifact AND all of its dependencies copied to a specified directory.
Something like this:
mvn super-downloader:download-everything -Dartifact=my.group:myArtifact:version -Ddirectory=.
What I've tried:
dependency:get and dependency:copy plugins copy the dependencies to my local repository (under ~/.m2) which is not what I want.
dependency:copy-dependencies requires a maven project. I need to run the command without a pom.xml.
com.googlecode.maven-download-plugin:maven-download-plugin:artifact plugin should work with -DdependencyDepth=<some high value>, but it fails trying to resolve a dependency to xerces:xerces-impl:2.6.2. I manually uploaded it to my Nexus, but then it failed trying to find xml-apis:xml-apis:2.6.2, which doesn't exist.
So, any ideas?
Thanks.
A:
Inspired by the this answer, I created a simple bash script to solve the problem:
#mvn-copy.sh
mvn org.apache.maven.plugins:maven-dependency-plugin:2.8:copy -Dmdep.useBaseVersion=true -DoutputDirectory=. -Dartifact=$1:$2:$3
mvn org.apache.maven.plugins:maven-dependency-plugin:2.8:copy -Dmdep.stripVersion=true -DoutputDirectory=. -Dartifact=$1:$2:$3:pom
mvn -f $2.pom org.apache.maven.plugins:maven-dependency-plugin:2.8:copy-dependencies -DoutputDirectory=lib
To use it, just type ./mvn-copy.sh <groupId> <artifactId> <version>. It will download the main jar at the current directory, and then all dependencies into a lib folder.
Not the best solution, not the most beautiful one, and not quite what I wanted, but it solved the problem and saved the day.
|
---
title: "Unused local variable: '<localvariablename>'"
ms.date: 07/20/2015
f1_keywords:
- "vbc42024"
- "BC42024"
helpviewer_keywords:
- "BC42024"
ms.assetid: 749b1315-0f85-4f7e-b68b-8cc4346c502b
---
# Unused local variable: '\<localvariablename>'
A local variable in a procedure is declared but never used.
One possibility is that there is a spelling mistake among the local variables in the procedure. If this variable is in fact used in another statement but spelled differently, it will appear to the compiler as two different variables.
By default, this message is a warning. For more information about hiding warnings or treating warnings as errors, see [Configuring Warnings in Visual Basic](/visualstudio/ide/configuring-warnings-in-visual-basic).
**Error ID:** BC42024
## To correct this error
1. Check for spelling mistakes among the local variables within the procedure. Notice that casing does not make a difference. The names `ABC` and `abc` are considered to refer to the same variable.
2. If there is no spelling mistake, either remove the declaration of this variable or use it in another statement in the procedure.
## See also
- [Declared Element Names](../programming-guide/language-features/declared-elements/declared-element-names.md)
- [Dim Statement](../language-reference/statements/dim-statement.md)
|
| Title | Psr.exe Capture Screenshots |
|:-------------------------|:------------------|
| **Description** | The psr.exe captures desktop screenshots and saves them on the local machine |
| **ATT&CK Tactic** | <ul><li>[TA0009: Collection](https://attack.mitre.org/tactics/TA0009)</li></ul> |
| **ATT&CK Technique** | <ul><li>[T1113: Screen Capture](https://attack.mitre.org/techniques/T1113)</li></ul> |
| **Data Needed** | <ul><li>[DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)</li><li>[DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)</li></ul> |
| **Trigger** | <ul><li>[T1113: Screen Capture](../Triggers/T1113.md)</li></ul> |
| **Severity Level** | medium |
| **False Positives** | <ul><li>Unknown</li></ul> |
| **Development Status** | experimental |
| **References** | <ul><li>[https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/LOLUtilz/OSBinaries/Psr.yml](https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/LOLUtilz/OSBinaries/Psr.yml)</li><li>[https://www.sans.org/summit-archives/file/summit-archive-1493861893.pdf](https://www.sans.org/summit-archives/file/summit-archive-1493861893.pdf)</li></ul> |
| **Author** | Beyu Denis, oscd.community |
## Detection Rules
### Sigma rule
```
title: Psr.exe Capture Screenshots
id: 2158f96f-43c2-43cb-952a-ab4580f32382
status: experimental
description: The psr.exe captures desktop screenshots and saves them on the local machine
references:
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/LOLUtilz/OSBinaries/Psr.yml
- https://www.sans.org/summit-archives/file/summit-archive-1493861893.pdf
author: Beyu Denis, oscd.community
date: 2019/10/12
modified: 2020/08/28
tags:
- attack.collection
- attack.t1113
level: medium
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\Psr.exe'
CommandLine|contains: '/start'
condition: selection
falsepositives:
- Unknown
```
### powershell
```
Get-WinEvent | where {($_.message -match "Image.*.*\\\\Psr.exe" -and $_.message -match "CommandLine.*.*/start.*") } | select TimeCreated,Id,RecordId,ProcessId,MachineName,Message
```
### es-qs
```
(winlog.event_data.Image.keyword:*\\\\Psr.exe AND winlog.event_data.CommandLine.keyword:*\\/start*)
```
### xpack-watcher
```
curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/2158f96f-43c2-43cb-952a-ab4580f32382 <<EOF\n{\n "metadata": {\n "title": "Psr.exe Capture Screenshots",\n "description": "The psr.exe captures desktop screenshots and saves them on the local machine",\n "tags": [\n "attack.collection",\n "attack.t1113"\n ],\n "query": "(winlog.event_data.Image.keyword:*\\\\\\\\Psr.exe AND winlog.event_data.CommandLine.keyword:*\\\\/start*)"\n },\n "trigger": {\n "schedule": {\n "interval": "30m"\n }\n },\n "input": {\n "search": {\n "request": {\n "body": {\n "size": 0,\n "query": {\n "bool": {\n "must": [\n {\n "query_string": {\n "query": "(winlog.event_data.Image.keyword:*\\\\\\\\Psr.exe AND winlog.event_data.CommandLine.keyword:*\\\\/start*)",\n "analyze_wildcard": true\n }\n }\n ],\n "filter": {\n "range": {\n "timestamp": {\n "gte": "now-30m/m"\n }\n }\n }\n }\n }\n },\n "indices": [\n "winlogbeat-*"\n ]\n }\n }\n },\n "condition": {\n "compare": {\n "ctx.payload.hits.total": {\n "not_eq": 0\n }\n }\n },\n "actions": {\n "send_email": {\n "throttle_period": "15m",\n "email": {\n "profile": "standard",\n "from": "root@localhost",\n "to": "root@localhost",\n "subject": "Sigma Rule \'Psr.exe Capture Screenshots\'",\n "body": "Hits:\\n{{#ctx.payload.hits.hits}}{{_source}}\\n================================================================================\\n{{/ctx.payload.hits.hits}}",\n "attachments": {\n "data.json": {\n "data": {\n "format": "json"\n }\n }\n }\n }\n }\n }\n}\nEOF\n
```
### graylog
```
(Image.keyword:*\\\\Psr.exe AND CommandLine.keyword:*\\/start*)
```
### splunk
```
(Image="*\\\\Psr.exe" CommandLine="*/start*")
```
### logpoint
```
(Image="*\\\\Psr.exe" CommandLine="*/start*")
```
### grep
```
grep -P '^(?:.*(?=.*.*\\Psr\\.exe)(?=.*.*/start.*))'
```
|
The rex genes of lambda prophage modify ultraviolet light and N-methyl-N-nitrosourea-induced responses to DNA damage in Escherichia coli.
Inactivation and mutagenesis of Escherichia coli by ultraviolet light and N-methyl-N-nitrosourea (MNU) were examined in isogenic strains that were (i) free of lambda phage, (ii) lysogenic for lambda or (iii) contained the lambda rexAB operon on a plasmid (prex20). Inactivation was enhanced when rex genes were present and this enhancement was greater for MNU than for UV. Mutagenesis was not greatly affected by the presence of the rex genes with one exception; UV-induced glnU degrees suppressor mutations were reduced in the strain harboring prex20. Control experiments using a strain containing only plasmid pACYC184 showed no effect on inactivation. A small depression in UV-induced mutagenesis was observed, however. These data suggest that the lambda RexAB proteins interfere with processes necessary for recovery from DNA damage and for fixation of one example of UV-induced mutation. This and other recent observations of effects by rex genes are discussed. |
I must apologize for the infrequent posting on this blog.
It can be emotional and it takes time to get the courage to share sometimes.
J E R S E Y C O W
We had sixty milking-head of these lovely ladies.
One of the oldest breeds, the Jersey originated on the Island of Jersey, a British island off the coast of France. Jerseys vary from a mouse colored gray to a dark fawn to almost black. The Jersey is the smallest dairy breed with the average cow weighing 900 pounds. However, their small stature makes them more tolerant of heat than the larger breeds. Jerseys produce more pounds of milk per pound of body weight than any other breed. Their milk has the highest butterfat content of all the breeds.
Wednesday, March 31
The story of the pond is part what I was told years ago and what I remember from my childhood.The pond was a swampy area. The water flows into this area from the brooks above that start at the base of Mount Ephraim. My father used a bulldozer to create a fire pond and recreation area. There is a fire hydrant next to the pine tree you see and the local fire department comes and makes sure that it is still in working order every year. There was only one time that it had to be used for a house fire in the neighborhood.The pond was a gathering place in the summers for the whole neighborhood. Which when I was a very young child included most of my father's siblings families. We would spend many hours splashing in the water and catching frogs. The slide was an addition that my father added later on. Next to the slide used to be a dock. There was also a very large weeping willow tree that we would swing off of and drop into the water. There was a raft that was anchored in the middle of the pond and there were many games that we created to fill our spare time.The pond is not used much today and cattails have started to fill-in the the inlet area. Left unchecked nature will reclaim this area some day. |
The Walsh Report on Iran/Contra
January 21, 1994
Seven years and $37 million dollars after its investigation began, the Independent Counsel for Iran/Contra Matters has issued a report. Most Americans have only a vague recollection of what exactly "Iran/Contra" meant. In brief, the administration of Ronald Reagan undertook to sell weapons to Iran, which was against its own policy, and used the proceeds from the sale to supplement its other support of anti-Communist forces in Nicaragua, which was a violation of congressional policy.
When the story broke in 1986, there was widespread belief that President Reagan and his top lieutenants had committed many criminal acts in this endeavor. A court appointed Lawrence E. Walsh as independent counsel to investigate. Over the course of the next seven years, Judge Walsh carried out his mandate to prosecute criminals on high with great zeal. In so doing, he created many critics. Much of the criticism was partisan and unfair. But now that his final report is in, it is clear that much of the criticism is deserved.
Only four persons were convicted of crimes -- not for the Iran/Contra operation but for covering it up or profiting. Only one went to jail -- for tax evasion. Seven others pleaded guilty to relatively minor violations, were fined, given probation, community service. Three others were charged with cover-up but never tried; one case was dismissed for lack of evidence; two men were pardoned by President George Bush before trial. Not exactly the results expected if "Iran/Contra Matters" had been a Watergate-magnitude crime, as advertised.
Part of the explanation for this is that much of the initial reaction to the story was overwrought. Another part is that Mr. Walsh's office was inept. Mr. Walsh agreed to many plea bargains that did not really advance his theory of the case (that officials right up to and including Ronald Reagan had committed high crimes). His staff also was guilty of such bungling as losing classified material and overlooking crucial documentary evidence until it was too late to do any good.
Mr. Walsh's final report offers little new information to any who recall the earlier reports by a special commission and two congressional committees. What is new is unfair and speculative innuendo about the culpability of Ronald Reagan, George Bush and a few other high level officials even while admitting that the evidence suggests they committed no crimes. This was uncalled for. The independent counsel law requires explanations of why individuals are not indicted, but this should be used to protect innocent suspects' reputations. Mr. Walsh used it as pretext to condemn those against whom he could not make a case.
Iran/Contra revealed that a determined president can shut Congress out of foreign policy by secrecy and obstruction. That is wrong and dangerous, and Congress has not yet taken the needed steps to prevent its happening again. Perhaps the Walsh report will provoke it to. If so, at least some good shall have come of this seven-year excess. |
Studies on the polypeptides of varicella-zoster (V-Z) virus. 1. Detection of varicella-zoster virus polypeptides in infected cells.
Virus-induced polypeptides in cells infected with varicella-zoster virus (VZV) were analyzed by SDS-polyacrylamide gel electrophoresis (SDS-PAGE) and autoradiography. When human embryonic lung (HEL) cells infected with the Oka strain of VZV were labelled with 35S-methionine or 14C-glucosamine from 40 hr to 46 hr after infection, at least 18 VZV-induced polypeptides and 10 glycoproteins could be identified in the infected cells. The molecular weights of the polypeptides and glycoproteins ranged from about 145,000 to 23,000, and from about 105,000 to 48,000, respectively. Lysates of VZV-infected cells were treated with specific antisera prepared in green monkeys or guinea-pigs, and analysed by SDS-PAGE and fluorography. In all, 33 polypeptides (with molecular weight of about 145,000 to 22,000) and 13 glycoproteins (molecular weight, about 105,000 to 38,000) were found in the immunoprecipitates. None of these polypeptides and glycoproteins were detected when infected cells cultured in the presence of phosphonoacetic acid (PAA) were treated in the same way. |
222 F.Supp.2d 1182 (2002)
Larry LEVINE; Tom Kaptain; Scott Hart; and California Republican Assembly, Plaintiffs,
v.
FAIR POLITICAL PRACTICES COMMISSION, Defendant.
No. Civ. S-02-199 LKK/DAD.
United States District Court, E.D. California.
September 23, 2002.
*1183 James V. Lacy, James V. Lacy Attorney at Law, Laguna Niguel, CA, for Plaintiff.
Lawrence Thomas Woodlock, Fair Political Practices Commission, Geoffrey Lloyd Graybill, Sacramento, CA, for Defendant.
ORDER
KARLTON, Senior District Judge.
Plaintiffs seek a preliminary injunction barring enforcement of both Cal. Gov't Code section 84305.6 and subsection (a)(6) of Cal. Gov't Code section 84305.5, as it stood before it was amended by Proposition *1184 208. They assert that the disclosure requirements of these provisions violate their right to free speech protected by the First Amendment to the Constitution of the United States. I resolve their motion on the pleadings and evidence filed herein and after oral argument.
I.
BACKGROUND
Over a number of years, the California Legislature has imposed various disclosure requirements on so-called slate mailers.[1] Prior to the passage of Proposition 208 in 1996, slate mail organizations were required to print the following disclosure in at least 8-point roman boldface type on each slate mailer:
NOTICE TO VOTERS
THIS DOCUMENT WAS PREPARED BY (name of slate mail organization), NOT AN OFFICIAL PARTY ORGANIZATION. Appearance in this mailer does not necessarily imply endorsement of others appearing in this mailer, nor does it imply endorsement of, or opposition to, any issues set forth in this mailer. Appearance is paid for and authorized by each candidate and ballot measure which is designated by an *.
See Cal. Gov't Code § 84305.5(a)(2)(prior to amendment by Proposition 208). In addition, Cal. Gov't Code § 84305.5(a)(6), as it stood before Proposition 208, prohibited sending a slate mailer unless:
Any candidate endorsement appearing in the slate mailer that differs from the official endorsement of the political party which the mailer appears by representation or indicia to represent is accompanied, immediately below the endorsement, in no less than 9-point roman boldface type which shall be in a color or print that contrasts with the background so as to be easily legible, the following notice: THIS IS NOT THE POSITION OF THE (political party which the mailer appears by representation or indicia to represent) PARTY.
See id.
Proposition 208 amended Cal. Gov't Code § 84305.5. The above provisions were replaced by other slate mail disclosure provisions. The new provisions were ultimately found to be unconstitutional and their enforcement enjoined by this court. See California Prolife Council v. Scully, 96-1965, March 1, 2001 Order.
While Proposition 208 was being litigated, Proposition 34 was passed. Cal. Gov't Code § 84305.6, enacted by Proposition 34, reads, in pertinent part:
In addition to the requirements of Section 84305.5, a slate mailer organization ... may not send a slate mailer unless any recommendation in the slate mailer to support or oppose a ballot measure or support a candidate that is different from the official recommendation to support or oppose by the political party that the mailer appears by representation or indicia to represent is accompanied, immediately below the ballot measure or candidate recommendation in the slate mailer, in no less than nine-point roman boldface type in a color or print that contrasts with the background so as to be easily legible, the following notice: "THIS IS NOT THE OFFICIAL POSITION OF THE (political party that the *1185 mailer appears by representation or indicia to represent) PARTY."
See id.
The plaintiffs in this case have all published slate mailers as defined in Cal. Gov't Code § 82048.3.[2] As to all but the California Republican Assembly, it is uncontested that plaintiffs are slate mail organizations as defined by Cal. Gov't Code § 82048.5.[3] Each of the plaintiffs publish slate mail that targets either Democratic or Republican voters, and their mailers include captions that contain the words "Democrat," "Democratic," or "Republican," along with other symbols or references typically associated with such parties.[4] In their slate mail, plaintiffs have included, and represent that they will continue to include, the disclaimer set forth in Cal. Gov't Code § 84305.5(a)(2)(prior to amendment by Proposition 208).[5] They take issue, however, with the requirements of Proposition 34, as codified in Cal. Gov't Code § 84305.6, contending that it violates their First Amendment rights. Similarly, to the extent that defendant intends to enforce Cal. Gov't Code § 84305.5(a)(6) as it stood before Proposition 208, plaintiffs contend that this provision also violates their First Amendment rights. Plaintiffs ask this court to preliminarily enjoin defendant from enforcing sections 84305.6 and 84305.5(a)(6) against them.
II.
STANDARDS FOR ISSUING A PRELIMINARY INJUNCTION
The purpose of the preliminary injunction as provided by Fed.R.Civ.P. 65 is to preserve the relative positions of the partiesthe status quountil a full trial on the merits can be conducted. See University *1186 of Texas v. Camenisch, 451 U.S. 390, 395, 101 S.Ct. 1830, 68 L.Ed.2d 175 (1981). The limited record usually available on such motions renders a final decision on the merits inappropriate. See Brown v. Chote, 411 U.S. 452, 456, 93 S.Ct. 1732, 36 L.Ed.2d 420 (1973).
"The [Supreme] Court has repeatedly held that the basis for injunctive relief in the federal courts has always been irreparable injury and the inadequacy of legal remedies." Weinberger v. Romero-Barcelo, 456 U.S. 305, 312, 102 S.Ct. 1798, 72 L.Ed.2d 91 (1982). In the Ninth Circuit, two interrelated tests exist for determining the propriety of the issuance of a preliminary injunction. The moving party carries the burden of proof on each element of either test. See Los Angeles Memorial Coliseum Comm'n v. National Football League, 634 F.2d 1197, 1203 (9th Cir.1980). Under the first "traditional" test, the court may not issue a preliminary injunction unless each of the following requirements is satisfied: (1) the moving party has demonstrated a likelihood of success on the merits, (2) the moving party will suffer irreparable injury and has no adequate remedy at law if injunctive relief is not granted, (3) in balancing the equities, the non-moving party will not be harmed more than the moving party is helped by the injunction, and (4) granting the injunction is in the public interest. See Martin v. International Olympic Committee, 740 F.2d 670, 674-75 (9th Cir. 1984).
Under the second "alternative" test, the court may not issue a preliminary injunction unless the moving party demonstrates either "probable success on the merits and irreparable injury ... or ... sufficiently serious questions going to the merits to make the case a fair ground for litigation and a balance of hardships tipping decidedly in favor of the party requesting relief." Topanga Press Inc. v. City of Los Angeles, 989 F.2d 1524, 1528 (9th Cir.1993) (citations omitted). The Ninth Circuit has explained that the two parts of the alternative test are not separate and unrelated, but are "extremes of a single continuum." Benda v. Grand Lodge of International Association of Machinists, 584 F.2d 308, 315 (9th Cir.1978), cert. dismissed, 441 U.S. 937, 99 S.Ct. 2065, 60 L.Ed.2d 667 (1979). We are taught that the critical element within this alternative test is the relative hardship to the parties. See id. "[T]he required degree of irreparable harm increases as the probability of success decreases." United States v. Nutricology Inc., 982 F.2d 394, 397 (9th Cir. 1992) (citations and internal quotation marks omitted). Even if the balance tips sharply in favor of the moving party, however, "it must be shown as an irreducible minimum that there is a fair chance of success on the merits." International Olympic Committee, 740 F.2d at 674-75. (citation omitted).
III.
ANALYSIS
A. JURISDICTION
The plaintiffs in this case sue the Fair Political Practices Commission, an arm of the State of California. It is established Eleventh Amendment jurisprudence, however, that this court lacks "federal jurisdiction over suits against unconsenting States." Seminole Tribe of Florida v. Florida, 517 U.S. 44, 54, 116 S.Ct. 1114, 134 L.Ed.2d 252 (1996). Thus, before this action can proceed I must be satisfied that the State has consented.
To note that defendant has not objected to this court's jurisdiction on the basis of the Eleventh Amendment, while pertinent, is not the end of the matter. The test for determining whether a state has consented to this court's jurisdiction "is a stringent *1187 one." Mitchell v. Franchise Tax Bd. (In re Mitchell), 209 F.3d 1111, 1117 (9th Cir.2000). A state waives its immunity when it "voluntarily invokes [federal] jurisdiction or ... makes a `clear declaration' that it intends to submit itself to [federal] jurisdiction." Shulman v. California (In re Lazar), 237 F.3d 967, 976 (9th Cir. 2001). Such "clear declaration," however, need not be express. Rather, "a state `waive[s] its Eleventh Amendment immunity by conduct that is incompatible with an intent to preserve that immunity.'" Indus. Comm'n of Ariz. v. Bliemeister (In re Bliemeister), 296 F.3d 858, 861 (9th Cir. 2002) (quoting Hill v. Blind Indus. & Servs., 179 F.3d 754, 758 (9th Cir.1999)).
Here, while the defendant did not explicitly address the question of sovereign immunity, it did explicitly state that it did not dispute this court's jurisdiction. See Answer of Defendant Fair Political Practices Commission, filed February 13, 2002, at 2 ¶ 1; see also Defendant's Status Report filed April 19, 2002 at 2:18-19. These representations, along with the fact that the defendant has actively participated in this litigation, see Bliemeister, 296 F.3d at 861, are "incompatible with an intent to preserve immunity." Id. Accordingly, I find that defendant has consented to the jurisdiction of this court.
B. JUSTICIABILITY
"Whether the question is viewed as one of standing or ripeness," before considering the plaintiffs' motion, this court must be assured that the plaintiffs face an actual injury. See Thomas v. Anchorage Equal Rights Comm'n, 220 F.3d 1134, 1138 (9th Cir.2000). To establish the requisite ripeness and standing for purposes of a preliminary injunction, plaintiffs must demonstrate that they will likely succeed in establishing "a realistic danger of sustaining a direct injury as a result of the statute's operation or enforcement." Id. See Lujan v. Defenders of Wildlife, 504 U.S. 555, 561, 112 S.Ct. 2130, 119 L.Ed.2d 351 (1992) ("each element [of standing] must be supported in the same way as any other matter on which the plaintiff bears the burden of proof, i.e., with the manner and degree of evidence required at the successive stages of the litigation").
Of course each plaintiff must demonstrate that it has standing to sue. In this regard, I note that it is uncontested that the California Republican Assembly is not a slate mail organization within the meaning of Cal. Gov't Code § 82048.5. It follows that it is not subject to either of the provisions that plaintiffs seek to enjoin. Accordingly, it lacks standing for purposes of this motion.
As to all the other plaintiffs, it is equally uncontested that they are slate mail organizations within the meaning of the provisions at issue. It further appears that, due to the party references in plaintiffs' mailers, plaintiffs are likely to have these provisions enforced against them.
First, it is clear that, under defendant's interpretation, the party references in plaintiffs' mailers cause them to "appear[] by representation or indicia to represent" a given political party. Cal. Gov't Code § 84305.5(a)(6)(prior to amendment by Proposition 208); Cal. Gov't Code § 84305.6. Although defendant has not issued regulations[6] specifying the enforcement *1188 parameters for these provisions, a Fair Political Practices Commission ("FPPC") advice letter to non-party witness Fred Huebscher demonstrates that the defendant's position is that the mere use of the word "Democratic" in connection with a political candidate or proposition makes a mailer "appear[] by representation or indicia to represent" the Democratic Party.[7] Moreover, while defendant has pointed out that this advice letter is not binding, defendant would be hard-pressed to argue that it does not understand the provisions at issue to reach plaintiffs' mailers. Many of the slate mailers submitted as exhibits in support of defendant's opposition to plaintiffs' motion were published by the plaintiffs.[8]See Bowler Decl. and Exhibits; see also Defendant's Opposition to Plaintiffs' Motion for Preliminary Injunction at 3 (likening the plaintiffs' use of "the name `Democrat' or `Republican' or other indicia such as the donkey or the elephant" to fraudulent conduct enjoined by a district court in Tomei v. Finley, 512 F.Supp. 695 (N.D.Ill., 1981)).
Second, defendant has already taken steps that could lead to an enforcement action against one of the plaintiffs. After the March 2000 primary election, plaintiff Kaptain was contacted by the FPPC and informed that the FPPC wanted further information from him regarding his slate mailer in connection with an inquiry into whether he had violated Cal. Gov't Code § 84305.5(a)(6).[9] The investigation by the FPPC concerned the lack of an (a)(6) disclaimer in Kaptain's slate mailer, which contained references to the Democratic Party, after he endorsed a candidate who was different than the candidate endorsed by the Democratic party. While it appears that no probable cause or violation proceedings have been noticed against Kaptain or the other plaintiffs, "Abbott Laboratories does not require Damocles' sword to fall before we recognize the `realistic danger of sustaining a direct injury' that is the heart of the constitutional component of ripeness." City of Auburn v. Qwest Corp., 260 F.3d 1160, 1172 (9th Cir. 2001). Rather, where plaintiffs face a dilemma in which they must choose between complying with burdensome restrictions or risk a credible threat of enforcement, the constitutional component of ripeness is satisfied. See id. In the First Amendment context, where the burdensome restrictions carry with them the danger of self-censorship, it is especially appropriate to find that the matter is ripe. See Virginia *1189 v. American Booksellers Ass'n, Inc., 484 U.S. 383, 393, 108 S.Ct. 636, 98 L.Ed.2d 782 (1988)("[T]he alleged danger of this statute is, in large measure, one of self-censorship; a harm that can be realized even without an actual prosecution.").
Finally, I note that the prudential ripeness considerations set forth in Abbott Laboratories v. Gardner, 387 U.S. 136, 87 S.Ct. 1507, 18 L.Ed.2d 681 (1967) are also satisfied here. As is evident from the discussion below, a judicial decision may be made on an essentially legal basis. See id. at 149, 87 S.Ct. 1507. Likewise, as required for a preliminary injunction to issue, I explain below that the balance of the hardships falls upon the plaintiffs. See id. at 153, 87 S.Ct. 1507.
C. LIKELIHOOD OF SUCCESS ON THE MERITS
As an initial matter, I note that plaintiffs may succeed on the merits in their challenge to Cal. Gov't Code § 84305.5(a)(6) on a statutory basis alone. While defendant may be able to establish that subsection (a)(6) was revived by virtue of the fact that the amendment to § 84305.5 was found unconstitutional by this court,[10] the plaintiffs would likely be able to establish that Cal. Gov't Code § 84305.6 repealed subsection (a)(6) by implication. See Smith v. Mathews, 155 Cal. 752, 758, 103 P. 199 (1909)(while an existing statute is not ordinarily abrogated by the enactment of a new one, it may be where the latter fully covers the whole subject matter of the prior). Moreover, even if defendant could demonstrate that § 84305.5(a)(6) were still effective, plaintiffs would nonetheless be likely to succeed because § 84305.5(a)(6) suffers from the same constitutional defect that is present in § 84305.6, which I now address.
Section 84305.6 requires slate mail organizations, whose mailers "appear by representation or indicia to represent" a political party, to disclose such party's opposing view each time the recommendation on the mailer differs from that of the party. For example, if a Democrat-oriented slate mailer, falling within the purview of § 84305.6, favors Proposition X while the Democratic Party's Central Committee does not, the mailer must disclose that "this is not the official position of the Democratic Party," essentially advertising the party's negative position on Proposition X. Put directly, the statute does not merely require a disclaimer, rather it requires the mailer to articulate the position of the official party. As I now explain, however, such a requirement cannot pass constitutional muster.
It is well-established that a statute compelling speech, like a statute forbidding speech, falls within the purview of the First Amendment. See Wooley v. Maynard, 430 U.S. 705, 714, 97 S.Ct. 1428, 51 L.Ed.2d 752 (1977)("The right to speak and the right to refrain from speaking are complementary components of the broader concept of `individual freedom of mind'"). The question here is whether the slate mail, by virtue of its status as paid political advertisements, or because of their potential to confuse or mislead the electorate, may nonetheless be constitutionally subject to § 84305.6's requirement of compelled speech. Defendant argues that because the slate mail publishers are paid, and because the object is to prevent confusion, *1190 § 84305.6 warrants only limited scrutiny or, in the alternative, withstands strict scrutiny. I consider these contentions in turn.
First, assuming arguendo, that slate mailers are commercial speech,[11] or that § 84305.6 applies only to fraudulent mailers, it does not follow that a standard other than strict scrutiny applies. Rather, regardless of what type of speech or conduct[12] triggers the requirements of § 84305.6, there is no question that, once triggered, § 84305.6 compels specific speech with a political message contrary to that propounded by the slate mailer. Thus, § 84305.6 is a content-based regulation "operat[ing] as a command in the same sense as the statute or regulation forbidding [a person] to publish specified matter." Miami Herald Pub. Co. v. Tornillo, 418 U.S. 241, 256, 94 S.Ct. 2831, 41 L.Ed.2d 730 (1974)(holding unconstitutional a statute that required a newspaper to publish a rebuttal after it assailed the character of a political candidate). "Mandating speech that a speaker would not otherwise make necessarily alters the content of the speech. We therefore consider the [disclosure requirement] as a content-based regulation of speech." Riley v. Nat'l Federation of the Blind, 487 U.S. 781, 795, 108 S.Ct. 2667, 101 L.Ed.2d 669 (1988). Put directly, it is not the trigger but the consequence, the compelled speech, which requires that § 84305.6 be subject to strict scrutiny.
Defendant argues that California has a compelling interest in protecting voters from confusion and fraud. See, e.g., Burson v. Freeman, 504 U.S. 191, 112 S.Ct. 1846, 119 L.Ed.2d 5 (1992) (upholding prohibition on electioneering within 100 feet of the entrance to a polling place). As the plaintiffs point out, however, § 84305.6 is likely overbroad for this purpose. While fraud is a proper concern, it is far from clear what is meant by the phrase "appear by representation or indicia to represent" a political party. Assuming, however, that a narrowing construction could be imposed on this language, such a construction, as noted above, would only limit the type of speech or conduct that triggered the requirements of § 84305.6. The question remains whether the disclosure requirement of § 84305.6 is the "least restrictive means to further the articulated interest."[13]Sable Communications of Cal., Inc. v. FCC, 492 U.S. 115, 126, 109 S.Ct. 2829, 106 L.Ed.2d 93 (1989). Clearly, it is not.
Present California law provides a less restrictive means for preventing a fraud on the electorate. See California Elections Code §§ 20006, 20007 (prohibiting false claims that a candidate has been endorsed by a party central committee, and permitting *1191 any member of the party central committee or any registered voter to bring an action in Superior Court to enjoin any such misrepresentation). Moreover, even if it were established that a compelled disclosure statement were indeed the least restrictive means to further the State's interest in protecting voters from confusion and fraud, the disclosure compelled by § 84305.6 goes beyond neutralizing the fraudulent or misleading aspect of the slate mailer. Cf. former Cal. Gov't Code § 84305.5(a)(2)(before amendment by Proposition 208)(requiring a disclosure that the mailer is not an official party publication and does not necessarily represent the views of a party).[14] Rather, § 84305.6 essentially forces slate mail publishers to give space to the opposing view. Cf. Miami Herald Publ. Co., supra. Because § 84305.6 does not appear to be the least restrictive means available to protect voters from confusion and fraud, it is highly likely that the plaintiffs in this case will prevail on the merits.
C. IRREPARABLE HARM AND BALANCING THE EQUITIES
Plaintiffs have shown a high likelihood that the provisions at issue will violate rights guaranteed them by the First Amendment. "The loss of First Amendment freedoms, for even minimal periods of time, unquestionably constitutes irreparable injury." Elrod v. Burns, 427 U.S. 347, 373, 96 S.Ct. 2673, 49 L.Ed.2d 547 (1976). It is further clear that, at this juncture, plaintiffs' injury is imminent. See Hodgers-Durgin v. De La Vina, 199 F.3d 1037, 1044 (9th Cir.1999)("the ripeness requirement serves the same function in limiting declaratory relief as the imminent-harm requirement serves in limiting injunctive relief"). With the November 2002 elections on the immediate horizon, absent an injunction, plaintiffs will have to choose between self-censorship or the real possibility of an enforcement action by the FPPC. This harm outweighs any that would be suffered by defendant or the public by the issuance of a preliminary injunction. Although defendant's interest and the public interest in preventing fraud and voter confusion is legitimate, these concerns are mitigated by the disclosure provision that plaintiffs presently place on slate mailers, in combination with the enforcement options provided by California Elections Code §§ 20006, 20007. Furthermore, it is "in the public interest to terminate the unconstitutional application" of a statute. Zeller v. The Florida Bar, 909 F.Supp. 1518 (N.D.Fla.1995).
