text
stringlengths
8
5.77M
Almost 15,000 lose power; rig flips on San Mateo-Hayward Bridge Below: Next story in Weather SAN FRANCISCO — High winds in the San Francisco Bay Area Tuesday caused trees to fall, residents to lose power and a big rig to overturn on the San Mateo-Hayward Bridge. Nearly 15,000 Pacific Gas and Electric Co. customers in the Bay Area were without power Tuesday evening, according to PG&E spokesman J.D. Guidi. The company was hoping to restore power to all the customers by Tuesday night or early Wednesday morning, Guidi said. "The majority of these are wind-related outages," he said. Meanwhile, winds caused a big rig to flip over on the San Mateo-Hayward Bridge around 5:35 p.m. Tuesday, said California Highway Patrol spokeswoman Nicole Pacheco. No one was injured, but the truck blocked westbound lanes and brought rush hour traffic to a halt. About a half hour after the truck overturned, wind pushed a fishing boat that had lost power into the San Mateo-Hayward Bridge. The U.S. Coast Guard had already rescued two people aboard the 70-foot boat when it hit the span, said Petty Officer Erik Swanson. A third person on board climbed onto the bridge and was also rescued, Swanson said. He said investigators were at the scene late Tuesday to determine whether any oil had leaked from the boat. Authorities were also trying to determine whether the bridge suffered any damage, the Coast Guard said in a release.
News, views and top stories in your inbox. Don't miss our must-read newsletter Sign up Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email A British bookmaker is starting to think it made a yuge mistake in paying out on a Hillary Clinton win two weeks ago. Paddy Power paid customers who backed Hillary to win £800,000 on September 18. They were so confident Donald Trump’s free fall in the polls would result in a Clinton victory, they called the election a full 20 days before polling day. But over the past few days, the Donald’s odds have shortened from 5/1 to 5/2 - giving him a 28% chance of winning next Tuesday’s election. In the same period, Clinton’s odds lengthened from 2/9 to 1/3 - a 75% chance of winning, after the FBI announced it had re-opened the investigation into her private email server. (Image: Getty) They say 91% of all bets in the past 48 hours have been backing Trump to win. If the billionaire reality TV star and sometime steak salesman makes it to the Oval Office, they’ll be facing their biggest political payout in their 28 year history. They say some surprising things are less likely to happen than a Trump Presidency, including Germany winning the next World Cup, Taylor Swift winning the best album Grammy in 2017 and London having a white Christmas.
Q: Can you really redefine keywords in C language? Can you explain the code below? How we can use #define for a keyword of C? #include <stdio.h> #define int int* int main(void) { int *p; int q; p = 10; q = 5; printf("%d %d", p, q); // your code goes here return 0; } Output: 10 5 A: This #define int int* is a preprocessor macro. If you want to define your own synonyms for types then use typedef. You cannot create keywords in a language you did not create. Sample: #include <stdio.h> typedef int * myIntPtr; int main(void) { int i = 10; myIntPtr x = &i; printf("%d", *x); return 0; } Output: 10 Also semantically making an int to an int * makes no sense.
The illegal air strikes on Syria by the coalition of the guilty (US, France, UK) have happened, to no one’s great surprise. As such things go all current indications are that they were more token than anything else. The Russians are saying around 100 missiles were fired at an unclear number of targets, of which around 70% were intercepted. Syrian General Staff are reporting 3 injuries and no deaths. Mattis was at pains to say this was a one-off, though adding the reckless caveat that any further evidence of chemical weapons usage by Assad might change that (thus giving every lunatic or CIA/neocon-controlled cell in Syria a pure gold motive for a false fag). Compared to how bad this might have been, this is a fairly harmless result for the present. We’ve resisted the temptation to do any kind of analysis of things so far, preferring to let them play out and to document developments and opinions. But maybe this is a good time to offer a tentative overview of what seems to have been going on in the past weeks. 1)the Douma “gas attack” was likely faked The only evidence we have for any “gas attack” in Douma on April 7 is the video released on April 7-8, showing piles of corpses, mostly children, some with foam around their mouths. When, were or how the video was made is not verifiable. Who killed the children shown or how they died is not verifiable. Additionally we have images of an alleged “gas canister”, again without any sourcing or verification, and which have been widely suggested to be implausible. And there is Bellingcat (Eliot Higgins), contributing his usual brand of “comparisons” of images and Google maps, adding nothing that could be described even loosely as verification of the salient claims. In opposition to this the Russians are claiming the event was staged. They allege their armed forces entered Douma shortly after the alleged attack and claim to have found no evidence of chemical weapons usage, no witnesses and no victims. They have also released a video statements by two young men claiming to be doctors at the hospital. They describe people running into the hospital screaming that there had been a chemical attack, inciting panic among the people there, and “unqualified” people administering to children, giving them “asthma inhalers.” However, he says, there were no victims of such a chemical treated there, only victims of smoke inhalation from recent shelling and subsequent fires. There is also the notable reluctance by US Defense Secretary, James Mattis to fully endorse the reality of this narrative. Even on April 12, just hours before the air strikes were to be implemented, he was still publicly saying he had seen no evidence to show the gas attacks happened or who may have been responsible. Given his senior position on the Trump administration, and his previously gungho attitude to military adventurism, this is significant. Of greatest potential significance is the claim by the Russian foreign ministry that they have evidence the UK government was directly involved in staging the fake attack or encouraging a false flag. So far they haven’t released this data, so we can’t comment further at this time. This might also tie in with vague rumours of British SAS troops being captured in Douma that briefly surfaced a week or so ago. 2) primarily UK initiative? The neocon faction in the US is usually (and reasonably) regarded as the motivator behind much of the western aggression in the Middle East. Since at least 2001 and the launch of the “War on Terror” the US has led the way in finding or creating facile excuses to fight oil wars and hegemonic wars and proxy wars in the region. But this time the dynamics look a little different. This time it really looks as if the UK has been setting the pace of the “response”. The fact (as stated above) that Mattis was apparently telegraphing his own private doubts a)about the verifiability of the attacks, and b)about the dangers of a military response suggests he was a far from enthusiastic partaker in this adventure. Trump’s attitude is harder to gauge. His tweets veered wildly between unhinged threats and apparent efforts at conciliation. But he must have known he would lose (and seemingly has lost) a great part of his natural voter base (who elected him on a no-more-war mandate) by an act of open aggression that threatened confrontation with Russia on the flimsiest of pretexts. Granted the US has been looking for excuses to intervene ever more overtly in Syria since 2013, and in that sense this Douma “initiative” is a continuation of their longterm policy. It’s also true Russia was warning just such a false flag would be attempted in early March. But in the intervening month the situation on the ground has changed so radically that such an attempt no longer made any sense. A false flag in early March, while pockets of the US proxy army were still holding ground in Ghouta would have enabled a possible offensive in their support which would prevent Ghouta falling entirely into government hands and thereby also maintain the pressure on Damascus. A false flag in early April is all but useless because the US proxy army in the region was completely vanquished and nothing would be gained by an offensive in that place at that time. You can see why Mattis and others in the administration might be reluctant to take part in the false flag/punitive air strike narrative if they saw nothing currently to be gained to repay the risk. They may have preferred to wait for developments and plan for a more productive way of playing the R2P card in the future. The US media has been similarly, and uncharacteristically divided and apparently unsure. Tucker Carlson railed against the stupidity of attacking Syria. Commentators on MSNBC were also expressing intense scepticism of the US intent and fear about possible escalation. The UK govt and media on the other hand has been much more homogeneous in advocating for action. No doubts of the type expressed by Mattis have been heard from the lips of an UK government minister. Even May, a cowardly PM, has been (under how much pressure?) voicing sterling certitude in public that action HAD to be taken. Couple this with the – as yet unverified – claims by Russia of direct UK involvement in arranging the Douma “attack”, and the claims by Syria that the perps are in their custody, and a tentative storyline emerges. It’s possible this time there were other considerations in the mix beside the usual need to “be seen to do something” and Trump’s perpetual requirement to appease the liberal Russiagaters and lunatic warmongers at home. Maybe this time it was also about helping the UK out of a sticky problem. The Skripal consideration Probably the only thing we can all broadly agree on about the Skripal narrative is that it manifestly did not go according to plan. However it was intended to play out, it wasn’t this way. Since some time in mid to late March it’s been clear the entire thing has become little more than an exercise in damage-limitation, leak-plugging and general containment. The official story is a hot mess of proven falsehoods, contradictions, implausible conspiracy theories, more falsehoods and inexplicable silences were cricket chirps tell us all we need to know. The UK government has lied and evaded on every key aspect. 1) It lied again and again about the information Porton Down had given it 2) Its lawyers all but lied to Mr Justice Robinson about whether or not the Skripals had relatives in Russia in an unscrupulous attempt to maintain total control of them, or at least of the narrative. 3) It is not publishing the OPCW report on the chemical analyses, and the summary of that report reads like an exercise in allusion and weasel-wording. Even the name of the “toxic substance” found in the Skripals’ blood is omitted, and the only thing tying it to the UK government’s public claims of “novichok” is association by inference and proximity. Indeed if current claims by Russian FM Lavrov turn out to be true, a “novichok” (whatever that precisely means in this case) may not have been the only substance found in those samples, and a compound called “BZ”, a non-lethal agent developed in Europe and America, has been discovered and suppressed in the OPCW report (more about that later). None of the alleged victims of this alleged attack has been seen in public even in passing since the event. There is no film or photographs of DS Bailey leaving the hospital, no film or photographs of his wife or family members doing the same. No interviews with Bailey, no interviews with his wife, family, distant relatives, work colleagues. The Skripals themselves were announced to be alive and out of danger mere days after claims they were all but certain to die. Yulia, soon thereafter, apparently called her cousin Viktoria only to subsequently announce, indirectly through the helpful agency of the Metropolitan Police, that she didn’t want to talk to her cousin – or anyone else – at all. She is now allegedly discharged from hospital and has “specially trained officers…helping to take care of” her in an undisclosed location. A form or words so creepily sinister it’s hard to imagine how they were ever permitted the light of day. Very little of this bizarre, self-defeating, embarrassing, hysterical story makes any sense other than as a random narrative, snaking wildly in response to events the narrative-makers can’t completely control. Why? What went wrong? Why has the UK government got itself into this mess? And how much did the Douma “gas attack” and subsequent drive for a concerted western “response” have to do with trying to fix that? is this what happened? If a false flag chemical attack had taken place in Syria at the time Russia predicted, just a week or two after the Skripal poisoning, a lot of the attention that’s been paid to the Skripals over the last month would likely have been diverted. Many of the questions being asked by Russia and in the alt media may never have been asked as the focus of the world turned to a possible superpower stand-off in the Middle East. So, could it be the Skripal event was never intended to last so long in the public eye? Could it be that it was indeed a false flag, or a fake event, as many have alleged, planned as a sketchy prelude to, or warm up act for a bigger chemical attack in Syria, scheduled for a week or so later in mid-March – just around the time Russia was warning of such a possibility? Could it be this planned event was unexpectedly canceled by the leading players in the drama (the US) when the Russians called them out and the rapid and unexpected fall of Ghouta meant any such intervention became pointless at least for the moment? Did this cancelation leave the UK swinging in the wind, with a fantastical story that was never intended to withstand close scrutiny, and no second act for distraction? So, did they push on with the now virtually useless “chemical attack”, botch it (again), leaving a clear evidence trail leading back to them? Did they then further insist on an allied “response” to their botched false flag in order to provide yet more distraction and hopefully destroy some of that evidence? This would explain why the UK may have been pushing for the false flag to happen (as claimed by Russia) even after it could no longer serve much useful purpose on the ground, and why the Douma “attack” seems to have been so sketchily done by a gang on the run. The UK needed the second part to happen in order to distract from the first. It would explain why the US has been less than enthused by the idea of reprisals. Because while killing Syrians to further geo-strategic interests is not a problem, killing Syrians (and risking escalation with Russia) in order to rescue an embarrassed UK government is less appealing. And it would explain why the “reprisals” when they came were so half-hearted If this is true, Theresa May and her cabinet are currently way out on a limb even by cynical UK standards. Not only have they lied about the Skripal event, but in order to cover up that lie they have promoted a false flag in Syria, and “responded” to it by a flagrant breach of international and domestic law. Worst of all, if the Russians aren’t bluffing, they have some evidence to prove some of the most egregious parts of this. This is very bad. But even if some or all of our speculation proves false,and even if the Russian claims of UK collusion with terrorist in Syria prove unfounded, May is still guilty of multiple lies and has still waged war without parliamentary approval. This is a major issue. She and her government should resign. But it’s unlikely that will happen. So what next? There is a sense this is a watershed for many of the parties involved and for the citizens of the countries drawn into this. Will the usual suspects try to avoid paying for their crimes and misadventures by more rhetoric, more false flags, more “reprisals”? Or will this signal some other change in direction? We’ll all know soon enough.
Monday, March 30, 2009 hopeless There is always something especially nice about the first time a lady smiles at you. I contend that at that moment, if you observe her smile, her eyes, her body language, you can determine the nature and depth of your future relationship with her. "I'm sorry," she smiled, "that seat belongs to my boyfriend." Your gaze averts hers as she fumbles for a cigarette. You reach across with a match. The flame ignites, as do your dreams. Your eyes meet again briefly and something is unlocked as if by an old fashion hotel key. "There he is now." There are certain sacred moments in the oft jaded field of a budding romance. This wasn't one of them. But I'd play along. I'd let her think I still had my pride, my dignity, my ego. Afterall she was letting me think she still loved her boyfriend. 4:00 o'clock in the morning and I was still awake. At four in the morning whites and colors sometimes get mixed up in the wash. But lying awake at 4 in the morning wasn't entirely fruitless, oft times you see things you don't see everyday. There were a myriad of images, after-images, dreams, almost-dreams, visions and revisions that like rare virus' in a rain forest would never survive in the light. Imagination! Hell, the power of imagination is larger than the information highway. You know the Information Highway, where they spent billions and billions of dollars so millions of people can endlessly debate who was the better Star Wars captain. But back to the pointlessness of this journal entry. It's always hard to believe that someone you could love isn't the person you thought she was. Or was she? I thought, as I daydreamed a little. I saw a little girl in a peach colored dress. She looked not a day older than the day she last kissed me as I boarded a bus headed for an airport that would drop me off in a jungle somewhere. Geographically, culturally, philosophically undesirable, yet we were perfectly suited for each other in all the timeless, primative, clandestine ways that can be reckoned with in daydreams. At my age I had long ago admitted that whatever I thought it was that I was looking for, I was never going to find.
1. Field of the Invention The field of the present invention is prediction of meat palatability and yield. More specifically, the present invention relates to the prediction of meat palatability and yield by use of image analysis (IA) to determine the color parameters L* (psychometric lightness), a* (red vs. green), and b* (yellow vs. blue) or the tissue density of the lean and fat portions of a meat animal carcass or cut. 2. Description of Related Art Consumers of meat generally prefer, and are willing to pay for, greater meat tenderness. Marbling score of a carcass has been shown to generally correlate with subsequent cooked meat palatability across a wide range of marbling levels for beef, pork, and lamb. However, between carcasses with the same marbling level, there are substantial differences in palatability. Other factors of the carcass believed to predict palatability include maturity score, muscle pH, and muscle color; these factors may be more valuable in the prediction of palatability of chicken, turkey, and fish. Among those with expertise in carcass examination, e.g. meat scientists and U.S. Department of Agriculture (USDA) graders, some of these factors can be scored and palatability predicted by assigning a USDA Quality Grade, given sufficient examination time. In practice, for the example of beef, USDA graders working at packing plants commonly must assign Grades to 250 to 450 beef carcasses per hour, which does not provide enough time for a complete examination of all factors related to prediction of palatability. The shortage of time also makes difficult the required accurate computation of Quality Grades. In addition, USDA graders are required to compute Yield Grades, which are intended to estimate the cutability and composition of a carcass. Factors used to determine Yield Grades include hot carcass weight, ribeye area (cross-sectional area of the longissimus m. at the 12-13th rib interface), estimated kidney, pelvic, and heart fat percentage, and actual and adjusted subcutaneous fat thickness at the carcass exterior. The time constraints described above for the calculation of Quality Grades also apply to the calculation of Yield Grades. The parameters that underlie the assignment of Quality Grades and Yield Grades are published by the USDA Agricultural Marketing Service, Livestock and Seed Division, e.g., for beef, the United States Standards for Grades of Carcass Beef. A device for scoring factors predictive of palatability of a meat carcass or cut, in addition to an examination of the carcass or cut by a USDA grader would allow meat palatability to be more accurately predicted and USDA Quality Grades to be more accurately assigned. This would allow greater consumer confidence in the Quality Grading system, as well as any additional system for certification of conformance to product quality specifications, as would be desired in a "brand-name" program. In either event, more precise sortation of carcasses for determining meat prices would be allowed. This superior sortation would provide economic benefit to those at all segments of the meat production system: restaurateurs, foodservice operators, and retailers; packers; feed lot operators; and ranchers, farmers, and harvesters of pork, lamb, beef and dairy cattle, chicken, turkey, and various fish species. This superior sortation would also benefit scientists in the collection of carcass and cut data for research, and the previous owners of livestock in making genetic and other management decisions. Several attempts have been made to construct such devices for use in the beef industry. One such device uses a "duo-scan" or "dual-component" image analysis system. Two cameras are used; a first camera on the slaughter floor scans an entire carcass, and a second camera scans the ribeye after the carcass is chilled and ribbed for quartering. In the use of these systems, video data are recorded from a beef carcass and transferred to a computer. A program run by the computer determines the percentages of the carcass comprised of fat and lean from the recorded image and additional data available, e.g. hot carcass weight. The quantities of cuts at various levels of lean that can be derived from the carcass are then predicted. However, based on scientific evaluation, the system is not able to predict palatability of the observed carcass for augmenting the assignment of a USDA Quality Grade or other purpose related to sorting carcasses based on eating quality. One possible set of factors that can be examined to predict palatability is muscle and fat color. Wulf et al., J. Anim. Sci. (1997) 75, 684, reported results of both color scoring in the L*a*b* color space of raw longissimus thoracis muscle at 27 h postmortem, and Warner-Bratzler shear force determinations of aged, thawed, cooked longissimus lumborum muscle, from carcasses of cattle derived from crosses between various breeds of Bos taurus (European-based genetics) and Bos indicus (heat-tolerant, tropically-based genetics). Tenderness, as measured by shear force, correlated with all three color measurements, with the highest correlation seen with b* values. These results demonstrated that muscle color can be used to predict beef palatability. Among other factors that can be examined to predict palatability are lean tissue density, fat tissue density and connective tissue density. Park et al., J. Food. Sci. (1994) 59:697-701, reported results of A-mode (one-dimensional brightness) ultrasonic spectral feature analysis. Tenderness correlated with resonant frequency, juiciness and flavor correlated with the number of local maxima. These results demonstrated that ultrasonic spectral features and other methods known in the art for determining tissue density can be used to predict beef palatability. Therefore, it is desirable to have an apparatus for scoring factors predictive of the palatability of a meat animal carcass. It is desirable for such an apparatus to collect and process data and provide output within the time frame that a carcass is examined by a USDA grader under typical conditions in the packing house, commonly 5-15 sec. It is desirable for such an apparatus to return scores for at least one of, for example, color and color variability of lean tissue, color and color variability of fat tissue, extent of marbling, average number and variance of marbling flecks per unit area, average size of marbling and the variance of average marbling size, average texture, firmness of lean tissue, lean tissue density, fat tissue density and connective tissue density. It is desirable for the apparatus to use these measures to assign a grade or a score to carcasses in order that the carcasses can be sorted into groups that reflect accurate differences in cooked meat palatability. It is also desirable for the apparatus to use these measures to identify defect conditions in the meat such as, but not limited to, bruising, dark cutter or heat ring. It is also desirable to have an apparatus for measuring the cross-sectional surface area of an exposed, cut muscle (e.g. ribeye) for use in predicting the composition (fat, lean, bone) of a carcass or cut. It is desirable for the apparatus to use this measure to assign a grade or score to carcasses in order that the carcasses can be sorted into groups that reflect accurate differences in yield. It is desirable for this apparatus to also measure relative areas of cross-section surfaces comprised of fat and/or bone. In addition, it is desirable to have an apparatus for measuring, predicting, and sorting carcasses on the bases of any combinations of palatability, defect conditions, and yield. Further, it is desirable for such an apparatus to be portable, e.g. small and lightweight. It is desirable for the apparatus to be capable of withstanding packing plant environments, e.g. to be mounted in a protective housing.
width 43 height 43 col_rect 2 0 39 41 editor_tags level;plastic;block name Brick_Green type massive ground_type stone author Frostbringer_and_FluXy
While walking around Century Center in Chamblee Monday, I encountered an odd looking little bird I’d never seen before. Investigation on the Internet uncovered that it’s a male zebra finch, which is not native to North America, but the species has been introduced, possibly as pets or for research. I’m not sure how this one came to inhabit the area it’s in, but it seems fairly acclimated to humans, which isn’t necessarily a good thing. It’s probably also a good thing it didn’t show up while the heron was hanging around last month. These are some photos and videos of it I posted to my Instagram account, gmatt63.
The Document Foundation (TDF), which launched in 2010 to develop LibreOffice, has published statistics that illustrate the project's rapid growth. Approximately 400 total developers have contributed code to the project. The number of contributors who are active each month generally ranges from 50 to over 100. LibreOffice is a community-driven fork of the OpenOffice.org (OOo) office suite. The project started after Oracle's acquisition of Sun with the aim of offering a better governance model and a more inclusive environment than OOo. LibreOffice quickly attracted the support of the major Linux distributors and a large number of independent developers. The statistics released today show that the LibreOffice community is healthy and diverse. Red Hat and SUSE each account for a large chunk of development, but the volunteers collectively have a higher volume of commits than any of the corporate contributors. The total number of monthly commits tends to range from 1500-3000. The statistics also show the extent of the LibreOffice project's bugfixing and code cleanup efforts, which have been extensive. LibreOffice is gaining lots of momentum among users, too. Last year, TDF estimated that the number of users who have tried the open source office suite is approximately 10 million. LibreOffice 3.5, a major update with lots of improvements, is expected to arrive next week.
Background ========== The use of ecological models to describe and understand physical activity and other health behaviors calls for new strategies for assessing and intervening upon the social and physical environments that affect those health behaviors \[[@B1]\]. While most attention has been paid to assessing activity options in the neighborhood environment \[[@B2]-[@B5]\], less attention has been focused on the home environment. The home environment, including areas both inside and outside (e.g., yard, garden) as well as items in the home that either facilitate or discourage activity, may have an important influence on physical activity patterning and warrants further study. Valid and reliable methods of assessing environmental supports for physical activity and competing sedentary media pursuits within the home environment are needed. Assessments of both the activity and sedentary environmental supports are warranted since physical activity and sedentary behavior are unique and independent behaviors \[[@B6],[@B7]\]. A person can be physically active but also engage in substantial amounts of sedentary activities like watching television or playing video games \[[@B7]\]. Particularly in children, there is good evidence that television time is related to the prevalence of childhood obesity \[[@B8],[@B9]\]. To date, most physical activity inventories have shown weak (r = 0.04 to 0.19) \[[@B10]\] or no association \[[@B11]\] between physical activity and children\'s perception of their access to sporting and fitness equipment at home. In a study of college students, the quantity of home exercise equipment based on dichotomous (yes/no) response checklists was only associated with strength training activity in bivariate analyses (r = 0.18) \[[@B12]\]. In another study of college students, a similar checklist was also associated with strength exercise, not total physical activity, using multivariate analyses (p = 0.005) \[[@B13]\]. These low associations may suggest that equipment is not related to activity or may reflect methodological issues. A more comprehensive assessment of the home environment may help to better explain physical activity and sedentary behaviors and the specific activities being performed. Other recent work by Hume et al. \[[@B14]\] has sought to develop a similar checklist-based tool to assess the home environment for physical activity among Australian children. Evaluation suggested that test-retest reliability of this instrument was high for most items (Kappa = 0.85 to 1.00). However, the validity of the tool was not examined, and thus this tool may suffer similar shortcomings as those checklists previously described. While the checklist-based instruments assess the breadth of items (the number of unique items), a more comprehensive assessment would also measure magnitude (how many of each item are present), a characteristic of the home environment which may provide an important influence on behavior. In addition, previous home environment assessment tools have focused on availability, not accessibility. Accessibility is related to ease of use and cueing of behavior. A toy or piece of sports equipment that is readily available and easy to access poses a smaller barrier to use than one that must be retrieved from some inconvenient space. Likewise, the presence of a television set in the bedroom or a basketball hoop in the yard may serve as a visual cue to make use of those pieces of equipment. Similarly, stimulus control (i.e. controlling stimuli that can encourage or discourage a behavior) is recognized as one of the important processes of change used in conjunction with the Transtheoretical Model of behavior change \[[@B15]\] and has been associated with change from contemplation to preparation stages \[[@B16]\]. An inventory that can help evaluate access may be an important contribution to measurement tools. The purpose of this study was to develop and test the reliability and validity of a self-report survey instrument to comprehensively reflect the availability and accessibility of physical activity and media equipment in the home environment. It is our hope that such an instrument may help us better understand how the environment impacts the health and health behaviors of families. Methods ======= This research was conducted as part of the Identifying Determinants of Eating and Activity (IDEA) study for the purpose of designing and assessing the reliability and validity of an instrument to assess the home environment with regard to equipment related to physical activity and screen time. IDEA is an etiological study to evaluate potential determinants of the development of overweight and obesity in youth; it is being conducted in the metropolitan area of Minneapolis and St. Paul. IDEA assesses potential obesogenic factors in youth\'s personal, family, home, school, and neighborhood environments using a longitudinal cohort design (Lytle, in review). Physical Activity and Media Inventory (PAMI): instrument development -------------------------------------------------------------------- The PAMI was designed to be a self-report inventory of both the availability and accessibility of equipment and other resources that may support family members\' participation in activity and sedentary behaviors. We were interested in creating an instrument that documented the physical environment, not individual behavior within the environment, therefore, we chose not to assess the frequency with which equipment inventoried was used. The development of the PAMI began by examining and adapting existing inventory instruments to address the specific needs of our research objectives and by creating a draft inventory. This measurement tool went through multiple drafts where face validity, clarity of the questions and format, and feasibility of administration was reviewed by study investigators and with other researchers who study family health. When a satisfactory draft was complete, we asked a convenience sample of ten families, recruited through local park and recreation centers, to complete and comment on the inventory. All participants were able to complete the PAMI and feedback suggested that the PAMI would be feasible as a self-report instrument. Based on their feedback, we further refined the instrument to improve instruction clarity and form layout; this version was used to assess the reliability and validity of the PAMI instrument. The PAMI version that was evaluated in this reliability/validity study included a list of 50 physical activity equipment items grouped by the following categories: sports equipment, fitness equipment, transportation equipment, foot wear, water sports, and outdoor/yard (see Additional File [1](#S1){ref-type="supplementary-material"}). There also were five media equipment items listed: television, video cassette recorder (VCR) and/or DVD, digital video recorder (DVR) and/or TiVo, video game system, computer (desktop or laptop). To obtain more information on media, six media-related questions were asked including: 1\. Type of television programming available (No TV, No cable, Basic Cable, Cable + Premium channels, Satellite/Dish), 2\. Number of channels received (No TV, \<15, 15--30, 31--45, 46--60, \>60), 3\. Number of videos and DVDs in the home (0, 1--25, 26--50, 51--75, 76--100, \>100), 4\. Number of video and computer games in the home (0, 1--10, 11--20, 21--30, 31--40, 41--50, \>50), 5\. Type of internet service (No internet service, Dial-up modem, DSL Modem, Cable Modem, Don\'t know), 6\. Size of the primary television in the home (diagonal screen size, in inches). Opposite the list of items there was a list of 16 rooms (e.g., living room, kitchen, etc\...) which also included Yard/Outdoor Space, Attic/Basement/Storage Area, Garage, and Automobile(s) where respondents indicated the location of the available activity or media equipment. There was space for three \"other\" rooms in case the home had a room not listed (e.g., sunroom) or more space was needed for a particular location (most common for the garage). To determine validity, one parent/guardian from each participating family completed the PAMI while a trained research assistant simultaneously completed an inventory in the family\'s home. To determine reliability, the same parent/guardian completed a second inventory one week after the first administration. The second inventory was done without the presence of a research assistant. All data were collected during May-June, 2006. Subjects -------- Families were recruited to participate in this study through posted flyers and staffed information booths at four Minneapolis Park and Recreation Department buildings. Eligibility criteria included that each family had at least one child between the ages of 10 and 18 and an adult (parent/guardian) willing to complete the inventory and permit a home visit for validation purposes. Written informed consent was obtained prior to all data collection activities. The University of Minnesota Institutional Review Board approved this study. Procedures ---------- At the first visit, one adult household member and a research staff member did a walk through of the house, independently completing the PAMI instrument. The respondents were asked to walk through each room and indicate which physical activity and media equipment items were present (using code numbers from the list) and to rate the accessibility of each item. Access response options were: put away and difficult to get to; put away and easy to get to; in plain view and difficult to get to; in plain view and easy to get to. The research assistant independently completed the criterion PAMI at the same time with as little communication with the participating family member as possible. If a participant began speaking, the research assistant would ask them not to speak. Due to the potentially intrusive nature of such an inventory, the research assistant only inventoried those items that were in plain view, without moving or looking under furniture or opening closets, unless the participant did so first. At the end of the first visit, the research assistant left a blank PAMI instrument with the participant. The participant was asked to independently complete their second PAMI approximately one week later using the same approach as the first administration. A self-addressed stamped envelope was provided for mailing the completed form back to research staff. Reminder messages (telephone and email) were made to families one day prior to the day when the second inventory was to occur. Demographics were collected by self report during the first PAMI administration and included the age, race, and education level for each member of the household and one question asking about their homeowner status (i.e., apartment, condominium, multi-family house, or single-family house). Data reduction -------------- The PAMI data were reduced to the following primary variables, calculated separately for physical activity and media equipment: total number of items, the density of items in the home (total number of items divided by the total number of rooms/locations), the number of items located in bedrooms, the density of items in bedrooms, the number of televisions in the home, and the number of televisions in bedrooms. For comparability to a checklist type of instrument \[[@B12],[@B13]\], which record only the presence or absence or an item and not the quantity, the number of unique items reported was separately summed for physical activity equipment. For example, if more than one bicycle was reported on the PAMI, bicycle was only counted once to most closely represent a checklist type instrument. We also created and assessed two summary scores. First, we calculated separate summary scores that accounted for availability and accessibility of the physical activity equipment (Physical activity Availability and Accessibility Summary Score (PAASS)) and media equipment (Media Availability and Accessibility Summary Score (MAASS)). Each item was multiplied by the accessibility code with 1 = \"put away and difficult to get to\" and 4 = \"in plain view and easy to get to\". A higher score reflects a greater overall presence in the home (both availability and accessibility). To provide more detail, we examined specific categories of items, including; sports equipment, fitness equipment, transportation equipment, water sports equipment, and outdoor/yard equipment). Within each of these categories, we calculated the total number of items and mean accessibility ratings for all items within each category. To rank the overall quality of the home, an overall home environment score was also calculated as the ratio of the PAASS to the MAASS (referred to as the Activity:Media Ratio Score). A higher overall Activity:Media Ratio Score would reflect a home more conducive for being physically active and less sedentary. Statistical analysis -------------------- SAS version 9.1 (Cary, NC) was used for all data analyses. A p ≤ 0.05 significance level was used as a guide for identifying significant relationships. Test-retest reliability of the continuous variables from the PAMI (i.e., number and density of items, number and density of items in bedrooms, checklist quantity, summary scores, number of physical activity items within categories, and overall home environment score) was assessed by intraclass correlation coefficient (ICC, 95% confidence intervals). Test-retest of the accessibility ratings (overall for the home and by physical activity item categories) was assessed by Mantel-Hanzel chi square analyses. The reliability of the additional media-related questions was assessed by percent agreement (Kappa coefficients, 95% Confidence Intervals). Validity was evaluated by examining agreement between data from the participants and research assistants using Pearson correlation coefficients for continuous variables. Mean differences in continuous variables between the participant and the research assistant were identified with two-tailed independent t-tests. Comparison of the accessibility ratings between the participant and research assistant was calculated by Mantel-Hanzel chi square analyses. Results ======= A total of 31 families agreed to participate in the study and data from all families are included in these analyses. All participating families completed the PAMI at least once for validation purposes, and over 77% also completed the PAMI a week later to assess reliability. The PAMI took, on average, 40 minutes to complete but was dependent on the size of the home and the number of items present. Table [1](#T1){ref-type="table"} provides the demographic characteristics of the participating families for the validation (N = 31) and reliability (N = 24) samples. Dependent t-tests and chi square analyses revealed no demographic differences in the families included in the validity and reliability samples (p = 0.26--0.94). The majority of parents/guardians were female, Caucasian and had at least a college education. On average, there were approximately four people per home, most with two adults and two children living in single-family homes. ###### Subject characteristics for the validity and reliability samples **Validity Sample** **Reliability Sample** ------------------------------------------------- --------------------- ------------------------ **Age, mean ± SD** 38 ± 7.2 37 ± 6.6 **Race/Ethnicity, n (%)**  Caucasian 16 (52%) 12 (50%)  African American 6 (19%) 6 (25%)  Mexican-American, Puerto Rican, Latin American 2 (6%) 1 (4.2%)  Native American 2 (6%) 1 (4.2%)  Asian American 2 (6%) 1 (4.2%)  Other/Unknown 3 (10%) 3 (13%) **Highest Education, n (%)**  Did not graduate high school 2 (6%) 1 (4%)  High school/Trade school/Some college 7 (22%) 5 (21%)  \> College graduate 20 (65%) 14 (58%)  Not answered 2 (6%) 4 (17%) **Number of people in home, mean (SD)** 3.9 (0.9) 3.8 (1.1%) **Number of adults in home (≥ 18 yrs), n (%)**  1 Adult 10 (32%) 10 (42%)  2 Adults 20 (65%) 13 (54%)  3 or More Adults 1 (3%) 1 (4%) **Number of minors in home (\< 18 yrs), n (%)**  1 Child 5 (16%) 4 (17)  2 Children 17 (55%) 13 (54)  3 Children 6 (19%) 5 (21)  4 Children 3 (10%) 2 (8) **Type of home, n (%)**  Apartment 2 (6%) 2 (8%)  Multi-family house 5 (16%) 5 (21%)  Single-family house 23 (74%) 15 (63%)  Not answered 1 (3%) 2 (8%) Reliability ----------- Table [2](#T2){ref-type="table"} contains the results of the reliability analyses. Test-retest for the physical activity and media equipment variables was good to excellent (ICC = 0.71 to 0.96). Use of a checklist approach results in high reliability for the physical activity equipment (ICC = 0.93). The proportion of physical activity and media equipment items in each accessibility category was similar between the first and second administration (Mantel-Hanzel chi square tests, p = 0.50 and 0.30, respectively). The calculated PAASS and MAASS (number of items \* accessibility) revealed high reliability between the first and second administration of the PAMI (ICC= 0.87 for physical activity items and ICC = 0.93 for media equipment). ###### One-week test-retest reliability of PAMI variables; mean ± SD with Intraclass Correlation Coefficient (ICC) and 95% Confidence Interval (CI) or percent with Mantel-Hanzel Chi Square **Variable** **Time 1** **Time 2** **ICC (95% CI)** ----------------------------------- ---------------- ---------------- -------------------------- Total number of rooms 11.9 ± 3.10 12.5 ± 3.22 0.86 (0.70 -- 0.94) Physical Activity Equipment  \# of Items 65.7 ± 56.52 64.8 ± 58.06 0.94 (0.87 -- 0.98)  Household Density 5.1 ± 4.16 5.0 ± 4.53 0.84 (0.86 -- 0.97)  Ave \# of Items/Bedroom 3.3 ± 3.10 3.5 ± 3.30 0.76 (0.51 -- 0.89)  Checklist Quantity 16.4 ± 7.85 17.5 ± 7.63 0.93 (0.84 -- 0.97)  Accessibility   Away and difficult to get to 8.7 4.4 M-H χ^2^= 0.46, p = 0.50   Away and easy to get to 17.8 21.5   In view and difficult to get to 2.9 2.3   In view and easy to get to 70.3 71.9  PAASS 207.4 ± 166.74 216.8 ± 190.12 0.87 (0.74 -- 0.94) Media Equipment  \# of Items 8.4 ± 5.02 8.4 ± 4.93 0.96 (0.91 -- 0.98)  Household Density 0.73 ± 0.38 0.73 ± 0.43 0.89 (0.76 -- 0.95)  Ave \# of Items/Bedroom 2.4 ± 0.78 2.1 ± 0.68 0.72 (0.44 -- 0.87)  \# of Televisions 2.5 ± 1.20 2.7 ± 1.27 0.89 (0.76 -- 0.95)  \# of Televisions in Bedrooms 1.17 ± 0.94 1.27 ± 1.03 0.93 (0.82 -- 0.97)  Accessibility   Away and difficult to get to 1.4 2.6 M-H χ^2^= 1.05, p = 0.30   Away and easy to get to 10.3 12.7   In view and difficult to get to 0.7 1.3   In view and easy to get to 87.6 83.4  MAASS 32.0 ± 25.5 31.2 ± 18.84 0.93 (0.84 -- 0.97) PAASS, Physical activity Availability and Accessibility Summary Score MAASS, Media Availability and Accessibility Summary Score The test-retest reliability for the number of items within all physical activity equipment categories was high (ICC = 0.87 to 0.99) (Table [3](#T3){ref-type="table"}). Reliability of accessibility ratings was less consistent across the categories. However, low cell sizes (n ≤ 5) for most of these analyses indicate that these results should be interpreted with some caution. ###### Reliability statistics for physical activity equipment separated by categories; Mean (SD) for participant data at Time 1 and Time 2, Intraclass Correlation Coefficient (ICC) and 95% Confidence Intervals (95% CI) or Mantel-Hanzel Chi Square test **Time 1** **Time 2** **T1 vs T2** ----------------------------------- ------------ -------------- -------------- ------------- --------------------------- **Sports Equipment**  \# of Items 23 34.6 (36.50) 23 33.5 (38.6) 0.96 (0.90 -- 0.98)  Accessibility   Away and difficult to get to 14.2 8.6 M-H χ^2^= 64.2, p \< 0.01   Away and easy to get to 25.2 27.7   In view and difficult to get to 3.5 5.1   In view and easy to get to 57.1 58.6 **Fitness Equipment**  \# of items 21 7.0 (4.69) 21 7.3 (5.93) 0.95 (0.88 -- 0.98)  Accessibility   Away and difficult to get to 6.6 2.2 M-H χ^2^= 5.63, p = 0.02   Away and easy to get to 28.6 31.1   In view and difficult to get to 3.3 2.2   In view and easy to get to 61.5 64.4 **Transportation Equipment**  \# of items 23 7.3 (4.58) 22 7.8 (5.42) 0.88 (0.74 -- 0.94)  Accessibility   Away and difficult to get to 2.9 0.0 M-H χ^2^= 20.4, p \< 0.01   Away and easy to get to 25.7 28.2   In view and difficult to get to 4.3 2.8   In view and easy to get to 67.1 69.0 **Water Sports Equipment**  \# of items 15 5.5 (6.09) 15 5.8 (9.01) 0.99 (0.97 -- 1.00)  Accessibility   Away and difficult to get to 12.5 7.7 M-H χ^2^= 0.02, p = 0.87   Away and easy to get to 45.8 26.9   In view and difficult to get to 4.2 3.9   In view and easy to get to 37.5 61.6 **Outdoor/Yard Equipment**  \# of items 20 12.5 (9.90) 20 13.5 (9.46) 0.87 (0.70 -- 0.95)  Accessibility   Away and difficult to get to 13.7 6.1 M-H χ^2^= 8.3, p \< 0.01   Away and easy to get to 9.2 20.6   In view and difficult to get to 4.6 2.3   In view and easy to get to 72.5 71.0 The test-retest reliability for the additional media questions ranged from K = 0.42 (0.10 to 0.73) for the number of video and computer games to K = 1.00 for the type of television and for the type of internet service. The Kappa statistics for the number of videos/DVDs (K = 0.60, 0.36 to 0.84) and number of television channels (K = 0.87, 0.71 to 1.00) were both acceptable. The Kappa statistic for television size (K = 0.71, 0.35 to 1.00) is based on categorizing the responses into small (\<25\"), medium (25--39\"), and large (\> = 40\"). Validity -------- Table [4](#T4){ref-type="table"} contains the results of the validation analyses. Associations between the participant and research assistants were moderate to strong across all variables (r = 0.67 to 0.98) and there were no significant differences between the mean values recorded by participants and research assistants (t-test p-values 0.20 to 0.72). For the accessibility ratings, the participants, compared to the research assistants, recorded a greater percentage of physical activity items as \"put away and difficult to get to\" and a smaller percentage of items as \"in plain view and easy to get to\" (p \< 0.001). No differences were observed for the accessibility ratings of the media items (p = 0.23). The PAASS was significantly greater for the research assistants compared to the participants (p = 0.03). There was no mean difference in the MAASS (p = 0.30). ###### Validity of PAMI variables; Mean ± SD; (N = 31) mean ± SD with Pearson Correlation Coefficient and p-value for independent t-test or percent with Mantel-Hanzel Chi Square **Variable** **Participant Time 1** **Research Assistant** **Correlation (Pearson r)** **t-test p-value** ----------------------------------- ------------------------ ------------------------ ----------------------------- -------------------- Total number of rooms 12.4 ± 2.91 12.0 ± 2.42 0.72\* 0.34 Physical Activity Equipment  \# of items 65.2 ± 54.12 74.8 ± 64.77 0.98\* 0.53  Household Density 5.0 ± 3.95 6.2 ± 5.54 0.93\* 0.33  Ave \# of Items/Bedroom 2.1 ± 2.68 2.8 ± 4.04 0.67\* 0.25  Checklist Quantity 16.8 ± 7.46 17.2 ± 7.27 0.94\* 0.36  Accessibility   Away and difficult to get to 9.5 2.5 \-- M-H χ^2^= 16.5,   Away and easy to get to 20.1 22 \-- p \< 0.001   In view and difficult to get to 5.3 2 \--   In view and easy to get to 65 73.6 \--  PAASS 209.9+162.24 261.2+231.3 0.93\* 0.03 Media Equipment  \# of items 8.5 ± 4.49 8.8 ± 4.47 0.93\* 0.20  Household Density 0.71 ± 0.34 0.75 ± 0.34 0.79\* 0.33  Ave \# of Items/Bedroom 1.7 ± 1.20 1.7 ± 1.20 0.94\* 0.49  \# Televisions in Home 2.5+1.23 2.9+1.44 0.87\* 0.25  \# Televisions in Bedrooms 1.16+1.04 1.26+1.09 0.96\* 0.72  Accessibility   Away and difficult to get to 1.0 1.3 \-- M-H χ^2^= 1.4,   Away and easy to get to 9.3 6.5 \-- p = 0.23   In view and difficult to get to 2.5 0.0 \--   In view and easy to get to 87.3 92.2 \--  MAASS 31.9+25.53 34.0+17.27 0.88\* 0.30 PAASS, Physical activity Availability and Accessibility Summary Score MAASS, Media Availability and Accessibility Summary Score \* p \< = 0.05 Table [5](#T5){ref-type="table"} contains the results comparing the participant (at time 1) and the research assistant separated by the physical activity equipment categories. Across categories, associations were generally high (r = 0.80 to 0.98) except for the \"transportation equipment\" category (r = 0.68). Research assistants recorded more sports equipment (t-test p \< 0.01), compared to the participants. Comparisons of the accessibility ratings indicate that accessibility for fitness, transportation, and water sports equipment were rated similarly between participants and research assistants (p = 0.23 to 0.73). However, research assistants recorded a greater proportion of sports and outdoor/yard equipment items as \"in view and easy to get to\" and a smaller proportion of items as \"put away and difficult to get to\". ###### Validity statistics for physical activity equipment separated by categories; Mean (SD) for participant at Time 1 and Research Assistants with Pearson correlation coefficients, t-test p-value or Mantel-Hanzel Chi Square test **Time 1** **RA** **T1 vs RA** ----------------------------------- ------------ -------------- -------------- -------------- ---------------------------- --------- **Sports Equipment**  \# of Items 31 33.5 (34.20) 31 42.9 (45.53) 0.98 \< 0.01  Accessibility   Away and difficult to get to 10.4 2.4 M-H χ^2^= 64.2, p \< 0.01   Away and easy to get to 24.5 28.0   In view and difficult to get to 3.7 0.8   In view and easy to get to 61.4 68.8 **Fitness Equipment**  \# of items 28 6.4 (4.31) 28 6.4 (4.78) 0.82 0.99  Accessibility   Away and difficult to get to 5.9 4.8 M-H χ^2^= 0.11, p = 0.73   Away and easy to get to 25.5 26.7   In view and difficult to get to 3.9 0.0   In view and easy to get to 64.7 68.6 **Transportation Equipment**  \# of items 28 7.7 (5.44) 31 7.8 (4.71) 0.68 0.90  Accessibility   Away and difficult to get to 4.3 2.2 M-H χ^2^= 1.41, p = 0.23   Away and easy to get to 16.1 14.3   In view and difficult to get to 10.8 5.5   In view and easy to get to 68.8 78.0 **Water Sports Equipment**  \# of items 16 4.7 (5.75) 17 4.6 (5.58) 0.92 0.75  Accessibility   Away and difficult to get to 12.0 0.0 M-H χ^2^= 0.29, p = 0.59   Away and easy to get to 44.0 52.0   In view and difficult to get to 4.0 8.0   In view and easy to get to 40.0 40.0 **Outdoor/Yard Equipment**  \# of items 28 12.8 (10.48) 28 14.4 (9.45) 0.80 0.17  Accessibility   Away and difficult to get to 14.3 2.8 M-H χ^2^= 12.63, p \< 0.01   Away and easy to get to 11.2 10.7   In view and difficult to get to 6.2 3.4   In view and easy to get to 68.3 83.1 Reliability and validity were also assessed for the overall home environment Activity:Media Ratio Score (the ratio of the PAASS to MAASS). At Time 1 and 2 the Activity:Media Ratio Score was 8.3 ± 7.98 and 8.3 ± 7.28, respectively (ICC = 0.91 (0.81 to 0.96)). There was a strong association between the participant- and research assistant-derived home environment scores (r = 0.94, P \< 0.01) and no significant difference in scores (participant; 8.2 ± 7.40, research assistant; 9.5 ± 10.44, p = 0.09). Discussion ========== This study assessed the test-retest reliability and validity of a self-administered, physical activity and media equipment inventory instrument for the home environment. Reliability ICCs for all of the physical activity and media equipment variables were moderate to high. This was true for all of the continuous variables, including the checklist quantity and the physical activity and media summary scores. When broken down by categories of physical activity items, reliability of the number of items remained consistently high across categories. The accessibility ratings were similar between the two administrations of the PAMI for fitness, transportation, and water sports equipment. In contrast, the accessibility ratings for sports and outdoor/yard equipment were different with fewer items considered \"put away and difficult to get to\" at the second administration, compared to the first. The reason for this difference may be a real change in where items in the home were placed or in the participants\' perception about the accessibility of the items. Validity, as assessed by comparing the participant and research assistant data, was consistently high for all calculated variables for both physical activity and media equipment. The PAASS summary score was higher for the research assistants compared to the participants and likely reflects the research assistants recording more items as \"in plain view and easy to get to\" compared to the participants. When broken down by categories of physical activity equipment, validity coefficients for the number of items in each category were still generally high. The distribution of accessibility ratings for the media equipment were similar between participants and research assistants with most items being \"in plain view and easy to get to\". Research assistants, however, recorded a smaller percentage of physical activity items as \"put away and difficult to get to\" and a greater percentage of items as \"in plain view and easy to get to\" as compared with participants. The difference between participant and research assistant ratings of accessibility across all physical activity items seems to be driven by a difference in ratings for the sports and yard/outdoor equipment. There may have been a discrepancy between what participants and research assistants considered \"put away\". While the participant may consider items placed on the floor by the kitchen door as, \"put away\" (if it was where those items are typically kept), the research assistants would have coded such items as, \"in plain view\". The term \"put away\" did not necessitate that the items be in a box, cabinet, drawer, or other closed container. In addition, this discrepancy may have occurred due to the protocol followed by the research assistants which allowed them to only record items that they could see, without opening doors, closets and looking under furniture (e.g., beds), unless the participant first did so. Our intention with implementing this protocol was to protect participant privacy. Further modification and testing of accessibility options is warranted given these findings. This was a small pilot study with several limitations. The majority of respondents were Caucasian, college educated and lived in single family homes. Additional validation studies are warranted in larger and more representative samples to determine the PAMI\'s psychometric properties in minority and lower income populations and those who live in apartments or condominiums. Participants were recruited from local parks and recreation departments which may have biased our sample by including relatively active families with relatively large amounts of physical activity equipment. Several families, however, had very few physical activity items, evidenced by the large standard deviations for most of the physical activity equipment variables. While the list of physical activity items was fairly comprehensive, some items may be more relevant in certain geographical areas (i.e., snow skis in Minnesota). Therefore, the list of items may need to be modified based on the population being studied. Only screen based media items were included on the PAMI. A more comprehensive assessment of media sources in the home would need to include magazines, radios, portable music players, cell phones, and possibly other sources. During the validation visits, participants walked from room to room to complete the PAMI, as the instructions indicate. Whether this happened during the second administration of the PAMI, when the participants were by themselves, is not known. The PAMI is also not designed to assess how frequently or who in the home, is using the equipment. However, in an ecological model, characterizing the environment is an important end in and of itself as the environment is important in influencing behavioral choices. Lastly, data were collected in the spring and seasonality should be considered when interpreting the location and accessibility data since some items (e.g., snow skis) may be moved and made very accessible during the winter but stored away at other times of the year. At present, it is not known if the PAMI is useful in characterizing homes along dimensions related to important health outcomes such as obesogeneity, levels of physical activity or sedentary behaviors. We also do not yet know if the PAMI is a useful instrument for showing change overtime as might be useful in intervention research that attempts to improve the healthfulness of the home environment. Future research will be needed to examine both the discriminant and predictive validity of the PAMI. In spite of these limitations, the PAMI is a potentially important addition to the field. The PAMI provides a more objective assessment of the presence of physical activity and media equipment items as compared to other research examining children\'s perception of adequate equipment \[[@B10],[@B11]\]. The PAMI instrument also expands on previous dichotomous checklist instruments \[[@B12],[@B13]\] by measuring the breadth (the number of unique items), magnitude (how many of each type of item) and ratings of accessibility of the items. Lessons learned --------------- In the PAMI instrument tested here (see Additional File [1](#S1){ref-type="supplementary-material"}), several types of foot wear were included as a category in the list of physical activity equipment (e.g., running shoes, hiking shoes, walking shoes, etc\...). There was considerable disagreement and confusion on identifying these particular types of shoes and, for many younger children and some adults, one pair of athletic shoes may serve multiple roles (walking, running, hiking). Also, there were so many pairs of shoes per household (range 1 to 59) that the discriminative ability of the number/accessibility of shoes was quite dubious. Therefore, types of shoes were not included in the analyses for this paper. Briefly, the ICC for \"shoes\" was 0.82 (0.62 -- 0.92) with a low correlation between the participant and the research assistant (r = 0.22). The participants reported slightly fewer pairs of shoes (14.7 ± 11.77), on average, compared to the research assistants (18.3 ± 12.25) (p = 0.07). For the main IDEA study, shoes were not included in the physical activity item list. In addition, based upon feedback from participants and research assistants, the PAMI equipment code numbers (included on a separate page of the tool) were sometimes difficult for the participants to find and record. Therefore, for the main IDEA study, the PAMI has been expanded so that each room has its own page containing the list of items where the participant indicates how many of each item are present in that room and the associated accessibility. We believe the re-formatted version of the PAMI will be easier for participants to complete, although this newer version was not tested in this pilot study. Conclusion ========== The PAMI may be a useful tool for describing the physical home environment related to opportunities for physical activity, sedentary behaviors and possibly the obesogeneity of the home environment. The main IDEA study will assess the associations between PAMI variables, physical activity and sedentary behaviors, and weight status of both the adult and youth participating in the study. In addition, the longitudinal design of the IDEA study will allow us to look at physical activity and media equipment in the home environment as potential determinants of physical activity, sedentary behavior, and as factors related to the obesogeneity of home environments. In conclusion, the results from this study indicate that the variables calculated for this study (number of items, density, checklist quantity, accessibility, summary scores) provide reliable estimates for describing the home environment related to the presence of physical activity and screen media equipment. The validity of the accessibility ratings for the physical activity items was less consistent and requires further investigation. Authors\' contributions ======================= JS and LL conceived the study. All authors (JS, MN, MP, LL) contributed significantly to the development of the inventory instrument and the study design, manuscript development and revision. All authors read and approved the final manuscript. Supplementary Material ====================== ###### Additional file 1 The Physical Activity and Media Inventory (PAMI) instrument. The full PAMI instrument used for this study. ###### Click here for file Acknowledgements ================ This research was supported by the University of Minnesota TREC (Transdisciplinary Research in Energetics and Cancer) Center Career Development Program (NCI Grant 1 U54 CA116849-01).
