text stringlengths 8 5.77M |
|---|
In one conventional arrangement, the resources of a distributed computing system are shared among multiple users. The resources are shared, using virtualization and/or other (e.g., physically-based) techniques, in accordance with usage policies derived from user service agreements. In this conventional arrangement, such usage policies are either set in a centralized fashion by a centralized control mechanism remote from an individual respective computing node in the system, or in a localized fashion by respective localized control mechanisms at each respective computing node, but enforcement may take place at the local computing nodes.
These resources typically include hardware and software resources that provide and/or impart various kinds of processing to packets received by the system, and/or provide other capabilities, such as various services, appliances, and offload processing. Depending upon the configuration of the distributed computing system, the computing nodes to which these resources are assigned, and their respective workloads, configurations, etc., are selected either by the centralized control mechanism or the localized control mechanisms. The compute nodes may be connected via a physical network that may employ switches or other network devices. If a given packet is to undergo multiple kinds of processing by multiple resources, the packet is forwarded to and among the multiple resources.
Unfortunately, the above conventional arrangement suffers from certain disadvantages and drawbacks. For example, although the processing that is to be imparted to the packets can be individualized on a per-user, per-policy basis, etc., the specific manner in which the policies, processing, and resource configuration/locations are implemented in the system typically is not coordinated in a fashion that meaningfully facilitates or improves system processing efficiency. For example, without such meaningful coordination, resulting traffic and/or processing patterns in the system may result in overuse, underuse, or thrashing of the switch, various resources (e.g., compute, network, storage, energy, etc. resources), and/or certain ports of the switch and/or the various resources. Alternatively or additionally, without such meaningful coordination, traffic may undesirably “bounce” among the switch and/or certain resources, or take an undesirably large number of hops in the network. This may result in excessive bandwidth usage, higher latency, and/or may make latency control more difficult (e.g., leading to jitter).
The above conventional arrangement suffers from additional disadvantages and/or drawbacks. For example, the above conventional system may not be able to provide real time or near real time fine granularity for quality of service adjustments to be made to, and/or statistically accurate visibility of workloads and/or resource utilizations, as the workloads and/or utilizations change in and/or among the computing nodes. This is especially true in cases where the adjustments to and/or visibility into such workloads and/or utilizations are to be accomplished on a per user/workload basis in adherence to the user service agreements.
A further drawback of this conventional arrangement is that it affords relatively little in the way of processing/policy flexibility and dynamic processing capabilities, for example, depending upon the particular contents of received packets. For example, in at least certain circumstances, it would be useful to be able to modify or adjust resources assigned to the traffic, location of resources, policies, processing, processing order, and/or processing resource configuration/locations that are applicable to and/or to be used in connection with received packets, based upon the particular contents of the received packets, compute resources, storage resources, affinity and/or association with other infrastructure resources and/or services, and/or their relative location with respect to the locus at which network services are to be provided. It would also be useful not to preclude other services, e.g. compute, from being the pivot around which other services, infrastructure allocation, and/or placement decisions may be made. Additional drawbacks of this conventional arrangement include inability to reduce to the extent desirable processing and packet transmission latency and jitter.
One proposed solution that involves processing in hardware of network packets is disclosed in Peripheral Component Interconnect (PCI) Special Interest Group (SIG) Single Root Input/Output Virtualization (SR-IOV) and Sharing Specification Revision 1.1, published Jan. 20, 2010 (hereinafter, “SR-IOV specification”). Unfortunately, this proposed solution effectively eliminates the ability of vSwitch and/or other software processes (e.g., hypervisor and/or virtual machine monitoring processes) to be able to directly affect and/or control packet processing by the hardware. This eliminates the ability to add local control, services, and/or policies to be coordinated with the hypervisor, virtual machine manager and/or vSwitch. Indeed, there is no contemplation in SR-IOV of such vSwitch, other software processes, and/or policies being involved in the steering of packets to and/or among processing entities, and/or in the control, adaptation, and/or modification of such steering and/or processing (e.g., in a dynamic fashion and/or based upon changed processing criteria, parameters, preferences, etc.). Additionally, the local or remote entity that may govern the infrastructure may be severely challenged with respect to being able to adequately control the amount of shared resources (e.g., network bandwidth and/or priority) that may be provided to platform elements (e.g., virtual machines) and/or in coordinating such provision with and/or among other users (e.g., other virtual machines vying for appropriate network access, network priority, and/or latency). This reduces the processing flexibility and/or services that may be provided in this conventional arrangement, and/or may involve use of SR-IOV hardware to provide all such services (which may be unrealistic). Furthermore, the SR-IOV techniques do not contemplate provision of services on a fine granularity (e.g., other than a virtual machine or PCI-Express function), such as, per-flow basis, and/or support the ability of software processes to modify, combine, and/or tailor hardware processing/capabilities.
Although the following Detailed Description will proceed with reference being made to illustrative embodiments, many alternatives, modifications, and variations thereof will be apparent to those skilled in the art. Accordingly, it is intended that the claimed subject matter be viewed broadly. |
# 1 "switch4/main.c"
# 1 "<eingebaut>"
# 1 "<Kommandozeile>"
# 1 "switch4/main.c"
main()
{
int x;
switch(x)
{
case 0:
goto end;
default:
x = 0;
}
end:
assert(x==0);
}
|
News Quirks 12.20.06
Curses, Foiled Again Off-duty German police who searched a 30-year-old man they thought they saw stealing something from a store window in Bergisch Gladbach found only an empty box. The shopkeeper insisted that a ring was missing, so the officers questioned the man, who suddenly complained of severe stomach pains. He was rushed to the hospital, where doctors X-rayed him and discovered the missing ring, which they fished out with pincers attached to a stomach tube. They found no cause for the man's pain, however. "It seems that the pains were coincidental and had nothing to do with the ring," a police official said.
* While a French homeowner was at the police station in Mussidan reporting the theft of a television, his neighbors noticed that the thief had returned. They alerted police, who caught the thief red-handed. "He came back to take the remote control," a police official said. "I guess there's daring and there's stupid."
Cockeyed Optimist Inspired by his love of balsa-wood model aircraft powered by rubber bands, Mark Clews, 24, spent six months building a 20-foot-long version with a 200-foot bungee cord to turn its propeller. Anticipating the scaled-up toy would travel 3000 feet, Clews launched it at an airfield in Surrey, England, only to have it go just 6 feet - backwards. "It was spectacular, everything I hoped it would be," Clews told London's Daily Telegraph, "apart from actually flying."
What Could Go Wrong? Emergency room doctors in Texas reported 94 cases of people drinking a product called Fabuloso, thinking it was a beverage. It's actually a liquid cleanser, but medical researchers with the American College of Emergency said that it looks like a sports drink. Since many of the cases of accidental ingestion were children under 6, the researchers urged distributor Colgate-Palmolive Co. to correct the poor choice of packaging so children won't be confused and try to drink it.
* China's Ministry of Health warned image-conscious citizens against lengthening their legs after 10 people were reported to have been disfigured from the operation, which involves breaking the patient's legs and then stretching them on a rack similar to the medieval torture device. The procedure has become popular among young professionals "desperate to climb up the ladder in the country's height-conscious society," Xinhua news agency said. Calling leg lengthening "very risky for healthy people who only complain about being short," the ministry's Mao Qunan explained that it "is a clinical orthopedic treatment, not cosmetic surgery."
When Merit Isn't Enough At least 135 federal workers bought bogus college degrees online from a diploma mill, including a member of the White House staff, a senior State Department employee in Kuwait and several employees of the National Security Agency. According to material provided by the Justice Department in connection with prosecution of the operators of the diploma mill, based in Spokane, Wash., the government employees bought the degrees to help them earn promotions or pay raises.
Reasonable Explanation Testifying at his trial in Indian River County, Fla., David L. Bennett, 38, explained that he fled from police because he suddenly discovered a large amount of marijuana in his lap and thought it might be a bomb someone tossed into his car. "I didn't know if it was a bomb or a gun," he said. "I just wanted to get away from it." He added that he did not notice the pursuing deputies' emergency lights because of "a mistake of my eyesight." Circuit Judge Dan L. Vaughn sentenced Bennett to 30 years in prison.
Homeland Insecurity Concrete and metal barriers that cities erected in front of office buildings and museums to deter vehicles after the 2001 terrorist attacks are being removed, according to the New York Times. Officials have found that the barriers obstruct pedestrian flow and, in the case of giant planters, often become mass ashtrays. Counterterrorism experts concluded that, in terms of safety, some barriers might do more harm than good. A poorly anchored planter, for example, struck hard enough by an explosive force or a speeding vehicle could shatter into deadly shards or be sent flying, becoming a formidable weapon against the people it is meant to protect. "Trying to childproof America is a really dumb idea," James Jay Carafano, a senior research fellow at the Heritage Foundation specializing in homeland security, told the newspaper. "The most cost-effective thing to do is keep terrorists out."
No-Sneezing Zone A small California biotech company announced plans to deliver the first shipment of hypoallergenic kittens early in 2007. San Diego-based Allerca is breeding the felines from a small pool of cats that have a mutant gene far less likely to induce allergies in humans. Allerca, which neuters every kitten before delivery, charges $4000 for the genetically modified pets and requires buyers and their homes to undergo a rigid screening test for allergies and allergens. "You're not just buying a cat," Megan Young, Allerca's chief executive, told the International Herald Tribune. "It's a medical device that replaces shots and pills."
Exit Poll Brazilian police resumed searching for suspected serial killer Edson Barbosa Alves de Matos, 25, whom they had in their custody but were forced to release, despite his confession, because of Brazil's election law. The measure, which is intended to prevent local political bosses from detaining opponents, prohibits police from arresting and holding anyone from five days before an election until 48 hours after polls close, unless they are caught in the act or have already been sentenced. Police said the law also required them to release Adriano Saddi Lima Oliveira, 23, after he admitted paying hit men to kill his mother because she was squandering his inheritance going out with her boyfriend.
Tags
Comments
Seven Days moderates comments in order to ensure a civil environment. Please treat the comments section as you would a town meeting, dinner party or classroom discussion. In other words, keep commenting classy! Read our guidelines... |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<!-- NewPage -->
<html lang="en">
<head>
<!-- Generated by javadoc (9.0.1) on Tue Oct 23 23:20:02 IST 2018 -->
<title>org.apache.kafka.connect.connector (kafka 2.0.0 API)</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="date" content="2018-10-23">
<link rel="stylesheet" type="text/css" href="../../../../../stylesheet.css" title="Style">
<link rel="stylesheet" type="text/css" href="../../../../../jquery/jquery-ui.css" title="Style">
<script type="text/javascript" src="../../../../../script.js"></script>
<script type="text/javascript" src="../../../../../jquery/jszip/dist/jszip.min.js"></script>
<script type="text/javascript" src="../../../../../jquery/jszip-utils/dist/jszip-utils.min.js"></script>
<!--[if IE]>
<script type="text/javascript" src="../../../../../jquery/jszip-utils/dist/jszip-utils-ie.min.js"></script>
<![endif]-->
<script type="text/javascript" src="../../../../../jquery/jquery-1.10.2.js"></script>
<script type="text/javascript" src="../../../../../jquery/jquery-ui.js"></script>
</head>
<body>
<h1 class="bar"><a href="../../../../../org/apache/kafka/connect/connector/package-summary.html" target="classFrame">org.apache.kafka.connect.connector</a></h1>
<div class="indexContainer">
<h2 title="Interfaces">Interfaces</h2>
<ul title="Interfaces">
<li><a href="ConnectorContext.html" title="interface in org.apache.kafka.connect.connector" target="classFrame"><span class="interfaceName">ConnectorContext</span></a></li>
<li><a href="Task.html" title="interface in org.apache.kafka.connect.connector" target="classFrame"><span class="interfaceName">Task</span></a></li>
</ul>
<h2 title="Classes">Classes</h2>
<ul title="Classes">
<li><a href="Connector.html" title="class in org.apache.kafka.connect.connector" target="classFrame">Connector</a></li>
<li><a href="ConnectRecord.html" title="class in org.apache.kafka.connect.connector" target="classFrame">ConnectRecord</a></li>
</ul>
</div>
</body>
</html>
|
Q:
Xcode - multiple URL Schemes
In my app I want to have two Different URL Schemes.
Like One and Two
So the user can open my app with:
one://something
and
two://something
I am using this:
- (BOOL)application:(UIApplication *)application handleOpenURL:(NSURL *)url {
}
How will the app know if the user types one or two?
A:
handleOpenURL is deprecated, so if you're targeting iOS 4.2 or later, you should instead use application:openURL:sourceApplication:annotation:
In both cases, you will be passed an NSURL, on which you can just access the scheme property to find out what scheme was used to access your app.
EDIT: For readability; in your implementation of application:openURL:sourceApplication:annotation:, the code would be something similar to;
if([[url scheme] caseInsensitiveCompare:@"one"] == NSOrderedSame)
{
/* one here */
} else {
/* not one here */
}
|
/*
* Copyright (c) 2018, 2019, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
package org.openjdk.skara.vcs;
import java.io.IOException;
import java.io.Writer;
import java.io.BufferedWriter;
import java.io.StringWriter;
import java.io.UncheckedIOException;
import java.nio.file.Path;
import java.nio.file.Files;
import java.nio.charset.StandardCharsets;
import java.util.List;
import java.util.stream.Collectors;
public class Diff {
private final Hash from;
private final Hash to;
private final List<Patch> patches;
public Diff(Hash from, Hash to, List<Patch> patches) {
this.from = from;
this.to = to;
this.patches = patches;
}
public Hash from() {
return from;
}
public Hash to() {
return to;
}
public List<Patch> patches() {
return patches;
}
public List<WebrevStats> stats() {
return patches().stream()
.filter(Patch::isTextual)
.map(Patch::asTextualPatch)
.map(TextualPatch::stats)
.collect(Collectors.toList());
}
public WebrevStats totalStats() {
var added = stats().stream().mapToInt(WebrevStats::added).sum();
var removed = stats().stream().mapToInt(WebrevStats::removed).sum();
var modified = stats().stream().mapToInt(WebrevStats::modified).sum();
return new WebrevStats(added, removed, modified);
}
public void write(BufferedWriter w) throws IOException {
for (var patch : patches()) {
patch.write(w);
}
}
public void toFile(Path p) throws IOException {
try (var w = Files.newBufferedWriter(p, StandardCharsets.UTF_8)) {
write(w);
}
}
}
|
The NFL Draft starts in 23 days — 23 days!
But there is still more work to be done by the scouting gurus at One Buc Palace.
Lovie Smith and friends are now on fancy private plane headed to Oregon to work out Ducks quarterback Marcus Mariota today, far away from TV cameras.
Per NFL Network, the Bucs’ big guns will get back on the plane and run Jameis Winston through his own private workout tomorrow.
Oh, the drama.
It’s hard for Joe to imagine the Buccaneers drafting Mariota, assuming this guy stops butting his nose in , but it’s easy to imagine the Bucs being intrigued by talk of the Chargers looking to trade stud QB Philip Rivers. |
Caribbean ocean view with the scent of spice
All I wanted to do in Grenada was veg on the beach. I had a stack of paperbacks, SPF 70 and reservations for a Balinese massage. It was my first time back to the Caribbean in 10 years, and my first beach vacation in nearly as long. The prospect of eternal days of sunshine, frothy novels and morning yoga to keep me from morphing into a true sloth seemed like heaven.
All I wanted to do in Grenada was veg on the beach. I had a stack of paperbacks, SPF 70 and reservations for a Balinese massage. It was my first time back to the Caribbean in 10 years, and my first beach vacation in nearly as long. The prospect of eternal days of sunshine, frothy novels and morning yoga to keep me from morphing into a true sloth seemed like heaven.
I had good reason to spend a few nights on this remote island, 100 miles north of Venezuela: It was my 40th birthday. I wanted to retreat and reflect. But after 40 years, you’d think I knew myself better. Day after day of mindless loafing at my bohemian-luxe resort, Laluna, where I bounced between my cottage-sized bungalow — one of 16 on the hillside property — and a chaise longue on the small, private beach, no matter how indulgent and quasi-spiritual it sounds, gets old. I wanted stimulation, not to sit still.
There are several ways to get around the 120-square-mile island, including rental cars and public buses. But the easiest — and most informative — is renting a taxi with a local driver at the wheel. Which is how I found myself riding shotgun in a minivan next to a guy named Elvis.
We were heading to Belmont Estate, a 300-year-old plantation that harvests spices like cinnamon, cloves, bay leaf, ginger, nutmeg and mace, and supplies the Grenada Chocolate Co. with organic cocoa for its chocolate bars. As Elvis navigated the winding, hilly roads up the island’s eastern side, taking us past fruit stands stocked with breadfruit, mangoes and bananas, goats tethered to telephone poles, and pastel-colored homes covered in bougainvillea and perched on stilts, he gave me a brief lesson on the island’s agricultural history.
In 2004, after 49 hurricane-free years, Hurricane Ivan roared across Grenada, damaging 90 percent of the island, including its nutmeg trees — source of a chief export. Hurricane Emily, which hit in 2005, further damaged crops and infrastructure. In the storms’ aftermaths, Grenadians started cultivating more cocoa than nutmeg since cocoa trees take half as long to mature. This shift in priority was evident at Belmont Estate.
The 400-acre estate is carved into a green hillside. Rows of royal palm trees lined a path through wild vegetation, everything from towering tamarind to petite bergamot trees. Goats from the dairy farm grazed in a fenced-in patch. A soft-spoken guide took a small group of us inside a cavernous barn, where the funky scent of fermenting cacao beans, still white and gooey, permeated the air. As she explained the process — drying, roasting, pressing, conching — she brought us outside, where beans were turning brown under the tropical sun. But the estate’s expertise really came to life inside the boutique, where you can buy everything from rum truffles to chocolate-covered pineapple to pate de mango, a sweet, gummy bonbon enrobed in dark chocolate.
On the way home, Elvis suggested we take the west coast.
“You get a lot of ocean views in the west,” he said in response to my breathless “Whoa!” as we rounded a bend and saw the turquoise water before us. Not long after, he pulled over to a roadside stand and ordered a couple of local Carib beers. Elvis was a sales rep for the company and, with quiet pride, he handed me a bottle. I don’t know if it was the chocolate aftertaste or Caribbean views, but it was one of the best brews of my life.
A couple of days later, I was on my way back up the west coast, this time with a driver named Francis and two addresses that seemed to offer definitive Spice Isle experiences: Dougaldston Estate and the Gouyave Nutmeg Processing Cooperative.