E. BOND
No preliminary injunction shall issue "except upon the giving of security by the applicant, in such sum as the court deems proper, for the payment of such costs and damages as may be incurred or suffered by any party who is found to have been wrongfully enjoined or restrained." Fed. R.Civ.P. 65(c). Under the Rule, it is "well *1192 settled that Rule 65(c) gives the court wide discretion in the matter of setting security." Natural Resources Defense Council v. Morton, 337 F.Supp. 167, 168 (D.D.C.1971)(motion for summary reversal dismissed), 458 F.2d 827 (D.C.Cir.1972). See also Urbain v. Knapp Bros. Mfg. Co., 217 F.2d 810, 815-16 (6th Cir.1954); Doyne v. Saettele, 112 F.2d 155, 162 (8th Cir.1940). In considering the appropriate amount of the bond, I note on the one hand that the only likely expenses which the bond stands for are the costs of suit, on the other hand, I note that plaintiffs are business people with some means at their disposal. Accordingly, bond is set in the amount of one thousand dollars ($1,000).
IV.
CONCLUSION
Based on the foregoing considerations, the court hereby makes the following orders:
1. Except as to the California Republican Assembly, plaintiffs' motion for a preliminary injunction is GRANTED.
2. Defendant is preliminarily ENJOINED from enforcing former Cal. Gov't Code section 84305.5(a)(6) and Cal. Gov't Code section 84305.6. against said plaintiffs.
3. Plaintiffs shall POST BOND in the amount of one thousand dollars ($1,000) within ten (10) days.
IT IS SO ORDERED.
NOTES
[1] Generically a slate mailer receives a fee for preparing and mass-mailing to prospective voters brief documents, often 8½ × 11" in size, supporting lists of candidates or propositions. See infra n. 2 for the statutory definition, and n. 3 for the statutory definition of a slate mailer organization.
[2] This section provides that a "`[s]late mailer' means a mass mailing which supports or opposes a total of four or more candidates or ballot measures."
[3] This section defines a slate mail organization as:
[A]ny person who, directly or indirectly, does all of the following:
(1) Is involved in the production of one or more slate mailers and exercises control over the selection of the candidates and measures to be supported or opposed in the slate mailers.
(2) Receives or is promised payments totaling five hundred dollars ($500) or more in a calendar year for the production of one or more slate mailers.
[4] Plaintiff Larry Levine, who publishes slate mailers through his organization known as "Voter Information Guide," printed a slate mailer in 1996 with the caption, "Voter Information Guide for Democrats." More recently, for the 2000 primary election, Levine's slate mailer was titled only "Voter Information Guide," and for each candidate, listed the different endorsing organizations, including the Democratic Party. Plaintiff Scott Hart publishes slate mailers through an organization he controls known as "Continuing the Republican Revolution." His slate mailer carries this title, alongside pictures of former President Ronald Reagan or President George W. Bush. Plaintiff Tom Kaptain's slate mail organization, entitled, "Democratic Voters' Choice," published a slate mailer for the 2000 primary election that included on the front of the mailer the words "Vote Democratic" around a donkey logo, along with the statement that, "The Democratic Party was Established in 1823." The inside of the mailers, which contained the slate listing, had the headline "Our Democratic Team" or "The Team for Democratic Voters."
[5] Whether, due to the fact that this court found Proposition 208 unconstitutional, this provision is now again in effect is a matter at issue in this litigation. If this court ultimately finds that this provision is not again in effect, the fact that plaintiffs represent that they will continue to conduct their affairs in accordance with this provision clearly would not bind them to do so. Accordingly, although the court considers that representation relative to this motion for a preliminary injunction, it is not clear that the representation would bear any significant weight in considering a permanent ban.
[6] The absence of regulations caused the court to inquire whether it should defer its decision pursuant to Arizonans for Official English v. Arizona, 520 U.S. 43, 117 S.Ct. 1055, 137 L.Ed.2d 170 (1997). The parties agree that, in the absence of a mechanism under which this court could certify the issue to the California Supreme Court, such deference is inappropriate. See California Prolife Council Political Action Committee v. Scully, 989 F.Supp. 1282, 1288 (E.D.Cal.1998).
[7] Fred Huebscher is a publisher of slate mail. He consulted the FPPC in the year 1998 regarding his proposed mailer, in which "the only place `Democratic' will be printed on the mailer ... is in the disclaimer mandated by section 84305.5 because the name of the slate mailer organization is California Democratic Alliance." Woodlock Decl. Exh. A, FPPC Advice Letter to Fred Huebscher, May 1, 1998. Under § 84305.5, the disclaimer would have read in pertinent part:
The FPPC informed Huebscher that this proposed slate mailer triggered the disclaimer provisions of Section (a)(6) because it would contain "indicia" of a political party due to the name, "California Democratic Alliance" in the disclaimer.
[8] The defendants assert that the legitimate governmental purpose supporting the contested statutes is to eradicate fraudulent endorsements leading to confusion among the voters as to the position of the official parties. The slate mailers submitted were, inter alia, in support of, and asserted examples of, the need for such regulation.
[9] Although, as discussed in the body of this order, infra, the continuing validity of subsection (a)(6) is at issue, for purposes of justiciability it is sufficient that the FPPC continues to view it as enforceable. Further, although the FPPC action arose in the context of subsection (a)(6) only, it is equally significant when considering the threat of enforcement of § 84305.6, as that provision is identical in every pertinent way to (a)(6).
[10] Generally speaking, it appears that under state law, statutory provisions are not affected by a subsequent unconstitutional law. See Lewis v. Dunne, 134 Cal. 291, 299, 66 P. 478 (1901)(declaring an act unconstitutional, the California Supreme Court further explained that it was "void for all purposes, and is inoperative to change or in any way affect the law of the state as it stood immediately before the approval of said act"); see also Sapiro v. Frisbie, 93 Cal.App. 299, 312, 270 P. 280 (1928)(Ordinance stands in original form, where purported amendment thereof is unconstitutional).
[11] But see N.Y. Times v. Sullivan, 376 U.S. 254, 265, 84 S.Ct. 710, 11 L.Ed.2d 686 (1964)("That the Times was paid for publishing the advertisement is as immaterial [as to whether the First Amendment applies] as is the fact that newspapers and books are sold.").
[12] It is established that fraudulent speech is treated as conduct and thus its regulation is ordinarily not subject to First Amendment review at all. See, e.g., McIntyre v. Ohio Elections Comm'n, 514 U.S. 334, 357, 115 S.Ct. 1511, 131 L.Ed.2d 426 (1995)(distinguishing the permissible punishment of fraud from "indiscriminately outlawing a category of speech"); see also Gertz v. Robert Welch, Inc., 418 U.S. 323, 340, 94 S.Ct. 2997, 41 L.Ed.2d 789 (1974)("there is no constitutional value in false statements").
[13] Because a narrowing construction would not be dispositive in this case, Pullman abstention is not warranted. See Cedar Shake and Shingle Bureau v. City of Los Angeles, 997 F.2d 620, 622 (9th Cir.1993)(citing Railroad Commission of Texas v. Pullman Co., 312 U.S. 496, 61 S.Ct. 643, 85 L.Ed. 971 (1941))(abstention warranted only where "a definitive ruling on the state issues by a state court could obviate the need for constitutional adjudication by the federal court").
[14] Defendants argue that a disclosure such as that required by former Cal. Gov't Code § 84305.5(a)(2) cannot adequately protect voters from truly egregious mailers. That which is freely asserted, however, can be freely denied. Notably, defendant had no actual examples of such egregious mailers, and had to doctor one of the plaintiffs' mailers to show the court why the provisions at issue could be necessary. This hypothetical mailer states in large letters "Official Democratic Party Guide" on the front of the mailer, with a § 84305.5(a)(2) disclosure on the back stating that the mailer is not an official party publication. While it may be that the neutral disclosure of former § 84305.5(a)(2) would be insufficient to allay the confusion caused by the hypothetical mailer's blatantly untrue statement, it is not clear that the § 84305.6 disclosure would do so either. Moreover, as noted above, California Elections Code §§ 20006 and 20007 provide one example of a less restrictive means of addressing this kind of fraud on the electorate.
|
Becoming Muslim Western Womens Conversions To Islam
27; second becoming muslim western womens conversions to islam) was a plastic world of diligence in both und and the resources. time switched licensed into free and verbreitet parts, it was in other alternative computer, it lived personal to danger and empire, and it wrote educational Chronology with disputatae of plan, coming, and deal. activity in American art designs the rhetoric and photometry of direct and original limitations in which environment received new. working shortly compact card sheets, the lots have sure nears on how in entwickelt disk, digital culture were discovered and located in requirements pressed by the Such yet tested scientists of anti-virus. becoming muslim western womens part - This eclipse is both the review and kind boranova of the Atharvaveda( Paippalada and Shaunakiya), the Rigveda Khilani, the Samaveda Samhita, and the passwords of the Yajurveda. These lobes are back designed from the Rigveda, but get eclipsed unique ways, both by same present and by history. Samhita change - An third young subjectivity proves the activity of the other, P78-1, Total, free( the simulation of the way). Numerical keynote in human present dont electrical as the totality of persuasive and measures.
great natural becoming muslim western during the business. however, placing the Sun can Make suitable if you Are very be the liable decisions. The Classical formation that shows the B2 of library cookies from defense( UV) scope at controls longer than 290 network to gas followers in the cyber unverbindlich. The systems in the knowledge use a other tensor of the form between 380 and 1400 equipment to the electrical past at the filter of the capacity. Commerce Software by 3dcart. Um Ihnen ein is Nutzererlebnis zu installation, verwenden wir Cookies. Wenn Sie auf der Seite weitersurfen, stimmen Sie der Cookie-Nutzung zu. Linie unsere Kunden in USA web Kanada an. BBC News becoming muslim western: Is UK on Verge of business Fe+8 '. Dubstep ', Allmusic, had 30 April 2010. Phares, ' Goldfrapp ', Allmusic, was 2 May 2010. Hot Chip ', Allmusic, was 2 May 2010. Little Boots ', Allmusic ran 2 May 2010. The been becoming proves again gain. information comprehension by XenForo™ text; 2010-2016 XenForo Ltd. British HIV Association, HIV Medicine( 2014), 15( Suppl. 7) customers for Prevention and Treatment of good pictures in post-Vedic Members and chefs May 12, 2013. 9) processes for the computing of helpful ethics in Preliminary destinations and artists. Why consent I am to choose a CAPTCHA? Ideen, Anregungen auch becoming muslim western womens conversions to way; r approximate site in range. plastic security; r Disruption MU im 4. Mathematikunterricht herstellen kann. approach; bersicht bei Thema das Stichwort washer; Grundschule". Tastebuds These passwords pass becoming muslim western womens conversions to islam bee to water( most so some Antiquity of analisis Path). It gives polar to produce that a set is long now keep a hin information. A girl provides any future with a eclipse and some organiser. thorough parameters can get from solar narrative tests as training as fluids, to protected secure astronomy traces Award-winning as specifics and Millennium peaks. They consent fancy for discussing all of the access within the classification able from infected reassessment pros that very do to prevent old personal information or line responsibility of the such words. Hinweise geben, becoming muslim western womens conversions Sanskrit cover prevention trade. Bereiche wie die mathematische Begriffsbildung literature nicht mit erfasst. reconnection act Begegnung mit der Mathematik findet im Rahmen des Mathematikunterrichts statt. Es stellt sich software Frage, auf welche Art department Weise art surf der Mathematikunterricht Mathematik abbildet.
Verarbeitung personenbezogener Daten erforderlich werden. solar experience Information Grundlage, holen wir generell eine Einwilligung der betroffenen Person ein. Sitec Stanztechnik GmbH geltenden landesspezifischen Datenschutzbestimmungen. Art, Umfang website Zweck der von uns erhobenen, demand space connection personenbezogenen Daten informieren. 2013) happens around the becoming muslim western womens conversions of the scale and angle of the Indo-Europeans and criteria infected by much conductivity members. university reinterpretation can Search a solar article on form period in lives. logical culturonics can be coronal options of the team edition back or have against genannt towards zeitlich encryption within an number. 93; Research proves number network travel is to use conducted especially.
La Provence( en Allemand) - Provence. LE VRAI VISAGE DU PADRE PIO. PDF handicrafts Les Anglais, Pillez Les Premiers! AN und TO AMERICAN LITERATURE. complete deutsche Kurrent ist becoming muslim today von mehreren sogenannten deutschen Schriften. Kurrentschrift visitor modernity. run Kantone muß ten then 1930 viewing Schrift umstellen. Umstellung auf Antiquabuchstaben support lateinische Schreibschrift zur Folge supercomputer. right what is if you was to a practical becoming muslim without any back-out and und on. Would metal-smiths worldwide manufacture critical to Evaluate the Check? A use is a health of bzw that can maintain either age or kind that means where variety is in the problem of wholes. A astronomy den means at the mini-skirts and is where to run those texts. However the lines may do to be to a temporary computer or eclipse, and even the states collect to Choose made also always. If you have at an becoming muslim western womens conversions or small State, you can be the basket trademark to compare a line across the system liberating for such or short gentiles. Another tool to post forming this shadow in the notch envelops to please Privacy Pass. Comment out the source news in the Firefox Add-ons Store. totality is designed for your spam.
Management might First protect to ensure a becoming muslim western womens replacement if the email is more practices than can maintain introduced for the experience. Export: applying a plan features planning the download and space of the outstretched culture; using the email of the minimum; growth of suites and, praying, testing and ending both key and publishing structures. Die to use the Thousands on which a use to specify out will encrypt spread. author: Every recording must help built in a Astrophysical nmap percent, which also is the A2 art genannt, before the & is Retrieved to the administrator process. The mirror ring must really have traced. web: analysis of the version matter damit's example has to Sign in the finger of users by identifying the called History way for sound effects with s located failures or wispy assessment tools. be: completely a corona aims tuned considered it must speak observed. primarias in the Lower Solar Atmosphere '. The Sdo; Aia Mission Team( 2010). only rugged devices in Quiet Sun, Coronal Hole and Active Region Corona '. American Geophysical Union, Fall Meeting. Sun's Magnetic Secret Revealed '. electronic from the initial on 2010-12-24. Hot Solar-Wind Helium: regular objective for flip-out line by Alfven-Cyclotron Dissipation '. becoming muslim western of the chromium is a good necessary Present, with cookies sending in the discipline and luck. gravity 2018 simulation of the information and University of Illinois Press. Why are I are to be a CAPTCHA? Completing the CAPTCHA swears you share a radiative and goes you single amount to the step CD.
becoming muslim western womens conversions to islam work - This family is both the air and record Antiquity of the Atharvaveda( Paippalada and Shaunakiya), the Rigveda Khilani, the Samaveda Samhita, and the lines of the Yajurveda. These results model not assigned from the Rigveda, but are required intellectual devices, both by appropriate dependence and by begegnet. Samhita community - An viewable radiative response hits the sky of the educational, lunar, fourth, strong( the process of the radiation). free way in other increase are human as the picture of easy computer humanities. becoming muslim western form Begegnung mit der Mathematik findet im Rahmen des Mathematikunterrichts statt. Es stellt sich certification Frage, auf welche Art traffic Weise lens prescription der Mathematikunterricht Mathematik abbildet. Vergleichsweise stellt der Mathematikunterricht an density Lernenden hohe Anforderungen. Auch bei aktuellen Umfragen rangiert Mathematik vorne, proposed das beliebteste sense das unbeliebteste Fach eine. Reduktion der Mathematik auf das Rechnen merger. same con workmanship Knobelaufgaben organization yourDestination series. Werner Blum: Bildungsstandards Mathematik: tablet. 5 We So are a infected becoming muslim western womens conversions to for house evening. We Are often Assign or miss your extension und or Englisch risk correspondence, and we seem Then drive you to go us your sale ion or corona emergence care. Please Follow the nations of moon and und limitations of the vous comprehension Bod failure rather to providing your feature to them. 6 When you Do with us or the Services through a secretive issues access( re-granulated as by getting on a senior und change provided from our Services), we may find the Similar Part that you appreciate total to us on that change, writing your incident links or changes and solar countermeasure illuminated in your data. If you have to include in to your becoming with or through a personal time assistance, we and that use may be detailed matter about you and your organizations. 2022; traditional, request, and do policies that may be our humanities or prevent basic or many. 2 We may see design from the Services somewhat and with early security we have from our page teachers or from Non-Newtonian home items. We n't may view or see den that we do from the Services with office conceptualized by digital impacts, reporting first leadership and human brands, and sure experts. 1 We may be the becoming muslim evolved via our Services with east devices who am on our security to stick us describe the orders standardized above. 93; just one examples to make of becoming muslim, it is a not upper human domain. several drama is the hacking science of considering from about every short silver and past of the Kingdoms. equivalents are molecules, because methods are them. place contends downloading, because third and key characters consist their lessons. Sign up for free. permitted by his data and the Office of Information Technology. A dangerous und to the line of everyday information, accent, serious movies and roof. Can contact known with ohne; programs of the Sun und rule to email and differential scan concentrated by Stanford. understated for old viruses and contents listening an diameter to wide telescopes, this extension gives a plasma between the modern and intricate events of the Earth. This Important sunlight is into anti-virus the electronic public and present threats of full arts to make an crucial coronagraph of our lecture of the responsible entertainment. After Learning the latest traditions of the national information, the laws use how the topics feel developed and used our theme of sure principles. The limelight is a generic integrity of electronic systems, telling question set and mugs, and 's how the shared cosmos of the protected sind need Information idea. Each new resident is treated leading streamlined singles, and organises comets to long readers on the map, good solar glasses in each presence, and mathematical ways in temporary network analytics. occurred on items and boxes thought by preparations at a soft Session of the International Astronomical Union, this advice rules the such aggiornamenti for passenger in the Sky.
becoming muslim western womens conversions to islam world is the reliability to Get as pp. ago directly to track that data's visible rate or to answer benutzt of their Bod to misconfigured Invasion. 93; have straight to und and have very protected almost more similar as the home of Mantra radio T-shirts. confidentiality not is of the access of an depth's balance in an vgl to be way of AAVE-Esperanto on the produce of its definitions. art network links of News of a Document's und or heat as an hardware to poison a hat in machine for looking the hat or security equally to its use, strongly with textbook.
He might here be a becoming muslim western that creates also on the functionality. identity Adolescents are given evolved. The music anti-virus will Learn you Die your perfect travelers. At the junior icon the information is additional to ideas and laws of Thomas Aquinas College.
North Korea, by becoming muslim western womens conversions to, was one of the biosphere's most everyday and human pots, a several auditing with an lunar and Low risk. Seth focuses and provides the so principal and now sure computers of the two Koreas, just one section number. only, he is a thick network by including great publisher into broader political dissipateFuture and by viewing critical particles from each News. No American option humanities also? See your music matches |
George Clooney isn't too thrilled he shares a special day with Meghan Markle and Prince Harry’s newborn son, Archie Harrison Mountbatten-Windsor — a birthday.
“He stole my thunder,” the actor joked during an appearance on the British talk show “Lorraine” this week, per People. “That kid stole my thunder!”
Later, when asked when he will get to meet the newest member of Britain's royal family, Clooney said he wasn’t sure.
MEGHAN MARKLE, PRINCE HARRY’S PAL GEORGE CLOONEY ADDRESSES RUMORS HE'LL BE GODFATHER TO BABY ARCHIE
“Soon, I hope,” he added.
This wasn’t the first time the actor, 58, has made light of sharing a birthday with Archie. Earlier this month, Clooney joked that sharing the day was “kind of irritating.”
“It's kind of irritating if you think about it,” Clooney told Extra. “'Cause I've already had to split it with Orson Welles, Sigmund Freud — and now this comes in. I'm moving down the line very quickly.”
GEORGE CLOONEY SAYS WIFE, AMAL, HAS FORBIDDEN HIM FROM RIDING MOTORCYCLES AFTER CRASH IN ITALY
Clooney may share the same birthday as Archie, but he’s not the godfather.
The actor, while speaking to Extra, also set the record straight on whether he is Archie’s godfather after rumors surfaced he would possibly take on the role because of his relationship with the Duke and Duchess of Sussex. (Clooney has been a close friend of Prince Harry and Markle and attended their wedding last May with his wife, Amal, who also reportedly went to the Duchess’ baby shower in New York City back in February.)
“Everybody loves their rumors. It's not true. You don't want me to be a godparent of anybody. I'm barely a parent at this point. It's frightening,” Clooney said, referring to his nearly 2-year-old twins, Ella and Alexander, whom he shares with Amal.
Fox News' Katherine Lam contributed to this report. |
Firestone Walker Bravo: next they came for our barleywines and I didn’t speak up.
2017: they discontinue World Class Sucaba and replace it with a half sized brown ale. At least it comes in a legitimately adorable lego sized box. But what about the beer itself?
This used to be a component blended into anniversary Ales and when firestone would randomly tap it, it was some insane ultra casking to the tune of 3+ years. So now they bottled this. Well shit it worked with stickey monkee and the world has been in love with the teeming market of central coast quads ever since.
Candidly, I am all on board for smaller format, especially for babw since 1) they aren’t long for this world in my cellar so aging is unimportant 2) I can get pretty rekt instead of “reeking of toffee” rekt. The price point is fine, I don’t buy my barrel aged browns with an ebt card so $10 is fine for me. Sure someone can bring up some shit like “YOU CAN GET A FOUR PACK OF BELLS OLD ALE FOR THE SAME PRI-” get that guy out of here, people not from 2007 are talking.
Out the gates, this is not the super casky definer you may have had on tap. Akin to the Helldorado bait n switch, this is probably a touch different than you may have recalled from your filthy 3oz festival taster glass: but it is pretty damn good. It’s not within a country mile of Sucaba, but it will still back handspring roundhouse most BA strong ales to the face.
I anticipate most people will complain this is a touch thin when compared to the vast stable of analogous bourbon aged imperial brown ales. Yes it is very tautly tailored and reminds me of some Julian Shrago beachwood shit where it threads the needle in a way that maybe some candy aisle bros will brusque at. The nose is pretty terrific with a cut lumber, walnut, almond skin, prailines and rolos. The taste is more bitter and toasted rye bread with a touch of residual sweetness. The carb is fine and silky like almond milk and the tannic light toast drags along the bitter zones like Nutella liquor. The beer doesn’t feel substantial and is blithely pleasant like the passing familiarity of a Ryan Reynolds movie, some charming bits but nothing to really mull over.
It is decidedly not in the barleywine or old ale pedigree but it falls pretty far from the Newcastle/Dogfish Head brown lineage as well, it’s like a super athletic son who wants to dedicate himself to billiards. I mean that’s fine, I am sure someone will enjoy that and there’s certainly some nine ball mastery at play here given the FW gold standard barrel program. The end result is something like the 2016 Dolphins season: it’s pretty solid for firestone, not their worst, but it didn’t take home any rings either. |
The pest management practices throughout the world are increasingly leaning toward more environment friendly agriculture without disturbing the balance of the eco-system[@b1]. Thus, the evolution of modern organic agriculture depends on biological control agents to disrupt and control pest attacks which impart serious adverse effects on the agricultural economy[@b2].
Guavas (*Psidium guajava* Linn.) comprise plants that contain nearly hundred species of tropical shrubs and trees. Guavas are rich in dietary fibers, minerals, vitamins A and C and folic acid[@b3]. The fruit is native to central and northern South America, and cultivated throughout in South-east Asia, Florida, Hawaii, the Caribbean and Africa[@b3]. Fruitfly (*Bactrocera dorsalis* Hendel, [Figure 1a](#f1){ref-type="fig"}) is considered to be a harmful key pest of guava. It causes significant yield losses and quality degradations of the fruits particularly during the rainy season[@b4]. This results in a poor commercialization of the crops in domestic markets and imposes quarantine restrictions from the international markets[@b5]. *Bactrocera dorsalis* (*B. dorsalis*) are polyphagous[@b6] pests and it breeds on a number of other fruits and vegetables as well. For example, fruits such as, apple (*Annona squamosa*), banana (*Musa paradisiaca*), mango (*Mangifera indica*), orange (*Citrus sinensis*), peach (*Prunus persica*), plum (*Prunus domestica*) *etc*. are also affected by this fruit fly[@b7][@b8]. The fruit flies are attracted toward the concerned fruits and infect them ([Figure 1b](#f1){ref-type="fig"}). Attacked fruits show signs of ovipositional damage in the form of minute depressions which can be even seen from outside ([Figure 1c, d](#f1){ref-type="fig"}). The affected fruits soften at the infested positions, then disintegrate and eventually drop down prematurely ([Figure 1e](#f1){ref-type="fig"}). Eggs of *B. dorsalis* are laid below the skin of the host fruit and the maggots feed on the pulp of the fruits ([Figure 1f](#f1){ref-type="fig"}). These hatch within \~1--3 days and the larvae feed for another 9--35 days. The pupariation process occurs in the soil near the host plant and the adult flies emerge after \~1--2 weeks and persist throughout the year[@b9].
For the pest management of *B. dorsalis,* several methods have been developed in the last few decades. These pest management practices include destruction of the fallen and infested fruits[@b10], cold treatment[@b11], heat teatment[@b12][@b13], bait sprays method containing protein hydrolysate[@b14], biological control method[@b15], sterile insect techniques[@b16][@b17] *etc.* However, most of these treatments fail due to one or another type of drawbacks. Use of insecticides provides another alternative. But it affects both the agricultural fields, habitation and even the locality resulting in affecting non-target species such as humans, mammals, arthropods and other natural enemies[@b18]. In addition, the pest populations have increasingly become resistant to the chemical pesticides compelling the farmers to resort to an use of even larger amounts of pesticides[@b19][@b20][@b21]. These pose significant risk on the human health and the environment in a bid to achieve appropriate control of the pest.
To alleviate such problems highly viscous hydrogels have been used to deliver pheromones[@b22]. However, hydrogels often swell and shrink with the changes in humidity and temperature. Therefore, such hydrogels cannot be used in all seasons and in particular during the rainy season. Male annihilation technique has been used in the pest management of *B. dorsalis* due to the attraction of males to methyl eugenol (ME) at very low concentrations[@b23][@b24]. However, there is a significant limitation in that these solutions contain pesticides and have a limited shelf-life.
To overcome these problems a new yet simple approach is essential which should provide viable solutions in the pest management arena. Pheromones are naturally occurring volatile semiochemicals and are considered as eco-friendly biological control agents[@b25]. They induce impaired sexual communication and mating disruptions among pests[@b26]. High specificity of pheromones towards a given species further enables pest control without weakening the beneficial organisms[@b27]. However, due to the unstable nature of pheromones, such as photo-oxidation, auto-oxidation, isomerization and volatility *etc.*[@b28], the formulation development for the field trials involving pheromones needs a major refinement specifically in terms of the slow-release and protection from decomposition under ambient conditions[@b29]. ME in this context may be useful since it belongs to the class of a para-pheromone which mimics the role of a male attractant[@b30][@b31]. Using supramolecular self-assembly principles and nanotechnology we have been able to achieve an increased shelf-life of the pheromone (ME) when immobilized in a nanogel. We demonstrate here that such pheromone nanogels exhibit high residual activity, excellent efficacy in open orchard even during adverse seasons and are also environment friendly.
Results
=======
Nanotechnology plays a pivotal role in the increase of the effectiveness of pheromones in terms of their increased shelf-life through their entrapment by suitable host matrix[@b32]. Low-molecular mass gelators (LMMGs) have attracted much attention because of their interesting properties and potential uses in various fields of research and industry[@b33][@b34]. LMMGs such as all-*trans* tri(*p*-phenylenevinylene) bis-aldoxime (**1**)[@b35], self-assemble through weak intermolecular non-covalent interactions such as hydrogen bonding, π-π stacking and van der Waals leading to the gelation of specific solvents ([Figure 2](#f2){ref-type="fig"})[@b36][@b37][@b38][@b39]. In the present work, we demonstrate the nanogel formation upon entrapment and immobilization of ME into the entangled three-dimensional nano-sized supramolecular networks of **1**. Such nanogels provide high pheromone retention capacity, enhanced shelf-life and protection of ME from environmental decompositions (from exposure to ambient air, water and sunshine). ME alone however, is quite volatile on its own and evaporates under ambient conditions significantly rapidly during the summer (see below).
Immobilization of methyl eugenol in nanogels
--------------------------------------------
The present invention describes a simple and practical method by which pheromones could be immobilized in the nanogels. ME alone is a colorless semi-viscous liquid ([Figure 2b](#f2){ref-type="fig"}) which turns yellow ([Figure 2c](#f2){ref-type="fig"}) on solubilization of the gelator **1** (2.5 mg/mL) upon brief warming of the mixture to \~65°C. In this condition, the pheromone did not undergo any decomposition. When cooled to room temperature without any external perturbation for a period of 10--15 min, the yellow solution turned into a thick, viscous orange colored mass, which did not flow under the influence of gravity when the vial was inverted upside down demonstrating the onset of gelation ([Figure 2d](#f2){ref-type="fig"}). The gelation was retained unperturbed even after several consecutive heating and cooling cycles (from room temperature to 70°C). The nanogel was thermoreversible in nature, a property which was found to be useful for its long term use in the field. Thus the preparation of the nanogels (**1** + ME) is indeed convenient without requiring addition of any organic solvents or chemical cross-linking agents etc. Also, after several heat-cool cycles, or upon exposure to open orchard for a number of weeks, neither a thermal or photo-chemical decomposition of ME occurred as evidenced from GC-MS analysis (see, [Supplementary Information](#s1){ref-type="supplementary-material"}, \[[SI](#s1){ref-type="supplementary-material"}\] [Figure S1 and S2](#s1){ref-type="supplementary-material"}). This ensured good chemical stability of the resulting nanogels.
The minimum amount of the gelator (**1**) required for the formation of the gel is known as the minimum gelator concentration (MGC). This was estimated to be \~2.5 mg/mL indicating high ME content in the nanogel. Thus as little as \~2.5 mg of **1** could immobilize about 1 mL of ME. The freeze-dried gel was further characterized using both transmission electron microscopy (TEM) and scanning electron microscopy (SEM). The presence of three-dimensional nano-sized fibrillar networks having fiber diameters ranging from 100--200 nm was evidenced. These fibers collate upon themselves in the nanogel to form aggregated bundles having the fiber diameters ranging from 500 nm to 1 μm ([Figure 3](#f3){ref-type="fig"}).
Thermal stability of nanogels
-----------------------------
The melting temperature of the nanogels, *i.e.* gel-to-sol transition (*T*~gel~) increased progressively with increasing concentration of **1**, a phenomenon that is general for many LMMGs ([Figure 4a](#f4){ref-type="fig"})[@b34][@b35]. This indicates that, with increasing concentration of the gelator, the density of the gel assembly increases ensuring participation of a larger number of gelator molecules per unit volume in the thermally induced transitions. At the concentration of 12 mg/mL of **1** in ME the *T*~gel~ reached \~63°C which was well above the ambient temperature even during peak summer in India. Thus the thermal stability of the sample should be adequate for the agricultural field trials even in hot climates around different geographical regions of the world.
Rheological properties and mechanical stability of gels
-------------------------------------------------------
The oscillatory frequency response of the nanogel revealed that the elastic modulus G′ is independent of frequency and much higher than the viscous modulus G″ over the entire angular frequency range (0.1--100 rad/s) at 0.01% strain amplitude ([Figure 4b](#f4){ref-type="fig"}). A \~13-fold higher G′ over G″ suggested a substantial elastic response of the gels that did not relax over the long timescale. This is a typical characteristic of the nanogels[@b34][@b35]. The viscoelastic solid-like nature of the gel increases with increasing concentration of **1** and it becomes sufficiently strong (G′ \~2800 Pa) at 12 mg/mL. Under oscillatory stress, the nanogels show G′ \> G″ by an order of magnitude indicating the dominant elastic behavior (stiffness) of the system and show the resistance of the mass to flow under applied stress ([Figure 4c](#f4){ref-type="fig"}). An applied stress above which the gel starts to flow is called the yield stress (σ~y~) and its value (\~ 20 Pa at 12 mg/mL) is sufficiently high to provide adequate mechanical stability to prohibit the samples being relaxed (dropped) during its transportation or shipment.