/* =========================================================================== * * This file is part of HISE. * Copyright 2016 Christoph Hart * * HISE is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * HISE is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with HISE. If not, see <http://www.gnu.org/licenses/>. * * Commercial licenses for using HISE in an closed source project are * available on request. Please visit the project's website to get more * information about commercial licensing: * * http://www.hise.audio/ * * HISE is based on the JUCE library, * which must be separately licensed for closed source applications: * * http://www.juce.com * * =========================================================================== */ /****************************************************************************** BEGIN_JUCE_MODULE_DECLARATION ID: hi_modules vendor: Hart Instruments version: 2.0.0 name: HISE Processor Modules description: All processors for HISE website: http://hise.audio license: GPL / Commercial dependencies: juce_audio_basics, juce_audio_devices, juce_audio_formats, juce_audio_processors, juce_core, juce_cryptography, juce_data_structures, juce_events, juce_graphics, juce_gui_basics, juce_gui_extra, hi_core, hi_dsp, hi_components, hi_scripting, hi_sampler END_JUCE_MODULE_DECLARATION ******************************************************************************/ #ifndef HI_MODULES_INCLUDED #define HI_MODULES_INCLUDED #include "AppConfig.h" #include "../hi_scripting/hi_scripting.h" #include "synthesisers/synths/PolyBlep.h" #include "effects/fx/chunkware_simple_dynamics/chunkware_simple_dynamics.h" #include "synthesisers/synths/WavetableTools.h" #include "synthesisers/editors/WavetableComponents.h" /** @defgroup modulatorTypes HISE Modulators * @ingroup types * * A list of all available HISE modulators. */ #include "modulators/mods/ConstantModulator.h" #include "modulators/mods/ControlModulator.h" #include "modulators/mods/LFOModulator.h" #include "modulators/mods/AudioFileEnvelope.h" #include "modulators/mods/MacroControlModulator.h" #include "modulators/mods/PluginParameterModulator.h" #include "modulators/mods/RandomModulator.h" #include "modulators/mods/SimpleEnvelope.h" #include "modulators/mods/KeyModulator.h" #include "modulators/mods/AhdsrEnvelope.h" #include "modulators/mods/PitchWheelModulator.h" #include "modulators/mods/TableEnvelope.h" #include "modulators/mods/VelocityModulator.h" #include "modulators/mods/GlobalModulators.h" #include "modulators/mods/ArrayModulator.h" #include "modulators/mods/CCEnvelope.h" #include "modulators/mods/CCDucker.h" #include "modulators/mods/GainMatcher.h" #include "modulators/mods/MPEModulators.h" #include "modulators/mods/MPEComponents.h" #if USE_BACKEND #include "modulators/editors/AhdsrEnvelopeEditor.h" #include "modulators/editors/ConstantEditor.h" #include "modulators/editors/ControlEditor.h" #include "modulators/editors/CCDuckerEditor.h" #include "modulators/editors/CCEnvelopeEditor.h" #include "modulators/editors/LfoEditor.h" #include "modulators/editors/AudioFileEnvelopeEditor.h" #include "modulators/editors/KeyEditor.h" #include "modulators/editors/MacroControlModulatorEditor.h" #include "modulators/editors/PitchWheelEditor.h" #include "modulators/editors/PluginParameterEditor.h" #include "modulators/editors/RandomEditor.h" #include "modulators/editors/SimpleEnvelopeEditor.h" #include "modulators/editors/TableEnvelopeEditor.h" #include "modulators/editors/VelocityEditor.h" #include "modulators/editors/ArrayModulatorEditor.h" #include "modulators/editors/GlobalModulatorEditor.h" #include "modulators/editors/GainMatcherEditor.h" #include "modulators/editors/MPEModulatorEditors.h" #endif /** @defgroup midiTypes HISE MidiProcessors * @ingroup types * * A list of all available HISE MIDI processors. */ #include "midi_processor/mps/MidiDelay.h" #include "midi_processor/mps/Transposer.h" #include "midi_processor/mps/SampleRaster.h" #include "midi_processor/mps/RoundRobin.h" #if USE_BACKEND #include "midi_processor/editors/TransposerEditor.h" #include "midi_processor/editors/MidiPlayerEditor.h" #endif /** @defgroup effectTypes HISE Effects * @ingroup types * * A list of all available HISE Effects */ #include "effects/MdaEffectWrapper.h" #include "effects/fx/RouteFX.h" #include "effects/fx/FilterTypes.h" #include "effects/fx/FilterHelpers.h" #include "effects/fx/Filters.h" #include "effects/fx/HarmonicFilter.h" #include "effects/fx/CurveEq.h" #include "effects/fx/StereoFX.h" #include "effects/fx/SimpleReverb.h" #include "effects/fx/Delay.h" #include "effects/fx/GainEffect.h" #include "effects/fx/Chorus.h" #include "effects/fx/Phaser.h" #include "effects/fx/GainCollector.h" #include "effects/convolution/AtkConvolution.h" #include "effects/convolution/Convolution.h" #include "effects/mda/mdaLimiter.h" #include "effects/mda/mdaDegrade.h" #include "effects/fx/Dynamics.h" #include "effects/fx/Saturator.h" #include "effects/fx/AudioProcessorWrapper.h" #include "effects/fx/Analyser.h" #include "effects/fx/ShapeFX.h" #include "effects/fx/SlotFX.h" #if USE_BACKEND #include "effects/editors/FilterEditor.h" #include "effects/editors/HarmonicFilterEditor.h" #include "effects/editors/CurveEqEditor.h" #include "effects/editors/StereoEditor.h" #include "effects/editors/ReverbEditor.h" #include "effects/editors/DelayEditor.h" #include "effects/editors/GainEditor.h" #include "effects/editors/ChorusEditor.h" #include "effects/editors/PhaserEditor.h" #include "effects/editors/ConvolutionEditor.h" #include "effects/editors/MdaLimiterEditor.h" #include "effects/editors/MdaDegradeEditor.h" #include "effects/editors/GainCollectorEditor.h" #include "effects/editors/RouteFXEditor.h" #include "effects/editors/SaturationEditor.h" #include "effects/editors/DynamicsEditor.h" #include "effects/editors/ShapeFXEditor.h" #include "effects/editors/PolyShapeFXEditor.h" #include "effects/editors/SlotFXEditor.h" #include "effects/editors/AnalyserEditor.h" #endif #include "effects/editors/AudioProcessorEditorWrapper.h" #include "effects/fx/WrappedAudioProcessors/WrappedAudioProcessors.h" /** @defgroup synthTypes HISE Sound Generators * @ingroup types * * A list of all available HISE sound generators. */ #include "synthesisers/synths/GlobalModulatorContainer.h" #include "synthesisers/synths/SineSynth.h" #include "synthesisers/synths/NoiseSynth.h" #include "synthesisers/synths/WaveSynth.h" #include "synthesisers/synths/WavetableSynth.h" #include "synthesisers/synths/AudioLooper.h" #if USE_BACKEND #include "synthesisers/editors/SineSynthBody.h" #include "synthesisers/editors/WaveSynthBody.h" #include "synthesisers/editors/GroupBody.h" #include "synthesisers/editors/ModulatorSynthChainBody.h" #include "synthesisers/editors/WavetableBody.h" #include "synthesisers/editors/AudioLooperEditor.h" #endif #include "raw/raw_ids.h" #include "raw/raw_misc.h" #include "raw/raw_misc_impl.h" #include "raw/raw_builder.h" #include "raw/raw_builder_impl.h" #include "raw/raw_main_processor.h" #include "raw/raw_main_processor_impl.h" #include "raw/raw_main_editor.h" #include "raw/raw_positioner.h" #include "raw/raw_UserPreset.h" #include "raw/raw_PluginParameter.h" #endif // HI_MODULES_INCLUDED
/* * Copyright (c) 2001 - 2003 * NetGroup, Politecnico di Torino (Italy) * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the Politecnico di Torino nor the names of its * contributors may be used to endorse or promote products derived from * this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. * */ #ifndef __bucket_lookup #define __bucket_lookup #ifdef WIN32 #include "tme.h" #endif #ifdef __FreeBSD__ #ifdef _KERNEL #include <net/tme/tme.h> #else #include <tme/tme.h> #endif #endif #define BUCKET_LOOKUP_INSERT 0x00000011 uint32 bucket_lookup_insert(uint8 *key, TME_DATA *data, MEM_TYPE *mem_ex, struct time_conv *time_ref); #define BUCKET_LOOKUP 0x00000010 uint32 bucket_lookup(uint8 *key, TME_DATA *data, MEM_TYPE *mem_ex, struct time_conv *time_ref); #endif
Why Does My Fire Alarm Keep Beeping? Barb Nefer Fire alarms emit a loud sound when triggered by smoke to warn you that there is a fire in your home. These alarms also make intermittent beeps under certain circumstances. A beeping fire alarm does not mean your home is burning. The sound indicates that your smoke detector needs some attention. credit: Image Source/Photodisc/Getty Images Fire alarm Definition credit: Image Source/Photodisc/Getty Images Smoke detector Smoke detectors that sound an alarm when you have a fire come in two standard types. Ion models respond more quickly to flaming fires while photoelectric units are quickly triggered by smouldering fires according to the U.S. Fire Administration. You can buy both models in battery-operated versions that are powered by a 9-volt battery. Some smoke detectors are wired into home electrical systems and use batteries as a backup in case of power failure. Beeping credit: Jupiterimages/Polka Dot/Getty Images Smoke detector Both ion and photoelectric fire alarms beep when their battery power is low. The beep sounds at regular intervals, most commonly every 20 to 60 seconds. Never remove the battery from your smoke detector without replacing it immediately even if the beeping starts at an inconvenience time, like overnight. You place yourself in danger if you forget to put in a new battery later and your home catches on fire. The smoke detector itself needs replacing if the beeping continues even with a new battery, according to the Metropolitan Fire and Emergency Services Board. Detectors have a limited lifespan of about 10 years, although some might need replacing sooner. Prevention credit: WendellandCarolyn/iStock/Getty Images Prevent your fire alarm from beeping with a low battery warning by replacing its power source once per year on an easily remembered date. The U.S. Consumer Product Safety Commission recommends doing an annual battery change on the day you change your clocks to Daylight Saving Time. People in states without time changes can use another significant date, like a holiday or anniversary. Considerations credit: Jupiterimages/Stockbyte/Getty Images Fire alarm Your fire alarm may continue beeping when you put in a new battery, even if it is a newer, properly functioning model, if the battery has been sitting around for too long. Batteries have a limited life and lose their power if you store them for long periods. Try another battery before deciding that your smoke detector is the problem. Test your alarm monthly to ensure that it is functioning properly. the U.S. Consumer Product Safety Commission advises. Warning credit: Gary Ombler/Dorling Kindersley RF/Getty Images Smoke detector Never remove the battery from a smoke detector if it gets triggered by humidity, cooking smoke or another non-dangerous cause. This action stops the false alarm, but you may forget to replace the battery. A non-powered smoke detector leaves you vulnerable in case of a fire. Move alarms that give frequent false alarms, and use exhaust fans when cooking and showering.
Project Summary Unnatural amino acids, by virtue of unique chemical or physical properties not found in the standard twenty amino acids, can bestow novel properties to the proteins into which they are incorporated. Thus, technologies that enable their incorporation have been developed, and unnatural amino acids have found widespread use in the development of novel protein therapeutics. However, existing methods of unnatural amino acid incorporation have limitations that arise from the fact that they all repurpose the natural genetic code. We hypothesize that orthogonal expansion of the genetic code through the introduction of a third, unnatural base pair (UBP), and subsequent use of this third base pair to incorporate unnatural amino acids into proteins, will circumvent these limitations. The development of a semi-synthetic organism (SSO) capable of replicating, transcribing, and translating UBPs to incorporate unnatural amino acids into proteins is the central goal of this proposal. In specific aim 1, mechanisms that enforce UBP retention will be examined. Specific aim 2 will explore the UBP-mediated incorporation of NCAAs using orthogonal tRNA-synthetase pairs in E. coli. Lastly, specific aim 3 will examine the translational efficiency and fidelity of all 96 possible new codons containing a single UBP. Successful completion of these aims will advance our understanding of the fundamental processes that underlie information storage and retrieval in living organisms. Furthermore, the proposed work has the potential to revolutionize the field of protein therapeutics by providing a robust platform for the incorporation of one or more unnatural amino acids into proteins.
A Multiplication Based Logic Puzzle I really like this rhyme that I saw for the first time this week (even though it’s all over the net): Hey diddle diddle, the median’s the middle, You add then divide for the mean. The mode is the one that appears the most, And the range is the difference between. All of the numbers from 801 to 900 have at least 2 factors, but no more than 32 factors. 32 – 2 = 30, so 30 is the range of the amount of factors. There are 100 numbers from 801 to 900. If you list the amount of factors for each number, then arrange those amounts from smallest to largest, the amounts that will appear in the 50th and 51st spots will both be 6. That means that 6 is the median amount of factors. If we had different amounts in the 50th and 51st spots, we would average the two amounts together to get the median. If you add up the amounts of factors that the numbers from 801 to 900 have, you will get 794. If you divide 794 by 100, the number of entries, then you will know that 7.94 is the mean amount of factors. What about the mode? Which amount of factors appears the most? That’s why we are having a Horse Race, to see if more numbers have 2 factors, 3 factors, 4 factors, or a different amount of factors. So pick your pony. We’ll see which amount wins, and we’ll find out what the mode is at the same time. I should tell you that only perfect squares can have an odd amount of factors, so you probably don’t want to pick an odd amount. Here are some interesting facts about the numbers from 801 to 900 that might help you decide which pony to pick. We had the smallest two consecutive numbers with exactly 12 factors: (819, 820) We had the fourth prime decade: (821, 823, 827, 829). All four of those numbers are prime numbers and have exactly two factors. We had five consecutive numbers whose square roots can be reduced: (844, 845, 846, 847, 848). Three of those numbers had 6 factors, one had 10, and one had 12. We also had 840, the smallest number with exactly 32 factors 900 is the smallest number with exactly 27 factors. Coincidentally, the amount that is the mode will appear 27 times. As the following table shows, there are 42 integers from 801 to 900 that have square roots that can be simplified. 42 is more than any previous set of 100 numbers has given us. Even still we are still holding close to just under 40% of integers having square roots that can be simplified.
Q: Is there a way in Regex Expressions to check whether a certain word appears in a string in one of two defined places? I have a string, for example: myString = "word1 word2 word3". I want to create a regex expression to check whether word3 comes in the place of word1 or word3. I tried using the question mark (optional), but that matches even if the string contains no occurrences of the word. I want the word to be in the string, in one of two places (word1 and word3 for example). Is there any way to do this? I am not very good with Regex expressions, any help would be appreciated. str = "word3 word1 word2" # Should match str2 = "word3 word2 word3" # Should not match str3 = "word1 word3 word2" # Should not match str4 = "word1 word2 word2" # Should not match str4 matches when I use "(word3)? [\w\s] (word3)?". Any help would be wonderful. Thank You in advance! A: I have addressed a more general question: given a string containing two or more words, verify the first or last word is word3, the first and last words are not both word3 and there are no spaces at the beginning or end of the string. If it is necessary to confirm the string contains three words, a separate check must be done, such as r"^\w+(?: +\w+){2}$". You could use the following regular expression. r"^(?:word3 (?!.* word3$)|(?!word3 ).* word3$)" Regex demo <¯\_(ツ)_/¯> Python demo Python's regex engine performs the following operations. ^ match beginning of line (?: begin non-capture group word3[ ] match 'word3' followed by a space (?!.* word3$) the space is not to be followed by ' word3' at the end of the line | or (?!word3 ) do not match 'word3 ' at the beginning of the line .* match 0+ chars [ ]word3$ match ' word3' at the end of the line ) end non-capture group (?!...) is a negative lookahead. In the above I've replaced two spaces with [ ] lest they appear to be missing.
Prayer, Miracles Joe McKeever tells about his son Neil, who was on an outing with his three children. The day before, he had suggested they pray for good weather. On their way to the park, he asked 10-year-old Grant if he had prayed for this beautiful day. "No," he said. "I forgot." He asked 7-year-old Abby. "I forgot too," she said. "Oh, good," said her twin Erin from the back seat. "Then it was my miracle."
Detection of parasites of the Leishmania donovani-complex by a polymerase chain reaction-solution hybridization enzyme-linked immunoassay (PCR-SHELA). A polymerase chain reaction (PCR) based on the detection of the Lmet2 repeat sequence specific to members of the Leishmania donovani-complex is described. To improve PCR specificity, a post-PCR hybridization step is often performed but this usually involves an entirely new procedure with additional manipulations, expense and time. We have simplified this post-PCR hybridization by developing a strategy which includes the probe in the PCR and enables the hybridization to be performed automatically as part of the PCR programme. The hybrids are afterwards detected by capture in microtitre wells and colorimetric visualization. This method, which we have termed PCR-solution hybridization enzyme-linked immunoassay (PCR-SHELA), is rapid, able to detect less than 5 cultured parasites and is specific for parasites of the Leishmania donovani-complex. We also describe the application of PCR-SHELA to the detection of amastigotes in various tissues of infected laboratory animals.
Q: How do I keep two separate, centered words on the same line during screen-size change? Please note, I am not allowed to change the HTML here, only the CSS can be changed. I want the two words to stay on the same line when the screen becomes smaller (as long as whitespace remains on either side, at least), however they currently collapse quite readily, even though a lot of whitespace remains to either side. Codepen: https://codepen.io/anon/pen/BVzRbg html { } body { font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; } #link { position: absolute; margin-top: 5px; left: 45%; right: 45%; } #link a { margin-top: 5px; color: #fefefe; background-color: rgb(75, 101, 198, 1); /*line-height: 20px;*/ padding: 10px 9px; text-decoration: none; text-shadow: 0 1px 0 #3c58c7; font-weight: 500; } #link a:hover { background-color: #354eb1 } #one { border: 5px solid rgb(242, 168, 60, 1); padding: 5px; float: left; width: 25%; margin: 5px; } #two { border: 5px solid rgb(55, 124, 33, 1); padding: 5px; float: right; width: 25%; margin: 5px; } #three { border: 5px solid rgb(255, 253, 85, 1); padding: 5px; float: left; width: 25%; margin: 5px; position: fixed; bottom: 5px; } #four { border: 5px solid rgb(0, 34, 245, 1); padding: 5px; float: right; width: 25%; margin: 5px; position: fixed; bottom: 5px; right: 0px; } <!DOCTYPE html> <html> <head> <title>Blocks</title> <!-- Do not change this file - add your CSS styling rules to the blocks.css file included below --> <link type="text/css" rel="stylesheet" href="blocks.css"> </head> <body> <div id="one"> Turns out you have a really fun time if you go to work every day and focus on being silly and funny and happy! - Hannah Murray </div> <div id="two"> All you need in this life is ignorance and confidence, and then success is sure. - Mark Twain </div> <div id="three"> Well, if crime fighters fight crime and fire fighters fight fire, what do freedom fighters fight? They never mention that part to us, do they? - George Carlin </div> <div id="four"> Great minds discuss ideas; average minds discuss events; small minds discuss people. - Eleanor Roosevelt </div> <p id="link"> <a href="https://www.brainyquote.com/" target="_blank"> Brainy Quote </a> </p> </body> </html> A: You can achieve that by only a small css change. Change your styling of id link to: #link { position: absolute; margin-top: 5px; left: 50%; white-space: nowrap; transform: translateX(-50%); } html {} body { font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; } #link { position: absolute; margin-top: 5px; left: 50%; white-space: nowrap; transform: translateX(-50%); } #link a { margin-top: 5px; color: #fefefe; background-color: rgb(75, 101, 198, 1); /*line-height: 20px;*/ padding: 10px 9px; text-decoration: none; text-shadow: 0 1px 0 #3c58c7; font-weight: 500; } #link a:hover { background-color: #354eb1 } #one { border: 5px solid rgb(242, 168, 60, 1); padding: 5px; float: left; width: 25%; margin: 5px; } #two { border: 5px solid rgb(55, 124, 33, 1); padding: 5px; float: right; width: 25%; margin: 5px; } #three { border: 5px solid rgb(255, 253, 85, 1); padding: 5px; float: left; width: 25%; margin: 5px; position: fixed; bottom: 5px; } #four { border: 5px solid rgb(0, 34, 245, 1); padding: 5px; float: right; width: 25%; margin: 5px; position: fixed; bottom: 5px; right: 0px; } <!DOCTYPE html> <html> <head> <title>Blocks</title> <!-- Do not change this file - add your CSS styling rules to the blocks.css file included below --> <link type="text/css" rel="stylesheet" href="blocks.css"> </head> <body> <div id="one"> Turns out you have a really fun time if you go to work every day and focus on being silly and funny and happy! - Hannah Murray </div> <div id="two"> All you need in this life is ignorance and confidence, and then success is sure. - Mark Twain </div> <div id="three"> Well, if crime fighters fight crime and fire fighters fight fire, what do freedom fighters fight? They never mention that part to us, do they? - George Carlin </div> <div id="four"> Great minds discuss ideas; average minds discuss events; small minds discuss people. - Eleanor Roosevelt </div> <p id="link"> <a href="https://www.brainyquote.com/" target="_blank"> Brainy Quote </a> </p> </body> </html>
According to the World Health Organization (WHO), tuberculosis has exceeded human immunodeficiency virus infection as the most lethal infectious disease globally for 3 consecutive years \[[@CIT0001]\]. Moreover, the increase in drug-resistant tuberculosis seriously hampers its prevention and control. In 2016, there were approximately 600 000 new rifampicin-resistant (RR) tuberculosis cases, including approximately 490 000 multidrug-resistant tuberculosis (MDR-TB) cases \[[@CIT0001]\]. Compared with treatment of drug-sensitive tuberculosis, treatment of MDR-TB requires more time (at least 2 years). In 2016, the median cost per MDR-TB person was estimated to be \$9525, but the treatment success rate was only 54% \[[@CIT0001]\]. China ranks second after India among all countries regarding MDR-TB burden, with approximately 73 000 new MDR/RR tuberculosis cases reported in 2016. MDR/RR tuberculosis occurred in 7.1% of new cases and 24% of previously treated cases, which is higher than those worldwide (4.1% and 19%, respectively) \[[@CIT0001]\]. Furthermore, the cure rate for MDR-TB in China was only 41% (13% lower than the global experience) \[[@CIT0001]\]. By analyzing epidemiological, drug-resistance, and genomic data, previous studies on MDR-TB have mainly focused on the epidemiological/drug-resistance characteristics \[[@CIT0002]\], potential drug-resistance mutations \[[@CIT0005]\], and evolution of MDR-TB \[[@CIT0008], [@CIT0009]\]. Although previous studies have revealed some features of MDR-TB in China, the first nationwide drug-resistant tuberculosis surveillance in China (covering 70 counties in 31 provinces) \[[@CIT0010]\] provided a great opportunity for comprehensive investigation of the epidemiological/drug-resistance characteristics, drug-resistance genes/single-nucleotide polymorphisms (SNPs), and evolution of MDR-TB in China. Here, we performed whole-genome sequencing (WGS) for 357 MDR-TB strains from the survey. Drug-susceptibility testing (DST) was also conducted using 18 anti-tuberculosis drugs, representing the most comprehensive drug-resistance profile to date. Through the comprehensive analyses of epidemiological/drug-resistance phenotypic and genotypic data, we describe the epidemiological/drug-resistance characteristics, potential drug-resistance genes/intergenic regions (IGRs)/SNPs, and the effective population changes of MDR-TB in China. METHODS {#s1} ======= Sample Information and Sequencing {#s2} --------------------------------- The first national survey of drug-resistant tuberculosis in China (2007--2008) included local/regional surveys (covering 70 counties in 31 provinces) by the Chinese Center for Disease Control and Prevention \[[@CIT0010]\]. Cluster-randomized sampling was adopted to obtain representative samples of patients with tuberculosis in China \[[@CIT0010]\]. The number of study participants was estimated at 3542 treatment naive patients and 1189 previously treated patients ([Supplementary Table 1](#sup6){ref-type="supplementary-material"}). Finally, 4600 representative sputum samples from smear-positive tuberculosis (3514 treatment naive and 1086 previously treated patients) cases were obtained. Written informed consent was also obtained from each patient in face-to-face interviews by trained clinicians. After excluding 671 samples (culture failed to grow, 531; non-tuberculous mycobacteria, 140), we successfully obtained 3929 *Mycobacterium tuberculosis* isolates, which were preserved in the Beijing Bio-Bank of Clinical Resources on Tuberculosis (Beijing Chest Hospital, China). Through DST, we obtained 401 MDR isolates. Eliminating 28 samples that failed to regrow, 373 MDR strains were obtained for sequencing ([Figure 1](#F1){ref-type="fig"}). Sixty-seven non-MDR control strains were also selected from the first national survey of drug-resistant tuberculosis in China according to distribution of MDR strains ([Supplementary Table 2](#sup6){ref-type="supplementary-material"}). ![Distribution of the 357 MDR isolates from the first national survey of drug-resistant tuberculosis in China. *A*, Screening process of the 357 MDR isolates. The drug-susceptible tests were performed using 18 anti-tuberculosis drugs. R indicates the number of resistance strains, S indicates the number of susceptible strains, and NA indicates the number of the strains with failed drug-susceptibility testing. Some screening procedures were completed as reported in the literature (denoted as \*). *B*, Nationwide distribution of MDR isolates from the first national survey of drug-resistant tuberculosis in China. The shade of color indicates the number of MDR strains. Abbreviations: AMK, amikacin; BDQ, bedaquiline; CFZ, clofazimine; CPM, capreomycin; CS, cycloserine; DEL, delamanid; EMB, ethambutol; ETO, ethionamide; H1, high-dose isoniazid; INH, isoniazid; KM, kanamycin; LZD, linezolid; MDR, multidrug-resistant; MOX, moxifloxacin; Mtb,*Mycobacterium tuberculosis*; OFX, ofloxacin; PAS, para-aminosalicylic acid; PZA, pyrazinamide; RIF, rifampicin; SM, streptomycin.](ciy883f0001){#F1} The above strains were cultivated on Lowenstein-Jensen solid media. Genomic DNA samples were prepared and purified for sequencing using the MasterPure Complete DNA isolation kit (Epicentre, Madison, WI) following the standard protocols. DNA libraries were constructed using kits provided by Illumina according to the manufacturer's instructions. Sequencing was performed on an Illumina HiSeq X-Ten sequencing platform. After excluding 16 problematic genomes, 357 MDR-TB genomes were used for subsequent bioinformatics analysis. For additional information, see the [Supplementary Methods](#sup6){ref-type="supplementary-material"}. Drug Susceptibility Testing {#s3} --------------------------- The DST for 18 anti-tuberculosis drugs was performed with solid medium or an MGIT 960 system (BD Biosciences, Sparks, MD) using methods recommended by WHO or in other studies \[[@CIT0011]\]. Bedaquiline, delamanid, and clofazimine were purchased from the Hanxiang Company (Shanghai, China); the other drugs were purchased from Sigma-Aldrich. DST methods are shown in [Supplementary Table 3](#sup6){ref-type="supplementary-material"}. SNP Identification and Phylogenetic Analyses {#s4} -------------------------------------------- Sequencing reads for the strains were aligned to the H37Rv reference genome (NC_000962) using SOAP2 \[[@CIT0016]\] and the Burrows-Wheeler algorithm \[[@CIT0017]\] (average coverage, \>98%; average depth, 325×). SNPs were derived from high-quality unique mapping reads using SOAPsnp \[[@CIT0016]\], SAMtools \[[@CIT0018]\], and GATK \[[@CIT0019]\]. Further filtration was performed based on the standards in the literature \[[@CIT0020]\]. The 34 959 SNPs (excluding the SNPs within the known drug-resistance genes \[[@CIT0021]\] and repeat regions \[[@CIT0022]\]) in all strains were used to construct a phylogenetic tree using FastTree v2.1.9 \[[@CIT0023]\]. *Mycobacterium canettii* CIPT 140010059 was used as an outlier ([Supplementary Figure 1](#sup1){ref-type="supplementary-material"}). Genotyping was implemented based on 62 SNP markers \[[@CIT0024]\]. Identification of Potential Drug-resistance SNPs and Genes/IGRs {#s5} --------------------------------------------------------------- We used the following 4 identification methods: normal distribution analysis \[[@CIT0006]\], Fisher exact test \[[@CIT0011]\], PhyC test \[[@CIT0007]\], and random forest model \[[@CIT0025]\]. To ensure reliability, only the genes/IGRs/SNPs identified by at least 3 methods and with the proportion of drug-sensitive isolates less than 0.3 were considered as potentially drug-resistant candidates. The detailed protocols are provided in the [Supplementary Methods](#sup6){ref-type="supplementary-material"}. Bayesian Skyline Analyses of MDR-TB {#s6} ----------------------------------- To evaluate the changes in effective population size since 1974 (when rifampicin was brought to the market in China), we performed Bayesian skyline analysis for the 357 MDR-TB strains based on the concatenated SNPs in the identified resistance genes/IGRs using BEAST v1.8.4 \[[@CIT0026]\] (for details, see the [Supplementary Methods](#sup6){ref-type="supplementary-material"}). Data Availability {#s7} ----------------- Whole-genome sequencing raw data were deposited at Sequence Read Archive (SRP134826) and Genome Sequence Archive (CRA000786). RESULTS {#s8} ======= Epidemiological Characteristics of MDR-TB in China {#s9} -------------------------------------------------- The 357 MDR strains were screened from the 3929 *M. tuberculosis* isolates in the first national survey of drug-resistant tuberculosis (70 counties in 31 provinces). These data are still the most representative Chinese MDR strains to date ([Figure 1](#F1){ref-type="fig"} and [Supplementary Table 4](#sup7){ref-type="supplementary-material"}). Sixty-seven non-MDR control strains were also selected from the survey according to distribution of MDR strains ([Supplementary Table 5](#sup6){ref-type="supplementary-material"}). The corresponding patient information is shown in [Table 1](#T1){ref-type="table"} and [Supplementary Tables 4](#sup7){ref-type="supplementary-material"} and [5](#sup6){ref-type="supplementary-material"}. As previously reported \[[@CIT0010]\], the most prevalent MDR strains in China were lineage 2 Beijing strains (293, 82.1%; [Figure 2](#F2){ref-type="fig"}); previously treated cases (204, 57.1%) with MDR exceeded new MDR cases (153, 42.9%); and the sex ratio (male-to-female) was approximately 2:1 (237/120). In addition, Chinese farmers (220, 61.6%) accounted for a higher percentage of MDR cases than others (137, 38.4%). The percentage of MDR isolates in Eastern China (104, 29.1%) and Northern China (77, 21.6%) ranked first and second among the 7 Chinese administrative regions. ###### Epidemiological and Drug-resistance Information for the 357 Multidrug-resistant Tuberculosis Isolates From the First National Survey of Drug-resistant Tuberculosis in China Characteristic Patients With New Cases of Tuberculosis (n = 153) Patients With Previously Treated Tuberculosis (n = 204) Total (N = 357) ------------------------------------------------- --------------------------------------------------- --------------------------------------------------------- ----------------- Drug resistance: first-line tuberculosis drugs  Isoniazid-Rifampicin 153 (42.9%) 204 (57.1%) 357 (100.0%)  High-dose isoniazid 99 (40.1%) 148 (59.9%) 247 (69.2%)  Streptomycin 117 (45.7%) 139 (54.3%) 256 (71.7%)  Ethambutol 83 (40.9%) 120 (59.1%) 203 (56.9%)  Pyrazinamide 58 (42.7%) 78 (57.4%) 136 (38.1%) Drug resistance: second-line tuberculosis drugs  Ofloxacin 41 (42.7%) 55 (57.3%) 96 (26.9%)  Moxifloxacin 18 (37.5%) 30 (62.5%) 48 (13.5%)  Ethionamide 30 (39.5%) 46 (60.5%) 76 (21.3%)  Kanamycin 22 (57.9%) 16 (42.1%) 38 (10.6%)  Linezolid 5 (50.0%) 5 (50.0%) 10 (2.8%)  Clofazimine 9 (36.0%) 16 (64.0%) 25 (7.0%)  Amikacin 16 (47.1%) 18 (52.9%) 34 (9.5%)  Capreomycin 15 (45.5%) 18 (54.6%) 33 (9.2%)  Cycloserine 22 (44.9%) 27 (55.1%) 49 (13.7%)  Para-aminosalicylic acid 22 (52.4%) 20 (47.6%) 42 (11.8%)  Bedaquiline 1 (33.3%) 2 (66.7%) 3 (0.8%)  Delamanid 2 (40.0%) 3 (60.0%) 5 (1.4%) Sex  Male 90 (38.0%) 147 (62.0%) 237 (66.4%)  Female 63 (52.5%) 57 (47.5%) 120 (33.6%) Age  Early youth 8 (88.9%) 1 (11.1%) 9 (2.5%)  Youth 65 (42.8%) 87 (57.2%) 152 (42.6%)  Middle 60 (39.2%) 93 (60.8%) 153 (42.9%)  Elderly 20 (46.5%) 23 (53.5%) 43 (12.0%) District  Northeast 11 (36.7%) 19 (63.3%) 30 (8.40%)  Northern China 45 (58.4%) 32 (41.6%) 77 (21.57%)  Eastern China 34 (32.7%) 70 (67.3%) 104 (29.13%)  Southern China 10 (45.4%) 12 (54.6%) 22 (6.16%)  Central China 15 (25.4%) 44 (74.6%) 59 (16.53%)  Northwest 20 (64.5%) 11 (35.5%) 31 (8.68%)  Southwest 18 (52.9%) 16 (47.1%) 34 (9.52%) Ethnicity  Han 131 (42.7%) 176 (57.3%) 307 (86.0%)  Other 22 (44.0%) 28 (56.0%) 50 (14.0%) Occupation  Chinese farmer 94 (42.7%) 126 (57.3%) 220 (61.6%)  Other 59 (43.1%) 78 (56.9%) 137 (38.4%) Contact  Yes 17 (32.1%) 36 (67.9%) 53 (14.9%)  No 136 (44.9%) 167 (55.1%) 303 (84.9%) Lineage  2 (L2) 130 (44.4%) 163 (55.6%) 293 (82.1%)  3 (L3) 3 (100.0%) 0 (0.0%) 3 (0.8%)  4 (L4) 21 (34.4%) 40 (65.6%) 61 (17.1%) ![The evolutionary tree of 357 multidrug-resistant tuberculosis (MDR-TB) strains. A total of 357 MDR-TB strains included 293 L2 strains (blue), 3 L3 strains (green), and 61 L4 strains (red). Different colors on the outside ring indicate the strains from different administrative regions in China.](ciy883f0002){#F2} Drug-resistance Characteristics of MDR-TB in China {#s10} -------------------------------------------------- We performed the DSTs for 18 anti-tuberculosis drugs ([Supplementary Table 3](#sup6){ref-type="supplementary-material"}). The drug-resistance profiles are shown in [Supplementary Table 6](#sup8){ref-type="supplementary-material"}. We first calculated the resistance ratio of each anti-tuberculosis drug in MDR strains ([Table 1](#T1){ref-type="table"}, [Supplementary Table 7](#sup6){ref-type="supplementary-material"}, and [Supplementary Figure 2](#sup2){ref-type="supplementary-material"}). The results revealed that the resistance ratio of pyrazinamide (38.1%) was the lowest among the first-line drugs. Subsequent analysis of the resistance ratios for the other drugs showed that they were much lower than those for the first-line drugs in the following ranking order (from low to high): bedaquiline (0.8%) \< delamanid (1.4%) \< linezolid (2.8%) \< clofazimine (7.0%) \< capreomycin (9.2%) \< amikacin (9.5%) \< kanamycin (10.6%) \< para-aminosalicylic acid (11.8%) \< moxifloxacin (13.45%) \< cycloserine (13.7%) \< ethionamide (21.3%) \< ofloxacin (26.9%). We further investigated the distribution of MDR-TB strains in China by calculating the proportion of MDR-TB strains with different drug-resistance profiles among the 7 administrative regions ([Figure 3A](#F3){ref-type="fig"}). The results showed that more than half of MDR strains were resistant to at least 5 anti-tuberculosis drugs in each administrative region, especially in Northern (22%), Eastern (20%), Northwest (26%), and Southwest (29%) China, with more than 20% of MDR strains resistance to at least 8 drugs. This demonstrated severe drug resistance in China. ![Drug-resistance profiles and multidrug co-resistance patterns of the multidrug-resistant tuberculosis (MDR-TB) strains among 7 administrative regions in China. *A*, The proportion of MDR-TB strains resistant to different numbers of antibiotics among the 7 administrative regions. Different colors in the circular sectors indicate different numbers of anti-tuberculosis drugs. The size of the circle indicates the number of MDR strains. *B*, Relationship matrices of the co-resistance/combination of drugs among 7 administrative regions. The *P* value of co-resistance for each pair of anti-tuberculosis drugs was obtained using Fisher exact test (shown in the cells). The color key indicates the degree of relationship (ie, frequency of co-resistance). Bedaquiline and delamanid were not included in the analysis due to the limited number of resistance strains (≤5). Abbreviations: AMK, amikacin; BDQ, bedaquiline; CFZ, clofazimine; CPM, capreomycin; CS, cycloserine; DEL, delamanid; EMB, ethambutol; ETO, ethionamide; H1, high-dose isoniazid; INH, isoniazid; KM, kanamycin; LZD, linezolid; MDR, multidrug-resistant; MOX, moxifloxacin; Mtb, Mycobacterium tuberculosis; OFX, ofloxacin; PAS, para-aminosalicylic acid; PZA, pyrazinamide; RIF, rifampicin; SM, streptomycin.](ciy883f0003){#F3} We then used the Fisher test to investigate the multidrug co-resistance patterns among the 7 Chinese administrative regions by constructing co-resistance relationship matrices for 15 anti-tuberculosis drugs ([Figure 3B](#F3){ref-type="fig"}). In general, the 5 first-line anti-tuberculosis drugs showed a high frequency of co-resistance; the other anti-tuberculosis drugs displayed low frequency of co-resistance except for the 2 fluoroquinolones. Specifically, the MDR strains of each administrative region possessed their own characteristic co-resistance pattern. The MDR isolates in Northeast China displayed a high frequency of co-resistance to only 4 first-line drugs (isoniazid, rifampicin, streptomycin, and ethambutol) and low frequency of co-resistance to the other drugs. In contrast, the MDR isolates from Eastern China exhibited a high frequency of co-resistance to almost all anti-tuberculosis drugs except for linezolid and clofazimine. In addition, we also found a high frequency of co-resistance to 3 injectable anti-tuberculosis drugs in Northern, Central, and Southern China. The various multidrug co-resistance patterns might reflect different drug combinations/use preferences and other unmeasured variables in different regions. Identification of Potential Drug-resistance SNPs and Genes/IGRs {#s11} --------------------------------------------------------------- To investigate the relationship between the drug-resistance phenotypes and genotypes of the 357 MDR-TB strains, we sequenced them using the Illumina HiSeq sequencing platform (average coverage, 325×; [Supplementary Table 8](#sup6){ref-type="supplementary-material"}) and applied 4 methods (3 statistical and 1 machine-learning method) to identify the genetic drug-resistance determinants ([Supplementary Figure 3](#sup3){ref-type="supplementary-material"} and [Supplementary Table 9](#sup6){ref-type="supplementary-material"}). A total of 42 SNPs and 44 genes/IGRs were found to correlate with drug resistance ([Supplementary Tables 10--18](#sup6){ref-type="supplementary-material"}) using at least 3 methods (see [Supplementary Methods](#sup6){ref-type="supplementary-material"}). Among them, 15 drug-resistance SNPs and 13 drug-resistance genes/IGRs had been experimentally validated \[[@CIT0027]\], which cover most of the well-known drug-resistance SNPs and genes/IGRs ([Figure 4](#F4){ref-type="fig"} and [Supplementary Tables 19](#sup6){ref-type="supplementary-material"} and [20](#sup6){ref-type="supplementary-material"}), indicating the credibility of our screening strategy. Importantly, we identified 31 new drug-resistance genes/IGRs. Their functions were mainly associated with the known drug-resistance mechanisms of *M. tuberculosis*, such as cell wall synthesis and fatty acid metabolism (8 genes), secretion/transport (4 genes), DNA replication/repair (3 genes), oxidoreductase (1 gene), transcription/translation (1 IGR), and proline-glutamic acid (PE)/proline-proline-glutamic acid (PPE)-family genes (6 genes) ([Supplementary Table 21](#sup6){ref-type="supplementary-material"}). These genes/IGRs provide some potential molecular targets for the prevention and treatment of tuberculosis. ![Genomic locations of the 42 drug-resistance SNPs and 44 drug-resistance genes/IGRs. *A*, Genomic locations of the 42 drug-resistance SNPs. *B*, Genomic locations of the 44 drug-resistance genes/IGRs. The red lines on the blue circle indicate the known drug-resistance SNPs/ genes/IGRs; the black lines indicate the new candidates found in this study. Abbreviations: IGR, intergenic region; SNP, single-nucleotide polymorphism.](ciy883f0004){#F4} We also validated our screening strategy by analyzing the nonsynonymous to synonymous substitutions (Ka/Ks) ratios of 33 drug-resistance genes (excluding 11 drug-resistance IGRs) that were subject to a higher selection pressure. We observed that these genes were under positive selection with Ka/Ks \>1 in the MDR strains relative to the ratio of approximately 0.4 for other genes ([Supplementary Figure 4](#sup4){ref-type="supplementary-material"}). These findings are consistent with those from a previous study \[[@CIT0006]\] and further support the feasibility and accuracy of our screening strategy in identifying drug-resistance genes. Compensatory Mutation {#s12} --------------------- Previous studies have shown that some particular mutations of *rpoA* and *rpoC* compensate for fitness costs in rifampicin-resistant strains with *rpoB* mutations \[[@CIT0028]\]. Here, we identified 38 potential compensatory mutations in *rpoA* and *rpoC* \[[@CIT0020], [@CIT0028]\], 16 of which have not been reported previously. Thirty-seven compensatory mutations are associated with RpoB S450L, including 15 novel mutations. A "hot-spot" compensatory mutation region in *rpoC* has also been discovered ([Supplementary Figure 5](#sup6){ref-type="supplementary-material"}) as previous reported \[[@CIT0029]\]. Incidentally, we found 2 pairs of potential compensatory mutations in RpoA and RpoC that co-occurred with RpoB S450L (RpoA E274G and RpoC E1033A; RpoA P250L and RpoC L527V; [Supplementary Table 22](#sup6){ref-type="supplementary-material"}). Changes in Effective Population Size of Chinese MDR-TB {#s13} ------------------------------------------------------ To investigate changes in the effective population size of Chinese MDR-TB strains since 1974 ([Figure 5A](#F5){ref-type="fig"}), we constructed a Bayesian skyline plot based on the SNPs in the 44 drug-resistance genes/IGRs. A strong population expansion was detected during 1993--2000, while this expansion was restrained with unchanged population size from 2000 to 2006. There was even a significant decline after 2006. ![Bayesian skyline plot showing the changes in effective population size of Chinese multidrug-resistant tuberculosis (MDR-TB) strains. *A,* Bayesian skyline plot based on 357 MDR-TB strains shows the effective population size of Chinese MDR-TB since 1974. The shadowed area indicates 95% probability density intervals for the estimated population sizes. *B*, Schematic diagram showing the socioeconomic factors that might influence the population size changes of Chinese MDR-TB strains during 1990--2007. The green bar indicates the DOTS coverage (%) in China. The blue triangle indicates the number of floating population (million). The red square indicates the gross domestic product of China (RMB billion). The purple circle indicates the national tuberculosis program budget in China (\$US million). Abbreviations: DOTS, Directly Observed Treatment, Short Course; GDP, gross domestic product; NTP, national tuberculosis program; RMB, Renminbi.](ciy883f0005){#F5} DISCUSSION {#s14} ========== Our findings elucidate the epidemiological/drug-resistance characteristics, some potential drug-resistance genes/SNPs, and effective population changes of MDR tuberculosis in China. We did this by analyzing the epidemiological, drug-resistance phenotypic, and genotypic data of 357 MDR-TB strains from the first national survey of drug-resistant tuberculosis. Here, we evaluated data with important recommendations for precision medicine and future research, as discussed below. The resistance ratios of the anti-tuberculosis drugs also provide important reference to regimens for treatment of MDR-TB. As for the 2 fluoroquinolones we tested, moxifloxacin showed a lower resistance ratio (13.45%) than ofloxacin (26.9%). According to the longer MDR-TB regimens included in WHO evidence-based guidelines, moxifloxacin is also one of the prioritized medicines based on the latest evidence that refer to the balance of effectiveness to safety \[[@CIT0030]\]. Importantly, bedaquiline (0.8%), delamanid (1.4%), and linezolid (2.8%) exhibited the lowest drug-resistance ratios. At present, bedaquiline and linezolid are considered prioritized medicines in the WHO guidelines for treatment of MDR-TB \[[@CIT0030]\]. Bedaquiline is strongly recommended because of its effectiveness and low toxicity \[[@CIT0031]\]. Linezolid also shows effectiveness but has limitations due to its high toxicity \[[@CIT0030]\]. Although delamanid exhibited a low drug-resistance ratio, it did not belong to the prioritized group of medicines for treatment of MDR tuberculosis due to its short time to market and uncertain safety and effectiveness beyond 6 months \[[@CIT0030]\]. These 3 drugs are rarely used in China currently and may constitute the last line of defense against MDR-TB; therefore, their prescription should be cautiously administered by clinicians. Importantly, the 357 nationally representative MDR strains offered an opportunity to investigate the changes in MDR-TB population size in China since 1974, reflecting some realities during socioeconomic transition. The strong population expansion of Chinese MDR-TB strains during 1993--2000 might be predominantly associated with rapid economic growth \[[@CIT0032]\] and incomplete tuberculosis surveillance and control systems during that period of socioeconomic transition. Rapid economic growth in the 1990s was accompanied by increased population movements from 21.3 million (1990) to 121 million (2000) ([Figure 5B](#F5){ref-type="fig"}) \[[@CIT0032]\], contributing to significant MDR-TB transmission and expansion. Additionally, reduced patient compliance with tuberculosis treatment, antibiotic abuse, and sharp increases in the number of drug addicts and human immunodeficiency virus--infected individuals are also likely to have contributed to the transmission and spread of Chinese MDR-TB \[[@CIT0033], [@CIT0034]\]. Furthermore, the coverage of the DOTS course for tuberculosis was only 68% in 2000 \[[@CIT0035]\] ([Figure 5B](#F5){ref-type="fig"}). The increase in the size of the Chinese MDR-TB population from 1993--2000 was restrained, while it remained unchanged from 2000 to 2006, and there was even had a significant decline after 2006. The proportion of MDR-TB in all tuberculosis cases also showed a sharp decrease from 2000 (10.7%) to 2010 (6.8%) \[[@CIT0036], [@CIT0037]\]. This favorable change in combating tuberculosis was mainly ascribed to the advances in new diagnostic techniques and anti-tuberculosis drugs, as well as increased government support for MDR-TB patients \[[@CIT0001]\]. The Chinese government introduced a policy for free diagnostic tests and drug use for tuberculosis patients in 2004, which effectively reduced the economic burden on patients and improved their treatment compliance \[[@CIT0038]\]. The national tuberculosis program budget was also increased from \$98 million (2002) to \$272 million (2007) \[[@CIT0035]\] ([Figure 5B](#F5){ref-type="fig"}). The coverage of DOTS also reached 100% in 2005 \[[@CIT0035]\]. Importantly, the government has provided an additional budget for MDR-TB since 2006, including subsidies for second-line drugs \[[@CIT0035]\]. The WHO published guidelines for management of drug-resistant tuberculosis in 2006 (version 1), which also provide important guidance and advice for the prevention and control of MDR-TB in China \[[@CIT0039]\]. Supplementary Data {#s15} ================== Supplementary materials are available at *Clinical Infectious Diseases* online. Consisting of data provided by the authors to benefit the reader, the posted materials are not copyedited and are the sole responsibility of the authors, so questions or comments should be addressed to the corresponding author. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. ***Author contributions.*** F. C., H. H., and S. X. conceived the study. G. W., G. J., G. M., S. W., Z. Z., and W. J. designed and performed the experiments. N. D., T. Y., C. L., X. J., and J. Z. performed the bioinformatics analyses. N. D., T. Y., C. L., Y. Z., and F. C. prepared the manuscript. All authors revised and approved the final manuscript. ***Financial support.*** This work was supported by the National Natural Science Foundation of China (31601047, 31770870, 81672065, 81703632); National Science and Technology Major Project (2017ZX10201301-004-002, 2017ZX09304009-004, 2017ZX10302301-003-004); Beijing Natural Science Foundation (7172050); Beijing Municipal Science & Technology Commission (Z171100001017065); Beijing Municipal Administration of Hospitals' Ascent Plan (DFL20181602); and Beijing Municipal Administration of Hospitals Clinical Medicine Development of Special Funding Support (ZYLX201809). ***Potential conflicts of interest.*** All authors: No reported conflicts. All authors have submitted the ICMJE Form for Disclosure of Potential Conflicts of Interest. Conflicts that the editors consider relevant to the content of the manuscript have been disclosed. [^1]: These authors contributed equally to this work. [^2]: These authors contributed equally to the manuscript.
Q: What is the difference between msgpack_pack and msgpack_serialize and MessagePack::pack? msgpack implemented in php by msgpack extension. There are two functions msgpack_pack and msgpack_serialize and method MessagePack::pack. I do not know what is the difference between them. How to findout API of this extension? A: They are the same. This is msgpack_serialize, it calls function php_msgpack_serialize; static ZEND_FUNCTION(msgpack_serialize) { zval *parameter; smart_str buf = {0}; if (zend_parse_parameters( ZEND_NUM_ARGS() TSRMLS_CC, "z", &parameter) == FAILURE) { return; } php_msgpack_serialize(&buf, parameter TSRMLS_CC); ZVAL_STRINGL(return_value, buf.c, buf.len, 1); smart_str_free(&buf); } and msgpack_pack is the alias of msgpack_serialize. // in msgpack.c static zend_function_entry msgpack_functions[] = { ZEND_FE(msgpack_serialize, arginfo_msgpack_serialize) ZEND_FE(msgpack_unserialize, arginfo_msgpack_unserialize) ZEND_FALIAS(msgpack_pack, msgpack_serialize, arginfo_msgpack_serialize) ZEND_FALIAS(msgpack_unpack, msgpack_unserialize, arginfo_msgpack_unserialize) {NULL, NULL, NULL} }; MessagePack::pack is the object form of msgpack_serialize. It also calls php_msgpack_serialize: static ZEND_METHOD(msgpack, pack) { zval *parameter; smart_str buf = {0}; int php_only = MSGPACK_G(php_only); MSGPACK_BASE_OBJECT; if (zend_parse_parameters( ZEND_NUM_ARGS() TSRMLS_CC, "z", &parameter) == FAILURE) { return; } MSGPACK_G(php_only) = base->php_only; php_msgpack_serialize(&buf, parameter TSRMLS_CC); MSGPACK_G(php_only) = php_only; ZVAL_STRINGL(return_value, buf.c, buf.len, 1); smart_str_free(&buf); }
The amount of time that a meadow vole, Microtus pennsylvanicus, self-grooms is affected by its reproductive state and that of the odor donor. Many hypotheses have been put forth to account for differences in the amount of time that animals engage self-grooming when exposed to conspecifics or their odors, but most ignore the possibility that self-grooming may be associated with olfactory communication between groomers and conspecifics. As yet, we do not know the function of self-grooming and why animals do so when they encounter the odors of conspecifics. The present experiment tests the hypothesis that the amount of time that a meadow vole, Microtus pennsylvanicus, self-grooms is affected by the reproductive state of the odor donor and its own reproductive state. The findings support the hypothesis. Male voles spent more time self-grooming when they were exposed to bedding scented by female voles in postpartum estrus (PPE) compared to that of female voles in other reproductive states and female mice. PPE female voles spent more time self-grooming when they were exposed to bedding scented by testosterone-treated male voles than either to that of gonadectomized male voles and male mice. PPE female voles spent more time than OVX+E and more time than OVX females self-grooming when they were exposed to bedding scented by testosterone-treated male voles. GX+T male voles spent more time than GX male voles self-grooming when they were exposed to bedding scented by PPE female voles. The results suggest that individuals self-groom more in the presence of an odor of a highly receptive potential mate than that of a less receptive mate.