If Belmont Estate is Grenada’s “finest agri-tourism experience,” then Dougaldston Estate is its forgotten cousin. With a worn boucan — a building with long drying trays on rails that can be pushed under the building during rain — the estate has the broke-down beauty of Miss Havisham’s mansion. Inside, the spices were displayed as artfully as if a food stylist had prepped them. Branches of cinnamon and pimento trees were splayed on work stations along with giant cocoa pods and calabash shells filled with allspice, bay leaf, nutmeg and mace: the perfect prelude to our next stop.
A short drive away in the fishing village of Gouyave, the nutmeg cooperative enveloped us in the spice’s unmistakable citrus-cola scent. Tons of nutmegs occupied long, shallow beds on the warehouse’s second floor, where they soaked up the heat beneath the roof’s eaves. Unlike cacao seeds, nutmegs can’t be exposed to direct sun and take two months to dry. They’re then fed into a machine that spins and cracks them, and workers do the rest by hand: separating the shells and testing the nuts for quality before bagging them for export.
Having by now explored the full perimeter of Grenada, I decided it was time to venture inland, which led me to another driver: Lenox. As we putted up the mountainous interior in a boxy diesel van, lush ferns lined the road and bamboo trees bowed overhead, creating a green tunnel. The air became dramatically cooler. We’d entered the Grand Etang National Park.
He explained how papaya seeds can expel parasites from the digestive system. He demonstrated how the tiny Mimosa pudica recoils at a human’s touch. And passing a guava tree, Lenox plucked a couple of the ripe green fruit, instructing me to bite off and spit out the stem, and enjoy the firm, pulpy insides.
As the aromatic vegetation gave way to wild forest, Lenox stopped. “We are going to do a spiritual exercise, OK?” For one full minute, he instructed, we were to close our eyes and just listen. I heard water babbling in the distance. Wind rustled through leaves, and birds chirped. Somewhere, a piece of fruit dropped with a soft thud. “As we go deeper into the forest,” Lenox said, “it’s important to really listen. It is important to hear what nature has to say.”
I did keep my ears peeled during our hike, but more to Lenox’s continuous observations and instructions. “Do you want to do a little extra?” he asked, about 45 minutes in. Fully under his — and Grenada’s — spell, I said yes.
He veered off the path, leading me through branches, over streams and around fallen trees. Up and away, deeper into the unknown, we finally arrived at a sloping rock wall with water shooting down: the end of the line. Or so I thought. Following Lenox’s careful instructions, I slid off my shoes and followed him as he started slowly sidestepping up the rocky ridge, through the rushing water, groping — sometimes clinging to — the facing rock wall for support. It was an intimidating climb, but we eventually reached the top. The water’s roar subsided, and all was calm again. Then I saw my reward: Honeymoon Falls. One of several waterfalls in the park, and rarely reached by tourists, as it is off the well-traveled trails. As I took in my tropical surroundings from the bracingly cool, heart-shaped pool under the waterfall, I felt nothing but gratitude — for Lenox, for Grenada, and for my inability to sit still.
I didn’t entirely eschew the beach. In between chocolate tastings and nutmeg lessons, the forest and the falls, I found time to honor my original intent for visiting Grenada. I watched the sunset each evening while paddling in the warm water. I watched local men pull in their catch from fishing nets. And in the afternoons, if only for an hour or two, I observed the mellow parade of joggers, uniformed schoolgirls and the politest of peddlers straggle by. It was, I decided, a good life in Grenada. |
Pinnacle Career Institute
Kansas City, Missouri
You deserve a technical education that stands out. Pinnacle Career Institute (PCI) wants to be the school that helps you get it.
At PCI, your success is what they care about most. In fact, they've built lots of support into their online and on-campus programs in order to maximize your ability to start a career you love.
Career Training That Makes Sense
In today's job market, you need an education that's relevant to the career you're after. That's why PCI focuses on aligning their program curricula with the needs of employers. And it's why students at this school get to enjoy testing what they learn within realistic environments and workplace situations.
Plus, by keeping class sizes small and instruction methods up-to-date, PCI ensures that every student gets the chance to receive individualized attention and a full understanding of their study materials.
At the end of the day, it's all about putting you in the best position possible to take advantage of 21st-century opportunities in health care.
Support Services Even After You Graduate
Since PCI defines their own success by the success of their students, they stay committed to helping current students as well as past graduates. That means you can access career planning services to help you find a job in your field or to brush up on your networking, resume-writing, or interviewing skills.
A Fast Way to Get Started
Give Pinnacle Career Institute the opportunity to share more program details with you. Complete a simple request form right now to ask for additional information! |
SARATOGA DIARY, DAY 2: MO MONEY, MO MONEY, MO RIVERA WAS MONEY
Happy Mariano Rivera Day, Yankee racing fans! And even if you’re a Yankees hater, how can you not admire the first ever unanimous first-ballot Hall of Famer?
I was surprised by the jockey
comments following Thursday’s Quick Call stating the turf course was soft. I
would have expected good or yielding, but maybe that’s the way it is because
it’s fresh grass and perhaps there was more rain than what was apparent on the
feed. Friday’s courses are rated dirt fast; turf yielding.
Either way, like the idea that the
four turf races that were re-scheduled was announced early, giving bettors time
to go back into their past performances. Hope that trend continues, both in
protecting the course for the long meet and making such announcements early.
FIRST RACE: Derby Memories, under heady Kendrick Carmouche, went to the front and improved his position—by double-digits at the end. Certainly looks like a repeater even on the rise, as long as dynamics are favorable. He stopped the 9-furlong timer in 1:48.92, pretty snappy. And that’s all they wrote…
SECOND: Not many anxious moments for Main Track Only, odds-on Daddy Knows. Make Motime made mid-race move on backstretch on rail under a Leparoux full-nelson, trying to save horse and improve position simultaneously. He had to steady on turn, breaking mo-mentum, then was going well at the finish after tipping out. Stable mail please. BTW, to compare, these 9 furlongs went in 1:51.
THIRD: Conquest Hardcandy–well rated by Tyler G, who took a comfortable stalking posture throughout–assumed the lead under a pull and had plenty left, though he was driving hard at the end to maintain the winning margin. Runnerup Dream Passage enjoyed a ground saving trip.
MO MONEY, MO MONEY, MO MONEY—no,
not the Spike joint, the G.O.A.T., as in GREATEST OF ALL-TIME. Mariano Rivera
was honored by NYRA in ceremonies before the fourth race. Rivera, the first
unanimous first-ballot inductee ever, will have his plaque erected in the
Baseball Hall of Fame in Cooperstown, about two hours south and west of
Saratoga.
Mariano and The Mig
According to master of ceremonies
John Imbriale, “more men walked on the moon than scored against [Rivera] in the
post season.” Considering he helped win the New York Yankees five World
Championships, that’s, like, crazy, right? Thanks for the memories, Mo, or,
Tony Soprano’s nephew Christopher would say: “enjoy your success.”
FOURTH: Soul P Say set the pace in 7-furlong sprint, pressed throughout, and was very good until he got very tired, very late; overall good effort. Winner Big Muddy and runnerup Orpheus both rallied wide while on the move into the stretch, ‘Muddy’ prevailing late under strong Ricardo Santana handling… Lord Simba, racing in the back of the pack, entered the stretch extremely wide, losing all chance; note.
FIFTH: Not good judgment by Luis Saez aboard runnerup Good Shabbos. Sharp on the inside down the backstretch, he correctly steadied off a lively pace, a move that looked good, and was good, as a phalanx of four battled it out across the track into the stretch. All Saez needed to do was wait for the stretch, then tip out.
Instead he asked Good Shabbos for
her life around the four battlers at a loss of ground that hurt momentum and tired
late due to the premature wide rally. Normally love his aggressive-position style
but his anxiousness got the best of him here. Winning Vast broke her maiden on
debut for Bill Mott; doesn’t happen often–nor does getting 12-1 on Mr. Mott.
Bet Good Shabbos back, providing it’s not on Saturday.
SIXTH: Start of the Late Pick 5—tomorrow there will be a million-dollar bonus for a lone ticket holder; somewhere over the faux rainbow. (Good idea trying to attract more handle without having to institute a 20-Cent Jackpot concept, but how often is there a single winner of Pick Five)?
Troubled trip for Saez, this time
not his fault; racing luck can be cruel. Heavy Roller had inside-speed position
going into the lower first turn but would force Saez to steady for about a half
mile in a 9-furlong two turner.
Meanwhile, Felix in Fabula,
stalking comfortably throughout, was set down by Jose Ortiz soon after entering
the stretch, proving best as mate Curlin Road was a pick-up-pieces second.
Winning trainer Bruce Levine has been live the first two days of this meet.
SEVENTH: Finally, Saez finds the circle on much-best favorite Filly Dilly, a formful result when MTO Saloon Girl with Johnny followed the winner home for Wesley Ward. That’s it and that’s all.
EIGHTH: Rosario and Saez, obviously thinking they had each other to beat on Doups Point and Dreamzapper, respectively, hooked up from the start and battled each other all the way. Meanwhile, sitting off both their hips in perfect position was Fiery Opal with Edwin Rivera.
At mid-turn, the three hooked up
and all were trying and driving hard to the finish. Fiery Opal’s trip and
Rivera’s tactics proved the difference as he wore down the tiring speedsters,
saving just enough to hold off Irish Valor who made the last run but couldn’t
get up. Not the best horses but they put on quite a show.
G3 FORBIDDEN APPLE: Junior Alvarado just might be having a New York career year. After getting debuting Vest home earlier by working his way through horses and winding up saving ground, he took advantage of his outer turf draw–which might have been the better part of the yielding ground.
After breaking sharply, Alvarado
set up shop in the three path and of all the contenders—there were many—he was
the only one with winning position when the field turned for home. Position and
cut in the ground helped get it done. Trainer Catherine Day Phillips picked the
perfect spot; Mr. Havercamp got perfect handling.
Stakes postscripts: Voodoo Song
chased throughout, tiring in midstretch as if short of condition and will benefit
from the effort. Qurbaan, way overbet, rallied fairly well from between horses
but on balance very disappointing. March to the March, toward the inside,
Hembree, over the top, finished well through deep stretch.
TENTH: Fight Night and Accabonac Harbor fought it out fetlock to fetlock with the latter prevailing from the outside. Several stride beyond the wire, ‘Harbor’ fell, unseating Javier Castellano, lucky to walk away. No word on the maiden at this posting.
Author Recent Posts
⚠ Before you comment
Our staff likes nothing better than to engage with the HRI Faithful and provide a forum for interaction on horseracing and sports. In that spirit, please be kind and reasonable; keep the language clean, and the tone civil. Comments from those who cannot comply will be deleted. Thank you.
2 Responses
Thanks for asking Harry, but with the 2.0 version of HorseRaceInsider about two weeks old, the focus has shifted to populating the site with more daily news stories of interest to a wider audience. Consequently, there aren’t enough hours in the day. A daily diary would require many hours of race watching; and I don’t actually arrive in Saratoga until Wednesday. But, again, glad that someone thought enough to ask. |
The chief for the European Union’s foreign policy, Federica Mogherini, has cancelled her official visit to Jerusalem, was scheduled for May 10.
According to The Times of Israel, Mogherini was set to visit Jerusalem to take part in the American Jewish Committee’s Annual Global Forum conference – a pro-Israeli non-governmental organisation – on May 11.
According to Israeli news sources quoted in Middle East Monitor, “Mogherini cancelled her trip to Israel after Israeli Prime Minister Netanyahu declined to meet her.”
Later, in a statement to Israeli Hebrew-language news outlets, Prime Minister Netanyahu and his office stated that they could not meet the EU leader as they claimed they had 'scheduling problems’.
The European Union said that Mogherini’s visit was initially only planned for Jordan, however the possibility of arriving to the conference in Jerusalem was considered after the official invitation to attend the opening of US embassy in Jerusalem.
This news comes as Mogherini has been criticised by Netanyahu and his office. In fact, as stated in Haaretz news, diplomatic sources specified that “her position towards Israel is very hostile,” and was the reason why Netanyahu cancelled his meeting the first stance.
The Foreign Policy chief has taken a stand and publicly criticised Israel’s response to the Great Return March’s peaceful demonstrations in Gaza. She has also rejected the US decision to transfer their embassy from Tel Aviv to Jerusalem and warned about the repercussions this decision would have.
Israel has urged the EU to stop funding more than a dozen European and Palestinian NGOs pro-BDS groups across Europe.
In light of the revolving events, EU’s position towards the Palestinian-Israeli conflict has always been indecisive. The EU has failed to hold Israel accountable for breaches of International law and the Geneva Convention.
However, an EU press release updated on February 2018 stated that “the Commission had approved to advance 15 million Euros to support the Palestinian Authority central budget. These actions demonstrate the Commission’s commitment to supporting the Palestinian Authority during a period of financial and economic crisis.”
As Wafa News stated on June 11, “The EU's support to the Palestinian Authority cash transfer program is a commitment to the welfare of vulnerable families in the West Bank and Gaza.”
The cancelled meeting with Netanyahu arrives a week before the UN General Assembly’s emergency meeting on protecting Palestinians. This was announced by the body’s president, Miroslav Lajcak on June 8. The meeting will discuss the Israeli aggression over the Gaza Strip.
It will vote on an Arab-backed resolution on Gaza. The resolution will be similar to the one vetoed by the US in the Security Council on June 1. The vetoed resolution was calling for the protection of Palestinians during their peaceful Great Return March. Though, the resolutions voted by the General Assembly are not legally binding, in difference with the ones voted in the Security Council.
In line of the international community, the EU leaders have expressed concern, however, have failed to take concrete steps to hold Israel accountable for its crimes. |
It has previously been proposed to provide an exterior building siding of laminate construction wherein a wood core is coated with a protective layer of a colored synthetic plastic material such as polyvinyl chloride. It has also been proposed to provide a building siding in which a thin synthetic plastic sheet is bonded to the outer surface of a rigid foam plastic layer which in turn is bonded to the outer surface of the core panel. Patents of this character are part of the following list of prior art patents which I incorporate by reference herein.
U.S. Pat. No. 2,277,752 Frey PA1 U.S. Pat. No. 3,350,257 Hourigan et al PA1 U.S. Pat. No. 3,408,786 Snyker PA1 U.S. Pat. No. 3,866,378 Kessler PA1 U.S. Pat. No. 4,146,662 Eggers et al PA1 U.S. Pat. No. 4,478,415 Shaffer et al PA1 U.S. Pat. No. 4,788,808 Slocum
In these prior art patents, the plastic outer faces have been either applied in the form of a coating or bonded film which was not, first of all, molded to the configuration of the core. To my knowledge, no one has successfully commercially formed such a product by molding a sheet or film of synthetic plastic to the precise shape of the core, utilizing the core as the mold surface, and differential pressure drawing the plastic sheet to the core with such definition that the grain of the board is defined in the plastic outer covering. |
/**
* Copyright 2010 - 2020 JetBrains s.r.o.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package jetbrains.exodus.core.dataStructures;
import jetbrains.exodus.core.execution.SharedTimer;
import org.jetbrains.annotations.NotNull;
import static jetbrains.exodus.core.dataStructures.ConcurrentLongObjectCache.DEFAULT_NUMBER_OF_GENERATIONS;
public class SoftConcurrentLongObjectCache<V> extends SoftLongObjectCacheBase<V> {
private final int generationCount;
public SoftConcurrentLongObjectCache(final int cacheSize) {
this(cacheSize, DEFAULT_NUMBER_OF_GENERATIONS);
}
public SoftConcurrentLongObjectCache(final int cacheSize, final int generationCount) {
super(cacheSize);
this.generationCount = generationCount;
}
@NotNull
@Override
protected ConcurrentLongObjectCache<V> newChunk(final int chunkSize) {
return new ConcurrentLongObjectCache<V>(chunkSize, generationCount) {
@Override
protected SharedTimer.ExpirablePeriodicTask getCacheAdjuster() {
return null;
}
};
}
}
|
DID you know children are more likely to be harmed by their biological mother than father? Neither did I until very recently. But why am I surprised — and why will you be shocked? Because we don’t talk about it.
No one wants to talk about it. Society is totally in denial that women aren’t always victims.
We have all been conditioned to believe the majority of people who commit abuse are men — but it’s not true.
There are good women and bad women. Children are far more likely to suffer neglect or abuse at the hands of their mothers.
It’s so important that we all put aside our preconceptions and look at the facts, even though they’re uncomfortable.
Statistics show a different story from the one we are accustomed to
Data from Child Protective Services in the US, mirrors the pattern around the world. Of children who become victims of maltreatment, the huge majority of perpetrators of the crimes are the biological parents (not adopted or foster parents, as you might think).
The Child Family Community Australia reports, “A British retrospective prevalence study of 2669 young adults aged 18-24 (May-Chahal & Cawson, 2005) found that mothers were more likely than fathers to be responsible for physical abuse 49 per cent of incidents compared to 40 per cent).”
Other sites that are trying to raise awareness in this area will bombard you with statistics. Breaking the silence, for instance, says 71 per cent of children killed by one parent are killed by their mothers, 60 per cent of those victims are boys.
Shocking child abuse statistics Shocking child abuse statistics
A report by Australian Institute of Family Studies released in October 2016 found, “boys were more likely to be the subjects of a substantiation of physical abuse, neglect or emotional abuse than girls.”
DHHS data in the UK shows that of children abused by one parent between 2001 and 2006, 70.6 per cent were abused by their mothers, 29.4 per cent were abused by their fathers.
You don’t have to drown in statistics to see reality. You only have to read news headlines that, sadly, are all around us.
The truth about violence is that it has more connection to morality than gender. And, not all women are natural caretakers.
Women who abuse children are criminals.
This is a million miles away from the Mrs Robinson stereotype. It is not more OK that female teachers have sex with their students than vice versa.
On Sunday, it was reported that an Australian mother pleaded guilty to 26 offences including sexually assaulting three of her own children. She’ll be in Newcastle District Court this week for sentencing.
Heartbreaking doesn’t even come close to the horrors these poor children have seen.
There are so many gruesome stories, why are we still in denial? Ultimately, it’s children who continue to suffer.
Why is society not being honest about abuse and violence?
Isn’t it all of our responsibility to help to protect children?
Doesn’t that start with acknowledging the truth?