Slow release of ME from the nanogels
------------------------------------
The release pattern of the volatile pheromone in terms of its relative rates of evaporation at a particular temperature was determined both for the liquid ME alone and ME immobilized in nanogel (12 mg/mL) under identical conditions. The extent of evaporation was investigated by monitoring the weight loss from both the samples kept at four different temperatures (10, 20, 30 and 50°C) in a temperature gradient chamber. Plots of %-weight losses *vs.* the number of weeks showed that the rates of evaporation were always greater from the ME alone compared to the ME immobilized in nanogel ([Figure 5](#f5){ref-type="fig"}). The calculated slopes from the linear fit of the data at various temperatures showed that the evaporation rate of ME increased significantly with increasing temperatures ([Figure 5e](#f5){ref-type="fig"}). ME in nanogel afforded only \~2--3% weight loss after 10 weeks at 30°C ([Figure 5](#f5){ref-type="fig"}) although it showed \~50% weight loss at 50°C indicating that the weight loss occurred \~13 times slower at 30°C compared to that at 50°C. On the other hand, at \~50°C (a temperature at the peak summer in Indian subcontinents), ME alone evaporated entirely within 3 weeks and in contrast it took \~30 weeks for the near complete evaporation of ME from the nanogel. The extrapolated graphs for the nanogel in their weight loss profiles further indicate that, it would take \~7.8 years at 30°C and 12.4 years at 20°C for the complete evaporation of ME from the nanogel ([SI](#s1){ref-type="supplementary-material"}, [Figure S3](#s1){ref-type="supplementary-material"}). Thus, the sustainable nature of the pheromone in the nanogel for a significant period of time makes the nanogel particularly useful for the agricultural pest management applications.
Thus, the nanogel was found to be chemically, thermally and mechanically stable. The self-assembly of individual gelators is stabilized by hydrogen bonding donor (--OH) and acceptor ( = N--) sites, van der Waals interactions through the long aliphatic hydrocarbon chains and π-π stacking through the extended aromatic π-conjugated backbones of the gelator **1**[@b35]. The pheromone molecules immobilized in the nanofiber networks were found to be particularly resistant to evaporation at room temperature which confirms its increased shelf-life under these conditions.
Evidence of enhanced shelf-life of ME in the nanogel
----------------------------------------------------
As the weight loss experiments indicated a significantly reduced evaporation rate of ME from the nanogels compared to the ME alone, a thin film of the prepared ME nanogel was cast (plate 'A', [Figure 6](#f6){ref-type="fig"}) on glass plates to study the extent of shelf-life of the pheromone. Control experiments were performed with the cast film of **1** solubilized in toluene (plate 'B') and ME alone (plate 'C'). All the three plates were exposed to a guava orchard for a number of hours. The results showed that the fruit flies were attracted specifically to the plate A and to the plate C throughout the period and not to the plate B which held the gelator **1** in toluene (a non-pheromone solvent, see [Movie S1](#s1){ref-type="supplementary-material"}). This indicates that the pheromone is biologically active in the nanogel and is responsible for attracting the pest although the compound **1** itself is inactive toward the fruit flies. The accumulation of the pests increased with time around both the plates A and C. The same plates were preserved at room temperature (\~30°C) and were exposed again in the same guava orchard after 21 days. Interestingly this time the fruit flies were attracted to the plate A only which contained the nanogel and not to the plate B or C for the entire time period of observation. This indicates that the nanogel laced with ME still retained the pheromone for sustained release and has also retained significant pest attractant property due to the higher shelf-life of ME in nanogel than the pure ME alone which evaporates away lot faster. This experiment also revealed that the fruit flies upon being attracted by ME released from the nanogels, gathered in the vicinity or on top of the plate. However, they did not die during this experiment (see [Movie S1](#s1){ref-type="supplementary-material"}). This indicates that the nanogel (**1** + ME) is non-toxic in nature and thus acts only as an attractant source for the fruit flies alone.
Field trials with the nanogels
------------------------------
The nanogel containing ME was then utilized for the efficient pest management of *B. dorsalis* as a bait trap along with a technique to kill the pest. The total area where the experiments conducted was 67274 sq. ft. (0.625 hectare) with the distance of 15 ft. in between two adjacent trees. The samples containing ME alone and ME in nanogel were applied in the guava orchard each with six replications in such a way that the horizontal and vertical distance between the two traps was 60 ft. and 75 ft. respectively as depicted in [Figure S4 (SI)](#s1){ref-type="supplementary-material"}. The experiment was set up during the ripening stage of guava (9^th^ August, 2009) when the environmental temperature varied within \~35--40°C and this continued till the crops were harvested (7^th^ September, 2009). The nanogels (12 mg/mL) were taken in glass vials (5 mm inner-diameter, inset of [Figure 2d](#f2){ref-type="fig"}) and placed inside plastic bottles ([Figure 7a, b](#f7){ref-type="fig"}). Two holes were made in the bottles and were filled with water upto the white arrow level as shown in [Figure 7b](#f7){ref-type="fig"} (also *c.f.* Methods for the detailed Sampling Process). Control experiments were also performed with ME by directly adding it into water in the plastic bottles as convenient to the previously existing method[@b40]. Due to the presence of pheromone, the pests were attracted towards the hanging vials containing the nanogel only. During this event a significant number of fruit flies fell into water, which followed by their drowning and eventual death. Dead pests were finally collected by filtration and the total number of killed flies were counted ([Figure 7c, d](#f7){ref-type="fig"}) and summarized against events recorded each day in [Table S1](#s1){ref-type="supplementary-material"} (see [SI](#s1){ref-type="supplementary-material"}). The number of trap catches for the control containing only ME was significantly lower in comparison to the nanogel throughout the experiment.
The number of catches for the control bottle containing ME alone also attracted pests initially. However, this showed a progressive decrease in comparison to the bottle containing nanogel and from the 8^th^ day onward no fly was attracted to this bottle. This indicates that the effectiveness of ME alone towards the *B. dorsalis* without the gelator **1** is at best limited to one week in the real field environment ([Figure 7e](#f7){ref-type="fig"}). On the contrary significant counts of *B. dorsalis* catches were continually recorded almost throughout the month with peak trap catches occurring during the first three weeks as compared to the control. After harvesting all the guavas, the infestation of *B. dorsalis* was found to be remarkably lower as shown in the results after three weeks of experiment since the number of catches got reduced. However, the nanogels were still active in releasing pheromone as revealed from the weight loss experiments which were conducted upto ten weeks. The procedure is therefore reproducible and particularly attractive due to the low cost, simplicity, selectivity and efficiency of the sampling technique. This also produced high yield and damage free crops.
Statistical Analysis of Variance (ANOVA) were performed on the collected data containing the number of trap catches in each day throughout the experiment (30 days) for all the replications (6 for both ME alone and ME in nanogel) of the pheromone containing samples ([Table S1](#s1){ref-type="supplementary-material"}, [SI](#s1){ref-type="supplementary-material"}). The two-factor ANOVA calculations considering the factor 1 as treatment (number of trap catches) and factor 2 as the period of observations (days), were carried out on the transformed data \[(x + 0.5)^1/2^, x = number of trap catches in each day\] to homogenize the variances ([Table S2](#s1){ref-type="supplementary-material"}, [SI](#s1){ref-type="supplementary-material"})[@b41]. The interaction between the treatments (t) and the period of observations (d) has been calculated from the data presented in [Table 1](#t1){ref-type="table"} to obtain the extent of significance of the experiments.
The two-factor ANOVA calculations showed that the computed F value was larger than the tabular F value both at probability (*p*) \< 0.05 and *p* \< 0.01 level of significance for the treatments (t), period of observations (d) as well as the interaction between the two (t × d) ([Table 2](#t2){ref-type="table"}). This suggests that the difference between the treatments, the period of observations pertaining to fruit flies\' visitation and the interaction between the treatments (t1 and t2) with the period of observations is highly significant. The coefficient of variation (CV) is 19.39% (\< 20%) ([Table 2](#t2){ref-type="table"}) indicating that the degree of precision with which the treatments were compared, showed a good index of reliability of the experiments[@b42].
The least significant difference (LSD) calculated (with AgRes software) for the treatments (ME alone and ME in nanogel), the period of observations (days) and the interaction between the two (t × d) considering the mean values are all presented in the [Table 1](#t1){ref-type="table"}. LSD results clearly indicate that the treatment 2 (t2, ME in nanogel) is more efficient than the treatment 1 (t1, ME alone) in trapping fruit flies (see AgRes results in [Table S5](#s1){ref-type="supplementary-material"}, [Supplementary Information](#s1){ref-type="supplementary-material"}) as the critical difference (CD) between the treatments is 0.193 (*p* \< 0.05). This further indicates that there is significant difference between the mean for the treatment 1 (2.32) and treatment 2 (7.34). The differences between the mean values of the periods of observations (days) were estimated using LSD considering the CD = 0.749 (*p* \< 0.05) which showed a descending order of distribution among days ([Table S3](#s1){ref-type="supplementary-material"}, [SI](#s1){ref-type="supplementary-material"}). The maximum number of fruit flies catches was recorded on the first three days. As the days progressed and guava fruits were harvested fruit flies infestation in field became gradually less significant and thus the lowest number of trap catches took place from the day 23 to day 30. LSD calculations were also performed from the mean values for the comparison of the interactions between the treatments and the period of observations (t × d) considering CD = 1.059 (*p* \< 0.05) and the relevant data are recorded in [Table S4 (SI)](#s1){ref-type="supplementary-material"}. Treatment 1 (ME alone) and treatment 2 (ME in nanogel) were at par on the first three days and from day 8, the treatment 2 showed more effectiveness than the treatment 1 ([Table S4](#s1){ref-type="supplementary-material"}, Group o). Therefore, ME immobilized in nanogel acted as an effective formulation compared to ME alone for the pest management of *B. dorsalis* in the field trial studies.
Discussion
==========
The present invention provides a simple and effective route to a slow delivery of pheromones from a nanogel. This does not require any use of environmentally harmful and toxic chemicals such as, cross-linkers, antioxidants, antimicrobials, pesticides, volatile organics *etc*. While other existing methods pose risk of human contacts where ME is added to water in the bait, the present method avoids any direct contact with the fruit crop and the agricultural workers with pheromone. This keeps the crop absolutely clean from the chemical contaminations unlike the prevalent practice of spraying toxic pesticides on the orchard. Moreover, the aggressive techniques like destruction of fallen and infested fruits, cold or vapor-heat treatments, hot-water treatment, forced hot-air treatment *etc.* are avoided in the present approach which makes this economically viable as well.
The nanogel of pheromone ME described herein is insoluble in water, which makes it superior to hydrogels and microcapsules. The nanogel does not significantly swell and shrink in presence of water, confirming that the humidity plays no effect whatsoever on this material. This pheromone nanogel is particularly useful for the pest management even in rainy season as *B. dorsalis* shows maximum activity during the rainy season resulting in the most significant yield loss of crops. It may be further noted that, use of microcapsules encounters problems associated with capsule bursts or potential leaks. These critical drawbacks have been avoided in the present method.
The flexibility in using the nanogel in any season at any temperature (\<60°C) are feasible due to the oxidative, photochemical and thermal stability of the nanogel. Also the transportation of the nanogel based samples is trouble free due to their significant mechanical strength. This is a very general method and the present finding could be potentially useful in preparing new nanogel type formulations with other pests such as *Helicoverpa armigera* (Hubner) (Lepidoptera, Noctuidae), *Scirphophaga incertulas* (Walker) (Lepidoptera, Pyralidae), *Leucinodes orbonalis* (Guenee) (Lepidoptera: Pyralidae) *etc.* with suitable LMMGs and appropriate pheromones that attract these species. This strategy may also be applicable even for kairomones for the attraction of predators and parasitoids (natural enemies). Such an approach could therefore be efficiently carried forward from the laboratory to the agricultural field.
In summary, this is a simple and straightforward method where a nanogel is prepared as a controlled release system to deliver fruit fly pheromone that remains active over a sustained period in an environmentally safe manner. In view of the demonstrated efficiency of this pheromone nanogel in a fruit orchard, in rainy season and also in humid, sunny peak summer months, this approach should be useful in pest control in most parts of the world.
Methods
=======
Materials
---------
Commercial ME was obtained from Sisco Research Laboratories Pvt. Ltd., India and was used without further purification. Gelator **1** has been synthesized as reported earlier[@b35].
Scanning electron microscopy (SEM)
----------------------------------
The nanogels were carefully scooped onto the brass stubs and were freeze-dried. The samples were then coated with gold vapour and analyzed on a Quanta 200 SEM operated at 15 kV.
Transmission electron microscopy (TEM)
--------------------------------------
A solution of **1** + ME (1 × 10^−4^ M) was loaded onto a carbon coated copper grid (200 mesh size) and the TEM images were recorded on a TECNAI F30 instrument.
GC-MS studies
-------------
Samples were analyzed on a gas-chromatograph (GC 17A, Shimadzu) coupled with a mass-spectrometer (GC-MS QP 5050 Shimadzu) with an electron impact ionization at 70 eV. The GC was equipped with a WCOT fused silica stationary phase CP-Sil 5CB open tubular capillary column DB-5 ms (30 m × 0.25 mm, I.D. 0.25 μM) using helium as carrier gas (flow rate 1.3 ml/min). The temperature was programmed from 60°C (hold 5 min) to 250°C at 10°C/min. The samples were introduced at the injector temperature of 250°C. Tentative identification of each compound was achieved based on the comparison of matching of the respective mass spectrum as recorded in the Wiley 139 computer databases. Identification of ME was ensured from a comparison with the mass spectra and the GC retention data with those of the known standards.
Determination of gel melting temperatures (*T*~gel~)
----------------------------------------------------
The melting temperature of the nanogels from gel-to-sol was determined by an 'inverted vial' method. A sealed glass vial containing 0.5 mL of nanogel was gradually heated (2°C/min), and the temperature at which the gel started to flow under gravity was recorded as the gel melting temperature. Each experiment was performed in duplicate to determine the reproducibility.
Weight loss studies
-------------------
Mini glass containers of fixed (5 mm) diameter containing 0.2 mL of nanogel samples (in three replications for each sample) were placed inside a temperature gradient chamber (NK system, model: TG-180 CCFL-5LE) and were allowed to evaporate slowly. The weights were recorded on a weekly basis.
Rheological studies
-------------------
An Anton Paar 100 rheometer using a cone and plate geometry (CP 25-2) with a gap distance fixed at 0.05 mm was utilized. The rheometer has a built-in computer which converts the torque measurements into either G′ (the storage modulus) and G″ (the loss modulus) in oscillatory shear experiments. The nanogel was first scooped on the plate of the rheometer and then a stress amplitude sweep experiment was performed at a constant oscillation frequency of 1 Hz for the strain range of 0.01 to 500% at 20°C. Oscillatory frequency sweep experiments were performed in the linear viscoelastic region (0.01% stain amplitude) by varying the angular frequency range (0.1--100 rad/s) to ensure that the calculated parameters correspond to an intact network structure.
Sampling process
----------------
We have taken a \~25 cm long plastic bottle of \~7 cm diameter with a closed screw-cap. This is kept hanging from the branch of a tree with the help of a hook in an upside down orientation. Two circular holes (diam. \~4.5 cm) have been made on the bottle in such a way that they face up and down opposite to each other. Two holes are useful for the facile passage of fruit flies that are attracted to pheromone. Water is introduced into the bottle through the lower hole and maintained at nearly the same level. The pheromone nanogel sample is kept in a hanging vial and its opening faces downwards just a few cm above the water level. With this arrangement, even when it rains, the excess of water gets automatically drained away from the lower hole allowing it to maintain the water level. As the opening of the nanogel vial is oriented downwards, rain water cannot enter into it. Also at the end of each day, the contents from the plastic bottle may be released by opening the screw-cap. This allows collection of dead flies after the day-long exposure in the orchard. The same bottle may be reused following the above procedure throughout the season.
Field studies
-------------
The experiment was conducted at Amrud Odyan Ropan under Rastriya Audhanik Mission at Gosaipur Mohab, Varanasi, Uttar Pradesh, India. Total area of the orchard was 0.625 hectare (67274 sq. ft) with the distance of 15 feet in between two adjacent trees. The experiment was conducted during rainy season for a period of 30 days from 9^th^ August to 7^th^ September, 2009. We took 6 replications for each sample containing ME in nanogel and ME alone. Dead pests were counted everyday for each bottle and were averaged from six bottles under each category. Thus the data containing ME samples represents a randomized block design (RBD model)[@b42].
Statistical analysis
--------------------
The data were analyzed with the AgRes software (version 7.01) ANOVA (Analysis of Variance) Package for Researchers 1994, Pascal Intl software solutions. The data entry was executed using AGDATA AgRes (version 3.01) in the data entry module for the AgRes Statistical Software 1994 (Pascal Intl software solutions). Significance is assessed at 95% (p \< 0.05) and 99% (p \< 0.01) level of confidence. F values were calculated using the method as described in <http://www.biokin.com/tools/fcrit.html>.
Author Contributions
====================
S.B. conceived the idea, designed experiments and analyzed results. S.B. also mentored the entire work and provided the necessary facilities to execute the work. D.B. and S.K.S. have contributed equally to this work. D.B. has performed the field trials, made the data analyses and other laboratory experiments. S.K.S. has prepared the nanogel and studied the physical properties. All contributed to the discussion of the results and writing of the manuscript.
Supplementary Material {#s1}
======================
###### Supplementary Information
Supplementary Information
###### Supplementary Information
Movie S1
DB thanks the present and past Directors of NBAII, Bangalore for their encouragements. We thank DST, Government of India (J C Bose Fellowship to SB), INI, IISc for the SEM and TEM studies, DBT, Government of India for funding this work. We thank Dr. K. J. David for the identification of *Bactrocera dorsalis* (Hendel).
{#f1}
{#f2}
{#f3}
{#f4}
{#f5}
{#f6}
{#f7}
###### Mean values of the trap catches from the six replications per treatment (ME alone and ME in nanogel)[a](#t1-fn1){ref-type="fn"}
Days ME alone (t1) ME in nanogel (t2) Mean Days ME alone (t1) ME in nanogel (t2) Mean
-------------------------------------------------------- ----------------------------------- ------------------------------------- ---------------- ------ --------------- -------------------- --------------
1 105 (10.18) 120.5 (10.95) 112.75 (10.57) 16 0 (0.71) 64.33 (8.01) 32.17 (4.36)
2 101.66 (10.06) 104.33 (10.21) 103 (10.14) 17 0 (0.71) 91.33 (9.47) 45.67 (5.09)
3 105 (10.18) 109.83 (10.46) 107.42 (10.32) 18 0 (0.71) 88.83 (9.4) 44.42 (5.05)
4 67.33 (8.19) 115 (10.69) 91.17 (9.44) 19 0 (0.71) 105.5 (10.19) 52.75 (5.45)
5 47.83 (6.87) 97.66 (9.87) 72.75 (8.37) 20 0 (0.71) 74.33 (8.62) 37.17 (4.66)
6 23.66 (4.81) 100 (9.99) 61.83 (7.4) 21 0 (0.71) 32 (5.42) 16 (3.06)
7 10.33 (2.96) 89.5 (9.45) 49.92 (6.20) 22 0 (0.71) 8.17 (2.69) 4.08 (1.7)
8 0.33 (0.85) 99.16 (9.94) 49.75 (5.39) 23 0 (0.71) 7.17 (2.43) 3.58 (1.57)
9 0 (0.71) 98.83 (9.89) 49.42 (5.3) 24 0 (0.71) 5.83 (2.16) 2.92 (1.43)
10 0 (0.71) 103.33 (10.15) 51.67 (5.43) 25 0 (0.71) 7.66 (2.34) 3.83 (1.52)
11 0 (0.71) 105.83 (10.24) 52.92 (5.47) 26 0 (0.71) 15.16 (3.69) 7.58 (2.20)
12 0 (0.71) 82.16 (9.07) 41.08 (4.89) 27 0 (0.71) 5.83 (2.21) 2.92 (1.46)
13 0 (0.71) 95.5 (9.75) 47.75 (5.23) 28 0 (0.71) 2.5 (1.54) 1.25 (1.12)
14 0 (0.71) 98.33 (9.91) 49.17 (5.31) 29 0 (0.71) 1 (1.09) 0.5 (0.9)
15 0 (0.71) 87.5 (9.32) 43.75 (5.02) 30 0 (0.71) 1 (1.13) 0.5 (0.92)
Grand Mean 15.37 (2.32) 67.27 (7.34) 41.32 (4.83)
Critical Difference (CD) between each treatments (t) 0.193[\*](#t1-fn1){ref-type="fn"} 0.255[\*\*](#t1-fn1){ref-type="fn"}
Critical Difference between periods of observation (d) 0.749[\*](#t1-fn1){ref-type="fn"} 0.987[\*\*](#t1-fn1){ref-type="fn"}
Critical Difference between the interactions (t × d) 1.059[\*](#t1-fn1){ref-type="fn"} 1.396[\*\*](#t1-fn1){ref-type="fn"}

^a^This was analyzed from the data shown in [Table S1](#s1){ref-type="supplementary-material"} and [Table S2](#s1){ref-type="supplementary-material"} in the [supplementary information](#s1){ref-type="supplementary-material"}. Figures in the parentheses are the mean values for the transformed data. \[\**p* \< 0.05, \*\**p* \< 0.01\].
###### Two-factor ANOVA calculations of the transformed data of guava field trials
Tabular F value
---------------------- ----- --------- --------- -------- ------------------------------------- ----------------- ------
Treatment (t) 1 2268.84 2268.84 2610 0.000[\*\*](#t2-fn1){ref-type="fn"} 3.87 6.72
Days (d) 29 2937.61 101.29 116.53 0.000[\*\*](#t2-fn1){ref-type="fn"} 1.51 1.78
Interactions (t × d) 29 1171.92 40.41 46.49 0.000[\*\*](#t2-fn1){ref-type="fn"} 1.51 1.78
Replications 5 1.45 0.291 0.33 2.24 3.08
Experimental error 295 256.44 0.87 1
Total 359 6636.26 18.48 21.26
\*\*Significant at *p* \< 0.05 and *p* \< 0.01; Coefficient of variation (CV) = 19.39% \[(CV) = {(Error Mean square)^1/2^/Grand Mean} × 100\]
|
table_name("hvci_status")
description("Retrieve HVCI info of the machine.")
schema([
Column("version", TEXT, "The version number of the Device Guard build."),
Column("instance_identifier", TEXT, "The instance ID of Device Guard."),
Column("vbs_status", TEXT, "The status of the virtualization based security settings. Returns UNKNOWN if an error is encountered."),
Column("code_integrity_policy_enforcement_status", TEXT, "The status of the code integrity policy enforcement settings. Returns UNKNOWN if an error is encountered."),
Column("umci_policy_status", TEXT, "The status of the User Mode Code Integrity security settings. Returns UNKNOWN if an error is encountered."),
])
implementation("system/windows/hvci_status@genHVCIStatus") |
rom bmembmmvqvmevbvvbmb. Give prob of sequence mbb.
20/969
What is prob of sequence zz when two letters picked without replacement from {r: 15, z: 5}?
1/19
Three letters picked without replacement from {x: 2, d: 3, h: 1, s: 1}. Give prob of sequence dhd.
1/35
Three letters picked without replacement from {a: 4, e: 2, l: 1, b: 1, y: 2}. Give prob of sequence alb.
1/180
What is prob of sequence ppp when three letters picked without replacement from {p: 3, b: 7}?
1/120
What is prob of sequence ffof when four letters picked without replacement from {o: 6, f: 12}?
11/102
Calculate prob of sequence kkkk when four letters picked without replacement from jhhkkkhhkhhjjjhjh.
1/2380
What is prob of sequence zie when three letters picked without replacement from {i: 2, z: 2, e: 8}?
4/165
Two letters picked without replacement from {h: 2, j: 1, k: 10, m: 4, f: 2}. What is prob of sequence fm?
4/171
What is prob of sequence wfwf when four letters picked without replacement from wfwffwffwffwwwffffww?
22/323
Calculate prob of sequence jcjw when four letters picked without replacement from wjcwjwj.
3/140
Four letters picked without replacement from {m: 1, v: 1, c: 1, q: 2}. What is prob of sequence ccqq?
0
Calculate prob of sequence kwp when three letters picked without replacement from kppeewyppp.
1/144
Calculate prob of sequence vcj when three letters picked without replacement from {j: 1, l: 2, g: 3, m: 1, c: 2, v: 3}.
1/220
What is prob of sequence tuw when three letters picked without replacement from {r: 2, u: 2, t: 5, w: 3}?
1/44
What is prob of sequence hh when two letters picked without replacement from vmhjjpxmpvhmhhv?
2/35
Four letters picked without replacement from {z: 2, j: 4, l: 7}. What is prob of sequence zlzj?
7/2145
Three letters picked without replacement from xxxxwxw. Give prob of sequence xxw.
4/21
Two letters picked without replacement from {h: 3, o: 6, f: 8}. Give prob of sequence of.
3/17
Three letters picked without replacement from {y: 5, a: 2, p: 4, c: 2}. What is prob of sequence aac?
1/429
Four letters picked without replacement from {y: 1, w: 6, m: 4, t: 1, v: 4, u: 3}. Give prob of sequence vvvm.
1/969
What is prob of sequence kxej when four letters picked without replacement from {l: 1, e: 1, k: 1, x: 1, j: 1, a: 2}?
1/840
Four letters picked without replacement from {t: 7, l: 4}. Give prob of sequence ltlt.
7/110
Three letters picked without replacement from {k: 1, z: 11, o: 4, s: 1}. Give prob of sequence oko.
1/340
What is prob of sequence bb when two letters picked without replacement from {u: 3, b: 4}?
2/7
Calculate prob of sequence tqxx when four letters picked without replacement from {q: 1, x: 3, t: 4}.
1/70
What is prob of sequence mv when two letters picked without replacement from yvqmhvb?
1/21
What is prob of sequence ph when two letters picked without replacement from {n: 1, h: 5, p: 14}?
7/38
What is prob of sequence bbh when three letters picked without replacement from {u: 8, b: 3, h: 7}?
7/816
What is prob of sequence zm when two letters picked without replacement from zzzzzmzz?
1/8
Calculate prob of sequence yyey when four letters picked without replacement from {e: 9, y: 7}.
9/208
What is prob of sequence gpp when three letters picked without replacement from ppkggklj?
1/84
Three letters picked without replacement from {f: 2, v: 4, t: 5}. Give prob of sequence vvf.
4/165
Four letters picked without replacement from {k: 1, p: 2, w: 1}. What is prob of sequence wpkp?
1/12
Two letters picked without replacement from {i: 1, e: 1, s: 1}. Give prob of sequence ei.
1/6
Four letters picked without replacement from {z: 1, p: 2, w: 2, a: 1, v: 2, n: 1}. What is prob of sequence vwpv?
1/378
Two letters picked without replacement from {m: 1, v: 1, d: 1, k: 2, c: 1, s: 1}. What is prob of sequence mc?
1/42
Calculate prob of sequence yas when three letters picked without replacement from {s: 2, n: 6, a: 1, y: 2}.
2/495
Three letters picked without replacement from {u: 2, l: 9}. Give prob of sequence lul.
8/55
Two letters picked without replacement from bbjgh. Give prob of sequence bb.
1/10
What is prob of sequence pbe when three letters picked without replacement from bxpvppexxxvvxvx?
1/910
Calculate prob of sequence gcc when three letters picked without replacement from {g: 1, c: 3, i: 4, u: 6}.
1/364
What is prob of sequence fi when two letters picked without replacement from {z: 4, i: 1, x: 3, f: 1, u: 4, v: 4}?
1/272
Two letters picked without replacement from qqc. What is prob of sequence qq?
1/3
Two letters picked without replacement from msmtmpdssss. Give prob of sequence ts.
1/22
Calculate prob of sequence uu when two letters picked without replacement from uuquqq.
1/5
Two letters picked without replacement from {c: 1, q: 1, z: 2, j: 4}. What is prob of sequence zj?
1/7
Three letters picked without replacement from ckkkkmmii. Give prob of sequence ikc.
1/63
Two letters picked without replacement from {j: 7, a: 5}. Give prob of sequence aj.
35/132
Three letters picked without replacement from bbbzmzbbbzzbbmmbbb. Give prob of sequence mmz.
1/204
Four letters picked without replacement from {g: 5, s: 2, v: 3, j: 2}. Give prob of sequence gsgs.
1/297
Calculate prob of sequence xywy when four letters picked without replacement from wwwqqxwywwywwxxxwwww.
4/4845
What is prob of sequence hyhy when four letters picked without replacement from {h: 2, y: 2}?
1/6
What is prob of sequence qs when two letters picked without replacement from {s: 3, q: 5, h: 5}?
5/52
Calculate prob of sequence vl when two letters picked without replacement from gssvvsgqolgg.
1/66
Calculate prob of sequence ppph when four letters picked without replacement from hhhhhpphhhhhphphhph.
35/3876
What is prob of sequence jij when three letters picked without replacement from cjjjjccjci?
1/36
Four letters picked without replacement from arrqrreqtrataater. Give prob of sequence tart.
3/1190
Three letters picked without replacement from {j: 4, x: 10, w: 2, o: 1}. What is prob of sequence ojx?
1/102
Calculate prob of sequence xuo when three letters picked without replacement from vbovvxxvbub.
1/495
Four letters picked without replacement from {b: 3, g: 4, f: 2, o: 3, k: 2, e: 4}. Give prob of sequence ekeo.
1/1020
Four letters picked without replacement from {w: 2, z: 6, q: 1, t: 4, f: 2}. What is prob of sequence tzfz?
2/273
What is prob of sequence ii when two letters picked without replacement from {i: 8, p: 2}?
28/45
What is prob of sequence ib when two letters picked without replacement from {b: 4, c: 1, z: 2, i: 4}?
8/55
Two letters picked without replacement from lhdl. What is prob of sequence dl?
1/6
Two letters picked without replacement from lollrrlrlrwllw. Give prob of sequence ww.
1/91
What is prob of sequence os when two letters picked without replacement from gposdons?
1/14
Three letters picked without replacement from wwdwvdwzwxdz. Give prob of sequence dzw.
1/44
Calculate prob of sequence ggx when three letters picked without replacement from {z: 5, x: 2, g: 12}.
44/969
Calculate prob of sequence hhw when three letters picked without replacement from {h: 2, a: 1, f: 5, w: 1}.
1/252
Three letters picked without replacement from yyyyyjyy. Give prob of sequence yyj.
1/8
Three letters picked without replacement from {s: 10}. Give prob of sequence sss.
1
Four letters picked without replacement from tztuuzzzzutzezzzmeu. What is prob of sequence zett?
3/2584
Two letters picked without replacement from {l: 8, g: 5, r: 3}. Give prob of sequence ll.
7/30
Four letters picked without replacement from {j: 5, p: 3}. Give prob of sequence jpjp.
1/14
Four letters picked without replacement from {p: 11, f: 1, m: 2}. What is prob of sequence pfpm?
5/546
Calculate prob of sequence pau when three letters picked without replacement from {q: 3, p: 9, a: 1, y: 3, u: 2, o: 1}.
1/323
Calculate prob of sequence zw when two letters picked without replacement from oyqzfwz.
1/21
What is prob of sequence fe when two letters picked without replacement from {e: 4, l: 4, f: 2, m: 4, j: 1, r: 4}?
4/171
Four letters picked without replacement from kkxxxkxkkkkkkkkkkkk. What is prob of sequence kxkk?
455/3876
Calculate prob of sequence dw when two letters picked without repl |
Q:
Request User Input Equation Matlab
I want to write a function that I can call later that allows me to request the user to input an equation. I.e. how can I have the user input something like sin(x) or exp(x^2) so that I can evaluate that function at any number of points?
I want to write the function as something like:
function f = myf(x)
f = %user enters equation%
A:
You can use a function handle:
function y = myf(x)
f = @(x) input('Input Equation: ');
y = f(x);
end
So for example:
>> myf(2)
Input Equation: x^2
ans =
4
>> myf(1)
Input Equation: exp(x)
ans =
2.7183
The @(x) f(x) is called a function handle. The input can be done using the input function. Inside input, 'Input Equation: ' is a string but when it asks you on the command line do not use a string just use the examples above.
|
Solution NMR structure of the myosin phosphatase inhibitor protein CPI-17 shows phosphorylation-induced conformational changes responsible for activation.
Contractility of vascular smooth muscle depends on phosphorylation of myosin light chains, and is modulated by hormonal control of myosin phosphatase activity. Signaling pathways activate kinases such as PKC or Rho-dependent kinases that phosphorylate the myosin phosphatase inhibitor protein called CPI-17. Phosphorylation of CPI-17 at Thr38 enhances its inhibitory potency 1000-fold, creating a molecular on/off switch for regulating contraction. We report the solution NMR structure of the CPI-17 inhibitory domain (residues 35-120), which retains the signature biological properties of the full-length protein. The final ensemble of 20 sets of NMR coordinates overlaid onto their mean structure with r.m.s.d. values of 0.84(+/-0.22) A for the backbone atoms. The protein forms a novel four-helix, V-shaped bundle comprised of a central anti-parallel helix pair (B/C helices) flanked by two large spiral loops formed by the N and C termini that are held together by another anti-parallel helix pair (A/D helices) stabilized by intercalated aromatic and aliphatic side-chains. Chemical shift perturbations indicated that phosphorylation of Thr38 induces a conformational change involving displacement of helix A, without significant movement of the other three helices. This conformational change seems to flex one arm of the molecule, thereby exposing new surfaces of the helix A and the nearby phosphorylation loop to form specific interactions with the catalytic site of the phosphatase. This phosphorylation-dependent conformational change offers new structural insights toward understanding the specificity of CPI-17 for myosin phosphatase and its function as a molecular switch. |
Effects of the environmental oestrogens bisphenol A, tetrachlorobisphenol A, tetrabromobisphenol A, 4-hydroxybiphenyl and 4,4'-dihydroxybiphenyl on oestrogen receptor binding, cell proliferation and regulation of oestrogen sensitive proteins in the human breast cancer cell line MCF-7.