--- abstract: | [ The influence of weak localization on Hanle effect in a two-dimensional system with spin-split spectrum is considered. We show that weak localization drastically changes the dependence of stationary spin polarization $\mathbf S$ on external magnetic field $B.$ In particular, the non-analytic dependence of $\mathbf S$ on $\mathbf B$ is predicted for III-V-based quantum wells grown in \[110\] direction and for \[100\]-grown quantum wells having equal strengths of Dresselhaus and Bychkov-Rashba spin-orbit coupling. It is shown that in weakly localized regime the components of $\mathbf S$ are discontinuous at $B=0.$ At low $B,$ the magnetic field-induced rotation of the stationary polarization is determined by quantum interference effects. This implies that the Hanle effect in such systems is totally driven by weak localization.]{} author: - 'I. S. Lyubinskiy, V. Yu. Kachorovskii' title: 'Hanle effect driven by weak-localization' --- In recent years, the spin-related phenomena in semiconductor nanostructures have been subject to intense study both in terms of fundamental physics and in view of applications in the field of spintronics [@avsh]. The ultimate goal of spintronics is to develop novel electronic devices that exploit the spin degree of freedom. The effective manipulation of the spin in such devices requires that the characteristic spin lifetime be long compared to the device operation time. This is a challenging problem, especially for III-V-based semiconductor nanostructures where spin polarization relaxes rapidly due to Dyakonov-Perel spin relaxation mechanism [@perel]. This mechanism is based on the classical picture of the angular spin diffusion in random magnetic field induced by spin-orbit coupling. In two-dimensional (2D) systems, the corresponding spin-relaxation time $\tau_S$ is inversely proportional to the momentum relaxation time $\tau$ [@dyak]. As a consequence, in high-mobility structures which are most promising for device applications, $\tau_S$ is especially short. However, in some special cases, the relaxation of one of the spin components can be rather slow even in a system with high mobility. In particular, a number of recent researches [@d1; @d2; @d3; @d4; @d5; @d6] are devoted to GaAs symmetric quantum wells (QW) grown in $[110]$ direction. In such wells, the random field is perpendicular to the QW plane and the normal to the plane component of the spin does not relax [@dyak] or, more precisely, relaxes very slowly. Also, the random magnetic field might be parallel to a fixed axis in an asymmetric $[100]$-grown QW due to the interplay between structural and bulk spin-orbit coupling [@pikus; @golub; @kim; @loss1; @loss2]. Since in both cases one component of the spin relaxes slowly, these structures are especially attractive for spintronics applications. In this Letter, we discuss the dependence of the spin polarization in such structures on external magnetic field $\mathbf B.$ We assume that the spin is injected into the system with a constant rate, for example, by optical excitation [@optical]. The stationary spin polarization $\mathbf S $ is proportional to the product of injection intensity and the spin relaxation time. The Hanle effect is that the external field modifies the stationary polarization. In particular, $\mathbf S(\mathbf B)$ deviates from $\mathbf S(0)$ by an angle $\theta$ which depends on the relation between spin precession frequency $\boldsymbol{\Omega}=g \mu_B \mathbf B/\hbar,$ and the spin relaxation rate (here $\mu_B=e\hbar/2m_0c$ is the Bohr magneton, $m_0$ is the free electron mass and $g$ is Landé $g$ factor). We show that at low temperatures $\theta$ is very sensitive to weak localization (WL) effects. Usually such effects are discussed in context of quantum corrections to the conductivity [@wl; @lee]. Though the WL correction is small compared to the classical conductivity it has attracted much attention due to its fundamental nature and anomalous behavior with external parameters such as magnetic field. Remarkably, the influence of WL on Hanle effect can not be considered as a small correction to the classical result. We demonstrate that at low temperatures WL gives rise to a discontinuity in the dependence of $\theta$ on $\mathbf B.$ As a result, at low $B$ the Hanle effect is totally driven by WL. Physically, the non-analytic dependence of $\theta$ on $\mathbf B$ is related to memory effects specific for WL. It is known that the WL is caused by interference of electron waves propagating along a closed loop in the opposite directions [@lee]. Such interference process can be considered as a coherent scattering (additional to the Born scattering) involving a large number of impurities [@self] (see Fig. \[fig1\]). The probability of the coherent scattering is proportional to the probability of the diffusive return $1/Dt,$ where $t$ is the time of the electron passage along the loop and $D$ is the diffusion coefficient. In the absence of magnetic field, such scattering does not change the direction of the spin [@my]. Thus, electrons keep memory about initial spin polarization during the time much larger than $\tau_S$ and the long-living tail $1/t$ in the spin polarization appears [@my; @m2]. When the external magnetic field is applied, the electron spin rotates with a frequency $\boldsymbol{\omega}_{\mathbf p} + \boldsymbol{\Omega},$ where $\boldsymbol{\omega}_{\mathbf p}$ is the momentum-dependent frequency of the spin precession in the spin-orbit-induced magnetic field. In the special case under discussion, $\boldsymbol{\omega}_{\mathbf p}$ is parallel to a fixed axis (say $z$-axis) for any $\mathbf p$. Let us consider the simplest case, when $\boldsymbol{\Omega} $ also lies along $z$ axis. In this case, spin rotation matrices, describing rotation of electron spin on the different segments of the closed loop commutes with each other and the spin rotation angles for clockwise and counterclockwise propagating waves are simply given by $\varphi = \Omega t + \int_0^t \omega_{\mathbf p}dt',~~\varphi' = \Omega t + \int_0^t \omega_{\mathbf p'}dt'.$ The initial electron spinor $|\chi_0\rangle$ is transformed to $|\chi\rangle=e^{-i\hat \sigma_z \varphi /2}|\chi_0\rangle$ and $|\chi'\rangle=e^{-i\hat \sigma_z \varphi' /2}|\chi_0\rangle$ for clockwise and counterclockwise paths, respectively. Here $\hat \sigma_z$ is the Pauli matrix. In 2D systems, $\boldsymbol{\omega}_{\mathbf p}$ is linear in $\mathbf p.$ Since for any closed path $\int_0^t \mathbf p(t')dt'=0,$ we find $\varphi =\varphi' =\Omega t.$ The interference contribution to the electron spin-density matrix after a coherent scattering is given by $|\chi \rangle \langle \chi'| =e^{-i\hat \sigma_z \Omega t /2}|\chi_0 \rangle \langle \chi_0| e^{i\hat \sigma_z \Omega t/2}.$ Hence, the electron spin after the coherent scattering is rotated by an angle $\Omega t$ with respect to the spin before scattering. The deviation of the spin from the initial direction is proportional to $\sin(\Omega t).$ The integration over $t$ weighted with the probability of the coherent scattering yields $\theta \sim \int dt \sin(\Omega t)/t \sim \Omega/\vert \Omega \vert. $ In other words, the rotation frequency $\Omega$ should be multiplied by the effective rotation time $1/\vert \Omega \vert, $ which is very long for small $\Omega.$ Rigorous calculations (see below) give an additional factor $\lambda/l$ in this result, which reflects the quantum nature of the phenomena: $ \theta\sim \lambda \Omega/l\vert \Omega \vert $ (here $\lambda$ is the electron wave length and $l$ is the mean free path). In contrast to coherent scattering, the classical rotation of spin is limited by the spin relaxation time $\tau_S,$ so that the classical contribution is $\theta \sim \Omega \tau_S.$ For $\Omega \tau_S\ll \lambda/l,$ this contribution can be neglected and the Hanle effect is totally driven by WL. The discontinuity at $\Omega=0$ is smeared by inelastic scattering, which destroys phase coherence between clockwise and counterclockwise propagating paths, thus limiting a time of the coherent spin rotation: $t<\tau_\varphi,$ where $\tau_{\varphi} $ is the phase breaking time. It worth noting that the above considerations do not work if $\boldsymbol{\omega}_{\mathbf p}$ changes its direction with a change of $\mathbf p.$ The reason is that the rotation matrixes corresponding to the different segments of the loop do not commute in this case. As a result, $\varphi$ and $\varphi'$ no longer equal to each other and depend not only on the total time spent on the loop but also on the positions of impurities $1,2,\cdots ,N.$ In such a situation, the external magnetic field leads to the spin decay rather than to the spin rotation [@my]. Next we develop a rigorous theory of Hanle effect in the weakly localized regime. The Hamiltonian of a 2D system with a spin-split spectrum is given by $$H=\frac{\mathbf p^2}{2m}+\frac{\hbar}{2}[\boldsymbol{\omega}_{\mathbf p}+\boldsymbol{\Omega}]\hat{\boldsymbol{\sigma}} +U(\mathbf r). \label{hamilt}$$ Here $\mathbf p$ is the in-plane electron momentum, $m$ is the electron effective mass, $\hat{\boldsymbol {\sigma}}$ is a vector consisting of Pauli matrices, and $U(\mathbf r)$ is the impurity potential, which we assume to be short-ranged $ \overline{ U(\mathbf r) U(\mathbf r')} = \gamma \delta (\mathbf r -\mathbf r')$ (here averaging is taken over impurity positions and the coefficient $\gamma$ is related to the transport scattering time by $\tau= \hbar^3/m\gamma $). The spin-orbit interaction is described by the term $\hbar \boldsymbol{\omega}_{\mathbf p}\hat{\boldsymbol{\sigma}}/2.$ It can be separated into two parts ($\boldsymbol{\omega}_{\mathbf p}=\boldsymbol{\omega}^1_{\mathbf p}+\boldsymbol{\omega}^2_{\mathbf p}$) related to so-called Dresselhaus [@dress] and Bychkov-Rashba [@rashba] contributions. The Bychkov-Rashba coupling depends on the asymmetry of the QW confining potential. Its strength can be tuned by varying the gate voltage [@nitta]. The Dresselhaus term is present in semiconductors with no bulk inversion symmetry. In 2D case the resulting spectrum splitting is linear in the electron momentum [@rashba; @dyak]. [=6.84cm ]{} We assume that the random magnetic field is directed along z-axis $$\boldsymbol{\omega}_{\mathbf p}=(\mathbf p \boldsymbol{ \alpha}) \hat {\mathbf z}. \label{omegaxi}$$ Here $\hat {\mathbf z}$ is the unit vector along the direction of the random field and $\boldsymbol{ \alpha}$ is a constant in-plain vector. Equation implies that the spectrum splitting depends only on one component of momentum $p_{\alpha}.$ This happens in symmetric \[110\]-grown QWs. In this case, $\hat{ \mathbf z}$ is normal to the QW plane [@dyak]. For asymmetric \[100\] wells Eq.  can also take place if Bychkov-Rashba and Dresselhaus couplings have equal strengths [@pikus; @golub; @kim; @loss1; @loss2]. For such wells vector $\hat{ \mathbf z}$ lies in the QW plane. The temperature is assumed to be low, so that $\tau_{\varphi}$ be large compared to $\tau_{S}.$ To describe spin dynamics in the weakly localized regime we use the kinetic equation [@my]. If the spin polarization is uniform in space, this equation looks as follows $$\frac{\partial\mathbf s}{\partial t} = \left [ \boldsymbol {\omega}_{\mathbf p } + \boldsymbol {\Omega} \right ] \times \mathbf s -\frac{\mathbf s_{\rm a}}{\tau} +\delta\hat J\mathbf s + \mathbf I, \label{boltz10}$$ where $\mathbf s=\mathbf s(\mathbf p)$ is the spin density in the momentum space, related to the averaged spin by $\mathbf S = \int\mathbf s d^2 \mathbf p/(2\pi)^2$, $\mathbf s_{\rm a} =\mathbf s - \langle \mathbf s \rangle $ is the anisotropic part of the spin density, $\mathbf s_{i}=\langle \mathbf s \rangle $ is its isotropic part (here $ \langle \dots \rangle $ stand for averaging over directions of the electron momentum), $\mathbf I$ is the constant source, which we assume to be monoenergetic, $I \sim \delta(E-E_0)$, and $\delta \hat J$ is the WL-induced correction to the Boltzmann collision integral [@my; @dfi]. For $E=E_0,$ this correction reads (see Eq.(24) in Ref. [@my]) $$\delta \hat J \mathbf s=- \frac{\lambda l}{\pi \tau^2}\int_{-\infty}^t dt' \hat W( t-t') \mathbf s_{\rm a} (\mathbf p, t'). \label{dJ1}$$ Here $\lambda=2\pi\hbar/\sqrt{2mE_0},~~l=\tau\sqrt{2E_0/m}$ and $\hat W(t)$ is the time-nonlocal scattering kernel [@coment1]. Using Eqs. and we find a closed equation for the isotropic spin density in the stationary case $$\hat \Gamma (1-\hat \Lambda) \mathbf s_{\rm i}-\boldsymbol{\Omega} \times \mathbf s_{\rm i} =\mathbf I. \label{boltzstats}$$ Here $\hat \Gamma=\hat\tau_S^{-1}$ is the spin relaxation tensor (tensor of inverse relaxation times) given by [@dyak] $$\Gamma_{ik}=[\delta_{ik}\langle \omega_{\mathbf p}^2 \rangle-\langle \omega_{\mathbf p i} \omega_{\mathbf p k} \rangle]~\tau, \label{gamma00}$$ and the matrix $$\hat \Lambda=\frac{\lambda l}{\pi\tau} \int_{\tau }^{\infty}dt~ \hat W( t) \label{lambda}$$ describes WL correction ($\Lambda_{ik} \ll 1$) [@rot]. As follows from Eqs.  and , tensor $\hat \Gamma$ has two nonzero components: $\Gamma_{xx}=\Gamma_{yy}=\Gamma=mE_0\alpha^2\tau$ [@dyak]. We will assume that there exists a slow spin relaxation of the z component of the spin $\Gamma_{zz}=\epsilon \ll \Gamma.$ Such relaxation arises due to the cubic in $\mathbf p$ terms, neglected in the Hamiltonian , or due to other mechanisms of the spin relaxation. In the absence of the external magnetic field the scattering kernel is given by $W_{ik}=\delta_{ik}/4 \pi D t$ [@my]. Therefore, $\Lambda_{ik}=(\lambda/2\pi^2 l)\delta_{ik}\ln (\tau_{\varphi}/\tau),$ where phase breaking time $\tau_{\varphi}$ is taken as an upper cut-off of the integral in Eq. . Next we consider the dependence of $\hat \Lambda$ on the magnetic field for the case when $\mathbf B$ is parallel to $z$-axis. We start with discussing of the QW grown in $[100]$ direction. Since in this case $\hat z$ lies in the QW plane, the external field does not affect the orbital motion of the electrons and the Zeeman term $\hbar \Omega \hat \sigma_z/2 $ commutes with the Hamiltonian. As a consequence, the solution of Eq.  with $I=0$ and $B\neq 0$ can be obtained from solution at zero field: $\mathbf s_B(t)= \hat T(\Omega t) \mathbf s_{B= 0}(t),$ where $\hat T$ is $3\times 3$ matrix, describing rotation around z-axis by the angle $\Omega t$. In order that $\mathbf s_B(t)$ obeys Eq. , the scattering kernel has to be as follows: $$\hat W(t)= \frac{\hat T(\Omega t)}{4\pi D t}. \label{scatt}$$ Equations , and allows us to find the isotropic spin polarization. If $\mathbf I$ is perpendicular to the z-axis, we get $$\mathbf S= (1+\Lambda_c)\mathbf S_0+\left(\Lambda_s+ \Omega/\Gamma \right) \hat{\mathbf z} \times \mathbf S_0. \label{statt}$$ Here $\mathbf S_0= \int \mathbf I d^2\mathbf p/(2\pi)^2\Gamma,~\mathbf S= \int \mathbf s_{\rm i} d^2\mathbf p/(2\pi)^2,$ and $$\begin{aligned} \Lambda_c + i \Lambda_s &= \frac{\lambda}{2\pi^2 l}\int_{\tau}^{\infty} \frac{dt}{t}~e^{i\Omega t} \nonumber \\ & \approx \frac{\lambda}{2 \pi^2 l} \left [\ln \left(\frac{1}{\vert\Omega\vert \tau} \right) + \frac {i\pi}{2} \frac {\Omega }{\vert \Omega \vert} \right] \label{Lambda}\end{aligned}$$ For $\Omega/\Gamma \ll 1,$ the angle between $\mathbf S$ and $\mathbf S_0$ is $$\theta(\Omega) \approx \frac{\Omega}{\Gamma} +\frac{\lambda}{ 4\pi l}\frac {\Omega }{\vert \Omega \vert}. \label{hanle}$$ In this equation, $\Omega/\Gamma$ stands for the classical contribution, while the second term is due to WL effect. At small fields the classical contribution can be neglected. We see that WL contribution to $\theta$ is a non-analytic function of the magnetic field. At zero field the function $\theta(\Omega)$ has a discontinuity $$\theta(+0)-\theta(-0)=\lambda/2\pi l. \label{discount}$$ In deriving Eq. , we neglected inelastic scattering. Such scattering destroys phase coherence, thus suppressing WL contribution. In order to take it into account, we introduce a factor $\exp(- t/\tau_{\varphi})$ in the integrand in Eq. . As a result, we find $$\theta(\Omega) \approx \frac{\Omega}{\Gamma} +\frac{\lambda}{ 2\pi^2 l}\arctan (\Omega \tau_{\varphi}). \label{hanletauf}$$ This equation shows that for low temperatures, when $1/\tau_{\varphi} \ll \Gamma \lambda/l,$ the Hanle effect is still totally driven by WL at small $\Omega.$ With increasing the temperature, the WL-induced discontinuity is smeared out. Let us now consider the system with symmetric QW grown in $[110]$ direction, assuming again that $\boldsymbol{\Omega} \parallel \hat{\mathbf z}$ and $~\mathbf I \perp \hat {\mathbf z}.$ The above considerations can be applied with a slight modification of Eq. . Since in this case $\hat{\mathbf z}$ is normal to the QW plane, the external magnetic field also effects orbital motion of the electrons leading to the suppression of WL [@lee]. Including into the integral in Eq.  an additional factor $\gamma t/\sinh(\gamma t)$ [@chakrob], which accounts for destruction of WL by external field (here $\gamma=2eBD/\hbar c$), we obtain $$\theta= \frac{\Omega}{\Gamma}+ \frac{\lambda}{4\pi l} \frac{\Omega }{\vert\Omega\vert} \tanh{\left(\frac{g\lambda }{8 l }~\frac{m}{m_0}\right)}. \label{gg}$$ Next we find the stationary polarization for arbitrary directions of $\mathbf B$ and $\mathbf I$. We choose $x,y$ axes in such a way that $\Omega_x=0$. The classical solution ($\hat \Lambda=0$) reads $$\mathbf S \approx \left( \begin{array}{ccc} 1 & -\Omega_z/\Gamma & \Omega_y/\epsilon \\ \Omega_z/\Gamma & 1+\Omega_y^2/\epsilon\Gamma & \Omega_z\Omega_y/\epsilon \Gamma\\ -\Omega_y/\epsilon & \Omega_z\Omega_y/\epsilon \Gamma & \Gamma/\epsilon \end{array} \right) \frac{\Gamma ~\mathbf S_0 }{\Gamma+\Omega_y^2/\epsilon } \label{matrix}$$ (here we assumed $\Omega \ll \Gamma$). To find $\hat \Lambda $ we write [@my] $$W_{ij}(t) = \sum_{\beta\gamma\alpha\theta} \langle \gamma| \hat \sigma_i |\beta \rangle W_{\beta\gamma\alpha\theta}(0, t)\langle \alpha|\hat \sigma_j |\theta\rangle/2 , \label{transform}$$ where function $W_{\beta \gamma \alpha \theta}(\mathbf r,t)$ obeys [@iord; @knap; @pikus; @my] $$\begin{aligned} &K_{\beta \beta' \theta \theta'} W_{\beta'\gamma \alpha\theta'}(\mathbf r,t) =\delta(t) \delta(\mathbf r)\delta_{\alpha \beta} \delta_{\gamma\theta}, \label{K} \nonumber \\ &\hat K =\frac{\partial }{\partial t}- D\left(\nabla-2i e \mathbf A/\hbar c + i m \boldsymbol{\xi} [ \hat \sigma_z^{(1)}+\hat \sigma_z^{(2)}]/2\right)^2 \nonumber \\ & + i\boldsymbol{\Omega}[ \hat{\boldsymbol{\sigma}}^{(1)}-\hat{\boldsymbol{\sigma}}^{(2)}]/{2}.\end{aligned}$$ Here $\boldsymbol{\sigma}^{(1)}_{\beta \beta' \theta \theta'}= \langle\beta|\hat{\boldsymbol{\sigma}}| \beta'\rangle\delta_{\theta \theta'},$ $\boldsymbol{\sigma}^{(2)}_{\beta \beta' \theta \theta'}= \delta_{\beta \beta'}\langle \theta|\hat{\boldsymbol{\sigma}}| \theta'\rangle$ and $\mathbf A$ is the vector potential of external field. Using Eqs. , and one can find $$\hat \Lambda=\frac{\lambda}{2\pi^2 l} \int_{\tau }^{\infty} dt~\frac{ \gamma' }{\sinh(\gamma' t)}~ \hat T(\Omega_{z} t). \label{djj}$$ Here $\gamma'=2e\mathbf B \mathbf n D/\hbar c$ and $\mathbf n$ is the unit vector normal to the QW plane. It is worth noting that the rotation matrix, entering Eq. , depends only on z-component of the external field. Accounting for WL leads to the following replacement in Eq. : $$\Gamma \to \Gamma (1-\Lambda_c ),~~\Omega_z \to\Omega_z + \Gamma \Lambda_s,~~ \epsilon \to \epsilon (1-\Lambda_0), \label{replace}$$ where $\Lambda_c=(\lambda/2\pi^2 l)\ln (t_c/\tau ),~\Lambda_0=(\lambda/2\pi^2 l)\ln (t_0/\tau )$ and $\Lambda_s=(\lambda/4\pi l)\tanh(\lambda g m \Omega_z/8l m_0|\boldsymbol{\Omega}\mathbf n|)$ (here $t_0^{-1} \sim \max[|\gamma'|,\tau^{-1}_{\varphi}],~t_c^{-1}\sim \max[|\gamma'|,|\Omega_z|].$ Eqs.  and are valid both for \[110\] and \[100\] orientations provided that $\Omega_z \gg \Delta \Omega_z \sim \max[ \epsilon,\Omega_y^2/\Gamma,1/\tau_{\varphi}]$. One can show that the discontinuity of $\Lambda_s$ (at the point $\Omega =0$ ) is smeared over the frequency interval $\Delta \Omega_z. $ A case when $\mathbf I$ is parallel to $y$ axis is of particular interest. For $\Omega_y \gg \epsilon$ and $\Omega_z \ll \Gamma \Lambda_s$ we find $$\theta =\arctan \left( \frac{ \Gamma \Omega_y \Lambda_s}{\epsilon \Gamma + \Omega_y^2} \right ). \label{equation}$$ We see that $\theta \gg \Lambda_s$ due to the factor $\Gamma \Omega_y/(\Gamma \epsilon + \Omega_y^2) \gg 1.$ For $\Gamma \Omega_y/(\Gamma \epsilon +\Omega_y^2)\gg l/\lambda$ the z-component of the spin will be larger than y-component. Hence, the quantum effects might lead to rotation of spin by a large angle. In the above calculations we assumed that $\mathbf I$ is homogenous. For slowly varying $\mathbf I,$ the derived equations relate $\mathbf S(\mathbf r)$ with $\mathbf I(\mathbf r)$ provided that the spatial scale of inhomogeneity $L$ is large compared to $\sqrt{D/\Gamma}=1/m\alpha$ [@D/G]. One can show that in the opposite case $ l \ll L \ll 1/m\alpha,$ these equations also valid relating $\int d\mathbf r \mathbf S(\mathbf r)$ with $\int d\mathbf r \mathbf I(\mathbf r).$ Finally, we briefly discuss a possible experimental realization of the predicted effect. One of the most efficient ways of the spin injection is the optical excitation of interband transitions with circular polarized light [@optical]. The observation of the weakly localized regime requires that $\tau_{\varphi} \gg \tau_{S}$. In optical experiments, the phase breaking is due to both inelastic scattering (caused by electron-phonon and electron-electron interactions) and recombination of electrons with holes. The recombination of spin-polarized electrons with holes is suppressed in a n-type highly doped QW excited by low-intensity light. In this case, the number of spin polarized electrons is small compared to their total number and the holes are more probably to recombine with unpolarized electrons. Therefore, the stationary amount of holes is small and the recombination of polarized electrons with the holes can be neglected. The characteristic time of inelastic scattering will be large at low temperatures if the electrons are excited close to the Fermi level. In such a situation, the emission of the optical phonons is forbidden and the phase breaking is due to electron-electron collisions. Since the rate of such collisions decreases with approaching to the Fermi level, $\tau_{\varphi}$ can be tuned to be much longer than $\tau_S$. To conclude, the theory of Hanle effect in a 2D system is developed for the weakly localized regime. At low external magnetic fields the Hanle effect is totally driven by quantum interference effects. In the absence of inelastic scattering, the components of the spin polarizations are discontinuous as functions of the external field. We are grateful to K. V. Kavokin for useful discussions. This work has been supported by RFBR, a grant of the RAS, a grant of the Russian Scientific School 2192.2003.2, and a grant of the foundation “Dinasty”-ICFPM. Semiconductor Spintronics and Quantum Computation, eds. D.D. Awschalom, D. Loss, and N. Samarth (Springer-Verlag, Berlin, 2002). M.I. Dyakonov and V.I. Perel’, Sov. Phys. Solid State [**13**]{}, 3023 (1972). M.I. Dyakonov and V.Yu. Kachorovskii, Sov. Phys. Semicond. [**20**]{}, 110 (1986). Y. Ohno [*et al.*]{}, Phys. Rev. Lett. [**83**]{}, 4196 (1999). T. Adachi [*et al.*]{}, Physica E (Amsterdam) [**10**]{}, 36 (2001). W.H. Lau and M.E. Flatté, J. Appl. Phys. [**91**]{}, 8682 (2002). O.Z. Karimov [*et al.*]{}, Phys. Rev. Lett. [**91**]{}, 246601 (2003). K.C. Hall [*et al.*]{}, Phys. Rev. B [**68**]{}, 115311 (2003). S. Döhrmann [*et al.*]{}, Phys. Rev. Lett. [**93**]{}, 147405 (2004). F.G. Pikus and G.E. Pikus, Phys. Rev. B [**51**]{}, 16928 (1995) N.S. Averkiev and L.E. Golub, Phys. Rev. B [**60**]{}, 15582 (1999) A.A. Kisilev and K.W. Kim, Phys. Status Solidi (b) [**221**]{}, 491 (2000) J. Schliemann, J.C. Egues, and D. Loss, Phys. Rev. Lett. [**90**]{}, 146801 (2003). J. Schliemann and D. Loss, Phys. Rev. B [**68**]{}, 165311 (2003). , eds. F. Meier and B.P. Zakharchenya, (North Holland, Amsterdam, 1984). L.P. Gor’kov, A.I. Larkin, and D.E. Khmelnitskii, JETP Lett. [**30**]{}, 248 (1979). For review, see P.A. Lee and T.V. Ramakrishnan, Rev. Mod. Phys. [**57**]{}, 287 (1985). A.P. Dmitriev, I.V. Gornyi, and V.Yu. Kachorovskii, Phys. Rev. B [**56**]{}, 9910 (1997) I.S. Lyubinskiy, V.Yu. Kachorovskii, Phys. Rev. B, in press [**70**]{}, N. 16 (2004), cond-mat/0404391 A.G. Mal’shukov, K.A. Chao and M. Willander, Phys. Rev. B [**52**]{}, 5233 (1995). G. Dresselhaus, Phys. Rev. [**100**]{}, 580 (1955). Yu. Bychkov and E. Rashba, JETP Lett. [**39**]{}, 78 (1984). J. Nitta [*et al.*]{}, Phys. Rev. Lett. [**78**]{}, 1335 (1997). Assuming that the cyclotron frequency is small compared to $1/\tau,$ we neglect the term, which describes the momentum rotation by external field. To obtain Eq.  from Eq. (24) of Ref. [@my] we used the following property $\mathbf s_{\rm a }(-\mathbf p, t)=-\mathbf s_{\rm a }(\mathbf p, t).$ In deriving of Eq. , we took into account that $\hat W$ is proportional to the rotation matrix (see Eqs. , ). S. Chakravarty and A. Schmid, Physics Reports, [**140**]{}, 195 (1986) W. Knap [*et al*]{}, Phys. Rev. B [**53**]{} 3912 (1996) S.V. Iordanskii, Yu.B. Lyanda-Geller, and G.E. Pikus, JETP Letters [**60**]{}, 206 (1994). Note that $1/m\alpha$ is a characteristic scale of non-decaying spin oscillations which might exist in the system under discussion ( see Ref. [@loss1]).
It is fair to say we belong to a species obsessed by sex. We are among the only species to have sex for fun, not just for reproduction. For some other species, though, sex is far from fun. In fact, as two recent review papers show, it is a war zone, involving penis fencing and love darts. In 1897, the Italian zoologist Constantino Ribaga discovered a strange organ in female bedbugs, halfway up the abdomen. He suggested they used it to produce sound, like cicadas. But something wasn’t right: in the bundle of cells underneath this organ he found large quantities of sperm. Rich Naylor How did they get there? At the time, puzzled scientists concluded males must flood females with sperm, and the female digested the excess – as a “nuptial gift” – using this organ. But this theory was tenuous at best. It wasn’t until 1913 that males were observed stabbing females through this organ with a horrifying syringe-like penis, then copulating with the wound. Sperm swim directly to the ovaries through the body cavity. This has been termed “traumatic insemination”. In the first of the two papers, appearing in Biological Reviews, Rolanda Lange and colleagues at Tuebingen in Germany and Sheffield in the UK show that similar behaviour occurs across invertebrates. In snails, which are hermaphrodites, amorous advances involve “traumatic secretion transfer”, blasting potential mates at close range with “love darts” covered in psychoactive mucus. Understandably, neither party is keen to play the female role, involving being shot. In sea slugs this results in “penis fencing” – each attempting to penis-stab the other. An inflicted wound inoculates the recipient with sperm. Ronald Chase/Proceedings B Why would a male want to impale the mother of his future children? In a paper in Annual Review of Entomology, Nik Tatarnic and colleagues from Sydney in Australia and Sheffield in the UK focus on arthropods. They explain that stabbing is, in evolutionary terms, a game-changing tactic for males. To sire offspring obviously requires mating, but this is only a prelude. Much more crucial is fertilisation, and females understandably want to control when, where and by whom their eggs are fertilised. In many cases females are highly successful at this – by, for example, using their reproductive tract as a powerful tool to screen out all but preferred males. Females often simply eject unattractive males’ sperm, or filter it out chemically, and sometimes can close their tract entirely. Female control is especially widespread in insects, where females store sperm in a sac – sometimes for years, opening it to fertilise eggs at their leisure. Jonathan Waage/Science On the other hand, each male mating with a female would prefer his own sperm to fertilise the offspring. To achieve this, he must both overcome the female’s defences and beat her other mates – two neverending “arms races”. Males can beat rivals to the first step – that is, mating – by impressing females through courtship. This may also win favour at the fertilisation phase. But males are more sneaky than that, with outlandish adaptations to ensure their sperm win the race, like plugging females up, or scooping out rival sperm. Our own human organ may indeed have a dual function as a “sperm scoop”. Harry Moore/ABC Another solution is to try and directly overcome challenges posed by the females’ reproductive tract. Fruit fly males spike their sperm, drugging females into releasing more eggs, even though this shortens females’ lives. Wood mice females produce mucus that only strong-swimming sperm can cross. Ever resourceful, males’ sperm team up into long “snakes” that, together, altruistically push one lucky sperm through the mucus to success. Stabbing for the win Cassandra Willyard/lastwordonnothing.com Penis-stabbing, though, shifts the goalposts entirely. By injecting sperm directly into females’ body fluid, male bedbugs bypass the female’s adaptations to control access to her eggs. The female is injured in the process, reducing her number of offspring. But in the cold language of statistics, this may be worth it for the male – a healthy female is no good if she doesn’t bear his offspring. Males can both prevent females from excluding their sperm and also from preferring other males. Milan Rezac/Science Blogs This has been such a successful strategy for males that it has evolved repeatedly across the animal kingdom. Male Myzostoma worms secrete corrosive enzymes from their penis, dissolving a hole in the female’s skin into which they ejaculate. Male giant squid inject sperm packets into females’ arms – although occasionally they end up inseminating themselves, literally shooting themselves in the foot. In Harpactea sadistica spiders, the male bites the female, then stabs her with needle-like genitals, ejaculating into the wound. In some groups, like “bat bugs”, males spear females at random. In many others, though, females have evolved damage-limiting adaptations such as the bedbug “spermalege” (the organ discovered by Ribaga), offering an easy entry point to discourage indiscriminate stabbing. Some species have entire “paragenital systems” guiding sperm to their ovaries, while the regular reproductive apparatus shrivels from disuse. Macro Photography/Aculeata Research Males will often jump on and penis-stab anything that comes their way, even females of other species, often killing them in the process – a phenomenon that has driven some species to evolve apart. Male bedbugs regularly jump other males by mistake – which is such a problem that males in one species have evolved their own damage-control spermaleges. In an arms race, though, neither side can win – each can only gain a temporary advantage – and, as expected, females are fighting back. Astonishingly, some female bedbugs have evolved modified spermaleges that mimic those of males, to reduce harassment. Others have evolved ways of digesting the injected sperm and using it to repair their wounds, minimising the damage. The course of true love never did run smooth. For males and females locked in an arms race, though, it could be said to run in circles – vicious ones at that. And all to inject a little bit of romance.
Three projects and two cores make up this competing renewal program project grant application to study mechanisms of effect of novel immunotherapeutics used to treat animal models of autoimmune disease. The studies described within this application will study two novel immunotherapies (adoptive cellular gene therapy and DNA vaccination) in two animal models of autoimmune diseases (CIA and EAE) as well as attempt to understand the mechanism(s) of successful therapeutic intervention. These therapies are poised to enter clinical trials once mechanistic understanding of effect has been demonstrated. Adoptive cellular gene therapy (Project 1) using T cell hybridomas or dendritic cells as vehicles to deliver various regulatory proteins expressed as transgenes has been proposed. Three specific aims in this project will allow vector development and adaptation of vehicle technology from T cells to autologous dendritic cells as well as studies designed to understand the mechanisms of effect. Innovative therapy will also be studied using a novel model of the application of an immuno-inhibitory GpG-ODN in vaccination models, with a single base switch from CpG to GpG, that can effectively inhibit the immuno-stimulatory response of its CpG-ODN counterpart (Project 3). Moreover, this inhibitory GpG-ODN is capable of suppressing the disease severity of experimental autoimmune encephalomyelitis (EAE) in mice by apparently inducing a Th2 shift, much as DNA co-vaccination with genes encoding myelin and IL-4. Mechanistic analysis of therapeutic intervention in both models will be studied using mRNA microarray, proteomics and intracellular assays of protein expression (Project 2). It is hoped that the combination of these approaches, integrating state of the art technology, will speed mechanistic understanding, thus human trials. Well-described interactions among the three investigators during the past funding period as well as current innovative projects and appropriate use of the animal and administrative cores are outlined in the text.
Marvel’s James Gunn Fires Back At Angry Star Wars Fans There are few movie properties quite as iconic and beloved as Star Wars. The galaxy far, far away has been passed down across generations, leading to a mass of diehard fans who will gladly wait in line for each new release. But since George Lucas gave up control of the property to Disney, the fans seem to be taking umbrage with various filmmaking choices by directors like J.J. Abrams and Rian Johnson. The Last Jedi has taken a ton of backlash from the community, who don't agree with the liberal changes to the canon. The hate has gotten so deafening that some fans are trying to remake the movie entirely. Now Guardians of the Galaxy director/writer James Gunn has spoken up about the toxic fandom, dropping the mic on Twitter with: Star Wars (or any movie) may be important to you, but it doesn’t belong to you. If your self-esteem depends on how good you think the current Star Wars is, or your childhood is ruined because you don’t like something in a movie, GO TO THERAPY. James Gunn has had enough with angry Star Wars fans, who seem to be getting more volatile as Disney releases each new blockbuster. Because while film criticism is common (especially with iconic properties), there seems to be an extra level of hatred hurling toward everyone involved in The Last Jedi. That doesn't include Gunn himself, but he's got friends involved with the franchise, and has become used to internet trolls. James Gunn's Tweet comes from the recent increase in volatile Star Wars reactions. While The Last Jedi was released back in December, the movie has only continued to get hate in the following months. Actress Kelly Marie Tran was shown particular hate on social media for her portrayal of newcomer Rose Tico. In fact, she has since left Twitter, inspiring Rian Johnson, Mark Hamill, and more to come to her defense. Tico still hasn't returned to Twitter, although promotion for Episode IX will likely change that. Subscribe to our Newsletter Sign up below to receive our weekly email with the best content about movies, news and television from the team at CinemaBlend While plenty of Star Wars fans had issues with the events of Star Wars: The Last Jedi, the most common criticism seems to be that Rian Johnson took too many risks. He threw the rule book out as fast as Luke threw away his lightsaber, with changes being made to Force Ghosts, Leia's abilities, and more. While fans have a right to be gobsmacked by the film's contents, they seemed to have the exact opposite issues with The Force Awakens. When Episode VII came out in 2015, there were plenty who said it was too similar to A New Hope. So what does the community want? More or less risks from Star Wars filmmakers? Despite fan backlash, Disney is showing no signs of slowing down the Star Wars franchise. Solo: A Star Wars Story arrived in theaters a few weeks ago, while J.J. Abrams will complete the current trilogy with Episode IX. There's also Rian Johnson's developing trilogy, so Star Wars fans may have to deal with more divisive sequels in the near future. Episode IX will hit theaters on December 20, 2019. In the meantime, check out our 2018 release list to plan your next trip to the movies. How The Star Wars Prequel Should Use Ben Mendelsohn's Rogue One Character
Q: Why my button overlapping my input Text? My button is overwriting my text, not respecting my flex. The button should be at the bottom after the text, below the input texts. Can you help me with this? import React from 'react'; import { View, Text, TextInput, Button } from 'react-native'; export default props => ( <View style={{ flex: 1, padding: 10 }}> <View style={{ flex: 1, justifyContent: 'center', alignItems: 'center',marginTop: 30 }}> <Text style={{ fontSize: 25 }}>Teste</Text> </View> <View style={{ flex: 2}}> <TextInput style={{ fontSize: 20, height: 45 }} placeholder='E-mail' /> <TextInput style={{ fontSize: 20, height: 45 }} placeholder='Senha' /> <Text style={{ fontSize: 20 }}>Ainda não tem cadastro? Cadastre-se</Text> </View> <View style={{ flex: 2}}> <Button title="Acessar" color='#115E54' onPress={() => false} /> </View> </View> ); A: I have Tested In Android Platform It's Working Fine. render() { return ( <View style={{ flex: 1, padding: 10 }}> <View style={{ flex: 1, justifyContent: 'center', alignItems: 'center', marginTop: 30 }}> <Text style={{ fontSize: 25 }}>Teste</Text> </View> <View style={{ flex: 2 }}> <TextInput style={{ fontSize: 20, height: 45 }} placeholder='E-mail' /> <TextInput style={{ fontSize: 20, height: 45 }} placeholder='Senha' /> <Text style={{ fontSize: 20 }}>Ainda não tem cadastro? Cadastre-se</Text> </View> <View style={{ flex: 2 }}> <Button title="Acessar" color='#115E54' onPress={() => false} /> </View> </View> ); }
t u(a) = -a**2 + 66*a + 9. Calculate u(66). 9 Let l(q) = 175*q + 1227. What is l(-7)? 2 Let i(z) = -30*z**2 + 108*z + 41. What is i(4)? -7 Let m(h) = h**2 - 50*h + 260. What is m(44)? -4 Let r(h) = 2*h**3 - 21*h**2 + 25*h + 17. Determine r(9). -1 Let d(x) = 5*x**2 + 75*x + 248. Give d(-9). -22 Let k(s) = -13*s**2 + 181*s + 22. Calculate k(14). 8 Let f(q) = -561*q - 18512. What is f(-33)? 1 Let h(m) = 4*m**2 - 107*m + 233. Determine h(24). -31 Let u(o) = o**2 + o - 420. Determine u(-21). 0 Let h(b) = -7*b**3 + 6*b**2 - 2*b - 26. Determine h(3). -167 Let q(z) = -2*z**2 + 180*z - 348. What is q(88)? 4 Let o(f) = -5*f**2 - 5*f - 84. What is o(-9)? -444 Let n(x) = -x**3 - 48*x**2 - 42*x + 245. What is n(-47)? 10 Let f(q) = 716*q - 4930. Calculate f(7). 82 Let o(v) = -v**2 - 1191*v - 122772. What is o(-114)? 6 Let g(a) = a**3 - 26*a**2 + 12*a - 195. What is g(26)? 117 Let g(v) = -2*v**3 + 30*v**2 - 104*v + 16. Determine g(4). -48 Let n(w) = 40*w + 2450. Give n(-61). 10 Let f(h) = 3119*h - 46791. Give f(15). -6 Let j(i) = i**3 - 60*i - 24. Calculate j(-8). -56 Let s(j) = -j**3 - 8*j**2 + 17*j - 23. Calculate s(-10). 7 Let k(n) = 11*n**2 + 362*n - 29. Calculate k(-33). 4 Let t(i) = -7*i**2 + 455*i + 5246. Give t(-10). -4 Let x(s) = s**3 + 14*s**2 - 138*s + 189. Determine x(-21). 0 Let g(m) = 70*m + 1545. Calculate g(-22). 5 Let x(s) = 73*s**2 - 2336*s - 20. Calculate x(32). -20 Let h(z) = 70*z - 1336. Calculate h(19). -6 Let k(d) = d**2 - 19*d - 6. Give k(-6). 144 Let o(u) = 3*u**3 + 12*u**2 + 18*u + 39. What is o(-4)? -33 Let j(p) = -91*p + 1435. Calculate j(16). -21 Let t(g) = -402*g - 15680. Give t(-39). -2 Let j(y) = -y**2 - 27*y - 54. Determine j(-33). -252 Let k(s) = -1119*s + 32447. Calculate k(29). -4 Let l(i) = 2*i**3 - 23*i**2 - 4*i - 11. What is l(12)? 85 Let z(h) = -3*h**2 + 5*h. Calculate z(11). -308 Let h(y) = -42*y - 10. Determine h(-6). 242 Let x(w) = -2*w**2 + 36*w - 5. Calculate x(7). 149 Let w(u) = -2*u**2 - 5*u + 40. Determine w(-7). -23 Let h(l) = -l**3 + 52*l**2 - 94*l - 298. What is h(50)? 2 Let h(m) = -2*m**2 + 12*m - 113. Determine h(7). -127 Let m(q) = -q**2 - 62*q - 651. Calculate m(-48). 21 Let y(m) = -71*m + 3697. Determine y(52). 5 Let o(s) = -219*s + 31091. Determine o(142). -7 Let y(q) = 8*q**2 + 41*q + 175. Determine y(-5). 170 Let n(r) = r**2 - 16*r + 36. Give n(6). -24 Let p(d) = 23*d + 2641. Determine p(-115). -4 Let o(f) = 2*f**3 + 23*f**2 - 25*f - 30. Determine o(-13). -212 Let x(w) = -5*w + 135. Give x(31). -20 Let q(a) = 71*a - 3750. Determine q(53). 13 Let s(h) = h**2 + 33*h + 173. Give s(-30). 83 Let i(h) = -3*h**2 + 1212*h + 7377. Determine i(410). -3 Let z(j) = -35*j - 2. Determine z(-5). 173 Let t(k) = 360*k - 1436. Give t(4). 4 Let d(m) = -4*m**2 + 12*m. Give d(6). -72 Let b(t) = -67*t + 3784. Determine b(58). -102 Let q(z) = 30*z**2 + 1622*z + 27. Determine q(-54). -81 Let p(s) = -150*s - 6900. Determine p(-46). 0 Let u(b) = -5*b**2 + 97*b + 565. Calculate u(-5). -45 Let k(r) = -r**3 - r**2 - 3*r - 7. Calculate k(-2). 3 Let n(f) = -553*f**2 - 11*f - 10. What is n(-1)? -552 Let p(k) = 2*k**2 + 1997*k + 65588. Give p(-34). 2 Let g(t) = 2*t**2 + 6*t + 1. Give g(7). 141 Let r(q) = 41*q**3 - 13*q - 12. Calculate r(-1). -40 Let c(u) = u**3 - 2*u**2 - 64*u + 234. Determine c(5). -11 Let n(g) = -g**3 - 4*g**2 + 2*g + 32. What is n(-4)? 24 Let t(k) = k**3 - 43*k**2 - 183*k + 41. Calculate t(47). 276 Let p(c) = -6*c + 338. Calculate p(17). 236 Let k(q) = -3*q**2 - 240*q - 4805. Calculate k(-42). -17 Let t(p) = -1471*p - 16199. Calculate t(-11). -18 Let p(h) = -72*h + 2953. What is p(41)? 1 Let b(a) = -498*a + 3028. What is b(6)? 40 Let l(r) = 10*r**2 + 104*r + 40. Give l(-10). 0 Let g(l) = -l**3 - 5*l**2 + 201*l + 60. Give g(12). 24 Let p(c) = 22*c + 143. Give p(3). 209 Let c(z) = -z**2 - 124*z - 717. Determine c(-6). -9 Let r(w) = -12400*w - 62014. What is r(-5)? -14 Let m(o) = -2*o**2 - 232*o - 2848. Give m(-14). 8 Let r(g) = -g**3 + 12*g**2 - 21*g - 1. What is r(11)? -111 Let i(s) = 47*s - 1088. Give i(23). -7 Let c(n) = -n**2 - 74*n - 705. Give c(-11). -12 Let o(h) = 30*h - 87. What is o(7)? 123 Let s(x) = -9*x**2 - 13*x + 51. Give s(5). -239 Let j(z) = 3*z**3 - 3*z**2 + 2*z + 27. Determine j(-5). -433 Let t(y) = -y**3 - 29*y**2 + 176*y + 268. Calculate t(-34). 64 Let y(x) = x**3 - 56*x**2 - 57*x + 176. What is y(57)? 176 Let i(l) = 800*l + 10397. What is i(-13)? -3 Let i(b) = -5*b**2 + 17*b + 16. Determine i(5). -24 Let i(t) = -405*t - 482. Calculate i(-4). 1138 Let d(g) = g**3 - 36*g**2 + 39*g - 158. Give d(35). -18 Let k(p) = 260*p - 5716. What is k(22)? 4 Let a(z) = -2*z**3 - 14*z**2 - 16*z + 6. Give a(-2). -2 Let x(m) = 5*m**2 - 44*m + 119. What is x(5)? 24 Let a(c) = -c**3 + 13*c**2 + 8*c + 77. What is a(14)? -7 Let j(k) = k**3 + 20*k**2 - 5*k - 71. Give j(-20). 29 Let a(f) = f**3 + 118*f**2 - 2019*f - 3196. Calculate a(-133). -4 Let x(i) = -i**3 - 20*i**2 - 77*i - 58. Give x(-14). -156 Let u(g) = -g**3 - 14*g**2 + 26*g - 18. Calculate u(-8). -610 Let p(t) = 252*t - 21. What is p(1)? 231 Let s(k) = -k**2 + 192*k - 3742. Give s(22). -2 Let x(r) = -r**2 + 20*r - 54. What is x(18)? -18 Let n(g) = -75*g + 2324. Determine n(32). -76 Let n(h) = -h**2 + 15*h - 29. Determine n(13). -3 Let f(t) = -4*t**2 - 130*t + 69. What is f(-33)? 3 Let y(p) = -2*p**3 - 2*p**2 - 20*p + 12. What is y(-5)? 312 Let n(c) = 7*c**2 + 55*c + 467. Determine n(-9). 539 Let t(c) = -77*c + 24. Calculate t(-1). 101 Let m(a) = -47*a**2 - 98*a + 283. Determine m(3). -434 Let l(s) = s**2 + 92*s - 278. Give l(3). 7 Let o(t) = t**3 + 13*t**2 + 55*t + 80. What is o(-8)? -40 Let r(z) = z**3 - 6*z**2 - z - 119. What is r(0)? -119 Let q(w) = 37*w + 1213. Calculate q(-33). -8 Let z(l) = -2*l**2 - 32*l - 43. Calculate z(-15). -13 Let f(a) = -3*a**2 + 24*a + 5. Calculate f(8). 5 Let c(k) = -62*k - 3939. Calculate c(-64). 29 Let z(f) = -f**2 - 19*f - 87. Determine z(-14). -17 Let u(x) = -359*x - 33379. Determine u(-93). 8 Let n(c) = -5*c**3 - 4*c**2 - 46*c - 203. Give n(-4). 237 Let n(y) = -32*y + 515. What is n(17)? -29 Let d(n) = 10*n**2 - 129*n + 460. Determine d(4). 104 Let t(x) = -13*x**3 - 5*x + 6. What is t(2)? -108 Let j(q) = 240*q + 18726. Calculate j(-78). 6 Let f(u) = -u**3 + 61*u**2 + 792*u - 8. Determine f(72). -8 Let f(t) = 3*t**2 - 520*t + 708. Calculate f(172). 20 Let y(o) = -11*o**3 - 18*o**2 - 17*o + 5. What is y(-2)? 55 Let k(w) = -24*w**2 + 43*w + 2. Calculate k(2). -8 Let u(x) = -25*x - 746. Calculate u(-27). -71 Let o(h) = h**2 + 26*h - 45. Give o(-29). 42 Let q(m) = -m**3 + 23*m**2 + 24*m + 18. What is q(24)? 18 Let g(i) = -7086*i + 49610. What is g(7)? 8 Let n(z) = -297*z - 898. What is n(-3)? -7 Let n(y) = -y**2 - 109*y - 2948. Calculate n(-59). 2 Let v(w) = 7*w - 114. Determine v(34). 124 Let y(k) = -9*k**2 - 221*k + 82. Determine y(-25). -18 Let r(j) = 1124*j - 14628. Determine r(13). -16 Let v(k) = -2*k**2 + 22*k + 34. Calculate v(12). 10 Let b(k) = -8*k**3 - 272*k**2 - 3*k - 61. Give b(-34). 41 Let u(s) = -s**3 - 217*s**2 - 2073*s - 634. Give u(-207). -13 Let h(w) = -34*w + 474. Determine h(14). -2 Let o(d) = -3*d**3 - 30*d**2 - 53*d - 35. Determine o(-8). 5 Let a(n) = -197*n - 267. Determine a(-1). -70 Let o(h) = -62*h - 320. What is o(-6)? 52 Let u(v) = -55*v**2 + 95*v - 96. Give u(1). -56 Let t(n) = -4*n - 88. Determine t(-8). -56 Let q(f) = -f**3 + 4*f**2 - 2*f - 4. What is q(6)? -88 Let o(v) = -v**2 - 426*v + 1268. What is o(3)? -19 Let k(t) = -2*t**2 - 197*t - 1515. Determine k(-91). -150 Let h(p) = p**3 + 137*p**2 - 115*p - 21. Calculate h(1). 2 Let p(m) = -m**2 - 18*m + 913. Give p(-38). 153 Let q(z) = 32*z**2 + 9*z - 3. What is q(3)? 312 Let s(f) = f**2 - 6*f - 239. Calculate s(-14). 41 Let b(g) = 14*g**2 - 158*g + 113. Calculate b(8). -255 Let o(f) = -16*f + 81. Determine o(-6). 177 Let p(a) = a - 112. Calculate p(87). -25 Let i(p) = 2*p**2 + p + 10. What is i(4)? 46 Let q(n) = 140*n + 4659. Determine q(-34). -101 Let s(m) = -m**2 + 12*m - 52. Give s(8). -20 Let x(y) = y**2 - 2361*y + 11789. Determine x(5). 9 Let c(t) = -2*t + 206. What is c(-20)? 246 Let t(p) = -304*p - 5428. Determine t(-18). 44 Let m(z) = 3*z**3 + 17*z**2 + 9*z - 6. Calculate m(3). 255 Let f(c) = -c**3 + 86*c**2 + 297*c - 2664. Give f(89).