Author and psychologist Meredith Fuller says, “There is a societal idea that it’s easy to have children, you should be able to cope and feel blessed. Abusive mothers are a very real problem and we have to start talking about it to be able to help. We have no language around it. We have made it completely impossible for a mother to say, ‘I feel violent. I want to harm my child. I’m overwhelmed and I don’t know what to do.’ Mothers lash out because they’re frustrated, angry and feel despair. They want the noise to stop, the pain to stop and they don’t know what to do. We are in denial and it’s harming children.
“We’ve created a culture where children can stand with their hands on their hips and say to their parent, ‘You’re not allowed to touch me. You can’t hit me.’ Parents feel powerless. They can’t cope and we see the result of that, but we’re not willing to talk about what we can do to help before it gets to breaking point.”
This article originally appeared on Kidspot and has been republished with permission.
* If this article has raised concerns or you need support, you can call Kids Helpline 1800 55 1800, Lifeline 131 114, 1800 RESPECT (1800 737 732). All are 24/7 helplines. |
+ 34*k + 38 = 69*k + 6*w for k.
4
Solve 2*y = 6764*m - 6761*m + 5, 2*m + 8*y = -22 for m.
-3
Solve -2*p - 3257*v + 3255*v = 110, 0 = -11*p - 3*v - 629 for p.
-58
Solve -l - 18 = -3*q, -2*q - 5*l + 103 = -2*l + 168 for q.
-1
Solve 8 = -4*k, 20*k + 7378 = -5*y + 7313 for y.
-5
Solve d - 2 = -0*d - 17*q + 13*q, -12*d + 70*q + 24 = 2*q for d.
2
Solve 2*c = 5*z - 142, 3*z = 4*c - 56517 + 56605 for z.
28
Solve 4*m - 247*b - 248*b + 10 = -497*b, b = 1 for m.
-3
Solve -4*y + 3*y + 1536*t - 8 = 1537*t, -4*t - 27 = -y for y.
-1
Solve 2*r = -4*g + 2 - 36, 47 = -8*g - r for g.
-5
Solve -9*u - 7 = -52, 11*o = 9*o + 4*u - 24 for o.
-2
Solve -5*o = 5*j - 194 + 94, -3*j + 130 = 11*o + 2*j for o.
5
Solve 3*l - 3*h = -2*h + 16, -3*h - 78 = 2*l - 107 for l.
7
Solve 97*x + 93*x - 4*q + 17 = 191*x, q = -16*x + 587 for x.
37
Solve l + 27 = 4*h, 2*h + 3*l - 3528 + 1922 + 1743 = 0 for h.
-4
Solve -14*g - 14 = -35*g + 20*g + 4*j, 2*g = 4*j + 20 for g.
6
Solve -2*t + 8*y - 9*y = -11, -10*t - 1913*y + 47 = -1916*y for t.
5
Solve 7*p + 23 - 188 = 3*u, -73 = -u + 6*u - 4*p + 18 for u.
1
Solve 0 = -8*k - g + 18, 497*k = 498*k + 2*g - 6 for k.
2
Solve 164060*v = 164062*v - 7*y - 107, 3*v = -y - 12 for v.
1
Solve 4*j + 122*z + 16 = 61*z + 64*z, 6*j + 24 = -0*j - 2*z for j.
-4
Solve -76 = j + q, 15*q - 169 = -76658*j + 76660*j for j.
-77
Solve 7*v = 5*q - 33, 5*q - 9 = 10*v - 6 + 28 + 14 for q.
1
Solve 0 = -4*h - p - 15, 11*h + 8*p + 10 + 0 = 5*p - 18 - 15 for h.
-2
Solve 2*n + 7*z - 36 = 0, 5*z = 4*n + 8*n - 13*n + 21 for n.
11
Solve -32 = -x - 544*m + 549*m, -9*x + 206 = -4*m for x.
22
Solve -5*k - r + 44 = 0, -2*k + 60041 = 4*r + 60027 for k.
9
Solve f - 93 = 18*v - 2*f, 2*v + 0*v - 3*v - 2*f - 16 = 0 for v.
-6
Solve 4*m = 20, p - 104*m + 202*m + 11 + 15 = 99*m for p.
-21
Solve -3*h = -5*u + 31, 5*u - 320*h - 696 = -222*h for u.
2
Solve -4*f + 2*i = -28, 15 = 3*f - 17047*i + 17046*i for f.
1
Solve -2*q - 16 = 19*x - 43, -2813*x + 3*q = -2817*x - 33 for x.
3
Solve 0 = -4*a + 2*b - 170 + 214, 41*b + 76 = 5*a + 37*b for a.
4
Solve 6*t = -60, -2359*u + 43 = -2346*u - 3*t for u.
1
Solve 24 = -4*k, t = 5*k - 116015 + 116045 for t.
0
Solve t = -409*c + 412*c - 16, -3*c - t = -2*c - 4 for c.
5
Solve -12981*b - 2*n + 31 = -12966*b, -16 = -2*n for b.
1
Solve -z = 4*f - 67, 4*f + 1619*z = 1620*z - 83 for f.
-2
Solve 0 = -2*g + v - 15, -3*g + 1198*v + 9 = 1200*v for g.
-3
Solve 40*u = 44*u + h + 9, 202*u - 201*u + 3*h - 6 = 0 for u.
-3
Solve 0 = -2*l - 4*y + 20, 2*l - 5 = 22594*y - 22595*y + 9 for l.
6
Solve 0 = -3*z + 2*x + 12, 0 = -3*z + 6169*x - 6173*x - 6 for z.
2
Solve 169*p = 89*d + 171*p + 229, d + 3*d - p = p - 50 for d.
-3
Solve -2*n + 5*g = -27, -43*n + 20*n + 17*n + 3*g = -13 - 8 for n.
1
Solve -3 = -3*f, 7*l - 97*f - 92*f - 373 = -2*l - 193*f for l.
41
Solve 1052*k + 7*u + 23 = 1057*k, 5*u = -4*k - 24 for k.
-1
Solve 2*d - 118 = -222806*m + 222810*m - 444, -2*d = 114*m - 9468 for m.
83
Solve 5*p = -2*t - 12 - 3, 535707*p = 535703*p + 2*t + 6 for p.
-1
Solve 213*n - 26 = -1420*d + 1419*d + 209*n, -5*d + 5*n + 30 = 0 for d.
10
Solve 29 = -35*f - 6, -3*f + 43 = -3*d + 28 for d.
-6
Solve 82*j - 192 = 27*h - 20*h, 4*j + 5*h + 3 + 9 = 0 for j.
2
Solve 808 = -l - 3*z + 866, -z - 306 = -5*l for l.
61
Solve 3*h = -x + 47, -5*h = -x - 2095 + 2030 for x.
5
Solve 4*m + 87 = 29*v - m + 169, 2*m + 2 = 0 for v.
-3
Solve -172 = -5*k + 2*m, -134831*m + 56 = k - 134826*m for k.
36
Solve -4*l - 24 = 6*v, -6 = -29377*l + 29378*l + 2*v for l.
-6
Solve 2*j - 1208*k = -2*j - 1192*k + 88, 3*j + 11 = -k - 1 for j.
-2
Solve 37*k - 5 = c, 54*c - 15 = -4*k + 57*c for k.
0
Solve 35*s + 3*q = -31*s + 71*s + 230, -69 = s + 4*q for s.
-49
Solve 2*n = 29213*m - 29212*m - 2, 0 = n - 5*n - 4 for m.
0
Solve -4*w - 76 = -16416*r + 16413*r, -24 = -2*r + w for r.
4
Solve 75*h = -50*i + 47*i + 38*h - 694, -5 + 36 = -5*i - 4*h - 30 for i.
3
Solve 0 = 2887*m - 2883*m + 3*q + 377, -2*q = m + 93 for m.
-95
Solve -4*q + 9402*g = 9409*g + 35, 4*g = -4 for q.
-7
Solve 5*n + 12*n - 27 = 3*n + 5*n, -4*n - 10 = -2*b for b.
11
Solve -5*p = t - 23, 128*p - 307 = 133*p - 9*t for p.
-2
Solve 3 = 3*p + 3*h, -34 = 13*p - 15*p + h - 11*h for p.
-3
Solve -2*l + 3*u = -11, -2*l - 349 = -7*u - 380 for l.
-2
Solve 4*k + 64 = 0, -2*k - 406789 + 406781 = 6*w for w.
4
Solve 34 = -20*v + 21*v + 6*y - 9*y, 0 = -v + 4*y + 44 for v.
4
Solve -3*o + 6186 = 4*n + 6201, 2*n = -4*o for o.
3
Solve -t - 824*z + 4 - 4 = -821*z, -4*t - z = -3*z for t.
0
Solve -5*l - 87 = 18*q + 23, 4*q + 1242 = 4*l + 1238 for l.
-4
Solve -2*c + 44 = r + 4, c - 583 = -19*r - 8 for r.
30
Solve 5*w + 3794 = -2*h + 3732, -h = -4*w + 18 for h.
-26
Solve -323 = 19*s, -2*c - 188579*s = -188584*s - 85 for c.
0
Solve -8520 = 4*p + i - 8566, -69*p + 2*i = -755 for p.
11
Solve 3*f + 7 = 3*d - 104, 21*d = 2*f + 74 for d.
0
Solve 4*n = -41*c + 38*c - 39 - 4, 0 = -5*n + 2*c + 67 for n.
5
Solve -4153*d - 6 = 3*z - 4156*d, 4*d = 3*z + 11 for z.
3
Solve 2*u = -2, 7*c + 5*u = -30964 + 30945 for c.
-2
Solve 3*k = -v + 97, 359322*v - 2*k + 46 = 359318*v for v.
4
Solve -2*z + 3*z + 11 = -2*w + 26, -z = z - 2*w for z.
5
Solve -16*f = -35*f + 8*f + 13*f - 3*x - 12, -x - 4 = -4*f for f.
0
Solve -13 = 3*z - x, -212522*x + 212527*x + 10 = 0 for z.
-5
Solve -4*c + 92 = 0, -h = -12957992*c + 12957997*c - 112 for h.
-3
Solve r - 40*v - 359 = -3*r + 77*v, 12*v - 16*v - 15 + 3 = 0 for r.
2
Solve 109 = d - 27*o, 2*d + 6406 = -4*o + 6392 for d.
1
Solve y + 4 = 5*u + 8, 19*u = 23*u + 17*y + 21 for u.
-1
Solve -r + 31*p = 67*p - 35*p + 19, 114*r = -p - 1714 for r.
-15
Solve 5*f + 7*q = -73, -138*f - 3*q = -128*f - 8 for f.
5
Solve 13*r = -56*c + 53*c + 15, 22*r = -c + 24*r - 14 for c.
-8
Solve -h = -4*o - 17 + 29, -5*h = 682*o - 10*h - 1384 for o.
2
Solve -v = 13*c + 132, -18 = -323*c + 325*c - v for c.
-10
Solve 4*q + 18 = -8*v - 198, 0 = 4*v - 8*q + 88 for v.
-26
Solve -78 = -2*q - q - 3*u, -75*q = 59*q - 130*q - u - 84 for q.
22
Solve 4*f + 3*m = 17, -15*m + 58 - 8 = -3*f - 127 for f.
-4
Solve 6 = -2*z - 19*b - 8*b + 58, 4*b = 5*z - 14 + 27 for z.
-1
Solve 0 = 9694*z - 9688*z - 4*p + 68, 4*z + z - 35 = -5*p for z.
-4
Solve 11537*k + 10 = 11536*k + w - 2, k - 3*w = -14 for k.
-11
Solve 84 = 4*d + 8*w, -53619*d + 3*w + 189 = -53610*d for d.
21
Solve 0 = 17*q + 3*u - 100, 30 = 1316*q - 1315*q + 5*u for q.
5
Solve -26*g + 29*g = -3*q - 42, 3*q - 4*q - 30 = 2*q for g.
-4
Solve -m = 3*a + 17, 320 = 13*a + 3*m + 387 for a.
-4
Solve -16*v + 12*v - 68 = 4*h, 2*h + 28 = 41*v - 40*v for h.
-15
Solve -5*u = 23087*i - 23092*i - 140, -100 = -3*u - i for u.
32
Solve -32*a + 36*a - 36 = f - 9*f, 2*f - 2*a + 1 = -35 for f.
-3
Solve 3*r + 4*d - 19 = -67, -8*r - 7*d - 39 = 100 for r.
-20
Solve 380 = 5*g + 2*j, -34132*g - 5928 = -34210*g + 5*j for g.
76
Solve 0 = -212*g - 2*l - 55 - 165, 5*g - l + 0*l = 3*g + 2 for g.
-1
Solve 2*q - 36 = -q - 6*q, -q = -5*y - 5*q + 16 for y.
0
Solve -4*y = 7*j - 244 + 155, -22*y = -19*y - 3*j - 108 for y.
31
Solve 17*d + 13330 = -2*g + 13389, 0 = 3*g - 4*d for g.
4
Solve 3*g = 47*q + 82 + 115, 0*g = -4*q + 2*g + 24 - 46 for q.
-4
Solve 202578 = -4*b + 202530, 45 = -3*w - 5*b for w.
5
Solve 0 = -5*q + 15, 22*b + 4 = -2*q + 11 - 1 for b.
0
Solve 12 = 8*b - 3*r + 1 + 54, -2*b - 3*r + 83 = 0 for b.
4
Solve g - 3*m - 109 = -4*g - 88, 4*g - m = 7 for g.
0
Solve 10*q - 20*q - 9 = -12*q + d, 4*q = 11*d + 171 for q.
-4
Solve -a = 6*h - 20, 3166769 - 3166753 = 8*h - 4*a for h.
3
Solve 11*j - 4*g - 172 = 0, 4633*j - 4631*j + 4*g + 172 = 0 for j.
0
Solve 7*f = 9980*s - 9976*s - 116, 3*f + 3*s = 54 for f.
-4
Solve 0 = -2*d + 4*i + 152, 133 = 1936*d - 1933*d + 13*i for d.
66
Solve -4359*z + 13092*z - 4362*z + a + 62 = 4360*z, 2*a + 4 = 2*z for z.
-5
Solve 0 = 14*t + 2*l - 184, -3*t + 2*l + 117369 - 117332 = 0 for t.
13
Solve 7*c = 133 - 0, -44344*n = -44349*n + 4*c - 66 for n.
2
Solve -2*d = -3*i - 27, 5*i + 317*d - 31 = 314*d for i.
-1
Solve 5*h = -b - 174706 + 174766, 2*h - 3*h - 48 = -5*h for b.
0
Solve 0*t + 0*t - z - 64 = 0, 4*t - 590 + 266 = 5*z for t.
1
Solve -477*u = -6*i - 465*u - 96, 0 = -i - 2*u for i.
-8
Solve -5*q = -4*t - 10, -t - 30710*q + 6 = -30707*q for t.
0
Solve 6*f + 33 = i + 82, -3*f + 26 = 19*i + 5*i - 26*i for f.
8
Solve 0 = 20*p + 20, 0 = -92*j - 93*j + 180*j - 4*p - |
<?xml version="1.0" encoding="utf-8"?>
<Package
xmlns="http://schemas.microsoft.com/appx/manifest/foundation/windows10"
xmlns:mp="http://schemas.microsoft.com/appx/2014/phone/manifest"
xmlns:uap="http://schemas.microsoft.com/appx/manifest/uap/windows10"
IgnorableNamespaces="uap mp">
<Identity
Name="b546a79f-792b-4d7a-9ffa-4fd36108bd42"
Publisher="CN=Fela"
Version="1.0.0.0" />
<mp:PhoneIdentity PhoneProductId="b546a79f-792b-4d7a-9ffa-4fd36108bd42" PhonePublisherId="00000000-0000-0000-0000-000000000000"/>
<Properties>
<DisplayName>Demo</DisplayName>
<PublisherDisplayName>Fela</PublisherDisplayName>
<Logo>Assets\StoreLogo.png</Logo>
</Properties>
<Dependencies>
<TargetDeviceFamily Name="Windows.Universal" MinVersion="10.0.0.0" MaxVersionTested="10.0.0.0" />
</Dependencies>
<Resources>
<Resource Language="x-generate"/>
</Resources>
<Applications>
<Application Id="App"
Executable="$targetnametoken$.exe"
EntryPoint="Demo.App">
<uap:VisualElements
DisplayName="Demo"
Square150x150Logo="Assets\Square150x150Logo.png"
Square44x44Logo="Assets\Square44x44Logo.png"
Description="Demo"
BackgroundColor="transparent">
<uap:DefaultTile Wide310x150Logo="Assets\Wide310x150Logo.png"/>
<uap:SplashScreen Image="Assets\SplashScreen.png" />
</uap:VisualElements>
</Application>
</Applications>
<Capabilities>
<Capability Name="internetClient" />
</Capabilities>
</Package> |
Q:
Determining if a list numbers are sequential
I'm working in Java. I have an unordered list of 5 numbers ranging from 0-100 with no repeats. I'd like to detect if 3 of the numbers are sequential with no gap.
Examples:
[9,12,13,11,10] true
[17,1,2,3,5] true
[19,22,23,27,55] false
As for what I've tried, nothing yet. If I were to write it now, I would probably go with the most naive approach of ordering the numbers, then iteratively checking if a sequence exists.
A:
int sequenceMin(int[] set) {
int[] arr = Arrays.copy(set);
Arrays.sort(arr);
for (int i = 0; i < arr.length - 3 + 1; ++i) {
if (arr[i] == arr[i + 2] - 2) {
return arr[i];
}
}
return -1;
}
This sorts the array and looks for the desired sequence using the if-statement above, returning the first value.
Without sorting:
(@Pace mentioned the wish for non-sorting.) A limited range can use an efficient "boolean array", BitSet. The iteration with nextSetBit is fast.
int[] arr = {9,12,13,11,10};
BitSet numbers = new BitSet(101);
for (int no : arr) {
numbers.set(no);
}
int sequenceCount = 0;
int last = -10;
for (int i = numbers.nextSetBit(0); i >= 0; i = numbers.nextSetBit(i+1)) {
if (sequenceCount == 0 || i - last > 1) {
sequenceCount = 1;
} else {
sequenceCount++;
if (sequenceCount >= 3) {
System.out.println("Sequence start: " + (last - 1));
break;
}
}
last = i;
}
System.out.println("Done");
A:
Very naive (but faster) algorithm : (your array is input[], assuming it only contains 0-100 numbers as you said)
int[] nums=new int[101];
for(i=0;i<N;i++)
{
int a=input[i];
nums[a]++;
if (a>0) { nums[a-1]++; }
if (a<100) { nums[a+1]++; }
}
Then look if there is an element of nums[]==3.