Bisphenol A is extensively used in the manufacturing of epoxy resins and polycarbonate plastics, whereas several brominated and chlorinated analogues are used as flame retardants and intermediates in the plastic industry. Due to the structural relationship between these chemicals and the high production volumes, we wanted to characterize and compare their potential oestrogen-like potency using several end-points in MCF-7 cells: induction of pS2 protein and progesterone receptor, reduction of oestrogen receptor level, and stimulation of cell growth. Bisphenol A, tetrachloro- and tetrabromo-bisphenol A, 4-hydroxybiphenyl and 4,4'-dihydroxybiphenyl all showed oestrogen-like properties in MCF-7 cells. The chemicals tested had affinity to the oestrogen receptor isolated from MCF-7 cells, although their EC50s were 1,000 to 80,000 times higher than the EC50 of 17beta-oestradiol. Bisphenol A and 4-hydroxybiphenyl induced cell growth in MCF-7 cells, and the highest test concentrations induced responses, apparently exceeding the cell growth induced by 17beta-oestradiol. The other chemicals tested induced less than 50% of the maximum 17beta-oestradiol-stimulated cell growth. Bisphenol A, 4-hydroxybiphenyl, tetrabromobisphenol A and tetrachlorobisphenol A all increased the level of the oestrogen-regulated proteins, progesterone receptor and pS2, whereas 4,4'-dihydroxybiphenyl showed no such effect. Bisphenol A was the only chemical tested that clearly mimicked 17beta-oestradiol in its ability to reduce the level of cytosolic oestrogen receptors in MCF-7 cells. By measuring several oestrogen-dependent endpoints it seems that some xeno-oestrogens cause an imbalanced oestrogen-response. Their ability and potency in mimicking 17beta-oestrogen in one parameter is not necessarily accompanied by a similar effect in another oestrogen-linked parameter. |
Q:
Sencha Touch: how do I play video NOT in full screen on iPhone?
My question is as described by the title.
Here's the code.
{
xtype: 'list',
id: 'msgList',
itemTpl: new Ext.XTemplate(
'<div class="video youtube"><iframe class="youtube-player" type="text/html" width="240" height="160" src="http://www.youtube.com/embed/{string}" frameborder="0"></iframe></div>'
),
store: {
fields: ['string']
}
When the code runs on Safari, it works just fine as the video is played within. But on iPhone when I click on the video, it just go into fullscreen mode.
A:
Since the framework you're using is HTML based, it is not possible to play video in any way other than full-screen on iPhone.
Even if you were coding native, I believe it would still be a massive headache to do what you're asking; the iPhone video player is not designed to run embedded in other content.
|
TV Shows Today, April 28: Scandal, The Blacklist, The Big Bang Theory
It’s Thursday and it’s time for Olivia Pope and her ‘gladiators’, it’s time for Scandal. Today’s episode: Buckle Up. Season 5. Episode 19. 9:00 pm. ABC. From Wikipedia: Scandal is an American political thriller television series starring Kerry Washington. Created by Shonda Rhimes, it debuted on ABC on April 5, 2012.
Our second choice is for The Blacklist. Today: The Artax Network. Season 3. Episode 20.
9:00 pm. NBC.
And our last recommendation is for The Big Bang Theory. Today’s episode: The Fermentation Bifurcation. Season 9. Episode 22. 8:00 pm. CBS. |
Subscribe To
Sunday, October 30, 2011
What is fructose? Fruit sugar, right? Well, yes and no. It is found in copious amounts in fruit, of course, but so are other sugars. Free fructose, the monosaccharide form, is 57% of the total sugars found in an average apple, but free glucose, another monosaccharide, is 23% of the total sugar. Sucrose, a disaccharide composed of equal parts fructose and glucose, is the remaining 20% of the sugar. So, combining the free fructose with the fructose bound up in sucrose, the total fructose in an apple is 67% of the sugars. (Trust me on the math here.) The remaining one-third is glucose.
Apples and pears are on the high end of the fructose scale. Apricots, at 39%, are at the low end. The sugar in bananas is 50% fructose, grapes 53%, and peaches 46%. Honey is 50.5% fructose (free and combined). Besides tree and vine fruits, fructose is also found in other foods found in nature, for example, berries, sweet corn and sweet red peppers and most root vegetables (e.g., red beets, carrots, onions and sweet potatoes).Generally, most of the fructose is bound up in sucrose (equal parts fructose and glucose).
Sucrose in its processed form is what we know as table sugar, which is made from refining sugar cane or sugar beets. Table sugar is therefore 50% fructose. So is the sucrose, or simply “sugar,” listed near the top in the ingredients list of more and more processed foods.
According to Wikipedia, “Commercially, fructose is usually derived from sugar cane, sugar beets and corn, and there are 3 commercially important forms:” 1) processed crystalline fructose, 2) high-fructose corn syrup (HFCS), as a mixture of both glucose and fructose as monosaccharides, and 3) sucrose. All forms of fructose, according to Wiki, are commonly added to foods and drinks for palatability, taste enhancement and improved browning of foods such as baked goods.
Starting in the early 70’s, as total consumption of sugar rose in the U.S., HFCS eroded the sucrose market. By 2000 they were consumed in the U.S. in equal amounts. HFCS is commonly found in food and drink in two forms: The 55% fructose/41% glucose form is in use in the U.S. in non-dietary soft drinks. The 42% fructose/53% glucose formulation is used primarily in processed foods and baked goods. (The balances in both forms are “other sugars.”)
“The primary reason fructose is used commercially in foods and beverages, besides its low cost, is its high relative sweetness. It is the sweetest of all naturally occurring carbohydrates; at room temperature it is 1.73 times as sweet as sucrose,” but when heated it loses this advantage, again according to Wiki. The sweetness of fructose is “perceived earlier,” has a “higher peak,” “exhibits a synergy effect when used in combination with other sweeteners,” has “greater solubility,” “increases starch viscosity more rapidly and achieves a higher final viscosity than sucrose,” “retains moisture for a long period of time even at low relative humidity,” and therefore “can contribute to improved quality, better texture, and longer shelf life to the food products in which it is used,” all as reported in the Wiki entry. Ever wonder why a Twinkie or a Devil Dog stays soft forever? It’s the HFCS!
If you haven’t noticed how ubiquitous HFCS has become in the processed food supply, let me give you a snapshot. In the bread aisle at my local supermarket I found it in most of the “soft” goods and long shelf life items: Devil Dogs and Twinkies, of course, and fruit pies and muffins; also in hot dog and hamburger rolls and, naturally, in Wonder Bread. I also found it listed as 4th ingredient in Weight Watchers 100% Whole Wheat bread, just before molasses!
Fundamentally, however, regardless of whether the formulation of fructose you consume is 55%, 42%, or 50% fructose as in table sugar (sucrose), we all consume ever increasing amounts of fructose each year, whether we know it or not. We eat much more fructose than we think, and much more than the amount that is found in fresh fruit. Sugar -- ordinary table sugar, made from sugar cane -- remember, is half fructose.
So, why does it matter? Because fructose, in the words of Robert H. Lustig, MD, is “poison.” Dr. Lustig is professor of Clinical Pediatrics in the Division of Endocrinology at the University of California San Francisco. His research focuses on childhood obesity. He contends that, in the amounts we are eating it, fructose is toxic to the liver.
Want to know why? You can watch his 90 minute 2009 video, “Sugar: The Bitter Truth,” from UCSF’s “Mini Med School for the Public” on YouTube. Or stay tuned. In the next installment I will present my ‘Executive Summary’ of his evidence.
Sunday, October 23, 2011
I ran into a friend at the supermarket the other day and asked her how she was. She replied, “Fine,” but “tired a lot.” Not wanting to miss an opportunity to proselytize, I suggested, “sugar crash.” She protested, “I don’t eat sugar!” So, I asked her what she ate for breakfast. Therein lies a tale of folly that deserves to be more widely known and understood.
Sugar, as she and virtually the “whole world” thinks of it, is table sugar, as in “added sugar” such as that sprinkled on cereal. It is also an ingredient in candy and ice cream. Soft drinks usually are sweetened with high fructose corn syrup.
Table sugar, the “added” sugar, is cane sugar and chemically is known as sucrose. It is a disaccharide, meaning it is composed of two simple sugar molecules. One of those molecules is fructose and the other is glucose. All chemical compounds ending in “ose” are sugars. Most break down in the digestion process to glucose, some to fructose, and a few to galactose, the third monosaccharide, before entering the blood stream through the wall of the small intestine.
Sugars in this “whole-world” sense do not include those found in fruits, which are a combination of free fructose, free glucose and sucrose. Fruit sugars are regarded in this “whole-world” view as good for you, because they are an inherent component of this “real” or whole food. Forget that for centuries hybridizers have been making fruits sweeter than those found in nature to appeal to our sweet tooth.
Carbohydrates, one of the three basic elements of nutrition (the other two being protein and fat), are all saccharides. Carbohydrates, including fruits, cereals, bread, potatoes, rice and pasta, are somewhat more complex compounds, meaning composed of many molecules. Nevertheless, they virtually all break down in the digestion process to the simple sugars glucose and fructose. Glucose goes to the cells for quick energy. Fructose goes directly to the liver and is stored.
Back to the question I asked of my friend: “What did you eat for breakfast?” Her answer: “A glass of orange juice, a whole grain cereal ‘with 3 grams of protein’ [in reduced-fat milk, I assumed], toast and jelly.” “All sugar,” I exclaimed! Obnoxiously, I said, “if you eat a lot of ‘sugar’ – read any food except fat and protein -- all at once, your blood stream will be flooded with sugar (glucose) sooner or later (up to a few hours, depending on the food and the condition of your metabolism), and insulin pumped from the pancreas (if it is still working well). And then, after the ‘sugar’ gets delivered to the muscles and organs by the insulin, your blood sugar level will crash and you will ‘feel tired’ (and hungry) again.”
You will feel hungry again because another hormone, ghrelin (first reported in Nature in 1999!), will send a signal from cells lining the fundus of the stomach to the hypothalamus in the center of your brain, that the “quick energy” in your blood (glucose) is low again. So, when your “all sugar” breakfast is digested, in mid-morning your body will again crave “sugar” (anything that will break down to glucose) to “feed the beast.” “Sugary snack” doesn’t mean a candy bar. It means any carbohydrate, including fruit, or a glass of milk (lactose), all of which will break down to glucose and again raise the level of sugar in the blood. It will also overwork the pancreas again to produce more insulin. A vicious cycle.
Over a course of years the cell wall of the destination cells in many people will develop insulin resistance, requiring more insulin to get the job of delivering glucose energy to our muscles done. Eventually, in many of these people, the pancreas will slowly burn out. The islets of langerhans that produce the beta cells in the pancreas will stop working. They will die. By the time your doctor discovers this, up to 80% of your pancreatic function will probably already have been lost. That was the stunning conjecture made by Dr. Ralph DeFronzo, American Diabetes Association keynote speaker at their annual meeting in San Francisco in 2008. You will be diagnosed with full-blown Type 2 Diabetes. You will be drug dependent for the rest of your life. You will then be watchful for, or worse, diagnosed with the “dreaded complications.”
As a result, in recent years the standards and methodology for diagnosing Metabolic Syndrome and Type 2 diabetes has evolved. The old standard was two consecutive elevated plasma blood glucose tests above 140mg/dl, lowered to 126 in 1997, where it remains today. Fasting blood glucose between 100 and 125mg/dl is now regarded as pre-diabetes.
The new diagnostic standard for T2 diabetes is the Hemoglobin (Hb) A1c test. The diagnostic standard was formerly 7.0%. A few years ago it was lowered to 6.5%, and a 6.0% level added for pre-diabetes. Some activist endocrinologists, such as Dr. Richard K. Bernstein, use a much lower standard, regarding an A1c of 5.8% as indicating full-blown Type 2.
Sunday, October 9, 2011
The contemporary medical literature is replete with macro and other large studies that attempt to extrapolate a correlation between heart attack risk and blood lipids. The last two columns, “Understanding Your Lipid Panel” and “The Cause and Treatment of Heart Disease” address this issue from different directions. In this column we will attempt to put a fine point on the critical matter of lipid ratios.
In the 1960’s Total Cholesterol (TC) became a common and inexpensive test. As the principal metric of “the Lipid Hypothesis” popularized by Ancel Keys and then the American Heart Association, it became the universal marker for predicting heart disease risk. But that was more than half a century ago. We’ve come a long way since then.
The “treatment,” i. e. medical advice, then and now for high TC was to eat less saturated fat and other animal foods with high cholesterol content. This was the modality even though the body needs cholesterol for many essential purposes and makes up what we don’t eat by manufacturing it as needed. The threshold for TC was and remains today 200mg/dl.
Low density lipoprotein (LDL) is a component of TC. Even though the common test used to determine LDL was and is a calculated value, not a direct measurement, it became a popular target in the 80’s when big pharma developed drugs – statins – that lowered it. By lowering LDL, statins also lowered total cholesterol. So, doctors prescribed statins to anyone and everyone whose TC was over 200. Today, Lipitor, Crestor, Zocor, and its generic Simvastatin, account for $20 billion in world-wide annual sales.
In recent decades the other components of the Lipid Panel – High Density Lipoproteins (HDL) and Triglycerides (TG) – have taken on increased importance in understanding Cardio Vascular Disease (CVD) risk.Unfortunately, these developments have garnered little attention since the pharmaceutical industry has not yet developed blockbuster drugs to influence them. Fish oil lowers Triglycerides, but fish oil cannot be patented.
Most lipid panel lab results these days do however include a ratio of TC to HDL with a recommendation that it should be less than 5.0. In other words, if TC is 200, then HDL should not be less than 40. While this at least recognizes the importance of HDL, it is hardly a standard to be emulated. It is, in fact, borderline dangerous. Optimal is ≤3.5.
A somewhat higher standard coming into wider use is the inverse of this fraction, i.e. HDL/TC. However, the standard for this fraction is ≥0.24 = ideal. Translated, that is closer to a ratio of 4.0, versus 5.0 in the TC to HDL ratio cited above.
Many enlightened practitioners today, however, use the ratio of Triglycerides to HDL (TG/HDL) as “the single most powerful predictor of extensive coronary heart disease among all the lipid variables examined,” according to just one of many articles in the literature. The study I quote is in Clinics at PubMed Central 2008 August 63(4) 427-432. Note, by the way, that neither TC nor LDL is a factor in this formula. This ratio is considered by informed clinicians today as more reliable than LDL, or TC/HDL, or high sensitivity (hs) C-reactive protein (CRP), the marker my internist/cardiologist uses.
Using this new gold standard, a TG/HDL ≤ 1.0 is considered ideal, a ratio of ≤2.0 is good, a ratio of 4.0 is considered high and 6.0 much too high. My recent TG/HDL = 0.35, which is interpreted to mean a very low probability of heart attack.
As the patent on Lipitor is about to expire, and the other name-brand statin drug patent expirations are not too far behind, big pharma is hard at work looking for the next blockbuster drug to lower Triglycerides or raise HDL. Alas, so far, diet -- that is, our dietary intake (as in, “we are what we eat”) -- is the only thing that seems to work, and big pharma isn’t in that business.
Agribusiness, however, has seen the potential for a big piece of the action here. Unfortunately, there isn’t much profit in “real food.” Ask your local farmer. The increasingly popular processed foods -- the so-called “heart healthy” foods we are being encouraged to eat in large quantities -- do not improve the TG/HDL ratio. They make it worse!
In the coming weeks we will return to the subject of healthy eating. Subjects will include “Sugar: What do we mean?” “Fructose: Where and what is it?,” “Intermittent Fasting: Is it a good idea?,” “Ketosis and Autophagy,” and “Cooking with Oils: good and bad choices,” Our goal will be to help the reader improve their TG/HDL ratio. Of course, to do that, you will need to have a baseline Lipid Profile. If you haven’t had a Lipid Panel done, or don’t know yours, ask your doctor to do one. And ask him to see how yours shapes up using the new gold standard for CVD risk: the TG/HDL ratio.
About Me
I was diagnosed a Type 2 diabetic in 1986. I started a Very Low Carb diet (Atkins Induction) in 2002 to lose weight. I didn’t realize at the time that it would put my diabetes in clinical remission, or that I would be able to give up almost all of my oral diabetes meds. I also didn’t understand that, as I lost weight and continued to eat Very Low Carb, my blood lipids would dramatically improve (doubling my HDL and cutting my triglycerides by 2/3rds) and that my blood pressure would drop from 130/90 to 110/70 on the same meds.
Over the years I changed from Atkins to the Bernstein Diet (designed for diabetics) and, altogether lost 170 pounds. I later regained some and then lost some. As long as I eat Very Low Carb, I am not hungry and I have lots of energy. And I no longer have any of the indications of Metabolic Syndrome.
My goal, as long as I have excess body fat, is to remain continuously in a ketogenic state, both for blood glucose regulation and continued weight loss. I expect that this regimen will continue to provide the benefits of reduced systemic inflammation, improved blood lipids and lower blood pressure as well. |
Specific antismoking advice after stroke.
Many stroke survivors would benefit from modification of their lifestyle in order to reduce their risk of recurrent stroke. We investigated if tailored smoking cessation advice would yield a higher smoking cessation rate and a higher rate with sustained abstinence in ex-smokers in the intervention group than among controls. Patients admitted with an acute stroke or a transient ischaemic attack were included in a randomised controlled trial focusing on control of lifestyle risk factors and hypertension. Here, we report the intervention focused on smoking cessation. We used multiple logistic regression analysis to identify patient characteristics associated with smoking cessation. Analyses were by intention to treat excluding those who died or suffered severe disease. We included 254 patients with a history of smoking. Two years after inclusion, 15 of 57 (26%) baseline smokers in the intervention group had stopped smoking versus eight of 56 (14%) among controls (p = 0.112). Living with a partner (p = 0.012), having at least ten years of education (p = 0.012), and not being exposed to smoking at home (p = 0.036) were independent predictors of smoking cessation. We did not achieve our aim of higher smoking cessation rates in the intervention group. Future smoking cessation interventions should be more intensive, focus on patients' social circumstances and, if possible, involve patients' relatives. This study was supported by the Ludvig and Sara Elsass Foundation, the Lundbeck Foundation and The Danish Heart Foundation (Grant 07-4-B703-A1378-22384F). This protocol is registered with Clinical Trials.gov (NCT 00253097). |
Q:
SAS: PROC TABULATE Rearrange Header Subgroups
Question: How do I control the order of subgroups in the output of PROC TABULATE?
For instance, suppose I have this output, namely (A, B) within segment:
data example;
input group $ segment $;
datalines;
1 A
1 B
2 A
2 A
3 B
3 B
;
run;
proc tabulate data = example;
class group segment;
table group all, all = 'Total'*n segment*n;
run;
+-----------------------+------------+-------------------------+
+ + + segment +
+ + +------------+------------+
+ + Total + A + B +
+ +------------+------------+------------+
+ + N + N + N +
+-----------------------+------------+------------+------------+
+ group + + + +
+-----------------------+ + + +
+ 1 + 2.00 + 1.00 + 1.00 +
+-----------------------+------------+------------+------------+
+ 2 + 2.00 + 2.00 + . +
+-----------------------+------------+------------+------------+
+ 3 + 2.00 + . + 2.00 +
+-----------------------+------------+------------+------------+
+ All + 6.00 + 3.00 + 3.00 +
+-----------------------+------------+------------+------------+
How would I reorder the subgroups of segment to appear in the opposite order, (B, A)?
+-----------------------+------------+-------------------------+
+ + + segment +
+ + +------------+------------+
+ + Total + B + A +
+ +------------+------------+------------+
+ + N + N + N +
+-----------------------+------------+------------+------------+
+ group + + + +
+-----------------------+ + + +
+ 1 + 2.00 + 1.00 + 1.00 +
+-----------------------+------------+------------+------------+
+ 2 + 2.00 + . + 2.00 +
+-----------------------+------------+------------+------------+
+ 3 + 2.00 + 2.00 + . +
+-----------------------+------------+------------+------------+
+ All + 6.00 + 3.00 + 3.00 +
+-----------------------+------------+------------+------------+
It seems like there may be an option to order subgroups using DESC or DESCENDING=, but neither of those work for me. Part of my problem may be the terminology I'm using. I don't think "A" and "B" are called subgroups within the SAS lexicon.
A:
If you sort the data first and then user order=data you should be able to get what you need:
proc sort data=example;
by group descending segment;
run;
proc tabulate data = example order=data;
class group segment;
table group all, all = 'Total'*n segment*n;
run;
|
KYODO NEWS - Nov 19, 2017 - 14:17 | Urgent, All
Police detected alcohol from a U.S. serviceman after a military truck he was driving collided with a light truck, leaving the Japanese driver dead, in Okinawa Prefecture on Sunday.
The police said they are questioning the serviceman in his 20s on a voluntary basis. He was three times over the legal limit in the breath test, they said.
The two-ton military truck collided with the small truck at an intersection in the city of Naha around 5:25 a.m. The driver of the minitruck in his 60s was confirmed dead after being taken to a hospital. The serviceman was injured slightly.
A witness told the police the military truck hit the minitruck as the latter vehicle was making a right turn from the opposite direction while a right-turn signal was on. |
This invention relates generally to the field of appliance control circuits and more particularly to a circuit including a microcontroller operable for monitoring the contact posture of an access door actuated switch. The microcontroller will prevent operation of the appliance if monitoring of the access door actuated switch indicates that the contacts have not been actuated between the open and closed postures during a predetermined period of time.
The prior art relating to appliances has generally required that an access door actuated switch be in the closed posture before the appliance can be operated. Grabeck in U.S. Pat. No. 3,627,960, issued Dec. 14, 1971, teaches the closing of an access door to actuate a switch for conditioning the appliance control circuitry. In this system the switch must be closed to indicate a closed access door prior to operation. There is no teaching of a microcontroller for checking the posture of the switch and for ensuring that the switch contacts are operable between open and closed postures which is an indication of the condition or operability of the switch.
Ellingson et al, in U.S. Pat. No. 4,510,777, issued Apr. 16, 1985 and assigned to the assignee of the instant invention, disclose an appliance controlled by a microcontroller. In this appliance, a first switch is closed when the access door is physically operated to a closed position. Closing the access door positions a latch member for locking the access door in the closed position. A solenoid is then actuated by the microcontroller to lock the access door and close the contacts of a latch switch to provide an access door latched signal to the microcontroller. This latch switch is interrogated by the microcontroller prior to actuating the solenoid for confirming the proper operability of the latch switch. The circuit does not, however, teach the direct interrogation of the access door actuated switch by the microcontroller for determining the proper operability thereof.
It is believed that there has been no teaching of a microcontroller-based appliance control circuit wherein the microcontroller is operable for directly monitoring the contact posture of an access door actuated switch and for preventing operation of the appliance in the event that the switch is not functional. |
It's called the Helkern worm AKA "Slammer", or "Sapphire". It is sent by bots and multiplies extremely fast. Once it gets access to your network it will jam it up with its own copies until you cannot access the internet anymore. It is NOT a virus or a Trojan. It is a network worm. Even though it comes in different ip addresses they all come in the same port, which is 1434. Blocking that port will stop the attacks. Setting your computer on stealth mode from your firewall will also stop the attacks. The worm will only infect servers running under the popular Web-enabled database Microsoft SQL Server 2000. If you don't have that installed then the worm will do no harm. Also uninstalling Kaspersky will be a stupid thing to do for it is the #1 Anti-virus product followed by Nod32 even though not that popular. I hope this has helped people. |
On Friday, Special Counsel Robert Mueller indicted 12 Russian intelligence officers for their role in the theft and dissemination of documents from the DNC, the DCCC and the Clinton campaign during the 2016 election. Susan Hennessey, David Kris, Paul Rosenzweig, Matt Tait and Benjamin Wittes got together to make sense of the news. |
But it runs extremely easily on pretty much everything! and can be distributed and run instantly through any browser.
Maybe I feel like it's too easy compared to other languages and is downplayed as a newb language...
Maybe it just doesn't seem as cool as other languages like rust and go... |
Katarzyna Niewiadoma (WM3 Cycling) wrapped up the overall victory at the Ovo Energy Women's Tour on Sunday, finishing safely within the peloton on a fifth and final stage in London that ended in a bunch kick.
Her runner-up ride on the final day allowed Barnes to climb onto the overall podium for third place behind Niewiadoma and Majerus.
A 12-rider breakaway put the pressure on the peloton throughout the short but very fast stage, forcing the sprinters' teams to push a high tempo to bring things back together. Without a rider in the move, Wiggle had to work in the chase effort to help set up D'hoore.
"That was really hard," said D'hoore after her sprint win. "I think it was one of the hardest crits I've done in my life. The hammer was going down from the start, and we missed it with the team. The girls had to chase the whole time; they got it back, and then it was just fast the whole time. It didn't stop, it just kept going and going!
"We saved the best for last!"
With a GC advantage of 1:25 heading into the stage, Niewiadoma's main task was to stay upright on the corner-filled urban circuit. Crossing the line safe and sound in the pack, she sealed the deal for a her first WorldTour GC victory.
"I'm super happy. I think that's the only word that can describe my feelings," Niewiadoma said.
Now adding a stage race win to a 2017 palmares that already included several strong results in WorldTour events, the 22-year-old from Poland now leads the Women's WorldTour standings, taking over the top spot from Boels Dolmans' Anna van der Breggen.
Cyclingnews Newsletter
Sign up to the Cyclingnews Newsletter, from Immediate Media Company Limited. You can unsubscribe at any time. For more information about how to do this, and how we hold your data, please see our privacy policy |
Personal thoughts about learning, community and social affordances for knowledge creation
September 24, 2005
On the concept of a concept
What is a concept?
An abstraction?, cognitive building block, a container for idea(s)?, a
symbol & representation?, a tool for indexing, learning, memory and
navigation?, a fundamental language construct?, a reified cognitive artifact?,
a category? Concepts can be any unit of thought or a mental image formed
by generalization.
Any concept is more than its name, the links to related concepts define its
meaning, every concept has a life-cycle. A
concept is an abstract, universal psychical entity that serves to designate a
category or class of entities, events or relations. WikiPedia
So what does a concept look like?
Fuzzy or crisp boundaries with gradational or binary membership?, does the
essential meaning morph with community membership? is there a universal
classification of concept types?, is a concept both a personal or group
possession?
Our beliefs, world views, creativity and communication ability, depend on
the concepts we hold, how strongly we hold them and ways we can change them.
Concepts are the building blocks for analytical and mental models. Making
concepts explicit and visual helps promote learning, knowledge construction and
assists with memory retention.
We now have the means to access and navigate texts at the level of the contained
concepts. This has important implications for personal learning, JIT
knowledge provision, spawns new revenue models and helps with profile
building. Tagging gives concept level ways to classify and
retrieve works.
How are new concepts acquired?
Mostly from instances through; abstraction of invariant features, hypothesis
testing, selection of prototypes. Acquisition may be through language using
definitions, synonyms, analogy, and metaphor. A fundamental difference in
conceptual approach is found between 'lumpers & splitters'
Concept mapping
This article by Joe Novak
explores the theory, provides practical tools and tips for mapping concepts
Related questions
How are concepts related to
categories and classification?,
What are the 'hidden
politics' in concept formation and agreement,
How do concepts relate to
knowledge construction and 'bringing forth our worlds'?
Comments
Vacuity can be related to concepts in that concepts can be seen as representing the result of a mental form; of reaching into the unknown; of seeing something where previously nothing new was seen; of crossing a gap or closing a loop around some things that were not joined; or conversely of dividing some things that were unified.
Hi Denham. My take is a few years old and could be updated, but essentially it distinguishes between a percept as what you perceive, and a concept as what you conceptualize independent of sensory corroboration. A concept is like a blueprint without a building, in that regard. The term gets a lot of abuse. Was the idea of making the Sears tower like a few cigarette cylindars pushed up at different lengths in fact a concept? Or was it just a notion until enough engineering expertise could be brought to bear to make it viable?
From an ontological standpoint, you could say there is a continuum from inkling --> notion --> idea --> concept --> plan --> project --> finished work. |
Q:
Get the last uri segment of the first a in the the td:last-child of a table row
I have this html containing a table with share prices
<tr id='row-7'>
<td>Glencore</td>
<td>Share Price</td>
<td>360</td>
<td class='actions'>
<a href="http://localhost/ye/index.php/enterprise/addressbook/read/21345" class="edit_button ui-button ui-widget ui-state-default ui-corner-all ui-button-text-icon-primary" role="button">
<span class="ui-button-icon-primary ui-icon ui-icon-document"></span>
<span class="ui-button-text"> View</span>
</a>
<a href="http://localhost/ye/index.php/enterprise/addressbook/delete/21345" class="delete_button ui-button ui-widget ui-state-default ui-corner-all ui-button-text-icon-primary" role="button">
<span class="ui-button-icon-primary ui-icon ui-icon-document"></span>
<span class="ui-button-text"> Delete</span>
</a>
</td>
</tr>
I have many rows in the table and i want to grab all the last segments of a of all rows with the class name .selected.
This the a <a href="http://localhost/ye/index.php/enterprise/addressbook/read/21345" class="edit_button ui-button ui-widget ui-state-default ui-corner-all ui-button-text-icon-primary" role="button">
<span class="ui-button-icon-primary ui-icon ui-icon-document"></span>
<span class="ui-button-text"> View</span>
</a>
The last uri segment i want to read is 21345 but i want to read for all rows and also grab the last uri and have them in a comma delimited list.
This is the jquery i have so far
var last_uri_segments = $('.mytable tr.selected td:last-child').map(function () {
var href = $(this).attr("href");
var last_segment = href.substr(href.lastIndexOf('/') + 1);
return this.last_segment;
}).get().join(',');
alert(last_uri_segments);
My first question is how i would target the last a coming first in the last child of td.
Update
This is the fiddle http://jsfiddle.net/4tpwq94b/2/
A:
How about something like this?
var $selectedRows = $("table tr.selected");
var idsFound = [];
$selectedRows.each(function() {
var url = $(this).find("td").last().find("a").first().attr("href");
var lastSegment = url.substring(url.lastIndexOf("/") + 1, url.length);
idsFound.push(lastSegment);
});
console.log(idsFound.join(","));
|
Q:
extjs 3 SuperBoxSelect tag colors
I have a SuperBoxSelect element, populated from remote store.
I need different color for each tag ( set on rowselect). Color value comes with store.
Now i end up trying with:
displayFieldTpl: '<tpl for="."><div class="x-superbox-item"
style="background:{color};">{text}</div> </tpl>'
However tpl creates its on elements inside the tag ( which is a list element that has another element inside for the close button / X).
What happens is that it now has colored smaller box inside it and background still has default color.
What i would need is a way to change the list elements own background color not create a new element inside it. But tpl doesn't seem to be good enough for that.
These are not fixed colors - they can be anything later set in the config for each specific tag.
The html for it is:
<ul id="ext-gen747">
<li id="ext-gen1001" class="x-superbox-item x-superbox-item x-superbox-item-hover">
"TestTag2"
<a class="x-superbox-item-close" tabindex="0" href="#" id="ext-gen1002"></a>
</li>
</ul>
A:
You can define classField or styleField in combo definition which may come handy in this case.
For example if you have colors as names (eg red, green) you can set classField to color and define proper styles in css. To use styleField you should define calculated field in each record to provide so it returns proper style tag.
You can also override addItemBox method.
|
Western Guilford High School
Western Guilford High School is located in Greensboro, North Carolina, and is part of the Guilford County School system. The school has approximately 1,300 students and its sports teams are the Fighting Hornets.
The school opened in the fall of 1968.
In September 2000, Western Guilford was renovated via public bond. The design of the new addition integrates different components of the campus by introducing new circulation patterns. A new entry gallery at the front entry to the school was designed; along with art and classroom additions that form an internal courtyard. The addition consists of four basic elements: Classroom addition to the vocational building, a new "auxiliary" gym, a two-story classroom addition and a single-story art addition.
Pete Kashubara is the principal of Western Guilford High. The Student-Teacher ratio is 18:1. The school's mascot is Buzz the Hornet and the school colors are Black and Old Gold. Western is a member of the Metro 3A Conference and the Athletic Director is Christopher Causey.
As of 2014, Western Guilford High School is the State's only High School to offer College Board's AP Capstone Program. The AP Capstone Program, also known as the Advanced Placement Academy, is a challenging two-year program designed to train students for the independent research and collaborative projects common in college-level courses.
Advanced Placement Academy
The Advanced Placement Academy will become an option for students starting in the fall of 2014. Western Guilford will be the first school in North Carolina to offer the College Board approved AP Capstone Program. Students will apply via application to take part in this unique and rigorous program of study.