/* * Copyright 2012 Netflix, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.netflix.discovery.converters; import java.lang.annotation.Annotation; import java.lang.reflect.Field; import java.lang.reflect.Method; import java.util.Collections; import java.util.HashMap; import java.util.Iterator; import java.util.Map; import java.util.Map.Entry; import com.netflix.appinfo.AmazonInfo; import com.netflix.appinfo.DataCenterInfo; import com.netflix.appinfo.DataCenterInfo.Name; import com.netflix.appinfo.InstanceInfo; import com.netflix.appinfo.InstanceInfo.InstanceStatus; import com.netflix.appinfo.InstanceInfo.PortType; import com.netflix.appinfo.LeaseInfo; import com.netflix.discovery.shared.Application; import com.netflix.discovery.shared.Applications; import com.netflix.discovery.util.StringCache; import com.netflix.servo.monitor.Counter; import com.netflix.servo.monitor.Monitors; import com.thoughtworks.xstream.converters.Converter; import com.thoughtworks.xstream.converters.MarshallingContext; import com.thoughtworks.xstream.converters.UnmarshallingContext; import com.thoughtworks.xstream.io.HierarchicalStreamReader; import com.thoughtworks.xstream.io.HierarchicalStreamWriter; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * The custom {@link com.netflix.discovery.provider.Serializer} for serializing and deserializing the registry * information from and to the eureka server. * * <p> * The {@link com.netflix.discovery.provider.Serializer} used here is an <tt>Xstream</tt> serializer which uses * the <tt>JSON</tt> format and custom fields.The XStream deserialization does * not handle removal of fields and hence this custom mechanism. Since then * {@link Auto} annotation introduced handles any fields that does not exist * gracefully and is the recommended mechanism. If the user wishes to override * the whole XStream serialization/deserialization mechanism with their own * alternatives they can do so my implementing their own providers in * {@link EntityBodyConverter}. * </p> * * @author Karthik Ranganathan, Greg Kim * */ public final class Converters { private static final String UNMARSHAL_ERROR = "UNMARSHAL_ERROR"; public static final String NODE_LEASE = "leaseInfo"; public static final String NODE_METADATA = "metadata"; public static final String NODE_DATACENTER = "dataCenterInfo"; public static final String NODE_INSTANCE = "instance"; public static final String NODE_APP = "application"; private static final Logger logger = LoggerFactory.getLogger(Converters.class); private static final Counter UNMARSHALL_ERROR_COUNTER = Monitors.newCounter(UNMARSHAL_ERROR); /** * Serialize/deserialize {@link Applications} object types. */ public static class ApplicationsConverter implements Converter { private static final String VERSIONS_DELTA = "versions_delta"; private static final String APPS_HASHCODE = "apps_hashcode"; /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.ConverterMatcher#canConvert(java * .lang.Class) */ @Override public boolean canConvert(@SuppressWarnings("rawtypes") Class clazz) { return Applications.class == clazz; } /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.Converter#marshal(java.lang.Object * , com.thoughtworks.xstream.io.HierarchicalStreamWriter, * com.thoughtworks.xstream.converters.MarshallingContext) */ @Override public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { Applications apps = (Applications) source; writer.startNode(VERSIONS_DELTA); writer.setValue(apps.getVersion().toString()); writer.endNode(); writer.startNode(APPS_HASHCODE); writer.setValue(apps.getAppsHashCode()); writer.endNode(); for (Application app : apps.getRegisteredApplications()) { writer.startNode(NODE_APP); context.convertAnother(app); writer.endNode(); } } /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.Converter#unmarshal(com.thoughtworks * .xstream.io.HierarchicalStreamReader, * com.thoughtworks.xstream.converters.UnmarshallingContext) */ @Override public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { Applications apps = new Applications(); while (reader.hasMoreChildren()) { reader.moveDown(); String nodeName = reader.getNodeName(); if (NODE_APP.equals(nodeName)) { apps.addApplication((Application) context.convertAnother( apps, Application.class)); } else if (VERSIONS_DELTA.equals(nodeName)) { apps.setVersion(Long.valueOf(reader.getValue())); } else if (APPS_HASHCODE.equals(nodeName)) { apps.setAppsHashCode(reader.getValue()); } reader.moveUp(); } return apps; } } /** * Serialize/deserialize {@link Applications} object types. */ public static class ApplicationConverter implements Converter { private static final String ELEM_NAME = "name"; /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.ConverterMatcher#canConvert(java * .lang.Class) */ public boolean canConvert(@SuppressWarnings("rawtypes") Class clazz) { return Application.class == clazz; } /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.Converter#marshal(java.lang.Object * , com.thoughtworks.xstream.io.HierarchicalStreamWriter, * com.thoughtworks.xstream.converters.MarshallingContext) */ @Override public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { Application app = (Application) source; writer.startNode(ELEM_NAME); writer.setValue(app.getName()); writer.endNode(); for (InstanceInfo instanceInfo : app.getInstances()) { writer.startNode(NODE_INSTANCE); context.convertAnother(instanceInfo); writer.endNode(); } } /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.Converter#unmarshal(com.thoughtworks * .xstream.io.HierarchicalStreamReader, * com.thoughtworks.xstream.converters.UnmarshallingContext) */ @Override public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { Application app = new Application(); while (reader.hasMoreChildren()) { reader.moveDown(); String nodeName = reader.getNodeName(); if (ELEM_NAME.equals(nodeName)) { app.setName(reader.getValue()); } else if (NODE_INSTANCE.equals(nodeName)) { app.addInstance((InstanceInfo) context.convertAnother(app, InstanceInfo.class)); } reader.moveUp(); } return app; } } /** * Serialize/deserialize {@link InstanceInfo} object types. */ public static class InstanceInfoConverter implements Converter { private static final String ELEM_OVERRIDDEN_STATUS = "overriddenstatus"; private static final String ELEM_OVERRIDDEN_STATUS_ALT = "overriddenStatus"; private static final String ELEM_HOST = "hostName"; private static final String ELEM_INSTANCE_ID = "instanceId"; private static final String ELEM_APP = "app"; private static final String ELEM_IP = "ipAddr"; private static final String ELEM_SID = "sid"; private static final String ELEM_STATUS = "status"; private static final String ELEM_PORT = "port"; private static final String ELEM_SECURE_PORT = "securePort"; private static final String ELEM_COUNTRY_ID = "countryId"; private static final String ELEM_IDENTIFYING_ATTR = "identifyingAttribute"; private static final String ATTR_ENABLED = "enabled"; /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.ConverterMatcher#canConvert(java * .lang.Class) */ @Override public boolean canConvert(@SuppressWarnings("rawtypes") Class clazz) { return InstanceInfo.class == clazz; } /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.Converter#marshal(java.lang.Object * , com.thoughtworks.xstream.io.HierarchicalStreamWriter, * com.thoughtworks.xstream.converters.MarshallingContext) */ @Override public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { InstanceInfo info = (InstanceInfo) source; if (info.getInstanceId() != null) { writer.startNode(ELEM_INSTANCE_ID); writer.setValue(info.getInstanceId()); writer.endNode(); } writer.startNode(ELEM_HOST); writer.setValue(info.getHostName()); writer.endNode(); writer.startNode(ELEM_APP); writer.setValue(info.getAppName()); writer.endNode(); writer.startNode(ELEM_IP); writer.setValue(info.getIPAddr()); writer.endNode(); if (!("unknown".equals(info.getSID()) || "na".equals(info.getSID()))) { writer.startNode(ELEM_SID); writer.setValue(info.getSID()); writer.endNode(); } writer.startNode(ELEM_STATUS); writer.setValue(getStatus(info)); writer.endNode(); writer.startNode(ELEM_OVERRIDDEN_STATUS); writer.setValue(info.getOverriddenStatus().name()); writer.endNode(); writer.startNode(ELEM_PORT); writer.addAttribute(ATTR_ENABLED, String.valueOf(info.isPortEnabled(PortType.UNSECURE))); writer.setValue(String.valueOf(info.getPort())); writer.endNode(); writer.startNode(ELEM_SECURE_PORT); writer.addAttribute(ATTR_ENABLED, String.valueOf(info.isPortEnabled(PortType.SECURE))); writer.setValue(String.valueOf(info.getSecurePort())); writer.endNode(); writer.startNode(ELEM_COUNTRY_ID); writer.setValue(String.valueOf(info.getCountryId())); writer.endNode(); if (info.getDataCenterInfo() != null) { writer.startNode(NODE_DATACENTER); // This is needed for backward compat. for now. if (info.getDataCenterInfo().getName() == Name.Amazon) { writer.addAttribute("class", "com.netflix.appinfo.AmazonInfo"); } else { writer.addAttribute("class", "com.netflix.appinfo.InstanceInfo$DefaultDataCenterInfo"); } context.convertAnother(info.getDataCenterInfo()); writer.endNode(); } if (info.getLeaseInfo() != null) { writer.startNode(NODE_LEASE); context.convertAnother(info.getLeaseInfo()); writer.endNode(); } if (info.getMetadata() != null) { writer.startNode(NODE_METADATA); // for backward compat. for now if (info.getMetadata().size() == 0) { writer.addAttribute("class", "java.util.Collections$EmptyMap"); } context.convertAnother(info.getMetadata()); writer.endNode(); } autoMarshalEligible(source, writer); } public String getStatus(InstanceInfo info) { return info.getStatus().name(); } /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.Converter#unmarshal(com.thoughtworks * .xstream.io.HierarchicalStreamReader, * com.thoughtworks.xstream.converters.UnmarshallingContext) */ @Override @SuppressWarnings("unchecked") public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { InstanceInfo.Builder builder = InstanceInfo.Builder.newBuilder(); while (reader.hasMoreChildren()) { reader.moveDown(); String nodeName = reader.getNodeName(); if (ELEM_HOST.equals(nodeName)) { builder.setHostName(reader.getValue()); } else if (ELEM_INSTANCE_ID.equals(nodeName)) { builder.setInstanceId(reader.getValue()); } else if (ELEM_APP.equals(nodeName)) { builder.setAppName(reader.getValue()); } else if (ELEM_IP.equals(nodeName)) { builder.setIPAddr(reader.getValue()); } else if (ELEM_SID.equals(nodeName)) { builder.setSID(reader.getValue()); } else if (ELEM_IDENTIFYING_ATTR.equals(nodeName)) { // nothing; } else if (ELEM_STATUS.equals(nodeName)) { builder.setStatus(InstanceStatus.toEnum(reader.getValue())); } else if (ELEM_OVERRIDDEN_STATUS.equals(nodeName)) { builder.setOverriddenStatus(InstanceStatus.toEnum(reader .getValue())); } else if (ELEM_OVERRIDDEN_STATUS_ALT.equals(nodeName)) { builder.setOverriddenStatus(InstanceStatus.toEnum(reader .getValue())); } else if (ELEM_PORT.equals(nodeName)) { builder.setPort(Integer.valueOf(reader.getValue()) .intValue()); // Defaults to true builder.enablePort(PortType.UNSECURE, !"false".equals(reader.getAttribute(ATTR_ENABLED))); } else if (ELEM_SECURE_PORT.equals(nodeName)) { builder.setSecurePort(Integer.valueOf(reader.getValue()) .intValue()); // Defaults to false builder.enablePort(PortType.SECURE, "true".equals(reader.getAttribute(ATTR_ENABLED))); } else if (ELEM_COUNTRY_ID.equals(nodeName)) { builder.setCountryId(Integer.valueOf(reader.getValue()) .intValue()); } else if (NODE_DATACENTER.equals(nodeName)) { builder.setDataCenterInfo((DataCenterInfo) context .convertAnother(builder, DataCenterInfo.class)); } else if (NODE_LEASE.equals(nodeName)) { builder.setLeaseInfo((LeaseInfo) context.convertAnother( builder, LeaseInfo.class)); } else if (NODE_METADATA.equals(nodeName)) { builder.setMetadata((Map<String, String>) context .convertAnother(builder, Map.class)); } else { autoUnmarshalEligible(reader, builder.getRawInstance()); } reader.moveUp(); } return builder.build(); } } /** * Serialize/deserialize {@link DataCenterInfo} object types. */ public static class DataCenterInfoConverter implements Converter { private static final String ELEM_NAME = "name"; /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.ConverterMatcher#canConvert(java * .lang.Class) */ @Override public boolean canConvert(@SuppressWarnings("rawtypes") Class clazz) { return DataCenterInfo.class.isAssignableFrom(clazz); } /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.Converter#marshal(java.lang.Object * , com.thoughtworks.xstream.io.HierarchicalStreamWriter, * com.thoughtworks.xstream.converters.MarshallingContext) */ @Override public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { DataCenterInfo info = (DataCenterInfo) source; writer.startNode(ELEM_NAME); // For backward compat. for now writer.setValue(info.getName().name()); writer.endNode(); if (info.getName() == Name.Amazon) { AmazonInfo aInfo = (AmazonInfo) info; writer.startNode(NODE_METADATA); // for backward compat. for now if (aInfo.getMetadata().size() == 0) { writer.addAttribute("class", "java.util.Collections$EmptyMap"); } context.convertAnother(aInfo.getMetadata()); writer.endNode(); } } /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.Converter#unmarshal(com.thoughtworks * .xstream.io.HierarchicalStreamReader, * com.thoughtworks.xstream.converters.UnmarshallingContext) */ @Override @SuppressWarnings("unchecked") public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { DataCenterInfo info = null; while (reader.hasMoreChildren()) { reader.moveDown(); if (ELEM_NAME.equals(reader.getNodeName())) { final String dataCenterName = reader.getValue(); if (DataCenterInfo.Name.Amazon.name().equalsIgnoreCase( dataCenterName)) { info = new AmazonInfo(); } else { final DataCenterInfo.Name name = DataCenterInfo.Name.valueOf(dataCenterName); info = new DataCenterInfo() { @Override public Name getName() { return name; } }; } } else if (NODE_METADATA.equals(reader.getNodeName())) { if (info.getName() == Name.Amazon) { Map<String, String> metadataMap = (Map<String, String>) context .convertAnother(info, Map.class); Map<String, String> metadataMapInter = new HashMap<String, String>(metadataMap.size()); for (Map.Entry<String, String> entry : metadataMap.entrySet()) { metadataMapInter.put(StringCache.intern(entry.getKey()), StringCache.intern(entry.getValue())); } ((AmazonInfo) info).setMetadata(metadataMapInter); } } reader.moveUp(); } return info; } } /** * Serialize/deserialize {@link LeaseInfo} object types. */ public static class LeaseInfoConverter implements Converter { private static final String ELEM_RENEW_INT = "renewalIntervalInSecs"; private static final String ELEM_DURATION = "durationInSecs"; private static final String ELEM_REG_TIMESTAMP = "registrationTimestamp"; private static final String ELEM_LAST_RENEW_TIMETSTAMP = "lastRenewalTimestamp"; private static final String ELEM_EVICTION_TIMESTAMP = "evictionTimestamp"; private static final String ELEM_SERVICE_UP_TIMESTAMP = "serviceUpTimestamp"; /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.ConverterMatcher#canConvert(java * .lang.Class) */ @Override @SuppressWarnings("unchecked") public boolean canConvert(Class clazz) { return LeaseInfo.class == clazz; } /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.Converter#marshal(java.lang.Object * , com.thoughtworks.xstream.io.HierarchicalStreamWriter, * com.thoughtworks.xstream.converters.MarshallingContext) */ @Override public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { LeaseInfo info = (LeaseInfo) source; writer.startNode(ELEM_RENEW_INT); writer.setValue(String.valueOf(info.getRenewalIntervalInSecs())); writer.endNode(); writer.startNode(ELEM_DURATION); writer.setValue(String.valueOf(info.getDurationInSecs())); writer.endNode(); writer.startNode(ELEM_REG_TIMESTAMP); writer.setValue(String.valueOf(info.getRegistrationTimestamp())); writer.endNode(); writer.startNode(ELEM_LAST_RENEW_TIMETSTAMP); writer.setValue(String.valueOf(info.getRenewalTimestamp())); writer.endNode(); writer.startNode(ELEM_EVICTION_TIMESTAMP); writer.setValue(String.valueOf(info.getEvictionTimestamp())); writer.endNode(); writer.startNode(ELEM_SERVICE_UP_TIMESTAMP); writer.setValue(String.valueOf(info.getServiceUpTimestamp())); writer.endNode(); } /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.Converter#unmarshal(com.thoughtworks * .xstream.io.HierarchicalStreamReader, * com.thoughtworks.xstream.converters.UnmarshallingContext) */ @Override public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { LeaseInfo.Builder builder = LeaseInfo.Builder.newBuilder(); while (reader.hasMoreChildren()) { reader.moveDown(); String nodeName = reader.getNodeName(); String nodeValue = reader.getValue(); if (nodeValue == null) { continue; } long longValue = 0; try { longValue = Long.parseLong(nodeValue); } catch (NumberFormatException ne) { continue; } if (ELEM_DURATION.equals(nodeName)) { builder.setDurationInSecs((int) longValue); } else if (ELEM_EVICTION_TIMESTAMP.equals(nodeName)) { builder.setEvictionTimestamp(longValue); } else if (ELEM_LAST_RENEW_TIMETSTAMP.equals(nodeName)) { builder.setRenewalTimestamp(longValue); } else if (ELEM_REG_TIMESTAMP.equals(nodeName)) { builder.setRegistrationTimestamp(longValue); } else if (ELEM_RENEW_INT.equals(nodeName)) { builder.setRenewalIntervalInSecs((int) longValue); } else if (ELEM_SERVICE_UP_TIMESTAMP.equals(nodeName)) { builder.setServiceUpTimestamp(longValue); } reader.moveUp(); } return builder.build(); } } /** * Serialize/deserialize application metadata. */ public static class MetadataConverter implements Converter { /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.ConverterMatcher#canConvert(java * .lang.Class) */ @Override public boolean canConvert(@SuppressWarnings("rawtypes") Class type) { return Map.class.isAssignableFrom(type); } /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.Converter#marshal(java.lang.Object * , com.thoughtworks.xstream.io.HierarchicalStreamWriter, * com.thoughtworks.xstream.converters.MarshallingContext) */ @Override @SuppressWarnings("unchecked") public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { Map<String, String> map = (Map<String, String>) source; for (Iterator<Entry<String, String>> iter = map.entrySet() .iterator(); iter.hasNext(); ) { Entry<String, String> entry = iter.next(); writer.startNode(entry.getKey()); writer.setValue(entry.getValue()); writer.endNode(); } } /* * (non-Javadoc) * * @see * com.thoughtworks.xstream.converters.Converter#unmarshal(com.thoughtworks * .xstream.io.HierarchicalStreamReader, * com.thoughtworks.xstream.converters.UnmarshallingContext) */ @Override public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { return unmarshalMap(reader, context); } private Map<String, String> unmarshalMap( HierarchicalStreamReader reader, UnmarshallingContext context) { Map<String, String> map = Collections.emptyMap(); while (reader.hasMoreChildren()) { if (map == Collections.EMPTY_MAP) { map = new HashMap<String, String>(); } reader.moveDown(); String key = reader.getNodeName(); String value = reader.getValue(); reader.moveUp(); map.put(StringCache.intern(key), value); } return map; } } /** * Marshal all the objects containing an {@link Auto} annotation * automatically. * * @param o * - The object's fields that needs to be marshalled. * @param writer * - The writer for which to write the information to. */ private static void autoMarshalEligible(Object o, HierarchicalStreamWriter writer) { try { Class c = o.getClass(); Field[] fields = c.getDeclaredFields(); Annotation annotation = null; for (Field f : fields) { annotation = f.getAnnotation(Auto.class); if (annotation != null) { f.setAccessible(true); if (f.get(o) != null) { writer.startNode(f.getName()); writer.setValue(String.valueOf(f.get(o))); writer.endNode(); } } } } catch (Throwable th) { logger.error("Error in marshalling the object", th); } } /** * Unmarshal all the elements to their field values if the fields have the * {@link Auto} annotation defined. * * @param reader * - The reader where the elements can be read. * @param o * - The object for which the value of fields need to be * populated. */ private static void autoUnmarshalEligible(HierarchicalStreamReader reader, Object o) { try { String nodeName = reader.getNodeName(); Class c = o.getClass(); Field f = null; try { f = c.getDeclaredField(nodeName); } catch (NoSuchFieldException e) { UNMARSHALL_ERROR_COUNTER.increment(); } if (f == null) { return; } Annotation annotation = f.getAnnotation(Auto.class); if (annotation == null) { return; } f.setAccessible(true); String value = reader.getValue(); Class returnClass = f.getType(); if (value != null) { if (!String.class.equals(returnClass)) { Method method = returnClass.getDeclaredMethod("valueOf", java.lang.String.class); Object valueObject = method.invoke(returnClass, value); f.set(o, valueObject); } else { f.set(o, value); } } } catch (Throwable th) { logger.error("Error in unmarshalling the object:", th); } } }
DIY soylent – Week 1 DIY soylent – Week 1 So I completed 1 week of drinking soylent all week, I did have some other food (a piece of pizza, a little soup, some biscuits and gravy) which combined are about 750 calories for the week. While not insubstantial, it was less than 5% of what I ate. I wanted to log my results so that others could benefit from my experiences. Rather like the “Stuff I’ve learned through sad and painful experience (you’re welcome)” section I put in a tech conference class I taught about Amazon Web Services. So how do I feel about the soylent? I think the stuff is simply awesome. I’ve gotten to where I can mix up 3 days worth in about 6 minutes, preparing a meal involves dumping 2 half cups of powder into a blender bottle and adding water. I’m not having any of the heartburn issues that I had the first few days now that I’m adding the right amount of water and the almond meal was removed from the formulation. The recipe that I’m using right now (People Chow 3.0.1) is really good; superb, in fact. I suspect the only reason I would change anything is if Max (the creator) comes up with another tweak that makes it even better. The main complaint people have about the recipe (and just about all of the recipes) is the grittiness of the flour. Yes, it is a bit gritty; though far less so than the previous iteration. I find it very drinkable and usually just shake up my bottle, chug about a third of it, and then repeat again when I feel like it. Twice last week I only consumed 3/4 of my daily soylent, mostly because I wasn’t hungry, partly because of eating some “muggle” food. Still – I agree with most of the experiences I’ve read from others: no you aren’t hungry all the time. For that matter I’m rarely hungry and when I do feel hungry I drink some soylent and some water and I’m OK. On the topic of muggle/normal food: Earlier on I had some rather severe reactions to eating stuff besides soylent. I don’t know if that was because of the 2.3.0 version or what but the last two days what little I have eaten hasn’t caused me any discomfort or problems of any kind. How is my body reacting to a week on soylent? Very well, thank you. My gastrointestinal tract seems to like it just fine. The microbes that release foul smelling gas after feasting upon the insoluble sugars in bean skins appear to be rather sad though – since they appear to not be doing much of anything right now (meaning I’m not having a problem with gas, rather a vacation from it!). I’ve not had any issue with not enough or too much fiber (constipation or the runs). I feel like I have more energy, I wake up easier, don’t feel slow and bogged down after eating dinner. I’ve also gone from eating (far) too many calories to eating as much or even less than the 2000 calorie recommendation, especially when I add 30 minutes of elliptical. I was a little freaked out by the vitamins tinting my urine a bright neon yellow – though I was dehydrated; but others had the same issue and it’s apparently a well known reaction with certain vitamin supplements. I’ve found it easier to not eat junky snacks when (a) I’m already full from the soylent I drank a few hours ago (b) I can just mix up some more and (c) seriously? do I really want to eat that? If I do it might sit heavy in my stomach and I don’t even really want to – I just think I do. I started this whole endeavor as a way to lose weight. Thus far it’s working quite well. I know that’s not the aim of creating soylent but I have no problem using it for my own nefarious purposes. Until now I’ve posted a few graphs without a Y-axis label since I wanted to have more results before telling teh Intrawebs how much I weigh. Well, here is the graph for January 2014 using the tools from The Hackers Diet to account for variations in water and other factors. I’ve been using this since 2006 and have the process down fairly well: weigh at same time every day just before showering (plus removing other variables I won’t go in to). Weight log – January 2014 Yeah, that’s a VERY good trend =) It will be fun to see how it continues to go down over the next few months. I suppose if I really wanted to amp it up I could play around with the formulation or even go Shangri-la Diet on it and down the oil with my nose plugged but I’m content with how it’s going so far. In about a month or so I plan on getting some blood work done, mostly because my health insurance will pay me $50 to do a health assessment each year (cholesterol, triglycerides, blood pressure, etc…) but it will be good to see how I’m doing. Anyhow – I expect I’ll be doing a few weekly updates from here on out, now that the “exciting” or unknown is behind me. Share This Story, Choose Your Platform! Chris Bair is a technology and computer geek. He became involved in the powdered foods (aka "soylent") movement in January 2014, originally with a conventional recipe and later switching to a high fat, low carb "ketogenic" variant on October 2014. In January 2015 he created the recipe for Keto Chow and released it without restriction for anyone to use, at the same time he began mixing the recipe up for people that wanted a finished product and has seen steady growth in the business every month since. Chris has lived in Utah for most of his life, except for a few years living in Chile where he learned Castillian. Chris and his wife have two sets of twins with a couple singltons thrown in for good measure. KetoChow on Social Media The content of this website is not intended for the treatment or prevention of disease, nor as a substitute for medical treatment, nor as an alternative to medical advice. Use of recommendations is at the choice and risk of the reader. If you are on any medication, please consult with your family doctor before starting any new eating plan. Keto Chow is not intended to treat, cure or prevent any disease. Pregnant or breast feeding women should consult their health care professional before consuming. Flavor of the Week May 21-May 27: 10% off sale on Vanilla 2.1 week packsMore Info
Q: R: Multiple Linear Regression with a specific range of variables It appears simple, but I don't know how to code it in R. I have a dataframe (df) with ~100 variables, and I would like to do a multiple regression between the response which is my First variable (Y) and the variables 25 to 60 as regressors. The problem is that I don't want to write each variable name like: lm(Y~var25+var26+.......var60, data=df) I would like to use something like [, 25:60] to select a complete range. I have tried it but doesn't works: test <- lm(Y~df[, 25:60], data=df) summary(test) some idea? A: You could subset the dataset by selecting only those columns, and then do the lm. lm(Y~., data=df1[c(1,25:60)]) Suppose, if you need var25 to var60 and if the data is ordered by column names lm(Y~., data=df1[c(1,26:61)]) Or another option would be to use paste to create the formula lm(paste("Y ~", paste(paste0('var', 25:60), collapse="+")), data=df1) data set.seed(24) df1 <- as.data.frame(matrix(sample(1:80, 20*101, replace=TRUE), ncol=101, dimnames=list(NULL, c('Y', paste0('var', 1:100)))))
Q: What is the most efficient way to get borders in Google Apps Script What is the best way to get border details in Google Apps Script? I cannot see anything with borders in the documentation for GAS, so I have had to resort to getting borders through the Spreadsheet API. This works ok, other than when the number of borders gets large where it will take a long time to return, or not return at all. Is there a better way to do this? var fieldsBorders = 'sheets(data(rowData/values/userEnteredFormat/borders))'; var currSsId = SpreadsheetApp.getActiveSpreadsheet().getId(); var activeSheet = SpreadsheetApp.getActiveSheet(); var name = activeSheet.getName(); var data = Sheets.Spreadsheets.get(currSsId, { ranges: name, fields: fieldsBorders }); A: You want to reduce the process cost for retrieving the borders from a sheet in Spreadsheet. When I set the borders for 26 x 1000 cells and run your script, the process time was about 50 s in my environment. For this situation, you want to reduce the cost more. Your reply comment is perhaps it was a bigger sheet it was on, either way 50s is a long time to get the borders. The other calls to GAS take a very small amount of time to complete. Can you confirm this is the only way to get borders? If my understanding is correct, how about this workaround? In this workaround, I request directly to the endpoint of Sheets API for retrieving the borders. Workaround: Sample situation In this sample script, as a sample situation, I supposes the default sheet which has 26 columns x 1000 rows, and the borders are set to all cells. Sample script 1: In this sample script, the borders are retrieved by one API call. var ss = SpreadsheetApp.getActiveSpreadsheet(); var fileId = ss.getId(); var sheetName = ss.getActiveSheet().getName(); var token = ScriptApp.getOAuthToken(); var fields = "sheets/data/rowData/values/userEnteredFormat/borders"; var params = { method: "get", headers: {Authorization: "Bearer " + token}, muteHttpExceptions: true, }; var range = sheetName + "!A1:Z1000"; var url = "https://sheets.googleapis.com/v4/spreadsheets/" + fileId + "?ranges=" + encodeURIComponent(range) + "&fields=" + encodeURIComponent(fields); var res = UrlFetchApp.fetch(url, params); var result = JSON.parse(res.getContentText()); Result: When the sample script 1 was used, the average process time was 2.2 seconds. Although I'm not sure about the internal process of Sheets API of Advanced Google Service, it was found that when it directly requests to the endpoint, the process cost can be reduced. Sample script 2: In this sample script, the borders are retrieved with the asynchronous process by several API calls. var sep = 500; // Rows retrieving by 1 request. var ss = SpreadsheetApp.getActiveSpreadsheet(); var fileId = ss.getId(); var sheetName = ss.getActiveSheet().getName(); var token = ScriptApp.getOAuthToken(); var fields = "sheets/data/rowData/values/userEnteredFormat/borders"; var requests = []; var maxRows = 1000; var row = 1; for (var i = 0; i < maxRows / sep; i++) { var range = sheetName + "!A" + row + ":Z" + (row + sep - 1); requests.push({ method: "get", url: "https://sheets.googleapis.com/v4/spreadsheets/" + fileId + "?ranges=" + encodeURIComponent(range) + "&fields=" + encodeURIComponent(fields), headers: {Authorization: "Bearer " + token}, }); row += sep; } var response = UrlFetchApp.fetchAll(requests); var result = response.reduce(function(ar, e) { var obj = JSON.parse(e.getContentText()); Array.prototype.push.apply(ar.sheets[0].data[0].rowData, obj.sheets[0].data[0].rowData); return ar; }, {sheets: [{data: [{rowData: []}]}]}); Result: When the sample script 2 was used, the following results were obtained. When sep is 500 (in this case, 2 API calls are run.), the average process time was 1.9 seconds. When sep is 200 (in this case, 5 API calls are run.), the average process time was 1.3 seconds. But if the number of requests in one run are increased, the error related to the over of quotas occurs. Please be careaful this. Note: This is a simple sample for testing above situation. So I think that above script cannot be used for all situations. If you use above sample script, please modify it for your situation. References: fetchAll(requests) Benchmark: fetchAll method in UrlFetch service for Google Apps Script
FG pledges better funding of road projects nationwide – Fashola The Minister of Power, Works and Housing, Mr Babatunde Fashola, said the Federal Government would henceforth ensure better funding of the various ongoing road projects across the country. Fashola stated this in Abuja on Tuesday at a meeting he held with contractors handling various Federal Government’s projects in the country. Fashola told the contractors that funds would be made available in line with the Federal Government’s commitment to ensure that contractors were paid quarterly. He, however, urged the contractors to ensure that roads across the country were made passable ahead of the yuletide season by ensuring that failed sections of their various projects were rehabilitated. Fashola said the meeting was called for the contractors to inform the public what they should expect from the companies in the last months of the year when traffic is going to be heavy. The minister called on the contractors to ensure that they regularly informed members of the public of challenges contractors faced during raining seasons in the construction sector. “Let the Nigerian people know what is happening on our roads when they are not maintained during the raining season, also this happens in other part of the world. “Even with the best of maintenance, some rains are heavy and sometimes causes flooding, you will lose some of the infrastructure like it happened in some parts of America,” he said. In their various contributions at the meeting, the contractors called for better funding regime to address the current deplorable state of roads across the country. They blamed the deplorable state of roads on rains and poor funding. In his contribution, Mr Wolfgang Goetsch, the Managing Director of Julius Berger PLC, blamed the slow pace of project execution by his company across the country on inadequate funding. He said construction business was capital intensive that requires proper funding for future planning and management of both human and capital resources. Goetsch pledged the readiness of Julius Berger to expedite actions when funds were released as scheduled for the execution of its projects ahead of the yuletide season. Mr Nabeel Esawi, the Chief Engineer, Renold Construction Company (RCC), blamed the slow pace of project execution on the heavy rains, particularly in the southern part of the country. He said tremendous progress would be made during the dry season, adding that RCC had commenced the rehabilitation of failed sections of roads being handled by the company.
Echo depicts a nine-year old girl from Plensa’s Barcelona neighborhood, lost in a state of thoughts and dreams. Plensa’s sculpture also refers to an episode in Greek mythology in which the loquacious nymph Echo is forced as punishment to repeat only the thoughts of others. Both monumental in size and inviting in subject, the peaceful visage of Echo creates a tranquil and introspective atmosphere amid the cacophony of central Manhattan. One of his works, When Faith Moves Mountains, was inspired by a phrase from the bible (Mark 11:23) when he asked a group of 500 volunteers to move a 1,600-foot sand dune just using shovels. The work is neither a traditional sculpture nor an Earthwork, and nothing was added or built in the landscape. That the participants managed to move the dune only a small distance mattered less than the potential for mythmaking in their collective act; what was “made” then was a powerful allegory, a metaphor for human will, and an occasion for a story to be told and potentially passed on endlessly in the oral tradition. For Alÿs, the transitory nature of such an action is the stuff of contemporary myth. (The Guggenheim) To go with the piece were some definitions of faith provided by Alÿs, which chime with my own views of religion : The difference between faith and insanity is that faith is the ability to hold firmly to a conclusion that is incompatible with evidence, whereas insanity is the ability to hold firmly to a conclusion that is incompatible with evidence (William Harwood, Dictionary of Contemporary Mythology, London, 1st Books, 2002) and Faith is a means of by which one introduces resignation to the present, as an investment in the promise of an abstract future. This off course is the Catholic church par excellence. I would also recommend his video Tornado where he literally runs into the eye of the storm : For Alÿs, the dust storm suggests the imminent collapse of a system of government or of political order. The act of running into the storm, which we see repeated over and over again, also invites interpretation: is the artist no longer able to combat the chaos he encounters? Is he recognising the vanity of poetic gestures at a time of calamity? Or is it only within the chaos that he can challenge the turmoil around him? Reaching the centre of the storm, the artist is breathless and almost blinded, yet he encounters a furtive moment of peace that could hint at a new moment of possibility. (BBC) Set in Style: The Jewellery of Van Cleef & Arpels (Cooper-Hewitt Design Museum) : set in style is a very apt name because each piece was a miniature work of art. I have always thought of myself as not being motivated by money but the stunning exhibition came close to changing my mind Books The Blind Assassin (Margaret Atwood) : the title is also the title of a novel within this novel but the multi-layered structure fits perfectly with the multi-layered story which encompasses the multitude of layers in love and life Cinema The Trip (Michael Winterbottom) : wanted a dose of British humour and found myself laughing at completely different times from the American audience It was sad to hear of the death of Lucian Freud. He was my favourite living British artist and I can still remember going to his exhibition at Tate Britain way back in 2002. The best description of his work is the one from Freud himself that accompanied the show: “I paint people not because of what they are like, not exactly in spite of what they are like, but how they happen to be.” He wasn’t cruel—he painted what he saw. What strikes me most is, I look at my fat ankles and my fat feet every morning and I think they look just like that painting. Even the skinny girls don’t look good, do they? He painted out of love. So how do you move many billions of dollars in art through Philadelphia? “Very carefully,” says Barnes spokesman Andrew Stewart. The Wall Street Journal has a piece on the transportation of paintings from the Barnes Foundation to a new building six miles away near the Philadelphia Museum of Art. The move includes more than 181 paintings by Pierre-Auguste Renoir, 69 by Paul Cézanne and 59 by Henri Matisse – including the mural The Dance II. This reminded me of documentary I saw last year, The Art of the Steal, all about the contentious battle for ownership of the Barnes collection, which will culminate in next month’s move. It also reminded me of how I felt the documentary finished – that the art world is just as murky as Wall Street but at least on Wall Street they are honest enough to admit that it is all about the money.
Q: Detect and differentiate Android Tablet from Android Phone via JavaScript? I have seen Detecting whether Android device is a phone or a tablet with javascript but I want to know if there has been any newer, more stable way to do this as it seems the method described on the answer section is inconsistent. Basically, I have a website that I have an Android app for but I only want to alert those who are on mobile devices as I want to show the full site to tablet users. A: Another method would be to go by screen width/height. Tablets are larger than phones after all. For example, if you know you're dealing with either an android phone / tablet check the screen.width property. This method can be particularly useful if you're interested in taking advantage of larger resolutions which some tablets may have. Not all tablets will have a larger screen after all. I'd advise against using User Agents. They're dependant on the browser which the user is currently using.
Impact of fluorescent lighting on the browning potential of model wine solutions containing organic acids and iron. Model wine solutions containing organic acids, individually or combined, and iron(III), were exposed to light from fluorescent lamps or stored in darkness for four hours. (-)-Epicatechin was then added, and the solutions incubated in darkness for 10days. Browning was monitored by UV-visible absorption spectrophotometry and UHPLC-DAD. The pre-irradiated solutions containing tartaric acid exhibited increased yellow/brown coloration compared to the dark controls mainly due to reaction of the tartaric acid photodegradation product glyoxylic acid with (-)-epicatechin to form xanthylium cation pigments. In these solutions, browning decreased as the concentrations of organic acids other than tartaric acid increased. Xanthylium cations were also detected in the pre-irradiated malic acid solution. However, in the malic acid, succinic acid, citric acid and lactic acid solutions, any coloration was mainly due to the production of dehydrodiepicatechin A, which was largely independent of prior light exposure, but strongly affected by the organic acid present.
29 Pubs and Bars found in or around Osterley Once an old coaching inn, now a large Young's pub that's solid in the areas that you'd expect (well kept beer, pleasant atmosphere) also in those that you might not (separate Thai restaurant, quiz and live music with late... Not often you find a pub within the M25 that has a sign declaring 'Land of My Fathers' on its outside (particularly in Welsh) though there were no signs of anything particularly Cymric about the place on our visit. What we did... This is a Cask Marque approved pub, which means you can be assured you'll be served an excellent pint! We'll be sending one of our reviewers along very soon to review the pub for Fancyapint.com. In the meantime why not give... This is a Cask Marque approved pub, which means you can be assured you'll be served an excellent pint! We'll be sending one of our reviewers along very soon to review the pub for Fancyapint.com. In the meantime why not give... Proving the best pubs are often off the main drag, here's a fine place hidden away in a suburban street in Isleworth. It's quite a large affair, made up of two bars, filled with a fair amount of original features and a pretty... Brentford's first gastropub - operating since 2004 - should be a dream come true. Sat on a side street just behind a resiliently downmarket parade of shops, the original green-tiled exterior draws you closer. It's then you see... Close to Brentford station and football ground this seems like a handy and possibly congenial local boozer, which also offers accommodation. Looks can deceive. It may be that match days or the 6pm commuter rush sees this place... Almost too picturesque for its own good, this is an ideal pub to take your relations to if they want to see an olde worlde riverside pub. No great surprises behind the bar, but this place could probably sell tap water and still...
Effects of dietary supplementation with lactosucrose (4G-beta-D-galactosylsucrose) on cecal flora, cecal metabolites, and performance in broiler chickens. The effects of dietary lactosucrose on cecal flora, cecal metabolites, and performance were studied in eight 20-d-old and eight 62-d-old broiler chickens fed a basal diet (control) or a diet with .15% lactosucrose added. On Day 20 of age, the frequency of occurrence of lecithinase-negative clostridia were decreased (P < .05) by lactosucrose consumption. On Day 62 of age, the numbers of bifidobacteria were increased (P < .05) by lactosucrose consumption, but the counts of lecithinase-positive clostridia, including Clostridium perfringens, bacteriodaceae, and staphylococci, total anaerobic bacteria, and the frequency of occurrence of pseudomonads were decreased (P < .05). No detectable change was observed in counts of other organisms throughout the experimental period. Cecal concentration of ammonia (P < .01), phenol (P < .05), and cresol (P < .05) were decreased on Day 62 of lactosucrose consumption. Acetic acid and butyric acid were increased (P < .01 and P < .05, respectively) on Day 62 of lactosucrose consumption. Environmental ammonia and odor of chicken ceca were greatly reduced by lactosucrose consumption.
837 A.2d 30 (2003) James J. CONWAY, Jr., Plaintiff, v. ASTORIA FINANCIAL CORPORATION, Defendant. C.A. No. 19499. Court of Chancery of Delaware, New Castle County. Submitted: April 14, 2003. Decided: July 16, 2003. *31 Michael D. Goldman, Richard L. Renck, Potter Anderson & Corroon, Wilmington; Thomas P. Puccio, Law Offices of Thomas P. Puccio, New York City; Lawrence S. Robbins, Arnon D. Siegel, Robbins, Russell, Englert, Orseck & Untereiner, LLP, Washington, DC, for Plaintiff. Alan J. Stone, Megan E. Ward, Morris, Nichols, Arsht & Tunnell, Wilmington; Michael L. Hirschfeld, Mathew B. West, Daniel M. Perry, Milbank, Tweed, Hadley & McCloy, LLP, New York City, for Defendant. OPINION AND ORDER LAMB, Vice Chancellor. I. This action arises under a regulation adopted by the predecessor of the Office of Thrift Supervision, a bureau of the United States Department of the Treasury. That regulation was promulgated in 1969, in order to make uniform the director and officer indemnification practices of federally chartered savings associations. In this case, a former corporate officer who engaged in substantial misconduct in office seeks indemnification for his attorneys' fees and expenses relating to a class action resulting from his misconduct. This unquestioned malefactor refused to become a party to a stipulation of settlement that, nevertheless, resulted in the dismissal of all claims against him with prejudice. The question presented is whether by the simple ploy of refusing to participate in the settlement that greatly benefited him, the former officer can convert his indemnification claim from one that is permissive under the federal regulation to one that is mandatory. After examining the language, structure and purpose of the regulation, the court concludes that the claimant's refusal to participate in the settlement has no effect on the basis for his claim for indemnification. Because the judgment of dismissal was, conclusively, the product of a good faith settlement, the claim for indemnification is entirely permissive in character. II. Astoria Financial Corporation ("AFC"), a Delaware corporation, is a bank holding *32 company. AFC owns, among others, Astoria Federal Savings and Loan Association ("Astoria Federal"), the successor by merger of Long Island Savings Bank ("LISB" or the "Bank").[1] James J. Conway, Jr. was the Chairman of the Board of Trustees of LISB from 1976 until July 1993 and was the Chief Executive Officer of LISB from 1983 until July 1993. During his tenure with LISB, Conway maintained an ownership interest in Conway & Ryan, P.C. (the "Law Firm"). Conway initially held 65% of the Law Firm stock. In December 1984, he transferred 51% of the Law Firm stock to his daughter, Susan Conway Petrelli, and 5% to his other partners, leaving Conway with 9%. In January 1987, Petrelli transferred half of her interest, 25.5% of the Law Firm stock, to her sister-in-law, Denise Whelan Conway ("Whelan"). From 1982 until 1992, LISB was the Law Firm's primary client. The Law Firm represented LISB in most residential mortgage loan transactions. The fees from the mortgage transactions accounted for more than 90% of the Law Firm's revenues. Despite performing no client-related work for the Law Firm in 1982 or thereafter, Conway received nearly $4 million from the Law Firm. Petrelli, a recent law school graduate when she joined the Law Firm in 1984, received approximately $5 million from the Law Firm between 1985 and 1989. Whelan, also a junior attorney when she joined the Law Firm, received over $2 million from the Law Firm between 1987 and 1989. A portion of the money received by Petrelli and Whelan was spent at the direction or for the benefit of Conway. A. Conway's Scheme Is Revealed In 1989, in connection with certain litigation, LISB's attorneys ("Outside Counsel") performed a due diligence investigation into LISB officers' compensation and perquisites. Outside Counsel met with Conway as part of this work in March 1990, at which time Conway revealed details of his and his family's financial relationship with the Law Firm. In September 1990, Conway asserted that his communications with Outside Counsel were privileged and warned Outside Counsel that he would take legal action against them if they disclosed the communications to LISB. At the suggestion of Outside Counsel, a special committee of the LISB board was formed to investigate the relationship among Conway, members of his family, and the Law Firm. Conway and his family members refused to cooperate with the investigation, and Outside Counsel declined to cooperate in light of Conway's contention that his communication to Outside Counsel was privileged. In April 1992, the LISB board passed a resolution directing Outside Counsel to disclose the substance of the information that Outside Counsel had gathered concerning Conway's relationship with the Law Firm.[2] Outside Counsel informed Conway that Outside Counsel intended to *33 comply with the resolution. Conway commenced Doe v. Poe on May 15, 1992, to prevent Outside Counsel from disclosing the information. The trial court found that Conway could not have reasonably expected the communications to be confidential from the LISB board.[3] Conway's appeals were rejected[4] and, on June 21, 1993, the information from Outside Counsel became available to the LISB board. B. The OTS Disciplinary Proceeding On February 12, 1993, the United States Office of Thrift Supervision ("OTS"), the federal agency with regulatory jurisdiction over federally chartered thrift institutions such as LISB, began a formal investigation into Conway's relationship with the Law Firm. On February 24, 1994, Conway settled the OTS Disciplinary Proceeding, agreeing to an OTS Order in which the OTS stated that it had found from 1983 through 1989 Conway had failed to make required disclosures to LISB, its mutual members, and the Federal Home Loan Bank Board ("FHLBB").[5] The OTS concluded in its Order, as follows: [Conway] engaged in violations of federal conflict-of-interest and disclosure regulations, participated in conflicts of interest constituting an unsafe or unsound practice within the meaning of [relevant OTS regulations], and breached his fiduciary duty owed to [LISB].[6] Pursuant to 12 U.S.C. §§ 1818(b) and (e), the OTS Order imposed, and although admitting no wrongdoing Conway accepted, a lifetime ban on participation in the banking industry. Conway also was ordered to pay $1,300,000 in restitution to LISB. C. The Criminal Case In 1994, the United States Attorney for the Eastern District of New York began a criminal investigation into Conway's payments from the Law Firm. In February 1998, Conway entered into a plea bargain in which he pled guilty to a criminal misdemeanor information charging him with violating 18 U.S.C. § 215(a)(2).[7] As part of the plea agreement, Conway paid a $200,000 fine and was placed on probation.[8] D. The Weil Action The Weil Action, captioned Weil v. Long Island Savings Bank, began in March 1994,[9] shortly after an article about the OTS Order appeared in a Long Island newspaper and came to the attention of class counsel.[10] The class, consisting of more than 36,000 persons who had entered *34 into residential mortgages with LISB between 1983 and 1992, filed the suit against LISB, Conway, other members of the LISB board, and members of the Law Firm, alleging violations of federal statutes including the Racketeer Influenced and Corrupt Organization Act ("RICO"), the Truth in Lending Act, and the Real Estate Settlement Procedures Act ("RESPA") as well as common law claims for fraud and negligent supervision, among others. The complaint alleged that Conway, members of his family, the Law Firm, LISB, and the other members of the LISB board had engaged in a scheme to defraud members of the class by charging inflated legal fees in connection with residential mortgage closings that were used to fund kickbacks to Conway and his family from January 1, 1983 through December 31, 1992.[11] On November 7, 2001, all parties to the Weil Action except Conway executed a stipulation of settlement (the "Weil Stipulation") in which LISB agreed to pay a large monetary settlement on the condition that the claims against all defendants, including Conway, be dismissed. The Weil Stipulation recites that the dismissal with prejudice of the action as to all parties, including Conway, was effected "pursuant to the Settlement reached by the parties."[12] Conway did not object to the dismissal of claims against him, although he now asserts that he refused to join the settlement because he was determined to pursue his defense. On November 13, 2001, Conway entered into a separate stipulation with LISB and others, providing, among other things, as follows: [Conway] does not oppose approval of the settlement embodied in the [Weil Stipulation], including but not limited to the dismissal with prejudice of the action as against him, as specified in paragraph 14 of the [Weil Stipulation], and Conway will file no papers and offer no argument in opposition to the preliminary and final approval of the [Weil Stipulation].[13] In this stipulation, AFC agreed that the settlement did not bar Conway from seeking indemnification. On January 16, 2002, the federal district court approved the settlement and entered an order dismissing with prejudice the claims against Conway.[14] E. The Indemnification Request On January 15, 2002, Conway made a written request to the AFC board of directors and Astoria Federal board of directors for indemnification pursuant to the OTS's indemnification regulation (the "Indemnification Regulation"). The Indemnification Regulation provides, in relevant part, as follows: A Federal savings association shall indemnify its directors, officers, and employees in accordance with the following requirements: * * * (b) General. Subject to paragraph[] (c)... a savings association shall indemnify any person against whom an action is brought or threatened because that person is or was a director, officer, or employee of the association, for: (1) Any amount for which that person becomes liable under a judgment if [sic] such action; and (2) Reasonable costs and expenses, including reasonable attorney's fees actually paid or incurred by that person in *35 defending or settling such action ... if he or she attains a favorable judgment in such enforcement action. (c) Requirements. Indemnification shall be made to such person under paragraph (b) of this section only if: (1) Final judgment[15] on the merits is in his or her favor; or (2) In case of: (i) Settlement, (ii) Final judgment against him or her, or (iii) Final judgment in his or her favor, other than on the merits, if a majority of the disinterested directors of the savings association determine that he or she was acting in good faith within the scope of his or her employment or authority as he or she could reasonably have perceived it under the circumstances and for a purpose he or she could reasonably have believed under the circumstances was in the best interests of the savings association or its members.[16] In other words, indemnification is required, under this federally mandated scheme, in the circumstance described in subpart (c)(1), but is only permissive in the circumstances described in each of subparts (c)(2)(i)-(iii). After affording Conway the opportunity to be heard, both the AFC board and the Astoria Federal board denied Conway's request.[17] Both boards treated the request as falling under subpart (c)(2) of the Indemnification Regulation and found that Conway had not acted in good faith within the scope of his employment and could not have reasonably believed that his actions under the circumstances were in the best interests of LISB or its members. III. Conway began this suit on March 22, 2002, seeking indemnification from AFC for costs and attorneys' fees associated with Doe v. Poe, the OTS Disciplinary Proceeding, the Criminal Case, the Weil Action, and this lawsuit. Conway initially alleged that his claims for indemnification arose under Delaware law, LISB's bylaws, and his employment contract. Conway sought to recover not less than $4,550,000 for the previous suits plus the costs and fees associated with this lawsuit. AFC filed a motion for summary judgment seeking a dismissal of the complaint. Conway filed a cross-motion for summary judgment seeking reimbursement of approximately $1.825 million in fees and expenses associated the Weil Action. In the course of briefing his cross-motion, Conway abandoned his indemnification claims for costs associated with Doe v. Poe, the OTS Disciplinary Proceeding, and the Criminal Case. Nevertheless, Conway now argues that his remaining claim for indemnification relating to the Weil Action arises under the mandatory indemnification provision of 12 C.F.R. § 545.121(c)(1).[18] *36 IV. A. The Parties' Contentions Conway contends that he is entitled to mandatory indemnification pursuant to subpart (c)(1) of the Indemnification Regulation. This is so, he argues, because (i) the claims against him in the Weil Action were dismissed with prejudice and (ii) a "dismissal with prejudice" is synonymous with a "final judgment on the merits" in his favor within the meaning of the Indemnification Regulation. Conway argues by analogy to cases interpreting Federal Rule of Civil Procedure 41, which provides, for res judicata purposes, that a claim dismissed with prejudice "operates as an adjudication upon the merits." Thus, because the claim against Conway was dismissed with prejudice and cannot be brought against him again, he argues that he has received a judgment on the merits in his favor for the purposes of the Indemnification Regulation. AFC contends that Conway is not entitled to mandatory indemnification because, as used in the federal regulation at issue, the phrase "[f]inal judgment on the merits" is intended to exclude situations in which claims are dismissed as a result of a settlement.[19] AFC argues that the legislative history supports this assertion. For example, the Delaware and New York statutes as well as the Model Business Corporation Act require mandatory indemnification for a person who prevails "on the merits or otherwise."[20] In contrast, subpart (c)(2) of the Indemnification Regulation, originally promulgated after the Delaware, New York, and Model Business Corporation Act provisions, treats a judgment "other than on the merits" only as grounds for permissive indemnification. B. Summary Judgment Standard A court may grant summary judgment when "there is no genuine issue as to any material fact and ... the moving party is entitled to a judgment as a matter of law."[21] The moving party has the burden of showing that no issue of material fact exists.[22] In deciding a motion for summary judgment, the court must view all evidence in the light most favorable to the nonmoving party.[23] When the moving party has shown that no genuine issue of material fact exists, "the burden shifts to the nonmoving party to substantiate its adverse claim by showing that there are material issues of fact in dispute."[24] It is not enough, however, for the nonmoving party to simply assert the existence of a disputed fact.[25] The fact at issue must be material to the outcome of the case. V. The issue presented is whether for the purposes of the Indemnification Regulation a dismissal with prejudice resulting from a bona fide settlement is the same thing as a final judgment on the merits. *37 Conway points to Federal Rule of Civil Procedure 41 and recent federal case law as supporting his contention that a "dismissal with prejudice" is the same thing as a "judgment on the merits."[26] For example, in Semtek Int'l Inc. v. Lockheed Martin Corp., the United States Supreme Court stated that "`an adjudication upon the merits' is the opposite of a `dismissal without prejudice.'"[27] Conway reasons that if "adjudication upon the merits" is the opposite of "dismissal without prejudice," it follows that the ordinary meaning of "dismissal with prejudice" is the same as "adjudication on the merits." Despite whatever facial plausibility it may possess, Conway's argument is completely at odds with the overall structure and purpose of the Indemnification Regulation. As the Supreme Court recognized in Semtek, a judgment obtained as the result of the payment of money in settlement of a claim is not an "on the merits" adjudication: The original connotation of an `on the merits' adjudication is one that actually `pass[es] directly on the substance of a particular claim' before the court. That connotation remains common to every jurisdiction of which we are aware.[28] The court recognizes that the Semtek Court also observed that the meaning of judgment on the merits "`has gradually undergone change,' and it has come to be applied to some judgments ... that do not pass upon the substantive merits of a claim and hence do not (in many jurisdictions) entail claim-preclusive effect."[29] But there is no reason to believe that the Indemnification Regulation uses the phrase in this more modern meaning. Rather, the question is how to interpret this phrase in the context of the Indemnification Regulation as of the time of that regulation's adoption, and in light of its overall structure. The background and structure of the Indemnification Regulation lead the court to conclude that it is not intended to impose mandatory indemnification where the final judgment is the product of a bona fide settlement. The New York and Delaware statutes, enacted in 1963 and 1967 respectively, as well as the Model Business Corporation Act, developed in 1967, require mandatory indemnification when a director has been successful "on the merits or otherwise."[30]*38 In contrast, the Indemnification Regulation, originally promulgated by the FHLBB in 1969, is more narrow, and requires mandatory indemnification only when a director receives a "[f]inal judgment on the merits."[31] The regulation allows for permissive indemnification "[i]n case of ... [s]ettlement" or if "[f]inal judgment [is] in [the director's] favor, other than on the merits" when the board finds that the director was acting in good faith.[32] The Indemnification Regulation was promulgated shortly after the New York, Delaware, and Model Business Corporation Acts. Thus, it is reasonable to conclude the omission of the language "or otherwise" in the mandatory indemnification section and the inclusion of a permissive indemnification section in the case of settlement or for a judgment "other than on the merits" reflects an intentional choice on the part of the promulgating agency. From this, the court concludes that the drafters of the Indemnification Regulation intended to require indemnification only when a court passes on the substance of the case and enters judgment in favor of the person seeking indemnification. That did not happen here. Conway contends that because he refused to sign the Weil Stipulation, his demand for indemnification is not governed by the provision of § 545.121(c)(2)(i) that relate to indemnification in the case of "settlement." Nevertheless, it is abundantly clear that the dismissal of claims against Conway was entirely the result of the fact that AFC paid a large sum of money to settle all the claims in the Weil Action. Subpart (c)(2)(i) does not, by its terms, require that the person seeking indemnification settle the claims against him or her. Rather, the regulation speaks to settlements in general, making permissive indemnification available to a director "[i]n the case of ... [s]ettlement."[33] The Weil Action ended in settlement and the judgment dismissing the claims against Conway was a result of that settlement. For these reasons, the court concludes that Conway's refusal to join that settlement is irrelevant in deciding whether he is entitled to mandatory indemnification under the Indemnification Regulation. Conway's indemnification claim is controlled by § 545.121(c)(2)(i) and indemnification is only available to him at the discretion of the board of directors if the board determines that he "was acting in good faith within the scope of his ... employment."[34] The OTS's own interpretation of the Indemnification Regulation is consistent with this conclusion. Prior to denying Conway's indemnification request, the AFC board of directors requested an interpretation of § 545.121 from the OTS. In a March 15, 2002 letter, the OTS noted that the Indemnification Regulation allows for permissive indemnification "in the case of settlement, provided certain other requirements are satisfied" and only requires mandatory indemnification "if there is a final judgment on the merits in favor of the ... director."[35] In the OTS's opinion, Conway's case was "not a final judgment on the merits for purposes of 12 C.F.R. § 545.121" and, therefore, Conway was not entitled mandatory indemnification.[36] A federal agency's interpretation of its own regulation is entitled deference "unless plainly erroneous or inconsistent *39 with the regulation."[37] In this case, the OTS was interpreting its own regulation and did not have to follow a process outlined in the Administrative Procedures Act to develop its opinion.[38] The OTS's opinion is not plainly erroneous and is consistent with the Indemnification Regulation. Thus, the OTS opinion letter, with which this court's opinion is consistent, is entitled to deference. This decision does not mean, as Conway suggests, that a board of directors could enter into a settlement in bad faith, for the purpose of defeating a legitimate claim for mandatory indemnification under subpart (c)(1). Moreover, a board of directors has an obligation to act in good faith when considering a non-mandatory indemnification request pursuant to § 545.121(c)(2). And, a person who is denied permissive indemnification can file suit against the board and attempt to prove that the board acted improperly or otherwise in bad faith. Here, Conway has not challenged AFC's or Astoria Federal's denial of his indemnification request and, in light of Conway's criminal conviction and the findings in his disbarment hearing,[39] there is no reason to suspect that either board acted in bad faith in denying his request. VI. For the foregoing reasons, AFC's motion for summary judgment is GRANTED and Conway's cross-motion for summary judgment is DENIED. IT IS SO ORDERED. NOTES [1] LISB was initially organized as a mutual savings bank under New York law. In 1982, LISB was reorganized as a federally chartered mutual savings bank under Section 5 of the Home Owner's Loan Act of 1933, 48 Stat. 128, as amended, 12 U.S.C. §§ 1461-1470 (2001). In February 1994, LISB reorganized again, changing from mutual ownership to stock ownership, but remaining a federally chartered savings bank. Concurrently, a new entity, Long Island Bancorp ("LIB"), a holding company under Delaware law, was formed to serve as LISB's parent. In September 1998, LIB merged with AFC, with AFC the surviving corporation. Concurrently, LISB merged with AFC's subsidiary Astoria Federal, with Astoria Federal the surviving entity. [2] At the time, Conway was still the CEO and Chairman of the Board of Directors of LISB. [3] Doe v. Poe, 189 A.D.2d 132, 595 N.Y.S.2d 503 (N.Y.App.Div.1993), lv. denied, 81 N.Y.2d 711, 600 N.Y.S.2d 442, 616 N.E.2d 1104 (1993). [4] Doe, 600 N.Y.S.2d 442, 616 N.E.2d at 1104. [5] The FHLBB was replaced by the OTS in 1989. [6] Ward Aff., Ex. 21. [7] The misdemeanor information charged that Conway had: knowingly, intentionally and corruptly solicited, demanded, accepted and agreed to accept ... funds from the Law Firm paid directly to him, which were derived from the attorneys' fees that were paid to the Law Firm by LISB when borrowers closed their loans, intending to be influenced and rewarded in connection with the business and transactions of LISB, to wit: the assignment of the LISB residential mortgage closing work to the Law Firm. Ward Aff., Ex. 22, ¶ 6. [8] Compl., ¶ 19. [9] 188 F.Supp.2d 258 (E.D.N.Y.2002). The complaint incorrectly refers to March 1993, but all subsequent briefs refer to March 1994. [10] Jeanne Dugan Cooper, "Bank's Ex-Chairman Censured; Veteran of Long Island Savings Banned from Industry," Newsday 37, Mar. 3, 1994. [11] Weil, 188 F.Supp.2d at 260. [12] Ward Aff., Ex. 26, ¶ 14. [13] Ward Aff., Ex. 27, ¶ 2. [14] See Weil, 188 F.Supp.2d at 265. [15] The term "final judgment" is defined in the Regulation as "a judgment, decree, or order which is not appealable or as to which the period for appeal has expired with no appeal taken." 12 C.F.R. § 545.121(a)(1)(iii). [16] 12 C.F.R. § 545.121. [17] The membership of the AFC board and the Astoria Federal board is identical. [18] During the relevant period, LISB's bylaws provided that "[a]ny indemnification by the bank of the bank's personnel is subject to any applicable Board rules or regulations." Ward Aff., Ex. 34, LISB 1982 Bylaws, at Art. 4; see also Ward Aff., Ex. 35, LISB 1989 Bylaws, at Art. 4 (same); Ward Aff., Ex. 36, LISB 1993 Bylaws, at Art. 9 (same, but substituting "Office," referring to OTS, for "Board"). "Board" is defined in LISB's federal charter as the FHLBB. [19] 12 C.F.R. § 545.121(c)(1) [20] N.Y. Bus. Corp. § 724(a) (McKinney 1963) (renumbered § 723 and amended, 1986); 8 Del. C. § 145(c) (1967); Model Bus. Corp. Act § 4A(c) (1967). [21] Ch. Ct. R. 56(c). [22] Scureman v. Judge, 626 A.2d 5, 10 (Del.Ch. 1992), aff'd, 628 A.2d 85 (Del.1993). [23] See id. [24] Brzoska v. Olson, 668 A.2d 1355, 1364 (Del.1995) (affirming grant of summary judgment under similarly worded Super. Ct. R. 56). [25] Id. [26] See, e.g., Paganis v. Blonstein, 3 F.3d 1067, 1071 (7th Cir.1993) ("involuntary dismissal... is an adjudication on the merits-in other words, a dismissal with prejudice"); Dean v. Riser, 240 F.3d 505, 509 (5th Cir.2001) ("a dismissal with prejudice gives the defendant the full relief to which he is legally entitled and is tantamount to a judgment on the merits") (internal quotation marks omitted); Stewart v. U.S. Bancorp, 297 F.3d 953, 956 (9th Cir.2002) ("the phrase `final judgment on the merits' is often used interchangeably with `dismissal with prejudice'"). [27] 531 U.S. 497, 505, 121 S.Ct. 1021, 149 L.Ed.2d 32 (2001) (referring to a Rule 41 challenge). [28] Semtek, 531 U.S. at 501-02, 121 S.Ct. 1021 (citations omitted). [29] Id. at 502, 121 S.Ct. 1021 (quoting R. Marcus, M. Redish, & E. Sherman, Civil Procedure: A Modern Approach 1140-41 (3d ed. 2000)). While articulating a traditional rule regarding judgment on the merits, the Supreme Court makes clear that "judgment on the merits" does not necessarily have an ordinary meaning. The Semtek Court noted that when a court does not pass directly on the substance of a claim the Restatement (Second) of Judgments explicitly avoids describing the judgment as "`on the merits' or as `operating as an adjudication on the merits ... because of the possibly misleading connotations'" of that terminology. Restatement (Second) of Judgments ¶ 19, Comment a. [30] N.Y. Bus. Corp. § 724(a) (McKinney 1963) (renumbered § 723 and amended, 1986); 8 Del. C. § 145(c) (1967); Model Bus. Corp. Act § 4A(c) (1967). [31] 12 C.F.R. § 545.121(c)(1). [32] 12 C.F.R. § 545.121(c)(2)(iii). [33] 12 C.F.R. § 545.121(c)(2)(i). [34] 12 C.F.R. § 545.121(c)(2)(iii). [35] Ward Aff., Ex. 32. [36] Id. [37] Auer v. Robbins, 519 U.S. 452, 461, 117 S.Ct. 905, 137 L.Ed.2d 79 (1997); see also Chevron U.S.A. Inc. v. Natural Resources Defense Council, Inc., 467 U.S. 837, 104 S.Ct. 2778, 81 L.Ed.2d 694 (1984) (holding that an agency's interpretation of a statute that is administers is entitled deference so long as Congress has not directly spoken on the issue). [38] Conway argues that the OTS's opinion letter is not entitled Chevron deference because the standard for paying deference to an agency is limited to opinions or decisions arrived at after following a procedure outlined in the Administrative Procedure Act. See Christensen v. Harris County, 529 U.S. 576, 120 S.Ct. 1655, 146 L.Ed.2d 621 (2000); United States v. Mead Corp., 533 U.S. 218, 121 S.Ct. 2164, 150 L.Ed.2d 292 (2001). However, both Christensen and Mead involve an agency interpretation of a statute rather than of a regulation promulgated by the agency. [39] See In re Conway, 275 A.D.2d 24, 712 N.Y.S.2d 610 (2d Dept.2000).