Could be faster with some HashMap instead of the array (and removes the 0-100 limitation)
Edit : Alas, this does NOT work if two numbers could be equal in the initial sequence
A:
This code seems to be implementing your requirements:
public class OrderdedList {
public static void main(String[] args) {
System.out.println(orderedWithNoGap(Arrays.asList(9, 12, 13, 11, 10))); // true
System.out.println(orderedWithNoGap(Arrays.asList(17,1,2,3,5))); // true
System.out.println(orderedWithNoGap(Arrays.asList(19,22,23,27,55))); // false
}
private static boolean orderedWithNoGap(List<Integer> list) {
Collections.sort(list);
Integer prev = null;
int seq = 0;
for(Integer i : list) {
if(prev != null && prev+1 == i)
seq = seq == 0 ? 2 : seq+1;
prev = i;
}
return seq >= 3;
}
}
|
Sao Paulo has authentic air
SAO PAULO -- Even for a first-timer, travelling to South America's biggest city evokes a certain deja vu.
Sao Paulo, the heart of big business in South America, can come across like Toronto -- a serious, hurried place where everyone is running late.
Tourists, some say, are better to visit Rio de Janeiro -- more of a party-happy South American version of Vancouver.
Business truly is what Sao Paulo is all about. Around its financial district, office and hotel towers stretch across the horizon, creating first impressions of Sao Paulo's economic might and of a concrete jungle.
There's truth to both. But no city could grow this big (18 million, metro area) or old (454 years since its founding as a village) without having more than commerce going for it.
Sao Paulo's charm is, oddly for one of the world's biggest cities, its Brazilian sense of isolation and independence. Tourists seem to find themselves in the city by accident, not because of a well-funded promotional machine.
As a result, the city doesn't make it easy to visit. Many attractions are closed on certain days of the week, or mornings. Few staff at attractions or in malls speak English.
On the other hand, Sao Paulo has an air of authenticity. You won't find tacky souvenir stands here. Paulistanos suggest visitors take their city or leave it for what it is.
What it is, is a multicultural blend of history, art and, in pockets, nature.
MASP, the city's best-known art gallery, is found in the heart of the financial district on Paulista Avenue. Architecturally, it's designed like a warehouse on stilts. The collection is impressive -- from Brazilian artists to French and Italian and several Picasso pieces. And at 15 reais (about $10) to enter, it's a great place to beat the rain.
Across the street is Trianon Park -- a two-city-block breath of fresh air inside the gridlock. It was created a century ago as a showpiece for indigenous vegetation. New trees were planted as part of a major renovation in 1968. In the heart of the forest, only the dim sounds of traffic remind visitors they're in a megalopolis.
The real gem of Sao Paulo is the one guidebooks warn travellers about. Centro, the city's old downtown, is where the city shows its real character. Block after block of 80- to 100-year-old buildings tell a story of Sao Paulo's swagger in the early 20th century, when it asserted itself as South America's commerce hub. Be warned, though, that parts of Centro are seedy and abundant with thieves.
One skyscraper, the white Banespa building, is striking for its smaller-scale similarity to the Empire State Building, after which it was modeled in 1947. It's free to take the two elevators and short flight of stairs to the top for the best view of the city.
The Theatro Municipal in Centro is probably the best architecture in the city. Modeled after the Paris Opera, it's adorned garishly in gold trim, sculptures, busts and friezes, both outside and inside. You can't get inside without a ticket, but some events are cheap and undersold.
A ticket to hear Sao Paulo's orchestra -- or just to check out the interior of Theatro Municipal -- costs a paltry 15 reais, or about $10. Sao Paulo isn't a cheap city to visit -- but some of the best sights are ridiculously inexpensive.
Sao Paulo's rejuvenation of Centro is a work in progress. Carefully restored banks and residences can be found next to graffiti-covered lowrises without windows.
The Sao Paulo State art gallery, called Pinacoteca do Estado, is one such strange juxtaposition. On Centro's rough northern edge, the 103-year-old brick building was restored a decade ago. The centre of the three-storey gallery is lit naturally through a wide atrium that gives a different aspect to strategically placed sculptures depending on the time of day you visit.
The gallery, which costs only about $3 to enter, has both a collection of Brazil's best painters as well as temporary exhibitions. As with MASP, art and nature co-exist at Pinacoteca. The neighbourhood is dingy, but for beautiful Luz Park. Fountains, streams of large brightly coloured fish and a canopy of subtropical trees complement the gallery next door.
Central Sao Paulo's largest park, Ibirapuera, fashions itself after New York's Central Park. Art museums, a Japanese pavilion and garden, monuments, an Afro-Brazil museum and planetarium are located among woodlands and along a lake. The park's attractions, however, are closed Mondays.
Brazil's growing economic strength has caused its real gain against the Canadian dollar. However the loonie is still worth about $1.70 here, giving Canadian travellers a steep discount.
IF YOU GO
- Learn some Portuguese. Unlike most of South America, Spanish isn't spoken here. In most malls and restaurants, English isn't either.
- Stick to taxis and the subway to get around. Taxis are cheap, but drivers generally speak no English. The subway is safe during daylight, but doesn't cover much of the city. Sao Paulo's streets are a tangle of winding avenues that change names. They're best left to the experts.
- Try the local cuisine. Check out a churrascaria, which is a barbecued meat binge. Waiters bring you dozen different cuts of meat in procession to your table -- unless you wave them off. Street vendors sell a pastry called pastel, which is a pocket of beef, cheese or vegetables.
- Leave the clubs at home. In a city of 18 million, Sao Paulo has few golf courses.
- Expect unexpected weather. Southern Brazil's hills and proximity to the Atlantic Ocean result in the weather changing suddenly from heat to downpour and back to heat again. Southern Brazil's temperatures can hit freezing, however, during its winter months of July and August.
Almost Done!
Postmedia wants to improve your reading experience as well as share the best deals and promotions from our advertisers with you. The information below will be used to optimize the content and make ads across the network more relevant to you. You can always change the information you share with us by editing your profile.
By clicking "Create Account", I hearby grant permission to Postmedia to use my account information to create my account.
I also accept and agree to be bound by Postmedia's Terms and Conditions with respect to my use of the Site and I have read and understand Postmedia's Privacy Statement. I consent to the collection, use, maintenance, and disclosure of my information in accordance with the Postmedia's Privacy Policy.
Postmedia wants to improve your reading experience as well as share the best deals and promotions from our advertisers with you. The information below will be used to optimize the content and make ads across the network more relevant to you. You can always change the information you share with us by editing your profile.
By clicking "Create Account", I hearby grant permission to Postmedia to use my account information to create my account.
I also accept and agree to be bound by Postmedia's Terms and Conditions with respect to my use of the Site and I have read and understand Postmedia's Privacy Statement. I consent to the collection, use, maintenance, and disclosure of my information in accordance with the Postmedia's Privacy Policy. |
Todd Bradley is HP's executive VP in charge of personal systems and printers. As such, it's his job to be excited about the future of PCs, but he's gone further in a recent interview with PC World in dismissing the claim that we're living in a post-PC era as "just wrong." Citing the broad need for computers in everything we do, Bradley argues that the global PC market remains as large and buoyant as ever. He does acknowledge the increasing importance of tablets, a market that HP aims to lead from the front the way it does with Windows PCs laptops and desktops today, but he's ultimately unimpressed by the idea that portable devices are taking over from the more traditional machines.
Though these comments from Bradley convey a sense of resolute confidence, they do clash with previous bold statements he's made, most notably back in January of last year when he promised an extensive and interconnected ecosystem of webOS devices. That plan didn't pan out for HP, which has since retrenched to more familiar markets, but now CEO Meg Whitman is keen to reboot the company's efforts on the mobile computing front. It may still be debatable whether we've quite evolved into the a post-PC age (and now that Microsoft is bringing WIndows to ARM tablets, what does that even mean?), but the future does seem to be headed that way. |
Although some resistance to austerity has been seen in Ireland, as illustrated by the graffiti in this image, Watson and Vine praised Ireland's "admirable social resilience".
Although some resistance to austerity has been seen in Ireland, as illustrated by the graffiti in this image, Watson and Vine praised Ireland's "admirable social resilience".
IRELAND COULD BE the eurozone’s trump card for its debt strategy.
That is according to two economists writing in the Financial Times this week. David Vines and Max Watson, a professor of economics and a fellow at Oxford University, said yesterday that Ireland is on the way to an “unexpected economic comeback”.
The academics noted that markets and ratings agencies could have made a “major error” in their assessment of Ireland’s public debt.
Pointing to changes in macroeconomic fundamentals that are helping Ireland return to growth, Vines and Watson said they provide “the most important defence there can be against all forms of shock”.
They also said that borrowers could “relearn to love” Ireland because it is fully funded until 2014.
The Oxford academics concluded, “An Irish success story of the kind we think is underway will come to be seen as a precious and crucial trump card for the eurozone debt strategy.”
The business group IBEC welcomed the article this morning and said it also remained upbeat on the Irish economy.
Speaking on RTÉ Radio, IBEC President Danny McCoy agreed that Ireland is trading its way to recovery and that the measures implemented by the Irish Government are paying off.
He said that Ireland is not heading towards a double-dip recession despite global market turmoil. Agreeing with Vine and Watson’s assessment of the economy, McCoy said that the country is regaining its competitiveness.
He also noted that Ireland is going to record positive growth in 2011 for the first time in four years.
According to McCoy, what is needed now is more ambition. There should be no more austerity beyond the €3.6 billion already planned by the Government. |
More generally, a unary language $\{0^s : s \in S\}$ is regular if and only if there exist $N,M$ such that $n \in S$ iff $n+M \in S$ for all $n \geq N$. There are many ways to show it, the most elementary being that a graph of unary DFA consists of a path leading to a cycle. This result implies yours. |
var nomnom = require("../nomnom");
var parser = nomnom()
.option("addr", {
abbr: "a",
help: "host:port address",
transform: function(value) {
var parts = value.split(":");
return {host: parts[0], port: Number(parts[1])};
}
})
.option("string", {
abbr: "s",
help: "always a string",
transform: function(value) {
return value.toString();
}
});
exports.testTransformComplexValue = function(test) {
var opts = parser.parse(["-a", "localhost:1234"]);
test.strictEqual(opts.addr.host, "localhost");
test.strictEqual(opts.addr.port, 1234);
test.done();
};
exports.testTransformString = function(test) {
var opts = parser.parse(["-s", "3"]);
test.strictEqual(opts.string, "3");
test.done();
};
exports.testTransformCommand = function(test) {
test.expect(1);
var parser = nomnom().scriptName("test")
.options({
addr: {
transform: function(value) {
var parts = value.split(":");
return {host: parts[0], port: Number(parts[1])};
}
}
});
parser.command("run")
.options({
string: {
transform: function(value) {
return value.toString();
}
}
})
.callback(function(options) {
test.strictEqual(options.string, "true");
});
parser.parse(["run", "--string=true"]);
test.done();
};
|
1. Field of the Invention
The invention relates to a method for housing sensors in a package and, in particular, housing chemical sensors, flow sensors or optical sensors in a synthetic package.
2. Prior Art
Chemical sensors, like flow sensors or optical sensors, may be manufactured already in an integrated form in a cost-effective manner and at a high precision by conventional chip manufacturing processes. However, such IC sensors or chip sensors subsequently had to be incorporated in a package, which involved cumbersome assembly work, whereby the package, as a rule, was either screwed or glued and the connections to the sensors had to be led out of the package in a suitable manner. This applied not only to the electrical connections, but, in the case of chemical sensors, flow rate sensors or optical sensors, naturally also to line connections or optical fiber connections, which called for appropriate additional adaptation work of the packages. Thus, in the production of such sensors, incorporation in a package constituted a cost-determining factor for mass production.
The invention aims to provide a method of the initially defined kind, by which the assembly work involved can be substantially reduced and the necessary connections can, at the same time, be provided in a cost-effective manner by a few method steps. To solve this object, the method according to the invention essentially consists in that, in a first method step, the active sensor surface of a semiconductor or IC sensor is provided with a cap forming a hollow space above the active sensor surface and the sensor is connected with contacts and bond wires, that, after this, the package is formed by molding, in particular injection molding, and that, in a third method step or simultaneously with the second method step, the hollow space formed above the active sensor surface is opened. In principle, chip molding with a suitable molding compound is known for many electronic components. Yet, none of the known methods is suitable for sensors which require to be in contact with the atmosphere, since after molding the sensor will no longer be accessible without cumbersome aftertreatment and the risk of damage to the sensor cannot be excluded in case of subsequent adaptation work. Due to the fact that, according to the invention, the active sensor surface of a semiconductor or IC sensor is provided with a cap forming a hollow space above the active sensor surface in a fist method step, the respective active sensor surface is kept free of the molding compound to be applied subsequently. The provision of bond wires as is common in chip manufacturing may be accomplished in a simple manner by conventional means, wherein, by a subsequent molding procedure, in particular an injection molding procedure, a finished component already comprising all electrical contacts is immediately provided. Thus, it merely has to be safeguarded that the active sensor surface in a suitable manner will again be in contact with the environment, to which end the hollow space is mechanically opened either during the second method step simultaneously with the casting-on or molding of the package or following this second method step. The opening of the hollow space in a third method step carried out subsequently is preferred to the simultaneous formation of the opening not the least because the simultaneous opening of the hollow space requires that the wall of the cap defining the hollow space be pierced immediately upon closure of the mold or injection mold, respectively. Since the injection molding compound, as a rule, has not set at that point of time, this will cause the previously positioned sensor to be displaced within the molding compound if no suitable abutment is provided on the opposite side. If injection molding is performed at an accordingly higher pressure, it will also have to be ensured in such a case that the mold will tightly sever the cap in order to prevent molding compound from being pressed into the hollow space. In the context of the method according to the invention, it is, therefore, advantageously proceeded such that the hollow space is opened by sawing and/or drilling after the at least partial setting of the molding compound.
In a particularly simple manner, the package may be made of suitable synthetics, a number of synthetics having proved to be suitable in semiconductor technology.
If an optical sensor is employed, the hollow space advantageously may be opened by drilling, whereupon an optical fiber is introduced into the opened hollow space.
In order to ensure the simultaneous formation of the electrical contacts with a view to inserting such a sensor provided with a package into a base or an appropriately prepared printed circuit board, it may advantageously be proceeded in a manner that the bond wires are connected with a frame including contact pins and that the frame is embbed in the molding compound leaving free the contact pins. |
An adult female with 5q34-q35.2 deletion: A rare syndromic presentation of left ventricular non-compaction and congenital heart disease.
Terminal and interstitial deletions of the 5q35 region have been rarely reported in the literature. While a delineated phenotype has been suggested, the range of clinical presentations is unknown due to overall rarity. Cardiac features are of interest because haploinsufficiency of the NKX2-5 gene, located at 5q35.1, has been implicated in congenital heart defects with or without conduction disease. Previous case reports of similar deletions included primarily infants and young children and longitudinal clinical and developmental phenotypic data are currently lacking. We report on a 24-year-old female, the first described adult case with an interstitial 5q34-q35.2 deletion and the third reported case where the cytogenetic abnormality is specified using chromosomal microarray analysis. We include details of her cardiac, developmental, and craniofacial phenotypes. The patient is diagnosed with mild intellectual disability, autism spectrum disorder, limitations in fine and gross motor skills, minor malformations of facial features, and a cardiac phenotype with conduction disease, congenital heart disease, and left ventricular non-compaction dilated cardiomyopathy. This report also reviews the overlapping features in previously published 5q35 deletions and, importantly, provides deeper insight into distal 5q deletions. |
Q:
SELECT FROM DB.Table(SQL Server) TO Excel
Всем привет, подскажите пожалуйста, как запросом можно перенести данные из сервера в excel.xlsx файл?
Сейчас делаю это руками через import/export wizard.
источник данных: SQL Server Native client 10.0
назначение: Microsoft Excel
A:
Рассмотрим два случая:
Когда нам нужно генерировать все данные для файла каждый раз заново
Когда нам нужно один раз записать данные в файл и потом их периодически обновлять
Первый случай
Чистим файл перед записью и записываем новые данные
UPDATE t
SET
t.Артикул = '',
t.Наименование = '',
t.Цена = '',
t.Дата = ''
FROM OPENROWSET('Microsoft.ACE.OLEDB.12.0', 'Excel 12.0;HDR=YES;Database=filepath\sales.xlsx;', 'SELECT * FROM [Лист1$]') AS t;
INSERT INTO OPENROWSET('Microsoft.ACE.OLEDB.10.0', 'Excel 12.0;HDR=YES;Database=filepath\sales.xlsx;', 'SELECT * FROM [Лист1$]')
SELECT s.code [Артикул],
s.name [Наименование],
s.price [Цена],
s.date [Дата]
FROM _table AS s;
Это решение хоть и работает, но работает иногда криво - бывает, что новые данные инсертятся после очищенных строк. Поэтому я предпочитаю работать так:
EXEC master..xp_cmdshell
'del filepath\sales.xlsx';
GO
EXEC master..xp_cmdshell
'copy filepath\template.xlsx filepath\sales.xlsx';
GO
INSERT INTO OPENROWSET('Microsoft.ACE.OLEDB.10.0', 'Excel 12.0;HDR=YES;Database=filepath\sales.xlsx;', 'SELECT * FROM [Лист1$]')
SELECT s.code [Артикул],
s.name [Наименование],
s.price [Цена],
s.date [Дата]
FROM _table AS s;
Храню шаблон файла и каждый раз перед записью удаляю старый файл и создаю новый по шаблону.
Второй случай
Обновляем данные в файле, идентифицируя строки по (в данном случае) артикулу.
UPDATE t
SET
t.Артикул = s.[Артикул],
t.Наименование = s.[Наименование],
t.Цена = s.[Цена],
t.Дата = s.[Дата]
FROM OPENROWSET('Microsoft.ACE.OLEDB.10.0', 'Excel 12.0;HDR=YES;Database=filepath\sales.xlsx;', 'SELECT * FROM [Лист1$]') AS t
JOIN
(
SELECT code AS Артикул,
name AS Наименование,
price AS Цена,
date AS Дата
FROM _table
) AS s ON s.Артикул = t.Артикул;
При этом в обоих случаях должны быть выполнены следующие условия:
Файл должен быть закрыт.