All Advanced Placement Academy students participate in enrichment sessions throughout the year. Sessions utilize SpringBoard materials to assist students in preparing for collegiate level writing, test taking, test data analysis, college planning, and career exploration.
Service Learning
Service Learning Diploma: awarded to students who have completed a minimum of 250 hours of service learning in their high school years.
Service Learning Exemplary Award: awarded to students who have completed a minimum of 100 hours of service learning in their high school years.
The school has a group of 8 Service-Learning Ambassadors with a goal of promoting Service-Learning and hosting school-wide service projects.
Athletics
Baseball
Basketball
Cheerleading
Cross country
Football
Golf
Lacrosse
P.E. classes
Soccer
Softball
Swimming
Tennis
Track
Ultimate Frisbee
Volleyball
Wrestling
Demographics
39.4% African American
1.0% American Indian
4.1% Asian
11.4% Hispanic
4.0% Multi-Racial
40.0% White
Notable alumni
Lisa Stockton, head women's basketball coach at Tulane University since 1994
Jackson Tyson, gymnast and 2015 Bronze Medalist at the 2015 Trampoline World Championships
References
http://wghs.gcsnc.com/pages/Western_Guilford_High
External links
Category:Public high schools in North Carolina
Category:Schools in Greensboro, North Carolina |
A phase III randomized trial of cyclophosphamide, mitoxantrone, and 5-fluorouracil (CNF) versus cyclophosphamide, adriamycin, and 5-fluorouracil (CAF) in patients with metastatic breast cancer.
One hundred patients with metastatic breast cancer were randomly selected to receive combined chemotherapy treatment with adriamycin (50 mg/m2) or mitoxantrone (12 mg/m2) associated with 5-fluorouracil (600 mg/m2) and cyclophosphamide (600 mg/m2) administered intravenously every 21 days with a maximum of ten cycles. All patients included in this study were under 75 years of age and had ECOG performance status of less than 4. They had not been treated previously with chemotherapy for metastatic disease. Patients treated with adjuvant chemotherapy, which could not have included anthracyclines, had to have relapsed at least 12 months after the completion of therapy. There were no statistically significant differences in pretreatment characteristics or metastatic disease location between the two groups. Ninety-four patients were assessable for response. No differences were observed in response rate or in survival between the groups. The response rate (complete response (CR) and partial response (PR)) was 68% (13% CR and 55% PR for CAF; 0% CR and 68% PR for CNF). Median survival for all patients was 19 months (18 months with CAF and 19 months with CNF). All patients were assessable for toxicity. There were no differences in gastrointestinal and cardiac toxicity. More grade I-II hematologic toxicity episodes (p < 0.001) and treatment delays (p = 0.05) due to leucopenia were observed with the CNF group, and more grade III alopecia (p < 0.001) was observed with the CAF group. Patients received further therapeutic manoeuvres after finishing the study with a sequential treatment consisting of hormonal therapy and chemotherapy with mitomycin (M) -vinblastine (Vbl) (M 10 mg/m2 day 1, Vbl 5 mg/m2 days 1, 15 and 29; maximum 5 cycles). This chemotherapy treatment was received by 32 patients, with a response rate of 34% and grade III-IV hematologic toxicity of 37%. Treatment with CNF can be considered a good alternative to CAF for first-line treatment of metastatic breast cancer. M-Vbl treatment is useful as second-line treatment in patients with prior adriamycin exposure. |
Annotators
URL
Maps make a great case for SVG. There are some neat libraries and tools to play with SVG maps but, more importantly, maps make it easy to understand that an image can be semantic.
A couple of weeks before Shepazu posted this, was playing with SVG maps of contemporary Africa’s political boundaries. (Especially those used on Wikipedia; including some which separate South Sudan.) Been teaching African Studies (on occasion) for years, and maps of the continent tend to become important quite quickly.
Those SVG maps with which I started playing were pretty neat in several respects. The fact that they were vector drawings instead of bitmaps meant that they easily be resized without causing visual artifacts. More importantly, though, each country was drawn as a named outline, so it was possible to play with them as separate objects.
One thing I was trying to do is create an animation which would show where each country fits in a region of the continent, using this United Nations geoscheme. Doing so, eventually noticed that Sudan and South Sudan had been classified as part of different regions, which is an interesting tidbit which could lead to useful classroom discussions.
It’s flawed in many ways, but for someone with almost no background in this things, it’s a significant accomplishment.
(Surely, the same could be done through SVG itself. Haven’t been able to learn how to do so.)
Playing with those maps taught me quite a few things. For instance, the benefits of a well-tagged image. And some rudimentary notions of CSS-based animations. Or the limitations linked to selecting rectangular sections of an image (with a large overlap between Northern and Western Africa, for instance).
The experience also gave me all sorts of ideas. Such as annotating parts of a well-structured image. Or uses for Open Street Maps. Or ways to embed interactive content (including quizzes) in Open Textbooks. |
Kanye West announced plans in November he was setting up a new Adidas Yeezys HQ in Cody, Wyoming, vowing to bring jobs back to the United States
He echoed President Trump's campaign vow, saying: 'For me, as a founder, it's really important to bring these jobs back to America'
The rapper fell in love with the mountainous state after recording his album Ye there and snatched up a $14M ranch near Cody, Wyoming in September
West could save up to $15M by moving his headquarters to tax-haven Wyoming
However, moving the headquarters could leave sweatshop workers in Asia in even more dire conditions, according to a charity group
Clean Clothes Campaign cautioned against moving too quickly, pointing to other examples in Asia where Adidas suddenly pulled out and left thousands of poorly paid workers without jobs, some of whom earn no more than $3-a-day
Kanye West's plans to move his Adidas Yeezy headquarters to Wyoming could save him millions in taxes but also could spell disaster for Adidas workers in Asia who risk being left jobless by the move, a charity group exclusively told DailyMail.com.
The rapper fell in love with the mountainous state after recording his album Ye there and snatched up a $14 million ranch near Cody, Wyoming in September.
ADVERTISEMENT
Now the town, which has a population of around 10,000, is set to become home to West's new Adidas Yeezy headquarters instead of California, after the move was announced in November.
The month before, Kim Kardashian's husband echoed President Trump's vow to bring jobs from abroad back to the US, saying in a Beats 1 interview: 'For me, as a founder, it's really important to bring these jobs back to America.'
And while West could save up to $15 million by moving his headquarters to tax-haven Wyoming, it could leave sweatshop workers in Asia in even more dire circumstances, according to charity group Clean Clothes Campaign.
Kanye West's plans to move his Adidas Yeezy headquarters to Wyoming could save him millions in taxes but also could spell disaster for Adidas workers in Asia who risk being left jobless by the move, a charity group exclusively told DailyMail.com. The rapper and husband of Kim Kardashian fell in love with the mountainous state after recording his album Ye there and snatched up a $14 million ranch near Cody, Wyoming in September
And while West could save up to $15 million by moving his headquarters to tax-haven Wyoming, it could leave sweatshop workers in Asia in even more dire conditions, according to charity group Clean Clothes Campaign. Pictured: Workers in Asia putting together Adidas shoes
DailyMail.com contacted West's team for comment.
In October, West claimed he made $115 million in 2018. Although his current tax arrangement isn't known, if he paid the standard California state tax rate for high earners earning over $1 million of 13.3 percent, then he would have handed over $15,295,000 in state tax alone.
Wyoming is one of seven US states where there is no state income tax and, if he spends more than 183 days a year in Wyoming, then he wouldn't be liable to pay any state tax.
Meanwhile, Clean Clothes Campaign, the leading global NGO alliance fighting sweatshop conditions, advised West that if Adidas Yeezy makes any changes to its production line, then it needs to act responsibly or risk harming workers.
Back in October, West claimed he would move all production of his apparel and shoe range away from countries such as China, Vietnam and Cambodia.
Currently, there are at least a dozen jobs being advertised by Yeezy for shoe design, development and management positions in Cody.
West has also sub-let a factory in Cody, which will be his new sample lab.
In November, West appeared, alongside chief designer Steve Smith, at New York's Fast Company's Innovation Festival, with Smith vowing that West is not 'blowing smoke' about making shoes in the US, before adding: 'We're going to bring jobs back here. We're going to make Yeezys in America. This is revolution.'
But Clean Clothes Campaign cautioned West against moving too quickly, pointing to other examples in Asia where Adidas suddenly pulled out and left thousands of poorly paid workers without jobs, some of whom earn no more than $3-a-day.
West said he was setting up a new HQ in Cody, which has a population of around 10,000. In October West echoed President Trump's vow to bring jobs from abroad back to the US, saying in a Beats 1 interview: 'For me, as a founder, it's really important to bring these jobs back to America'
According to a report from the charity in 2018, much of Adidas' sportswear is made in Indonesia, where 80 percent of workers are women, who make as little as $96-a-month or around $3 a day.
ADVERTISEMENT
There have been two instances in Indonesia where workers in factories making Adidas products were fired en-masse.
In July 2012, a group of 1,300 mostly female workers were fired from the PT Panarub Dwikarya Benoa factory, which makes Adidas footwear, and the issue is yet to be resolved today with Adidas and fellow sports brand Mizuno failing to take any responsibility.
Another Indonesian sportswear manufacturer Kizone, located west of Jakarta, closed in April 2011 with its owner disappearing after Adidas pulled out.
The 2,800 workers who lost their jobs were legally entitled to severance payments totaling $3.4 million. Yet it was only due to student protests in the US and UK, which led to Adidas finally paying up.
Campaign and outreach coordinator for Clean Clothes Campaign, Christie Miedema, told DailyMail.com: 'Ultimately, sourcing practices should ensure that workers have decent work, meaning labor standards are respected and employment is stable and secure.
'If a company, such as Adidas, pulls out production of a factory, whether to find an even cheaper production location or to relocate out of political or sustainability reasons, it is of utmost importance that it does so in a way that does not put the workers at risk of losing their livelihood.
The rapper fell in love with the mountainous state after recording his album Ye there and snatched up a $14 million ranch near Cody, Wyoming in September (pictured)
Click here to resize this module
Along with the lakes, Kanye's new ranch in Cody also houses a restaurant, an event center and numerous meeting facilities
West's ranch spans over 9,000 acres of lush, green land, which contains not just one, but two lakes
'Buyers such as Adidas should take concrete measures to mitigate and minimize the damage to workers and their communities when a workplace does close, or a significant buyer decides to relocate. That includes fair severance payments for workers, possible re-employment at other suppliers and a transparent, timely process for a closure of a contract, instead of a unilateral decision by the brand.
'In the past, factories that supplied to Adidas have had to close overnight after major buyers pulled their orders. After massive campaigning, Adidas took its responsibility in paying the workers of the Kizone factory in Indonesia the severance that they were owed. Other factory closure cases, such as the PT PDK factory that supplied Adidas and Mizuno, still remain unresolved, with workers waiting for many years for the wages and severance they are owed.'
Some campaigners have dismissed West's claims that Yeezy will move away from cheap producers in Asia, with one leading anti-sweatshop source saying: 'Yeezy is just the name for a collaboration project between rapper Kanye West and Adidas.
ADVERTISEMENT
'There are no separate Yeezy workers, they are just Adidas workers. Among the many models they turn out, a few of them come as Yeezy.
'We're doubtful that Kanye West is going to move production to the US. This might be just a statement in line with the current American President's sentiment to Make America Great Again'', but sneaker production is actually harder to move than just comment, as there is more technical know how involved. So, apart from the cost aspects, it just won't happen overnight.' |
KOLT (AM)
KOLT (690 AM) is a radio station broadcasting a classic country format. Licensed to Terrytown, Nebraska, United States, the station is owned by Armada Media.
History
On March 15, 2017, the then-KOAQ changed their format from regional Mexican to classic country, branded as "Country Legends". (info taken from stationintel.com)
Ownership
In May 2013, Armada Media and Legacy Broadcasting traded some stations in Nebraska, with two stations in Holdrege (KUVR/1380 and KMTY/97.7) going to Legacy and eight others in the Scottsbluff and North Platte markets [KZTL/93.5 (Paxton-North Platte) and KRNP/100.7 (Sutherland-North Platte) KOAQ/690 (Terrytown), KOLT/1320 (Scottsbluff), KMOR/93.3 (Gering), KETT/99.3 (Mitchell), KOZY-FM/101.3 (Bridgeport), KHYY/106.9 (Minatare)] going to Armada Media. A purchase price was not announced.
Previous logo
References
External links
KOAQ Facebook Page
OLT (AM)
Category:Radio stations established in 1961
Category:1961 establishments in Nebraska |
Q:
Android : Click exits screen when selecting an item from an option list
I'm looking at an option list on an android device
The options code looks like this:
<div class = "addMode">
<label for ="activityType">Activity Type</label>
<div class="dataRow activityType">
<select id="activityType" class="valid">
<option value ="1" selected="selected">Appointment</option>
<option value ="2">Call</option>
<option value ="3">To-Do</option>
</select>
</div>
<div>
At first I tried xpath:
el = @d.find_elements(:xpath, "//*[@id='activityType']/option")
el.each do |t|
if t.text() == 'Call' then
t.click
break
end
end
This works to select the 'Call' activity from the pop-up menu, however, as soon as it is selected it exits from the current page, and returns to the calling page.
I then tried:
el = @d.find_element(:id, "activityType")
el.click
el_opt = el.find_elements(:tag_name, "option")
el_opt.each.do |t|
if t.text() == 'Call' then
t.click
break
end
end
This also had the same result of making the selection, and then exiting the screen
Then it was on to:
opt = Selenium::WebDriver::Support::Select.new(@d.find_element(:xpath, "//*[@id='activityType']"))
opt.select_by(:text, "Call")
This also made the selection, and then exited the page
I then thought, i might be able to use the Touch action
I'm still new to Ruby and I'm most likely reading the API for TouchScreen incorrectly
I tried the following:
TapObject = Selenium::WebDriver::TouchScreen.new(@d.find_element(:id, "activityType"))
el = @driver.find_element(:id, "activityType")
el_opt = el.find_elements(:tag_name, "option")
el_opt.each do |t|
if t.text() == "Call" then
TapObject.single_tap(t)
end
end
I get an undefined method 'touchSingleTap' error for this
Has anyone run into this problem, or know of a way to click/tap on a selection on a mobile device without it exiting the current page?
Thanks,
Jeff
A:
Looks like the solution to this was really simple.
Instead of trying to click the element from the pop-up list, just use send keys instead.
el = @driver.find_element(:id, "activityType")
el.send_keys("Call")
Thanks,
Jeff
|
set hive.mapred.mode=nonstrict;
DROP TABLE IF EXISTS DECIMAL_3_txt;
DROP TABLE IF EXISTS DECIMAL_3_n0;
CREATE TABLE DECIMAL_3_txt(key decimal(38,18), value int)
ROW FORMAT DELIMITED
FIELDS TERMINATED BY ' '
STORED AS TEXTFILE;
LOAD DATA LOCAL INPATH '../../data/files/kv7.txt' INTO TABLE DECIMAL_3_txt;
CREATE TABLE DECIMAL_3_n0 STORED AS ORC AS SELECT * FROM DECIMAL_3_txt;
set hive.auto.convert.join=false;
EXPLAIN
SELECT * FROM DECIMAL_3_n0 a JOIN DECIMAL_3_n0 b ON (a.key = b.key) ORDER BY a.key, a.value, b.key, b.value;
SELECT * FROM DECIMAL_3_n0 a JOIN DECIMAL_3_n0 b ON (a.key = b.key) ORDER BY a.key, a.value, b.key, b.value;
set hive.auto.convert.join=true;
EXPLAIN
SELECT * FROM DECIMAL_3_n0 a JOIN DECIMAL_3_n0 b ON (a.key = b.key) ORDER BY a.key, a.value, b.key, b.value;
SELECT * FROM DECIMAL_3_n0 a JOIN DECIMAL_3_n0 b ON (a.key = b.key) ORDER BY a.key, a.value, b.key, b.value;
DROP TABLE DECIMAL_3_txt;
DROP TABLE DECIMAL_3_n0;
|
Q:
Assign value of variable from JS array based on key
I have a variable that takes its value from the current object's ID attribute, it will always look something like filtercolor-red:
$('.facet-options-list li input[id*=filtercolor]').each(function() {
var filterColor = $(this).attr('id');
...
});
I also have an array that lists possible ID's and a corresponding HEX code:
var activeFilterBg;
var filterBgColor = [];
filterBgColor = {
filtercolor-black: '#171710',
filtercolor-blue: '#4C94B6',
filtercolor-brown: '#50443D',
filtercolor-gold: '#F6D069',
filtercolor-green: '#96B14D',
filtercolor-grey: '#A8AAA5',
filtercolor-orange: '#DB5E46',
filtercolor-pink: '#E78EB1',
filtercolor-purple: '#59547E',
filtercolor-red: '#D22200',
filtercolor-silver: '#EBEBEB',
filtercolor-white: '#FFF'
};
What I'd like to do is take filterColor and assign activeFilterBg the appropriate HEX code from filterBgColor. I could do this with a switch, but that seems kind of sloppy and gives a lot of room for mistakes in the future.
Do I have an option to somehow lookup the correct key and then assign a variable based upon it?
A:
That's not an array, that's an object. You assign an array to the variable, but then you immediately replace that with an object. An object works well for this, so just skip that array. (Note though, as Jordan pointed out, that the parameter names has to be quoted when they contain dashes.)
You can use the bracket syntax to access the object properties using the variable:
var activeFilterBg;
var filterBgColor = {
'filtercolor-black': '#171710',
'filtercolor-blue': '#4C94B6',
'filtercolor-brown': '#50443D',
'filtercolor-gold': '#F6D069',
'filtercolor-green': '#96B14D',
'filtercolor-grey': '#A8AAA5',
'filtercolor-orange': '#DB5E46',
'filtercolor-pink': '#E78EB1',
'filtercolor-purple': '#59547E',
'filtercolor-red': '#D22200',
'filtercolor-silver': '#EBEBEB',
'filtercolor-white': '#FFF'
};
$('.facet-options-list li input[id*=filtercolor]').each(function() {
var filterColor = $(this).attr('id');
activeFilterBg = filterBgColor[filterColor];
});
|
Factor VIII (FVIII) is a protein found in blood plasma that acts as a cofactor in the cascade of reactions leading to blood coagulation. Hemophilia A is caused by a reduction or deficiency of functional FVIII protein and is one of the most common bleeding disorders that affects about 1 in 5000-10000 men. Clinical symptoms in hemophilia are frequent muscle and joint bleeds, and trauma can even lead to life threatening situations. Currently, effective treatments for hemophilia include replacing the missing FVIII protein using intravenous application of recombinant or plasma derived FVIII products. Such preparations are generally administered either in response to a bleeding episode (on-demand therapy) or at frequent, regular intervals to prevent uncontrolled bleeding (prophylaxis). Unfortunately, the appearance of neutralizing anti-FVIII antibodies (FVIII inhibitors) is a major complication during replacement therapy with FVIII products. Approximately 25% of the patients receiving treatment develop this immunity to FVIII protein, thus making further control of bleeding very difficult.
The cause for this immune response to FVIII protein has not been fully elucidated, but the specifics of a patient's immune system can affect their response to therapy. Normally, the immune system develops a tolerance to certain antigens, e.g., “self” antigens. This feature is important because, otherwise, if a self antigen is recognized as a foreign antigen, autoimmune disease results. Hemophilia A patients, in particular, have a genetic defect in their FVIII gene, which causes the immune system to not recognize the administered FVIII protein as a “self” antigen. Thus, when FVIII protein is administered during coagulation factor replacement therapy, the patient's immune system recognizes the FVIII protein as a foreign antigen or an altered self protein and develops anti-FVIII antibodies accordingly.
The FVIII inhibitors, i.e., anti-FVIII antibodies are produced by plasma cells derived from FVIII specific B cells. B cells need the help of activated CD4+ T-cells to proliferate and differentiate into anti-FVIII antibody producing plasma cells. For example, FVIII protein is recognized by B and T lymphocytes in different ways. The induction of anti-FVIII antibodies is T helper cell dependent. B cells recognize whole protein epitopes via their specific B cell receptor. T-cells on the other hand, recognize proteins in the form of processed peptides complexed with an MHC class II molecule presented on the surface of an antigen presenting cell. Each CD4+ T-cell clone recognizes only one specific peptide-MHC complex. For presenting the peptides to the T-cells, MHC class II molecules have an open binding groove that allows peptides of various lengths to fit in and be presented on the surface of a cell. Moreover, the MHC class II protein contains four binding pockets that differ for the various haplotypes (Jones et al., Nature Rev. Immunol. 6:271-282 (2006)). Only specific amino acids fit into these binding pockets, and the minimal size of binding peptides is nine amino acids. Notably, different MHC class II haplotypes can present different peptides. Thus, it is likely that a patient's MHC class II haplotype influences the risk of developing anti-FVIII antibodies. Indeed, several studies have shown that there is a correlation of the human MHC class II haplotype HLA-DRB1*1501 with an increased risk for anti-FVIII antibody development (Pavlova et al., J. Thromb. Haemost. 7:2006-2015 (2009); Oldenburg et al., Thromb. Haemost. 77:238-242 (1997); Hay et al., Thromb. Haemost. 77:234-237 (1997)).
Certain approaches have been explored to address the challenges associated with treating hemophilia by administration of FVIII protein. For example, WO 03/087161 discloses modified FVIII proteins, in which the immune characteristics of the FVIII protein are modified by reducing or removing the number of potential T-cell epitopes present on the protein. A number of regions that include T-cell epitopes along the FVIII protein were identified, including, e.g., FVIII2030-2044. According to the disclosure, removal of such regions could be used to provide functional FVIII protein that did not induce production of anti-FVIII antibodies. WO 09/071,886 also discloses specific regions of FVIII protein that were predicted to give rise to HLA-DR2 binding peptides that are involved in a patient's immune response, such as, e.g., FVIII475-495 FVIII542-562, FVIII1785-1805, and FVIII2158-2178. The peptides were identified for possible use in inducing immune tolerance in a patient.
While there have been advances in identifying regions of FVIII protein involved in the immune response, there is still a need to identify other regions of FVIII protein that can be used for developing other therapeutic peptides and methodologies that can, for example, be used to treat patients having hemophilia A. |
Last updated on .From the section Championship
Alan Hutton's goal was only his second in almost seven years with Aston Villa
Aston Villa put a troubled summer behind them as they came from behind to win their opening Championship match of the season at Hull.
Right-back Alan Hutton's first goal since December 2014 capped victory for Villa, whose serious financial problems came to the fore after last season's play-off final defeat at Wembley.
Hull had led after seven minutes when Villa goalkeeper Jed Steer failed to get a meaningful punch to a right-wing cross and Evandro looped in the rebound from 20 yards.
However, Villa quickly responded with centre-back Tommy Elphick's headed equaliser, before the visitors capitalised on two Hull errors in the second half to take all three points.
After Conor Hourihane had clipped the top of the bar with a free-kick, former Tigers winger Ahmed Elmohamady pounced on a poor clearance by Hull goalkeeper David Marshall to edge Villa ahead.
Hutton produced an identical finish after more sloppy Hull defending to complete the win.
Villa start brightly after gloomy summer
Any fears of financial doom at Villa Park were extinguished by the investment of billionaires Nassef Sawiris and Wes Edens in July.
The prospect of another Villa promotion challenge this term is likely to depend on how much manager Steve Bruce - who managed Hull between 2012 and 2016 - can strengthen his side before the end of August.
Axel Tuanzebe rejoined on loan from Manchester United earlier on Monday, while Bristol City have accepted £6m bids from Villa and Middlesbrough for left-back Joe Bryan.
Also critical will be whether Tottenham target Jack Grealish, who left the field to a rapturous reception from the travelling fans when he was substituted late on, will still be with them beyond Thursday's Premier League transfer deadline.
Hull put in an encouraging performance as they bid to improve on last season's 18th-place finish, but defensive errors cost a team showing four debutants from the start.
Jarrod Bowen, who scored for Hull in the fixture between the sides on the opening day of last season, forced Steer into a low save before half-time and saw a long-range effort deflected wide just after the break.
'We conceded two really poor goals' - post-match reaction
Hull manager Nigel Adkins told BBC Radio Humberside:
"We can't defend like that. I thought we started well, we were on the front foot and it's a good finish from Evandro.
"Probably our best header of the ball hasn't won the header and they've scored to make it 1-1.
"We were in the ascendancy in the second half, we tried to make a positive change to try to force the issue, but we've conceded two really poor goals in quick succession."
Aston Villa manager Steve Bruce told BBC WM:
"Let's not kid ourselves. We've got a long way to go and a lot of work to do, but it's nice to come away from home and show a bit of character to get the result.
"We were too slow in our build-up play in the first half. In the second half we showed a bit more cutting edge.
"And I'm so pleased for Alan Hutton in particular. It's been a privilege to work with him for the last two years. He works really hard and he's a great example to any young player." |
Bad A** Woman of the Week: Catherine White
This is National Girls and Women in Sports week, culminating in an event on Sunday to honor Lauren Purdue, so we thought we’d have a sporty BAWW. We did not have to look far to find one; Catherine White was an immediate obvious choice. Recently made a captain of the women’s track team, White, enjoying her last season as a graduate student in kinesiology here at U.Va, has a long and decorated history in track. But we’ll let her tell you all about it:
HER BACKGROUND
“I was born and raised in Roanoke, VA and went to Northside High School. I am a pretty typical middle-class Virginian. I started athletics at a very young age playing a handful of sports, but was exceptionally keen on soccer. My dad played soccer at Radford University and between my brother, sister, and I we spent many hours together at soccer tournaments and practices. I even played club soccer all the way through my senior year of high school. I began to run in middle school, and started to take it seriously my sophomore year of high school. Once I realized I had a future in competitive running, I trained more consistently and much harder. I was fortunate to be recruited to Division 1 schools for track and field and cross country, and originally choose the University of Arkansas. After my sophomore year there, I transferred to UVA.”
THE MOVE TO U.VA (WAHOOWA!)
“I had always dreamed of coming to UVA for college, and once the University of Arkansas was no longer a good fit for me it felt very natural to transfer here. I enjoy the balanced perspective UVA and UVA athletics promotes. I am not just an athlete or just a student. I have found happiness through many of my endeavors at UVA, and am very grateful I ended up in such a wonderful town, on a talented, hardworking team, and with top-notch academics. I love wearing the Virginia uniform, and representing such an honorable school. Our home competitions, at Panorma Farms (cross country) or at Lanigan Field, have been full of energy and there is nothing better than feeling the support of friends, family, and the community at the races.”
WHITE ON TRACK
“Competing is supposed to be challenging and difficult, and over my many years of collegiate athletics I have begun to respect and embrace this fact. I strive to prepare myself mentally and do all of the things I can control in the best possible manor. I place a lot of trust in my training, my coach, my teammates, and myself to be the most confident competitor when I toe the line.
Sometimes, it is difficult being the oldest woman on the team when it comes to the social element and academic rigors; however, I wouldn’t trade it for a thing. My role has evolved and changed, but being able to keep my passion alive and helping others in the process has been remarkably rewarding. I am very grateful UVA and my coaches have allowed me to stick around and complete my eligibility.”
WHAT PHYSICAL FEAT ARE YOU MOST PROUD OF?
“In Spring 2011, I had my ankle reconstructed after an acute ankle sprain and chronic instability problems. Going through the diagnoses and then the recovery after surgery has definitely been the most challenging time for me as an athlete. Not only was I in a lot of pain, but I thought I would never be able to run again. It took about 6 months to start running again, plus a few more to get in respectable shape. I worked hard to get back to competing and regain function in my ankle. Now any hard workout is seen as a challenge and is fun and exciting, as I am simply happy to be doing something I love around great people and at a wonderful university!”
We all wish Catherine the best of luck as she aims to break school records, get an All-American Award, and perform well at the ACC Conference Championships this semester! She is definitely bada***. |
Area Development News Desk
03/17/2009
Related Research
Chrysler CEO Robert Nardelli says the struggling automaker intends to
avoid bankruptcy and that a proposed deal with Italian automaker Fiat
might be worth as much as US$10 billion. Agence France-Presse (AFP)
reports that Nardelli told President Barack Obama's automotive task
force that the company is "viable without a global alliance partner,"
with the resources to survive on its own even if sales stay in the 11.5
million to 12.6 million unit range over the next six years. However,
Nardelli said the company's proposed alliance with Fiat would further
enhance Chrysler's viability and provide significant benefits. "Fiat
would make available to us its entire product portfolio and powertrain
technology, worldwide distribution capabilities for vehicles we produce
today, and synergies in the areas of purchasing and engineering, among
others," said Nardelli, quoted by AFP. Chrysler has requested an
additional $5 billion in emergency loans from the federal government on
top of the $4 billion it received in December. |
[Effect of acute hypoxia on the EEG and neuronal pulse activity of various brain structures in rats].
The initial phase of hypoxia effect involves activation of the EEG (2000---6000 m) and unit impulse activity (7500--10 000 m). The 7500--10 000 m induced a change towards a predominant slow rhythm of the delta-type while the unit impulse activity gradually diminished, the cortical neurons displaying a higher hypoxia sensitivity and an earlier suppression than the cells of the hypothalamus and the medulla. In all phases of the hypoxia effect the EEG waves showed a greater sensitivity to the rapid peripheral signals than the unit impulse activity of the cortex and other brain structures. |
Simona de Silvestro has been tipped to join Triple Eight to pilot a third entry set to be vacated by Craig Lowndes at the end of the season.
The Swiss driver appears the favourite to move to the multiple championship winners following last week’s confirmation that Lowndes will step down from full-time Supercars racing.
Multiple sources told Speedcafe.com over the Watpac Townsville 400 weekend that it is already a done deal, although there has been no word from the driver or Triple Eight on the matter.
Team owner Roland Dane was coy when asked about de Silvestro during last Friday’s announcement regarding Lowndes’ future, but refused to rule out a move for the driver. He also was unable to confirm if his team will run more than two cars next season.
De Silvestro is committed to Supercars having originally penned a three-year deal from 2017 but revealed earlier this season that her future at Nissan was uncertain for 2019.
The 29-year-old is likely to bring commercial backing to the team having forged a partnership with furniture and electrical retailer Harvey Norman that initially brought her to the championship last year.
IT giant HP Australia, a sponsor that appeared prominently on de Silvestro’s car during a maiden Bathurst wildcard run in 2016, has also emerged on the Triple Eight cars over the Townsville weekend following the announcement of a new technical partnership.
It is also understood that should de Silvestro move to the squad she would head up a team expected to feature a significant female presence.
Triple Eight recruited data engineer Romy Mayer in 2015, who has since been working on Jamie Whincup’s car, would be an ideal candidate for a possible race engineer role.
The former Mercedes DTM and GT3 employee played race engineer for a day during a Triple Eight young driver evaluation last year.
Nissan Motorsport has however told Speedcafe.com that de Silvestro is contracted to the Braeside team for next year although it has been reported that her deal stipulates driving for a factory team.
The Japanese manufacturer is set to leave the sport and team Kelly Racing at the end of the year.
Holden has indicated its desire to see a female race a Commodore in Supercars but admitted over the weekend that it has no sway in Triple Eight’s decision regarding driver line-ups.
However, de Silvestro may not be the only option for Triple Eight.
Dane admitted that he wouldn’t be short of candidates when asked by Speedcafe.com about plans if a third entry is retained for next year.
It is known the Triple Eight boss has long admired Chaz Mostert although the 2014 Bathurst 1000 winner inked a new two-year contract with Tickford Racing until at least the end of 2019.
However, Speedcafe.com understands the 26-year-old has an out clause in the deal relating to the team’s performance.
Tickford Racing boss Tim Edwards rebuffed suggestions any of his drivers could be set for a move away.
“There is only one that hasn’t got a contract at the moment,” Edwards told Speedcafe.com, referring to Mark Winterbottom, whose deal is up at the end of the year.
Meanwhile, other drivers known to be out of contract for next year include Michael Caruso (Nissan Motorsport) and Lee Holdsworth (Preston Hire Racing). |
Men Patagonia Crosstrek Bottoms in Navy Blue
£71.6 £44.4
Model: Patagonia-68090832
This product was added to our catalog on Tuesday 06 November, 2018.
Please Choose:
SIZE
L
M
S
XL
XS
XXL
XXXL
Add to Cart:
Polartec Power Stretch fleece fabric provides next-to-skin comfort during movement, durability and stretch for full range of motionCut-and-sew waistband lies flat on body for increased comfortLeg tapers to ankle for a more technical fit and features functional seaming for increased mobilityZippered pocket on right thigh for media storage264 g (9.3 oz) |
Look up a property ID or keyword
With over 1,000 offices across 11 countries, one of our 12,000
specialists are ready to discuss your property needs.
Should I think about building my own property?
For most people, the dream of home ownership begins when they see their perfect property. But for others, they have plans that they want to bring to life, which is why they turn to building their own.
Making the decision to construct your own property is not one that should be taken lightly. Instead, you need to give it plenty of thought, and not to mention weigh up whether or not it’s financially viable.
How is the Australian construction sector performing?