Image copyright Pasco County Sheriff's Office Image caption The 18-year-old was arrested on Wednesday A Florida man has been charged after he was allegedly overheard raping a teenage girl during a gaming session, US media report. Reports say Daniel Enrique Fabian, 18, was playing Grand Theft Auto earlier this year when he allegedly assaulted a 15-year-old girl during a game break. Another player told police that Mr Fabian left a microphone on, and he heard a female in distress saying "no". The alleged victim told police she was held down and raped by Mr Fabian. A police affidavit says a medical examination supported the teenager's claim, local media report. The assault is said to have occurred in June at Mr Fabian's home in New Port Richey, western Florida. Reports claim he made a lewd comment about having sex with a girl he had coming over, before he returned to game-play about 15 minutes later. It is not clear whether the other gamer was the person who reported the alleged assault, local network WFLA report. The 18-year-old was arrested on Wednesday and has been charged with two counts of lewd and lascivious battery on a victim between ages 12 and 15 years old. Local media say he is being held on a $30,000 (£23,000) bond at a local detention centre.
is positive. f**(-651/4) Simplify ((v**30*v)/((v*v**(2/5))/v))**(-6) assuming v is positive. v**(-918/5) Simplify (j**(4/9))**(-3/10)*j**(9/4)*j**(-3/4) assuming j is positive. j**(41/30) Simplify (m**11/(((m**(-3/11)/m)/m)/m))/(m/(m*m/(m/(m/m**(2/15))))*(m*(m/(m/(m*m*m/(m*m**(3/17))))*m)/m*m)/m) assuming m is positive. m**(34546/2805) Simplify (y**(3/20)*(y*y**(-11/6))/y)/(y**(-9/5)*y**(-7/3)) assuming y is positive. y**(49/20) Simplify (i**(3/4))**(-33)/(i**(-3)/i)**(1/16) assuming i is positive. i**(-49/2) Simplify (c**(-2/7)*c*c*c)/c*c*c*c**(-2/17)*(c**5/c)**(-33/4) assuming c is positive. c**(-3499/119) Simplify t/((t/t**2*t*t)/t)*t**(-5/7)*t*(t/t**(2/37))/t**(2/3) assuming t is positive. t**(1216/777) Simplify (h**(2/17)*h*h**(2/23))/((((h/h**17*h)/h)/h*h*h)/(h**8*h)) assuming h is positive. h**(9855/391) Simplify (p*p*p**5*p*p*p*p/(p*p**(-1/4))*p*(p**(-2/11))**(-26))**(-28) assuming p is positive. p**(-4921/11) Simplify z**(7/5)/(z/z**(-36))*(z/(z**(-9/8)/z))**(-50) assuming z is positive. z**(-3837/20) Simplify (d**3)**(-3/19)/(d*d**4*d)**43 assuming d is positive. d**(-4911/19) Simplify (v*v**(-28)/v*v**(-39)*v)/(v/(v*v*(v/(v/(v**(-9)*v)))/v*v)*v/v**2) assuming v is positive. v**(-72) Simplify (c*(c*c**0)/c*c**6*(c*c*c**(1/4)*c)**(-22))**(-16/5) assuming c is positive. c**(1032/5) Simplify t**(3/10)*t*t*t/t**(9/5)*(t/(t*t**(-1)/t*t))/(t/(t**1*t)) assuming t is positive. t**(7/2) Simplify ((r**(3/5)*r)/((r/r**(2/27))/r))/(r**4/r)**33 assuming r is positive. r**(-13139/135) Simplify (p**(1/17)*p*p)/(p*p/p**(-3/5)*p)*(p**(3/10))**(-3/22) assuming p is positive. p**(-5917/3740) Simplify ((r**(-7/9)*r)**(-15))**(-29) assuming r is positive. r**(290/3) Simplify ((t**0*t)/t)**30*(t**(-1))**(-8) assuming t is positive. t**8 Simplify ((g*(((g/(g**(1/4)*g))/g)/g)/g)**(-15/8)/(g*g**1)**(2/33))**13 assuming g is positive. g**(56251/1056) Simplify (y**(-11/7)*y**(-32))/(y**(-2/7)/y*(y*y**(-30))/y*y) assuming y is positive. y**(-23/7) Simplify ((y**(-2/9)/y)/((y*y**(-3)*y)/y))**22 assuming y is positive. y**(154/9) Simplify ((((j/(j*j**(2/23)))/j)/j*j)/j*j)/(j**(3/5)*j)*(j**(-2/3)*j)/(j**(-21)*j) assuming j is positive. j**(6088/345) Simplify ((l**(-1/4))**37/(((l*(l**(-3)*l*l)/l*l)/l)/(l/l**(-1))))**(2/83) assuming l is positive. l**(-25/166) Simplify ((o**(1/16)/o)**(-21/4))**(-2/9) assuming o is positive. o**(-35/32) Simplify q**(-9/7)/(q**(3/10)*q*q)*q*q**(2/7)*q*q**(-1/14) assuming q is positive. q**(-48/35) Simplify (t/(t*t*t/((t/t**(-5)*t)/t)*t*t))/t*t**(2/9)*t*t*t**1*t**(-4)*t assuming t is positive. t**(11/9) Simplify (o**(-8/5)*o/(o*o/(o/(o/o**(2/9)))))**(2/33) assuming o is positive. o**(-214/1485) Simplify (v**(2/21)/v*v**(3/8))/(v**(1/5)*v)**(2/15) assuming v is positive. v**(-2897/4200) Simplify ((m**(-1)*m*m*m/(m*m**(-5/4))*m*m)/(m**1*m**(2/7)))**(-34) assuming m is positive. m**(-1411/14) Simplify ((h**(-3))**(2/29)/((h/(h*h*h**(-6)/h*h))/h**2))**(4/5) assuming h is positive. h**(-372/145) Simplify ((b*b**(-3/10)*b)/(b*b/(b*b**(-5)*b)))/(b*b**(1/4)*b*b/((b*b**5)/b*b)) assuming b is positive. b**(-11/20) Simplify (p**(1/4)/p**(-1/5)*(p/(p*p**0*p))/p**0)**(-18) assuming p is positive. p**(99/10) Simplify ((i**1*i*(i*(i/(i/(((i*i**(-4/5)/i)/i)/i)))/i)/i*i*i)/(i*i/(i/((i**0/i)/i)))**(-1/4))**(-9) assuming i is positive. i**(9/20) Simplify (g**0/g)**18*(g/(g/g**(-1/5))*g*g)/(g*g*g**(-14)) assuming g is positive. g**(-21/5) Simplify p**9/(p**(2/3)*p)*(p/p**(2/5))/p**(-2/51) assuming p is positive. p**(2033/255) Simplify (p/p**(-2/5))**(-1/46)*p*p**(3/10)*p*p*(((p**19*p)/p)/p)/p*p*p assuming p is positive. p**(2561/115) Simplify ((i**11/i**2)/(i**(-2/9)/i*i/(i**(-8)/i)))**5 assuming i is positive. i**(10/9) Simplify i/((i**(11/2)/i)/i)*((i**(1/19)/i)/i)/i*(i**(-1))**(-45) assuming i is positive. i**(1503/38) Simplify ((t/(t**(7/3)/t))/t*t*t**(20/9)/t)**(-10) assuming t is positive. t**(-80/9) Simplify (d*d/d**(-2/9)*d*d**8*(((d*d*d**(2/13)*d*d*d)/d)/d)/(d**(-1/4)*d*d))**(-3/4) assuming d is positive. d**(-5909/624) Simplify ((r**(5/2)*r)/r)**8*(r*(r*r*((r**5/r)/r)/r)/r*r)/r*r**(-2/19) assuming r is positive. r**(454/19) Simplify (t**11/t**(-5))**(6/37) assuming t is positive. t**(96/37) Simplify (((f*f**2)**(-2/3))**13)**(-5) assuming f is positive. f**130 Simplify d**(3/5)*d**6*d**10/(d/(d*d**(1/23))) assuming d is positive. d**(1914/115) Simplify (m**(-3/14)/m*m)/m*m*m/(m/(m/m**(-23))*m)*m**(2/9)/m**(-21) assuming m is positive. m**(5545/126) Simplify (z**(-3/5))**(-29)/(z/(z/(z**(1/3)/z)))**(-2/25) assuming z is positive. z**(1301/75) Simplify ((z*z**0*z)**(-2/11)/(z*z/(z*z/z**0))**(1/63))**(-2/5) assuming z is positive. z**(8/55) Simplify (d/(d/d**(-4/11))*d*d)/d*d**2*d**(-14)/(d/((d/(d*(d/((d*d*d*d**(3/11)*d)/d))/d*d))/d)) assuming d is positive. d**(-122/11) Simplify (((s/s**6)/(s/(s*(s/((s**(-2/11)/s)/s))/s)))**34)**23 assuming s is positive. s**(-24242/11) Simplify (s/(s*s**17))**45/(s**(-3/16)*s*(s/((s*s*(s**(3/8)/s)/s)/s))/s) assuming s is positive. s**(-12263/16) Simplify (w**(-3))**(-24/11)*w**(-20)*w/(w/(w*w/w**11)) assuming w is positive. w**(-247/11) Simplify ((o**(-6)*o)/(o/((o*o*o*o/(o/(((o/(o*(o/(o*((o**(1/2)/o)/o)/o*o))/o*o*o*o)*o)/o)/o)))/o)))/(o**(-14)*o**0) assuming o is positive. o**(11/2) Simplify ((w**(-3/7)/w)/(w/w**(-4)))/((w/((w*w*w**(-8/3)*w*w*w)/w)*w)/w**29) assuming w is positive. w**(460/21) Simplify ((p*p**(-5)*p*p**(2/5))/(p**(-7)/p**(1/2)))**(-10/3) assuming p is positive. p**(-49/3) Simplify ((n**3/n)/n*(n*n**(-10))/n*n**(-8)*n/n**6)**(-10) assuming n is positive. n**220 Simplify (((v**(-2/9)/v)/v**(-1))**44)**(-28) assuming v is positive. v**(2464/9) Simplify ((r/(r/((r*r/(r**(-20/9)/r))/r)))**(-43))**(-1/15) assuming r is positive. r**(1634/135) Simplify (a/((a/a**(25/3))/a)*a*(a/(a**14/a))/a)**(-24) assuming a is positive. a**64 Simplify (l**(3/2)/l)**(-17/3)/(((l*l/l**10)/l)/l**(-12)) assuming l is positive. l**(-35/6) Simplify c**3/(c/(c/(c*c**(-14))))*(c**(4/5))**(-12) assuming c is positive. c**(32/5) Simplify ((b/b**(3/2))/b)**13*b**(2/9)*b/(b/b**13)*b*b*b assuming b is positive. b**(-59/18) Simplify ((g*(g/g**23)/g*g)/g)/g**(-5/2)*(g**(-2/7)/g)/(g**24*g) assuming g is positive. g**(-641/14) Simplify (m**(1/4)/m)/((m**(-10)*m)/m)*(m/(m*m/m**(-8/5)))**(-34) assuming m is positive. m**(1953/20) Simplify (d**(-5)*d)**(-40)/((d*d/(d/d**1))/d**(-1/26)) assuming d is positive. d**(4107/26) Simplify ((x/x**(-1/2)*x*x)/x)**(1/17)*x/(((x**(-1)/x*x)/x)/x)*x**(-5)/x assuming x is positive. x**(-63/34) Simplify i**(2/37)*i*i*i**(-9/5)*i*(i*i/(i*i**23)*i)/(i/i**(-16)*i) assuming i is positive. i**(-6983/185) Simplify i/(i/(i*i*i/i**31))*i*i**(-12)*(i/i**(-7))**(2/73) assuming i is positive. i**(-2831/73) Simplify (y**(2/3)*y*y/(y*(y*y**(-2/3))/y)*(y/(y**(-1/2)*y))**(-1/8))**(16/9) assuming y is positive. y**(109/27) Simplify ((p**(-1/17)*p)/(p/p**2*p))/(p*p/(p**(-2/27)*p*p)*p*p*p**(2/23)*p) assuming p is positive. p**(-23435/10557) Simplify (f**0*f*f)**6/(f*f/(f/((f*f**3)/f))*f)**(-18) assuming f is positive. f**102 Simplify (r/(r/r**10*r))**(3/26)/((r*(r**27/r)/r)/r*r/(r**(-8/7)/r*r)*r) assuming r is positive. r**(-4933/182) Simplify ((k**(-13)*k)/k)/((k**(-1/36)*k)/k)*(k/(k**(-18)*k))**(-9) assuming k is positive. k**(-6299/36) Simplify w/(w**(-4/5)/w)*w*w*w**(2/19)*(w/w**6)**(1/38) assuming w is positive. w**(907/190) Simplify (s**(-1/6))**(1/39)*(s*((s*s**(-1/2))/s)/s*s)/(s*s**(-1/12)*s*s) assuming s is positive. s**(-1133/468) Simplify q**3*q*q*q*q**1*q**(-2/31)/(q**0/q) assuming q is positive. q**(246/31) Simplify (n**(-9))**50/((n/(n*n**26)*n)/(n*n*((n*n/(n/(n*n**(-21)/n))*n)/n*n)/n)) assuming n is positive. n**(-443) Simplify (j**(-2/11)/j)**(3/5)/((j*(j/((((j*j**15)/j*j)/j)/j))/j*j)/j)**9 assuming j is positive. j**(6396/55) Simplify (z/(z/(z/(z/z**4)))*(z/(z/(z/((z/((z/z**10)/z))/z)*z)))/z*(z**2/z)/((z*(z/(z**8*z))/z)/z))**(-1/2) assuming z is positive. z**(-5/2) Simplify ((x/(x**(-5)*x)*x)/x)/((x**17*x)/x)*((x*(x**(-11)/x)/x*x)/x)**(5/12) assuming x is positive. x**(-17) Simplify ((c*c**(-23))/c)/c**8*(c**(-24)*c*c)/c**(2/87) assuming c is positive. c**(-4613/87) Simplify ((l/((l/(l/l**4))/l))/(l*l*l/l**(-12/5)))/((l**(-8/9)/l)/(l/((l*l**(7/6))/l))) assuming l is positive. l**(-511/90) Simplif
Q: When editing data in JQuery popup, data of only first row is displayed for all rows I am using JQuery DataTable in MVC3 for displaying list of users. I am opening a JQuery dialog for editing data, but in dialog the data of first row is only displayed for all rows. Below is my View: @model IEnumerable<EditorDataTable.Models.UserModel> @{ ViewBag.Title = "Index"; Layout = "~/Views/Shared/_Layout.cshtml"; } <div id="mypopup" style="display:none;"> <label id="lblFirstName">FirstName</label> <br /> <input type="text" id="txtFirstName" name="txtFirstName" /> <br /> <label id="lblLastName">LastName</label> <br /> <input type="text" id="txtLastName" name="txtLastName" /> <br /> <label id="lblCity">City</label> <br /> <input type="text" id="txtCity" name="txtCity" /> <br /> <input type="submit" id="btnUpdate" value="Update" /> </div> <table id="example" class="display"> <thead> <tr> <th> FirstName </th> <th> LastName </th> <th> City </th> <th> Action </th> </tr> </thead> <tbody> @foreach (var item in Model) { <tr class="even gradeC"> <td> @Html.DisplayFor(modelItem => item.FirstName) </td> <td> @Html.DisplayFor(modelItem => item.LastName) </td> <td> @Html.DisplayFor(modelItem => item.City) </td> <td class="click"> @Html.HiddenFor(modelItem => item.UserID,"Value") <a href="#" id="edit">Edit</a> </td> </tr> } </tbody> </table> Below is my jQuery: $(document).ready(function () { $('#example').dataTable({ }); $(".click").on('click', function (e) { $("#txtFirstName").val(""); $("#txtLastName").val(""); $("#txtCity").val(""); var UserId = $("#item_UserID").val(); $("#mypopup").dialog(); $.ajax({ type: "GET", url: "Home/EditData", data: { UserId: UserId }, dataType: "json", contentType: "application/json; charset=utf-8", success: function (data) { if (data) { $("#txtFirstName").val(data.aaData[0][0]); $("#txtLastName").val(data.aaData[0][1]); $("#txtCity").val(data.aaData[0][2]); } } }); }); }); I have taken a hidden field in which I am storing my UserID, using which I am fetching my user data, but every time I am getting the UserId of first row only. A: Instead of taking a hidden variable, I have given id to my td as below: <tbody> @foreach (var item in Model) { <tr class="even gradeC"> <td> @Html.DisplayFor(modelItem => item.FirstName) </td> <td> @Html.DisplayFor(modelItem => item.LastName) </td> <td> @Html.DisplayFor(modelItem => item.City) </td> <td class="click" id="@item.UserID"> <a href="#" id="edit">Edit</a> </td> </tr> } </tbody> And on click of Edit I am using this id to fetch data as below in my js: $(document).ready(function () { $('#example').dataTable({ }); $(".click").on('click', function (e) { $("#txtFirstName").val(""); $("#txtLastName").val(""); $("#txtCity").val(""); var UserId = this.id; $("#mypopup").dialog(); $.ajax({ type: "GET", url: "Home/EditData", data: { UserId: UserId }, dataType: "json", contentType: "application/json; charset=utf-8", success: function (data) { if (data) { $("#txtFirstName").val(data.aaData[0][0]); $("#txtLastName").val(data.aaData[0][1]); $("#txtCity").val(data.aaData[0][2]); } } }); }); }); Its working now, for each row i am getting the id of that row only.
Great reasons to adopt your next pet Metro ServiceAnimal shelters, rescue groups, pounds, and humane societies are great places to begin searching for new companion animals. ■ Metro Service There is no end to the companionship, love and joy a pet can bring to one’s life. That is perhaps one reason why the number of pets surrendered to shelters each year so greatly upsets animal lovers. But the same places that house animals that were lost or abandoned can be the very locations where families find new pets to love. The ASPCA estimates that 6.5 million companion animals enter animal shelters in the United States each year. According to its most recent report, the Canadian Federation of Humane This content is restricted to site members. If you are an existing user, please log in. New users may register below.
Corrupt bribery about 4000000 ten years before the incident returned the money 200 thousand – Beijin-cosmax Pay back the money 200 thousand – Beijing – penitent corrupt bribery about 4000000 ten years before the incident: Zhu Yunyan – the former positions: Hainan Province, Qionghai City People’s Congress Standing Committee, vice mayor of the city of crime: Crime of bribery – verdict: June 28, 2016, Hainan first intermediate people’s court for taking bribes sentenced Zhu Yunyan to ten years. Deprivation of political rights for one year and fined 700 thousand yuan. After the first instance verdict, Zhu Yunyan said no appeal. The facts of the crime: from 2003 to 2014, Zhu Yunyan served as deputy mayor of Qionghai Municipal People’s government, the Qionghai Municipal People’s Congress, taking advantage of his position, in the construction project bidding and construction, improve the real estate project volume rate, handle real estate license and approval of project planning, project planning, allocation of Engineering adjustment function the change of land use, and to accept the trust of others, for the benefit of others, has received Yang Moumou other individuals and units bribes totaling 4 million 150 thousand yuan and 1 a value of 14 yuan of Dongfeng Nissan brand of small cars. May 18, 2015 is the most memorable day of my life. On this day, I was declared criminal detention, more than eight o’clock in the evening was sent to detention detention. On the road to the detention center, I have mixed feelings, thoughts. Think about the past as the leading cadres, how I see my glory; today, in the tumbrils, how sad. To be honest, I have to put this line of defense against corruption. Incumbent vice mayor of Qionghai City, at the beginning, in order to build their own this line of defense against corruption, I told my wife and children are not allowed to accept others’ money and many times. I have to reject and return the money from others, but after the refund I heard some people’s taunt. Some people say "with me", "someone said I don’t trust them.". I’m not in the mood to hear that. With the promotion of my position, I have more and more power. In a curry favour in the sound, I began to float up, gradually spawned some decadent ideas. I often think of myself as during his term of office to save some money, the future is not dry, not for money to also need not worry about. Because of this idea, in front of you not to grasp the principle of sugar shells, more than ten years time, I accept others of money up to about 4000000 yuan, by a leading cadres, corrupt party members gradually become a convergence of money. I had a very good chance to take the surrender, but I do not grasp. Only in March 2015, before the incident, let my brother to the Hainan Provincial Commission for Discipline Inspection of the account to pay back the money 200 thousand yuan. Until the provincial Commission for Discipline Inspection to find me talk, I took the initiative to explain the problem. Before the incident, because I am full of worries, with luck, missed opportunity. It was not until the measures were taken and by the investigators and the relevant aspects of the patient again and again after the criticism, education, I really wake up. I was back to the court before the court announced the arrest, this time, thought really was Shengburusi large fluctuation. After a fierce ideological struggle, my reason over evil, and realize that only one person’s life, crime should face the reality, must be carefully)相关的主题文章:
Effects of farm management practices and transport duration on stress response and meat quality traits of suckling goat kids. Studies aimed to assess up to what extent farming and transport previous to slaughtering might affect physiology and meat quality in young goat kids are needed, with the ultimate purpose of promoting practices that minimize stress in these animals. In this regard the effects of on-farm management and transport duration on some physiological responses and meat quality parameters in goat kids were assessed. Two farms representing 'high' and 'low' welfare-friendly management practices were selected. In total, 32 suckling kids were withdrawn from each farm, transported by road for 2 or 6 h, and then slaughtered. Blood samples were collected both on-farm and in the slaughterhouse, and biochemistry, cell counts and haematocrit were determined. After slaughtering, carcass quality parameters were measured. Longissimus dorsi muscle was dissected and pH, colour parameters, water holding capacity and shear force were measured throughout 8-day ageing period. Results indicate that, regardless its duration, transport caused significant effects on some blood parameters suggesting stress in live animals, like glucose, cortisol or creatine kinase. Despite the marked stress status in animals, this condition was not decisively reflected on L. dorsi quality parameters, but some effects were observed regarding fat cover in carcasses and colour parameters. The results suggest that postmortem changes throughout ageing were more decisive in terms of meat quality than stressful management either on-farm or during transport.
[Osteochondral fracture of the lateral tibial pilon]. In this paper we report a case of osteochondral fracture of the lateral tibial pilon. A young man fell while he was playing soccer. In the following months the ankle was swollen and painful. Later the reason for his ankle pain was clearly visible on the X-ray pictures, which revealed a severe osteochondral fracture of the lateral tibial pilon. We describe the arthroscopic and X-ray grading of osteochondral fractures of the ankle and their treatment.
Tuesday, March 9, 2010 Hey everyone!!! I have a brand new script in the store now!! You can get yours HERE. I hope that you enjoy it!! This script will make a full size double butterfly on a ribbon. Left in layers so you can customize it to your liking. This script will pause to allow you to pick your colors, patterns, and gradients. You are also able to pick your own inner bevels, shadings, and textures. No Outside Filters required Credit not required but always appreciated CU/CU4CU/PU Blog Layout,Header and Buttons created by JosDZigns aka JosDZigns. Kit Used is called "Copper Penny" which was created by JosDZigns. Please do NOT copy or steal this set in anyway!It is protected and for use on the SNS Blog ONLY!
Q: Initialize new strings inside string array I have been trying to find out if there is a better way to initialize the string array I am using in this code snippet. I was wondering if there was a function, or perhaps some use of new that would make the calling and assignment of all the empty strings in the code unnecessary. So I can initialize them at the same time I create the array. foreach (var unit in unitList) { //Sort units by each army string unitName = unit.UnitName; armyUnits.Add(unitName, unit); //Sort unit properties by unit List<string> properites = new List<string>(); string composition =""; string weaponSkill =""; string ballisticSkill =""; string strength =""; string initiative =""; string toughness =""; string wounds =""; string attacks =""; string leadership =""; string savingThrow =""; string specialRules =""; string dedicatedTransport =""; string options =""; string armour =""; string weapons =""; properites.AddRange(new string[15]{ composition = unit.Composition, weaponSkill = unit.WeaponSkill, ballisticSkill = unit.BallisticSkill, strength = unit.Strength, initiative = unit.Initiative, toughness = unit.Toughness, wounds = unit.Wounds, attacks = unit.Attacks, leadership = unit.Leadership, savingThrow = unit.SaveThrow, specialRules = unit.SpecialRules, dedicatedTransport = unit.DedicatedTransport, options = unit.Options, armour = unit.Armour, weapons = unit.Weapons }); } edit: So it looks like you can do new String(unit.Composition.ToCharArray()) inside the array. I don't think that is any more readable or quicker to write though. properites.AddRange(new string[1]{ new String(unit.Composition.ToCharArray())} A: foreach (var unit in unitList) { //Sort units by each army string unitName = unit.UnitName; armyUnits.Add(unitName, unit); //Sort unit properties by unit List<string> properites = new List<string>(); properites.AddRange(new string[15]{ unit.Composition, unit.WeaponSkill, unit.BallisticSkill, unit.Strength, unit.Initiative, unit.Toughness, unit.Wounds, unit.Attacks, unit.Leadership, unit.SaveThrow, unit.SpecialRules, unit.DedicatedTransport, unit.Options, unit.Armour, unit.Weapons }); } You don't need the variables at all. Actually, you don't need a list! var properties = new [] { unit.Composition, unit.WeaponSkill, unit.BallisticSkill, unit.Strength, unit.Initiative, unit.Toughness, unit.Wounds, unit.Attacks, unit.Leadership, unit.SaveThrow, unit.SpecialRules, unit.DedicatedTransport, unit.Options, unit.Armour, unit.Weapons, } A list supports adding and deleting items which seems not to be used here. You also don't need the array count of 15 because the compiler figures it out. You also don't need the array type for the same reason. C# is a pretty terse language! I also added a final comma after "unit.Weapons" to make all list items symmetric. This compiles just fine and makes copying, pasting and reordering simpler. A: You also don't need to use the AddRange method. You can simply use the collection initialization syntax. //Sort unit properties by unit var properites = new List<string> { unit.Composition, unit.WeaponSkill, unit.BallisticSkill, unit.Strength, unit.Initiative, unit.Toughness, unit.Wounds, unit.Attacks, unit.Leadership, unit.SaveThrow, unit.SpecialRules, unit.DedicatedTransport, unit.Options, unit.Armour, unit.Weapons };
Q: How Bigquery use data stored in google cloud? Guys a very basic question but not able to decipher ,Please help me out. Q1: When we create bigquery table using below command , the data resides in same Cloud Storage? bq load --source_format=CSV 'market.cust$20170101' \ gs://sp2040/raw/cards/cust/20170101/20170101_cust.csv Q2: let's say my data director is gs://sp2040/raw/cards/cust/ for customer file Table structure defined is: bq mk --time_partitioning_type=DAY market.cust \ custid:string,grp:integer,odate:string Everyday I create new dir in the bucket such as 20170101,20170102..to load new dataset. So after the data loaded in this bucket Do I need to fire below queries. D1: bq load --source_format=CSV 'market.cust$20170101' \ gs://sp2040/raw/cards/cust/20170101/20170101_cust.csv D2: bq load --source_format=CSV 'market.cust$20170102' \ gs://sp2040/raw/cards/cust/20170102/20170102_cust.csv A: When we create bigquery table using below command , the data resides in same Cloud Storage? Nope! BigQuery is not using Cloud Storage for storing data (unless it is federated Table linked to Cloud Storage) Check BigQuery Under the Hood with Tino Tereshko and Jordan Tigani - you will like it Do I need to fire below queries Yes. you need to load those files into BigQuery, so you can query the data
"Where's your fucking chain now?" "Cunt!" "Dumb-ass ponytail." "Here we go." " I love you." " I love you too, baby." "Well, fuck you, Fido." "The fuck?" "Show your fucking face, freak!" "It is too bad I don't have fangs." "Oh, yeah!" " Rip your fucking throat out." " Oh, yeah." "Fuck, yeah." "Here it comes." "Are you ready?" "Fuck." "Oh, fuck, yeah!" "That was intense, huh?" "Maudette?" "Hey." "Maudette." "Oh, shit." "Oh, fuck." "Fuck." "Oh, Jesus." "What a moron." "I didn't kill her." "I didn't kill her." "Well, somebody sure as hell did." "A vampire." "You're sure?" "Oh, yeah." "Yeah, I saw his fangs." "Hey, Maudette had fang marks on her inner thigh." "We know." "We examined the body." "Okay." "This be the same vampire your sister's messing around with?" "Okay, first, my sister ain't messing around with nobody." "My sister don't mess around." "And second..." "I don't know." "I never met that vampire." "I never met any vampire, and I hope to hell I never do." "What'd this vampire on the videotape look like?" "Bald-headed." "Weird skeleton tattoo." "And he looked crazy." "Crazy out of his motherfucking mind." "It's interesting, because this the only videotape we found in Maudette's apartment." "Well, I guess that means somebody took them all, right?" "Somebody didn't want you to see them?" "Or somebody only wanted us to find this one?" "Because it supposedly clears him of a crime that maybe he came back later to commit?" "Come on, Andy." "I'm not that smart." "Sookie." "Sookie." "I can't feel my legs." "Quick, drink before the wound closes." " Would I be a vampire?" " You won't be." "Goddamn it, Sookie, do you wanna live or not?" "No." "Go back to the green room." "Turns out that I'm first in the walk-and-talk challenge." "Walking and talking can't be too hard, right?" "B.J., your category is Names of U.S. States." "Arizona." " Oh, Mama, damn." " Alabama." "Mississippi." "Memphis." "New Jersey." "New York." "Connecticut." "Hello, hooker." "What's the T?" "Where are you?" "I'm on my way to a party in Monroe." "And hell, no, I ain't swinging by to pick your needy ass up, hooker." "Lafayette, please." "My mama's passed out on the couch and I can't face cleaning her up and putting her to bed." "It's just too goddamn depressing." "What's depressing is how often I get this phone call from you." "That's depressing." "Why come you won't call Jason Stackhouse?" "You a mean, nasty bitch." "And you need to move your sorry ass out your mama house." " That's what you needs to do." " Yeah, whatever." "Well, all right." "All right, I's on my way." "But you might got to find your own ride home." "Just in case I get lucky." "What you mean, if you get lucky?" "Your standards are so low, you always get lucky." "Damn straight." "Hallelujahs, hallelujahs." "Good Lord, I'm coming." "Jesus." "Jason, what the fuck?" "Did I say you could come in?" "Look, Jason, it's 3:00 in the morning." "You have no idea what I've been through since last night." "I spent the whole day thinking I'd really killed Maudette Pickens." "Oh, my God." "I thought I'd accidentally strangled her during sex." "And Bud and fucking Andy waited 12 whole hours to show me a videotape that proved I didn't do it." "I thought I'd ruined my whole life." "Jason." "Do I taste different from other people?" "Yes." "What are you?" "Well, apparently I'm not dead." "What I am is telepathic." "I can hear people's thoughts." " Even mine?" " No." "That's why I like you so much." "I can't hear you at all." "You have no idea how peaceful it is after a lifetime of blah, blah, blah." "May I ask you a personal question?" "Bill, you were just licking blood out of my head." "I don't think it gets much more personal than that." "How do you manage a social life with men your own age?" " Their only thought must be..." " I don't date." " Ever?" " Oh, I've..." "I've been on a few dates." "I can't wait to see her naked." "I wonder if she's a natural blond." "Nothing worse than a blond with a big, black bush." "What the heck?" "Not every guy was a pig." "Kind of girl I could marry and spend the rest of my life loving." "Never have those thoughts of Matt Damon Jake Gyllenhaal in Jarhead, when he had that little Santa hat on..." "Hey, where you going?" "What's wrong?" "But it always ends up the same." "There must be some people who know about your talent." "The people closest to me." "But we never talk about it." "And I do my best to stay out of their heads." "Over the years, I've learned how." "It's kind of unethical to listen in to my family and my friends, my boss." "But they know." "Other people suspect or they think I'm psychic." "Most people just think I'm crazy." "What does it sound like?" "It's sort of like a stream of consciousness." "Gets weirder when people are mad or upset, and sometimes..." "Sometimes it's just images." "I should be getting home." "Wow, I feel completely healed." "You are." "Do doctors know that V-juice can do this?" "No." "We wanna keep it that way." "I should show you to your car." " Look at this motherfucker." " What's up, Joe?" "Sexy ass over there." "Hey, baby." "Hey, baby." "Hey, big boy." "What's up, you?" " They said they were." " Oh, no." "What's up, baby?" " I'm Terrell." " Tara." "Tara." "All right, all right, all right." "So, what's a fine girl like you doing sitting here all by herself?" "I'm watching my fool cousin trying to hit on the straightest man here." "All right." "Well, baby, I am the straightest man here." "Really?" "You can just ask any one of these honeys." "Look, I should tell you." "I'm married." " Well, that's not a problem for me." " Well, my husband is a mercenary." "Yeah." "Blackwater." "He just got back from assassinating some guys in Iraq." "You making that shit up." "I wish I was." "Because he ain't worth me, I can tell you that." "But if he ever caught me with another man he'd kill us both." "I'm not sure who he'd kill first." "Probably me." "I hope so." "Bitch, you crazy." "He already shot one guy in the nuts just for buying me a CD." "Hell, no." "Fuck." "Fuck." "Oh, my God." "Oh, my God." " This how you wanna play, huh?" " Yeah." "Yeah." "How old are you?" "Am I allowed to ask that?" "I was made a vampire in 1865." "When I was 30 human years old." "Wow, you look older than that." "Life was harder then." "Were you in the Civil War?" "I was." "Would you be willing to talk to my grandmother's club?" "It's mostly a bunch of old people who had family in the war." "They call themselves the Descendants of the Glorious Dead." "The Glorious Dead?" "There is nothing glorious about dying in a war." "Bunch of starving, freezing boys killing each other so the rich people can stay rich." "Madness." "I'm sure it was awful." "Would it make you happy if I did this?" "Oh, it would make my grandmother ecstatic." "Would it make you happy?" "Well..." "Yes." "I'll do it, then." "I look forward to meeting your grandmother." "When may I call on you?" "I'm off work tomorrow." "Just after dark, then." "Sam's still up." "Well, that's creepy." "We never should have given them the vote and legitimized their unholy existence." "The American people need to know these are creatures of Satan." "Demons, literally." "They have no soul." "But, Reverend Newlin, you must be aware of polls that show growing support for vampire rights." "Those polls are fixed." "Know how much money the monsters have given to politicians of both parties?" "As well as corporate media?" "Nonsense." "Vampires don't seek to control human policy." "It's of very little interest to us." " We want the same rights as humans..." " You can't trace it." "It's all been laundered." "Are you accusing my organization of criminal activity, sir?" "I will not speak to her directly, Sharon." " Why is that, Reverend Newlin?" " My commitment to Christ Jesus praise his name, compels me not to recognize her kind." "That's gonna make it difficult to have a dialogue." "I will not speak to her directly." "Okay." "Thank you, Sharon." "Now, TBBN..." "I don't think Jesus would mind if somebody was a vampire." "I don't either, honey." "Is this sausage different from what you usually make?" "No." "It tastes so much more complex than it usually does." "Oh, dear, you think it's gone bad?" "No, it's delicious." "It's like I can close my eyes and I can see the farm the pig lived on and feel the sun and rain on my face and even taste the earth that the herbs grew out of." "Hey, Miss Stackhouse." "Good morning, Tara." "No, you sit down." " I'll make a new pot." " All right." " You look awful." " Yeah." "I feel even worse." " Can...?" " Yes, you can take a shower here." " And you can borrow some of my clothes." " Thanks." "Any news about Jason?" "Yeah, we heard from Everly already." "They let him go last night." " I knew they would." " I didn't." "Well, I'm glad to see you're still alive." "You obviously did not hook up with that vampire last night." " Sookie, sometimes you are just plain dumb." " Shut up." "Lucky Gran was in bed when I got in last night." " Did he bite you?" " No." "Are you sure?" "You know they can hypnotize you." "Yeah, and black people are lazy and Jews have horns." "You must be glad they let Jason go, huh, Miss Stackhouse?" "I can't even believe that they arrested him to begin with." "I have a good mind to call Bud Dearborne and chew him out." "Jason's a good boy." "Everybody knows that." "Hello." "Hey, Everly." "I'm sorry I was such a bitch to you last night." "Well, I'm sorry I been acting like I'm your mother." "I just worry about you, Sookie." "You're basically my only friend." "Am I too late for breakfast?" "Hey, Tara." "Hey." "Hey, Jason." "I'm so glad they didn't lock you up." "Yeah." "Me too." "I don't even know why they suspected me." "I think somebody heard I'd been with Maudette." "Had you?" " No." " Are you sure?" "She was a woman." "That's funny." "At least she was human." "You will never believe what happened." " Hey, Jason." " Hey, Gran." "You sit down." "I'll fix you breakfast." " Yes." " What happened?" "Well, apparently a tornado touched down over at Four Tracks Corners." "It turned over that rent trailer in the clearing." "You know the one?" "And it killed that couple that's been staying in there." "Mack and Denise Rattray?" "They were trapped under the trailer." "Mike Spencer said they were crushed to a pulp." "Well, Sookie Stackhouse." " What are you doing here?" " Sookie, you know Mike Spencer." "Of course." "You buried my parents." "Yep." "Got a new job." "Parish coroner." "But I still run the funeral home." "That's gotta be convenient." "Sookie, this is still a restricted crime scene." "Why are you here?" "When I heard what happened, I just had to come look." "What an awful thing." "You know, I did hear you weren't too fond of the Rattrays." "Where'd you hear that?" "My niece is the emergency-room nurse in Monroe." "Says somebody busted up old Mack pretty bad last night." " Everybody says that was you." " They were hurting a friend of mine." "This be that vampire I been hearing about?" "The one who's living at the old Compton house?" "The old Compton house?" " Across the field from where I live?" " That's the one." "Your grandmother lets you associate with a vampire?" "You can take that up with her." "I'm sure she'd love to know that somebody thinks she's not taking proper care of me." "The Rattrays were draining him." "Draining vampires is against the law, isn't it?" "I was doing my civic duty by stopping them." "And now they're dead." "Yeah." "Killed by a tornado." "Tornadoes hop." "This one didn't land anywhere else." "And nobody around here heard or saw anything like a tornado last night." "Are you telling me you seriously think one man could do all this?" "He's not a man." "They're not that different from you and me if you bothered to get to know one." "Sookie, you're a good girl." "I hate to see you go down this path." "Well, lucky for you, Sheriff Dearborne, nobody's forcing you to watch." "Now, if y'all two rednecks will excuse me, I gotta go." "You know, he sleeps in the ground all day." "I don't think he's gonna even look at the rug." "I'm not doing this for him, I'm doing this for me." "So I can be proud of my home." "And how do you know where he sleeps?" "I don't, actually." "What's that smell?" "What smell?" "It smells like rotten food or something." "You can't smell that?" "Well, find it." "You can't smell this?" "I better throw this out." " Sookie." " Yeah?" "Jason and Tara are coming over this evening as well." " Gran." " Well, they invited themselves." "Jason said that he wants to meet the vampire for himself." "And Tara said she thought she ought to be here as well." "I don't know why everyone's getting their panties in a wad about some vampire." "Did you want to be alone with him?" "I don't know." "Maybe." "Aren't you gonna tell me to be careful?" "You're always careful, Sookie, about what counts." "And I can depend on that." "Isn't that right?" "Look, I'm just saying." "Do you want a vampire sucking blood out of you?" "I'm just trying to get to know the man, that's all." "Because that's where it's gonna end up." "Always does." "What do you know about vampires, anyway?" "Yeah, I know a lot more than I care to." "Oh, please, Jason." "You ain't even got enough sense to pour piss out of a boot." "That's my beer." "You asked if I wanted anything to drink and I said I'd have a beer." "And that's when you went to the fridge." "Oh, my God, I'm so sorry." "Here." "It's okay." "Bill, I don't like it when you do that." "I've upset you." "No." "Well, since you're here..." "What's wrong?" "You have to invite me in." "Otherwise it's physically impossible for me to enter a mortal's home." "Seriously?" "Well, come on, try." "I can't." "I can't even try." "That is so weird." " Oh, Bill, won't you please come in?" " Thank you." "So if I were to withdraw my invitation would you have to leave?" "I'll have to remember that." "Oh, my stars." "Of course." "You don't..." "I'm sorry." "Your people, Mr. Compton they were from this area, I believe." "Yeah, my father's people were Comptons and my mother's people were Loudermilks." "Oh, there are a lot of Loudermilks left." "But I'm afraid old Mr. Jesse Compton died last year." "Yes, ma'am." "That's why I came back to Bon Temps." "There were no living Comptons, so I've set up home in the old Compton place." "And as I expect the VRA to pass..." "Yeah, I wouldn't be too sure about that if I were you." "A lot of Americans don't think you people deserve special rights." "They're the same rights you have." "No, I'm just saying there's a reason things are the way they are." "Yeah." "It's called injustice." " Listen, it's called "this is how we do it."" " Jason." "This is my house." "I will not tolerate rudeness." "Did you know the Stackhouses, Mr. Compton?" "Yes." "I remember Jonas Stackhouse." "He and his wife moved here when Bon Temps was just a hole in the road." "I was a young man of 16." "Isn't this the house he built?" "I mean, at least in part?" "Yes, it was." "Did you own slaves?" "Tara." "I did not, but my father did." "A house slave a middle-aged woman whose name I cannot recall and a yard slave a young, strong man named Minas." "Oh, this is just the sort of thing my club will be so interested in hearing about." "About slaves?" "Well, about anything having to do with that time." "I look forward to speaking to your club, Mrs. Stackhouse." "Now if it's all right with you I thought that Sookie and I might take a walk." "It's such a lovely night." "Well it's all right with me if it's all right with Sookie." " I don't think that's a good idea." " I don't think it's any of your business." "She's right, Jason." "Look, Gran, I am the man in this family..." "You are a man in this family, but I am the oldest person here and this is my house." "You better respect me, boy." "Actually I'm the oldest person here." "Shall we?" "We shall." "Thanks for making me look like a fool in front of him, Gran." "Jason you don't need any help looking like a fool." "I went to the Rattrays' trailer." "I told you I was strong." "I don't believe I fully gauged the extent of your strength." "Over the years, we become stronger and more skillful at hiding what we've done." "You might wanna remember, for next time, tornadoes hop." "They don't just land in one place." "So I guess you've killed a lot of people." "I killed a few by accident at first." "I was never sure when I was gonna get my next feed." "But it's all different now." "There's Tru Blood." "I can get donor blood from a clinic in Monroe." "Or I can glamour someone into letting me feed on them for love and then they'll forget all about it." "Did you feed on the Rattrays?" "Yes." "After I'd given you my blood, while you were healing." "You drank a lot of my blood." "What'll that do to me?" "Well, you'll have keener senses." "What else?" "Your libido will be more active." "Is that it?" "I'll always be able to feel you." "I'll be able to find you fast." "If you're ever in trouble, that could come in quite handy." "You're gonna have to give me a minute here, Bill." "I'm feeling a little overwhelmed." "Of course." "I don't know why your grandmother was so short with you." "You're just trying to protect Sookie." "I hate it when people treat me like I ain't got a lick of sense." "Like I'm still just a kid or, I don't know, in the way." "I know what that's like." "It sucks, that's what it's like." "You feel alone in the world, like nobody understands you or even sees you." "Yeah." "Sucks." "That ain't right because everybody is, you know, somebody." "What?" "We're all just trying to be..." "Trying to be seen, to..." "To matter." "Yeah." "You're right." "How'd you get to be so smart?" "I'm not smart at all, Jason." "I'm not." "I am constantly doing things I shouldn't and end up getting me in trouble." " Yeah?" " I'm a fucking idiot sometimes." "Well, can I tell you a secret?" "I am too." "It's not that much of a secret." " What?" "What?" " Come here." ""Not that much of a secret."" "Shit." "I was supposed to pick up Dawn from work." "Goddamn it." "She gonna be all pissed." " Night, Gran." " Night, Jason." "Drive careful." "Well, shit." "You said you could glamour somebody into letting you bite them?" "What is that, hypnosis?" "Kind of." "It's similar." "All humans are susceptible to it." " Have you done it to me?" " No." " And I never will." " Really?" "Try it." "No." " I don't feel comfortable with that." " You chicken?" "Sookie." "Yes?" "Can you feel my influence?" "No, not a bit." "Sorry." "Well, Sookie, this is very strange." "You don't like not being able to control people, do you?" "It's not a very attractive trait, Bill." "Humans are usually more squeamish about vampires than you are." "Who am I to be squeamish about something out of the ordinary?" "Sookie, Jason, y'all get out of the water, now." "How can our car insurance go up so much after just one ticket?" "Damn it all to hell, I hate having to ask my mother-in-law for money again." "Damn what all to hell?" "I can break open my piggy bank if you need some money." "Sookie, who told you we need money?" "Mama." "Corbett, I swear, I haven't spoken a word." "Sookie, do you know why you're here?" "Your parents, they're concerned about something that can't possibly exist." "But you and I are gonna put all this silliness to rest today." "Now, can you tell me what I'm thinking?" "I'm thinking about the color red and the number nine." "The color red and the number nine." "The psychologist thinks that Sookie just reads our body language and is highly observant, that's all." "Well, that's a relief." "That's bullshit." "Isn't it?" "What's body language?" "Why was that doctor so scared?" "Because she was lying to me, that's why." "Because there is something to be scared of inside my little girl." "Oh, my God." "She knows everything I'm thinking." "Oh, sweet Jesus." "What do I do?" "Poor child." "She can't..." "I was diagnosed with ADD." "They tried to put me on drugs, but my mama wouldn't let them." "She knew that wasn't it." "She tried to protect me, even though I scared her." "When did you lose her?" "Just before I turned 8." "Both my parents." "Flash flood." "I lost my wife and my children." "Everyone I knew from my human life." "Most of them are buried here in this cemetery." "You really don't consider yourself human at all?" "I'm not human." "Can you turn into a bat?" "No." "There are those who can change form, but I'm not one of them." " Can you levitate?" " No." " Turn invisible?" " Sorry." "Well, Bill, you don't seem like a very good vampire." "What can you do?" "I can bring you back to life." "This is where you live?" "Since old Jesse Compton had no living heirs when he died ownership reverts back to me." "I thought that wasn't for sure unless the VRA passes." "Well, I haven't been getting any trouble with the renovations I've been doing." "Although, of course, I've been doing them myself in the night." "I need an electrician, but I can't get anyone to return my calls." "Maybe if I made a few calls tomorrow I could come by after work and tell you who to contact." "Thank you." "Take your clip out." "May I?" "I can smell the sunlight on your skin." "I should see you home." "All right." "What's the matter, baby?" "Don't you like me?" "Oh, sure, I like you, Jason." "I wouldn't tie any old man up to my bed." "So call in sick." "Sam won't mind." "One, Sam would mind." "And two, we've had sex, like, three times today." "At this rate, we're gonna burn out by the end of the week." "And then you're gonna get all weird and closed-off and I've already been down that road with you, baby." "But I'm horny." "Well, I'll be back by midnight." "Hey, you're not..." "You're not leaving me here like this." "You just better be happy that's all I'm doing to you, baby." "What?" "What...?" "You can just think of it as foreplay." "Foreplay, my..." "Dawn!" "Okay, this ain't funny, goddamn it." "Goddamn it!" "Dawn!" "Fuck!" "Bitch." " Hi." " Hey." " Hey, Brett." " Hey." "Hey, sugar." "Make Mama another stinger, would you?" "You listen to me, Jane Bodenhouse." "You're already drunk as a skunk." "Ain't no man in here gonna wanna take you home." "And Sam will have to call your son to come and get you, just like he always does." "Even though everybody knows it humiliates him to death." "Ain't you ashamed of yourself?" "What'd you just say to me?" "I said, any particular brand of cognac?" "No." "Whatever you have that's nice and cheap." "I told you where to buy your uniform." "Sam, how come you don't wear a uniform?" "Because I own this place and wear what I want." "Well, how come Terry Bellefleur don't wear a uniform?" " Because..." " I've spent enough time in uniforms." "No, because you're a man." "And Sam don't feel the need to sexualize the men in his employment the same way he do the women." "Okay." "You don't have to wear a uniform." "Thank you." "Remind me why I hired you, again." "Affirmative action." "Loaded skins and a pitcher of Bud." "Is that it for y'all?" "Yes, ma'am." "If you could serve them nachos off them perfect titties, we'd all be obliged." "Ain't nothing I like more than licking food off a girl's tits." "Okay, then." "Ain't nothing I like more than licking food off a girl's tits." "And that's a fine ass too." "You wanna let go of the lady, you, or you want me to knock you into next week?" "Damn, man, you're about to break my arm." "Apologize." "Sorry." "Maybe you and your friends should find someplace else to eat, yeah?" "Let's go." "Don't look at me, you." "Rene, you should have let me handle that myself." "Merlotte's is a nice place." "We all wanna keep it that way." "Besides, you remind me of my baby sister, you." "I hope to God somebody will stick up for her if some asshole ever does her that way." "Arlene, would you tell Rene thank you for helping me out with those jerks tonight?" "I was so flustered I might have seemed ungrateful." "Please let me get my period tonight." "Even though Rene wants one of his own." "But I sure don't want him to feel like he's being forced into..." "Did you just read my mind?" "Sorry." "I'm not very focused tonight." "My private thoughts are none of your business." "Sookie." "You wanna step into my office?" "I swear, I try not to listen but I can't always keep my guard up." "Is it true you can't hear the vampire's thoughts at all?" "God, that's..." "I mean, that must be very relaxing for you." "You know, not having to work so hard not to hear." "Yes." "Can you hear me?" " I don't wanna hear you." " Why not?" "I'd have to quit if I read your mind, and I like it here." " You don't have to quit." " Sam, I've had to leave every job I've had because I could hear my boss's thoughts." "You might be surprised by what you find." " Not all surprises are good." " Try sometime." "Now, listen don't you worry." "You got a job here as long as you want one." "I should get back to work." "Baby girl, don't even let that get you down." "Don't let what get me down?" "Don't let nothing get you down." "It's the only way to live." " Ain't that right, Big John?" " That's right." "Hey, how's Jason?" "He's probably pretty pissed off at me right about now but, hell, he probably deserves it." "I have to say, I'm surprised you and him got back together." "No more than I am, baby." "Believe me." "Think it's gonna last?" " Is there a reason you wanna know, Tara?" " No." "Ever since I been friends with Sookie I've just gotten a kick out of watching Jason's escapades with women, you know." "Sort of." "God only knows what happened to my tables." "In other news a tragic car crash in town has claimed three lives today..." "Hey, turn it up." "Reverend Theodore Newlin, his wife, Yvette and their 18-month-old daughter, Bethany." "All pronounced dead on arrival at Baylor University Medical Center." "There were a total of seven other casualties as well in the freak accident apparently caused when a freeway sign..." "Well, hey there, little human chick." "Hi." "I'm here to drop off some information about an electrician for Bill Compton." " Is he here?" " Maybe." "She smells fresh."