Колонки в файле должны называться именно так, как в запросе и идти в том же порядке.
P.S.
Microsoft.ACE.OLEDB - 64-битный провайдер. В случае, если нужен 32-битный, следует использовать Microsoft.Jet.OLEDB.
The main difference between Microsoft.Jet.OLEDB.4 & Microsoft.ACE.OLEDB.12 is that the Microsoft.Jet.OLEDB.4.0 provider is used with 32-bit SQL Server for Excel 2003 files & the Microsoft.ACE.OLEDB.12.0 provider is used with 64-bit SQL Server for any Excel files or 32-bit SQL Server for Excel 2007 files.
Тут можно скачать драйверы для провайдера.
Узнать версию своего сервера SELECT @@VERSION.
A:
В Excel можно сделать подключаемый источник данных и настроить периодическую синхронизацию, в т.ч. и с MS SQL Server.
Настройка зависит от вашей версии Office. На примере русской версии Excel 2013:
Создаем пустой документ Excel, переходим на вкладку "Данные",
нажимаем кнопку "Из других источников", выбираем пункт "С сервера SQL
Server".
Указываем имя сервера, учетные данные для входа, нажимаем
"Далее".
Выбираем нужную базу данных, снимаем галку "Подключение к
определенной таблице", нажимаем "Готово".
При предложении заменить файл подключения нажимаем "Да". В появившемся окне "Выбор таблицы" выбираем любую (использовать ее мы не будем), нажимаем "Ок".
В появившемся окне "Импорт данных" при необходимости указываем способ представления данных и куда нужно поместить данные - по умолчанию оставляем как есть, нажимаем кнопку "Свойства".
В появившемся окне "Свойства подключения" переходим на вкладку "Определение", выбираем тип команды "SQL", в поле "Текст команды" вставляем SQL-запрос для получения нужных данных, нажимаем кнопку "ОК", на предложение изменить подключение нажимаем "Да", в окне "Импорт данных" нажимаем "ОК".
Ждем окончания процесса загрузки - в зависимости от "тяжести" запроса и количества данных время загрузки может сильно отличаться.
Если запрос необходимо изменить - на вкладке "Конструктор" из всплывающего меню рядом с кнопкой "Обновить" выбираем пункт "Свойства подключения", на вкладке "Определение" меняем запрос, применяем изменения - данные загрузятся повторно.
|
Q:
Finding all unique values including NAs in a dataframe column in R
Importing a .csv file into R using read.csv (with stringsAsFactors = FALSE)
One field is numeric (integers between 0 and 10) but has quite a lot of blanks in it.
read.csv gives me a data frame with this field as an int column, but with blanks tagged as NA. That's ok. But...I wanted a quick line of code to show me the unique values appearing in this field (including NA) so I used:
levels(as.factor(dataframe$fieldname))
but it doesn't include the NA entries in there, just the 1-10.
Is there another way to do this, so that I don't miss the NA entries?
A:
You can use
unique(dataframe$fieldname)
|
What to do when your credit card gets compromised
By Christopher Elliott, special to The Washington Post
Posted:
01/22/2014 09:29:31 AM MST
Updated:
01/23/2014 11:25:06 AM MST
day after Sheilah Reardon checked into the Bellagio Las Vegas, she received an email alert from American Express warning that her credit card had been compromised. Among the fraudulent charges: a $67 bill from an online memorabilia store.
A day later, her friend Jennifer Henderson got a call from a MasterCard representative. Her card number had also been stolen. The thieves had made a $67 charge at the same online store moments after they hit Reardon's account.
“We had checked into the Bellagio at the same time, side by side,” says Reardon. She and Henderson believe that their credit cards were targeted while they were at the resort — most likely while they were checking in — because it was the only time when their cards were used together. Reardon says that she hadn't used her card, a “travel-only” Amex, since a trip to Florida last summer.
This kind of identity fraud cost American businesses and consumers $21 billion in 2012, the most recent year for which numbers are available, according to Javelin Strategy & Research. It found 12.6 million victims of identity fraud in the United States that year, the highest level since 2009. Javelin's figures also include data breaches and other types of fraudulent purchases.
Identity fraud is a perennial concern for travelers, and particularly for hotel guests whose cards are frequently used on the road. But the problem seems to be getting worse, and there's no quick or easy fix.
Bellagio claims that it takes “strict precautions” to maintain the security of its guests' digital information. After Reardon complained of the breach, it contacted her multiple times in an effort to take a full report, but she declined to give one, according to the hotel.
Advertisement
“We regret we were unable to utilize our full resources to bring this matter to a more satisfactory conclusion, but maintain that our security measures are effective,” says Mary Hynes, a spokeswoman for the resort.
Reardon, a school administrator from Raynham, Mass., insists that she filed a complaint but didn't have time for the lengthier debriefing, since she was on vacation. Besides, she says, she was left with the impression that the hotel was indifferent to her and her friend's problems while they were staying there. “At least they could have pretended to care,” she says.
But Bellagio's initial response as described by Reardon may be typical of the hotel industry, which is often careless about customer data and dismissive of fraud complaints, say experts and guests.
“Hotels are a massive source of credit card fraud,” says John Sileo, a digital privacy expert who runs the website Sileo.com. “In fact, the travel industry in general is ripe for the picking because of a variety of factors, including the distraction of travelers, high usage of credit and debit cards, high turnover of employees, and failure to perform employee background checks.”
Sileo believes that Henderson's and Reardon's breaches probably occurred at their hotel, but he can't be sure who was behind the theft. Their cards may have been compromised while they checked in, with an employee swiping their cards and then feeding the information to someone else. Or someone else standing near the check-in area and using a smartphone could have recorded their card numbers and verbal data, leading to the compromise. “The chances of it not being internal to the hotel — either an employee or a thief standing nearby — is minuscule,” he says.
I checked in with a reader who works in the security department of a major chain hotel in New Orleans about the precautions hotels do and don't take when it comes to their customers' security. He said that guests might be shocked if they took a look at the computers being used to check them in. He recently inspected front-desk terminals at his hotels, even though information technology isn't part of his job.
“They hadn't been updated in years, with thousands of updates needed,” he says. “I discovered that one computer was filled with adware, which is bad enough, but the other had a full virus network, with keyloggers as well as worms. It had its own database and a way to send guests' personal information off-site to its own servers.”
For the non-techies out there, keyloggers record passwords and other secure information and send it to a third party; a worm is a form of computer malware that replicates itself to spread to other computers.
How can hotel guests protect themselves?
“They can't,” says Robert Siciliano, a security expert who publishes the site BestIDTheftCompanys.com. “Credit cards can't be protected.”
The only way to minimize the damage is to monitor your credit card statement and report any suspicious activity. A longer-term solution, which is to upgrade credit cards to more expensive and secure chip-and-PIN technology, is on the horizon, but probably not in time for your next hotel visit.
Both Henderson and Reardon quickly verified the fraudulent activity on their cards. Their financial institutions removed the bogus charges, canceled their cards and promptly issued new ones.
The Bellagio, for its part, wasn't entirely unsympathetic. Even though the guests didn't complete a formal report, the hotel zeroed out their mandatory $25 a day “resort fee,” which includes in-room high-speed and wireless Internet, in-room local and toll-free calls, fitness center access and airline boarding pass printing.
Over six days, that shaved $150 off each of their bills, which is almost better than an apology.
- – -
Elliott, National Geographic Traveler's reader advocate and author of “How to Be the World's Smartest Traveler” (to be released in March), maintains a consumer advocate website at elliott.org.
MacIntyre says the completed project will be best in Pac-12There were bulldozers, hard hats, mud, concrete trucks, blueprints, mud, cranes, lots of noise and, uh, mud, during the last recruiting cycle when Colorado football coach Mike MacIntyre brought recruits to campus. Full Story
MacIntyre says the completed project will be best in Pac-12There were bulldozers, hard hats, mud, concrete trucks, blueprints, mud, cranes, lots of noise and, uh, mud, during the last recruiting cycle when Colorado football coach Mike MacIntyre brought recruits to campus. Full Story
Most people don't play guitar like Grayson Erhard does. That's because most people can't play guitar like he does. The guitarist for Fort Collins' Aspen Hourglass often uses a difficult two-hands-on-the-fretboard technique that Eddie Van Halen first popularized but which players such as Erhard have developed beyond pop-rock vulgarity.
Full Story |
=1 6.0truein 8.2truein
=cmr12 scaled2
=cmr10 scaled2
“\*”[Research supported by NSF contract \# 9205530. ]{}
lasteqno 1@0
In Friedman \[90\] we constructed a $\Pi^1_2$-singleton $R$ such that $0<_LR<_L0^{\#}.$ An open question is whether such a $\Pi^1_2$-singleton can be $ZFC$-provable, in the sense that $ZFC\vdash\phi$ has at most one solution, where $\phi$ is a $\Pi^1_2$ formula characterizing $R.$ In this note we observe that the construction from Friedman \[90\] can be used to obtain a $T$-provable $R,0<_LR<_L0^{\#},$ where $T$ is a theory consistent with $V=L$ contained as a subtheory of $ZFC+0^{\#}$ exists. $ T$ has consistency strength approximately that of $ZFC+$ there exists an ineffable cardinal.
First we recall a definition from Friedman \[90\]. For $i_1<\cdots<i_{n+1},n\ge
1$ define $I(i_1,\cdots,i_{n+1})=\{i<i_1|i$ is $L$-inaccessible and $i,i_1$ satisfy the same $\Sigma_1$ properties in $L_{i_{n+1}}$ with parameters from $i\cup\{i_2,\cdots, i_n\}\}.$ An [*acceptable quess*]{} is such a sequence $(i_1,\cdots,i_{n+1})$ where $i_1$ is $L$-inaccessible and $1\le k<\ell\le n\longrightarrow i_k\in
I(i_{\ell},\cdots,i_{n+1}).$
Now we say that an acceptable guess $(i_1,\cdots,i_{n+1})$ is [*good*]{} if in addition $I\jiny$ is stationary in $i_1.$ We refer to $n$ as the [*length*]{} of the guess $\jiny$.
$T$ is the theory $ZFC+$ There are arbitrarily long good guesses. $T$ is a subtheory of $ZFC+0^{\#}$ exists since any increasing sequence of Silver indiscernibles $\jiny,$ where $n\ge 1$ and $i_1$ is regular, is a good guess. (In fact I$\jiny$ is $CUB$ in $i_1$ in this case.) Also note that $T$ follows from the existence, for each $n,$ of a cardinal $K$ such that any function on $n$-tuples from $K$ has a homogeneous set $X$ containing an $\alpha$ such that $X\cap\alpha$ is stationary in $\alpha,$ together with $n-2$ larger ordinals. (This is close in strength to an ineffable cardinal.) And if $T$ is true then it is true in $L.$
Now recall that in Friedman \[90\] a $R$ is constructed so as to “kill” acceptable guesses $\jiny$ such that $i_{n+1}<(i^+)^L$ and $p\jiny_0$ contradicts $R.$ Here, $p\jiny$ is a $\Sigma_1(L)$-procedure which assigns a forcing condition to the guess $\jiny$ and $p\jiny_0$ is the “real part” of $p\jiny,$ consisting of a function from $(2^{<\omega })^{<\omega }$ into perfect trees. $R$ is in fact a set of finite sequences of finite sequences of $0$’s and $1$’s and is determined by the $p\jiny_0$ where $p\jiny$ belongs to the generic class. A simple requirement that we may impose on the procedure $p\jiny$ is that $p\jiny$ must decide which of the first $n$ elements of $(2^{<\omega })^{<\omega }$ belongs to $R,$ for some fixed (constructible) $\omega$-listing of $(2^{<\omega })^{<\omega }.$
An acceptable guess $\jiny$ is killed by adding a $CUB$ subset to $i_1$ disjoint from $I\jiny$. The $\Pi^1_2$ formula characterizing $R$ implies that $R$ kills all acceptable guesses $\jiny$ such that $i_{n+1}<(i_1^+)^L$ and $p\jiny$ forces a false membership fact about $R.$ Now suppose $T$ holds and that $R\ne S$ were both solutions to our $\Pi^1_2$ formula. Choose $n$ so that $R$ and $S$ differ on the membership of one of the first $n$ elements of $(2^{<\omega })^{<\omega }$ and let $\jiny$ be a good guess. By a Skolem hull argument we may assume that $i_{n+1}<(i_1^+)^L.$ Then either $R$ or $S$ must kill $\jiny$ since $p\jiny$ decides membership of the first $n$ elements of $(2^{<\omega })^{<\omega }.$ But goodness means that $I\jiny$ is stationary, a contradiction.
So $T$ proves that our $\Pi^1_2$ formula characterizing $R$ has at most one solution.
**Reference**
Friedman \[90\] The $\Pi^1_2$-Singleton Conjecture, Journal of the AMS.
|
Indium-111 oxine labelling affects the cellular integrity of haematopoietic progenitor cells.
Cell-based therapy by transplantation of progenitor cells has emerged as a promising development for organ repair, but non-invasive imaging approaches are required to monitor the fate of transplanted cells. Radioactive labelling with (111)In-oxine has been used in preclinical trials. This study aimed to validate (111)In-oxine labelling and subsequent in vivo and ex vivo detection of haematopoietic progenitor cells. Murine haematopoietic progenitor cells (10(6), FDCPmix) were labelled with 0.1 MBq (low dose) or 1.0 MBq (high dose) (111)In-oxine and compared with unlabelled controls. Cellular retention of (111)In, viability and proliferation were determined up to 48 h after labelling. Labelled cells were injected into the cavity of the left or right cardiac ventricle in mice. Scintigraphic images were acquired 24 h later. Organ samples were harvested to determine the tissue-specific activity. Labelling efficiency was 75 +/- 14%. Cellular retention of incorporated (111)In after 48 h was 18 +/- 4%. Percentage viability after 48 h was 90 +/- 1% (control), 58 +/- 7% (low dose) and 48 +/- 8% (high dose) (p<0.0001). Numbers of viable cells after 48 h (normalised to 0 h) were 249 +/- 51% (control), 42 +/- 8% (low dose) and 32 +/- 5% (high dose) (p<0.0001). Cells accumulated in the spleen (86.6 +/- 27.0% ID/g), bone marrow (59.1 +/- 16.1% ID/g) and liver (30.3 +/- 9.5% ID/g) after left ventricular injection, whereas most of the cells were detected in the lungs (42.4 +/- 21.8% ID/g) after right ventricular injection. Radiolabelling of haematopoietic progenitor cells with (111)In-oxine is feasible, with high labelling efficiency but restricted stability. The integrity of labelled cells is significantly affected, with substantially reduced viability and proliferation and limited migration after systemic transfusion. |
Why the Commodity Bull Looks Likely to Charge
Whoosh!
There’s no other way to describe the move in oil since last week.
The US contract for August delivery rose 4.6%. It’s the biggest one-day gain since 2016.
We can thank the Organization of the Petroleum Exporting Countries (OPEC) for that.
The announced rise in oil production is less than the market was pricing in.
Now we need to see if oil can hold on to the gains.
In the short term, I can’t really tell you what’s likely to happen. But looking out 18 months from here, I’d be staggered if oil is lower than it is now.
That’s why I’m watching oil stocks very closely.
But this is also important because of the impact it will have on the Aussie market.
BHP Billiton Ltd [ASX:BHP], for example, gets about 18% of its earnings from its petroleum division. Which means that BHP should help lift the ASX today.
After all, each $US1 rise in the oil price can add $US64 million to BHP’s revenue.
And don’t forget natural gas. A 10 cent rise in the US natural gas price adds US$23 million to BHP’s bottom line.
History to repeat
I mentioned in last week’s Daily Reckoning the chat I recently had with investing legend Jim Rogers. In preparation for our talk, I went back and read the oil section of his 2004 book, Hot Commodities.
The similarities to what Jim was saying about oil then to how things are shaping up for oil now are quite striking actually.
Oil was around US$40 a barrel in 2004. It had risen from US$10 six years earlier.
There was grumbling from bureaucrats, politicians and consumers about high prices. In fact, the US government and OPEC kept wrangling over the different price they’d preferred to see oil trading at.
Yet there was one problem: Both the US government and OPEC were living in a fantasy land where they assumed they could control the market.
That became obvious when oil hit US$147 four years later. The prior underinvestment meant there simply wasn’t enough oil that could get to market.
I think there’s every chance of oil running up in a similar way in the near future.
It won’t be a straight line, of course, and oil could even go down for a bit. But the structural tightness in the market is leaving the world with low inventory and low spare capacity.
If any wildcard comes along and knocks out production further, oil could spike in a big way.
I’m starting to see quite a bit of research come through about the opportunity in commodities in general. That’s because they’re cheap relative to stock and bond prices around the world. Fund managers looking for growth and less downside risk are going to see value here.
In fact, even my US colleagues are tipping Aussie miners at the moment.
It’s not hard to see why.
In general, not a lot of new supply has been invested in over the last few years, and demand looks solid.
Even the price of US natural gas has been creeping up lately too. It’s up about 16% since February — and there’s been huge investment and supply of natural gas over the last five years. That suggests there’s strong demand out there.
Certainly, this should pour more free cash flow through BHP’s accounts, all else being equal. It should also give the company a strong bargaining position for the sale of its shale assets in the US.
The more price strength that BHP exhibits, the stronger the ASX will look. This could draw in more buyers as regular reports about the stock market hitting new highs keep filtering out.
We’ll have to wait and see on that. But remember: Investors never chase bear markets; they’re drawn to rising markets.
Perhaps an open question is whether mining companies have done enough to win back investor trust. That’s on the mind of Jake Klein right now, the chief executive of gold stock Evolution Mining Ltd [ASX:EVN].
Klein says the gold industry in general needs to win back both the retail investor and investment manager. He says the scar tissues from the boom and bust years is still there despite Aussie gold stocks being low-cost and some showing great share price performance in recent years.
I happen to think mum and dad investors will come back, but it will take a surge in commodity prices to make it happen. There’s nothing like the prospect of a huge and unexpected windfall in revenue pouring in to get the blood going. Commodities can make that happen in a way few other sectors can — and fast.