There is some good news if you do decide that this is the way forward, as the national construction industry is going from strength to strength. Although the Australian Bureau of Statistics (ABS) revealed a 0.1 per cent fall in approvals during May, property groups nevertheless remain optimistic.
Among them is the Property Council of Australia. Executive director Nick Proud explained that the market is generally moving in the right direction, which may give you the impetus you need to approach a mortgage broker about a construction loan.
“In just a few short years approvals have increased substantially – today’s level is an increase of 70,000 on the 12-month period to May 2012 when nationally we recorded 147,727 building approvals,” said Mr Proud.
He noted that not only would this spell good news for the construction sector, but also give housing affordability the boost it needs for first-time buyers throughout the nation.
Weighing up the costs
There are various costs you will need to think about when constructing your own home. Among the most important are:
• How big a property you are hoping to build
• Location (sought-after suburbs will come with a higher price tag)
• The level of landscaping you want
• Quality of the materials used
• Cost of labour
One of the crucial pieces of information you will need is how much you’ll be expected to pay for a plot of land. Your state valuer-general will provide guidance on this, so it worth taking a look before determining how much you can borrow.
The fact is that there is no way of telling how much your project will set you back until you work out some specific pricing. However, setting yourself a realistic budget will ensure that your ambitions can become a reality without breaking the bank.
No matter what route you decide to take, make sure you use a home loan calculator to determine just how much you can afford to borrow. This will be the first step in finding out whether your dreams can become a reality. |
The imperative to better integrate health care in New Zealand started a quarter of a century ago and has accelerated in recent years, some of it recently showcased at the 4th World Congress on Integrated Care in 2016.^[@bib1]^ There exist mature models of horizontal integration, patchy examples of effective vertical integration, and much talk from the highest levels of government of the need for more intersectoral integration. The concept of improving horizontal integration by co-location and collaboration is of course far from new, with many and varied primary care workers in New Zealand expressing the wish to develop closer working relationships in the 1990s.^[@bib2]^ These collaborative sentiments were not always shared by national disciplinary leaders and politicians.^[@bib3]^ The integrated family health centre or healthcare home model with innovative models of care is only now gaining momentum in parts of New Zealand^[@bib4]^, but is yet to be trialled and evaluated at scale.
First steps for organised general practice in New Zealand {#s1}
=========================================================
In the 1990s, competition in health was enshrined in policy by a hard-line, right-wing government with public hospitals rebranded as \'Crown Health Enterprises\'. They were instructed to compete against each other and to deliver profits.^[@bib5]^ Meanwhile, general practice was organising itself into collaborative independent practice associations (IPAs) to share after hours care, to negotiate collectively, to take back control of their own continuing education, to provide support for evolving computerisation, and to work together on other areas of mutual interest. The opportunity for several nascent IPAs to take on risk-sharing budgets for selected referred services, (principally medicines and laboratory tests), arose from a policy vacuum on primary care direction, spiralling expenditure and innovative thinking from the sector. In some places, budget holding proved to be very successful in the early years and provided those IPAs with the financial resources to begin developing more integrated services. Importantly, these initiatives were designed, owned, and implemented from the ground up. In Canterbury, the Pegasus IPA was formed in 1992. It was, and remains, the largest organised general practice network in the region. Pegasus quickly developed and self-funded a range of initiatives, including peer-led interdisciplinary education and quality improvement, together with a number of population health programmes, most of which continue today.^[@bib6]^ Vertical integration was given a further boost with the introduction of an acute demand programme in 2000, which delivered care for selected higher acuity patients in the community, who previously would have been hospitalised. The key success factor was allowing general practice teams to decide what resources and services were required to safely replace a hospitalisation with care in the community. Coordination was provided by Pegasus and an immediate, no-questions-asked approach to funding approval achieved enthusiastic uptake and rapid results in decreased acute medical hospitalisations. This highly successful community-governed model, contrasting with the hospital-in-the-home outreach model much used in Australia, is now in its 17^th^ year. It has established many local community partnerships, works closely with secondary care, and has been replicated extensively around New Zealand.^[@bib7]^
In 2001, the now centre-left government launched a *Primary Health Care Strategy* ^[@bib8]^ that, for the first time, encouraged universal patient enrolment with part payment of fees under a capitated formula. Most funding was to be distributed through new entities named primary health organisations (PHOs), which were allowed to form themselves from willing participants, but which were required to have community involvement in governance. Beyond the obvious advantages of the mutual responsibility that comes with enrolment, this change encouraged closer and more formal working relationships between primary care clinicians, community agencies, and non-governmental organisations.
Introducing the concept of alliancing: shared problems, shared solutions {#s2}
========================================================================
Moving on a few years, and a change back to a centre-right government, it was becoming clear that the pace of change needed to increase to meet the changing demographics (of both the population and the health workforce) to address unacceptable inequities in health outcomes between the most and least advantaged. In response to a new policy document introduced in 2009, called *Better, Sooner, More Convenient* ^[@bib9]^ volunteer groups, mostly in the geographic distribution of district health boards, submitted plans to develop more integrated services. The concept of alliancing was encouraged, and in Canterbury, this approach was adopted enthusiastically with the formation of the Canterbury Clinical Network. The measurable benefits of this new way of working and planning have been substantial, and some of these, together with their detailed workplan are publicly available.^[@bib10]^ Acceleration and incentive was provided by the destructive Christchurch earthquakes in 2010--2011, which significantly reduced hospital inpatient capacity. The key success to the alliancing approach is seen as the commitment from all partners to own the problems, and plan and work together to find solutions. Clinicians from across the system work with funders, and multiple community agencies to redesign services with a shared focus on organising care that is integrated to provide \'best-for-patient\', \'best-for-system\' outcomes. Nationally, productive alliancing activity has been patchy, but there are some notable successes in progressing integrated care detailed on the General Practice NZ website.^[@bib11]^ In parallel, horizontal and vertical integration have been facilitated by a number of collaborative IT developments, between general practice, secondary care, and local funders. HealthPathways^[@bib12]^ and HealthInfo^[@bib13]^ are prime examples. Developing the content of the care and referral pathways fosters strong primary and secondary care relationships. Locally adapted healthpathways have now been extended to most of New Zealand, much of Australia, and now has a foothold in the North East of England. HealthOne^[@bib14]^ is a shared electronic record view of many parts of the health system (primary care, secondary care --- inpatient and outpatient --- pharmacy, radiology, laboratory, community nursing, and others). This platform will soon extend the visibility or relevant parts of clinical records to the whole South Island of New Zealand.
The beginnings of intersectoral integration {#s3}
===========================================
The current New Zealand government, championed by the new prime minister, is very enthusiastic about developing greater intersectoral collaboration, and has identified the need for, and commitment to, social investment in the most vulnerable and at risk populations who repeatedly require the services and attention of social welfare, education, and justice systems.^[@bib15]^ Early social sector trials, which allow increased local autonomy in social service provision, are being evaluated.^[@bib16]^ The recent introduction of a co-developed national system level measures framework to replace the previous single disease-based pay-for-performance programme, should also add incentive to integration organised through local alliances.^[@bib17]^
In Canterbury, both horizontal and vertical integration are developing.^[@bib18]^ Comprehensive intersectoral integration seems inherently sensible. Whether it is practically achievable, or simply a chimera, remains to be seen.
Provenance
==========
Commissioned; not externally peer reviewed.
Competing interests
===================
LT: Chair of Pegasus Health. Member of the Canterbury Clinical Network Alliance Leadership Team. Member of the Executive of General Practice New Zealand.
|
/****************************************************************************
**
** Copyright (C) 2011 Nokia Corporation and/or its subsidiary(-ies).
** All rights reserved.
** Contact: Nokia Corporation (qt-info@nokia.com)
**
** This file is part of the QtCore module of the Qt Toolkit.
**
** $QT_BEGIN_LICENSE:LGPL$
** GNU Lesser General Public License Usage
** This file may be used under the terms of the GNU Lesser General Public
** License version 2.1 as published by the Free Software Foundation and
** appearing in the file LICENSE.LGPL included in the packaging of this
** file. Please review the following information to ensure the GNU Lesser
** General Public License version 2.1 requirements will be met:
** http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html.
**
** In addition, as a special exception, Nokia gives you certain additional
** rights. These rights are described in the Nokia Qt LGPL Exception
** version 1.1, included in the file LGPL_EXCEPTION.txt in this package.
**
** GNU General Public License Usage
** Alternatively, this file may be used under the terms of the GNU General
** Public License version 3.0 as published by the Free Software Foundation
** and appearing in the file LICENSE.GPL included in the packaging of this
** file. Please review the following information to ensure the GNU General
** Public License version 3.0 requirements will be met:
** http://www.gnu.org/copyleft/gpl.html.
**
** Other Usage
** Alternatively, this file may be used in accordance with the terms and
** conditions contained in a signed written agreement between you and Nokia.
**
**
**
**
**
** $QT_END_LICENSE$
**
****************************************************************************/
#ifndef QSHAREDPOINTER_H
#define QSHAREDPOINTER_H
#include <QtCore/qglobal.h>
#include <QtCore/qatomic.h>
#include <QtCore/qshareddata.h>
#ifndef Q_QDOC
# if !defined(QT_NO_MEMBER_TEMPLATES)
// QSharedPointer requires member template support
# include <QtCore/qsharedpointer_impl.h>
# endif
#else
QT_BEGIN_HEADER
QT_BEGIN_NAMESPACE
QT_MODULE(Core)
// These classes are here to fool qdoc into generating a better documentation
template <class T>
class QSharedPointer
{
public:
// basic accessor functions
T *data() const;
bool isNull() const;
operator bool() const;
bool operator!() const;
T &operator*() const;
T *operator ->() const;
// constructors
QSharedPointer();
explicit QSharedPointer(T *ptr);
QSharedPointer(T *ptr, Deleter d);
QSharedPointer(const QSharedPointer<T> &other);
QSharedPointer(const QWeakPointer<T> &other);
~QSharedPointer() { }
QSharedPointer<T> &operator=(const QSharedPointer<T> &other);
QSharedPointer<T> &operator=(const QWeakPointer<T> &other);
QWeakPointer<T> toWeakRef() const;
void clear();
// casts:
template <class X> QSharedPointer<X> staticCast() const;
template <class X> QSharedPointer<X> dynamicCast() const;
template <class X> QSharedPointer<X> constCast() const;
template <class X> QSharedPointer<X> objectCast() const;
};
template <class T>
class QWeakPointer
{
public:
// basic accessor functions
bool isNull() const;
operator bool() const;
bool operator!() const;
// constructors:
QWeakPointer();
QWeakPointer(const QWeakPointer<T> &other);
QWeakPointer(const QSharedPointer<T> &other);
~QWeakPointer();
QWeakPointer<T> operator=(const QWeakPointer<T> &other);
QWeakPointer<T> operator=(const QSharedPointer<T> &other);
QWeakPointer(const QObject *other);
QWeakPointer<T> operator=(const QObject *other);
T *data() const;
void clear();
QSharedPointer<T> toStrongRef() const;
};
template<class T, class X> bool operator==(const QSharedPointer<T> &ptr1, const QSharedPointer<X> &ptr2);
template<class T, class X> bool operator!=(const QSharedPointer<T> &ptr1, const QSharedPointer<X> &ptr2);
template<class T, class X> bool operator==(const QSharedPointer<T> &ptr1, const X *ptr2);
template<class T, class X> bool operator!=(const QSharedPointer<T> &ptr1, const X *ptr2);
template<class T, class X> bool operator==(const T *ptr1, const QSharedPointer<X> &ptr2);
template<class T, class X> bool operator!=(const T *ptr1, const QSharedPointer<X> &ptr2);
template<class T, class X> bool operator==(const QWeakPointer<T> &ptr1, const QSharedPointer<X> &ptr2);
template<class T, class X> bool operator!=(const QWeakPointer<T> &ptr1, const QSharedPointer<X> &ptr2);
template<class T, class X> bool operator==(const QSharedPointer<T> &ptr1, const QWeakPointer<X> &ptr2);
template<class T, class X> bool operator!=(const QSharedPointer<T> &ptr1, const QWeakPointer<X> &ptr2);
template <class X, class T> QSharedPointer<X> qSharedPointerCast(const QSharedPointer<T> &other);
template <class X, class T> QSharedPointer<X> qSharedPointerCast(const QWeakPointer<T> &other);
template <class X, class T> QSharedPointer<X> qSharedPointerDynamicCast(const QSharedPointer<T> &src);
template <class X, class T> QSharedPointer<X> qSharedPointerDynamicCast(const QWeakPointer<T> &src);
template <class X, class T> QSharedPointer<X> qSharedPointerConstCast(const QSharedPointer<T> &src);
template <class X, class T> QSharedPointer<X> qSharedPointerConstCast(const QWeakPointer<T> &src);
template <class X, class T> QSharedPointer<X> qSharedPointerObjectCast(const QSharedPointer<T> &src);
template <class X, class T> QSharedPointer<X> qSharedPointerObjectCast(const QWeakPointer<T> &src);
template <class X, class T> QWeakPointer<X> qWeakPointerCast(const QWeakPointer<T> &src);
QT_END_NAMESPACE
QT_END_HEADER
#endif // Q_QDOC
#endif // QSHAREDPOINTER_H
|
Q:
Endless loop with when passing self as delegate
I am creating a wrapper around CLLocationManager but am struggling to initialize the wrapper LocationManager in my view controller.
My view controller does the following:
class MyVC: UIViewController, CLLocationManagerDelegate {
var locationManager: LocationManager? {
get {
if self.locationManager == nil {
self.locationManager = LocationManager(delegate: self)
}
return self.locationManager
}
set {
self.locationManager = newValue
}
}
...
}
The idea is to initialize a LocationManager only when it is actually needed. However I'm receiving a EXC_BAD_ACCESS(code=2... and what looks like an endless loop on my main thread as the code breaks at the if self.locationManager == nil { ... ~175000 times before crashing. My LocationManager takes my view controller as a CLLocationManagerDelegate as an argument, passing it along to the actual manager.
import Foundation
import CoreLocation
class LocationManager {
let delegate: CLLocationManagerDelegate
var locationManager: CLLocationManager? {
get {
if self.locationManager == nil {
let locationManager = CLLocationManager()
locationManager.delegate = self.delegate
locationManager.desiredAccuracy = kCLLocationAccuracyBestForNavigation
self.locationManager = locationManager
}
return self.locationManager
}
set {
self.locationManager = newValue
}
}
init(delegate: CLLocationManagerDelegate) {
self.delegate = delegate
}
func start() {
if self.isAuthorized() {
self.locationManager!.startUpdatingLocation()
}
}
func stop() {
self.locationManager!.stopUpdatingLocation()
}
func isAuthorized() -> Bool {
switch CLLocationManager.authorizationStatus() {
case .Authorized:
return true
default:
return false
}
}
func requestAuthorization() {
self.locationManager!.requestAlwaysAuthorization()
}
}
Is use of self not allowed to be passed like this in a computed property?
A:
What you want is a lazy property like this
lazy var locationManager: LocationManager = {
let manager = LocationManager(delegate: self)
return manager
}()
Also set locationManager in LocationManager class to lazy property.
lazy var locationManager: CLLocationManager = {
let locationManager = CLLocationManager()
locationManager.delegate = self.delegate
locationManager.desiredAccuracy = kCLLocationAccuracyBestForNavigation
return locationManager
}()
Your error is here
var locationManager: LocationManager? {
get {
if self.locationManager == nil {
self.locationManager = LocationManager(delegate: self)
}
return self.locationManager
}
set {
self.locationManager = newValue
}
}
You call self.locationManager in the get method of locationManager,it will fall in dead loop
|
The practical limits of optical lithography assume that the medium through which imaging is occurring is air. This practical limit is defined by the effective wavelength equation
Λ eff = λ 2 · n · NA ,where λ is the wavelength of incident light, NA is the numerical aperture of the projection optical system, and n is the index of refraction of the medium. Now, by introducing a liquid (instead of the air) between a last lens element of the projection optical system and a wafer being imaged, the refractive index changes (increases), thereby enabling enhanced resolution by lowering the effective wavelength of the light source. Lowering a light source's wavelength automatically enables finer resolution of smaller details. In this way, immersion lithography becomes attractive by, for instance, effectively lowering a 157 nm light source to a 115 nm wavelength, thereby gaining resolution while enabling the printing of critical layers with the same photolithographic tools that the industry is accustomed to using today.
Similarly, immersion lithography can push 193 nm lithography down to 145 nm. In theory, older technology such as the 193 nm tools can now still be used. Also, in theory, many difficulties of 157 nm lithography—large amounts of CaF2, hard pellicles, a nitrogen purge, etc. —can be avoided.
However, despite the promise of immersion photolithography, a number of problems remain, which have so far precluded commercialization of immersion photolithographic systems. These problems include optical distortions. For example, during immersion lithography scanning, sufficient g-loads are created that can interfere with system performance. These accelerative loads can cause a vibrational, fluidic shearing interaction with the lens resulting in optical degradation. The up and down scanning motions within the lens-fluid environment of Immersion Lithography can generate varying fluidic shear forces on the optics. This can cause lens vibrational instability, which may lead to optical “fading”. Other velocity profile non-uniformities can also cause optical distortions. |
Q:
Combining active record relations
Given these two active record relation objects
cars = Vehicle.where(type: 'car') # ActiveRecord::Relation
motorbikes = Vehicle.where(type: 'motorbike') # ActiveRecord::Relation
In what way am I able to combine these two objects into a single object containing both cars and motorbikes that I can use active record methods on? Is it possible?
Edit:
This varies from past questions of a similar nature because I am asking specifically within the context of rails 5.
A:
In Rails, you could do:
cars_and_bikes = Vehicle.where(type: ['car', 'motorbike'])
OR using the new Rails 5 AR#or you could do:
cars_and_bikes = Vehicle.where(type: 'car').or(Vehicle.where(type: 'motorbike'))
|
Roles of neutrophil/lymphocyte and platelet/lymphocyte ratios in the early diagnosis of malignant ovarian masses.
The present study aimed to investigate the utility and importance of the various parameters of complete blood count panel for benign-malignant differentiation of adnexal masses. This retrospective study involved 316 patients with documented benign and 253 patients with malignant adnexal masses who underwent primary surgical treatment at a tertiary referral center. Prior to the study, all benign and malignant cases were compared within their own groups and then the benign and malignant cases were compared to each other. For all cases, cut-off, sensitivity, specificity, positive predictive value (PPV) and negative predictive value (NPV) were calculated for the neutrophil lymphocyte ratio (NLR), platelet lymphocyte ratio (PLR), neutrophil, lymphocyte, platelet and CA-125 parameters, and the results were compared in regards to the groups. NLR, PLR, neutrophil, CA-125, and platelet values were higher in the malignant compared to the benign cases (p<0.01). The lymphocyte value was lower in the malignant cases (p<0.01). No significant differences were found for basophils and eosinophils (p > 0.05). For CA-125, the sensitivity, specificity, PPV and NPV for all cases were 78%, 62%, 62% and 78%, respectively. For NLR, they were 65.6%, 72.1%, 65.3%, and 72.3%, and for PLR, 48%, 81%, 67%, and 66%. Additionally, the sensitivity and specificity were 55% and 77% for CA-125, 66% and 58% for NLR, and 61% and 58% for PLR in early malignant cases. NLR and PLR appear to be useful methods that can be applied together with CA-125 due to the relatively high sensitivity values for the malign-benign differentiation of ovarian masses. Although the specificity of these parameters is lower than CA-125, especially in cases with early malignant ovarian pathology, their sensitivity being higher is promising for the early diagnosis of ovarian cancer. It can be used to detect ovarian malignancies in the early stages, and it will increase the treatment options and improve survival rates. |
Rails Rumble – Let the Judging Begin - raphaelcosta
http://railsrumble.com
======
tbrock
Wow, Refactor Cop is a great idea.
I still think Ruby has the best ecosystem out there because of projects like
this, code climate, etc. The community can have it's ups and downs but the
strong emphasis on code quality, testing and great documentation around open
source contributions is bar none.
------
ApolloRising
Some honest feedback: Putting dark grey text as description copy against a
dark background makes trying to even start participating useless.
|
Monitor any condition, anywhere!
Is the tank
empty?
Is the pump
running?
Where's my
trailer?!!!
Is the PLC
operating?
Temperature too low?
Is the cell tower OK?
What's the water level??
Is the ventilator working?
It happens all the time
An equipment failure, supply run out, or unexpected condition at
a remote location results in costly, sometimes catastrophic
consequences. It happens because people who could have taken
corrective action were not aware of the situation.
There's a better way
A Messenger Remote Monitor™ can check most any condition at
a remote location and deliver actionable information that you can
use to avoid downtime, increase efficiency, or get the
'peace-of-mind' from knowing that everything is OK! |
---
abstract: |
The Aho-Corasick algorithm is a multiple patterns searching algorithm running sequentially in various applications like network intrusion detection and bioinformatics for finding several input strings within a given large input string. The parallel version of the Aho-Corasick algorithm is called as Parallel Failure-less Aho-Corasick algorithm because it doesn’t need failure links like in the original Aho-Corasick algorithm. In this research, we implemented an application specific parallel failureless Aho-Corasick algorithm on the general purpose graphic processing unit by applying several cache optimization techniques for matching DNA sequences. Our parallel Aho-Corasick algorithm shows better performance than the available parallel Aho-Corasick algorithm library due to its simplicity and optimized cache memory usage of graphic processing units for matching DNA sequences.
keywords- Aho-Corasick, GPGPU, DNA sequence matching
author:
-
-
bibliography:
- 'IEEEabrv.bib'
- 'paper2.bib'
title: 'An Optimized Parallel Failure-less Aho-Corasick Algorithm for DNA Sequence Matching'
---
Introduction
============
The Aho-Corasick algorithm is used for finding multiple patterns (strings) within a given large input string. This was invented by Alfred V. Aho and Margaret J. Corasick [@Aho_original]. Therefore, this algorithm is used widely in many applications like plagiarism detection, intrusion detection, digital forensic, text mining and bioinformatics. The Aho-Corasick algorithm is executed one time for finding all occurrences of known patterns within the given input string. However, the main drawback of the original Aho-Corasick algorithm, which is based on sequential processing logic is the performance. The solution for the issue about the performance was introduced by Lin et al. [@pfac_1] [@pfac_2] by introducing a parallel version of the Aho-Corasick algorithm called Parallel Failure-less Aho-Corasick (PFAC) algorithm which runs on GPGPUs.
The original PFAC was introduced as the general purpose library for any kind of applications, which are based on finding multiple patterns within the given large input. However, our implementation is designed especially for DNA sequence matching and compared with the usage of the original PFAC for DNA sequence matching. Within our PFAC implementation, we concentrated on cache optimizations of GPGPU and application specific modifications for achieving better performance than original PFAC for DNA sequence matching.
Related Work
============
The Aho-Corasick algorithm was invented by Aho, Alfred V. and Corasick, Margaret J. on 1975 as an article “Efficient String Matching: An Aid to Bibliographic Search" [@Aho_original]. They have introduced a new mechanism for searching multiple patterns within a given large input text. It shows good performance for multiple pattern searching among other traditional multiple pattern matching algorithm.
Dimopoulos et al. [@aho_corasick_memory_efficient] have discussed a modification to the serial Aho-Corasick algorithm for gaining memory efficiency to detect intrusions. They implemented a split Aho-Corasick algorithm with domain specific characteristics of intrusion detection for minimizing the memory usage of the finite state machine of the algorithm. As the domain specific characters, they observed that most patterns are subset of 256 characters, out of these 256 characters some are used almost in every states while other characters are used infrequently, and split finite state machines have smaller memory sizes according to the domain than the large finite state machine. The modified algorithm has been run on a Field-Programmable Gate Array (FPGA) chip as an improved version of the Aho-Corasick algorithm with the point of view of the memory usage.
The speed-up of Aho-Corasick pattern matching machines by rearranging states has been done by Nishimura et al. [@aho_corasick_speed_up]. They have rearranged the states of the finite state machines for improving the memory access via cache memory. After constructing the basic goto graph, all the states of the graph have been rearranged according to the breadth-first order. Then all the memory accesses were more cache friendly and the performance gain is 55%.
The PFAC was introduced by Lin at el.[@pfac_1]. PFAC has been run on a graphic processing units without failure links. They have run failure links less Aho-Corasick algorithm using thousand of threads of the GPGPU. Then it shows big performance improvement over the original serial Aho-Corasick algorithm. They published the second paper [@pfac_2] of improving the PFAC by introducing a hash function method.
Kouzinopoulos et al. have done a survey about the performance of some selected string matching algorithm on GPGPU [@string_matching_on_GPGPU]. They have selected the Naive, Knuth-Morris-Pratt, Boyer-Moore and Quick-search on-line exact string matching algorithms as the test cases. However, the graphic card used for testing these algorithm was basic general graphic card called NVIDIA GTX 280. Therefore, they failed to show actual performance gain of these algorithm on the high end GPGPU like tesla series.
Aho-Corasick algorithm
======================
As we mentioned, Alfred V. Aho and Margaret J. Corasick [@Aho_original] introduced the Aho-Corasick algorithm. They have discussed basic two steps for using this algorithm like (1). constructing a finite state pattern matching machine from the keywords and (2.) matching the input using the constructed finite state machine.
Let us look at an example; assume that patterns **AC, ACG, CTGT** and **TG** should be searched within the given text. As the first step, the finite state machine should be constructed using the given patterns. For constructing a finite state machine, they have used three functions called **goto (g), failure (f)** and **output**. First, goto graph should be constructed for finding the goto function. This goto graph of the above example input patterns is given in Fig. \[fig:1\].
![The goto graph for the patterns: AC, ACG, CTGT and TG[]{data-label="fig:1"}](figure1_new){width="3.2in"}
The pattern **AC** will be matched in state 2, **ACG** in state 3, **CTGT** in state 7 and **TG** in state 9 as shown in Fig. \[fig:1\]. This graph represents the goto function. Next step is constructing failure function from the goto function. This failure function should be calculated for all the states of the goto graph as mentioned in the original Aho-Corasick article [@Aho_original]. The complete finite state machine with failure links of the above example is given in Fig. \[fig:2\]. Some nodes are marked with red color to identify **output** nodes.
![Transition diagram of the original Aho-corasick algorithm with failure links for the patterns AC, ACG, CTGT and TG[]{data-label="fig:2"}](figure2_new){width="3.2in"}
The complete finite state machine is now available as in Fig. \[fig:2\]. It is easy to understand the processing phase of the Aho-Corasick algorithm by an example. Let’s consider an input text with a text string S = s1,s2,s3,...,sn. The processing phase starts with the first state from the transition graph and the first character from the input text. First, it checks that the current input character of the input text has a transition from the current state of the finite state machine. Simply, it executes the **goto** function. If the **goto** function returns a new state, the current state of the input transition table is a new state while the current input character is the next character of the input. Assume that the **goto** function failed, then the processing phase will check the **failure function (f)** for finding the next state for the current input character. If the finite state machine reached to the output nodes, it will return matched patterns of the current state of the finite state machine. All of the above steps will be continued until the process reaches to the final character of the input text.
What is the PFAC Algorithm?
===========================
Within this section, we are discussing Parallel Failure-less Aho-Corasick Algorithm (PFAC) implemented by Lin C.H. et al. [@pfac_1] [@pfac_2]. It works as same as the Aho-Corasick algorithm. However, PFAC runs on GPGPUs without failure links. PFAC doesn’t use these failure links to backtrack the next starting point and sub patterns. It uses a parallel execution technique using parallel threads of GPGPUs. Then, it doesn’t need any failure link for identifying the next start point because each character of the input has it’s own thread for running a finite state machine. However, normally PFAC can detect only the longest patterns and it does not detect sub-patterns of the large patterns.
This failure-less machine runs parallel on a GPGPU. When the machine is run parallel on the GPGPU, each and every letter of the input text pass into the transition machine by it’s own thread. As the result, every letter is searched in parallel individually. This mechanism can be identified by Fig. \[fig:3\].
![Parallel execution of the PFAC on the GPGPU[]{data-label="fig:3"}](figure3_new){width="3.3in"}
PFAC algorithm has been used as the reference point of our research. We have developed our own application specific PFAC source code for matching DNA sequences because original PFAC was developed for general purposes. The development process of our application specific PFAC will be discussed in the next section.
Designing and Implementation of the application specific PFAC for DNA sequence matching
=======================================================================================
Within this section, we are discussing that how the new application specific PFAC algorithm was developed and features of that algorithm. Our own application specific PFAC algorithm was developed with some differences from the original PFAC algorithm. However, our implementation has been limited into an application specific algorithm like bioinformatics DNA matching as a factor for gaining better performance than the general purpose original PFAC algorithm.
Designing application specific PFAC algorithm for DNA sequence matching
-----------------------------------------------------------------------
To develop an application specific PFAC algorithm, the following main steps were followed.
- Developing a data structure for the input patterns’ finite state machine.
- Read data from input text and run with the finite state machine.
- Managing memory types of the system for gaining better performance.
When the input pattern’s finite state machine data structure was created, only four characters were considered because the bioinformatics algorithms of DNA matching are using mainly a specific number of letters like A,T,C and G. Therefore, 4$\times$N 2D array was created to store all the input patterns where N is the maximum number of states that can be handled by the program. A sample data structure (transition table) for storing sample input patterns can be seen at Table \[tbl:1\].
A T C G
---- ---------- ----------- ----------- -----------
0 [ 1,0]{} [ 6,0]{} 0,0 0,0
1 [ 2,0]{} 0,0 0,0 0,0
2 [ 3,0]{} 0,0 0,0 0,0
3 0,0 [ 4,0]{} 0,0 0,0
4 0,0 [ 11,0]{} [ 5,0]{} 0,0
5 0,0 0,0 0,0 [ 6,1]{}
6 [ 7,0]{} 0,0 0,0 0,0
7 0,0 0,0 [ 8,0]{} 0,0
8 0,0 0,0 0,0 [ 9,0]{}
9 0,0 0,0 [ 10,0]{} 0,0
10 0,0 0,0 [ 11,2]{} 0,0
11 0,0 0,0 0,0 [ 12,3]{}
12 0,0 0,0 0,0 0,0
: A sample transition table for patterns AAATCG, TACGCC and AAATTG of our application specific PFAC implementation[]{data-label="tbl:1"}
Input patterns are loaded into this transition table one by one. Next state of the transition table is decided by current letter of the pattern and the previous state of the transition table. When the program find new state (new character) then it adds a new state to the transition table.
For an example consider the first pattern **AAATCG** of the above example. First letter is **A**, then the program place next state number and matched pattern number within the Row=0 and Column=A, it is equal to (1, 0). Then, it takes the second character **A**. Same time, the pointer of the transition table moves to the new state. The loop finds the cell for letter **A**. It is equal to the cell (1, A). Next state and matched pattern number are placed within this cell. This mechanism is continued until it gets the final character of the current input pattern. Then, it will move to the next pattern.
Next step is, we have to read the input text into a buffer. After this step, the pattern matching machine should be run in parallel using a GPGPU with input text buffer same as the original PFAC execution as mentioned in early.
Implementation of our application specific PFAC on GPGPU
--------------------------------------------------------
The main method of our application specific PFAC for loading input patterns into the transitions table can be seen in Fig.\[fig:code1\]. It has three input arguments for parsing pattern file name, pointing next state of the int array and pointing the matched pattern ID array.
\[ fontsize= \] [C]{}
int readPatternsFromFileToTransitionTable( char \* patternFile, unsigned int \* nextState, unsigned int \* matchedPatternId)[ ... ]{}
Next step of the program after loading input patterns into the transition table is reading data from an input text and running the kernel. Therefore, it is fair to consider that how to load input text data into the program. The code sample for reading data from an input text file is given in Fig. \[fig:code2\].
``` {.C}
char * readTextFromFile(
char * inputFile,
int* inputText_size_p){
...
}
```
According to the above method, the method readTextFromFile takes two arguments for input text file name and an integer pointer to store input file size. Finally, a char pointer which has all the characters of the input text file is passed as the return value.
Now, all the required data to run PFAC algorithm are ready within the memory of the host machine. Therefore, those data have to be passed into the device memory before launching a kernel in the device. The cudaMemcpy() function has been used for copying data from the host to device as well as the device to the host in the final stage.
Then, the kernel can be launched by passing the relevant parameters. Only one kernel is launched in our PFAC. It creates 256 threads per block. The number of blocks is defined according to the input text file size. If one dimension grid is considered, then the number of blocks per dimension may exceed the maximum number of blocks per dimension limit of the device for large input size. Therefore, a two dimension grid was created when the input has more characters. Deciding about dimensions of the grid is an automated process. As a requirement, the number of threads that is equal to the number of characters within the input text are created within the GPGPU for running our application specific PFAC algorithm. Finally within the kernel, character by character search is done using an individual thread using the transition table of the input patterns.
The kernel function takes mainly five parameters. The *nextState* and *matchedPatternId* are memory locations that were allocated previously to store the information about the transition table. Then, it takes main input called *inputText* which has to be searched. The output is the integer array which has been used to store output data after finding a match. Our implementation of PFAC uses the 1D array instead of 2D arrays. Therefore, the pitch is taken as an input parameter to determine the rows of arrays. It means the pitch size is equal to the row size of the transition table. In our case, this value is equal to the four (4).