903 F.Supp. 36 (1995) UNITED STATES of America, Plaintiff, v. Eugene John WOLF, Defendant. Nos. CR 92-60108, CV 94-6362-HO. United States District Court, D. Oregon. October 5, 1995. Kristine Olson, United States Attorney, District of Oregon, Sean B. Hoar, Assistant United States Attorney, Eugene, OR, for Plaintiff. Eugene John Wolf, Florence, CO, pro se. OPINION ROBERT E. JONES, District Judge: Defendant Eugene John Wolf petitions to vacate his conviction and sentence pursuant to 28 U.S.C. § 2255, on the grounds of double jeopardy. After considering the arguments *37 and evidence presented by the parties, I conclude that the petition must be denied. FACTS Wolf was arrested in California on October 23, 1992, pursuant to a federal complaint charging him with the manufacture of methamphetamine. He was transferred to Oregon and on November 19, 1992, a federal grand jury returned a one count indictment which charged Wolf with possessing approximately fifty kilograms of a precursor chemical with the intent to manufacture methamphetamine. A superseding indictment expanded the charges to nine counts related to the manufacture of methamphetamine. A jury trial was held from March 29 through April 7, 1993, in Eugene, Oregon. On April 7, 1993, the jury found Wolf guilty of all charges. On June 21, 1993, Wolf was sentenced to prison for 264 months. Two administrative forfeiture proceedings involved property seized from Wolf and his sons. On October 22, 1992, two automobiles, a motorcycle, $1,410 in cash, and various items of equipment were seized by police officers in Coos County, Oregon. The State of Oregon initiated administrative forfeiture proceedings, and a claim was filed by Eric Wolf, Eugene Wolf's son. Eugene Wolf did not file a claim, nor did his other son, Charles Wolf. On June 18, 1993, the case was concluded by a stipulated order for forfeiture in the Circuit Court for Coos County, Oregon. According to the stipulated order, some of the seized property was forfeited to the State of Oregon, and some of the property was returned to Eric Wolf. On October 16, 1992, and October 27, 1992, members of the police department in San Pablo, California seized currency totaling $7,557.07. Wolf did not file a claim to this property, and the forfeiture was declared final by Contra Costa County, California on April 19, 1993. DISCUSSION Eugene Wolf contends that his conviction violated the Double Jeopardy Clause because jeopardy attached in one of the above forfeiture actions before he was subjected to jeopardy in his criminal case. The facts stated above clearly show that Wolf's conviction did not violate double jeopardy. First, the two forfeiture actions were brought by the State of Oregon and the State of California. Under the dual sovereignty doctrine, a federal criminal prosecution is not barred by the fact that there has been a prior forfeiture action by a separate sovereign. United States v. Branum, 872 F.Supp. 801 (D.Or.1994). The record contains no evidence that could bring this case within the narrow `Bartkus' exception to the dual sovereignty doctrine. Bartkus v. Illinois, 359 U.S. 121, 79 S.Ct. 676, 3 L.Ed.2d 684 (1959). In addition, Eugene Wolf failed to assert claims in the civil forfeiture actions by the states of California and Oregon. The Ninth Circuit recently ruled that a putative owner who fails to assert a claim to property is not subjected to jeopardy by the forfeiture proceedings. United States v. Cretacci, 62 F.3d 307 (9th Cir.1995). Finally, jeopardy attached in the forfeiture proceedings when the California forfeiture became final on April 19, 1993, and the Oregon forfeiture became final on June 18, 1993. Both of these dates came after March 29, 1993, when trial began and jeopardy attached in the criminal case. CONCLUSION For the reasons stated above I conclude that Wolf's conviction did not violate the Double Jeopardy Clause. The petition for relief under 28 U.S.C. § 2255 is denied with respect to all double jeopardy issues. The case is referred back to the Honorable Michael R. Hogan for determination of the remaining issues raised by Wolf's petition. IT IS SO ORDERED.
package nc.util; import it.unimi.dsi.fastutil.objects.*; import mekanism.api.gas.*; import net.minecraftforge.fluids.*; public class GasHelper { // NC Fluid <-> Mek Fluid public static final Object2ObjectMap<String, String> TRANSLATION_MAP = new Object2ObjectOpenHashMap<>(); // Mek Fluid -> Mek Gas public static final Object2ObjectMap<String, String> GAS_MAP = new Object2ObjectOpenHashMap<>(); public static void preInit() { TRANSLATION_MAP.put("sulfur_dioxide", "liquidsulfurdioxide"); TRANSLATION_MAP.put("sulfur_trioxide", "liquidsulfurtrioxide"); TRANSLATION_MAP.put("hydrogen_chloride", "liquidhydrogenchloride"); TRANSLATION_MAP.put("sulfuric_acid", "sulfuricacid"); } public static void init() { for (Gas gas : GasRegistry.getRegisteredGasses()) { if (gas.getFluid() == null) { continue; } GAS_MAP.put(gas.getFluid().getName(), gas.getName()); } } public static FluidStack getFluidFromGas(GasStack gasStack) { if (gasStack == null || gasStack.getGas().getFluid() == null) { return null; } Fluid gasFluid = gasStack.getGas().getFluid(); if (gasFluid == null) { return null; } Fluid fluid = FluidRegistry.getFluid(gasFluid.getName()); if (fluid == null) { return null; } return new FluidStack(fluid, gasStack.amount); } public static GasStack getGasFromFluid(FluidStack fluidStack) { if (fluidStack == null) { return null; } String fluidName = fluidStack.getFluid().getName(); if (!StringHelper.beginsWith("liquid", fluidName)) { if (TRANSLATION_MAP.containsKey(fluidName)) { fluidName = TRANSLATION_MAP.get(fluidName); } else { fluidName = "liquid" + fluidName; } } String gasName = GAS_MAP.get(fluidName); if (gasName == null) { return null; } Gas gas = GasRegistry.getGas(gasName); if (gas == null) { return null; } return new GasStack(gas, fluidStack.amount); } }
Broncos, Orton still together as trade talks begin ENGLEWOOD, Colo. — Kyle Orton's still a member of the Denver Broncos. For how long is anybody's guess. The Broncos are shopping around to see if they can find a trade partner, and the Miami Dolphins might land the sixth-year quarterback if they work out a deal that lowers his cap hit this season and provides long-term security. Orton is due $8.829 million this season and doesn't want to be a backup in Denver. While the Broncos have said Orton is their returning starter, the veteran QB apparently feels Tim Tebow's promotion is a foregone conclusion, as do some of his teammates. Orton has started the last two seasons in Denver, posting career-best passing numbers to go with 41 TD throws and 21 interceptions. He gave way to Tebow, a former Heisman Trophy winner and national champion at Florida, for the final three games last year. Orton, whom former coach Josh McDaniels obtained in the Jay Cutler trade two years ago, reported to Dove Valley on Wednesday for a physical and new coach John Fox's first team meeting. The first practice is Thursday morning. Orton declined to comment to reporters as he left the facility about 1 p.m. and again when he returned three hours later for the team meeting. After saying early on in the offseason that Orton was the incumbent, the Broncos' new front office football chief John Elway, general manager Brian Xanders and Fox haven't made any public comments about Orton's situation of late. Pro Bowl wide receiver Brandon Lloyd, however, described Orton's presence at the facility Wednesday as awkward. "Yeah, I didn't know what was going on," Lloyd said. "I didn't know all the rules and stuff, but there's obviously some logistical things about showing up to camp. Technically, he's still a member of the Denver Broncos football team, so it was normal after I saw him." Lloyd and Orton made a great duo last season, but Lloyd has moved on, figuring it's Tebow's time now. "I've been spending most of my brainpower in the offseason focusing on how to get Tebow better and what I can do to help him develop as a quarterback," said Lloyd, who spent a week with Tebow preparing for training camp. "Kyle's going to be awesome, wherever he goes," Lloyd said. "There's a lot of vacancies in the NFL for really good quarterbacks, and Kyle's a really good quarterback, and he's going to be fine." Actually, those vacancies are starting to fill up, whittling the list of potential landing spots for Orton, who has amassed 7,455 yards passing over the last two seasons but won just 11 of 29 starts. Tebow went 1-2 as a rookie, completing 41 of 82 passes for 654 yards, five TDs and three interceptions with six sacks. He also rushed for 227 yards and six scores. "I think Tim's ready," Lloyd said. "And I think it's going to put a lot of pressure on us veterans to make him better. That's what it comes down to."
2/2014 Little Nina came from a bad hoarding situation. She was very lucky that a rescue had become involved trying to help place all the cats. With the help of lots of people (Thanks Lisa, Lisa’s sister, Seth & Kathrine) she arrived to be with us.To make things more complicated. Not only is she blind, she is FELV+. Update, we had her tested with a much more accurate test (NEVER TRUST A SNAP TEST!!!!) She is NOT FELV+. Super sweet little girl, just trying to get settled in. Right now she is in quarantine for 2 weeks to make sure she stays healthy.Update, she is out of quarantine and you may watch her live on Ustream on Friday.Sponsored by Clark - Thank you!Sponsored by Stephen - Thank you!SponsoredbyNinett-Thankyou!Sponsored by Tracy - Thank you!Sponsored by Koalabu - Thank you! 2/2014 Little Nina came from a bad hoarding situation. She was very lucky that a rescue had become involved trying to help place all the cats. With the help of lots of people (Thanks Lisa, Lisa’s sister, Seth & Kathrine) she arrived to be with us.To make things more complicated. Not only is she blind, she is FELV+. Update, we had her tested with a much more accurate test (NEVER TRUST A SNAP TEST!!!!) She is NOT FELV+. Super sweet little girl, just trying to get settled in. Right now she is in quarantine for 2 weeks to make sure she stays healthy.Update, she is out of quarantine and you may watch her live on Ustream on Friday.Sponsored by Clark - Thank you!Sponsored by Stephen - Thank you!SponsoredbyNinett-Thankyou!Sponsored by Tracy - Thank you!Sponsored by Koalabu - Thank you!
In a liquid crystal display apparatus as a typical image display apparatus, owing to an image forming system of the apparatus, it is indispensable to place polarizing plates on both sides of a liquid crystal cell. The polarizing plate usually has a configuration in which polarizer protective films are attached to both surfaces of a polarizer with an adhesive. A (meth)acrylic resin excellent in heat resistance and transparency is proposed as a material for forming the above-mentioned polarizer protective film. In order to enhance the adhesion property between the polarizer and the polarizer protective film formed from the (meth)acrylic resin, it is proposed that an easy-adhesion layer should be formed from a polyester-based resin or a polyurethane resin between the polarizer and the polarizer protective film (for example, Patent Document 1). However, there are problems in that the adhesion property between the polarizer and the polarizer protective film (in particular, under high temperature and high humidity conditions) is not sufficient and in that retardation occurs. Patent Document 1: JP 2007-127893 A
// Copyright 2019, Intel Corporation #include "pmlc/dialect/tile/ir/dialect.h" #include "llvm/Support/FormatVariadic.h" #include "mlir/IR/Builders.h" #include "mlir/IR/DialectImplementation.h" #include "mlir/IR/OpImplementation.h" #include "mlir/Support/DebugStringHelper.h" #include "base/util/logging.h" #include "pmlc/dialect/tile/ir/ops.h" namespace pmlc::dialect::tile { namespace { struct OpAsmInterface : public mlir::OpAsmDialectInterface { using mlir::OpAsmDialectInterface::OpAsmDialectInterface; // Get a special name to use when printing the given operation. void getAsmResultNames(Operation* op, mlir::OpAsmSetValueNameFn setNameFn) const final { llvm::SmallString<32> osbuf; llvm::raw_svector_ostream os(osbuf); if (auto constOp = llvm::dyn_cast<AffineConstantOp>(op)) { os << 'c' << constOp.value().getSExtValue(); } else if (auto indexOp = llvm::dyn_cast<AffineIndexOp>(op)) { if (indexOp.name().hasValue()) { os << *indexOp.name(); } } else if (auto cionOp = llvm::dyn_cast<SymbolicContractionOp>(op)) { if (cionOp.name().hasValue()) { os << *cionOp.name(); } } else if (auto cionOp = llvm::dyn_cast<ContractionOp>(op)) { if (cionOp.name().hasValue()) { os << *cionOp.name(); } } setNameFn(op->getResult(0), os.str()); } }; } // namespace Dialect::Dialect(mlir::MLIRContext* ctx) : mlir::Dialect(getDialectNamespace(), ctx) { addTypes< // AffineMapType, // AffineConstraintsType, // AffineTensorMapType, // StringType>(); addOperations< #define GET_OP_LIST #include "pmlc/dialect/tile/ir/ops.cc.inc" >(); addInterfaces<OpAsmInterface>(); } std::string Dialect::getDialectAttrName(StringRef name) { return llvm::formatv("{0}.{1}", getDialectNamespace(), name).str(); } std::string Dialect::getCanonicalOpName(StringRef name) { return llvm::formatv("{0}.{1}", getDialectNamespace(), name).str(); } void Dialect::printType(Type type, mlir::DialectAsmPrinter& printer) const { auto& os = printer.getStream(); if (type.isa<AffineTensorMapType>()) { os << "tmap"; } else if (type.isa<AffineMapType>()) { os << "map"; } else if (type.isa<AffineConstraintsType>()) { os << "cons"; } } Type Dialect::parseType(mlir::DialectAsmParser& parser) const { auto spec = parser.getFullSymbolSpec(); auto type = llvm::StringSwitch<Type>(spec) .Case("tmap", AffineTensorMapType::get(getContext())) .Case("map", AffineMapType::get(getContext())) .Case("cons", AffineConstraintsType::get(getContext())) .Default(Type()); if (!type) { auto loc = parser.getEncodedSourceLoc(parser.getNameLoc()); emitError(loc, llvm::formatv("unknown tile type: '{0}'", spec)); } return type; } Operation* Dialect::materializeConstant( // mlir::OpBuilder& builder, // Attribute value, // Type type, // Location loc) { IVLOG(5, "tile::Dialect::materializeConstant"); if (auto attr = value.dyn_cast<IntegerAttr>()) { auto indexType = builder.getIndexType(); auto indexAttr = builder.getIntegerAttr(indexType, attr.getInt()); return builder.create<AffineConstantOp>(loc, indexType, indexAttr); } return nullptr; } } // namespace pmlc::dialect::tile
Development and validation of a necrotizing soft-tissue infection mortality risk calculator using NSQIP. Necrotizing soft-tissue infections (NSTI) are a group of uncommon, rapidly progressive infections requiring prompt surgical debridement and systemic support. A previous attempt to define risk factors for mortality from NSTI had multiple limitations. The objective of this study was to develop and validate a 30-day postoperative mortality risk calculator for patients with NSTI using NSQIP. The NSQIP Participant Use Files (2005-2010) were used as the primary data source. Patients diagnosed with NSTI were identified by ICD-9 codes. Multiple logistic regression analysis identified key preoperative variables predicting mortality. Bootstrap analysis was used to validate the model. In 1,392 identified NSTI cases, demographics were as follows: 42% were female, median age was 55 years (interquartile range 46 to 63 years), and median body mass index was 32 kg/m(2) (interquartile range 26 to 40 kg/m(2)). Thirty-day mortality was 13%. Seven independent variables were identified that correlated with mortality: age older than 60 years (odds ratio [OR] = 2.5; 95% CI 1.7-3.6), functional status (partially dependent: OR = 1.6; 95% CI 1.0-2.7; totally dependent: OR = 2.3; 95% CI 1.4-3.8), requiring dialysis (OR = 1.9; 95% CI 1.2-3.1), American Society of Anesthesiologists class 4 or higher (OR = 3.6; 95% CI 2.3-5.6), emergent surgery (OR = 1.6; 95% CI 1.0-2.3), septic shock (OR = 2.4; 95% CI 1.6-3.6), and low platelet count (<50K/μL: OR = 3.5; 95% CI 1.6-7.4; <150K/μL but >50K/μL: OR = 1.9; 95% CI 1.2-2.9). The receiver operating characteristic area was 0.85 (95% CI 0.82-0.87), which indicated a strong predictive model. Using bootstrap validation, the optimism-corrected receiver operating characteristic area was 0.83 (95% CI 0.81-0.86), which represents the model performance in future patients. The model was used to develop an interactive risk calculator. This risk calculator has excellent predictive ability for mortality in patients with NSTI. This simple interactive tool can aid physicians and patients in the decision-making process.
Q: Does TB6612FNG require additional circuit to control motor and why I am trying to understand the schematic for the TB6612FNG motor driver. I was unable to understand why do we need this additional circuit (marked in red in below diagram) when I can directly connect to the power supply. My other question is why are we using the P-Channel Enhanced MOSFET. Reference datasheet can be found here: https://www.sparkfun.com/datasheets/Robotics/TB6612FNG.pdf A: This additional circuit is a Reverse Polarity Protection using P-Channel Enhanced MOSFET. Do we need this circuit ? Yes I think we need this as a protection circuit, It depends on use case. The VMOT supplies the input power from the source i.e. battery or bench power supply. The components used are P-Channel MOSFET, Pull-Down Resistor, Zener Diode and few Decoupling Capacitors. The main intention of this circuit is to protect the IC TB6612FNG from reverse voltages. How this circuit works: If the voltage between "Gate-to-Source" of P-Channel MOSFET is negative the P-Channel MOSFET is turned ON If the voltage between "Gate-to-Source" of P-Channel MOSFET is positive the P-Channel MOSFET is turned OFF Power loss in this type of circuit is less compared to using a diode or diode bridge. We have zener diode and resistor in the circuit to protect against exceeding gate to source voltage, so as to protect the MOSFET. Decoupling capacitors helps to isolate noise, it must be placed close to the IC TB6612FNG pins.
Spread the love The TSA is, without a doubt, one of America’s most corrupt and incompetent agencies whose ostensible job is fighting terrorism. However, last year, they became apparently so unsatisfied with the mere ability to strip search babies, remove colostomy bags, beat up blind cancer patients, and fondle your genitalia, that they announced a more invasive physical pat-downs. The pat-downs, which TSA warned would probably prompt assault complaints with the police department because of their invasive nature, have been implemented and an 84-year-old holocaust survivor has become the TSA’s latest victim. Eva Mozes Kor exposed her abuse by TSA in a Tweet on Sunday, explaining how she was forced to undergo a “very demeaning body search” just to board a plane. In her Tweet, she drew a parallel with the TSA and Auschwitz. Kor was traveling back home after giving a lecture on the horrors of Auschwitz when she said she was able to survive being in a concentration camp but could barely survive the abuse she suffered at the hands of TSA. “Another very demeaning body search by the TSA – there has to be some way that at age 84 I can get some clearance by the POWERS of Government from this procedure. As I lecture about surviving Auschwitz I barely survive the TSA body search I detest it. That ruined my experience,” wrote the 84-year-old. Another very demeaning body search by the TSA – there has to be some way that at age 84 I can get some clearance by the POWERS of Government from this procedure. As I lecture about surviving Auschwitz I barely survive the TSA body search I detest it. That ruined my experience — Eva Mozes Kor (@EvaMozesKor) March 4, 2018 During her time in Auschwitz, Kor was only 10-years-old and was forced to undergo horrifying experiments at the hands of Josef Mengele. Mengele was a member of the team of doctors responsible for the selection of victims to be killed in the gas chambers and for performing deadly human experiments on prisoners. Along with her twin sister Miriam, Kor was subjected to human experimentation under Mengele at Auschwitz. She lost both of her parents and two older sisters to the Holocaust; only she and Miriam survived. Kor founded the organization CANDLES (an acronym for “Children of Auschwitz Nazi Deadly Lab Experiments Survivors”)in 1984 and through the program, she has located 122 other survivors of Mengel. She is a celebrated author and activist who has been advocating for peace by lecturing on the horrifying nightmare that happened to her and her sister during war. When she draws a parallel between Auschwitz and the TSA, America would do well to listen and remember history. As TFTP has reported in the past, the TSA cares not about laying waste to your personal space and molesting anyone who comes in their path. They can do all of these things because they are legal. All the pat downs, the groping, the brutality, and the humiliation are carried out because they are legal. Everything Germany did in the 1930s was “legal” too. This is an important fact to remember when we see people accepting all the increasing police state measures simply because they are legal. Legality, as TFTP has constantly pointed out, does not equal morality. When 84-year-old holocaust survivors are abused so bad they don’t want to fly anymore, it may be time to question this legality. As for Kor, after her tweet garnered the attention of the government agency who she says groped her so badly that she barely survived, she appears to be handling the problem on her own. “Thank you everybody for caring about me and my stress left from Mengele’s experiments. I have been contacted by the TSA to help me and they are working with me to solve this problem,” Kor said. Thank you everybody for caring about me and my stress left from Mengele’s experiments. I have been contacted by the TSA to help me and they are working with me to solve this problem. I fly tomorrow to Los Angeles to lecture this problem will be solved-thank you very much! Eva Kor pic.twitter.com/sSwi0XjZfO — Eva Mozes Kor (@EvaMozesKor) March 5, 2018 As to how this 84-year-old woman can forgive those who caused her harm just days before, her secret lies in a special kind of forgiveness. As she defines it, forgiveness is not forgetting and it certainly does not mean one condones evil. “The question of justice is separate from the issue of forgiveness,” explains Kor. “This concept of forgiveness has little or nothing to do with the perpetrators. It has everything to do with the need of victims to be free from the pain inflicted upon them.” “Anger is a seed for war,” says Kor. “Forgiveness is a seed for peace.” Spread the love Sponsored Content:
List of ships named SS Ohio was a tanker launched in 1940 by Sun Shipbuilding for the Texas Oil Company; figured prominently in Operation Pedestal, the Allied resupply of Malta in World War II. SS Ohio may also refer to: , a passenger steamer launched in 1869 by Caird & Company. , a passenger steamer launched in 1872 by William Cramp & Sons. , a lake freighter launched in 1875 by John F. Squires. See also Category:Ship names
Q: SlickGrid what is a Data View? I started to use SlickGrid and I got confused about the difference between Data View and Grid (with editing enabled). I haven't found in the docs some discussion about data view, although it has been mentioned there. Please enlighten me. A: In very simple terms, just think of three layers: Grid ---- DataView ---- Data At the bottom you have the raw data. This is just a plain old array. Each item in the array represents one row of data (to be displayed as one row in the grid). The DataView reads the data array and makes it available to the grid by exposing a couple of standard methods. This way, when the grid wants to get data for display purposes, it just talks to the dataview via one of the standard methods. The Grid is the display component. Its only responsibility is to render the HTML code necessary to display the desired output on the screen. The grid never accesses the data directly. It only ever talks to the dataview. This allows the dataview to perform tricks when returning the data to the grid, such as delivering "phantom" rows used to represent group headings. If you're interested, the example below is just about the simplest example you can come up with that uses a dataview with SlickGrid. var data = [ { title: "Primer", rating: "A" }, { title: "Matrix", rating: "B" }, { title: "Transformers", rating: "C" }, ]; var columns = [ { id: "title", name: "Title", field: "title" }, { id: "rating", name: "Rating", field: "rating" } ]; var options = { enableColumnReorder: false // ... whatever grid options you need }; var dataView = new Slick.Data.DataView(); var grid = new Slick.Grid("#myGrid", dataView, columns, options); // wire up model events to drive the grid dataView.onRowCountChanged.subscribe(function (e, args) { grid.updateRowCount(); grid.render(); }); dataView.onRowsChanged.subscribe(function (e, args) { grid.invalidateRows(args.rows); grid.render(); }); // Feed the data into the dataview dataView.setItems(data); A: DataView is an abstraction on top of your data source. If all of the data is available on the client (i.e. in a Javascript array), DataView can provide many useful features that the grid itself doesn't have. (This fact that the grid lacks these features is by design - SlickGrid tries to keep the core lean and simple while encouraging modular design and data abstraction in its API.) DataView works by taking in your data and acting as a data provider that you can pass to SlickGrid instead of your original data array. For example, if you make DataView group data, it makes the grid think that the "group" rows are just regular data items, so the grid doesn't need to be aware of them. DataView tells the grid that those items have a custom display and behavior and provides implementations of both. You then wire up DataView's onRowCountChanged and onRowsChanged events to update the grid and voila. Here's a rough list of features that DataView adds to the grid: Paging. Sorting. Search. Grouping with totals. Expand/collapse groups.
Henderson Man May Have Drowned At Lake Mead BOULDER CITY, Nev. (AP) - The National Park Service says a body recovered from Lake Mead may be a 45-year-old Henderson man who was reported missing last weekend. The Clark County coroner didn't immediately identify the man whose body was found by park rangers Thursday morning south of Castle Reef in in the vast Colorado River reservoir behind Hoover Dam. Park Service spokeswoman Christie Vanover in Boulder City says searchers think it's a man who disappeared after beginning to struggle while swimming a little after 4:30 p.m. May 10. He wasn't wearing a lifejacket. The Nevada Department of Wildlife and Earth Resource Group volunteers helped rangers search for the man after he was reported missing. A cause of death is pending, and Vanover says the incident remains under investigation. Copyright 2015 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. Online Public Information File Viewers with disabilities can get assistance accessing this station's FCC Public Inspection File by contacting the station with the information listed below. Questions or concerns relating to the accessibility of the FCC's online public file system should be directed to the FCC at 888-225-5322, 888-835-5322 (TTY), or fccinfo@fcc.gov.
657 F.Supp. 213 (1987) AETNA CASUALTY & SURETY COMPANY v. KEMPER INSURANCE COMPANY, Carriers Insurance Company, Cleve Smith and Larry Kendricks. Civil No. 85-5650. United States District Court, E.D. Pennsylvania. March 19, 1987. *214 Michael Saltzburg, Philadelphia, Pa., for plaintiff. Albert Hart, Jr., Philadelphia, Pa., for defendants. MEMORANDUM AND ORDER DITTER, District Judge. This insurance case comes before the court on stipulated facts and cross motions for summary judgment that raise alternative questions: (1) whether two injured men were "occupants" of a motor vehicle, and if not, (2) whether an insured vehicle was "parked so as to cause unreasonable risk of injury." On June 15, 1984, Cleve Smith was lawfully driving and Larry Kendricks was a passenger in a Cadillac automobile owned by Smith's girlfriend. This car was insured by plaintiff Aetna Casualty and Surety Company. Smith stopped the Cadillac on Route 22 to help a friend, Alvin Perry, whose pick-up truck was broken down. Defendant Kemper Insurance Company insured Perry's pick-up truck. Smith parked on the shoulder of the road four to five feet from where Perry's truck was stopped. While Smith was looking under the hood of the pick-up and Kendricks was standing nearby, both were injured when a tractor-trailer hit the rear of the pick-up. The accident occurred five to twenty minutes after Smith and Kendricks had stopped to help Perry. As a result of the accident, Aetna paid no-fault benefits to Smith and Kendricks. Because the tractor-trailer's insurance carrier has been liquidated and severed from this action, either Aetna, Kemper, or both are liable for the no-fault claims of Smith and Kendricks. Pennsylvania's No-Fault Act established a seriatim order for the payment of basic loss benefits. 40 Pa.Stat.Ann. § 1009.204(a) (repealed). Pursuant to this section, the "security", i.e., the insurer responsible for payment of benefits, is determined by the status of the injured. The "security" for injury to: (a) ... (1) ... (2) ... (3) the driver or other occupant of a motor vehicle involved in an accident resulting in injury who is not an insured is the security covering such vehicle; (4) an individual who is not an insured or the driver or other occupant of a motor vehicle involved in an accident resulting in injury is the security covering any motor vehicle involved in such accident. For purposes of this paragraph, a parked and unoccupied motor vehicle is not a motor vehicle involved in an accident, unless it was parked so as to cause unreasonable risk of injury; and (5) ... Id. The parties agree that subparagraphs (1), (2), and (5) are inapplicable. Kemper contends that Smith and Kendricks were "occupants" of the Cadillac at the time of the accident; therefore, Aetna is responsible for their claims. In addition, Kemper asserts that if Smith and Kendricks were not "occupants" then the Cadillac was parked so as to cause unreasonable risk of injury; therefore, both vehicles are liable under subparagraph (4).[1] In Utica Mutual Insurance Co. v. Contrisciane, 504 Pa. 328, 473 A.2d 1005 *215 (1984), the Pennsylvania Supreme Court held that a person "occupies" a vehicle if he satisfies four criteria: (1) there is a causal relation or connection between the injury and the use of the insured vehicle; (2) the person asserting coverage must be in a reasonably close geographic proximity to the insured vehicle, although the person need not be actually touching it; (3) the person must be vehicle oriented rather than highway or sidewalk oriented at the time; and (4) the person must also be engaged in a transaction essential to the use of the vehicle at the time. 473 A.2d at 1009.[2] There, the court found a person to be an "occupant" of his car while he was standing next to a police car. The court noted that the man, who had been involved in a minor accident, was required by law to stop his car. Moreover, the police officer directed him to go to the police car. Thus, the court found the person's actions "essential to the continued use of his car." Id. Here, the third and fourth criteria are not satisfied. In Government Employees Insurance Co. v. Keystone Insurance Co., 442 F.Supp. 1130 (E.D.Pa.1977), the court found a person who left his car for the purpose of confronting the driver of another car, "ceased to be vehicle-oriented, and became, instead, highway oriented." Id. at 1134. Similarly, Smith and Kendricks became "highway-oriented" when they left the Cadillac for the purpose of helping Perry with his pick-up truck. Moreover, their actions were not essential to the use of the Cadillac. Unlike the situation in Contrisciane, where the person had to go to the police car before he could continue using his car, the actions of Smith and Kendricks were completely unrelated to the continued use of the Cadillac. Since Kendricks and Smith were not "occupants" of the Cadillac at the time of the accident,[3] Kemper is responsible since the pick-up was a motor vehicle involved in an accident. Aetna is liable if the Cadillac was parked so as to cause "unreasonable risk of injury." The accident occurred during rush hour on Route 22, a four lane highway. At the time of the accident, the Cadillac and pick-up were four to five feet apart and both stopped on the shoulder of the road. Because of its proximity to the pick-up and a major highway during rush hour, the Cadillac was parked in a position causing unreasonable risk of injury. The Cadillac would not have been involved in the accident nor would Smith have been pinned between the truck and the Cadillac if the Cadillac had been parked further down the road. Therefore, Aetna and Kemper are equally responsible for the past and future basic loss benefits that Smith and Kendricks are entitled to recover. ORDER AND NOW, this 19th day of March, 1987, upon consideration of the parties' cross motions for summary judgment, it is hereby ordered that defendant Kemper Insurance Company is obligated to reimburse plaintiff Aetna Casualty & Surety Company for one-half of the basic loss benefits paid by Aetna Casualty & Surety Company to Cleve Smith and Larry Kendricks and each party is responsible to pay one-half of all further basic loss benefits that Cleve Smith and Larry Kendricks may be entitled to recover in the future as a result of injuries they sustained in the June 14, 1984 accident. NOTES [1] The parties do not dispute that Perry was an "occupant" of the pick-up at the time of the accident. Moreover, a truck that is broken down is not a parked vehicle. Consequently, the pick-up was a "motor vehicle involved in an accident." [2] While Contrisciane was decided in connection with Uninsured Motorist Act, 40 Pa.Stat.Ann. § 2000, clearly the "occupant" test is equally applicable to questions arising under the Pennsylvania No-Fault law. See Tucci v. State Farm Ins. Co., 503 Pa. 447, 469 A.2d 1025 (1983) (No-Fault law and Uninsured Motorist Act should be construed as one act because they relate to the same person or things); Government Employees Ins. Co. v. Noon, No. 77-1978 (E.D.Pa.1978) (adopting a vehicle oriented versus highway oriented approach in construing "occupying" for purposes of the No-Fault Act). [3] Aetna claims that Kendricks and Smith were occupants of Perry's pick-up truck. Clearly, this argument has no merit.
journamalism How Is Obama Murdering Ronald Reagan With His Bare Black Hands Today? Hey, did you guys hear this not at all completely hypothetical and fictional and made up (that is what “fictional” means) story about how Barack Obama is personally going to tear down Ronald Reagan’s childhood home with his bare black hands? So he can put his presidential library on it? Why would he even need a presidential library? What is he, some kind of “celebrity”? Oh, right, the story is hypothetical and fictional and made up and isn’t gonna happen? But Newsmax and Fox News and the conservative guy at Mediaite reported that it is? Imagine that. Here is the lede to Marti Lotman’s story in Newsmax. The University of Chicago Medical Center has announced plans to turn Ronald Reagan’s childhood home in Chicago into a parking lot for President Barack Obama’s library. Would you believe every single word in that lede is wrong? Whaaaaa? Media Matters (of course) tracks down this bizarre little story. It began with a Washington Times “Communities” column by William J. Kelly, who pointed out the University of Chicago’s strong ties to the Obamas (true). And that the university bought the apartment house where Reagan lived for a year when he was four (true). And that the university wants to knock it down (true). Then Kelly hypothecated that maaaybe the university would use it for an eventual Obama library, which they doubtless really want. So far so good, just your standard what-if conspiracy theory. But “what if” is not how anyone else reported it, including FoxNation: Rebecca is the owner, editrix and publisher of Wonkette. She was in newspapers for a very long time. Follow her on the Twitter. She is currently on maternity leave (until 2033), so you didn't just read this post.
Lightweight and easy to maneuver, this crossbow was built on a compact frame designed for shooters of all physical builds. Features a vertical grip mounted on a rail system so the shooter can adjust the grip to their preferred shooting style. Draw Weight: 150 lbs., Speed: 325 fps, Kinetic Energy: 95 ft. lbs., Length: 33”, Width: 23”, Weight: 7.5 lbs., Power Stroke: 14.5”. Package includes illuminated reticle scope, quiver, 3 bolts, padded sling, rail lube, and cocking rope.
United States Court of Appeals FOR THE EIGHTH CIRCUIT ___________ No. 06-2538 ___________ United States of America, * * Appellee, * * Appeal from the United States v. * District Court for the * Western District of Missouri. Marcus J. Glover, * * [UNPUBLISHED] Appellant. * ___________ Submitted: August 7, 2007 Filed: August 14, 2007 ___________ Before MURPHY, SMITH, and SHEPHERD, Circuit Judges. ___________ PER CURIAM. Marcus J. Glover appeals the 168-month prison sentence the district court1 imposed after he pleaded guilty to conspiring to distribute methamphetamine, in violation of 21 U.S.C. §§ 841(a)(1), (b)(1)(A), and 846. On appeal, Glover’s counsel has moved to withdraw and has filed a brief pursuant to Anders v. California, 386 U.S. 738 (1967). 1 The Honorable Richard E. Dorr, United States District Judge for the Western District of Missouri. Glover’s written plea agreement contains a valid appeal waiver which encompasses the argument that counsel raises on appeal, and we conclude that the waiver is enforceable and that enforcing it would not cause a miscarriage of justice. See United States v. Andis, 333 F.3d 886, 889-92 (8th Cir. 2003) (en banc) (discussing enforceability of appeal waiver); see also United States v. Estrada-Bahena, 201 F.3d 1070, 1071 (8th Cir. 2000) (per curiam) (enforcing appeal waiver in Anders case). After reviewing the record independently under Penson v. Ohio, 488 U.S. 75 (1988), and finding no non-frivolous issues not covered by the waiver, we enforce the waiver and dismiss this appeal. We grant counsel’s motion to withdraw on condition that counsel inform appellant about the procedures for filing petitions for rehearing and for certiorari. ______________________________ -2-
Project Summary Tuberculosis is a devastating global health crisis caused by Mycobacterium tuberculosis (Mtb) that claims over 2 million lives each year. This pathogen is able to survive inside macrophages and persist within patients for years, causing latent TB infections (LTBI). Mtb is refractory to antibiotic treatment because latent (or dormant) TB exhibit phenotypic drug resistance due to metabolic and structural adaptations to conditions within pulmonary granuloma lesions. As a result, successful treatment of TB requires a regimen including a cocktail of multiple drugs administered for 6-9 months. The emergence of multi-drug resistant Mtb strains has further complicated the already difficult task of treating TB. Thus, there is a dire need for potent drugs with novel modes of action capable of shortening the course of treatment and killing drug-resistant and latent Mtb. This proposal seeks to address this critical lack of drugs that effectively kill latent Mtb. In collaboration with Harbor Branch Oceanographic Institute (HBOI), we will exploit the enormous chemical diversity present among secondary metabolites of marine organisms by screening a peak library of marine natural products (MNP) against Mtb in two models of latency. In the R21 phase, we will build upon preliminary studies by screening ~5000 MNP for activity against Mtb in log-phase broth cultures, Mtb growing in macrophages, and dormant Mtb using an in vitro multi-stress model (MSM) of latency (Aim 1). In addition, we will purify and structurally characterize ?hit? fractions bactericidal for Mtb which we identified in a completed pilot screen (Aim 2). In the R33 phase, we will purify and define the structures of prioritized active compounds from hit fractions from all three screens (Aim 3), Finally, we will conduct detailed characterization of purified lead compounds to determine their potency, specificity, and potential targets and mode of action (Aim 4). We hypothesize that these models will favor the identification of drugs active against latent Mtb that target pathways conditionally essential for survival in vivo. We anticipate that the chemical diversity present in MNP will facilitate the identification of compounds with unique structures, targets, and mechanisms of action. Our long-term goal is the discovery of novel lead compounds that would significantly improve the treatment of latent and drug-resistant tuberculosis.
// // Do.swift // RxSwift // // Created by Krunoslav Zaher on 2/21/15. // Copyright © 2015 Krunoslav Zaher. All rights reserved. // extension ObservableType { /** Invokes an action for each event in the observable sequence, and propagates all observer messages through the result sequence. - seealso: [do operator on reactivex.io](http://reactivex.io/documentation/operators/do.html) - parameter onNext: Action to invoke for each element in the observable sequence. - parameter afterNext: Action to invoke for each element after the observable has passed an onNext event along to its downstream. - parameter onError: Action to invoke upon errored termination of the observable sequence. - parameter afterError: Action to invoke after errored termination of the observable sequence. - parameter onCompleted: Action to invoke upon graceful termination of the observable sequence. - parameter afterCompleted: Action to invoke after graceful termination of the observable sequence. - parameter onSubscribe: Action to invoke before subscribing to source observable sequence. - parameter onSubscribed: Action to invoke after subscribing to source observable sequence. - parameter onDispose: Action to invoke after subscription to source observable has been disposed for any reason. It can be either because sequence terminates for some reason or observer subscription being disposed. - returns: The source sequence with the side-effecting behavior applied. */ public func `do`(onNext: ((Element) throws -> Void)? = nil, afterNext: ((Element) throws -> Void)? = nil, onError: ((Swift.Error) throws -> Void)? = nil, afterError: ((Swift.Error) throws -> Void)? = nil, onCompleted: (() throws -> Void)? = nil, afterCompleted: (() throws -> Void)? = nil, onSubscribe: (() -> Void)? = nil, onSubscribed: (() -> Void)? = nil, onDispose: (() -> Void)? = nil) -> Observable<Element> { return Do(source: self.asObservable(), eventHandler: { e in switch e { case .next(let element): try onNext?(element) case .error(let e): try onError?(e) case .completed: try onCompleted?() } }, afterEventHandler: { e in switch e { case .next(let element): try afterNext?(element) case .error(let e): try afterError?(e) case .completed: try afterCompleted?() } }, onSubscribe: onSubscribe, onSubscribed: onSubscribed, onDispose: onDispose) } } final private class DoSink<Observer: ObserverType>: Sink<Observer>, ObserverType { typealias Element = Observer.Element typealias EventHandler = (Event<Element>) throws -> Void typealias AfterEventHandler = (Event<Element>) throws -> Void private let _eventHandler: EventHandler private let _afterEventHandler: AfterEventHandler init(eventHandler: @escaping EventHandler, afterEventHandler: @escaping AfterEventHandler, observer: Observer, cancel: Cancelable) { self._eventHandler = eventHandler self._afterEventHandler = afterEventHandler super.init(observer: observer, cancel: cancel) } func on(_ event: Event<Element>) { do { try self._eventHandler(event) self.forwardOn(event) try self._afterEventHandler(event) if event.isStopEvent { self.dispose() } } catch let error { self.forwardOn(.error(error)) self.dispose() } } } final private class Do<Element>: Producer<Element> { typealias EventHandler = (Event<Element>) throws -> Void typealias AfterEventHandler = (Event<Element>) throws -> Void private let _source: Observable<Element> private let _eventHandler: EventHandler private let _afterEventHandler: AfterEventHandler private let _onSubscribe: (() -> Void)? private let _onSubscribed: (() -> Void)? private let _onDispose: (() -> Void)? init(source: Observable<Element>, eventHandler: @escaping EventHandler, afterEventHandler: @escaping AfterEventHandler, onSubscribe: (() -> Void)?, onSubscribed: (() -> Void)?, onDispose: (() -> Void)?) { self._source = source self._eventHandler = eventHandler self._afterEventHandler = afterEventHandler self._onSubscribe = onSubscribe self._onSubscribed = onSubscribed self._onDispose = onDispose } override func run<Observer: ObserverType>(_ observer: Observer, cancel: Cancelable) -> (sink: Disposable, subscription: Disposable) where Observer.Element == Element { self._onSubscribe?() let sink = DoSink(eventHandler: self._eventHandler, afterEventHandler: self._afterEventHandler, observer: observer, cancel: cancel) let subscription = self._source.subscribe(sink) self._onSubscribed?() let onDispose = self._onDispose let allSubscriptions = Disposables.create { subscription.dispose() onDispose?() } return (sink: sink, subscription: allSubscriptions) } }
The RNA-binding PUA domain of archaeal tRNA-guanine transglycosylase is not required for archaeosine formation. Bacterial tRNA-guanine transglycosylase (TGT) replaces the G in position 34 of tRNA with preQ(1), the precursor to the modified nucleoside queuosine. Archaeal TGT, in contrast, substitutes preQ(0) for the G in position 15 of tRNA as the first step in archaeosine formation. The archaeal enzyme is about 60% larger than the bacterial protein; a carboxyl-terminal extension of 230 amino acids contains the PUA domain known to contact the four 3'-terminal nucleotides of tRNA. Here we show that the C-terminal extension of the enzyme is not required for the selection of G15 as the site of base exchange; truncated forms of Pyrococcus furiosus TGT retain their specificity for guanine exchange at position 15. Deletion of the PUA domain causes a 4-fold drop in the observed k(cat) (2.8 x 10(-3) s(-1)) and results in a 75-fold increased K(m) for tRNA(Asp)(1.2 x 10(-5) m) compared with full-length TGT. Mutations in tRNA(Asp) altering or abolishing interactions with the PUA domain can compete with wild-type tRNA(Asp) for binding to full-length and truncated TGT enzymes. Whereas the C-terminal domains do not appear to play a role in selection of the modification site, their relevance for enzyme function and their role in vivo remains to be discovered.
4 BUSINESS DAY C002D5556 Monday 16April 2018 Commodities Brent Oil $70.61 Cocoa US $2,524.00 NSE Biggest Gainer Biggest Loser Seplat Intbrew N698.3 4.99pc N50 -6.80pc 40,928.70 businessday market monitor Bitcoin Everdon Bureau De Change 2,827,022.17 +8.81pc Powered by $-N £-N €-N BUY SELL 360.00 363.00 501.00 511.00 435.50 445.00 FOREIGN EXCHANGE TREASURY BILLS Market Spot $/N 3M 6M I&E FX Window 360.32 0.00 -0.01 CBN Official Rate 305.55 13.18 14.31 FMDQ Close 5 Years -0.27% 13.24% FGN BONDS 10 Years -0.10% 13.51% 20 Years -0.18% 13.34% Azura IPP deploys 450mw full capacity to national grid ... as generation loss hits 1940mw OLUSOLA BELLO The country’s yearning for improved electricity generation inched closer to reality at the weekend as Azura Independent Power project (IPP) successfully deployed all it three turbines with combined generating capacities of 450 megawatts on the national grid. This is expected to improve power generation a great deal and subsequently impact positively on electricity supply generally across the country. This happened a day after the power sector suffered partial system collapsed and a severe generation drop by 606 megawatts hour (MWh/h) leading to all the generating stations sending out on the average 3,370602MWh/hour last week Thursday. There was nothing to suggest that the situation was much better on Friday even after Azura had deployed its 450 mw to the national grid, as power supply to Lagos and its environs has been poor in the last few days. According to a presidency source 1325.5MW was not generated due to unavailability of gas while lack of transmission infrastructure was responsible for 40MW not generated. Another 485MW was not generated due to high frequency resulting from unavailability of distribution infrastructure just as reduced water level at the hydro at power stations also caused the loss of 190 MW, thereby indicating that there is a shortfall of 1940mw in generation. On the whole the power sector lost an estimated N979,000,000 on April 12, 2018 due to insufficient gas supply, distribution and transmission infrastructure as well as water reserves. The Federal Government through the Nigerian Bulk Electricity Trading Plc (NBET) recently paid Azura Power the sum of N8m being twelve percent of about N66 million for test power sent to the national grid in January, sources with knowledge about the transaction told BusinessDay. Meanwhile, Nigeria’s other generating companies (Gen- Cos) will today hear judgement on a suit they filed against the Federal Government for prioritising settlement of its commitment to Azura Power in the N701billion power guarantee instituted to assuage DisCos failure to settle market invoices. The rest of the GenCos have received settlement up till October 2017 and since then their invoices have remained unsettled according to Joy Ogaji, the executive secretary of Association of Power Generation Companies (APGN). “The situation remains the same, we still have not received payment for our invoices since October last year,” she told BusinessDay by phone. Ogaji said that the legacy power plants which have the capacity to generate over 7,000MW of electricity were denied a sovereign risk guarantee only for the Federal Government to give Azura the same guarantee including a partial risk guarantee from the World Bank even when it has capacity to generate only 450MW. But Jubril Kareem, energy analyst at EcoBank does not agree with this view. “Part of the reason the Azura project was able to get funding and construction started was because the government committed to it and it has a very solid power purchase agreement based on the realities on ground. “Nigeria is one of the most expensive places to generate power and if they are being paid according to the terms of the power purchase agreement, there is nothing wrong with that. Kareem further said, “The agreement with Azura was so tight that if government defaulted on payment it has serious implications. This is unlike the other power plants which were mostly acquired from the government, it was built brand new and they had the time to mitigate all risk about not being paid.” Azura Power is the first Nigerian power project to benefit from both the World Bank’s “Partial Risk Guarantee” structure ($237 million of debt used to build the plant) and the political risk insurance supplied by the Multilateral Investment Guarantee Agency. Azura delivered on budget ahead of schedule by 7 months and could increase Nigeria’s peak generation from 5,155MW to over 5,500MW. However, analysts are concerned about the ability of the Federal Government to sustain payment for Azura Power considering the huge cost involved in settling the test power for one month.. Azura secured a $900m debt financing from a consortium of 15 banks from 9 different countries, including most of the European development finance institutions to build a 450MW Open Cycle Gas Turbine in Benin City, Edo State, Last month, it sent NBET, the market bill for test power from a single turbine of 153MW delivered to the grid on December 20, 2017. L-R: Ladi Balogun, group chief executive, FCMB Group plc; Tinuade Awe, executive director, regulations, Nigerian Stock Exchange (NSE); Oladipupo Jadesimi, chairman, FCMB Group plc; Olusegun Odubogun, non-executive director, FCMB Group plc, and Olutola Mobolurin, non-executive director, during the closing gong ceremony in commemoration of the newly appointed chairman of FCMB Group plc, at the Exchange in Lagos. Cement makers see profits drop to 5 year... Continued from page 1 ket capitalisation of N4.4 trillion has gained 13 percent year to date and trades at a price to book ratio of 5.4xs, according to Bloomberg data. Lafarge Africa has a market capitalisation of N385.96 billion, has returned -0.87 percent ytd, and trades at a price to sales ratio of 0.87Xs. Data gleaned by BusinessDay shows the major drag on industry profit growth is Large Africa Plc, a company grappling with rising costs and leverage that eroded margins. For the year ended December 2017, Lafarge Africa posted a loss after tax of (N34.60 billion) from a profit position of N16.89 billion the previous year, the lowest in five years since BusinessDay started compiling data. Lafarge profits for 2014, 2015 and 2016 were N34.66 billion, N26.98 billion and N16.89 billion respectively. Lafarge had finance costs or interest expense of N43.02 billion for the period, the highest in 7 years, brought on by interest on borrowing incurred while paying the loans of subsidiary company, UNICEM. A breakdown of the combined profit in the period under review (2017) showed Dangote Cement Plc, the largest producer of the building material recorded net income of N204.24 billion, flat from the N201.19 billion recorded in 2013. Dangote’s 2014, 2015 and 2016 profits were N159.50 billion, N181.52 billion and N186.62 billion respectively. CCNN’s profit after tax stood at N3.22 billion as at December 2017, representing a 106.50 percent surge from the N1.56 billion recorded five years ago. Industry experts are upbeat that economic growth underpinned by an increase in crude oil price and production and the introduction of foreign exchange system that help curb the crippling dollar shortage will boost future earnings of firms operating in the sector as they expect an uptick in the demand for building materials. The gross domestic product of Africa’s largest oil producer expanded for three straight quarters last year after a 1.6 percent contraction in 2016, with year-on-year growth reaching 1.9 percent in the final three months of 2017. The International Monetary Fund (IMF) has projected that Nigeria’s economy will grow by 2.1 percent in 2018. The forecast which represents 0.2 percent increase from the 1.9 percent projected in October 2017. “We expect revenue growth to be sustained amid a faster recovery in Nigeria, thanks to increased government infrastructure spending ahead of the 2019 general election notwithstanding stiff competition,” said analysts at United Capital. President Muhammadu Buhari has presented a record budget of N8.60 trillion to the National Assembly for 2018. Out of the total budget figure, N2.4 trillion has been earmarked for capital spending. Nigeria has infrastructure deficit of $2 trillion, according to the Africa Finance Corporation. Also, the 17 million housing deficit is a low hanging fruit for cement makers to grow sales volume. “We estimate that an additional two million housing units by 2020e from the public sector alone (as highlighted in the economic recovery plan), will unlock about 20-24 million tonnes (mt) of cement over 2018e-2020e,” said analysts at RMBNS, in a recent report on Nigeria’s cement industry. Lafarge Africa is spending more to produce each unit of product as cost to income ratio increased to 83.03 percent, the highest in 5 years; driven by the construction of Mfamsong evacuation road at UNICEM in Calabar which failed as well as a full impairment taken on a Pre-heater project in ASHAKACEM which the cement maker hinted it has discontinued. The company is working to reduce energy and transportation costs as part of a turnaround plan, according to Michel Puchercos, the Chief Executive Officer of Lafarge Holcim Plc.
Rex Ryan needs to revamp his philosophy regarding the safety position. Instead of trying to get by on the cheap, it's time for the New York Jets to invest in the position. In Ryan's system, the big money goes to the cornerbacks. The safeties are considered interchangeable parts. The Jets haven't drafted a safety in the first three rounds since 2006 (Eric Smith) and they haven't doled out big bucks since Kerry Rhodes (2008) -- both pre-Ryan moves. They splurged a little for LaRon Landry in 2012 ($3.5 million), but it was only a one-year contract. He made the Pro Bowl and they let him walk. The safeties had an alarming lack of big plays last season. The ancient Ed Reed showed up in mid-November and he finished with more interceptions (three) than Dawan Landry and Antonio Allen combined (two). The defense allowed so many long pass plays that Ryan did something that pained him -- he used a two-deep alignment at times. He'd rather wear New England Patriots gear in public than play Cover 2 looks, but he felt he had no choice, especially with his cornerbacks also struggling. Safeties are important. Just look at the Seattle Seahawks and what they've been able to do with Earl Thomas and Kam Chancellor. It's time for the Jets to add a playmaker on the back end. Will they? No -- unless Ryan does a 180. Projected offseason plan: With starters Dawan Landry and Antonio Allen under contract, along with backups Josh Bush and Jaiquawn Jarrett, the Jets are expected to stand pat. Their expectation is that Allen and the backups will continue to develop. Reed, 35, is an unrestricted free agent, but he doesn't figure in the immediate plans. He could be a fallback option if there's an injury down the line. Free agency: If the Buffalo Bills are dumb enough to let Jairus Byrd hit the open market, the Jets should be all over him. He's exactly what they need, an instinctive ballhawk still in the prime of his career at age 27. He has 22 interceptions in five years and he's familiar with the Ryan system, having played in a similar scheme last season under former Jets coordinator Mike Pettine. Put Byrd in the deep middle of their Cover 1, and everything changes. He'll have a huge price tag (at least $8 million per year), but he'd be worth it. He also could get slapped with the franchise tag for the second straight year. T.J. Ward (Cleveland Browns) would be a terrific Plan B. He's only 27, a player on the rise, but you have to think the Browns, with a ton of cap room, won't let him get away. Then again, they're the Browns, so you never know. Draft: It would be a major upset if the Jets take a safety in the first round, so forget about Alabama's Ha Ha Clinton-Dix and Louisville's Calvin Pryor, whose stock is creeping up. A second-round possibility could be Northern Illinois' Jimmie Ward. But, like we said earlier, it's not Ryan's style to pick a safety this high.