All told, the move in oil I described above could just be a small taste of what’s to come. Stay tuned. |
– INCREASES taxes on many people who make less than $ 200,000/year while greatly LOWERING them on billionaires
– REMOVES tax exemptions for teachers, grad students, and the chronically ill while ADDING them for private jets and golf courses
– REMOVES the individual health insurance mandate from Obamacare, something experts agree is just another way to kill it since they can’t repeal it
– is mostly an effort to keep billionaire donors giving money to Republicans (Mitch McConnell, Lindsey Graham, and Chris Collins have all admitted as much publicly)
But this may be the craziest part yet!
Apparently this bill, which again the Republicans are selling as “tax cuts” — actually has language in it to define an “unborn child” in order to establish “personhood,” something anti-abortion activists have been attempting as a way to get Roe v Wade overturned.
The excuse is to give parents a way to name their future children as beneficiaries on college savings accounts, but that’s something people can already do without this legal language.
Sarah Lipton-Lubet, vice president for reproductive health and rights at the National Partnership for Women and Families, tells Huffington Post what this really is all about:
“The hope is that if they throw enough anti-abortion language at the wall something is going to stick. It’s a dubious strategy. It’s an affront to women.”
Well, attacking, discrediting, and minimizing women is pretty much the GOP’s MO. |
Experiment at the Homestead
Today, I love the feeling of sore muscles. Sore muscles today means heavily used muscles yesterday. Something so physiologically heavy happened that my body continues to tell the story. I strut around with the soreness as with some invisible trophy of physical self achievement. The inscription:
“Yesterday, I lived!”
Spiritual Scientist
And as I have raised two daughters, or at least accompanied two daughters while they were too young to easily fend for themselves on earth, I have often positioned myself to experience another type of soreness. A spiritual soreness.
It’s a soreness that can throb suddenly, especially when “I” finds himself doing an activity that “we” were recently doing. But as a spiritual scientist I have often set up experiments to deliberately invoke and isolate this unseen wonder of human existence. To study it.
Experimental Apparatus – The Deerlick Trail
The worst part of the 4-mile trail run is the beginning. 1.25 miles straight up the Deerlick Trail, climbing 1000 ft or so to gain a rocky outcrop and a pleasant look down on the Hot Springs Valley and the Homestead Resort. Another mile traces the ridgeline, climbing even higher, and then a series of steep-falling, short, back-to-back hairpins re-connects the ridgeline to the valley. Only the last mile, following a few holes of the golf-course back down to Hot Springs, are what I would consider gradient-pleasant for a two-legged creature.
The “I”
I had run-walk-ed, then run-run-walk -ed, and on the last day run-run-run -ed the four miles of the Deerlick Trail when I was at a business conference here earlier in the spring. On that first day, when I was beaten into walking submission less than halfway to my goal, the itinerary for I’s next two days was set. I doesn’t like to be physically beaten. I challenges himself all the time to be tough physically and mentally and to let challenges like running to the top of the Deerlick Trail inspire him into his next day of life. I dangles his own fat carrot of self-worth and pride in front of himself on these steep trails of mental and physical challenge, and even experiences moments of self-satisfied euphoria on the immediate heels of accomplishment. Euphoric was I after run-running all the way to the rocky outcropping on my last morning, beating the sun’s rays to the peak. Triumphantly I ran along the top of the ridge. Giddily I tap-danced down the steep hairpins to the valley below. Pridefully, full-chested, I did my best gazelle along the edge of the golf course as the golfers, I tells myself, looked on in amazement at this powerful force of nature, equal parts mind and muscle, come down from the mountain to strut before the “them.”
The Catalyst – A Unique and Dangerous Walk
Anna had laughed at me the first time I suggested the hike. She considers “hiking” to be a mere euphemism for “dangerous walking,” and why would she bring any kind of danger into her vacation? Didn’t we come here to relax? She wasn’t even given a vote about coming here anyway. And! Anyway, she’ll lose pace with the Kardashians. Kylie is getting her lips done but isn’t sure she should. A hike? Ha! In the morning? Double Ha!
“Hiking is Just Dangerous Walking.” – Anna
But there is a playfulness to her protest that is attractive and promising. Though it is true that as her teen age has advanced she has lost much of her interest in dangerous walking, part of me knew that she wouldn’t let Brooke and I go without her on this particular adventure.
You see, we came to the Homestead Resort for the first time as a family to better distinguish this vacation from our countless other beach vacations. This one is different. After this one, Anna is off to college. And though she imitates a shallow youth in her protests and some of her guilty pleasures, the Anna I have come to know for 18 years would know how much her life is about to change, and the physical distance these changes will create between me and her. My Anna would know the value of one last daddy-daughter-daughter adventure.
And sure enough, when Brooke and I walked out of the Homestead towards the DeerLick Trail, the deep and thoughtful Anna I know was not staying by the tv to make sure Kylie’s lips would come out ok. She was taking one last dangerous walk with her immediate family before striking out on her own.
The “We”
I didn’t have high expectations. Neither of my girls has been showing the masochistic tendencies of their father. They don’t beat themselves up physically the way I do, and other than swimming neither has been very active this summer. I thought that our hike to the summit could become a hike back from the trail to the summit at any moment.
But the stars were aligned for the Turners that day, which might be another way for saying that each of the Turners on the Deerlick Trail knew that this hike was different than every other one we had ever made together. There was no, “I can screw this one up, because there will be another one tomorrow” attitude. There was no getting on each other’s nerves. There was no taking one another for granted.
The “We” on Deerlick Trail
We enjoyed each other. Joy from each other. The climb was tough, and two of us weren’t in shape for it, but we helped each other. When we reached the rocky outcrop, we celebrated with each other. We took pictures. We laughed. We sent pictures to Anna’s boyfriend.(Amazed, he was about Anna’s dangerous walking). We made fun of Brooke, and Brooke didn’t care. She fell down like a newborn giraffe in front of other hikers, feet separated from knees, and then did it again when she tried to stand up, and Brooke laughed at herself to help us laugh at her with her. We thought we would be tired after the climb to the rocky outcrop, and want to turn around to go down, but we were undivided in our decision to take the long way home. To finish the hike. Anna with another fake protest. Brooke now feeling her oats. We walked the ridge, then fell through the hairpins. The woman working the remote golf course snackbar was happy to see us when we tumbled off the mountain. Our “we” was putting off a glow, and she was stuck out here all day with nothing but her “I” and some old ladies playing golf to keep her company. She gave us free water bottles and said she was bored. Mommy was at the pool now and wondering about us. We had been gone a long time. We sent her pictures. We walked carelessly down the valley- the most beautiful way to walk. Without a care, talking about silly things. Finally we landed in the one street town of Hot Springs, Va.
The “I” Again, And Spoiled Country
The one thing I should never do, as I press my limits and try to make myself larger, is invite others into my solitude. Once Anna and Brooke had walked the Deerlick trail with me, once we had struggled together to the top, giggled our way along the ridge, and laughed our way down and back to the resort, that 4 miles of trail in the western Virginian mountains was changed forever.
How do I know? I finished the experiment. I ran-ran-ran it the next day.
And when I got to the top, to the rocky outcrop, all I could see was the absence of Anna and Brooke. No euphoria on the trail along the ridge – only absence. Red-faced exhaustion. And soreness? Yes! Soreness in the hairpin turns, at the place where Brooke and I stopped to do a photography experiment. Soreness as I imagine the voices and the souls around me, sharing the trail with me. A different feeling in my chest, now, as the golfers see my descent. Hollow. Lonely. Sore. The trail was full yesterday. Today, just me. Just I. And I knows that if ever I am on that trail again, that soreness will return. The days of solitary euphoria on the Deerlick Trail are gone for ever.
The Conclusion of a Spiritual Scientist
My wife notices that the screen has my attention more than it usually does. We are at the beach with our best family friends. I stare at this screen, and in this screen I only see Anna. I left her in a dorm room at NC State two days ago. I will miss her. She has spoiled almost every physical space I know. She has spoiled the white space of this screen. Nowhere will ever be the same without her. All is spoiled. I am sore. And yet . . . I somehow realize that I love this soreness even more than I love physical soreness. I love it for its depth, its intensity, and for the larger sense of accomplishment it represents.
The Trophy
My journal from 15 years ago reads:
June 3, 2004
As I write these words, I find myself immersed in the chaos of eastern American family life. I am dug into it, this human life, and still digging. Other human beings around me, close to me, need and depend on me, so that my existence seems inseparable from theirs. Amy, Anna, Brooke and I are linked together, conglomerated, in such a way that to even imagine the absence of one of the parts causes a sinking, simulated pain somewhere deep inside where the bonds with these other humans form and strengthen with no mental effort or special attention from me. Sometimes I only know the strength of the connections, and the raw, nerve-like nature of the emotional tendons between us by imagining the immense pain of one of the parts being torn away. A gaping hole, with dangling nerve endings, ripped sinews and profuse soul hemorrhaging would be created!
Well, less imagination needed now. Though I still have remote access to her, a certain level of extraction has begun, and when I return to my house, a bedroom will be empty. No experiment. Something so spiritually heavy happened that my soul continues to tell the story. Abrupt, intense soreness!
I love it. My heart carries it around as one of its greatest life trophies. The inscription: |
Parabat Express
Parabat Express (Train no. 709/710) is an intercity train which runs between Dhaka (capital of Bangladesh) and Sylhet. Parabat Express has been considered one of the prestigious and luxurious trains since the inception of intercity train in Bangladesh in 1986. The train connects two important cities of Bangladesh.
History
Parabat Express made its 1st inaugural run on 19 March 1986 with allocated train no. 709 (up)/710 (down). It was introduced as inter-city train which offers luxurious and fast service. The train starts from Dhaka Railway Station since its inauguration. Parabat express gets the priority on Bangladesh Railway network. It has fewer stops than other Dhaka-Sylhet express trains and halts only at prominent stations.
Schedule
The train runs between Dhaka and Sylhet district while touching other districts like Kishoreganj, Brahmanbaria, Habiganj and Maulavibazar. It departs Dhaka railway station at 06:35 AM (Bangladesh Standard Time) and arrives Sylhet at 01:20 PM. In return trip, it departs Sylhet at 03:00 PM and arrives Dhaka at 09:55 PM. Tuesday is the weekly holiday of this train.
Carriages
The train currently runs with 16 PT Inka (Industri Kereta Api) made air-brake coaches. This coaches were introduced to the service on 2 September 2016. The train has eight chair car, two ac chair car, two non ac chair car, two guard brake with attached dining, one non ac cabin and one generator car. Prior to introducing Inka coaches, the train ran with old vacuum brake coaches. However, the train used to run with Iranian air-brake coaches in between 1998 and 2011. Later, due to maintenance problem, Iranian airbrake coaches were replaced with vacuum coaches in 2011.
Locomotive
Parabat Express usually is hauled by a Class 2900 locomotive of Bangladesh Railway. However, sometimes because of rolling stock crisis it is hauled by a Class 2600 locomotive. The train needs an air-braked locomotive which is mandatory.
Stoppages
Dhaka Bimanbandor
Bhairabbazar
Brahmanbaria
Azampur
Noapara
Shaistaganj
Sreemangal
Bhanugach
Kulaura
Maizgaon
Passenger interest
People usually travel Parabat Express for its punctual and fast service. The train has more AC carriages than any other Dhaka-Sylhet express trains. This attracts passengers who prefer luxurious travel experience. Furthermore, travelling by express allows its passenger to view scenic beauty of Sylhet division. One can enjoy trackside beautiful hills, tea gardens and rural lifestyle while travelling by Parabat Express.
Accident of Locomotive no. 2933
Locomotive no. 2933 was one of the newest locomotives of Class 2900 which met fatal accident in Noyapara upazila, Habiganj district on 7 October 2016. The locomotive caught fire soon after it derailed with Parabat Express near Noapara Railstation. The driver cab and electrical cabinet of the locomotive were destroyed in the fire, and the locomotive had to undergo heavy repairs.
References
Category:Named passenger trains of Bangladesh
Category:Transport in Sylhet |
Monday, August 23, 2010
Yellow and Green & Alice in Wonderland BOS FOTDs
These are two more FOTD's from the last week. The first is more yellow with a turquoise liner. I love the colour of this liner but it takes an age to dry, you need to keep your eyes closed for 5 minutes at least after applying it or else you get a line of green under your eyebrows which is exactly what happened to me here. I tried to fix it but you can still see a green tinge.
Face
Bourjois 10 Hour Sleep Effect foundation
17 Translucent Loose Powder
MAC Hipness blush
MAC MSFN
Bourjois highlighter
Eyes:
UDPP
MAC Chrome Yellow, Magnetic Fields, Shore Leave
Ruby & Millie Gold Cream e/s
No7 Stay Perfect liner in Jewel
Barry M DD 76 (Yellow)
UD Flipside 24/7 liner
Maybelline The Collossal Mascara
MAC Electrolady Liquidlast liner
For the second I used the UD Alice in Wonderland palette, which I really don't use often enough.
Face
Bourjois 10 Hour Sleep Effect foundation
17 Translucent Loose Powder
MAC Hipness blush
MAC MSFN
Bourjois highlighter
Eyes:
UDPP
MAC Fresco Rose Paint Pot
UD Oraculum, Queen, Underland, Muchness & White Rabbit
GOSH Blue Lagoon Velvet Touch liner
MAC Electric Eel e/s
Essence Midnight Blue liner
Barry M 02 Glitter Liner
Maybelline The Collossal Mascara
Lips:
MAC Myth lipstick
I have less than two weeks til my interview for the makeup course I want to do this year so I'm trying to get as much practise in as I can. I still need to decide what makeup to wear into the interview, it's early in the morning is I don't want to go for something too complicated in case I mess it up in my sleep deprived state. I like this second look and it's fairly foolproof but would it be a little too simple to wear to my interview?
subscribe to head in the clouds
All opinions on this blog are my own.All items featured are purchased by me, unless stated otherwise.I try to credit any pictures I post that don't belong to me. Sometimes I can't remember where I found them so if you see any uncredited pictures feel free to let me know where they came from.If I post a picture you own and you would like me to remove it please tell me. |
The Draft Government Policy Statement released in early April signaled a major shift in government transport priorities. One part of this was the funding for Rapid Transit, which has enabled a quick start to Light Rail procurement. Another major policy shift was that Safety was lifted to become one of the top 2 priorities.
Until now, the impacts of this shift have not been clear. The government was only able to talk in broad terms about what this might mean for new transport projects.
For example, Julie Anne-Genter was quoted as saying:
“For half the cost of the East-West link motorway project, only a few kilometres long, we could afford median barriers down every kilometre of state highway in the country.”
There has not yet been any official announcement from the government of where the new funding would be directed.
However in the last few weeks, NZTA quietly put their “Draft Transport Agency Investment Proposal (TAIP)” onto their website. The TAIP replaces the former “State Highways Investment Proposal’ and sets out the NZTA projects that need to be included in ‘Regional Land Transport Plans”.
The most interesting part of the TAIP, is that for the first time it clearly sets out how NZTA will convert the government new safety focus into projects.
The draft GPS 2018 reflects a significant lift in ambition for improving the safety of the land transport system. The TAIP responds to this by proposing a programme of initiatives across state highway maintenance, operations and improvements, that: Is targeted to the most significant risks: Investment will focus on reducing the risk of head-on crashes, targeting high-risk intersections, making roads and roadsides more forgiving in the event of human error or mechanical fault, and protecting vulnerable users such as pedestrians, cyclists and motorcyclists.
Can be delivered swiftly: We are focused on highest-value interventions that can be delivered within the next three years and immediately deliver significant safety benefits. For safety interventions that may take more time to design and deliver, we are investigating procurement approaches to expedite delivery as much as possible.
The results expected from the programme are very impressive:
The investments proposed by the TAIP will significantly reduce the number of deaths and serious injuries on our state highways. The full impact of the programme will be realised by June 2028, when the reduction in deaths or serious injuries will reach around 200 per year. By prioritising the most significant risks, the TAIP will achieve nearly half of this annual reduction by 2021.
So to summarise, they expect a reduction of 100 deaths or serious injuries per year within 3 years.
To achieve this ambitious target the TAIP outlines a new ‘roads and roadside corridor safety programme, covering:
High-risk intersections,
Median barriers,
Motorcycle routes,
Speed management on high risk routes
Interventions to support active modes of transport such as walking and cycling.
The TAIP outlines the 4 types of interventions, and their indicative costings.
The programmes above contain a balance of the best-performing projects across the following: Safe system enhancement works: includes quick-win median barrier projects, works to facilitate speed management, major intersection improvements, and corridor enhancements costing $2 million per kilometre.
Safer corridor improvements: includes motorcycle routes, active mode corridor improvements, and corridor projects costing greater than $200,000 per kilometre.
Safe intersection improvements: includes high risk intersection projects, and active mode intersection improvements.
Safety management works: includes corridor improvements costing less than $200,000 per kilometre, such as developing and implementing speed management opportunities
The TAIP includes a list of all the projects by region, however I have looked at them in detail, and the key facts are summarized below. Note these are all State Highway upgrade projects, the TAIP alludes to a similar programme for local roads, however this will rely on NZTA working closely with local authorities. Also should note that the TAIP doesn’t include costings for each project, so the costs are based on the indicative per kilometre figures from above.
The map below I have put together shows the location of the proposed ‘Safe System Enhancement Works’, where the most expensive improvements will be made. This programme proposes that 280 km of these road upgrades are completed within the next 3 years, and a further 400 km within the next 10 years. At the indicative cost of the $2 million per kilometer, this would be a $1.4 billion investment.
Major upgrades in this class proposed for the next 3 years include:
Whangarei to Kawakawa
Pokeno to Paeroa, Waihi and Thames
Featherston to Upper Hutt
Blenheim to Seddon
The ‘Safer Corridor Improvements’ projects propose the upgrade of around 1300 km of road in the next 3 years, and a further 2000 km over the next 10 years. Given expected project costs of between $200,000 and $2,000,000 per kilometer, this is a further investment of around $2 to 3 billion.
Major upgrades in this class proposed for the next 3 years include:
Whangarei to Wellsford
Hamilton to Raglan, Te Awamutu and Morrinsville
Tirau to Rotorua
Te Kuiti to New Plymouth
Paeroa to Tauranga
Hastings to Takapua
Wellington to Upper Hutt
Blenheim to Nelson
Westport to Greymouth
Some of these safety ugrades also include a plan to deliver improved resilience (for example from floods and slips).
Roads destined for this form of upgrades in the next 3 years includes:
Kawakawa to Kaitaia
Cromwell to Queenstown
Overall around 4000km of road will be upgrade in next 10 year, for an estimated cost of around $5 billion. This is in stark contrast to the previous Roads of National Significance Programme, that aimed to provide 300km of new motorways for around $10 billion.