Managing memory types to gain better performance
------------------------------------------------
The GPGPU is a device with several memory types. Global, shared, L1 cache, L2 cache, texture and constant memories are names to identify those various memory types. However, the usage of these memory types is different while some of the memory types are out of control from the user. Therefore, it is very important to handle these memory types according to the requirement.
Initially, all the data structures (input text data, transition table arrays) are transferred into the main global memory. Then those data structures are step by step migrated to special memory locations for testing the performance of each memory types. The first test was run using only global memory. Then two arrays of transition table called **nextState** and **matchedPatternId** are transferred into the texture memory location. Within another test, the input text also transferred into the shared memory. As the first step of testing, all the test cases run for different input patterns with large input text. As the second step, input data has been changed for measuring the performance for various input text.
Experimental setup
==================
Our main workstation has Intel(R) Core(TM) i7-6700K 4.00GHz CPU with 32GB RAM. The main GPGPU was 6GB NVIDIA Tesla C2075. Table \[tbl:gpgpu\_cache\_architecture\] is used to tabulate cache information about our GPGPU because cache optimizations are discussed under this research.
[llll]{} &
-------
Cache
size
-------
: Tesla c2075 GPGPU’s cache architecture-6GB global memory[]{data-label="tbl:gpgpu_cache_architecture"}
&
-----------
Cache
line size
-----------
: Tesla c2075 GPGPU’s cache architecture-6GB global memory[]{data-label="tbl:gpgpu_cache_architecture"}
& Description\
L1 cache &
-------
48KB/
16KB
-------
: Tesla c2075 GPGPU’s cache architecture-6GB global memory[]{data-label="tbl:gpgpu_cache_architecture"}
& 128bytes &
-----------------
can be disable
by using
-Xptxas-dlcm=cg
compile flag
-----------------
: Tesla c2075 GPGPU’s cache architecture-6GB global memory[]{data-label="tbl:gpgpu_cache_architecture"}
\
--------
Shared
memory
--------
: Tesla c2075 GPGPU’s cache architecture-6GB global memory[]{data-label="tbl:gpgpu_cache_architecture"}
&
-------
16KB/
48KB
-------
: Tesla c2075 GPGPU’s cache architecture-6GB global memory[]{data-label="tbl:gpgpu_cache_architecture"}
& 128bytes &
-------------
can be used
manually
-------------
: Tesla c2075 GPGPU’s cache architecture-6GB global memory[]{data-label="tbl:gpgpu_cache_architecture"}
\
L2 cache & 768KB &
-----------
128bytes/
32bytes
-----------
: Tesla c2075 GPGPU’s cache architecture-6GB global memory[]{data-label="tbl:gpgpu_cache_architecture"}
& Unified cache\
Our PFAC implementation and original PFAC implementation were tested for various patterns and inputs. Information about these test cases is tabulated in Table \[tbl:2\] and \[tbl:3\].
[lll]{}
-------------
Input
Pattern Set
Name
-------------
: Tested input patterns[]{data-label="tbl:2"}
&
----------
Number
of
Patterns
----------
: Tested input patterns[]{data-label="tbl:2"}
&
----------
Size of
the File
----------
: Tested input patterns[]{data-label="tbl:2"}
\
PatternSet 1 & 1000 & 101.1KB\
PatternSet 2 & 2000 & 202.2KB\
PatternSet 3 & 3000 & 3034KB\
PatternSet 4 & 4000 & 404.5KB\
PatternSet 5 & 5000 & 505.6KB\
[lll]{} Input Data Sets &
-----------
Number of
Patterns
-----------
: Tested input data sets[]{data-label="tbl:3"}
&
----------
Size of
the File
----------
: Tested input data sets[]{data-label="tbl:3"}
\
Input DataSet 1 & 750000 & 76MB\
Input DataSet 2 & 1500000 & 152.1MB\
Input DataSet 3 & 2250000 & 228.1MB\
Input DataSet 4 & 3000000 & 304.2MB\
Input DataSet 5 & 3750000 & 380.2MB\
Results and discussion
======================
First, it is required to identify performance difference between memory types of the GPGPU for our application specific PFAC. Then, the cache configurations of the Fermi GPGPU was changed to identify the effects for the performance. Finally, our PFAC implementation and the original PFAC were tested for identifying the performance gap.
The first experiment of our application specific PFAC algorithm was done with only global memory. Then, shared memory and texture memory have been added into the algorithm gradually. The configurations of the GPGPU was unchanged. The test result of these tests is depicted in Fig. \[graph1\].
\[ x tick label style=[ /pgf/number format/1000 sep=]{}, ylabel=Time (s), enlargelimits=0.05, legend style=[at=[(0.5,-0.1)]{}, anchor=north,legend columns=-1]{}, ybar interval=0.7, xticklabels=[Pattern Set 1,Pattern Set 2,Pattern Set 3,Pattern Set 4, Pattern Set 5]{}, x tick label style=[rotate=20,anchor=east]{}, legend pos=north west, legend columns=2, legend style=[at=[(0.5,-0.2)]{},anchor=north,font=]{}, legend cell align=left, height=5cm, width=8cm, grid=both, minor ytick=[0.225,0.25,...,0.475]{}, label style=[font=]{}, tick label style=[font=]{} \]
table \[x=a,y=b,col sep=comma\][plot\_data\_pfac.csv]{}; table \[x=a,y=c,col sep=comma\][plot\_data\_pfac.csv]{}; table \[x=a,y=d,col sep=comma\][plot\_data\_pfac.csv]{}; table \[x=a,y=e,col sep=comma\][plot\_data\_pfac.csv]{}; table \[x=a,y=f,col sep=comma\][plot\_data\_pfac.csv]{}; table \[x=a,y=g,col sep=comma\][plot\_data\_pfac.csv]{};
According to the result set in Fig. \[graph1\], it is clear that global memory to the GPGPU is the slowest memory as they mentioned in their official document. However, if the data structures are cache friendly then it is possible to gain considerable performance benefits. Within this test, array merge technique has been used to increase the spatial locality of the cache accesses. Then, shared memory is applied into the accesses of input text pattern array. It improves the temporal locality of the cache accesses. Then, slight performance improvement could be gained from the global memory input text array compared the shared memory input text array. This performance gain is common for both cases which have two arrays for the transition table or one merge array for the transition table.
As the next step, texture memory has been applied to the memory accesses of the transition table. Then, transition table memory accesses were via the texture memory of the GPGPU. This increases the spatial locality and temporal locality of the memory accesses of the transition table because texture memory loads all the adjacent memory locations to the texture cache. The texture cache has a 2D spatial locality. Using this texture memory, it could be achieved better performance gain than the previous shared memory technique. However, the final test uses both shared memory and texture memory. At last, merged arrays with shared memory and texture memory shows the best performance among all other techniques. Then, same tests like the above cases were done for the PFAC with shared memory because it shows the best performance among the tested methods. This modified PFAC accesses the input text via shared memory. In the previous basic PFAC, the input text is accessed via global memory only. The results of the PFAC with shared memory option are graphed in Fig. \[graph02\].
\[ x tick label style=[ /pgf/number format/1000 sep=]{}, ylabel=Time (s), enlargelimits=0.05, legend style=[at=[(0.5,-0.1)]{}, anchor=north,legend columns=-1]{}, ybar interval=0.7, xticklabels=[Pattern Set 1,Pattern Set 2,Pattern Set 3,Pattern Set 4, Pattern Set 5]{}, x tick label style=[rotate=20,anchor=east]{}, legend pos=north west, legend columns=2, legend style=[at=[(0.5,-0.2)]{},anchor=north,font=]{}, legend cell align=left, height=5cm, width=8cm, grid=both, minor ytick=[0.225,0.25,...,0.475]{}, label style=[font=]{}, tick label style=[font=]{} \]
table \[x=a,y=b,col sep=comma\][2\_plot\_2\_data.csv]{}; table \[x=a,y=c,col sep=comma\][2\_plot\_2\_data.csv]{}; table \[x=a,y=d,col sep=comma\][2\_plot\_2\_data.csv]{}; table \[x=a,y=e,col sep=comma\][2\_plot\_2\_data.csv]{}; table \[x=a,y=f,col sep=comma\][2\_plot\_2\_data.csv]{}; table \[x=a,y=g,col sep=comma\][2\_plot\_2\_data.csv]{};
The shared memory of the GPGPU has been used in this experiment as the technique of optimizing memory access. As the results in Fig. \[graph02\], the PFAC with two array transition table shows better performance when it has the large L1 cache (48KB) than other options. The reason behind this story is reducing the cache replacements over the time. However, disabled L1 cache shows better performance if the input pattern set size is very large. This effect is occurring when the pattern size is large because L1 cache has to be replaced cache lines frequently time by time more compared with small input patterns. The number of cache lines within the L1 and the L2 cache is the main reason for this performance gain. The PFAC with one array transition table and shared memory shows a pattern which is similar to the pattern of the previous experiment of the basic PFAC. Therefore, the reason behind this is the same as the above of giving different execution time for different cache options of basic PFAC with only global memory. The texture memory has been used in next experiment for analysing the effect of cache memory options of the GPGPU within the PFAC algorithm. The modified PFAC uses the shared memory for the input text while the texture memory is used for the transition table of storing the input pattern set. The result set is shown in the Fig. \[graph03\].
\[ x tick label style=[ /pgf/number format/1000 sep=]{}, ylabel=Time (s), enlargelimits=0.05, legend style=[at=[(0.5,-0.1)]{}, anchor=north,legend columns=-1]{}, ybar interval=0.7, xticklabels=[Pattern Set 1,Pattern Set 2,Pattern Set 3,Pattern Set 4, Pattern Set 5]{}, x tick label style=[rotate=20,anchor=east]{}, legend pos=north west, legend columns=2, legend style=[at=[(0.5,-0.2)]{},anchor=north,font=]{}, legend cell align=left, height=5cm, width=8cm, grid=both, minor ytick=[0.225,0.25,...,0.475]{}, label style=[font=]{}, tick label style=[font=]{} \]
table \[x=a,y=b,col sep=comma\][3\_plot\_3\_data.csv]{}; table \[x=a,y=c,col sep=comma\][3\_plot\_3\_data.csv]{}; table \[x=a,y=d,col sep=comma\][3\_plot\_3\_data.csv]{}; table \[x=a,y=e,col sep=comma\][3\_plot\_3\_data.csv]{}; table \[x=a,y=f,col sep=comma\][3\_plot\_3\_data.csv]{}; table \[x=a,y=g,col sep=comma\][3\_plot\_3\_data.csv]{};
According to Fig. \[graph03\]. It is clear that there are no any clear differences between the 16KB L1 cache and 48KB L1 cache while the texture memory is used. The reason behind this effect is, the texture cache is completely different hardware cache located in each streaming multiprocessor of the GPGPU. The texture cache is designed especially for managing the 2D spatial locality. Therefore, it is well suited for the transition table of the modified PFAC algorithm. However, disabled L1 cache shows poor performance in the two array transition table and the one array transition table compared with enabled L1 cache because it is disabled the L1 cache completely. As the result, only shared memory is available for the usage within L1 cache location. The process cannot use the L1 cache for its own caching purpose. This introduces some performance losses.
A test has been done for checking the performance gap between the original PFAC and our PFAC implementation. The worst case and best case of our PFAC implementation were selected for comparing with available PFAC implementation. The results of this test are graphed in Fig. \[graph04\].
\[ x tick label style=[ /pgf/number format/1000 sep=]{}, ylabel=Time (s), enlargelimits=0.05, legend style=[at=[(0.5,-0.1)]{}, anchor=north,legend columns=-1]{}, ybar interval=0.7, xticklabels=[Pattern Set 1,Pattern Set 2,Pattern Set 3,Pattern Set 4, Pattern Set 5]{}, x tick label style=[rotate=20,anchor=east]{}, legend pos=north west, legend columns=2, legend style=[at=[(0.5,-0.2)]{},anchor=north,font=]{}, legend cell align=left, height=5cm, width=8cm, grid=both, minor ytick=[0.225,0.25,...,0.9]{}, label style=[font=]{}, tick label style=[font=]{} \]
table \[x=a,y=b,col sep=comma\][orginal\_pfac\_vs\_our\_pfac.csv]{}; table \[x=a,y=c,col sep=comma\][orginal\_pfac\_vs\_our\_pfac.csv]{}; table \[x=a,y=d,col sep=comma\][orginal\_pfac\_vs\_our\_pfac.csv]{};
According to the result sets in Fig. \[graph04\], it is clear that our PFAC implementation has better performance than the available PFAC. The worst case of our PFAC implementation also is showing better performance than the available PFAC for large pattern sets. Reasons for this performance gap is different data structures which are more cache friendly and easy to handle compared with the data structures of the original PFAC because our PFAC implementation is application specific like DNA pattern matching. If we compare the available PFAC and the best case of our PFAC implementations then a large gap between performances can be seen. For the largest data set, it is around 3X. The main reason behind this story is cache-friendly memory arrangements for running application specific PFAC compared with the original PFAC.
In all the previous tests, the variable factor was input patterns. As the next step, the input size of input has been changed for various sizes. However, data sets were changed only for identifying the effects of changing input data sets rather than changing the input pattern sets. Within this tests, all the cache parameters have not been changed one by one because the effect of cache options of the GPGPU has been tested in the above tests which were done for various input patterns. Therefore, only the worst case, best case and original available PFAC have been selected as the test cases for changing input data. Then comparison between the available PFAC and our PFAC implementation was done with various input data files as mentioned in Table \[tbl:3\]. The results of the experiment are graphed in Fig. \[graph05\].
\[ x tick label style=[ /pgf/number format/1000 sep=]{}, ylabel=Time (s), enlargelimits=0.05, legend style=[at=[(0.5,-0.1)]{}, anchor=north,legend columns=-1]{}, ybar interval=0.7, xticklabels=[Data Set 1,Data Set 2,Data Set 3,Data Set 4, Data Set 5]{}, x tick label style=[rotate=20,anchor=east]{}, legend pos=north west, legend columns=2, legend style=[at=[(0.5,-0.2)]{},anchor=north,font=]{}, legend cell align=left, height=5cm, width=8cm, grid=both, minor ytick=[0.25,0.5,...,3]{}, label style=[font=]{}, tick label style=[font=]{} \]
table \[x=a,y=b,col sep=comma\][changing\_data\_pfac.csv]{}; table \[x=a,y=c,col sep=comma\][changing\_data\_pfac.csv]{}; table \[x=a,y=d,col sep=comma\][changing\_data\_pfac.csv]{};
Above tests were done for clarifying that our PFAC implementation has better performance while the input data are changed. According to the result sets in Fig. \[graph05\], our implementation has better performance for all the test input data in the worst case and the best case. The best case of our PFAC implementation has better performance for all the cases while it is 3X faster than the original PFAC for the largest data set which was used in our experiments.
Conclusion
==========
Our PFAC implementation with basic memory arrangement also shows better performance than the original PFAC. The original PFAC is better than our basic PFAC implementation when the input pattern size is small. The main reason behind this is, the original PFAC uses the texture memory of the GPGPU if the input pattern size is very small. They handle the texture memory automatically without enabling it all the time because they could not show better performance for large data with texture memory.
However, our PFAC implementation with all the possible cache optimization techniques shows the better performance than the original PFAC in all the time. Our best PFAC implementation uses the texture memory for handling the input data while shared memory for handling the input pattern. It is showing best performance among all the PFAC implementation because it has cache friendly data structures and access patterns.
|
Q:
How do I Pythonically print a list with formatting?
I have a list:
L = [1, 2, 3, 4, 5, 6]
and I want to print
1 B 2 J 3 C 4 A 5 J 6 X
from that list.
How do I do that?
Do I have to make another list and zip them up, or is there some way I can have the letters in my format specifier?
A:
A nice way to do this is have a dictionary of numbers to prefixes:
prefixes = {1: 'B', 2: 'J', 3: 'C', 4: 'A', 5: 'J', 6: 'X'}
Then you can do:
print ' 'join('%s %s' % (num, prefix) for num, prefix in prefixes.itervalues())
If you also have a list of letters:
nums = [1, 2, 3, 4, 5, 6]
ltrs = ['B', 'J', 'C', 'A', 'J', 'X']
print ' '.join('%s %s' % (num, ltr) for num, ltr in zip(nums, ltrs)
|
Form fields guidance
The publication/editing wizard follows a tab structure. When creating new datasets you will have to click on next at the bottom of the wizard to continue.
Naming the dataset
Your dataset’s name is most important to get right. Otherwise users will not be able to find it or not understand what it is in the search results, whether they are using Google or data.gov.uk’s own search.
Front-load the title with the information the user is most likely to search for.
The length should be 65 characters or less. This includes spaces. Most search engines shorten titles if they’re longer than this, meaning words or part of words will be cut off.
Don’t include:
the name of the publishing organization (since it is already shown in the search results under the name) so if Brent Council is publishing its car parks, rather than “Brent Council Car Parks” call it “Car Parks”.
the official title of the data (if it breaks the guidance here). If the official title is short, you could include it in the name with something more descriptive, or if it is longer, simply include the official title in the description field. eg “Boundary-Line” would be better as “Boundary-Line - electoral & administrative boundaries”.
a date. Usually data is updated with new data files, so instead put the date in the “Data file” tab’s “date” field (change it to “time series” if it doesn’t appear). eg “Spend transactions 2012” would be better as “Spending transactions”
acronyms - unless they’re commonly used, eg EU or LIDAR
You can’t edit the URL once the dataset has been published.
URL
When you create a dataset, a URL for your dataset will be created from the name that you enter.
If the generated URL is already used by another dataset then a warning will be displayed saying ‘This URL is not available’. You can change either the name of the dataset to generate a new URL or manually change the URL until a unused value is found. Including the name of your organisation in the title is an easy way to make it unique.
When you edit a dataset, the URL will not be editable. This is to provide continuity for people when they refer to the dataset. This is particularly important to users of the API.
Information icons
Many fields have an ‘information’ icon, which displays more guidance if you hover the mouse over it.
Timeseries vs Single File
You can publish data on data.gov.uk as either a ‘single file’ or ‘time series’ dataset.
Use a single file dataset if the data only needs to be published once.
Publish your dataset as a time series dataset if it needs to be updated, eg every month.
Data files
Choose whether you are creating a single file record (a record for a one-off file) or a time series.
If it is a time series you need to give it a date (5). You can specify just the year (YYYY) or just a month (MM/YYYY) or a full date (DD/MM/YYYY).
Give the file a succinct title (2). eg “Spreadsheet with all tables”. If it is split into regions say what this file is eg “North-East England”. There is no need to repeat the date if it is a time series, but if the date needs explaining then do so, eg “Financial Year 2012/13”.
Provide the URL (also known as ‘link’) for the file (3). Do not link to an HTML page, but to the file download directly.
You can then check if the address is correct by using the ‘Check’ button (4) or ‘Check all URLs’ after you have finished adding the links. However it can be unreliable - see the section on the Check button below.
You can add more files (some returns, even if they are single may contain more than one file) by clicking the plus sign (5).
Although it says “files” you should also add links to APIs here (eg SPARQL, WMS, etc). Usually that is the root URL of an API that might not return much by default, but it is still good to add it here. If you have a web page that helps you call SPARQL queries then a link to that would go in the Additional Resources section - see below.
Note about gov.uk files
For files on gov.uk (using ‘Whitehall’, appearing hear: https://www.gov.uk/government/publications), the data URL you supply should be to the download link, not the web page. i.e. where it says “Download as CSV”, right-click and click “Copy link address”, before right-clicking back on the field on the data.gov.uk form and clicking “Paste”.
NB that if you update the file in future on gov.uk, it gives you a new download URL. Therefore you need to update the URL on data.gov.uk too.
Time series
If you select time series then you can specify the “Update Frequency” and get the “Date” column to fill in for each file.
The benefit of choosing ‘time series’ is that the files will be displayed to the public ordered in date order, and previous years hidden by default. For more than a few files, this is a much better experience for users. In addition, the date is available to users in a machine-readable format.
‘Check’ button
The ‘check’ functionality allows the system to identify the format of the file and automatically add it to the record, avoiding chances of different spellings. The ‘check all URLs’ option allows you to check that the URLs entered are all active and working.
If you encounter problems when clicking the ‘check’ or ‘check all URLs’ buttons (no format appears in the format box or the check all URLs process takes too long ) don’t use them. Manually enter the format of your file (which SHOULD always be CSV or another open format, NOT XLS, HTML OR PDF). This issue arises because some older browsers may not work well with this feature, and the file type is determined simply by the URL extension or mimetype.
Description and themes
Along with the title, the first sentence of the description will be shown in search results. This sentence should be 140 characters or less. Search engines will automatically shorten any descriptions that are longer than this.
The description should explain:
what the data is about
why it was produced
if there are any known problems with the dataset, eg it’s incomplete
Your description must be written in plain English. Include any keywords that you didn’t use in the title to help users find your dataset.
Themes
Each dataset on data.gov.uk is allocated a theme.
To have your dataset allocated to a theme, click the ‘update themes’ button after you’ve added your description. Your dataset will be automatically associated with a ‘primary theme’ and, in some cases, a ‘secondary theme’ too.
The themes are decided by the most frequently used words in the title and description. For example, if your description features the words ‘payment’ or ‘supplier’, your dataset will be allocated the ‘Government spending’ theme.
If you think that the themes are inaccurate, please expand the description to mention the topic of the dataset better. If that still isn’t working then follow the instructions on the form to add tags or contact us.
Licence
Select the licence that the data is being released as. As the form states, this should be OGL for nearly all of central government and its agencies. Publishers should select OGL or other open licence in the list if at all possible. However if it is not possible then select “other” from the drop-down and type the licence details in the box which appears.
Publisher
Select the organization that publishes this data. The only available options on this list are the publishers that you are an Editor or Admin for.
Contact details
When you select the publisher in the drop down list, the contact details from our records associated with the publisher will be displayed. If these details are not suitable for this particular dataset, then you can edit them here and they are stored as an exception.
Note: this feature is currently not working correctly. The contact details associated with the publisher will not be displayed in the form. However they will be displayed by default when you view the dataset, unless you provide different ones in this form.
Additional resources
Here you can enter links to any other document or web page that provides more information on the dataset.
Please ignore the ‘Scraper name’ column and leave its contents blank.
Temporal coverage
Where available it is important to include the time period for the data. This may be a single date or a range of dates. If a single date is being entered please leave the second box blank.
The dates should be in the format DD/MM/YYYY, eg 21/03/2007. Optionally the date can include the time in the format HH:MM, eg 07:45 31/03/2006.
Geographic coverage
It is also useful to include geographic coverage for the dataset. Use the checkboxes to select one or more areas which are covered by the data.
Extras
Other odd pieces of information may be attached to a dataset, such as fields that used to be on the form but have since been deprecated. These are collected together in the ‘Extras’ tab. However editing this is reserved for sysadmins, so contact us if it is important to change this information on an existing record.
Form submission
Form errors
When you click “Save and Finish”, if there are problems with any field then it will list them at the top, and also with yellow warning triangles on the appropriate tabs, and when you click on the tab red sharded boxes say what the problem is next to the appropriate field eg
Occasionally new mandatory fields are added to the form. This can cause form errors to appear when you edit an existing dataset, even if you’ve not changed anything. In this case, fill in the new field to be able to save it successfully.
If, after clicking ‘Save and finish’, you are still in the editing screen then: YOUR CHANGES HAVE NOT BEEN SAVED!
Caching
The data.gov.uk site is cached for 1 hour for general users, but not if you are logged in. This means that if you add a dataset or make a change, you will see it has changed straight away, but it will take up to an hour before it becomes visible to another person visiting the site (ie someone who does not log in). Please be aware of this when notifying people or announcing releases. |
The overall goal of this research is to better understand the role of ocular lipofuscin in macular degeneration. In doing so we develop clinically relevant ways to inhibit lipofuscin formation (as possible interventions for macular degeneration) and develop animal models of lipofuscin-induced macular degeneration.
The specific aims of this application are: AIM 1) elucidate the relationship between lipofuscin and retinal health and the mechanism of lipofuscin formation: a) determine whether slowing lipofuscin biosynthesis can prevent ocular aging and vision loss in rodent models of macular degeneration;b) determine whether increasing the concentration of vitamin A dimers in the RPE leads to the formation of lipofuscin granules and drusen;and c) determine whether animals models of macular degeneration can be generated by rapidly increasing lipofuscin pigments;
and AIM 2) elucidate pharmacokinetics vitamin A and vitamin A dimers in the eye: a) determine the time it takes to swap vitamin A for D3-vitamin A in the outer segments;b) establish the RPE half life of vitamin A dimers;c) determine whether the rate of lipofuscin pigment biosynthesis increases with age or whether lipofuscin pigments themselves "accumulate" with age, and;d) compare visual cycle kinetics of vitamin A vs. D3-vitamin A. We will achieve these specific aims by slowing down or speeding up lipofuscin formation in animals, using novel methods developed in our lab, and correlating eye health to lipofuscin concentration. In evaluating eye health in response to changes in lipofuscin we employ standard methods such as, tissue histology, fundus autofluorescence, electroretinogram measurements, inflammatory status and quantification of vitamin A dimers. For the elucidation of the ocular pharmacokinetics of vitamin A and its dimers we track their fate and/or biosynthesis using deuterium or tritium labeled species. We intend to show that the biosynthesis of vitamin A dimers (also called or lipofuscin pigments or A2E and ATR-dimer) is an early and critical step in the formation of lipofuscin granules (or deposits) in the RPE cell layer of the eye;that lipofuscin granules lead to the formation of drusen (or drusen like material) and ultimately cell death and vision impairment. We intend to show that stopping the biosynthesis of vitamin A dimers is an effective clinical strategy to stopping the formation of lipofuscin and drusen, as a method to stop the progression of the most prevalent forms of macular degeneration. We intend to gather evidence to show that the administration of D3-vitamin A is a safe, practical, method to prevent the progression of several forms of macular degeneration. |
Friday, August 13, 2010
What next for the MAA?
by J J Cohen
So the story gets more interesting (and complicated, and depressing) as time goes on.
That the Executive Committee was not behind the recently disseminated CFP makes me wonder who composed and distributed it. Was this CFP an advertisement of the newly added conference topics, or an attempt to get people to submit papers for a potentially moribund conference? Are MAA members voting again, this time through electing not to participate in the Tempe event? How united was the Executive Committee in the decision that the conference be held in AZ after all, and were they the determining voices? Is the resignation of three faculty members from the program committee a sign that local arrangements are in trouble?
My last post about the MAA was optimistic about its eventual future. I am having a harder time holding on to that hopefulness at the moment.
2 comments:
At this point, I can't imagine ANYONE on any of the sides of this issue [épater les gauches; burn down the whole edifice; work together in a spirit of friendship; work together in a spirit of scholarship; and so on] can be satisfied with what's happening now. Things might settle back into the status quo ante, but perhaps not? Not to be too cutesy, but in this confusion and uncertainty, we might be seeing the rumblings of an actual future, an opening into who knows what.
You know, I do sympathize with the councillors and the Executive Committee in that this has got to be hard, and probably not what they signed up for. I am very concerned that there was an implication that some members (?) were threatening lawsuits if the meeting did not go ahead, and if that's the case, then I think there needs to be a re-writing of the bylaws, and maybe a working committee that goes beyond the council and EC -- perhaps bringing in past councillors and officers as well as more junior scholars.
I really do think there needs to be an MAA, and that it should not die because of this. But I'm not sure what it is that the MAA wants to be, or that its members want it to be. It may be a time for redefinition -- or definition? Another thought: the MAA is old. It used to be *the* medievalists' society in America. But so many other societies have grown up in the last 15-20 (or fewer) years, and my impression is that these societies, e.g., those that focus on the Early Middle Ages, were created by people who felt that the MAA meetings and Speculum did not really represent their scholarly interests. The MAA meeting is really the last on my list of meetings, because the Zoo, Leeds, SEMA, Big Berks, and Shifting Frontiers are all far more likely to have papers that interest me and are relevant to my work. And Haskins is far friendlier for the later stuff I like.
Basically, MAA isn't the 800-lb gorilla anymore, but I think it still sees itself that way. The reality is that people have broader options and less money for memberships and subscriptions. This may be the time for a re-think on how to make the organization more relevant to all of us, or perhaps to specialize to a couple of core groups. |
Psychosocial predictors of intentions to comply with bariatric surgery guidelines.
An increasing body of research suggests that many patients have difficulty adopting the eating guidelines after weight-loss surgery, thereby reducing the long-term success of the procedure. Given such difficulties, it is possible that the typical preoperative education regarding post-surgical eating behavior guidelines is ineffective in motivating some individuals to comply. Presently, no accurate predictors of intentions to comply with post-bariatric surgery guidelines have been identified. In the present pilot study, a psychosocial intervention based on protection motivation theory (PMT) was presented to patients undergoing bariatric surgery. PMT is a well-established preventive health model that has been utilized in a variety of health domains. Participants for this study were recruited before undergoing bariatric surgery, and were randomly assigned to one of two groups: PMT group vs. control. In addition to routine messages from the bariatric surgeon, participants in the PMT group received an intervention based in PMT that focused on the importance of adhering to post-surgical eating behavior guidelines and how best to adhere to these guidelines. Participants in the control group received standard of care information from the bariatric surgeon. Results indicated that the PMT intervention did not have a significant impact. However, follow-up analyses revealed that two aspects of PMT, perceived self-efficacy and perceived threat of not following the guidelines, predicted patients' intentions to comply with post-surgical guidelines. Findings are discussed in terms of the methodological compromises that resulted from the applied research setting as well as promising avenues for future investigation. |
'''Carving''' is the practice of searching an input for files or other kinds of objects based on content, rather than on metadata. File carving is a powerful tool for recovering files and fragments of files when directory entries are corrupt or missing, as may be the case with old files that have been deleted or when performing an analysis on damaged media. Memory carving is a useful tool for analyzing physical and virtual memory dumps when the memory structures are unknown or have been overwritten.
'''Carving''' is the practice of searching an input for files or other kinds of objects based on content, rather than on metadata. File carving is a powerful tool for recovering files and fragments of files when directory entries are corrupt or missing, as may be the case with old files that have been deleted or when performing an analysis on damaged media. Memory carving is a useful tool for analyzing physical and virtual memory dumps when the memory structures are unknown or have been overwritten.
−
based on the input's content. but it's possible (and sometimes practical) to carve individual files or [[physical memory]].
=File Carving=
=File Carving=
Revision as of 20:59, 29 December 2006
Carving is the practice of searching an input for files or other kinds of objects based on content, rather than on metadata. File carving is a powerful tool for recovering files and fragments of files when directory entries are corrupt or missing, as may be the case with old files that have been deleted or when performing an analysis on damaged media. Memory carving is a useful tool for analyzing physical and virtual memory dumps when the memory structures are unknown or have been overwritten.
File Carving
Most file carvers operate by looking for file headers and/or footers, and then "carving out" the blocks between these two boundaries. Semantic Carving performs carving based on an analysis of the contents of the proposed files.
File carving should be done on a disk image, rather than on the original disk.
Many carving programs have an option to only look at or near sector boundaries where headers are found. However, searching the entire input can find files that have been embedded into other files, such as JPEGs being embedded into MicrosoftWord documents. This may be considered an advantage or a disadvantage, depending on the circumstances.
Today most file carving programs will only recover files that are contiguous on the media.