--- abstract: 'Using density functional theory, we present a comparative study of the electronic properties of BN-doped graphene monolayer, bilayer, trilayer, and multilayer systems. In addition, we address a superlattice of pristine and BN-doped graphene. Five doping concentrations between 12.5% and 75% are considered, for which we obtain band gaps from 0.02 eV to 2.43 eV. We show that the effective mass varies between 0.007 and 0.209 free electron masses, resembling a high mobility of the charge carriers.' author: - 'T. P. Kaloni$^1$, R. P. Joshi$^2$, N. P. Adhikari$^2$, and U. Schwingenschlögl$^2$' title: 'Band gap tunning in BN-doped graphene systems with high mobility' --- The outstanding electronic properties of graphene have caused huge interest in this material, though the gapless features restrict to build graphene-based electronic devices, which could be alternative for existing silicon-based technology. Therefore, opening a finite and tunable band gap in graphene is demanded. Great efforts have been devoted to opening of a tunable gap in graphene. Various routes have been proposed, for example: superlattices of graphene with $h$-BN [@Zhou; @kaloni; @Giovannetti; @Xu], atomic layers of hybridized $h$-BN and graphene domains [@ajayan], bilayer graphene [@park], graphene nanowires [@son], and twisted graphene [@li]. In gated bilayer graphene, a band gap of 250 meV and in graphene nanowires a band gap of 24 meV has been opened. The substrate induced band gap is found to be 52 meV. In twisted graphene a band gap 270 meV have been reported. The many other ways also proposed to open a band gap in graphene, such as oxidation of graphene [@Bagri; @Dai; @Nourbakhsh], hydrogenation [@Pumera], and inducing of fluorine/boron-oxide in graphene [@Withers; @udo2; @udo3]. Recently, experimentally, a novel and promising way to open a band gap in graphene is proposed by controlling the domain size of in-plane heterostructures of graphene and $h$-BN [@ajayan1] The $h$-BN is wide band gap insulator with the same honeycomb structure as graphene [@Watanabe; @Kubota]. It exhibits many attractive properties such as high in-plane mechanical strength, excellent chemical inertness, and high thermal conductivity [@Balandin; @Frank; @Song; @Kho; @Chen]. It is suitable material to form the hybrid structure with graphene due to minimal lattice mismatch of about 1.6% and both having same structural dimensionality. Hence, it is easy to achieve the hybrid structures of graphene and $h$-BN either in-plane manner or in stacking scheme as it has been demonstrated experimentally in Refs. [@ajayan; @ajayan1]. Experimentally and theoretically the B/N doped graphene have been studied [@Sharifi; @Han; @Xue; @sugata] and BN doped graphene leads to semiconducting [@Kim; @Leenaerts; @sugata1]. Still mechanism of the opening of the band gap in BN doped graphene, its electron effective mass, and mobility are unsettled. Recently, the BN doped multilayer graphene and BN domain in graphene has been synthesized [@Kim; @ajayan1]. Motivated by these experimental reports, we investigate the effect BN doping in the electronic properties of graphene monolayer, bilayer, trilayer, multilayer, and superlattice of pristine and BN-doped graphene, using density functional theory. The opening of the band gap found to be 0.02 eV to 2.43 eV for 12.5% to 75% BN concentration. The calculated value of band gap are in good agreement with the available experimental and theoretical data. We estimate the electron effective mass for all the systems under study and found to be the value varies form 0.007 m$_e$ (which is smaller than that of reported for similar systems) to 0.209 m$_e$. We also estimate the mobility, which is as high as graphene on $h$-BN. The results presented here are obtained from first-principles density functional theory in generalized gradient approximation [@Perdew]. The QUANTUM-ESPRESSO code is used with a plane-wave cutoff energy of 45 Ry [@paolo]. In addition, Van der Waals interaction has been taken into account via Grimmes scheme [@grimme], which is expected to provide correct interlayer spacing and dispersion. A MonkhorstPack with a 8$\times$8$\times$1 k-mesh is used for all calculations under study. A 4$\times$4 supercell of graphene is used in our calculations. For all the structures, the atomic positions are fully relaxed until the energy convergence of 10$^{-5}$ Ry and the force convergence of 10$^{-4}$ Bohr/Ry is achieved. The BN-doped graphene is classifies as (1) monolayer (see Fig. 1), (2) bilayer, (3) trilayer, (4) multilayer, and (5) superlattice. In all these systems, we have used five different BN-doping concentrations such as 12.5% (2B2N), 25% (4B4N), 43.75% (7B7N), 56.25% (9B9N), and 75% (12B12N). In all of the mentioned doping concentration the ratio of B to N atom is same [@ajayan]. Turning to stacked structure: bilayer, trilayer, multilayer (superlattice of BN-doped graphene), and superlattice of pristine graphene with BN-doped graphene, there are two stacking schemes, such as AA and AB with different geometry. All of the possible configurations, N centered orientation in AB stacking is the most stable [@Giovannetti]. Hence, we only consider N centered AB stacking structures in our calculations. The distance between two layer in BN-doped bilayer and trilayer graphene is found to be 3.34 Å which is same as the separation between two layer in graphite. In all system under study, we found $a=b=9.94$ Å. We use a vacuum layer of 12 Å in order to avoid the interlayer interactions due to the periodic boundary conditions. Multilayer and superlattice of pristine and BN-doped graphene have orientation similar to that of BN-doped bilayer graphene in which the distance between two layer is equal to 3.36 Å and the length of the $c$ lattice to be 6.72 Å. The modified C$-$C bond length for all the systems under study are vary from 1.40 Å to 1.43 Å, C$-$B bond length varies from 1.46 Å to 1.49 Å, C$-$N bond length varies from 1.36 Å to 1.40 Å, and B$-$N bond length varies from 1.40 Åto 1.45 Å, while for pristine graphene C$-$C bond length is 1.42 Å and B$-$N bond length is 1.44 Å for pristine $h$-BN. The bond angle in BN-doped systems varies from 117$^\circ$ to 122$^\circ$, which is 120$^\circ$ for pristine graphene/$h$-BN. ![Supercells used for modeling different BN concentrations.](fig2.eps){width="30.00000%"} To understand the stability of the structure and to compare the energetics we calculate the cohesive energy. The cohesive energy is calculated as $E_{coh}= \frac{E_{cell}-n\cdot E_C-m\cdot E_B-p\cdot E_N}{n+m+p}$, where E$_{coh}$, cohesive energy, E$_{cell}$ is the total energy of BN doped 4$\times$4 supercell, E$_C$, E$_B$, and $E_N$ are the total energy of isolated C, B, and N atoms, which is calculated by placing a single atom in a large and n, m, p are the total number of C, B, and N atoms, respectively. The calculated values of cohesive energy for all the systems under study are presented in Table I. The cohesive energy for BN-doped monolayer ranges from 7.76 eV/atom to 8.02 eV/atom for 12.5% to 75%, which value is 7.75 eV/atom to 8.00 eV/atom for both bilayer and trilayer, and 7.75 eV/atom to 8.12 eV/atom for multilayer and superlattice of pristine and BN-doped graphene. These value slightly higher than that of the cohesive energy of 7.41 eV/atom for graphite [@Greenwood], close to superlattices of graphene and $h$-BN [@kaloni], and also well agree with the obtained value of the cohesive energy of $h$-BN [@ciraci]. From these obtained data for cohesive energy, we can conclude that all the system under study are highly feasible. The band gap is an intrinsic property of semiconductors, which indeed hugely determines the transport and the optical properties. It should have a key role in modern device industry and technology. In this contrast, we focus the sensitivity of the electronic properties of the BN-doped thicker and thinner graphene by varying the BN concentration of 12.5% to 75%. The calculated electronic structures of pristine graphene and BN-doped thinner and thicker graphene along the $\Gamma$-K-M-$\Gamma$ path is addressed in Fig. 2. The top row represents a monolayer graphene doped by 12.5% to 75% of BN atoms, second row represents bilayer, third row represents trilayer, fourth row represents multilayer, and fifth row represents superlattice of pristine graphene and BN-doped graphene with the same concentration as monolayer. We obtain the band gap of 0.42 to 2.43 eV for 12.5% to 75%, respectively, for all the systems under study, see Table I. The increasing of the band gap with respect to the BN concentration in graphene is addressed in Fig. 3. The opening of the band gap is attributed by the broken sublattice symmetry of the pristine graphene due the presence of the BN pair. Recently, the experimental setup for such level of doping is established by mass production of graphene samples using CH$_4$ gas as C source and ammonia borane precursor for BN source, which are introduced as a vapor in the whole duration of graphene growth [@Chang]. The concentration of the BN in graphene sample can be varied and controlled by controlling annealing temperature of the precursor. This process can be monitored by the X-ray photoelectron spectroscopy, which indeed confirms the monotonus increment in the BN concentration by the rising of the annealing temperature of the precursor. The authors of Ref. [@Chang] measured the band gap of about 0.6 eV for low concentration of the BN in the graphene sample, which in fact very close to our calculated band gap for the low concentration of 12.5%. The another reason for the opening of the band gap is the change in the on-site energy of graphene due to the isoelectronic co-doping of BN pairs [@Liu1]. The obtained value of the band gap is increasing monotonically with increasing the BN pairs in the graphene sheet, due to the changing the on-site energy of the more and more carbon atoms in the system. The electronic band structure of undoped and the BN-doped bilayer and trilayer graphene by 12.5% to 75% are shown in second and third rows of the Fig. 2. The pristine bilayer/trilayer graphene is metallic in nature [@Zhang1; @Freitag]. The variation of the band gap follows the similar trend as in the case of monolayer but with slightly smaller gap, see Table I and Fig. 3. The band gap is decreasing with increasing the number of layers due the fact that the inversion symmetry broken for the bilayer/trilayer BN-doped graphene. The band gap opening in pristine bilayer graphene by the breaking of the inversion symmetry due to the application of the finite electric field has been demonstrated experimentally [@Zhang1], a band gap of 250 meV has been achieved. However, in our calculations, by BN-doping in bilayer/trilayer graphene a variable band gap of 0.04 eV to 2.20 eV is obtained, which can be enhanced and controlled by applying the electric field as it has been investigated for pristine bilayer graphene. The system we have studied here have been synthesized experimentally [@ajayan; @ajayan1; @Kim]. ![Electronic band structure of BN-doped graphene for concentrations between 0% (red lines) and 75% (blue lines). First row: monolayer, second row: bilayer, third row: trilayer, fourth row: multilayer, fifth row: superlattice of pristine and BN-doped layers. Note that the high symmetric points of the $4\times4$ supercell are folded back to the same points of the $1\times1$ cell. ](band-new1.eps){width="70.00000%"} The quantization of the energy states in the potential wells are important to understand the characteristic features of the superlattices. Which is always depends on the barrier height, when the barrier hight is small then 2 Å the electronic energy bands should split into quasi-two-dimansional subbands like in conventional superlattices, for example InAs/GaSb. Moreover, if the barrier height is greater than 2 Å, the possibility of the overlapping of the neighbouring wavefunctions become suppressed. This give rise the the separate quantum wells of the superlattices [@Xu]. In our case the superlattices having a barrier height of greater than 2 Å  (i.e. 3.36 Å). Our calculated band gap for superlattice is smaller than that of BN doped monolayer, bilayer, and trilayer graphene, see the electronic band structure addressed in fourth row of the Fig. 2 and Table I. Following the same trend as the other cases discussed above, the band gap increasing with the increasing the concentration of the BN atoms, which is well agree with the available theoretical prediction [@Lin] and experimental observation [@Kim]. Essentially, the electronic band structure of the superlattice is presented in fifth row of the Fig. 2 and obtained data are summarized in Table I. In this case, the minimum band gap of 0.08 eV to the maximum of 0.13 eV is observed. These obtained values are well agree with the available data for similar systems [@kaloni; @Giovannetti; @Xu]. The superlattice with all the BN doping concentration would be a promising candidate to build electronic device in a low voltage limit [@Zhang1]. All the systems with low BN doping concentration are good for thermoelectric applications. ![Band gap as a function of doping for various BN-doped graphene systems.](bgap-new1.eps){width="45.00000%"} From tight-binding approximation, the energy spectrum of gapped graphene, where the charge carriers behaves as massive Dirac particles is expressed as $E(k)=\pm v\sqrt{k_x^2+k_y^2+m^*{^2}v^2}$ [@Casolo], where $\pm$ represents the conduction and valance bands, k$_x$ and k$_y$ are wave vector and m$^*$ is electron effective mass and hence band gap can be formulated as $E_g = 2m^*v^2$. Finally, we attempt to calculate the electron effective mass of the electron defined by $(m^{*})\sim\frac{E_g}{2v^2}$ [@apl], where E$_g$ is the band gap and v is the Fermi velocity, which is found to be $\sim$0.8$\cdot10^{6}$ m/s for BN doped systems. It is reported that the interlayer spacing is the key point to control the band gap in bilayer graphene but with the increasing the band gap the value of m$^{*}$ is hugely increased, which is not good for device application because it suppress the carrier mobility. Hence, its very important to keep and control the m$^{*}$ as much as small. Our calculated electron effective mass for all the systems under study is varies from 0.007 m$_e$ to 0.209 m$_e$, presented in Table I. The calculated m$^{*}$ really very small for low concentration limit of all the BN doped graphene systems. Interestingly the m$^{*}$ is lowest form all the concentration from 12.5% to 75% for superlattice of pristine and BN-doped graphene because of smallest band gap opening in this system, and hence would be great candidate to built a electronic and opto-electronic devices, those can be operated in a low voltage/energy gap with a highly enhanced mobility [@magno]. Quantity Concentration (%) Monolayer Bilayer Trilayer Multilayer Superlattice ---------- ------------------- ----------- --------- ---------- ------------ -------------- 12.5 8.02 8.00 8.00 8.12 8.18 25 7.94 7.93 7.93 7.92 8.15 43.75 7.85 7.84 7.84 7.83 8.11 56.25 7.78 7.79 7.77 7.77 8.08 75 7.76 7.75 7.75 7.75 8.07 12.5 0.42 0.11 0.04 0.02 0.08 25 0.85 0.50 0.40 0.49 0.12 43.75 1.46 1.30 1.15 0.96 0.20 56.25 1.76 1.52 1.40 1.22 0.14 75 2.43 2.20 2.08 1.90 0.13 12.5 0.040 0.009 0.003 0.02 0.007 25 0.073 0.043 0.034 0.042 0.010 43.75 0.125 0.111 0.098 0.082 0.017 56.25 0.151 0.130 0.120 0.105 0.012 75 0.209 0.189 0.178 0.163 0.011 12.5 0.84 3.71 6.68 1.67 4.77 25 0.46 0.78 0.48 0.85 3.34 43.75 0.28 0.30 0.34 0.40 1.97 56.25 0.22 0.26 0.28 0.32 2.78 75 0.16 0.18 0.19 0.20 3.04 : Cohesive energy, band gap, effective mass, and electron mobility for various BN-doped graphene systems. We next calculate the electron mobility for all the systems under study. The electron mobility can be expressed as $\mu=\frac{e\tau}{m^*}$, where $\tau$ is the momentum relaxation time with a typical value of 1.9$\cdot10^{-13}$ s for Si doped graphene [@fedorov] and e is the charge of electron (1.6$\cdot10^-{19}$ c). The estimated $\mu$ varies from 0.18 m$^2$V$^{-1}$s$^{-1}$ to 6.68 m$^2$V$^{-1}$s$^{-1}$, see Table I. We found the $\mu^*$ is amazingly high for the BN-doped trilayer graphene which is 6 times higher than that of SiO$_2$ gated pristine graphene [@Ishigami] and 1.11 times higher than that of graphene on $h$-BN substrate [@hone]. We believe that our investigated systems should be excellent candidate for device application. In conclusion, we performed the comparative study of electronic properties of BN doped monolayer graphene, bilayer, trilayer, multilayer, and superlattice of pristine and BN-doped graphene. Our results prevail that the band gap of graphene system can be tuned by BN-doping with different stacking pattern and concentrations. Due to the breaking of the sublattice symmetry by presence of B and N atoms a band gap of 0.02 eV to 2.43 eV is obtained for 12.5 % to 75% BN-doping concentration. Our estimated electron effective mass for the systems under study is found to be varies form 0.007 m$_e$ to 0.209 m$_e$, which is smaller than that of obtained for similar systems before. A giant mobility is estimated as compared to experimentally observed value for graphene on $h$-BN [@hone], would have great impact on devices. Finally, our predict is to open finite and tunable band gap in BN-doped graphene with a giant mobility, which is promising for future graphene based electronics [@ajayan; @ajayan1; @Kim]. [50]{} S. Y. Zhou, G.-H. Gweon, A. V. Fedorov, P. N. First, W. A. De Heer, D. -H. Lee, F. Guinea, A. H. Castro Neto, and A. Lanzara, Nat. Mater. **6**, 770 (2007). T. P. Kaloni, Y. C. Cheng, and U. Schwingenschlögl, J. Mater. Chem. **22**, 919 (2012). G. Giovannetti, P. A. Khomyakov, G. Brocks, P. J. Kelly, and J. van den Brink, Phys. Rev. B [**76**]{}, 073103 (2007). Y. Xu, Y. Liu, H. Chen, X. Lin, S. Lin, B. Yu, and J. Luo, J. Mater. Chem. [**22**]{}, 23821 (2012). L. Ci, L. Song, C. Jin, D. Jariwala, D. Wu, Y. Li, A. Srivastava, Z. F. Wang, K. Storr, L. Balicas, F. Liu, and P. M. Ajayan, Nat. Mater. [**9**]{}, 430 (2010). C.-H. Park and S. G. Louie, Nano Lett. [**10**]{}, 426 (2010). Y. W. Son, M. L. Cohen, and S. G. Louie, Phys. Rev. Lett. [**97**]{}, 216803 (2010). G. Li, A. Luican, J. M. B. Lopes dos Santos, A. H. Castro Neto, A. Reina, J. Kong, and E. Y. Andrei, Nat. Phys. [**6**]{}, 109 (2010). A. Bagri, C. Mattevi, M. Acik, Y. J. Chabal, M. Chhowalla, and V. B. Shenoy, Nat. Chem. [**2**]{}, 581 (2010). J. Dai and J. Yuan, Phys. Rev. B [**81**]{}, 165414 (2010). A. Nourbakhsh, M. Cantoro, T. Vosch, G. Pourtois, F. Clemente, M. H. van der Veen, J. Hofkens, M. M. Heyns, S. D. Gendt, and B. F. Sels, Nanotechnology [**21**]{}, 435203 (2010). M. Pumera and C. H. A. Wong, Chem. Soc. Rev. [**42**]{}, 5987 (2013). F. Withers, T. H. Bointon, M. Dubois, S. Russo, and M. F. Craciun, Nano Lett. [**11**]{}, 3912 (2011). T. P. Kaloni, Y. C. Cheng, and U. Schwingenschlögl, EPL [**100**]{}, 37003 (2013). T. P. Kaloni, M. Upadhyay-Kahaly, R. Faccio, and U. Schwingenschlögl, Carbon [**64**]{}, 281 (2013). Z. Liu, L. Ma, G. Shi, W. Zhou, Y. Gong, S. Lei, X. Yang, J. Zhang, J. Yu, K. P. Hackenberg, A. Babakhani, J.-C. Idrobo, R. Vajtai, J. Lou, and P. M. Ajayan, Nat. Nanotechnol. [**8**]{}, 119 (2013). K. Watanabe, T. Taniguchi, and H. Kanda, Nat. Mater. **3**, 404 (2004). Y. Kubota, K. Watanabe, O. Tsuda, and T. Taniguchi, Science **317**, 932 (2007). A. A. Balandin, S. Ghosh, W. Bao, I. Calizo, D. Teweldebrhan, F. Miao, and C. N. Lau, Nano. Lett. **8**, 902 (2008). I. W. Frank, D. M. Tanenbaum, A. M. Van der Zande, and P. L. McEuen, J. Vac. Sci. Technol. **25**, 2558 (2007). L. Song, L. Ci, H. Lu, P. B. Sorokin, C. Jin, J. Ni, A.G. Kvashnin, D. G. Kvashnin, J. Lou, B. I. Yakobson, and P. M. Ajayan, Nano. Lett. **10**, 3209 (2010). J. G. Kho, K. T. Moon, J. H. Kim, and D. P. J. Kim, Am. Ceram. Soc. **83**, 2681 (2000). Y. Chen, J. Zou, S. J. Campbell, and G. Le Caer, Appl. Phys. Lett. **84**, 2430 (2004). J. Han, L. L. Zhang, S. Lee, J. Oh, K.-S. Lee, J. R. Potts, J. Ji, X. Zhao, R. S. Ruoff, and S. Park, ACS Nano [**7**]{}, 19 (2013). T. Sharifi, E. Gracia-Espino, H. R. Barzegar, X. Jia, F. Nitze, G. Hu, P. Nordblad, C.-W. Tai, and T. Wágberg, Nat. Commun. [**4**]{}, 2319 (2013). Y. Xue, D. Yu, L. Dai, R. Wang, D. Li, A. Roy, F. Lu, H. Chen, Y. Liu, and J. Qu, Phys. Chem. Chem. Phys. [**15**]{}, 12220 (2013). T. P. Kaloni and S. Mukherjee, Mod. Phys. Lett. B [**25**]{}, 1855 (2011). O. Leenaerts, H. Sahin, B. Partoens, and F. M. Peeters, Phys. Rev. B [**88**]{}, 035434 (2013). T. P. Kaloni and S. Mukhergie, J. Nanopart. Res. **14**, 1059 (2012) S. M. Kim, A. Hsu, P. T. Araujo, Y.-H. Lee, T. Palacios, M. Dresselhaus, J.-C. Idrobo, K. K. Kim, and J. Kong, Nano Lett. **13**, 933 (2013). J. P. Perdew, K. Burke, and M. Ernzerhof, Phys. Rev. Lett. **77**, 3865 (1986). P. Giannozzi, S. Baroni, N. Bonini, M. Calandra, R. Car, C. Cavazzoni, D. Ceresoli, G. L. Chiaro tti, M. Cococcioni, I. Dabo, A. Dal Corso, S. de Gironcoli, S. Fabris, G. Fratesi, R. Gebauer, U. Gerstmann, C. Gougoussis, A. Kokalj, M. Lazzeri, L. Martin-Samos, N. Marzari, F. Mauri, R. Mazzarello, S. Paolini, A. Pasquare llo, L. Paulatto, C. Sbraccia, S. Scandolo, G. Sclauzero, A. P. Seitsonen, A. Smogunov, P. Umari, and R. M. Wentzcovitch, J. Phys. Condens. Matt. [**21**]{}, 395502 (2009). S. Grimme, J. Comput. Chem. **27**, 1787 (2006). N. N. Greenwood and A. Earnshaw, Chemistry of the Elements (Pergamon, Oxford, 1984). M. Topsakal, E. Aktürk, and S. Ciraci, Phys. Rev. B [**79**]{}, 115442 (2009). C. Chang, S. Kataria, C.-C. Kuo, A. Ganguly, B.-Y. Wang, J.-Y. Hwang, K.-J. Huang, W.-H. Yang, S.-B. Wang, C.-H. Chuang, M. Chen, C.-I. Huang, W.-F. Pong, K.-J. Song, S.-J. Chang, J.-H. Guo, Y. Tai, M. Tsujimoto, S. Isoda, C.-W. Chen, L.-C. Chen, and K.-H. Chen, ACS Nano [**7**]{}, 1333 (2013). L. Liu and Z. Shen, Appl. Phys. Lett. [**95**]{}, 252104 (2009). M. Freitag, Nat. Phys. [**7**]{}, 596 (2011). Y. Zhang, T.-T. Tang, C. Girit, Z. Hao, M. C. Martin, A. Zettl, M. F. Crommie, Y. R. Shen, and F. Wang, Nature [**459**]{}, 820 (2009). B. Xu, Y. H. Lu, Y. P. Feng, and J. Y. Lin, J. Appl. Phys. [**108**]{}, 073711 (2010). S. Casolo, R. Martinazzo, and G. F. Tantardini, J. Phys. Chem. C [**115**]{}, 3250 (2011). Y. Fan, M. Zhaoa, Z. Wang, X. Zhang, and H Zhang, Appl. Phys. Lett. [**98**]{}, 083103 (2011). R. Magno, E. R. Glaser, B. P. Tinkham, J. G. Champlain, J. B. Boos, M. G. Ancona, and P. M. Campbell, J. Vac. Sci. Technol. B [**24**]{}, 1622 (2006). D. V. Fedorov, M. Gradhand, S. Ostanin, I. V. Maznichenko, A. Ernst, J. Fabian, and I. Mertig, Phys. Rev. Lett. [**110**]{}, 156602 (2013). J.-H. Chen, C. Jang, M. Ishigami, S. Xiao, W. G. Cullen, E. D. Williamsa, M. S. Fuhrera, Solid State Commun. [**149**]{}, 1080 (2009). C. R. Dean, A. F. Young, I. Meric, C. Lee, L. Wang, S. Sorgenfrei, K. Watanabe, T. Taniguchi, P. Kim, K. L. Shepard, and J. Hone, Nat. Nanotechnol. [**5**]{}, 722 (2010).
// This file is part of Eigen, a lightweight C++ template library // for linear algebra. // // Copyright (C) 2008 Gael Guennebaud <gael.guennebaud@inria.fr> // // This Source Code Form is subject to the terms of the Mozilla // Public License v. 2.0. If a copy of the MPL was not distributed // with this file, You can obtain one at http://mozilla.org/MPL/2.0/. #ifndef EIGEN_NO_ASSERTION_CHECKING #define EIGEN_NO_ASSERTION_CHECKING #endif #define TEST_ENABLE_TEMPORARY_TRACKING #include "main.h" #include <Eigen/Cholesky> #include <Eigen/QR> template<typename MatrixType, int UpLo> typename MatrixType::RealScalar matrix_l1_norm(const MatrixType& m) { MatrixType symm = m.template selfadjointView<UpLo>(); return symm.cwiseAbs().colwise().sum().maxCoeff(); } template<typename MatrixType,template <typename,int> class CholType> void test_chol_update(const MatrixType& symm) { typedef typename MatrixType::Scalar Scalar; typedef typename MatrixType::RealScalar RealScalar; typedef Matrix<Scalar, MatrixType::RowsAtCompileTime, 1> VectorType; MatrixType symmLo = symm.template triangularView<Lower>(); MatrixType symmUp = symm.template triangularView<Upper>(); MatrixType symmCpy = symm; CholType<MatrixType,Lower> chollo(symmLo); CholType<MatrixType,Upper> cholup(symmUp); for (int k=0; k<10; ++k) { VectorType vec = VectorType::Random(symm.rows()); RealScalar sigma = internal::random<RealScalar>(); symmCpy += sigma * vec * vec.adjoint(); // we are doing some downdates, so it might be the case that the matrix is not SPD anymore CholType<MatrixType,Lower> chol(symmCpy); if(chol.info()!=Success) break; chollo.rankUpdate(vec, sigma); VERIFY_IS_APPROX(symmCpy, chollo.reconstructedMatrix()); cholup.rankUpdate(vec, sigma); VERIFY_IS_APPROX(symmCpy, cholup.reconstructedMatrix()); } } template<typename MatrixType> void cholesky(const MatrixType& m) { typedef typename MatrixType::Index Index; /* this test covers the following files: LLT.h LDLT.h */ Index rows = m.rows(); Index cols = m.cols(); typedef typename MatrixType::Scalar Scalar; typedef typename NumTraits<Scalar>::Real RealScalar; typedef Matrix<Scalar, MatrixType::RowsAtCompileTime, MatrixType::RowsAtCompileTime> SquareMatrixType; typedef Matrix<Scalar, MatrixType::RowsAtCompileTime, 1> VectorType; MatrixType a0 = MatrixType::Random(rows,cols); VectorType vecB = VectorType::Random(rows), vecX(rows); MatrixType matB = MatrixType::Random(rows,cols), matX(rows,cols); SquareMatrixType symm = a0 * a0.adjoint(); // let's make sure the matrix is not singular or near singular for (int k=0; k<3; ++k) { MatrixType a1 = MatrixType::Random(rows,cols); symm += a1 * a1.adjoint(); } { SquareMatrixType symmUp = symm.template triangularView<Upper>(); SquareMatrixType symmLo = symm.template triangularView<Lower>(); LLT<SquareMatrixType,Lower> chollo(symmLo); VERIFY_IS_APPROX(symm, chollo.reconstructedMatrix()); vecX = chollo.solve(vecB); VERIFY_IS_APPROX(symm * vecX, vecB); matX = chollo.solve(matB); VERIFY_IS_APPROX(symm * matX, matB); const MatrixType symmLo_inverse = chollo.solve(MatrixType::Identity(rows,cols)); RealScalar rcond = (RealScalar(1) / matrix_l1_norm<MatrixType, Lower>(symmLo)) / matrix_l1_norm<MatrixType, Lower>(symmLo_inverse); RealScalar rcond_est = chollo.rcond(); // Verify that the estimated condition number is within a factor of 10 of the // truth. VERIFY(rcond_est > rcond / 10 && rcond_est < rcond * 10); // test the upper mode LLT<SquareMatrixType,Upper> cholup(symmUp); VERIFY_IS_APPROX(symm, cholup.reconstructedMatrix()); vecX = cholup.solve(vecB); VERIFY_IS_APPROX(symm * vecX, vecB); matX = cholup.solve(matB); VERIFY_IS_APPROX(symm * matX, matB); // Verify that the estimated condition number is within a factor of 10 of the // truth. const MatrixType symmUp_inverse = cholup.solve(MatrixType::Identity(rows,cols)); rcond = (RealScalar(1) / matrix_l1_norm<MatrixType, Upper>(symmUp)) / matrix_l1_norm<MatrixType, Upper>(symmUp_inverse); rcond_est = cholup.rcond(); VERIFY(rcond_est > rcond / 10 && rcond_est < rcond * 10); MatrixType neg = -symmLo; chollo.compute(neg); VERIFY(chollo.info()==NumericalIssue); VERIFY_IS_APPROX(MatrixType(chollo.matrixL().transpose().conjugate()), MatrixType(chollo.matrixU())); VERIFY_IS_APPROX(MatrixType(chollo.matrixU().transpose().conjugate()), MatrixType(chollo.matrixL())); VERIFY_IS_APPROX(MatrixType(cholup.matrixL().transpose().conjugate()), MatrixType(cholup.matrixU())); VERIFY_IS_APPROX(MatrixType(cholup.matrixU().transpose().conjugate()), MatrixType(cholup.matrixL())); // test some special use cases of SelfCwiseBinaryOp: MatrixType m1 = MatrixType::Random(rows,cols), m2(rows,cols); m2 = m1; m2 += symmLo.template selfadjointView<Lower>().llt().solve(matB); VERIFY_IS_APPROX(m2, m1 + symmLo.template selfadjointView<Lower>().llt().solve(matB)); m2 = m1; m2 -= symmLo.template selfadjointView<Lower>().llt().solve(matB); VERIFY_IS_APPROX(m2, m1 - symmLo.template selfadjointView<Lower>().llt().solve(matB)); m2 = m1; m2.noalias() += symmLo.template selfadjointView<Lower>().llt().solve(matB); VERIFY_IS_APPROX(m2, m1 + symmLo.template selfadjointView<Lower>().llt().solve(matB)); m2 = m1; m2.noalias() -= symmLo.template selfadjointView<Lower>().llt().solve(matB); VERIFY_IS_APPROX(m2, m1 - symmLo.template selfadjointView<Lower>().llt().solve(matB)); } // LDLT { int sign = internal::random<int>()%2 ? 1 : -1; if(sign == -1) { symm = -symm; // test a negative matrix } SquareMatrixType symmUp = symm.template triangularView<Upper>(); SquareMatrixType symmLo = symm.template triangularView<Lower>(); LDLT<SquareMatrixType,Lower> ldltlo(symmLo); VERIFY_IS_APPROX(symm, ldltlo.reconstructedMatrix()); vecX = ldltlo.solve(vecB); VERIFY_IS_APPROX(symm * vecX, vecB); matX = ldltlo.solve(matB); VERIFY_IS_APPROX(symm * matX, matB); const MatrixType symmLo_inverse = ldltlo.solve(MatrixType::Identity(rows,cols)); RealScalar rcond = (RealScalar(1) / matrix_l1_norm<MatrixType, Lower>(symmLo)) / matrix_l1_norm<MatrixType, Lower>(symmLo_inverse); RealScalar rcond_est = ldltlo.rcond(); // Verify that the estimated condition number is within a factor of 10 of the // truth. VERIFY(rcond_est > rcond / 10 && rcond_est < rcond * 10); LDLT<SquareMatrixType,Upper> ldltup(symmUp); VERIFY_IS_APPROX(symm, ldltup.reconstructedMatrix()); vecX = ldltup.solve(vecB); VERIFY_IS_APPROX(symm * vecX, vecB); matX = ldltup.solve(matB); VERIFY_IS_APPROX(symm * matX, matB); // Verify that the estimated condition number is within a factor of 10 of the // truth. const MatrixType symmUp_inverse = ldltup.solve(MatrixType::Identity(rows,cols)); rcond = (RealScalar(1) / matrix_l1_norm<MatrixType, Upper>(symmUp)) / matrix_l1_norm<MatrixType, Upper>(symmUp_inverse); rcond_est = ldltup.rcond(); VERIFY(rcond_est > rcond / 10 && rcond_est < rcond * 10); VERIFY_IS_APPROX(MatrixType(ldltlo.matrixL().transpose().conjugate()), MatrixType(ldltlo.matrixU())); VERIFY_IS_APPROX(MatrixType(ldltlo.matrixU().transpose().conjugate()), MatrixType(ldltlo.matrixL())); VERIFY_IS_APPROX(MatrixType(ldltup.matrixL().transpose().conjugate()), MatrixType(ldltup.matrixU())); VERIFY_IS_APPROX(MatrixType(ldltup.matrixU().transpose().conjugate()), MatrixType(ldltup.matrixL())); if(MatrixType::RowsAtCompileTime==Dynamic) { // note : each inplace permutation requires a small temporary vector (mask) // check inplace solve matX = matB; VERIFY_EVALUATION_COUNT(matX = ldltlo.solve(matX), 0); VERIFY_IS_APPROX(matX, ldltlo.solve(matB).eval()); matX = matB; VERIFY_EVALUATION_COUNT(matX = ldltup.solve(matX), 0); VERIFY_IS_APPROX(matX, ldltup.solve(matB).eval()); } // restore if(sign == -1) symm = -symm; // check matrices coming from linear constraints with Lagrange multipliers if(rows>=3) { SquareMatrixType A = symm; Index c = internal::random<Index>(0,rows-2); A.bottomRightCorner(c,c).setZero(); // Make sure a solution exists: vecX.setRandom(); vecB = A * vecX; vecX.setZero(); ldltlo.compute(A); VERIFY_IS_APPROX(A, ldltlo.reconstructedMatrix()); vecX = ldltlo.solve(vecB); VERIFY_IS_APPROX(A * vecX, vecB); } // check non-full rank matrices if(rows>=3) { Index r = internal::random<Index>(1,rows-1); Matrix<Scalar,Dynamic,Dynamic> a = Matrix<Scalar,Dynamic,Dynamic>::Random(rows,r); SquareMatrixType A = a * a.adjoint(); // Make sure a solution exists: vecX.setRandom(); vecB = A * vecX; vecX.setZero(); ldltlo.compute(A); VERIFY_IS_APPROX(A, ldltlo.reconstructedMatrix()); vecX = ldltlo.solve(vecB); VERIFY_IS_APPROX(A * vecX, vecB); } // check matrices with a wide spectrum if(rows>=3) { using std::pow; using std::sqrt; RealScalar s = (std::min)(16,std::numeric_limits<RealScalar>::max_exponent10/8); Matrix<Scalar,Dynamic,Dynamic> a = Matrix<Scalar,Dynamic,Dynamic>::Random(rows,rows); Matrix<RealScalar,Dynamic,1> d = Matrix<RealScalar,Dynamic,1>::Random(rows); for(Index k=0; k<rows; ++k) d(k) = d(k)*pow(RealScalar(10),internal::random<RealScalar>(-s,s)); SquareMatrixType A = a * d.asDiagonal() * a.adjoint(); // Make sure a solution exists: vecX.setRandom(); vecB = A * vecX; vecX.setZero(); ldltlo.compute(A); VERIFY_IS_APPROX(A, ldltlo.reconstructedMatrix()); vecX = ldltlo.solve(vecB); if(ldltlo.vectorD().real().cwiseAbs().minCoeff()>RealScalar(0)) { VERIFY_IS_APPROX(A * vecX,vecB); } else { RealScalar large_tol = sqrt(test_precision<RealScalar>()); VERIFY((A * vecX).isApprox(vecB, large_tol)); ++g_test_level; VERIFY_IS_APPROX(A * vecX,vecB); --g_test_level; } } } // update/downdate CALL_SUBTEST(( test_chol_update<SquareMatrixType,LLT>(symm) )); CALL_SUBTEST(( test_chol_update<SquareMatrixType,LDLT>(symm) )); } template<typename MatrixType> void cholesky_cplx(const MatrixType& m) { // classic test cholesky(m); // test mixing real/scalar types typedef typename MatrixType::Index Index; Index rows = m.rows(); Index cols = m.cols(); typedef typename MatrixType::Scalar Scalar; typedef typename NumTraits<Scalar>::Real RealScalar; typedef Matrix<RealScalar, MatrixType::RowsAtCompileTime, MatrixType::RowsAtCompileTime> RealMatrixType; typedef Matrix<Scalar, MatrixType::RowsAtCompileTime, 1> VectorType; RealMatrixType a0 = RealMatrixType::Random(rows,cols); VectorType vecB = VectorType::Random(rows), vecX(rows); MatrixType matB = MatrixType::Random(rows,cols), matX(rows,cols); RealMatrixType symm = a0 * a0.adjoint(); // let's make sure the matrix is not singular or near singular for (int k=0; k<3; ++k) { RealMatrixType a1 = RealMatrixType::Random(rows,cols); symm += a1 * a1.adjoint(); } { RealMatrixType symmLo = symm.template triangularView<Lower>(); LLT<RealMatrixType,Lower> chollo(symmLo); VERIFY_IS_APPROX(symm, chollo.reconstructedMatrix()); vecX = chollo.solve(vecB); VERIFY_IS_APPROX(symm * vecX, vecB); // matX = chollo.solve(matB); // VERIFY_IS_APPROX(symm * matX, matB); } // LDLT { int sign = internal::random<int>()%2 ? 1 : -1; if(sign == -1) { symm = -symm; // test a negative matrix } RealMatrixType symmLo = symm.template triangularView<Lower>(); LDLT<RealMatrixType,Lower> ldltlo(symmLo); VERIFY_IS_APPROX(symm, ldltlo.reconstructedMatrix()); vecX = ldltlo.solve(vecB); VERIFY_IS_APPROX(symm * vecX, vecB); // matX = ldltlo.solve(matB); // VERIFY_IS_APPROX(symm * matX, matB); } } // regression test for bug 241 template<typename MatrixType> void cholesky_bug241(const MatrixType& m) { eigen_assert(m.rows() == 2 && m.cols() == 2); typedef typename MatrixType::Scalar Scalar; typedef Matrix<Scalar, MatrixType::RowsAtCompileTime, 1> VectorType; MatrixType matA; matA << 1, 1, 1, 1; VectorType vecB; vecB << 1, 1; VectorType vecX = matA.ldlt().solve(vecB); VERIFY_IS_APPROX(matA * vecX, vecB); } // LDLT is not guaranteed to work for indefinite matrices, but happens to work fine if matrix is diagonal. // This test checks that LDLT reports correctly that matrix is indefinite. // See http://forum.kde.org/viewtopic.php?f=74&t=106942 and bug 736 template<typename MatrixType> void cholesky_definiteness(const MatrixType& m) { eigen_assert(m.rows() == 2 && m.cols() == 2); MatrixType mat; LDLT<MatrixType> ldlt(2); { mat << 1, 0, 0, -1; ldlt.compute(mat); VERIFY(!ldlt.isNegative()); VERIFY(!ldlt.isPositive()); } { mat << 1, 2, 2, 1; ldlt.compute(mat); VERIFY(!ldlt.isNegative()); VERIFY(!ldlt.isPositive()); } { mat << 0, 0, 0, 0; ldlt.compute(mat); VERIFY(ldlt.isNegative()); VERIFY(ldlt.isPositive()); } { mat << 0, 0, 0, 1; ldlt.compute(mat); VERIFY(!ldlt.isNegative()); VERIFY(ldlt.isPositive()); } { mat << -1, 0, 0, 0; ldlt.compute(mat); VERIFY(ldlt.isNegative()); VERIFY(!ldlt.isPositive()); } } template<typename MatrixType> void cholesky_verify_assert() { MatrixType tmp; LLT<MatrixType> llt; VERIFY_RAISES_ASSERT(llt.matrixL()) VERIFY_RAISES_ASSERT(llt.matrixU()) VERIFY_RAISES_ASSERT(llt.solve(tmp)) VERIFY_RAISES_ASSERT(llt.solveInPlace(&tmp)) LDLT<MatrixType> ldlt; VERIFY_RAISES_ASSERT(ldlt.matrixL()) VERIFY_RAISES_ASSERT(ldlt.permutationP()) VERIFY_RAISES_ASSERT(ldlt.vectorD()) VERIFY_RAISES_ASSERT(ldlt.isPositive()) VERIFY_RAISES_ASSERT(ldlt.isNegative()) VERIFY_RAISES_ASSERT(ldlt.solve(tmp)) VERIFY_RAISES_ASSERT(ldlt.solveInPlace(&tmp)) } void test_cholesky() { int s = 0; for(int i = 0; i < g_repeat; i++) { CALL_SUBTEST_1( cholesky(Matrix<double,1,1>()) ); CALL_SUBTEST_3( cholesky(Matrix2d()) ); CALL_SUBTEST_3( cholesky_bug241(Matrix2d()) ); CALL_SUBTEST_3( cholesky_definiteness(Matrix2d()) ); CALL_SUBTEST_4( cholesky(Matrix3f()) ); CALL_SUBTEST_5( cholesky(Matrix4d()) ); s = internal::random<int>(1,EIGEN_TEST_MAX_SIZE); CALL_SUBTEST_2( cholesky(MatrixXd(s,s)) ); TEST_SET_BUT_UNUSED_VARIABLE(s) s = internal::random<int>(1,EIGEN_TEST_MAX_SIZE/2); CALL_SUBTEST_6( cholesky_cplx(MatrixXcd(s,s)) ); TEST_SET_BUT_UNUSED_VARIABLE(s) } CALL_SUBTEST_4( cholesky_verify_assert<Matrix3f>() ); CALL_SUBTEST_7( cholesky_verify_assert<Matrix3d>() ); CALL_SUBTEST_8( cholesky_verify_assert<MatrixXf>() ); CALL_SUBTEST_2( cholesky_verify_assert<MatrixXd>() ); // Test problem size constructors CALL_SUBTEST_9( LLT<MatrixXf>(10) ); CALL_SUBTEST_9( LDLT<MatrixXf>(10) ); TEST_SET_BUT_UNUSED_VARIABLE(nb_temporaries) }
Purification and functional assay of pluripotent hematopoietic stem cells. Hematolymphopoietic stem cells (HSC) have the capacity for extensive self-renewal and pluripotent myelolymphoid differentiation. Recent studies have emphasized the heterogeneity of human HSC subsets in terms of proliferative and self-renewal capacity. In the NOD-SCID (nonobese diabetic-severe combined immunodeficient) mouse xenograft assay, most CD34+38- stem cell clones proliferate at early times, but then disappear, whereas only few clones persist: possibly, the latter ones consist of long-term engrafting CD34+38- HSC expressing the KDR receptor (i.e. the vascular endothelial growth factor receptor II). In this regard, isolation of the small KDR+ subset from the CD34+ hematopoietic progenitors (and possibly from the CD34-lin- population) may provide a novel and effective approach for the purification of long-term proliferating HSC. More importantly, KDR+ HSC isolation will pave the way to cellular/molecular characterization and improved functional manipulation of HSC/HSC subsets, as well as to innovative approaches for HSC clinical utilization, specifically transplantation, transfusion medicine and gene therapy.
Turkey's Ambassador to the United States, Serdar Kılıç, has written a letter, which was published on Thursday in the U.S. daily, The Washington Post, criticizing the recent Tahşiye operation conducted on 14 Dec against the Gülenist-linked media.The letter, titled 'Turkey's reinforced democracy' criticized the Washington Post's previously published article 'A fool's errand', written by the editorial board of The Washington Post, for its biased stance against Turkey's handling of the ongoing investigation."The Dec. 22 editorial 'A fool's errand' confused a legitimate criminal investigation in Turkey with the suppression of free speech. Information provided by Istanbul's chief public prosecutor makes it clear that the individuals concerned were questioned because of complaints by a religious group that suggest a campaign against it by the media and police, based on slander and forgery of evidence," penned Kılıç, in his letter.Turkish Police launched investigations – known as the Tahşiye case – on the Gülenist-linked figures and arrested over two dozen people on Dec. 14.The article by The Washington Post's editorial board, published on Dec. 22, accused the Turkish government for influencing the judicial process to ensure its political motivations and to crack down on President Erdoğan's critics. The article stated that the arrests were made as a part of a political fight between the President Erdoğan and Fethullah Gülen. In response to the article's claim, the Ambassador Serdar Kılıç said: "Turkey has reinforced human rights and freedom of expression and has made significant progress in promoting democratization and transforming the judicial system in line with that of the European Union member countries to ensure fair and speedy trials." "Without full examination of the charges or the activities of those detained, it is irresponsible to assume that the ongoing investigation was instigated for political purposes."
Over 6,000 visitors to Comic-Con joined the Pevensie children and stepped through the wardrobe to journey into Narnia, with never-before-seen footage from "Prince Caspian" at the Disney Panel. And, according to director Andrew Adamson and producer Mark Johnson, they'll be doing it again every year for the next decade. "As long as you keep embracing these movies, we'll make all seven," Johnson told an appreciative audience. "We start the end of January on "Voyage of the Dawn Treader.' Our goal is to give you [a new] one every May starting [next year]." The announcement came after a computer pre-visualization which showed the Pevensie children storming King Miraz's castle alongside Prince Caspian, flying onto the topmost turrets in the talons of giant griffins. Griffins, yes -- but not Gryffindors. Comparing his work on "Narnia" to that OTHER long running fantasy series, Adamson insisted that future "Narnia" films will be both more consistent and more faithfully inclusive to the source than "Harry Potter." "'Harry Potter' is a different [animal]," he said via satellite from Prague. "C.S. Lewis wrote more efficiently [than J.K. Rowling]. We have a chance to embellish, [not exclude]."
Sharing ideas across the research and knowledge system in Sri Lanka Late last year, staff from INASP were in Colombo, Sri Lanka for the final AuthorAID meeting of INASP’s Strengthening Research and Knowledge Systems programme so my colleague Andy Nobes and I took the opportunity to arrange an extra meeting. We knew that many people from different parts of the research and knowledge sector in the country had participated in recent AuthorAID online courses and thought it would be good to bring some of these people together to share ideas and experiences with each other and with INASP. The result was a lively lunchtime discussion with 10 researchers at different stages of their careers and in different fields, including two librarians, two journal editors and one civil servant. Bringing together this group with different perspectives on research and knowledge revealed some interesting trends and issues, as well as gaps in awareness. The group has asked to remain in touch with each other and to continue sharing ideas. The first topic of discussion was the challenges faced by researchers. Many of the challenges echo things we hear elsewhere in the world such as lack of time to write up findings and lack of funds for research and for some of the tools required for research. The issue of access to research information was discussed – researchers often raise this as a challenge, but here it was useful to have librarians in the discussion. They were able to tell the researchers in the discussion that there are actually many research materials available to researchers in Sri Lanka via their libraries. INASP has been working with library consortia and publishers around the world for a number of years to address this challenge (see this article about Sri Lanka’s library consortium and what it does). Communication challenges And there were broader challenges around communicating research. A couple of people in the discussion raised the issue of some researchers doing research for academic promotion more than for their findings to be used. One person noted that in the country there is not much communication of research to lay people, for example through lay summaries, and there are not many examples of research influencing policy (other than, very successfully, with health policy, for example, Sri Lanka’s eradication of malaria in 2016). “Research communication is more at the lower levels of policymakers but not reaching the top. There is a huge gap between the government and academic sectors; everyone is working in their own siloes,” observed one of the group. Language can be a barrier too. “If you are publishing in English, how can farmers understand it?” observed one participant. Communicating in local languages also poses challenges. Researchers in the group did not publish much in Sinhalese or Tamil because of the lack of indexed journals and the tiny audience compared with the worldwide body of English speakers. However, one of the researchers in the group brought to show us two papers that he had published since he had done the AuthorAID research writing course; one was in English and one was in Tamil. There were also problems raised about writing in English if it is not their native tongue. One journal editor observed that it can be difficult for many to write in a way that is publishable. “People do good research but there is a big gap in the ability to write. This needs both academic skill and English ability,” she said. This can have a knock-on effect on the work involved in academic publishing in Sri Lanka, with a lot of journals run by volunteers: “All the journal editors of SLJOL that I know of do editing entirely voluntarily – free of charge, staying up until midnight doing editing. Without this, the Sri Lankan journals would all collapse. They are all run by single-minded, dedicated individuals.” Finding out about research in Sri Lanka Such efforts are important for helping to make research from the country better known. This was one of the challenges raised in the group discussion: “One of the issues that I face is finding local research. If I want to find something, it’s extremely difficult – I may have access to all research done outside of Sri Lanka, but for local research, there is no access because it’s somewhere in one of the universities as a thesis, not even as an article – I don’t know how we can overcome that. Accessing them is not that easy.” The Sri Lankan Journals Online platform (SLJOL) hosts over 75 Sri Lankan peer-reviewed journals, of which nearly all are Open Access. However, there were varied levels of awareness within the discussion group about this local journals platform – and this problem can be increased for researchers outside the country. As one of the journal editors observed: “Researchers don’t access local publications from Sri Lanka in SLJOL, I don’t know why. They only quote things that are in international journals. I read one recent publication from South Asia and the only citation from Asia was from the 1970s. Even though it’s available online, local researchers don’t want to quote local research or publish in local journals for some reason. And when international researchers publish, they talk about Sri Lanka, but they don’t quote Sri Lankan publications. I don’t know if it’s a lack of awareness or if they are deciding not to use it.” Another challenge raised was the topic of waivers for the high article processing charges (APCs) often charged by open access journals from major international publishers. As Sri Lanka’s infrastructure and economy have developed and strengthened, the country was redefined by the IMF as a middle-income country in 2010. This is obviously a good thing. However, it does not immediately mean more money in the research system, especially on long-running projects. And this can be a problem when country status is used to decide whether researchers can get a full APC waiver or a partial one. As one of our group observed, the problem is that there isn’t a publication fund in most universities or, where there is, it is small fund and exhausted within the first couple of months of the year. Another commented on the magnitude of the increase that comes with a country changing status from low-income to lower middle-income. He gave the example of BioMed Central where researchers in low-income countries can get complete waivers whereas those in lower middle-income countries can pay 50% of the standard APC, or approximately $1000 rather than $2000 (prices at the publisher vary by journal). “I appreciate that publishers need to make money but 50% is a lot. If it were 10% we could pay out of our pockets but 50% is too much,” he said. Another participant agreed, noting that Sri Lanka’s change of status reflects the impressive progress that the country has made on things like health and education rather than increased money for research. “Our health and education indicators are good but publication is a luxury and I don’t think publishers understand this,” she observed. Despite these barriers with APC costs, the participants in our discussion were positive about open access. “Open access has changed everything for us. We can access so much now,” said one, while another noted the usefulness of open education resources in teaching. The value of dialogue Bringing together this enthusiastic group to discuss research and communication was an inspiring experience with plenty of food for thought for the participants, for INASP and for the wider sector.
Philadelphia chromosome without breakpoint cluster region rearrangement in a case of Lennert's lymphoma of suppressor phenotype. A 60-year-old woman presented with diffuse lymphadenopathy. Diagnostic and staging work-up showed that the patient had diffuse small cleaved cell lymphoma (diffuse poorly differentiated lymphocytic lymphoma) with associated histiocytes (lymphoepithelioid cell lymphoma) by the Kiel classification system. Immunohistologic staining showed a T suppressor cell tumour phenotype. Cytogenetic studies revealed the Philadelphia chromosome (Ph1). On DNA studies, the breakpoint cluster region (BCR) gene was not rearranged suggesting that the Ph1 involvement was not identical to that seen in chronic myelogenous leukemia (CML). This case is presented because of the rarity of Ph1 in lymphoid malignancies, particularly in those of T-cell origin, and because of its potentially adverse implications.