The proposed safety programme also is in stark contrast to the RONS programme in terms of delivery speed. Many of the RONS will not be complete until the early 2020’s, nearly 15 years after they were first announced. However these minor improvements can be delivered much quicker, with big progress expected within 3 years.
Share this |
Wireless mobile terminals utilized in mobile communication systems are increasingly integrated with other electronic devices to expand their functionality and provide a greater range of services to the user. One such electronic device is a geographic position estimator, and in particular, a device that derives position estimates from receiving and decoding signals broadcasted by navigation satellites. An example of a navigation satellite system is GLONASS (Global Navigation Satellite System) developed by the former Soviet Union. This navigation satellite system is similar to the United States Global Positioning System (GPS), the Chinese Compass Navigation System, and the European Union (EU) Galileo Positioning System. Each of these navigation satellite systems broadcasts encoded signals, which may be received at a receiver, such as a geographic position estimator, and may be processed using trilateration, which calculates the receiver's position on the surface of the Earth.
To acquire and process a satellite signal requires a receiver to determine data bit boundaries of an incoming stream of data samples. Often a window spanning a single information data bit contains several data samples. Herein, a data sample represents an integration across a PN code period. For example, one data sample represents an integration across a period containing a single 1023-chip PN code. In such cases, the receiving device must determine a starting sample for the window. For example, a window spanning the time of 20 data samples has the possibility of starting at any one of 20 different phases. For meander encoded data samples, a transition rate is effectively doubled by the encoding process, which induces a transition at the center of the data bit (e.g., an information data bit stream has possible transitions at a rate of 50 Hz, whereas a meander encoded data bit stream has possible transitions at a rate of 100 Hz). A meander code is also referred to as a Manchester code.
Conventionally for meander encoded information data bits, a two-step process is used to determine a data bit boundary (also referred to as a data bit edge). Prior to this two-step test, the sub-PN code resolution has been determined. That is, the starting point of each repeated PN code has been determined. In a GLONASS system, the PN code repeats every millisecond; therefore, the system has knowledge of the sub-millisecond offset. Thus in GLONASS, the two-step process uses the predetermined 1-ms timing to determine the 10 and 20 ms boundaries. In the first step, initial boundaries at the meander encoded transition rate are determined. The initial boundaries are at a rate twice the rate of the information data bits (i.e., at the meander rate). The initial boundaries both (1) separate neighboring data bits and (2) divide each meander encoded data bit in half. In the second step, the initial boundaries are analyzed to distinguish (1) data bit boundaries separating neighboring data bits from (2) meander encoded center transitions that divide each bit in half. As an example, a window spanning 20 meander encoded data samples at a rate of 1 sample/ms has 20 corresponding possible starting points. First, an initial boundary starting point (or phase) is determined with a 10-ms spacing (100-Hz data rate), then second, a data bit boundary starting point (data bit edge) is determined with a 20-ms spacing (50 Hz data rate). Once the receiving device determines a starting point, the device may remove the meander code and interpret the received data samples.
This two-step process has multiple disadvantages and drawbacks. First, when the initial boundary is determined, it may be erroneously set. This guarantees that the second step will also determine an erroneous data bit edge. Additional, the two-step process must complete the first step before beginning the second step. Therefore, an improved method and device for data bit edge detection of meander encoded data samples, for example, from a GLONASS satellite, is desirable. |
FIGS. 1 to 3 are drawing illustrating a III-nitride compound semiconductor light emitting device according to the prior art. Specifically, FIG. 1 is a cross-sectional view of the III-nitride compound semiconductor light emitting device, FIG. 2 is an energy band diagram showing that the active layer 13 has an InGaN/GaN multiple-quantum-well structure, and FIG. 3 is an energy band diagram showing that the active layer 13 has an InGaN/InGaN multiple-quantum-well structure.
Referring to FIG. 1, to fabricate a nitride compound semiconductor light emitting device according to the prior art, the buffer layer 11, the n-InxAlyGazN layer 12, the active layer 13, the p-InxAlyGazN layer 14 and the transparent electrode layer 15 are successively formed on the substrate 10. Then, mesa etching is performed in such a way to expose the n-InxAlyGazN layer 12. Next, the transparent electrode layers 16 and 17 are formed on the exposed portion of the n-InxAlyGazN layer 12 and the transparent electrode layer 12, respectively. Then, the passivation film 18 is formed on the device. In this respect, x, y and z in InxAlyGazN forming the layers 12 and 14 satisfy the following conditions: x+y+z=1, 0≦x<1, 0≦y<1, and 0<z≦1.
As shown in FIG. 2, the active layer 13 has an InGaN/GaN multiple-quantum-well structure having an alternate stacking comprising the InGaN quantum well layers 13b and the GaN barrier layers 13a. Alternatively, as shown in FIG. 3, the active layer 13 has an InGaN/InGaN multiple-quantum-well structure of an alternate stacking comprising the InGaN quantum well layers 13b and the InGaN barrier layers 13a′. In the InGaN/InGaN multiple-quantum-well structure, the barrier layers 13a′ have a lower indium (In) content than that of the quantum well layers 13b.
The InGaN/GaN multiple-quantum-well active layer as shown in FIG. 2 has an advantage in that it is more stable in high-current operation or high-temperature operation than InGaN/InGaN. This is because the energy band gap of GaN forming the barrier layers 13a is higher than that of the barrier layers 13a′, leading to an increase in the efficiency of recombination between electrons and holes.
However, the InGaN/GaN multiple-quantum-well active layer has a limitation in that the GaN barrier layers 13a should be grown at low temperature since the growth temperature of the InGaN well layers 13b is about 200-350° C. lower than the general growth temperature of high-quality GaN. This makes it difficult to make the GaN barrier layers 13a with high quality levels. Another disadvantage is that the strain of the InGaN well layers 13b and the GaN barrier layers 13a needs to be optimized only with-the thickness of the InGaN well layers 13b and the GaN barrier layers 13a.
In the other hand, in the case of the InGaN/InGaN multiple-quantum-well active layer as shown in FIG. 3, the barrier layers 13a′ are also made of InGaN so that the InGaN barrier layers 13a′ with high quality can be made at a growth temperature range similar to that of the InGaN well layers 13b. The InGaN barrier layers 13b made of the same material as the InGaN well layers 13b provide growth surfaces of the next well layers so that the InGaN well layers 13b with high quality can be obtained, leading to a light emitting device having high quantum efficiency.
However, the InGaN/InGaN multiple-quantum-well active layer has a disadvantage in that it has low stability in high-current or high-temperature operations as compared to the InGaN/GaN multiple-quantum-well layer. In an attempt to overcome this disadvantage, a p-AlGaN electron-blocking layer is generally formed on the active layer so as to increase the high-temperature stability and efficiency of the active layer. However, this approach has a disadvantage in that, in epitaxial growth of the nitride compound, the deposition of an aluminum (Al)-containing nitride compound, which is difficult to remove easily, occurs within a reactor. This results in a great reduction in mass production.
Another disadvantage with the InGaN/InGaN multiple-quantum-well active layer is that the performance and properties of a light emitting diode including the active layer are sensitive to a small change in, the indium composition of the InGaN barrier layer 13a′ thus making the mass production of the diode difficult.
Trimethy indium (TMIn) is mainly used as a precursor for indium. It has a melting point of 88° C. and is solid at room temperature. Thus, growing a material with the precursor maintained at a constant composition is relatively difficult compared to other precursors. Particularly, a small change in the indium composition in the barrier layers 13a′ is difficult to detect even by a nondestructive measurement system, such as a PL (photoluminescence) or XRD (X-ray Diffraction) system, and thus, causes a difficulty in quality control and has a great effect on the production of prior products.
As described above, the existing typical InGaN/GaN multiple-quantum-well layer and InGaN/InGaN multiple-quantum-well layer have advantages and disadvantages, which are contrary to each other. |
Washington, DC—In recognition of 100 days since the murder of The Washington Post journalist Jamal Khashoggi, Rep. Tulsi Gabbard (HI-02) today spoke on the House floor urging Congress to end support for Saudi Arabia.
Video of Rep. Tulsi Gabbard’s Speech is Available Here
Rep. Tulsi Gabbard said:
“100 days ago today, the Saudi regime ordered the assassination of a journalist named Jamal Khashoggi. This brought the world’s attention to Saudi Arabia, a radical Wahhabi theocracy, where the oppression of women and the persecution of Christians, Hindus, atheists, and other religious minorities, as well as the LGBT community is the norm. Since 2015, the United States has supported Saudi Arabia’s genocidal war in Yemen that has killed tens of thousands of civilians, caused millions of Yemeni people to suffer, starve, and get sick, and created the worst humanitarian crisis in the world. They spend billions of dollars spreading the extreme Wahhabi Salafist ideology that fuels terrorist groups like ISIS and Al Qaeda around the world. Contrary to what President Trump believes, Saudi Arabia is not our friend.
“Here we are 100 days later and this Congress still refuses to take action to stop U.S. support for Saudi Arabia and to stop arms sales to Saudi Arabia. Congress must act now to end its support for Saudi Arabia’s genocidal war in Yemen, exercise our constitutional authority over matters of war, and stop putting the profits of the military-industrial complex before the lives of the American people and people around the world.”
Background:
Rep. Tulsi Gabbard is a leading voice for peace in Congress, advocating against counterproductive, regime-change wars. She has called for ending support for Saudi Arabia, pushed for additional oversight on acquisition and cross-service agreements (Section 1271 of the FY19 NDAA), supported H. Con. Res. 81, a bipartisan resolution that sought to stop U.S. military participation in Saudi Arabia's war against the Houthis in Yemen, bipartisan resolution (H. Con Res. 138) to stop U.S. military support for Saudi Arabia's genocidal war in Yemen, bipartisan legislation (H.R. 7082) to immediately stop all military sales and aid to the government of Saudi Arabia, and more.
Reps. Tulsi Gabbard and Walter Jones also introduced H.Res 922, which would reclaim Congress’s constitutional right to declare war by:
Defining presidential wars not declared by Congress under Article I, section 8, clause 11 (Declare War Clause) as impeachable “high crimes and misdemeanors”
Prohibiting the President from perpetuating ongoing wars or supplying war materials, military troops, trainers, or advisers, military intelligence, financial support or their equivalent in association, cooperation, assistance, or common cause without first receiving congressional authorization
Follow Rep. Tulsi Gabbard on social media:
### |
Hacker Mysteriously Dies Days Before Showing How Ordinary Pacemaker Can Be Used To Kill A Man | Blogging/Citizen Journalism
Title: Hacker Mysteriously Dies Days Before Showing How Ordinary Pacemaker Can Be Used To Kill A Man Content: Security researcher Barnaby Jack has passed away in San Francisco, only days before a scheduled appearance at a Las Vegas hacker conference where he intended to show how an ordinary pacemaker could be compromised in order to kill a man. Jack, who previously presented hacks involving ATMs and insulin pumps at the annual Black Hat conference in Vegas, was confirmed dead Friday morning by the San Francisco Medical Examiner’s office, Reuters reported. He passed away Thursday this week, but the office declined to offer any more details at this time. Credit: RT.com Jack’s death came one week to the day before he was scheduled to detail one of his most recent exploits in a Black Hat talk called “Implantable Medical Devices: Hacking Humans.” “I was intrigued by the fact that these critical life devices communicate wirelessly. via Before It’s News | Top 50 stories http://beforeitsnews.com/top50.html
via bitly Read more on Before It’s News |
Akio is an elf in a royal line; he didn’t much enjoy it however. Some people enjoy being rich; pampered. Not him. Akio preferred to be free, to live his life the way he deemed fit…not be told every blessed thing by other individuals. He liked to explore the woods, chase the animals, and spar with his closest friends--not sit complacently inside his padded room and admire his god-sent majesty. Enter Akio’s father. Instead of the respectable, head-of-the-house-hold-great-person-to-admire type of guy, Akio had to put up with a war monger who insisted upon pointing out everyone else’s faults, spare his beautiful self of course. Instead of this, he detested his nobility. Given the choice, Akio would cast off his status like a forgotten cloak, and be done with the whole madness altogether. Most of his house is ashamed of him. There aren’t many who are happy to call him ‘lord’. Neither was Akio for that matter. The fact that his ‘subjects’ were forced to refer to him as such took away any of the respect they might given him in the first place.
Adding to the mess that was his family, Akio had to deal with the loss of his mother, the one person who seemed to care for him. Make no mistake; Akio didn’t waste his time wallowing in the cruelness of Maia; however that didn’t mean he wasn’t about find some way to live out his life the way his mother would have wanted him. He was reasonably certain that his mother would not want him in his father’s care. Akio had known his mother up until he was about the tender physical age of eight. She was the one person who treated him with respect, as an equal. She could hold out for him and be fun, yet at the same time she would instill discipline faster than Akio could commit the next crime. They often had long talks together—many of them highly sophisticated—concerning his father’s tyranny and the slowly corroding state of their lands. His love for the woods was birthed from his mother. She loved to take him deep into the forest, always near his side, and keep watch over him as they both played. She saw no reason why he shouldn’t be allowed to explore a more adventurous path, or an unknown part of their woods that they had simply not gotten too. The woods came to make Akio feel safe.
Yet because of all this, the title of traitor was forced upon him as well. No one had ever dissented against the family and went off on his own before. It was simply unheard of in all its time. As a result of Akio’s ‘callous lack of care’ granted to all that he’s been given, he was considered a disgrace in the eyes of many. Naturally he wasn’t about to not help that cause. There was one thing his father’s guards had bestowed upon him in way of a title that he enjoyed: The Runaway. He actually never saw it coming. One seemingly calm day, Akio had again chosen to disappear from the sight of his father. When he was kindly escorted back, the guards now by the sixth or seventh time were grumbling complaints about “Our lord’s son, The Runaway.” Akio took to the name with glee only because it displeased his father so. Thus he continued to do it; runaway that is. Now he’d been spent for nearly seventeen hours, with each granule of time falling as sand, pushing him, farther and farther from his father’s grasp…
Outcast, Murderer, Demon; These were the many titles Kanataru was accustomed to hearing, and all of them were true statements. At a young age Kana had been exiled from her wolf pack. Her pack mates had been more than eager to rid themselves of the alphas illegitimate runt. In their minds her mere existence had threatened the safety of the pack since the day she was born. Her illegitimacy detoured their respect for her as the Alpha's daughter, especially since her mother was a demon feared by many wolves.Of course, she was never allowed to know of her inheritance. It had been her fathers greatest mistake, but even then he still loved her and raised her. It had taken an extraordinary amount of convincing from his daughter for him to let her go as the pack so desired. They wanted her to leave? Then she would go. During her years as an outcast she spent the first few months in starvation. As a yearling she'd had no idea how to hunt for herself, that was a skill she had been to young to acquire. It was only when she discovered human society that she had the means to feed herself. She had discovered she had the ability to transform into a human, This drastically changed the course of her life, and who she was as a wolf. She would no longer starve to death as the pack had intended for her to do, instead she began living life as a human.When she discovered the necessity of money, and its many uses, she began to pickpocket people, or earn money from the lives she saved from thugs or rapists she'd discover in dark alley ways.She'd also discovered that her body would absorb the tainted souls of every evil being she killed. All of these new discoveries lead to a single question that plagued Kana's thoughts relentlessly; 'What am I?' Her biggest concern, however, was the disturbingly intense desire to feed on human flesh. A dark rooted desire that continued to grow, pushing her mind to the point of insanity.
Akio wandered idily through the woods. How would he spend today? Could he simly meander just outside of his father's grasp? No. To simply, and yet to costly in the end. Because he knew that if he lingered long, he would surely be found, and brought back into his father's unwelcoming arms. The only option was to push forward. Thus far, Akio had remained in very familiar woods--literally. Akio strolled down a well beaten path he had made many times when he was just out for adventure's sake. To the passerby his well trodden path would appear nothing more than a bit of forest; untravled and teeming with vivacious plants and mossy overgrowth. To Akio it was home.
At the present, Akio was considering what the nearest town would be he could go to. It had to be close enough that he could get there by nightfall, yet not so close as to remain within his father's search radius. Akio sermised that his father would be looking anywhere within a 20 kilometer radius of his grounds, which meant that the town of Irmingshire--approximately 14 kilometers due east--should suffice for the night.
As he made his way briskly towards the general direction of the still rising sun, Akio wondered whether or not his mother would approve. He knew that he had long gone past the window of time that his father tied him to, and so he would soon be even more unfit in his eyes. But his mother...would she see him the same? Akio did not doubt that if given the chance, his father would put him under a spell that would bind him, and indded all who he pretended to love, to his own bidding. But enough of this. Akio could not afford to waste time doting on the multi-faceted relationships that comprised his family and the few ties he could call friends.
Sometime later Akio was beginning to enter into a clearer path, this time, a one road beaten down into the earth. He could see plainly where many carts and horse riders had traversed the area, and, quite accurately guessed that it was a trade route. Akio drew his shawl tighter to his face, it would not do to be discovered so easily by his father's guards in disguise. As he made his way swiftly into the crowd of the still bustling streets, Akio slowed to a walking pace. He was blended with the locals now; no more a novelty than the drunken ork on the corner. Akio took a deep steadying breath. He loved nuetral towns. It was in these places that he knew few prejudice existed. Whatever you race or descent, you could at least be met with the level-headedness of those who had taught themselves not to care.
Spotting an inn, Akio quickly turned aside down a different road. He could remember the spot and come back to it once it had grown darker. The time was high noon, and Akio was feeling a bit peckish. He could do with a spot of food and a nice cool drink. He scanned the streets rather conspicuously for a bar he might enjoy. When he found none evident, he decided it would be best to move on to another location within the pleasant town.
Turning a sharp corner, Akio walked lithely into a bustling market corner. The local merchants were buzzing around the area, conversing in a variety of languages to all sorts of people. There was a carpeteer, attempting to sell a rather old bit of carpet to a horntailed lizard; a graying cook who was trying to force some roasted animals on a local elf. Still another was approaching him, pushing a cart filled with a wide assortment of multicoloured liquids in many differnet volumed containers.
Akio gave the scaley demona a quick once over. Perhaps should could fill him with empty promises and lies about how effective her concoctions were, but he wouldn't give her the chance.
"No, thank you." he responded curtly, turning on the spot to head away from the market district. The creature was fast however, turning the cart on one wheel and making her way deftly around him so that they were facing each other again.