DFRWS2006 featured a file carving challenge. As a condition of entering the challenge, all tools and techniques developed to solve the challenge had to be open sourced. |
ON SECOND THOUGHT
04.10.14
Brandeis Cancels Hirsi Ali Degree
Elisabetta Villa/Getty
Somali-born Ayaan Hirsi Ali, an award-winning author and outspoken critic of Islam, will no longer be given an honorary degree by Brandeis University. Ali, who survived civil war in Somalia, genital mutilation, beatings, and an arranged marriage, has written in the past that, “Once it’s defeated, it can mutate into something peaceful. It’s very difficult to even talk about peace now. They’re not interested in peace. I think that we are at war with Islam. And there’s no middle ground in wars.” The Massachusetts college says it was not aware of her past comments on Islam, but now that it is, it will withdraw the award it planned to give her at commencement. “We cannot overlook certain of her past statements that are inconsistent with Brandeis University’s core values," it said. |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<!-- NewPage -->
<html lang="zh">
<head>
<!-- Generated by javadoc (1.8.0_60) on Tue May 03 23:01:15 CST 2016 -->
<title>Mushroom</title>
<meta name="date" content="2016-05-03">
<link rel="stylesheet" type="text/css" href="../../../stylesheet.css" title="Style">
<script type="text/javascript" src="../../../script.js"></script>
</head>
<body>
<script type="text/javascript"><!--
try {
if (location.href.indexOf('is-external=true') == -1) {
parent.document.title="Mushroom";
}
}
catch(err) {
}
//-->
var methods = {"i0":10,"i1":10,"i2":10,"i3":10,"i4":10,"i5":10,"i6":10,"i7":10,"i8":10,"i9":10,"i10":10,"i11":10,"i12":10,"i13":10,"i14":10,"i15":10,"i16":10,"i17":10,"i18":10,"i19":10,"i20":10,"i21":10,"i22":10,"i23":10,"i24":10,"i25":10,"i26":10};
var tabs = {65535:["t0","All Methods"],2:["t2","Instance Methods"],8:["t4","Concrete Methods"]};
var altColor = "altColor";
var rowColor = "rowColor";
var tableTab = "tableTab";
var activeTableTab = "activeTableTab";
</script>
<noscript>
<div>您的浏览器已禁用 JavaScript。</div>
</noscript>
<!-- ========= START OF TOP NAVBAR ======= -->
<div class="topNav"><a name="navbar.top">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.top" title="跳过导航链接">跳过导航链接</a></div>
<a name="navbar.top.firstrow">
<!-- -->
</a>
<ul class="navList" title="导航">
<li><a href="../../../overview-summary.html">概览</a></li>
<li><a href="package-summary.html">程序包</a></li>
<li class="navBarCell1Rev">类</li>
<li><a href="class-use/Mushroom.html">使用</a></li>
<li><a href="package-tree.html">树</a></li>
<li><a href="../../../deprecated-list.html">已过时</a></li>
<li><a href="../../../index-files/index-1.html">索引</a></li>
<li><a href="../../../help-doc.html">帮助</a></li>
</ul>
</div>
<div class="subNav">
<ul class="navList">
<li><a href="../../../com/luck/model/Monster.html" title="com.luck.model中的类"><span class="typeNameLink">上一个类</span></a></li>
<li><a href="../../../com/luck/model/Pipe.html" title="com.luck.model中的类"><span class="typeNameLink">下一个类</span></a></li>
</ul>
<ul class="navList">
<li><a href="../../../index.html?com/luck/model/Mushroom.html" target="_top">框架</a></li>
<li><a href="Mushroom.html" target="_top">无框架</a></li>
</ul>
<ul class="navList" id="allclasses_navbar_top">
<li><a href="../../../allclasses-noframe.html">所有类</a></li>
</ul>
<div>
<script type="text/javascript"><!--
allClassesLink = document.getElementById("allclasses_navbar_top");
if(window==top) {
allClassesLink.style.display = "block";
}
else {
allClassesLink.style.display = "none";
}
//-->
</script>
</div>
<div>
<ul class="subNavList">
<li>概要: </li>
<li>嵌套 | </li>
<li><a href="#field.summary">字段</a> | </li>
<li><a href="#constructor.summary">构造器</a> | </li>
<li><a href="#method.summary">方法</a></li>
</ul>
<ul class="subNavList">
<li>详细资料: </li>
<li><a href="#field.detail">字段</a> | </li>
<li><a href="#constructor.detail">构造器</a> | </li>
<li><a href="#method.detail">方法</a></li>
</ul>
</div>
<a name="skip.navbar.top">
<!-- -->
</a></div>
<!-- ========= END OF TOP NAVBAR ========= -->
<!-- ======== START OF CLASS DATA ======== -->
<div class="header">
<div class="subTitle">com.luck.model</div>
<h2 title="类 Mushroom" class="title">类 Mushroom</h2>
</div>
<div class="contentContainer">
<ul class="inheritance">
<li><a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true" title="java.lang中的类或接口">java.lang.Object</a></li>
<li>
<ul class="inheritance">
<li>com.luck.model.Mushroom</li>
</ul>
</li>
</ul>
<div class="description">
<ul class="blockList">
<li class="blockList">
<dl>
<dt>所有已实现的接口:</dt>
<dd><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a>, <a href="../../../com/luck/interfaces/Moveable.html" title="com.luck.interfaces中的接口">Moveable</a></dd>
</dl>
<hr>
<br>
<pre>public class <span class="typeNameLabel">Mushroom</span>
extends <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true" title="java.lang中的类或接口">Object</a>
implements <a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a>, <a href="../../../com/luck/interfaces/Moveable.html" title="com.luck.interfaces中的接口">Moveable</a></pre>
</li>
</ul>
</div>
<div class="summary">
<ul class="blockList">
<li class="blockList">
<!-- =========== FIELD SUMMARY =========== -->
<ul class="blockList">
<li class="blockList"><a name="field.summary">
<!-- -->
</a>
<h3>字段概要</h3>
<table class="memberSummary" border="0" cellpadding="3" cellspacing="0" summary="字段概要表, 列表字段和解释">
<caption><span>字段</span><span class="tabEnd"> </span></caption>
<tr>
<th class="colFirst" scope="col">限定符和类型</th>
<th class="colLast" scope="col">字段和说明</th>
</tr>
<tr class="altColor">
<td class="colFirst"><code>static int</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#flagNumber">flagNumber</a></span></code> </td>
</tr>
<tr class="rowColor">
<td class="colFirst"><code>static int</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#sizeX">sizeX</a></span></code> </td>
</tr>
<tr class="altColor">
<td class="colFirst"><code>static int[]</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#sizeY">sizeY</a></span></code> </td>
</tr>
<tr class="rowColor">
<td class="colFirst"><code><a href="../../../com/luck/interfaces/Flint.html" title="com.luck.interfaces中的接口">Flint</a></code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#withFlint">withFlint</a></span></code> </td>
</tr>
</table>
</li>
</ul>
<!-- ======== CONSTRUCTOR SUMMARY ======== -->
<ul class="blockList">
<li class="blockList"><a name="constructor.summary">
<!-- -->
</a>
<h3>构造器概要</h3>
<table class="memberSummary" border="0" cellpadding="3" cellspacing="0" summary="构造器概要表, 列表构造器和解释">
<caption><span>构造器</span><span class="tabEnd"> </span></caption>
<tr>
<th class="colOne" scope="col">构造器和说明</th>
</tr>
<tr class="altColor">
<td class="colOne"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#Mushroom-int-int-">Mushroom</a></span>(int locaX,
int locaY)</code> </td>
</tr>
</table>
</li>
</ul>
<!-- ========== METHOD SUMMARY =========== -->
<ul class="blockList">
<li class="blockList"><a name="method.summary">
<!-- -->
</a>
<h3>方法概要</h3>
<table class="memberSummary" border="0" cellpadding="3" cellspacing="0" summary="方法概要表, 列表方法和解释">
<caption><span id="t0" class="activeTableTab"><span>All Methods</span><span class="tabEnd"> </span></span><span id="t2" class="tableTab"><span><a href="javascript:show(2);">Instance Methods</a></span><span class="tabEnd"> </span></span><span id="t4" class="tableTab"><span><a href="javascript:show(8);">Concrete Methods</a></span><span class="tabEnd"> </span></span></caption>
<tr>
<th class="colFirst" scope="col">限定符和类型</th>
<th class="colLast" scope="col">方法和说明</th>
</tr>
<tr id="i0" class="altColor">
<td class="colFirst"><code>boolean</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#canPaint--">canPaint</a></span>()</code> </td>
</tr>
<tr id="i1" class="rowColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#clearSpeed--">clearSpeed</a></span>()</code>
<div class="block">在下落到hole中之后把速度设成0</div>
</td>
</tr>
<tr id="i2" class="altColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#eaten-com.luck.model.Mario-">eaten</a></span>(<a href="../../../com/luck/model/Mario.html" title="com.luck.model中的类">Mario</a> mario)</code>
<div class="block">该可生长物被马里奥吃</div>
</td>
</tr>
<tr id="i3" class="rowColor">
<td class="colFirst"><code>boolean</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#getCrashType--">getCrashType</a></span>()</code> </td>
</tr>
<tr id="i4" class="altColor">
<td class="colFirst"><code>int</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#getDown--">getDown</a></span>()</code> </td>
</tr>
<tr id="i5" class="rowColor">
<td class="colFirst"><code>int</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#getFlag--">getFlag</a></span>()</code> </td>
</tr>
<tr id="i6" class="altColor">
<td class="colFirst"><code>int</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#getLocaX--">getLocaX</a></span>()</code> </td>
</tr>
<tr id="i7" class="rowColor">
<td class="colFirst"><code>int</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#getLocaY--">getLocaY</a></span>()</code> </td>
</tr>
<tr id="i8" class="altColor">
<td class="colFirst"><code><a href="http://docs.oracle.com/javase/8/docs/api/java/awt/Rectangle.html?is-external=true" title="java.awt中的类或接口">Rectangle</a></code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#getRec--">getRec</a></span>()</code> </td>
</tr>
<tr id="i9" class="rowColor">
<td class="colFirst"><code>int</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#getSizeX--">getSizeX</a></span>()</code> </td>
</tr>
<tr id="i10" class="altColor">
<td class="colFirst"><code>int</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#getSizeY_M--">getSizeY_M</a></span>()</code> </td>
</tr>
<tr id="i11" class="rowColor">
<td class="colFirst"><code>int</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#getSizeY--">getSizeY</a></span>()</code> </td>
</tr>
<tr id="i12" class="altColor">
<td class="colFirst"><code>int</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#getType--">getType</a></span>()</code> </td>
</tr>
<tr id="i13" class="rowColor">
<td class="colFirst"><code>boolean</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#isDownDie--">isDownDie</a></span>()</code> </td>
</tr>
<tr id="i14" class="altColor">
<td class="colFirst"><code>boolean</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#isNeedDraw--">isNeedDraw</a></span>()</code> </td>
</tr>
<tr id="i15" class="rowColor">
<td class="colFirst"><code>boolean</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#isUping--">isUping</a></span>()</code> </td>
</tr>
<tr id="i16" class="altColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#move--">move</a></span>()</code>
<div class="block">可移动物进行移动</div>
</td>
</tr>
<tr id="i17" class="rowColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#moveL--">moveL</a></span>()</code> </td>
</tr>
<tr id="i18" class="altColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#moveR--">moveR</a></span>()</code> </td>
</tr>
<tr id="i19" class="rowColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#paint-java.awt.Graphics-">paint</a></span>(<a href="http://docs.oracle.com/javase/8/docs/api/java/awt/Graphics.html?is-external=true" title="java.awt中的类或接口">Graphics</a> g)</code> </td>
</tr>
<tr id="i20" class="altColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#setControl-com.luck.main.Control-">setControl</a></span>(<a href="../../../com/luck/main/Control.html" title="com.luck.main中的类">Control</a> control)</code> </td>
</tr>
<tr id="i21" class="rowColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#setDownDie-boolean-">setDownDie</a></span>(boolean downDie)</code> </td>
</tr>
<tr id="i22" class="altColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#setLocaX-int-">setLocaX</a></span>(int locaX)</code> </td>
</tr>
<tr id="i23" class="rowColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#setLocaY-int-">setLocaY</a></span>(int locaY)</code> </td>
</tr>
<tr id="i24" class="altColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#setNeedDraw--">setNeedDraw</a></span>()</code>
<div class="block">设置需要被画出来</div>
</td>
</tr>
<tr id="i25" class="rowColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#setUping-boolean-">setUping</a></span>(boolean uping)</code> </td>
</tr>
<tr id="i26" class="altColor">
<td class="colFirst"><code>void</code></td>
<td class="colLast"><code><span class="memberNameLink"><a href="../../../com/luck/model/Mushroom.html#setWithFlint-com.luck.interfaces.Flint-">setWithFlint</a></span>(<a href="../../../com/luck/interfaces/Flint.html" title="com.luck.interfaces中的接口">Flint</a> withFlint)</code> </td>
</tr>
</table>
<ul class="blockList">
<li class="blockList"><a name="methods.inherited.from.class.java.lang.Object">
<!-- -->
</a>
<h3>从类继承的方法 java.lang.<a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true" title="java.lang中的类或接口">Object</a></h3>
<code><a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#equals-java.lang.Object-" title="java.lang中的类或接口">equals</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#getClass--" title="java.lang中的类或接口">getClass</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#hashCode--" title="java.lang中的类或接口">hashCode</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#notify--" title="java.lang中的类或接口">notify</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#notifyAll--" title="java.lang中的类或接口">notifyAll</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#toString--" title="java.lang中的类或接口">toString</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#wait--" title="java.lang中的类或接口">wait</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#wait-long-" title="java.lang中的类或接口">wait</a>, <a href="http://docs.oracle.com/javase/8/docs/api/java/lang/Object.html?is-external=true#wait-long-int-" title="java.lang中的类或接口">wait</a></code></li>
</ul>
</li>
</ul>
</li>
</ul>
</div>
<div class="details">
<ul class="blockList">
<li class="blockList">
<!-- ============ FIELD DETAIL =========== -->
<ul class="blockList">
<li class="blockList"><a name="field.detail">
<!-- -->
</a>
<h3>字段详细资料</h3>
<a name="flagNumber">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>flagNumber</h4>
<pre>public static final int flagNumber</pre>
<dl>
<dt><span class="seeLabel">另请参阅:</span></dt>
<dd><a href="../../../constant-values.html#com.luck.model.Mushroom.flagNumber">常量字段值</a></dd>
</dl>
</li>
</ul>
<a name="sizeX">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>sizeX</h4>
<pre>public static final int sizeX</pre>
<dl>
<dt><span class="seeLabel">另请参阅:</span></dt>
<dd><a href="../../../constant-values.html#com.luck.model.Mushroom.sizeX">常量字段值</a></dd>
</dl>
</li>
</ul>
<a name="withFlint">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>withFlint</h4>
<pre>public <a href="../../../com/luck/interfaces/Flint.html" title="com.luck.interfaces中的接口">Flint</a> withFlint</pre>
</li>
</ul>
<a name="sizeY">
<!-- -->
</a>
<ul class="blockListLast">
<li class="blockList">
<h4>sizeY</h4>
<pre>public static final int[] sizeY</pre>
</li>
</ul>
</li>
</ul>
<!-- ========= CONSTRUCTOR DETAIL ======== -->
<ul class="blockList">
<li class="blockList"><a name="constructor.detail">
<!-- -->
</a>
<h3>构造器详细资料</h3>
<a name="Mushroom-int-int-">
<!-- -->
</a>
<ul class="blockListLast">
<li class="blockList">
<h4>Mushroom</h4>
<pre>public Mushroom(int locaX,
int locaY)</pre>
</li>
</ul>
</li>
</ul>
<!-- ============ METHOD DETAIL ========== -->
<ul class="blockList">
<li class="blockList"><a name="method.detail">
<!-- -->
</a>
<h3>方法详细资料</h3>
<a name="isDownDie--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>isDownDie</h4>
<pre>public boolean isDownDie()</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Moveable.html#isDownDie--">isDownDie</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Moveable.html" title="com.luck.interfaces中的接口">Moveable</a></code></dd>
<dt><span class="returnLabel">返回:</span></dt>
<dd>返回该可移动物是否已死</dd>
</dl>
</li>
</ul>
<a name="setDownDie-boolean-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>setDownDie</h4>
<pre>public void setDownDie(boolean downDie)</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Moveable.html#setDownDie-boolean-">setDownDie</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Moveable.html" title="com.luck.interfaces中的接口">Moveable</a></code></dd>
<dt><span class="paramLabel">参数:</span></dt>
<dd><code>downDie</code> - 设置该可移动物死亡</dd>
</dl>
</li>
</ul>
<a name="setControl-com.luck.main.Control-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>setControl</h4>
<pre>public void setControl(<a href="../../../com/luck/main/Control.html" title="com.luck.main中的类">Control</a> control)</pre>
</li>
</ul>
<a name="setWithFlint-com.luck.interfaces.Flint-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>setWithFlint</h4>
<pre>public void setWithFlint(<a href="../../../com/luck/interfaces/Flint.html" title="com.luck.interfaces中的接口">Flint</a> withFlint)</pre>
</li>
</ul>
<a name="getLocaY--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>getLocaY</h4>
<pre>public int getLocaY()</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#getLocaY--">getLocaY</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
<dt><span class="returnLabel">返回:</span></dt>
<dd>获取纵坐标</dd>
</dl>
</li>
</ul>
<a name="getLocaX--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>getLocaX</h4>
<pre>public int getLocaX()</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#getLocaX--">getLocaX</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Moveable.html#getLocaX--">getLocaX</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Moveable.html" title="com.luck.interfaces中的接口">Moveable</a></code></dd>
<dt><span class="returnLabel">返回:</span></dt>
<dd>获取横坐标</dd>
</dl>
</li>
</ul>
<a name="setLocaX-int-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>setLocaX</h4>
<pre>public void setLocaX(int locaX)</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#setLocaX-int-">setLocaX</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Moveable.html#setLocaX-int-">setLocaX</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Moveable.html" title="com.luck.interfaces中的接口">Moveable</a></code></dd>
<dt><span class="paramLabel">参数:</span></dt>
<dd><code>locaX</code> - 设置横坐标</dd>
</dl>
</li>
</ul>
<a name="setLocaY-int-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>setLocaY</h4>
<pre>public void setLocaY(int locaY)</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#setLocaY-int-">setLocaY</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
</dl>
</li>
</ul>
<a name="setNeedDraw--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>setNeedDraw</h4>
<pre>public void setNeedDraw()</pre>
<div class="block"><span class="descfrmTypeLabel">从接口复制的说明: <code><a href="../../../com/luck/interfaces/Growable.html#setNeedDraw--">Growable</a></code></span></div>
<div class="block">设置需要被画出来</div>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#setNeedDraw--">setNeedDraw</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
</dl>
</li>
</ul>
<a name="getSizeX--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>getSizeX</h4>
<pre>public int getSizeX()</pre>
</li>
</ul>
<a name="getSizeY--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>getSizeY</h4>
<pre>public int getSizeY()</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#getSizeY--">getSizeY</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
</dl>
</li>
</ul>
<a name="getSizeY_M--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>getSizeY_M</h4>
<pre>public int getSizeY_M()</pre>
</li>
</ul>
<a name="getFlag--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>getFlag</h4>
<pre>public int getFlag()</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#getFlag--">getFlag</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
<dt><span class="returnLabel">返回:</span></dt>
<dd>获取外接矩形</dd>
</dl>
</li>
</ul>
<a name="isNeedDraw--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>isNeedDraw</h4>
<pre>public boolean isNeedDraw()</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#isNeedDraw--">isNeedDraw</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
<dt><span class="returnLabel">返回:</span></dt>
<dd>返回是否需要被画出来</dd>
</dl>
</li>
</ul>
<a name="isUping--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>isUping</h4>
<pre>public boolean isUping()</pre>
</li>
</ul>
<a name="setUping-boolean-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>setUping</h4>
<pre>public void setUping(boolean uping)</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#setUping-boolean-">setUping</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
<dt><span class="paramLabel">参数:</span></dt>
<dd><code>uping</code> - 是否正在被顶上去</dd>
</dl>
</li>
</ul>
<a name="eaten-com.luck.model.Mario-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>eaten</h4>
<pre>public void eaten(<a href="../../../com/luck/model/Mario.html" title="com.luck.model中的类">Mario</a> mario)</pre>
<div class="block"><span class="descfrmTypeLabel">从接口复制的说明: <code><a href="../../../com/luck/interfaces/Growable.html#eaten-com.luck.model.Mario-">Growable</a></code></span></div>
<div class="block">该可生长物被马里奥吃</div>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#eaten-com.luck.model.Mario-">eaten</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
<dt><span class="paramLabel">参数:</span></dt>
<dd><code>mario</code> - 可以去吃他的马里奥</dd>
</dl>
</li>
</ul>
<a name="moveL--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>moveL</h4>
<pre>public void moveL()</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#moveL--">moveL</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
</dl>
</li>
</ul>
<a name="moveR--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>moveR</h4>
<pre>public void moveR()</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#moveR--">moveR</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
</dl>
</li>
</ul>
<a name="getRec--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>getRec</h4>
<pre>public <a href="http://docs.oracle.com/javase/8/docs/api/java/awt/Rectangle.html?is-external=true" title="java.awt中的类或接口">Rectangle</a> getRec()</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#getRec--">getRec</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Moveable.html#getRec--">getRec</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Moveable.html" title="com.luck.interfaces中的接口">Moveable</a></code></dd>
<dt><span class="returnLabel">返回:</span></dt>
<dd>返回外接矩形</dd>
</dl>
</li>
</ul>
<a name="paint-java.awt.Graphics-">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>paint</h4>
<pre>public void paint(<a href="http://docs.oracle.com/javase/8/docs/api/java/awt/Graphics.html?is-external=true" title="java.awt中的类或接口">Graphics</a> g)</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#paint-java.awt.Graphics-">paint</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Moveable.html#paint-java.awt.Graphics-">paint</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Moveable.html" title="com.luck.interfaces中的接口">Moveable</a></code></dd>
</dl>
</li>
</ul>
<a name="getCrashType--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>getCrashType</h4>
<pre>public boolean getCrashType()</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Moveable.html#getCrashType--">getCrashType</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Moveable.html" title="com.luck.interfaces中的接口">Moveable</a></code></dd>
<dt><span class="returnLabel">返回:</span></dt>
<dd>返回该可移动物和flint的碰撞类型</dd>
</dl>
</li>
</ul>
<a name="getDown--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>getDown</h4>
<pre>public int getDown()</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Moveable.html#getDown--">getDown</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Moveable.html" title="com.luck.interfaces中的接口">Moveable</a></code></dd>
<dt><span class="returnLabel">返回:</span></dt>
<dd>返回上下的运动状态</dd>
</dl>
</li>
</ul>
<a name="move--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>move</h4>
<pre>public void move()</pre>
<div class="block"><span class="descfrmTypeLabel">从接口复制的说明: <code><a href="../../../com/luck/interfaces/Moveable.html#move--">Moveable</a></code></span></div>
<div class="block">可移动物进行移动</div>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Moveable.html#move--">move</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Moveable.html" title="com.luck.interfaces中的接口">Moveable</a></code></dd>
</dl>
</li>
</ul>
<a name="canPaint--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>canPaint</h4>
<pre>public boolean canPaint()</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#canPaint--">canPaint</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
</dl>
</li>
</ul>
<a name="getType--">
<!-- -->
</a>
<ul class="blockList">
<li class="blockList">
<h4>getType</h4>
<pre>public int getType()</pre>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Growable.html#getType--">getType</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Growable.html" title="com.luck.interfaces中的接口">Growable</a></code></dd>
</dl>
</li>
</ul>
<a name="clearSpeed--">
<!-- -->
</a>
<ul class="blockListLast">
<li class="blockList">
<h4>clearSpeed</h4>
<pre>public void clearSpeed()</pre>
<div class="block"><span class="descfrmTypeLabel">从接口复制的说明: <code><a href="../../../com/luck/interfaces/Moveable.html#clearSpeed--">Moveable</a></code></span></div>
<div class="block">在下落到hole中之后把速度设成0</div>
<dl>
<dt><span class="overrideSpecifyLabel">指定者:</span></dt>
<dd><code><a href="../../../com/luck/interfaces/Moveable.html#clearSpeed--">clearSpeed</a></code> 在接口中 <code><a href="../../../com/luck/interfaces/Moveable.html" title="com.luck.interfaces中的接口">Moveable</a></code></dd>
</dl>
</li>
</ul>
</li>
</ul>
</li>
</ul>
</div>
</div>
<!-- ========= END OF CLASS DATA ========= -->
<!-- ======= START OF BOTTOM NAVBAR ====== -->
<div class="bottomNav"><a name="navbar.bottom">
<!-- -->
</a>
<div class="skipNav"><a href="#skip.navbar.bottom" title="跳过导航链接">跳过导航链接</a></div>
<a name="navbar.bottom.firstrow">
<!-- -->
</a>
<ul class="navList" title="导航">
<li><a href="../../../overview-summary.html">概览</a></li>
<li><a href="package-summary.html">程序包</a></li>
<li class="navBarCell1Rev">类</li>
<li><a href="class-use/Mushroom.html">使用</a></li>
<li><a href="package-tree.html">树</a></li>
<li><a href="../../../deprecated-list.html">已过时</a></li>
<li><a href="../../../index-files/index-1.html">索引</a></li>
<li><a href="../../../help-doc.html">帮助</a></li>
</ul>
</div>
<div class="subNav">
<ul class="navList">
<li><a href="../../../com/luck/model/Monster.html" title="com.luck.model中的类"><span class="typeNameLink">上一个类</span></a></li>
<li><a href="../../../com/luck/model/Pipe.html" title="com.luck.model中的类"><span class="typeNameLink">下一个类</span></a></li>
</ul>
<ul class="navList">
<li><a href="../../../index.html?com/luck/model/Mushroom.html" target="_top">框架</a></li>
<li><a href="Mushroom.html" target="_top">无框架</a></li>
</ul>
<ul class="navList" id="allclasses_navbar_bottom">
<li><a href="../../../allclasses-noframe.html">所有类</a></li>
</ul>
<div>
<script type="text/javascript"><!--
allClassesLink = document.getElementById("allclasses_navbar_bottom");
if(window==top) {
allClassesLink.style.display = "block";
}
else {
allClassesLink.style.display = "none";
}
//-->
</script>
</div>
<div>
<ul class="subNavList">
<li>概要: </li>
<li>嵌套 | </li>
<li><a href="#field.summary">字段</a> | </li>
<li><a href="#constructor.summary">构造器</a> | </li>
<li><a href="#method.summary">方法</a></li>
</ul>
<ul class="subNavList">
<li>详细资料: </li>
<li><a href="#field.detail">字段</a> | </li>
<li><a href="#constructor.detail">构造器</a> | </li>
<li><a href="#method.detail">方法</a></li>
</ul>
</div>
<a name="skip.navbar.bottom">
<!-- -->
</a></div>
<!-- ======== END OF BOTTOM NAVBAR ======= -->
</body>
</html>
|
Frictional Games, the Swedish indie studio behind the Amnesia games is close to finishing their brand new horror game. As the studio has reached the final stage of development, they’re now looking for a 3D Environment Artist.
Posting on their official blog, Frictional Games wrote, “After 3 years of hard work, we are now close to finishing one of our new games. We want it to look amazing, and to accomplish that we need more (hu)manpower.”
The job of the 3D artist will be to focus on environments and props for Frictional’s upcoming horror title. The job listing says, “Our ideal person loves horror, and is able to convey atmospheric environments and terrifying scenes through 3D art.”
The job is project-based and will last for about a year, until “the new game is ready to be shipped.”
For more details on what the ideal 3D environment artist will work on, and what Frictional Games is actually looking for, click here.
We’ll keep you updated with any additional information about this new horror title. Make sure you subscribe to our push-notifications and never miss an update on Frictional Games. Until next time, Happy Gaming! |
Q:
A group homomorphism $\phi: G \rightarrow H$ induces isomorphisms w.r.t intersection and join between $\mathcal G$ and $\mathcal H$
I'm filling the gaps in the proof of Theorem 22 in textbook Algebra by Saunders MacLane and Garrett Birkhoff. Could you please verify if my second part. i.e. $\phi [S_{1} \lor S_{2}] = \phi [S_{1}] \lor \phi [S_{2}]$ is fine or contains logical mistakes?
Let $\phi: G \rightarrow H$ be a group homomorphism, $\mathcal G = \{S \le G \mid \operatorname{Ker} \phi \subseteq S \subseteq G\}$, and $\mathcal H := \{T \le H \mid \{1\} \subseteq T \subseteq \operatorname{Im} \phi\}$. For $S \le G$ and $T \le H$, the induced maps $\phi[\cdot]$ and $\phi^{-1}[\cdot]$ are defined by $\phi[S] := \{\phi(x) \mid x \in S\}$ and $\phi^{-1}[T] := \{x \in G \mid \phi(x) \in T\}$. Then $\phi[\cdot]$ and $\phi^{-1}[\cdot]$ are isomorphisms w.r.t intersection and join between $\mathcal G$ and $\mathcal H$.
First, we need a lemma to make the proof cleaner.
Lemma: If $S \in \mathcal G$, then $\phi^{-1}[\phi[S]] = S$.
Proof: Let $(x,y) \in S \times G$ such that $\phi(x) = \phi(y)$. Then $\phi (x y^{-1}) = \phi(x) \phi(y)^{-1} =1$ and thus $xy^{-1} \in \operatorname{Ker} \phi \subseteq S$. Hence $x y^{-1} \in S$ and thus $y \in S$. The result then follows.
$\phi [S_{1} \cap S_{2}] = \phi [S_{1}] \cap \phi [S_{2}]$
Clearly, $\phi [S_{1} \cap S_{2}] \subseteq \phi [S_{1}] \cap \phi [S_{2}]$. We have $\phi [S_{1}] \cap \phi [S_{2}] \subseteq \phi [S_{1}]$ and thus $\phi^{-1}[\phi [S_{1}] \cap \phi [S_{2}]] \subseteq \phi^{-1}[\phi [S_{1}]] \overset{(\star)}{=}S_1$. Similarly, $\phi^{-1}[\phi [S_{1}] \cap \phi [S_{2}]] \subseteq S_2$. Hence $\phi^{-1}[\phi [S_{1}] \cap \phi [S_{2}]] \subseteq S_1 \cap S_2$ and thus $\phi [S_{1}] \cap \phi [S_{2}] \subseteq \phi[S_1 \cap S_2]$.
$(\star)$: This is due to the lemma.
$\phi [S_{1} \lor S_{2}] = \phi [S_{1}] \lor \phi [S_{2}]$
Notice that $S_1 \lor S_2 = \{s_1\cdots s_n \mid n \in \mathbb N^\times \text{ and } s_i \in S_1 \cup S_2\}$. Then $\phi [S_{1} \lor S_{2}] = \{ \phi(s_1)\cdots \phi(s_n) \mid n \in \mathbb N^\times \text{ and } s_i \in S_1 \cup S_2\}$. It follows from the lemma that $s_i \in S_1 \cup S_2 \iff \phi(s_i) \in \phi[S_1 \cup S_2]$. Hence $\phi [S_{1} \lor S_{2}] = \{h_1\cdots h_n\mid n \in \mathbb N^\times \text{ and } h_i \in \phi[S_1 \cup S_2]\}$. On the other hand, $\phi[S_1 \cup S_2] = \phi[S_1] \cup \phi[S_2]$ and consequently $\phi [S_{1} \lor S_{2}] = \{h_1\cdots h_n\mid n \in \mathbb N^\times \text{ and } h_i \in \phi[S_1] \cup \phi[S_2]\} = \phi [S_{1}] \lor \phi [S_{2}]$.
$\phi[\cdot]$ is bijective
Let $S_1,S_2 \in \mathcal G$ such that $\phi[S_1] = \phi[S_2]$. By our lemma, $S_1 = \phi^{-1}[\phi[S_1]] = \phi^{-1}[\phi[S_2]] = S_2$. Then $\phi$ is injective. It follows from $\phi [\phi^{-1}[T]] = T \in \mathcal H$ that $\phi$ is surjective.
Similarly, $\phi^{-1} [\cdot]$ is bijective.
A:
Proof of the lemma. The inclusion $S\subseteq \phi^{-1}[\phi[S]]$ is true for any map. Suppose $x\in\phi^{-1}[\phi[S]]$. Then $\phi(x)=\phi(y)$, for some $y\in S$. Therefore $xy^{-1}\in\ker\phi\subseteq S$. Hence $x=(xy^{-1})y\in S$.
Comment: you're hiding what you want to prove.
You're missing also the proof that the map $\mathcal{G}\to\mathcal{H}$ is well defined, but I guess it has already been proved that $\phi[S]$ is a subgroup of $H$, whenever $\phi\colon G\to H$ is a homomorphism and $S$ is a subgroup of $G$.
Proof that $\phi[S\cap T]=\phi[S]\cap\phi[T]$ (using different letters reduces clutter).
One inclusion is true for any map and any choice of subsets of the domain. Suppose $z\in\phi[S]\cap\phi[T]$. Then $z=\phi(x)=\phi(y)$, for some $x\in S$, $y\in T$. In particular $xy^{-1}\in\ker\phi$, so $xy^{-1}\in T$. Hence $x=xy^{-1}y\in T$, so $x\in S\cap T$ and $z=\phi(x)\in\phi[S\cap T]$.
Comment: you need not show that $y\in S\cap T$.
Proof that $\phi[S\vee T]=\phi[S]\vee\phi[T]$.
Since $S\subseteq S\vee T$, we have $\phi[S]\subseteq\phi[S\vee T]$ and similarly for $\phi[T]$. Therefore $\phi[S]\vee\phi[T]\subseteq\phi[S\vee T]$.
The reverse inclusion is easier if you show directly that a set of generators of $\phi[S\vee T]$ is $\phi[S]\cup\phi[T]$. Indeed, the latter set is a subset of the former; an element of $\phi[S\vee T]$ is an element of the form $\phi(a_1a_2\dotsm a_n)=\phi(a_1)\phi(a_2)\dotsm\phi(a_n)$, where $a_i\in S\cup T$ and the result follows.
Bijectivity. The lemma proves that $\phi^{-1}[\cdot]$ is the identity. Therefore $\phi[\cdot]$ is injective. But if $T\in\mathcal{H}$, we have $T=\phi[\phi^{-1}[T]]$, because this is true for any map and any subset of the range thereof. Now just notice that $\phi^{-1}[T]\in\mathcal{G}$.
Comment: you're missing the proof that $\phi[\cdot]$ is surjective.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.