Q: jQuery check if exist in array an html element I would to have an array with html element, but I don't want have duplicate. Is possible that $.inArray() don't work with html element? var rowsArr= new Array(); var rowMst=$('.a'); rowsArr.push(rowMst[0]); if($.inArray(rowsArr, rowMst[0]) === -1) { rowsArr.push(rowMst[0]); }else{ alert("Already exist"); } console.dir(rowsArr); <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"></script> <div class="a">Hello</div> <div class="b">Stack</div> <div class="c">Overflow</div> A: Yes,inArray will work. Minor issue in your code at line number 4 corrected here. $.inArray(value, array, index) var rowsArr= new Array(); var rowMst=$('.a'); rowsArr.push(rowMst[0]); if($.inArray(rowMst[0],rowsArr) === -1) { rowsArr.push(rowMst[0]); }else{ alert("Already exist"); } console.dir(rowsArr); <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"></script> <div class="a">Hello</div> <div class="b">Stack</div> <div class="c">Overflow</div>
Q: Clicking items in ListAdapter doesn't do anything I'm trying to make my first list adapter with android, and it comes up with the list, but when I click the items, nothing happens. My only guess is the comment I have after the line that defines Class cvar. package scouting.form; import android.app.ListActivity; import android.content.Intent; import android.os.Bundle; import android.view.View; import android.widget.ArrayAdapter; import android.widget.ListView; public class Menu extends ListActivity{ String classes[] = {"SCOUTING","LOGIN","MAIN"}; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setListAdapter(new ArrayAdapter<String>(Menu.this,android.R.layout.simple_list_item_1,classes)); } @Override protected void onListItemClick(ListView l, View v, int position,long id) { super.onListItemClick(l, v, position, id); String cheese= "com.cody.graham."+classes[position]; try{ Class cvar=Class.forName(cheese); //Eclipse has a warning on this line "Class is a raw type. References to generic type Class<T> should be parameterized". I don't really know what that means. Intent intention=new Intent(Menu.this,cvar); startActivity(intention); }catch(ClassNotFoundException e){ e.printStackTrace(); } } } Edit: Part of the AndroidManifest: <activity android:name=".splash_screen" android:label="@string/title_activity_splash" > <intent-filter> <action android:name="android.intent.action.MAIN" /> <category android:name="android.intent.category.LAUNCHER" /> </intent-filter> </activity> <activity android:name=".Login" android:label="@string/title_activity_login" android:exported="false"> <intent-filter> <action android:name="com.cody.graham.LOGIN" /> <category android:name="android.intent.category.DEFAULT" /> </intent-filter> </activity> <activity android:name=".Scouting" android:label="@string/title_activity_scouting" android:exported="false"> <intent-filter> <action android:name="com.cody.graham.SCOUTING" /> <category android:name="android.intent.category.DEFAULT" /> </intent-filter> </activity> A: String classes[] = {"SCOUTING","LOGIN","MAIN"}; Try naming the classes how it appears. like Scouting Also trying changing your manifest: <activity android:name=".Scouting" /> This is what you only need in this case. Eclipse has a warning on this line "Class is a raw type. References to generic type Class should be parameterized". This is a warning, it will not give you an error in this case. What is means is Class , T is a class type of what you are getting. ex: Class<? extends Activity> cvar=Class.forName(cheese); For more information : link A: Firstly, remove the <intent-filter> sections from your manifest for both .Scouting and .Login (leave the one for .splash_screen). Unless you need any of your Activity classes to be started from 3rd-party (external) apps, it is not necessary to declare action-based <intent-filter> sections - it's also not good practice. Secondly, do as wtsang02 suggests and change the classes string array to... String classes[] = {"Scouting","Login","splash_screen"}; Also, assuming the other Activity classes (such as Scouting etc) are in the same package as Menu, change this line... String cheese= "com.cody.graham."+classes[position]; to be... String cheese= "scouting.form." +classes[position]; ...and to get rid of the eclipse warning, this line... Class cvar=Class.forName(cheese); ...to... Class<?> cvar=Class.forName(cheese);
"Woah!" "[Ban Shogo (21) Hometown:" "Hakata, Fukuoka Prefecture]" "Ban-chan!" "Ban-chan!" "Not again?" "!" "We're gonna be late for work again!" "[Hakata, 3 Weeks Ago] If I'm not there, the customers get disappointed, right?" " There are a lot people who can't wait to eat my cooking." " That's enough, just hurry up!" "Don't push me!" "See you guys later!" "Good luck with the job hunting!" "Same to you!" "Hurry up, Eri!" "Ban-chan, wait up!" "Crap, we're gonna be late again." "Ban-chan!" "Hurry up!" "Excuse us for being late!" "Thank you for waiting!" "Spaghetti with sweet shrimp from the Genkai Sea!" "It's good, you know!" "Delicious!" "Ban-chan, you're already a skillful cook, don't you think?" "You have some talent!" " Ban-chan, don't you graduate next year?" " Yes." "If you continue on just like this, you should become a chef!" "Right, Shin-san?" "He would be fine, right, Shin-san?" "Right?" "That's right!" "I also think that too!" "Or should I say, I've already become one?" "I'm so sorry!" "Please don't compliment him so much." "His head will only get bigger." "Be quiet!" "Eri!" "Wait!" "Ouch!" "Is this Tokyo?" "Go and check it out." "Go and help during your break from college." "A Trattoria in Roppongi." "It's a very high class and popular restaurant." "The chef is a guy who I studied with in Italy." "He's a really nice guy." "But why?" "I love your cooking." "I am really happy that you are letting me train here, and I consider myself to be really lucky to be here." "Your cooking is the absolute best!" "Even if I don't go there." "Ban, you are still just like a fish out of water." "Go over there and get your feet wet." "If you want to become a chef, it starts from there." "Yes, sir." "What on earth does Shin-san have on his mind?" "If I am a qualified cook in Hakata, then I'm qualified." "Right?" "Are you scared?" "Huh?" "It's not that I think I am gonna fail, it doesn't matter if it's Tokyo." "Well, how about you go then?" "I won't like it if you want to stay there, just for spring vacation, right?" "Well, yeah." "Ban-chan... didn't you want to run a restaurant with me in the future?" "Yeah" "Well then you should go." "Don't you think that Shin-san brought this up because he recognizes your ability?" "Well yeah, I guess so." "Alright, I got it!" "I guess I'll go!" "I'll prove to you that I can do it." "On top of that, I have to go there as a helper." "I'm not going as an underworker." "I'm a helper." "I just have to help out?" "What would you do if they told me to stay as a chef?" "Maybe it'll be a piece of cake." " Yo man!" " Oh, sorry, sorry, sorry!" " No problem." "It's okay, man." " Sorry, sorry, sorry, sorry!" "[The Door To Adulthood]" "B.O.N F u n S u b s © ~ Band Of Nuts F u n S u b s PRESENTS" "B" "Translators ckh019, Nephthi" "Timer/Karaoke Timer ch3rrry" "Editor serenity" "QC yuubou" "Encoder scarlett0512" "Coordinator scarlett0512" "Episode 1" "I am extremely sorry." "Dinner starts from 6 p.m. at this establishment." "That's not it..." "Yes?" "Umm..." "From today..." "I will be entering the kitchen as a helper." "I am..." "I am Ban." "Chef!" "Ohhh, you came!" "Come over here." "Yes, sir." "Yona!" "Show him around." "Come this way." "I'll show you around." "Okay, thank you." "Ban-kun, you're from Fukuoka, right?" "Yes!" "From Hakata!" "Sure is a nice place." "Yes!" "Have you ever been there?" "Hmm..." "A while ago with a woman I had a thing for." "It was a nice area... a nice town brings out the beauty in lovely women." "Ohh..." "Are you ready?" "Yes!" "Hmmm..." "looks good." "Yes... it suits you well." "I ought to have said this first..." "I am Yonamine, the capo cameriere." "Nice to meet you." "Nice to meet you." "Capo?" "Kind of like the chief of the dining room." "I see." " Capo?" " Capo cameriere." "Oh, I see." "Capo cameriere." " Capo..." " Capo cameriere." "As I expected, that is Italian right?" "Yeah." "Do your best." "Let's have fun while working." "Okay?" "Yes." "My name is Ban Shogo." "I am from Hakata, Fukuoka." "I'm looking forward to working with all of you." "Ban-kun is a college student who works at my senior's restaurant." "He will work here during his break from college." "What's your special dish?" "What kind of work did you do at Endo-san's restaurant?" "I can do anything!" "In Hakata, I did everything from appetizers to the main dish." "Is that so?" "We're looking forward to see you work." "At our place, we split up appetizers, pasta, and main dishes." "If you have that much ability," "I'll have you start with pasta." "Yes, sir!" "Katori, watch over him." "Yes, sir." "Kuwahara, I'm counting on you." "Yes, sir." "Understood." "As for today..." "Hey!" "Miyuki!" "During working hours, I am not your daughter." "Chef, please call me manager." "Pardon me." "Well, what is the situation with reservations today?" "Manager." "From 6 p.m., we have 11 reservations." "From 7 p.m., 20 reservations." "From 8 p.m., 24 reservations." "From 9 p.m., 12 reservations." "In all, 156 guests." "First, at 6 p.m., we have Watanabe-sama." "They set a reservation for the C-course, but please prepare red wine, Barolo 1982." "From 7 p.m., Mizumoto-sama." "Because their female guest is allergic to eggs, please take extra care with their dishes." "From 8 p.m., Miyazaki-sama." "They have reserved the A-course, but they also have ordered Bruschetta." "Understood." "Those are the conditions." "Well then," "Allora ragazzi cominciamo a lavorare!" "Si, va bene!" "He said get to work." "Huh?" "Ohhh!" "Okay!" "How's your Italian?" "I know some simple food terms." "Over here, if you don't know Italian, then you won't get anywhere." "I see..." "Well, you'll pick it up gradually... that's only if you continue to work here though." "Huh?" "Ban-kun, so you are a college student who works part time?" "Yes!" "But at the restaurant, I was treated as a regular so I should be fine here." "Really..." "I see." "You seem promising." "Ban!" "Yes!" "Cook me up your best pasta." "Yes, sir!" " Take care of this." " Gotcha." "I wonder how the new helper is." "Does he have what it takes?" "I wonder if he is going to disappear tomorrow like the others?" "We are always busy, and on top of that, the kitchen is quite scary." "If it was me, I would run away after an hour." "Well then, I'm off to battle!" "Where are you headed today?" "A Parliament member's party." "Because some idiot guy said he'll have a party after the wedding reception." "Splendid!" "It's tough, you know!" "Going around smiling to everybody." "Asking people to introduce me to their friends." "Indeed!" "That's nice." "And it seems I am also carrying out your work." "You dummy!" "See you later!" "Have a safe trip." "Asuka-san, why didn't chef let you do pasta?" "I don't really get it." "Stop talking about nonsense and get to work." "Sorry." "It's finished." "Squid and rape blossoms with peperoncino." "Alright." "I see." "How is it?" "You took too long." "Yes, sir." "Ask for our pasta recipes from Kuwahara and remember them." "Yes, sir!" "That means that my cooking was successful, right?" "Please have a seat." "Good evening." "Welcome." "Welcome." "Well, if you'll excuse me." "[Ignition]" "Table 31, four guests." "I'll leave the rest to you." "One carpaccio di pesce!" "[thinly sliced fish]" "One verdure miste!" "[mixed greens]" "One tagliatelle bolognese!" "[tagliatelle in meat sauce]" "One spaghetti al ragu di pesce spada!" "[spaghetti with swordfish tomato sauce]" "One spigola alla griglia!" "[grilled seabass]" "And one bistecca alla Fiorentina!" "[t-bone steak]" "Bene!" "[Alright!" "]" "Lighting the oven!" "Ban!" "The tagliatelle pasta for the meat sauce!" "Swordfish ragu spaghetti!" "If you didn't understand, check the order slip!" "Yes, sir!" "What the... this speed..." "Hot!" "Order up!" "Grazie!" "Order for table 1, five guests!" "Two antipasto misto!" "[mixed appetizers]" "One fave e vongole!" "[spaghetti with beans and clams]" "Bene!" " It's ready." " Grazie!" "Table 15, three guests!" "One spaghetti alla bagna cauda!" "[spaghetti in an oil and butter with anchovies and garlic]" "One spigola alla griglia!" "[grilled seabass]" "Bene!" "Order for Table 15!" "Grazie!" "Grazie!" "Are you enjoying your evening?" "I will bring your wine shortly." "Excuse me." "Excuse me." "Buon appetito!" "[Enjoy your meal!" "]" "Order for Table 22, four guests!" "One cacciatora!" "[cacciatore]" "One verdure primavera!" "[spring vegetables]" "Bene!" "Order up!" "Grazie!" "No problem!" "Order up!" "Order for table 30!" "Superb, I must say!" "This dish is called frutti di mare [seafood]." "I studied how to cook it in Sicily." "Sicily, where the blazing sun shines brightly, and because The Godfather is also famous." "Order for table 18!" "Bene!" "Coming through!" "Table 18!" "Grazie!" "How much time till you're ready?" "Five more seconds at 30 degrees!" "[86 degrees F]" "You're too slow with the pasta!" "Yes, sir!" "The pasta's ready!" "[Acceleration]" "Orders for three people just came in." "One impanata di pesce!" "[battered fish]" "One arista di maiale!" "[roast pork]" "Bene!" "Excuse me." "Excuse me." "What are your recommendations for appetizers?" "Very well, for appetizers, today we have our fish carpaccio." "Is the pasta ready yet?" "Pasta?" "!" "Coming right up!" "Where's the pasta?" "Pasta!" "Is the pasta ready?" "Pasta!" "Coming right up!" "I'm sorry!" "Kuwahara, work the grill." "Yes, sir." "Katori, take over pasta." "Yes, sir." "Ban, you're going to be Katori's assistant." "Bene!" "Didn't you say that you can do anything?" "Huh?" "!" "Right?" "!" "Ex-pasta supervisor!" "What?" "What the hell is this?" "You want me to work in a garbage dump?" "I'm sorry!" "I'll clean it up!" "Everybody!" "Let's get back on track!" "Bene!" "Dammit!" "My my, look at that... how cruel." "[Abrupt Demotion]" "Order up!" "Si, va bene!" "[Yes, very good]" "Wash that too while you're at it." "Where's your reply?" "!" "Yes, sir!" "I will!" "I'm back." "Welcome back." "How was the outcome?" "It was the very best." "Just as I expect from a princess." "Thanks!" "Anyway, how is the helper doing?" "Well..." "What's this?" "He's washing dishes..." "I guess it's just a matter of time now." "Sorry to keep you waiting, this way." "Welcome!" "I will show you to your table." "Please, excuse me." "Dishes to wash!" "Pardon me." "Dishes to wash!" "I wonder what Ban-chan is doing right now." "It's probably getting busy right now..." "He was acting tough last night, but it seems like he couldn't sleep." "And it sounded like he was practicing with the frying pan all night." "I wonder if he's doing well..." "Dishes to wash!" "Please take care of these!" "More dishes to wash!" "Ban-chan!" "I'm sorry." "I'm fine." "What the hell are you talking about?" "!" "Hey!" "Huh?" "Go back to the countryside!" "No!" "I will not leave." "I'm not asking what you want to do punk!" "Look here..." "Katori!" "Yes?" "That's enough." "Don't disturb the kitchen any further." "Got it." "Thank you very much!" "We are waiting for your next patronage!" "Thank you very much!" "Have a pleasant evening!" "Thank YOU B.O.N FunSubs Team!" "^_^" "Okay, everybody!" "It's time to place your bets!" "Do you think the new helper has what it takes?" "What do you think?" "It's obvious that he doesn't!" "Senpai!" "May I?" "Excuse me." "What the heck are you so happy about?" "Aren't things like this fun?" "Me too." "Good job today!" "Same to you!" "What about you, Kuwahara-san?" "Dammit!" "Hey, there." "Hello." "You sure work hard!" "I think that's wonderful, because you're a girl and all." "You're pretty cute as well." "What?" "Are you stupid?" "I hate useless guys, and I don't like it even if they call me cute!" "What?" "You're losing it." "Huh?" "I'm telling you that you're losing your position." "I'm going now." "I'm going now!" "Thank you for your hard work today!" "Dammit." "It's just that I was not used to how busy it was!" "Let's settle this by cooking!" "By cooking!" "If it's by cooking, I won't lose!" "You guys are quick." "Just as I expected." "This isn't gambling!" "Please look at this!" "Everybody thinks that he's gonna quit!" "Well then, I will..." "Hey!" "Yona-san!" "What is chef thinking letting him work here?" "I agree." "He ended up washing dishes though, all of a sudden." "Yeah." "If it's just dishwashing, a high school part-timer would be much better." "Seriously!" "That's so true!" "Just as you say senpai..." "What do you want?" "If you have something you wanna say to me, how about telling me to my face." "What?" "What's going on?" "Nothing." "Nothing at all." "Ban, chef is calling you." "Thank you." "Good work today." "Same to you, chef!" "Umm..." "What did you think of my pasta?" "Huh?" "Without a doubt, I wasn't used to the amount of work and I think that I inconvenienced the others..." "But I just, no, about the taste of my..." "You have talent!" "I knew it from one taste of your cooking." "You want me to say something like that?" "Well..." "I..." "It wasn't bad." "Huh?" "You were working at Endo-san's restaurant." "About that much is expected of you, right?" "Am I wrong?" "Oh." "Well..." "It had a skillful taste." "Skillful?" "Skillful means that you're good at imitating." "You must not misunderstand it to be your own ability." "For where you're staying tonight." "Ciao." "Thank you." "Imitation?" "What does he know?" "Oh!" "Eri..." "I have to call Eri." "I wonder if he's okay?" "He's cute when he sleeps." "Really?" "You think he's going to quit, Kuwa-san?" "From my standpoint, I want him to continue working, but the fact is that he's useless." "I understand why Katori got worked up." "Is that so?" "But, why do you think Ban will stay Yona-san?" "Do you sense something about him?" "That's not it." "I just felt like gambling." "I don't really understand what goes on in the kitchen, and I probably can't handle one day in there." " That's funny." " Huh?" "What about you, manager?" "Not going to bet?" "I am now Princess Miyuki." "Oh!" "Pardon me." "What do you think, Princess?" "The thing about me is, from before, I wasn't able to choose between two things, right?" " That's for sure." " That's for sure." "Huh?" "Hakata... now that you mention it, we went there a while ago." "Umm..." "That's right!" "I'm sorry!" "No problem." "Well, I should get going." "I promised a customer that I would join them for a drink." "Me too." "My girlfriend is waiting at home." "Let's settle this by cooking!" "By cooking!" "This is a free fansub." "Get it @ D-Addicts and Soompi." "Special thanks to tianj for the timed file." "Thank you for all your love and support EVERYONE!" "^_^" "Credit to all uploaders!" "B.O.N F u n S u b s © ~ Band Of Nuts F u n S u b s" "Morning!" "Good morning." "So, you're still here?" "[Second Day of Fate]" "Welcome!" "Thank you for coming!" "Please come this way." "Welcome!" "Please enjoy your time!" "Pardon me." "Excuse me." "Table 36, four guests." "I'll leave the rest to you!" "Two insalata verde!" "[green salad]" "One pasta del giorno [pasta of the day]" "One tagliatelle al salmone!" "[tagliatelle with salmon]" "Bene!" "Ban!" "Yes, sir!" "Can you make brodo?" "[broth]" "Huh?" "Well?" "Huh?" "Yes, of course!" "Of course, I can make it!" "Okay." "Well then, make it with Katori." "Learn the way we make brodo." "Yes, sir!" "I'm counting on you, Katori." "Watch over him." "Yes, sir." "[Brodo/Broth]" "[Brodo/Broth] Soup stock, boullion" "[Brodo/Broth] Soup stock, boullion Used in all general cooking" "[Brodo/Broth] Soup stock, boullion Used in all general cooking It is the foundation of taste in Italian cooking" "These are all of the ingredients that we use to make brodo." "With this, you can make 60 liters." "And this is the finished product." "It'll be fine if I leave the rest to you, right?" "Right?" "After all, you were the main person in your hometown." "It should be simple to make the brodo that we put together, right?" "Huh?" "You can't do it?" "No." "Understood." "Do a good job, because I'm also very busy." "Yes." "If you get lost, let me know." "You probably won't, of course you won't." "Who would ask you anyway?" "Delicious." "If it's tasty, I won't fail!" "Adjust the flame and done!" "Let this cook for three hours... and it's in the bag!" "Alright!" "I don't even have free time to smoke cigarettes." "Take a good look, you bandana punk!" "Sample my cooking and be impressed!" "Oh!" "Er..." "Well..." "About the bandana punk thing..." "[Painful Rain Will Fall]" "Alright!" "It should just about be finished." "Terrible." "What the heck is this?" "It reeks of blood." "It's not like the one I tasted earlier." "Why?" "How?" "What the hell?" "Something wrong?" "Oh, well..." "Let me see that." "You neglected the process of the chicken broth, I see." "Because you didn't wash it good enough before you cooked it together, the taste of blood will remain." "Forgive me!" "Let me try." "Katori, see what it tastes like." "Alright..." "Hey, the brodo at your restaurant tastes like this?" "No!" "It's not that!" "I can't believe this." "Who was the one that said it was fine?" "!" "Hey!" "Why did you pretend to look over him?" "I told you to watch over him, didn't I?" "!" "Yes, you did." "I'm sorry." "Remake it!" "Together." "Yes, sir." "Everybody!" "Get back to work!" "Chef... until 9 p.m. when the next batch of brodo will be ready, please take the risotto off from the menu." "That's true." "I'll let those working in the hall know." "Isn't he going to hit me, too?" "Hey." "Did you ever make brodo before?" "Actually..." "I only watched as our chef would make it..." "Umm..." "As for making it..." "Please forgive me!" "Let me see you outside." "Yes, sir." "You told me yesterday, that if I had something to say to you I should say it to your face, right?" "Get up." "Get up right now!" "I'll let you know." "I absolutely hate guys just like you!" "You damn amateur!" "Guys like you, who are only beginners at cooking, and don't put in the time and effort that is needed." "Guys who don't have memories of biting the dust!" "And guys who pose as capable chefs are the ones that I absolutely hate!" "Work isn't as easy as you think!" "What the hell is this?" "A cook who serves food to people, what the hell are you doing smoking?" "!" "?" "Just how much of a half-hearted ass are you?" "!" "Listen." "As long as you are below me," "I will never let you see the light of day!" "I don't recognize half-hearted asses like you!" "Got it?" "!" "You gotta be kidding." "Remake it with him?" "Don't take on more work when you can't do anything, dumbass!" "Hey." "I wonder what he's going to do." "Please don't meddle in things related with the kitchen!" "That's true." "Please excuse my rudeness." "Dammit..." "I can't..." "I can't... fight back." "This tastes great, Ban-chan!" "Thank you very much!" "I also think that this is the best!" "You are already a skilled chef, don't you think?" "Yes!" "I am a skilled chef!" "Delicious!" "Huh?" "I think it's pretty far down the road but..." "I am asking if you want to run an Italian restaurant with me." "We'll definitely do fine!" "And I have a lot of confidence that we will!" "So what you're saying is..." "Huh?" "Okay!" "Alright!" "Leave everything to me!" "What I just said now... was me proposing." "I know!" "What is this?" "Is today a day of justice?" "Why am I so conceited?" "I am... the worst." "And it's raining?" "So, another one who couldn't take it?" "A day and a half..." "If he doesn't return, it just means he's that kind of person." "Well..." "Thank You for watching With Us!" "^ _ ^" "See you at our next release!" "^ _ ^" "Katori-san." "Yeah?" "Please teach me... how to make brodo." "I beg you!" "I can't even recall passing days in my life, everyday" "How much longer will I continue on this path?" "The rhythm in your body (Yeah), will turn into flapping wings (Yeah)," "Insecure pursuance (Yeah), so precious that it pains me" "We can make it true!" "Your real dream is always beside you" "In the vast endless world, there was only one that shined" "My dream, My dream" "We can make it!" "We can make it!" " What's with the face?" "In the vast endless world there was only one that shined" "In the vast endless world there was only one that shined" " What happened, Bambi?" "In the vast endless world there was only one that shined" " Huh?" "In the vast endless world there was only one that shined" "In the vast endless world there was only one that shined" " Bambi?" "In the vast endless world there was only one that shined" " Your name from today." "We can make it true!" " From the Italian Bambino Your unwavering dream can always be found there" "Your unwavering dream can always be found there" " it means you can't do anything on your own." "Your unwavering dream can always be found there" " An infant that's just born." "Your unwavering dream can always be found there" " Like, a fresh-faced kid." "In the vast endless world, seize it right now" " How about it?" "In the vast endless world, seize it right now" "In the vast endless world, seize it right now" " It's perfect for you, don't you think?" "In the vast endless world, seize it right now" " Bambino." "In the vast endless world, seize it right now" "In the vast endless world, seize it right now" "Your dream, Your dream" "Yes, sir." "Ban Shogo (21) Hometown:" "Hakata, Fukuoka Prefecture" "Ban Shogo (21) Hometown:" "Hakata, Fukuoka Prefecture Pet Name:" "Bambino!" "[Preview] God dammit!" "You really irritate me." "I'm the least useful person here." "What the hell are you doing?" "If it's tough, it's okay if you come back." "Well, what will you do, Bambi?" "As it is, as a failure it's mortifying!" "Trattoria Baccanale!"
Applicants can only apply for one grant or scholarship, and the online registration process must be completed by midnight on 31 October 2018. The successful applications will be notified on 1 February 2019. "Light Monkey has been a big supporter of EUROTEK for many years" stated Rosemary E Lunn, EUROTEK founder. "We are therefore delighted that they have generously donated a lighting system as a ticket prize." Sorb is a soda lime material used to scrub or remove carbon dioxide (CO2) from expired gas in rebreathers. It comes in two forms - granular or solid rolls - and is packed into a canister that is then fitted to the rebreather. The Battle of Amiens or the Third Battle of Picardy had just commenced. (8 August 1918). This Allied attack would later became known as the ‘Hundred Days Offensive’ and this action ultimately led to the end of the first World War. Harris is now travelling back to Australia with fellow cave explorer Craig Challen and other amazing Australian team members from the Department of Foreign Affairs and Trade, Australian Federal Police and Australian Defence Force. Essential topics User login About X-Ray Mag Compiled by an international network of top dive editors and world class underwater photographers, X-RAY MAG is the planet's only truly global premier dive lifestyle magazine. Subscription and downloads are free. Published since 2003.
Q: How to search and replace strings matching a replacement list for multiple files I have a file, say map.txt, containing a list of search strings and corresponding replacements: search -> replacement bigBone -> bb fishMarket -> fm dogCollar -> dc ... I need to perform search and replacement of all strings matching the above for all files recursively in a folder except symbolic links. I know how to do it one at a time like this: $ find /some/folder -type f -exec sed -i 's/old_text/new_text/g' {} \; How can I perform this on a massive scale using the above mapping? I have read this question, but do not quite get it. A: Answer If you are not concerned about speed (this is a one time task), then maybe you could try this: cat map.txt | while read line; do neww=${line##* }; oldw=${line%% *}; find /some/folder -type f -exec sed -i "s/$oldw/$neww/g" {} \; done Not optimal, I know... :-P PS: check in a test folder to see if it works! Explanation Basically: Cat file map.txt. Read each line and get the word to be replaced $oldw and the replacement $neww. For each pair, execute the find command you were already using (notice the double quotes this time in order to allow variable substitution). About parameter expansion In order to set the variables $oldw and $neww we have to get the first and last word of each line. For doing so, we are using parameter expansion (pure Bash implementation), although we could have used other ways to get the first and last word of the string (i.e. cut or awk). ${line##* } : from variable line, remove largest prefix (double #) pattern, where pattern is any characters (*) followed by a space ( ). So we get the last word in line. ${line%% *} : from variable line, remove largest suffix (double %) pattern, where pattern is a space ( ) followed by any characters (*). So we get the first word in line. Words were separated by a space in this case, but we could have used any separator.
Q: Recursing data into a 2 dimensional array in PHP 5 I'm getting bamboozled by "for each" loops and two dimensional arrays, and I'm a php newb so please bear with me (and ignore any variables with the word "image" - it's all about the mp3s, I just didn't change it from the xml tutorial) I found a php function on the net that list files in a directory, the output of which is: Array ( [0] => audio/1.mp3 [1] => audio/2.mp3 [2] => audio/3.mp3 [3] => audio/4.mp3 [4] => audio/5.mp3 ) As expected. And another that lists some info about mp3 files. $mp3datafile = 'audio/1.mp3'; $m = new mp3file($mp3datafile); $mp3dataArray = $m->get_metadata(); print_r($mp3dataArray); unset($mp3dataArray); The output of which is Array ( [Filesize] => 31972 [Encoding] => CBR [etc] ) In order to automatically build RSS for a podcast, I need to generate XML for each item. So far so good. This is how I'm making the xml foreach ($imagearray as $key => $val) { $tnsoundfile = $xml_generator->addChild('item'); $tnsoundfile->addChild('title', $podcasttitle); $enclosure = $tnsoundfile->addChild('enclosure'); $enclosure->addAttribute('url', $val); // that's the filename $enclosure->addAttribute('length', $mp3dataArray[Filesize]); // << Length is file length, not time. But later I also need $mp3dataArray[Length mm:ss] for duration tag. $enclosure->addAttribute('type', 'audio/mpeg'); $tnsoundfile->addChild('guid', $path_to_image_dir.'/'.$val); } (The above has been truncated, I realise it's not proper xml right now, but it was just to show what was going on). Perfect. But I need to do it for as many files as there are in the directory. So, I have an array of the names of the files in the directory in $mp3data And, I have an array of mp3 data in $mp3dataArray from one iteration of the get_metadata() function. If I do the following, then I get a nice list of the mp3 data of the 5 files in the directory: foreach ($mp3data as $key => $val) { $mp3datafile = $val; $m = new mp3file($mp3datafile); $mp3dataArray = $m->get_metadata(); print_r($mp3dataArray); unset($mp3dataArray); } As expected. Where I'm struggling, and have been for most of the day in spite of reading many forums and tutorials, is how to populate the "second dimension" of the array, so that it goes through 1,2,3,4 and 5.mp3 (or however many there are), extracts the metadata, then allows me to use it in the xml section above. Here's what I have foreach ($mp3data as $key => $val) { $mp3datafile = $val; $m = new mp3file($mp3datafile); $mp3dataArray = $m->get_metadata(); $mp3testarray = array($mp3dataArray); } print_r($mp3dataArray); Shouldn't that line print_r($mp3dataArray); give me a nice list of 5 lots of mp3 data, in the way it did when I recursed through the loop as before? A: try this <?php $mp3testarray = array(); foreach ($mp3data as $key => $val) { $mp3datafile = $val; $m = new mp3file($mp3datafile); $mp3dataArray = $m->get_metadata(); $mp3testarray[] = array($mp3dataArray); } // check $mp3testarray[] print_r($mp3testarray); ?>
Important Note: CEVAS Calamba is not in front of Calamba Doctors’ Hospital (that is a different Center). CEVAS is in front of Landmark Village Parian. A very big banner named “CEVAS” is posted. Please look for Carl from CEVAS.
[The occurrence of Listeria in the production of processed meat, salami and mettwurst]. In six Swiss meat-processing plants 206 samples of cured and air-dried beef (Bündnerfleisch), salami and Mettwurst were analyzed for the presence of Listeria spp. Samples were taken during the fabrication, fermentation and drying of the products. Out of 44.7% of all samples Listeria spp. could be detected. 6.8% turned out to be L. monocytogenes, 37.4% L. innocua and 0.5% L. seeligeri. Listeria spp. were found in all production stages of the tested foods. The concentration of L. monocytogenes was always less than or equal to 20 MPN/g. 86% of the isolated strains formed part of the serogroup 1/2 and 14% of the serogroup 4. Listeria spp. could only be found on the surface of Bündnerfleisch. Both, L. monocytogenes and L. innocua were able to survive the maturation process of salami, even when the initial concentration was very low. The ripening was more often survived by L. innocua than by L. monocytogenes. It appeared that Mettwurst had the highest contamination rate of Listeria spp. (94.4%), followed by salami (46.7%) and Bündnerfleisch (23.1%). The corresponding proportions for L. monocytogenes were 8.0% (salami), 5.8% (Bündnerfleisch) and 0% (Mettwurst). Listeria spp. positive samples were found in every examined plant, L. monocytogenes in five of therm. The Listeria spp. contamination rates moved from 10.0% to 86.2%, those of L. monocytogenes from 0% to 12.1%.
Like Our Facebook Fan Page Mourinho Bemoans Lack of Midfield Options Manchester United are short on "solutions" in midfield for their away Champions League match against CSKA Moscow, says manager Jose Mourinho. "I won't have Fellaini, I won't have Pogba, we won't have Carrick, so all three are midfield players that we lose for this match. So there are not many solutions, but we try not to focus on individual matters or specific areas on the pitch. We are going to have a team with quality and balance and try to win the match – that is our objective, " said the Portuguese manager. Ander Herrera and Nemanja Matic are United's other first-team central midfielders, while the versatile Daley Blind and youngster Scott McTominay could also be options. Mourinho has also confirmed that defender Phil Jones will miss the game in Moscow.
Subscription “Eos” can be ordered directly from the Editor. Please send us an email indicating the volumes you require and the number of copies. The ordered fascicles will be sent to your address. One volume of “Eos” consists of two fascicles. A copy of one fascicle starting from fasc. 2015/1 costs 25 € or 30 USD (incl. shipping costs). Special discount price is available for the members of Polish Philological Association. Back issues (vol. 2014 and earlier) are offered, if still available, a discount price: 10 € or 12 USD per fascicle.
Q: Texture wont change after duplication I've got following problem: I have an object in my blendfile which already has a face, differing by material. When I now press 'P' to seperate and then 'by material' it becomes an independant object, but I can't change the material of it. Is there a way to do it or do I have to create a new plane ? A: A few things to try: 1) Select the new object, and remove the old material, then add a new material. This should disconnect the material of the new object from the old one. 2) Select the old object and go to Object > Apply > Make duplicates real. This will make the duplicates connected to the object (in case somehow the object is a duplicate) a real object. 3) Select the new object, and go to Object > Users > Make single user-Object & Data & Materials & tex. If one of these three things do not fix the problem, I don't know what can.
Uninterruptible power supplies (UPSs) including voltage converters are fundamental parts of many electrical systems such as power supply systems for computers and servers in data centers. UPSs can be used with many typical power systems including single and 3-phase connections, and can be used with low-power systems (e.g., a household computer) and high-power systems (e.g., large data centers or process facilities). High-power systems typically use a 3-phase power connection (e.g., X, Y, and Z phases). A 3-phase UPS voltage converter is typically used to provide 3-phase AC power to a 3-phase load, to convert a 3-phase AC voltage from one level to another, and to provide 3-phase power to a load in the event of a power failure. The input and output connections to a 3-phase UPS voltage converter are typically three- or four-terminal connections, one connection for each phase of the 3-phase power connection and an optional neutral connection. A battery is also typically coupled to the UPS voltage converter and is used to store energy for use in case of a power failure. Typical high power (e.g., above 100 kW) UPSs are operated using nominal AC input voltages of 3×400 V (in Europe) or 3×480 V (in the U.S.). Transformerless UPSs may operate with an internal DC bus voltage of ±450 V. In such a configuration, components contained in the UPS are preferably rated for at least 1200 V operation due to large voltage overshoots associated with stray inductances of physically large insulated gate bipolar transistor (IGBT) modules. The use of 1200 V components, however, typically leads to increased conduction and switching losses, thus lowering the efficiency.
Support This Blog Warning: Missing argument 1 for PayPalDonations::paypalShortcode(), called in /home/aleche35/blog.sethroberts.net/wp-content/themes/basic/sidebar-left.php on line 8 and defined in /home/aleche35/blog.sethroberts.net/wp-content/plugins/paypal-donations/paypal-donations.php on line 239 [Joe] Forgas [an Australian psychology professor] placed a variety of trinkets, like toy soldiers, plastic animals and miniature cars, near the checkout counter. As shoppers exited, Forgas tested their memory, asking them to list as many of the items as possible. To [vary] mood, Forgas conducted the survey on gray, rainy days — he accentuated the weather by playing Verdi’s “Requiem” — and on sunny days, using a soundtrack of Gilbert and Sullivan. The results were clear: shoppers in the “low mood” condition remembered nearly four times as many of the trinkets. The wet weather made them sad, and their sadness made them more aware and attentive. I found the scientific article that reports this experiment, in Journal of Experimental Social Psychology. Memory for the trinkets was measured two ways — recall and recognition — and both ways the “sad” shoppers did much better. I didn’t know about this; the size of the effect suggests it’s important. Calling it variation in “memory” is odd, since the remembered event was only a minute ago. Variation in attentiveness is a better summary. Whatever you call it, I like the general point made in the scientific article. When you are in a good mood, you pay less attention to your surroundings than when you are in a bad mood. When you’re in a good mood, the model of the world in your head is working well. No need to change it. When you’re in a bad mood, the model of the world in your head isn’t working well. Time to gather more data and revise it. This entry was posted on Sunday, February 28th, 2010 at 10:26 pm and is filed under human nature. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed. 9 Responses to “Mood and Attentiveness” Sometime ago I practiced Tibetan Buddhism and read Chogyam Trungpa—an interesting monk by any measure. I could be off since I’m working with memory, but I recall in one of his books I read he was stressing not only attentiveness—no surprise there—but also how important it was to feel melancholy as a way of life. As if melancholy were the only emotion underlying a present and attentive life. The results that Seth discusses seem to be somewhat inconsistent with other research which shows that happy people are better at problem-solving. See also Barbara Fredrickson’s “broaden-and-build” theory of positive emotions: The question that came to my mind was this- Did the happier, more upbeat people focus more on the other people (cashier) than the items around the checkout, and did the melancholy shoppers focus more on the items and less on the cashier? yes, karky, that’s a good question. This is the sort of result that I’d like to see repeated under lab conditions where the two conditions (sad and happy) are more equal. I looked around for such evidence but couldn’t find it. Depressed people certainly are better at some things than non depressed (never depressed) people-such as processing negatively weighted words http://tinyurl.com/yj8kc5s The trouble is the things they tend to be better at may not help them. Better recall for negative events but worse recall for postive ones and less accurate and exegeratted recall for their own physical ailments http://tinyurl.com/yzzchgb “This line of research led Andrews to conduct his own experiment, as he sought to better understand the link between negative mood and improved analytical abilities. He gave 115 undergraduates an abstract-reasoning test known as Raven’s Progressive Matrices, which requires subjects to identify a missing segment in a larger pattern. (Performance on the task strongly predicts general intelligence.) The first thing Andrews found was that nondepressed students showed an increase in “depressed affect” after taking the test. In other words, the mere presence of a challenging problem — even an abstract puzzle — induced a kind of attentive trance, which led to feelings of sadness. It doesn’t matter if we’re working on a mathematical equation or working through a broken heart: the anatomy of focus is inseparable from the anatomy of melancholy. This suggests that depressive disorder is an extreme form of an ordinary thought process, part of the dismal machinery that draws us toward our problems, like a magnet to metal.” Obvious implications for the benefit of meditation, here. Putting aside a little bit of time to very pointedly not solve any problems. If concentrating on a problem is depressing, the drive to concentrate on solving problems might be implicated in depression. Or the depression itself might only be coincidental, happiness might compete with problem-solving for resources. Happy people might be better at problem solving because they have more of these competed-for resources. One general finding of emotion researchers is that inducing positive mood, by having the experimenter tap the subject on the shoulder and smile, or offer cookies, or various other manipulations, results in a greater range of more creative associations to words, so at least the imagination is opened up. I don’t know how the “trinket” finding fits into the overall research. I’m a writer who is very depressive — the one word people use repeatedly to describe my published writing is “thoughtful,” for whatever that is worth… Depression can make you question the point of doing anything; it can paralyze motivation, which in turn may free your attention…
For Immediate Release: Jan. 10, 2020 Media Contact: Tony Fleming, director for communications, 202-463-8270 ext. 110 (Washington, D.C.)—Professor Areg Danagoulian and colleagues at the Massachusetts Institute of Technology (MIT) were selected as the 2019 Arms Control Persons of the Year through an online poll that drew participants from over 100 countries. The annual contest is organized by the independent, nongovernmental Arms Control Association. Prof. Danagoulian and his team were nominated for their work developing an innovative new nuclear disarmament verification process using neutron beams. This process addresses the fact that parties to arms control treaties more often destroy delivery systems than warheads (e.g., the U.S. dismantling B-52 bombers for compliance with START). This leaves large stockpiles of surplus nuclear weapons, increasing risks of nuclear proliferation and nuclear terrorism. Instead, the neutron beam test authenticates the warheads’ isotopic composition without revealing it, enabling a verified dismantlement of nuclear warheads. Daryl Kimball, executive director of the Arms Control Association remarked, “This innovation paves the way for more effective arms control agreements, inspections, and enforcement. Professor Danagoulian’s MIT team has brought the best science to arms control and provided a creative solution that can reduce nuclear threats and enhance security.” This year, 10 individuals and groups were nominated by the Arms Control Association staff and board of directors. All of the nominees demonstrated extraordinary leadership in advancing effective arms control solutions for the threats posed by mass casualty weapons during the course of 2019. This contest is a reminder of the diverse and creative ways that dedicated individuals and organizations from around the globe can contribute to meeting the difficult arms control challenges of today and the coming decades. It is a hopeful way to close out 2019 and begin 2020. Arms Control Today is the monthly flagship publication of the Arms Control Association. Since 1972, Arms Control Today has provided policymakers, journalists, and concerned citizens with the latest authoritative analyses on arms control proposals, negotiations, and agreements, and related national security news. Join today and secure full access to the latest feature articles and expert analyses! The runner-up was Afghanistan’s first all-female demining team, nominated for completing landmine work in Bamyan province, the first of Afghanistan's 34 provinces to be declared free of landmines. The women were trained by the Danish Demining Group as part of a United Nations Mine Action Service pilot program working with Afghanistan’s Directorate of Mine Action Coordination (DMAC). “The courageous efforts of the Afghan demining team exemplifies women’s empowerment and engagement in peace and security and underscores the importance of humanitarian disarmament,” said Kathy Crandall Robinson, Chief Operations Officer of the Arms Control Association. Online voting was open from Dec. 12, 2019, until Jan. 8, 2020. A list of all of this year's nominees is available at https://armscontrol.org/acpoy/ 2019 Previous winners of the "Arms Control Person of the Year" are:
What's behind the decline? The role of white matter in brain aging. The specific molecular events that underlie the age-related loss of cognitive function are poorly understood. Although not experimentally substantiated, age-dependent neuronal loss has long been considered central to age-related cognitive decline. More recently, age-related changes in brain white matter have taken precedence in explaining the steady decline in cognitive domains seen in non-diseased elderly. Characteristic alterations in the ultrastructure of myelin coupled with evidence of inflammatory processes present in the white matter of several different species suggest that specific molecular events within brain white matter may better explain observed pathological changes and cognitive deficits. This review focuses on recent evidence highlighting the importance of white matter in deciphering the course of "normal" brain aging.
Q: CCButton not working completely when pressed in Cocos2D v3 iOS I have a gameplay scene, over which I add a CCNode as a child. My Game Over node has a replay CCButton in it. The button is supposed to restart the game play scene. The problem is, when I press the "Restart" button, it goes through the lines but it doesn't perfrom replaceScene. Also it doesn't highlight when pressed. Here's my relevant code: The code where I add the Game Over Node in my GamePlay Class (.m): CCNode GameOver = [[GameOverNode alloc] init]; [self unscheduleAllSelectors]; [self stopAllActions]; [[OALSimpleAudio sharedInstance] stopBg]; [[CCDirector sharedDirector] stopAnimation]; [[CCDirector sharedDirector] pause]; [self addChild:GameOver z:5]; and here's the code for GameOver Class (.h): @interface GameOverNode:CCNode { CCButton *_aButton; } @property (nonatomic, retain) CCButton *aButton; - (id)init; - (void)ButtonPressed:(id)sender; and Game Over (.m): -(id)init { if ( self = [super init] ){ CCSpriteFrame *replayFrame = [CCSpriteFrame frameWithImageNamed:@"Replay.png"]; _aButton = [CCButton buttonWithTitle:@"" spriteFrame:replayFrame]; _aButton.position = ccp(200,200); [_aButton setTarget:self selector:@selector(ButtonPressed:)]; [self addChild:_aButton z:2]; } return self; } - (void)ButtonPressed:(id)sender { NSLog(@"Button pressed"); CCTransition* t = [CCTransition transitionFadeWithDuration:0.4f]; t.outgoingSceneAnimated = YES; t.incomingSceneAnimated = YES; [[CCDirector sharedDirector] replaceScene:[GamePlayScene scene] withTransition:t]; } The thing is, it prints out "Button pressed", also goes through the rest of the code of the method, but nothing happens. I'll appreciate if you can let me know what I am doing wrong. Thanks! A: It does not work because you have paused the CCDirector. Remove the following line: [[CCDirector sharedDirector] pause]; Alternatively if you really need that, resume the director before you attempt to replace the scene. [[CCDirector sharedDirector] resume]; [[CCDirector sharedDirector] replaceScene:[GamePlayScene scene] withTransition:t];
/* Copyright (c) 2003-2018, CKSource - Frederico Knabben. All rights reserved. For licensing, see LICENSE.md or https://ckeditor.com/legal/ckeditor-oss-license */ CKEDITOR.plugins.setLang( 'specialchar', 'cy', { options: 'Opsiynau Nodau Arbennig', title: 'Dewis Nod Arbennig', toolbar: 'Mewnosod Nod Arbennig' } );
import AppKit import Foundation // MARK: - FileNavigatorHeader public class FileNavigatorHeader: NSBox { // MARK: Lifecycle public init(_ parameters: Parameters) { self.parameters = parameters super.init(frame: .zero) setUpViews() setUpConstraints() update() addTrackingArea(trackingArea) } public convenience init(titleText: String, dividerColor: NSColor, fileIcon: NSImage) { self.init(Parameters(titleText: titleText, dividerColor: dividerColor, fileIcon: fileIcon)) } public convenience init() { self.init(Parameters()) } public required init?(coder aDecoder: NSCoder) { self.parameters = Parameters() super.init(coder: aDecoder) setUpViews() setUpConstraints() update() addTrackingArea(trackingArea) } deinit { removeTrackingArea(trackingArea) } // MARK: Public public var titleText: String { get { return parameters.titleText } set { if parameters.titleText != newValue { parameters.titleText = newValue } } } public var dividerColor: NSColor { get { return parameters.dividerColor } set { if parameters.dividerColor != newValue { parameters.dividerColor = newValue } } } public var fileIcon: NSImage { get { return parameters.fileIcon } set { if parameters.fileIcon != newValue { parameters.fileIcon = newValue } } } public var onClick: (() -> Void)? { get { return parameters.onClick } set { parameters.onClick = newValue } } public var parameters: Parameters { didSet { if parameters != oldValue { update() } } } // MARK: Private private lazy var trackingArea = NSTrackingArea( rect: self.frame, options: [.mouseEnteredAndExited, .activeAlways, .mouseMoved, .inVisibleRect], owner: self) private var innerView = NSBox() private var imageView = LNAImageView() private var titleView = LNATextField(labelWithString: "") private var dividerView = NSBox() private var titleViewTextStyle = TextStyles.regular private var hovered = false private var pressed = false private var onPress: (() -> Void)? private func setUpViews() { boxType = .custom borderType = .noBorder contentViewMargins = .zero innerView.boxType = .custom innerView.borderType = .noBorder innerView.contentViewMargins = .zero dividerView.boxType = .custom dividerView.borderType = .noBorder dividerView.contentViewMargins = .zero titleView.lineBreakMode = .byWordWrapping addSubview(innerView) addSubview(dividerView) innerView.addSubview(imageView) innerView.addSubview(titleView) titleViewTextStyle = TextStyles.regular titleView.attributedStringValue = titleViewTextStyle.apply(to: titleView.attributedStringValue) } private func setUpConstraints() { translatesAutoresizingMaskIntoConstraints = false innerView.translatesAutoresizingMaskIntoConstraints = false dividerView.translatesAutoresizingMaskIntoConstraints = false imageView.translatesAutoresizingMaskIntoConstraints = false titleView.translatesAutoresizingMaskIntoConstraints = false let heightAnchorConstraint = heightAnchor.constraint(equalToConstant: 38) let innerViewTopAnchorConstraint = innerView.topAnchor.constraint(equalTo: topAnchor) let innerViewLeadingAnchorConstraint = innerView.leadingAnchor.constraint(equalTo: leadingAnchor) let innerViewTrailingAnchorConstraint = innerView.trailingAnchor.constraint(equalTo: trailingAnchor) let dividerViewBottomAnchorConstraint = dividerView.bottomAnchor.constraint(equalTo: bottomAnchor) let dividerViewTopAnchorConstraint = dividerView.topAnchor.constraint(equalTo: innerView.bottomAnchor) let dividerViewLeadingAnchorConstraint = dividerView.leadingAnchor.constraint(equalTo: leadingAnchor) let dividerViewTrailingAnchorConstraint = dividerView.trailingAnchor.constraint(equalTo: trailingAnchor) let imageViewLeadingAnchorConstraint = imageView .leadingAnchor .constraint(equalTo: innerView.leadingAnchor, constant: 12) let imageViewCenterYAnchorConstraint = imageView.centerYAnchor.constraint(equalTo: innerView.centerYAnchor) let titleViewLeadingAnchorConstraint = titleView .leadingAnchor .constraint(equalTo: imageView.trailingAnchor, constant: 6) let titleViewTopAnchorConstraint = titleView.topAnchor.constraint(greaterThanOrEqualTo: innerView.topAnchor) let titleViewCenterYAnchorConstraint = titleView.centerYAnchor.constraint(equalTo: innerView.centerYAnchor) let titleViewBottomAnchorConstraint = titleView.bottomAnchor.constraint(lessThanOrEqualTo: innerView.bottomAnchor) let dividerViewHeightAnchorConstraint = dividerView.heightAnchor.constraint(equalToConstant: 1) let imageViewHeightAnchorConstraint = imageView.heightAnchor.constraint(equalToConstant: 20) let imageViewWidthAnchorConstraint = imageView.widthAnchor.constraint(equalToConstant: 20) NSLayoutConstraint.activate([ heightAnchorConstraint, innerViewTopAnchorConstraint, innerViewLeadingAnchorConstraint, innerViewTrailingAnchorConstraint, dividerViewBottomAnchorConstraint, dividerViewTopAnchorConstraint, dividerViewLeadingAnchorConstraint, dividerViewTrailingAnchorConstraint, imageViewLeadingAnchorConstraint, imageViewCenterYAnchorConstraint, titleViewLeadingAnchorConstraint, titleViewTopAnchorConstraint, titleViewCenterYAnchorConstraint, titleViewBottomAnchorConstraint, dividerViewHeightAnchorConstraint, imageViewHeightAnchorConstraint, imageViewWidthAnchorConstraint ]) } private func update() { fillColor = Colors.headerBackground dividerView.fillColor = dividerColor titleView.attributedStringValue = titleViewTextStyle.apply(to: titleText) imageView.image = fileIcon if pressed { fillColor = Colors.contentHeaderBackground } onPress = handleOnClick } private func handleOnClick() { onClick?() } private func updateHoverState(with event: NSEvent) { let hovered = bounds.contains(convert(event.locationInWindow, from: nil)) if hovered != self.hovered { self.hovered = hovered update() } } public override func mouseEntered(with event: NSEvent) { updateHoverState(with: event) } public override func mouseMoved(with event: NSEvent) { updateHoverState(with: event) } public override func mouseDragged(with event: NSEvent) { updateHoverState(with: event) } public override func mouseExited(with event: NSEvent) { updateHoverState(with: event) } public override func mouseDown(with event: NSEvent) { let pressed = bounds.contains(convert(event.locationInWindow, from: nil)) if pressed != self.pressed { self.pressed = pressed update() } } public override func mouseUp(with event: NSEvent) { let clicked = pressed && bounds.contains(convert(event.locationInWindow, from: nil)) if pressed { pressed = false update() } if clicked { onPress?() } } } // MARK: - Parameters extension FileNavigatorHeader { public struct Parameters: Equatable { public var titleText: String public var dividerColor: NSColor public var fileIcon: NSImage public var onClick: (() -> Void)? public init(titleText: String, dividerColor: NSColor, fileIcon: NSImage, onClick: (() -> Void)? = nil) { self.titleText = titleText self.dividerColor = dividerColor self.fileIcon = fileIcon self.onClick = onClick } public init() { self.init(titleText: "", dividerColor: NSColor.clear, fileIcon: NSImage()) } public static func ==(lhs: Parameters, rhs: Parameters) -> Bool { return lhs.titleText == rhs.titleText && lhs.dividerColor == rhs.dividerColor && lhs.fileIcon == rhs.fileIcon } } } // MARK: - Model extension FileNavigatorHeader { public struct Model: LonaViewModel, Equatable { public var id: String? public var parameters: Parameters public var type: String { return "FileNavigatorHeader" } public init(id: String? = nil, parameters: Parameters) { self.id = id self.parameters = parameters } public init(_ parameters: Parameters) { self.parameters = parameters } public init(titleText: String, dividerColor: NSColor, fileIcon: NSImage, onClick: (() -> Void)? = nil) { self.init(Parameters(titleText: titleText, dividerColor: dividerColor, fileIcon: fileIcon, onClick: onClick)) } public init() { self.init(titleText: "", dividerColor: NSColor.clear, fileIcon: NSImage()) } } }
We use cookies to ensure that we give you the best experience on our website. If you click 'Continue' we'll assume that you are happy to receive all cookies and you won't see this message again. Click 'Find out more' for information on how to change your cookie settings. Separable learning systems in the macaque brain and the role of orbitofrontal cortex in contingent learning. Separable learning systems in the macaque brain and the role of orbitofrontal cortex in contingent learning. Walton ME., Behrens TEJ., Buckley MJ., Rudebeck PH., Rushworth MFS. Orbitofrontal cortex (OFC) is widely held to be critical for flexibility in decision-making when established choice values change. OFC's role in such decision making was investigated in macaques performing dynamically changing three-armed bandit tasks. After selective OFC lesions, animals were impaired at discovering the identity of the highest value stimulus following reversals. However, this was not caused either by diminished behavioral flexibility or by insensitivity to reinforcement changes, but instead by paradoxical increases in switching between all stimuli. This pattern of choice behavior could be explained by a causal role for OFC in appropriate contingent learning, the process by which causal responsibility for a particular reward is assigned to a particular choice. After OFC lesions, animals' choice behavior no longer reflected the history of precise conjoint relationships between particular choices and particular rewards. Nonetheless, OFC-lesioned animals could still approximate choice-outcome associations using a recency-weighted history of choices and rewards.
Zack Snyder on why Batman breaks his cardinal rule in Dawn of Justice There's a lot of fans up in arms over whether or not Batman would or should kill. He's certainly done his fair share over the movies that have been released so far, even if it was indirectly, but odds are that's still going to continue going forward. With the release of BATMAN V SUPERMAN, director Zack Snyder weighed on why he thinks it's okay for the Dark Knight to deal out the ultimate punishment from time to time. I tried to do it in a technical way. There’s a great YouTube video that shows all the kills in the Christopher Nolan movies even though we would perceive them as movies where he doesn’t kill anyone. I think there’s 42 potential kills that Batman does! Also, it goes back and includes even the Tim Burton Batman movies where this reputation as a guy that doesn’t kill comes from. So, I tried to do it by proxy. Shoot the car they’re in, the car blows up or the grenade would go off in the guy’s hand, or when he shoots the tank and the guy pretty much lights the tank [himself]. I perceive it as him not killing directly, but if the bad guy’s are associated with a thing that happens to blow up, he would say that that’s not really my problem. A little more like manslaughter than murder, although I would say that in the Frank Miller comic book that I reference, he kills all the time. There’s a scene from the graphic novel where he busts through a wall, takes the guy’s machine gun…I took that little vignette from a scene in The Dark Knight Returns, and at the end of that, he shoots the guy right between the eyes with the machine gun. One shot. Of course, I went to the gas tank, and all of the guys I work with were like, ‘You’ve gotta shoot him in the head’ because they’re all comic book dorks, and I was like, ‘I’m not gonna be the guy that does that!’ So what do you think? Does Batman actually killing criminals take away from his character, or do you find it fitting? I suppose it depends on the situation, but I certainly don't have any qualms about him permanently taking down bad guys if it's not gratuitous. Then again, I'm not as fluent with the comic character as other fans, so what do I know? I'm pretty sure that's the least of the criticisms when it comes to DC's latest!
The Obama administration calls its national security strategy “Countering Violent Extremism.” In the benighted times before January 20, 2009, we used to call it counter-terrorism. Why does Obama insist on the more fuzzy “extremism”? Because “terror” has its roots in Islamic scripture. This fact ought to be undeniable, but Obama denies it -- and in Washington, he’s far from alone in that. It is not just that the word terror appears several times in the Koran; it is that the word appears in a particular context: The duty of Muslims to act as Allah’s instrument to terrorize non-Muslims is a recurring scriptural theme. In Sura 3:151, to take one of several examples, Muslims are admonished: Soon shall We cast terror into the hearts of the unbelievers. Omar Abdel Rahman, the “Blind Sheikh” I prosecuted in the mid-'90s after his cell bombed the World Trade Center and planned similar strikes against other New York City landmarks, was a renowned scholar of Islamic jurisprudence. Indeed -- and this is worth pausing over -- his mastery of our enemy’s ideology was the sole source of his authority to approve jihadist attacks. Think about that: his blindness, and various other maladies, render Abdel Rahman unable to do anything useful for a terrorist network. He can’t build bombs, command forces on the battlefield, execute assassinations, and so on. But his authority is unquestioned because of his scholarship and rhetorical power in the scripture-based doctrine our president pretends is non-Islamic and of marginal importance. Sheikh Abdel Rahman was adamant that terror is fundamental to Islamic doctrine: Why do we fear the word terrorist? If the terrorist is the person who defends his right, so we are terrorists. And if the terrorist is the one who struggles for the sake of God, then we are terrorists. We ... have been ordered with terrorism because we must prepare what power we can to terrorize the enemy of Allah and your enemy. The Koran [said] “to strike terror.” Therefore, we don’t fear to be described with “terrorism.” ... They may say, “He is a terrorist, he uses violence, he uses force.” Let them say that. We are ordered to prepare whatever we can of power to terrorize the enemies of Islam. Obama’s national security strategy is suicidal because it mulishly denies two unavoidable facts: (a) terrorism is rooted in Islamic supremacism’s literalist construction of scripture, and (b) even if Islamic supremacism is not the only way of interpreting Islam, it is a mainstream interpretation of Islam. Islamic supremacism is not merely the creed of outlier “violent extremists,” but of hundreds of millions of Muslims, the ocean in which jihadists comfortably swim. A commander-in-chief who does not or will not come to terms with those facts is unfit for his most basic responsibilities. His stubbornness renders him incapable of protecting the nation. That’s Obama. Understand: the president is not refusing to associate terror with Islam out of political correctness. His delusion is ideological. It informs his every decision. It is why the terrorist threat has so intensified, and why we are in more peril today than at any time since before the 9/11 attacks. Don’t use training that is all “war stories,” which may rely too much on outdated information and overgeneralizations. Regaling an audience with a blow-by-blow account of a 2003 terrorism investigation does not address the changing nature of violent extremism we face today. Obama believes the nature of terrorism is changing. This is absurd. The violence today is executed by jihadists. They are motivated by a scripture-based doctrinal command to impose sharia -- Islam’s societal framework and legal code, which is the necessary precondition to Islamicizing a society and, ultimately, establishing a caliphate. That is why they kill today, it is why they killed in 2003, in 1993, in 1800, in 1565, in 1064, in 732, and so on all the way back to the raids Muhammad himself led in the seventh century. The technology and tactics of violent jihadism have changed over time; the nature of it has been the same for nearly a millennium-and-a-half. The Obama administration has thoroughly politicized national security (just as it has politicized law enforcement and most everything else), so I would not disappoint you by saying the president’s approach to “violent extremism” is all ideology and no cynicism. By bleaching out the ideological catalyst for mass-murder attacks and attributing them to “extremism” without acknowledging what the killers are extremeabout, Obama promotes an ugly moral equivalence between jihadists and his political opposition, whose members are habitually smeared as “extremists.” It is no surprise that, while unable to bring itself to concede that the Fort Hood massacre was a jihadist attack, the Obama administration was issuing Homeland Security Department memos that profiled conservatives and U.S. soldiers returning from war as potential violent extremists.
Main menu Tag Archives: harry cohn The Crank is a graduate student organization that runs weekly screenings of the UCLA Film & Television Archive’s extensive holdings. The Crank shows films that either are not widely available on video or are such spectacular specimens of nitrate and celluloid that merely to see them on a television set would be a crime both to the student of film and to the canon of film history. Following the box office disappointment of The Scarlett Empress (1934) and the political controversy of The Devil is a Woman (1935), director Josef von Sternberg parted ways not only with Paramount but also with his frequent collaborator and muse, Marlene Dietrich. According to von Sternberg, he was “liquidated by Lubitsch,” an ironic musing since the latter did little to interfere as production manager on the film except change the title. Luckily, Ben Schulberg, who had just signed a production deal with Harry Cohn at Columbia, enlisted von Sternberg after his ousting at Paramount, offering him a two-picture deal and a fresh start. Soon von Sternberg’s fortunes became tied with another European émigré signed with the studio, the Hungarian-born actor Peter Lorre. Known primarily for his theater work in Germany with Bertolt Brecht and Kurt Weill, Lorre had left his mark as the murderer in Fritz Lang’s M (1931) and had just starred in Alfred Hitchcock’s The Man Who Knew Too Much (1935) in London. Eager to establish himself in Hollywood, Lorre presented Cohn with the idea of adapting Dostoyevsky’s Crime and Punishment as a vehicle for him to star in as its conflicted and murderous criminology student, Roderick Raskolnikov. As Hollywood legend has it, Lorre had his secretary type a monosyllabic synopsis to prove to Cohn that translating Dostoyevsky’s novel from page to screen was possible. Allegedly, Cohn, who was enraptured with the idea, only had one question for Lorre: “Tell me—has this book got a publisher?” Continue reading “The Crank: ‘Crime and Punishment’ Program Notes (4/11/13 Screening)” »