"Oh...but I 'av for you ze mos' tasteful of products 'at vould make vones head spin lik' a top! You could share with a lady..."
Akio was poised to move again, this time to simply ignore the blustering comments of the merchant.
"Best price for you sir, best price!" she called shrilly as he began to walk away.
"What am I going to do in this place?" he wondered aloud. Surely there must be some excitment to be had before he left. Unfortunatly a persistant apothecary just wasn't going to cut it. Just as he was beginning to strole down yet another cobbled street, a screem issued from across the busy market district. Someone was obviously not happy with their newly purchased love potion.
Kana wandered aimlessly around the much-to-crowded town as she often did. As far as she knew, this was the only pack of two-leggers (As she often referred to those not graced with the impeccable efficiency of having four legs) in existence, and she had an inscrutably small desire to verify that rather dense assumption. She simply could care less about the excitements that lay beyond the towns reaches or the explicit range of species that could greet her. She'd had enough greeting in her life; it only lead to filling the greeters unrequited desires and that was a task Kana would not take part in.A light breeze picked up that tickled kanas ears as it whisked through the air. Her hand drew up and scratched at her ear madly, flailing like the paw of a canine, mercilessly annihilating the itch. Her temporary stop in the road irritated a handful of what seemed like a plethora of people around her. The small roads were always compact with the abundance of people, karts, and mule drawn carriages. This town, though comparatively small, was always radiant with the flourish of life.A muscular man who appeared to be a guard of some sorts shoved Kana off her feet and out of his way. She thudded to the ground, face-planting into the dirt. She glanced up in time to see the royal emblem the guard was wearing on his armor. 'That's new' she thought as she swiveled back up to her feet in an agile manner continuing on her way again, her new target in her line of sight. 'Such a tainted soul....' her teeth sharpened at the though and her fangs protruded through her gums. The thought of killing him, of feeding off of him driving her over edge. She avoided specific vendors as she followed, knowing of their fatal attacks, this thought made her shudder; not only would she lose sight of her target, but she would also somehow be haggled into buying some faulty potion that she had no use for to begin with. Those darn vendors sure knew how to strike a deal. Kana had spent endless money on useless merchandise. But not today, no sir, she was going to hunt with no distractions."why Ello love! If it i'nt my favowit customah!" a tall man called out as Kana warily made her way through the overly diligent crowd. She turned her head in sheer terror. 'I've been seen!' she quickly reminisced on possible escape tactics she'd attempted before, but her train of thought was interrupted by the shrill sound of screaming. Her eyes narrowed at the sound 'It's time to get to work.' With that distraction, she was off, dashing through the crowd with acute precision. |
Inter Miami CF is approaching its final preseason friendly match in Saint Petersburg, Florida this Saturday, February 22 at 7 p.m. ET. The team will face the Florida-based USL Championship side Tampa Bay Rowdies at Al Lang Stadium in a friendly match open to media and the general public.
The game is part of the 2020 Suncoast Invitational, an annual preseason event in which Major League Soccer (MLS) teams participate in preparation for the upcoming regular season. Fans can access the event free and without a ticket.
“We’ve played three scrimmages, two against MLS teams that have participated successfully in the playoffs, that have been entertaining, and we have competed very well, so we feel calm about that,” said Head Coach Diego Alonso. “We have to continue taking steps forward so we can show good fútbol over the weekend, grow and surely approach the first game in better conditions.“
Inter Miami began preseason preparations just over four weeks ago, kicking off the Club’s first-ever preseason. The group of new teammates and coaches has traveled throughout Florida for the first few weeks of preseason, settling in Saint Petersburg last weekend. The team faced the Philadelphia Union last Saturday, February 15, in its first-ever open friendly match, kicking off its participation in the Suncoast Invitational. The team played an attractive, attacking style of play and controlled the bulk of possession in the match, though it did fall to a 1-2 defeat.
On Monday, February 17, the Club announced the signing of Rodolfo Pizarro from C.F. Monterrey. The team’s other recent additions include Argentine international Nico Figal, Scottish international Lewis Morgan, U.S. Men’s National Team midfielder Wil Trapp, and young Colombian international Andres Reyes.
Inter Miami’s competition for the match, the Tampa Bay Rowdies, is coming off of a 2-1 victory over MLS side Montreal Impact in the Suncoast Invitational.
The Rowdies are also coming off of a strong season in the USL Championship. The team finished fifth out of 18 teams in the Eastern Conference, qualifying for the playoffs. They also reached the third round of the U.S. Open Cup. Guenzatti was the team’s leading goal-scorer in 2019, registering 19 goals.
Single-game tickets to Inter Miami CF’s historic home debut on March 14 against the LA Galaxy have sold out. The only other way to guarantee a ticket to Inter Miami’s first-ever home game is by becoming a season ticket member. Less than 1,000 season tickets remain for the 2020 season. To purchase your season tickets or learn more, click here.
A limited number of single-game tickets remain for Inter Miami’s second home game on March 21 against the New York Red Bulls and third home game on April 5 against the Philadelphia Union are now on sale, visiting https://www.intermiamicf.com/en/tickets/single.
Club Internacional de Fútbol Miami will play all of its home matches at Inter Miami CF Stadium in Fort Lauderdale. Located off Commercial Boulevard and I-95, the stadium stands adjacent to the Club’s new 50,000 square foot state of the art training facility, which includes seven professional fields. The facility will be the home to all Inter Miami teams, including its First Team in MLS, Fort Lauderdale CF in USL League One and the youth development Academy. It will also host international clubs, tournaments and local high school sporting events. |
// +build !ignore_autogenerated
/*
Copyright 2017 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
// This file was autogenerated by conversion-gen. Do not edit it manually!
package v1beta1
import (
conversion "k8s.io/apimachinery/pkg/conversion"
runtime "k8s.io/apimachinery/pkg/runtime"
federation "k8s.io/kubernetes/federation/apis/federation"
api "k8s.io/kubernetes/pkg/api"
v1 "k8s.io/kubernetes/pkg/api/v1"
unsafe "unsafe"
)
func init() {
SchemeBuilder.Register(RegisterConversions)
}
// RegisterConversions adds conversion functions to the given scheme.
// Public to allow building arbitrary schemes.
func RegisterConversions(scheme *runtime.Scheme) error {
return scheme.AddGeneratedConversionFuncs(
Convert_v1beta1_Cluster_To_federation_Cluster,
Convert_federation_Cluster_To_v1beta1_Cluster,
Convert_v1beta1_ClusterCondition_To_federation_ClusterCondition,
Convert_federation_ClusterCondition_To_v1beta1_ClusterCondition,
Convert_v1beta1_ClusterList_To_federation_ClusterList,
Convert_federation_ClusterList_To_v1beta1_ClusterList,
Convert_v1beta1_ClusterSpec_To_federation_ClusterSpec,
Convert_federation_ClusterSpec_To_v1beta1_ClusterSpec,
Convert_v1beta1_ClusterStatus_To_federation_ClusterStatus,
Convert_federation_ClusterStatus_To_v1beta1_ClusterStatus,
Convert_v1beta1_ServerAddressByClientCIDR_To_federation_ServerAddressByClientCIDR,
Convert_federation_ServerAddressByClientCIDR_To_v1beta1_ServerAddressByClientCIDR,
)
}
func autoConvert_v1beta1_Cluster_To_federation_Cluster(in *Cluster, out *federation.Cluster, s conversion.Scope) error {
out.ObjectMeta = in.ObjectMeta
if err := Convert_v1beta1_ClusterSpec_To_federation_ClusterSpec(&in.Spec, &out.Spec, s); err != nil {
return err
}
if err := Convert_v1beta1_ClusterStatus_To_federation_ClusterStatus(&in.Status, &out.Status, s); err != nil {
return err
}
return nil
}
// Convert_v1beta1_Cluster_To_federation_Cluster is an autogenerated conversion function.
func Convert_v1beta1_Cluster_To_federation_Cluster(in *Cluster, out *federation.Cluster, s conversion.Scope) error {
return autoConvert_v1beta1_Cluster_To_federation_Cluster(in, out, s)
}
func autoConvert_federation_Cluster_To_v1beta1_Cluster(in *federation.Cluster, out *Cluster, s conversion.Scope) error {
out.ObjectMeta = in.ObjectMeta
if err := Convert_federation_ClusterSpec_To_v1beta1_ClusterSpec(&in.Spec, &out.Spec, s); err != nil {
return err
}
if err := Convert_federation_ClusterStatus_To_v1beta1_ClusterStatus(&in.Status, &out.Status, s); err != nil {
return err
}
return nil
}
// Convert_federation_Cluster_To_v1beta1_Cluster is an autogenerated conversion function.
func Convert_federation_Cluster_To_v1beta1_Cluster(in *federation.Cluster, out *Cluster, s conversion.Scope) error {
return autoConvert_federation_Cluster_To_v1beta1_Cluster(in, out, s)
}
func autoConvert_v1beta1_ClusterCondition_To_federation_ClusterCondition(in *ClusterCondition, out *federation.ClusterCondition, s conversion.Scope) error {
out.Type = federation.ClusterConditionType(in.Type)
out.Status = api.ConditionStatus(in.Status)
out.LastProbeTime = in.LastProbeTime
out.LastTransitionTime = in.LastTransitionTime
out.Reason = in.Reason
out.Message = in.Message
return nil
}
// Convert_v1beta1_ClusterCondition_To_federation_ClusterCondition is an autogenerated conversion function.
func Convert_v1beta1_ClusterCondition_To_federation_ClusterCondition(in *ClusterCondition, out *federation.ClusterCondition, s conversion.Scope) error {
return autoConvert_v1beta1_ClusterCondition_To_federation_ClusterCondition(in, out, s)
}
func autoConvert_federation_ClusterCondition_To_v1beta1_ClusterCondition(in *federation.ClusterCondition, out *ClusterCondition, s conversion.Scope) error {
out.Type = ClusterConditionType(in.Type)
out.Status = v1.ConditionStatus(in.Status)
out.LastProbeTime = in.LastProbeTime
out.LastTransitionTime = in.LastTransitionTime
out.Reason = in.Reason
out.Message = in.Message
return nil
}
// Convert_federation_ClusterCondition_To_v1beta1_ClusterCondition is an autogenerated conversion function.
func Convert_federation_ClusterCondition_To_v1beta1_ClusterCondition(in *federation.ClusterCondition, out *ClusterCondition, s conversion.Scope) error {
return autoConvert_federation_ClusterCondition_To_v1beta1_ClusterCondition(in, out, s)
}
func autoConvert_v1beta1_ClusterList_To_federation_ClusterList(in *ClusterList, out *federation.ClusterList, s conversion.Scope) error {
out.ListMeta = in.ListMeta
out.Items = *(*[]federation.Cluster)(unsafe.Pointer(&in.Items))
return nil
}
// Convert_v1beta1_ClusterList_To_federation_ClusterList is an autogenerated conversion function.
func Convert_v1beta1_ClusterList_To_federation_ClusterList(in *ClusterList, out *federation.ClusterList, s conversion.Scope) error {
return autoConvert_v1beta1_ClusterList_To_federation_ClusterList(in, out, s)
}
func autoConvert_federation_ClusterList_To_v1beta1_ClusterList(in *federation.ClusterList, out *ClusterList, s conversion.Scope) error {
out.ListMeta = in.ListMeta
if in.Items == nil {
out.Items = make([]Cluster, 0)
} else {
out.Items = *(*[]Cluster)(unsafe.Pointer(&in.Items))
}
return nil
}
// Convert_federation_ClusterList_To_v1beta1_ClusterList is an autogenerated conversion function.
func Convert_federation_ClusterList_To_v1beta1_ClusterList(in *federation.ClusterList, out *ClusterList, s conversion.Scope) error {
return autoConvert_federation_ClusterList_To_v1beta1_ClusterList(in, out, s)
}
func autoConvert_v1beta1_ClusterSpec_To_federation_ClusterSpec(in *ClusterSpec, out *federation.ClusterSpec, s conversion.Scope) error {
out.ServerAddressByClientCIDRs = *(*[]federation.ServerAddressByClientCIDR)(unsafe.Pointer(&in.ServerAddressByClientCIDRs))
out.SecretRef = (*api.LocalObjectReference)(unsafe.Pointer(in.SecretRef))
return nil
}
// Convert_v1beta1_ClusterSpec_To_federation_ClusterSpec is an autogenerated conversion function.
func Convert_v1beta1_ClusterSpec_To_federation_ClusterSpec(in *ClusterSpec, out *federation.ClusterSpec, s conversion.Scope) error {
return autoConvert_v1beta1_ClusterSpec_To_federation_ClusterSpec(in, out, s)
}
func autoConvert_federation_ClusterSpec_To_v1beta1_ClusterSpec(in *federation.ClusterSpec, out *ClusterSpec, s conversion.Scope) error {
if in.ServerAddressByClientCIDRs == nil {
out.ServerAddressByClientCIDRs = make([]ServerAddressByClientCIDR, 0)
} else {
out.ServerAddressByClientCIDRs = *(*[]ServerAddressByClientCIDR)(unsafe.Pointer(&in.ServerAddressByClientCIDRs))
}
out.SecretRef = (*v1.LocalObjectReference)(unsafe.Pointer(in.SecretRef))
return nil
}
// Convert_federation_ClusterSpec_To_v1beta1_ClusterSpec is an autogenerated conversion function.
func Convert_federation_ClusterSpec_To_v1beta1_ClusterSpec(in *federation.ClusterSpec, out *ClusterSpec, s conversion.Scope) error {
return autoConvert_federation_ClusterSpec_To_v1beta1_ClusterSpec(in, out, s)
}
func autoConvert_v1beta1_ClusterStatus_To_federation_ClusterStatus(in *ClusterStatus, out *federation.ClusterStatus, s conversion.Scope) error {
out.Conditions = *(*[]federation.ClusterCondition)(unsafe.Pointer(&in.Conditions))
out.Zones = *(*[]string)(unsafe.Pointer(&in.Zones))
out.Region = in.Region
return nil
}
// Convert_v1beta1_ClusterStatus_To_federation_ClusterStatus is an autogenerated conversion function.
func Convert_v1beta1_ClusterStatus_To_federation_ClusterStatus(in *ClusterStatus, out *federation.ClusterStatus, s conversion.Scope) error {
return autoConvert_v1beta1_ClusterStatus_To_federation_ClusterStatus(in, out, s)
}
func autoConvert_federation_ClusterStatus_To_v1beta1_ClusterStatus(in *federation.ClusterStatus, out *ClusterStatus, s conversion.Scope) error {
out.Conditions = *(*[]ClusterCondition)(unsafe.Pointer(&in.Conditions))
out.Zones = *(*[]string)(unsafe.Pointer(&in.Zones))
out.Region = in.Region
return nil
}
// Convert_federation_ClusterStatus_To_v1beta1_ClusterStatus is an autogenerated conversion function.
func Convert_federation_ClusterStatus_To_v1beta1_ClusterStatus(in *federation.ClusterStatus, out *ClusterStatus, s conversion.Scope) error {
return autoConvert_federation_ClusterStatus_To_v1beta1_ClusterStatus(in, out, s)
}
func autoConvert_v1beta1_ServerAddressByClientCIDR_To_federation_ServerAddressByClientCIDR(in *ServerAddressByClientCIDR, out *federation.ServerAddressByClientCIDR, s conversion.Scope) error {
out.ClientCIDR = in.ClientCIDR
out.ServerAddress = in.ServerAddress
return nil
}
// Convert_v1beta1_ServerAddressByClientCIDR_To_federation_ServerAddressByClientCIDR is an autogenerated conversion function.
func Convert_v1beta1_ServerAddressByClientCIDR_To_federation_ServerAddressByClientCIDR(in *ServerAddressByClientCIDR, out *federation.ServerAddressByClientCIDR, s conversion.Scope) error {
return autoConvert_v1beta1_ServerAddressByClientCIDR_To_federation_ServerAddressByClientCIDR(in, out, s)
}
func autoConvert_federation_ServerAddressByClientCIDR_To_v1beta1_ServerAddressByClientCIDR(in *federation.ServerAddressByClientCIDR, out *ServerAddressByClientCIDR, s conversion.Scope) error {
out.ClientCIDR = in.ClientCIDR
out.ServerAddress = in.ServerAddress
return nil
}
// Convert_federation_ServerAddressByClientCIDR_To_v1beta1_ServerAddressByClientCIDR is an autogenerated conversion function.
func Convert_federation_ServerAddressByClientCIDR_To_v1beta1_ServerAddressByClientCIDR(in *federation.ServerAddressByClientCIDR, out *ServerAddressByClientCIDR, s conversion.Scope) error {
return autoConvert_federation_ServerAddressByClientCIDR_To_v1beta1_ServerAddressByClientCIDR(in, out, s)
}
|
Multi-centre study of a new CEA enzyme immunoassay using monoclonal antibodies.
The use of a new monoclonal enzyme immunoassay (EIA) for the carcinoembryonic antigen (CEA) (Enzymun-Test CEA) was evaluated in a multi-centre study. Fifteen different laboratories [participated in the study. Data from the investigation were analysed in terms of precision, sensitivity, specificity and correlation with other test methods. The intra-assay coefficient of variation was between 1.3% at 23.0 microg/l CEA and 13.9% at 1.3 microg/l CEA. Inter-assay reproducibility ranged from 3.6% to 19.2%. The apparent sensitivity of the new EIA for CEA was approx. 0.5 microg/l CEA. The findings indicate that lipaemic and haemolytic sera and samples taken from icteric, rheumatic and dialysis patients did not have any influence on the results. There was no evidence that drugs commonly used in the treatment of carcinoma patients have any influence on the assay results. A good correlation between the new EIA for CEA and six other CEA enzyme immunoassay or radioimmunoassay methods was registered. These results seem to be of significance in particular for the monitoring of therapy for carcinoma patients. The new EIA for CEA exhibits a high degree of sensitivity, specificity and reproducibility. |
1. Field of the Invention
The present invention relates to data processing systems which rely on programmable logic devices for execution of a sequence of instructions. In particular, the present invention applies to programmable logic devices which store a plurality of configuration words, and execute instructions which include a control field for selecting one of the plurality of configuration words for use in a current execution cycle.
2. Description of Related Art
Programmable logic devices such as field programmable gate arrays ("FPGAs") are a well known type of integrated circuit and are of wide applicability due to the flexibility provided by their reprogrammable nature. An FPGA typically includes an array of configurable logic blocks (CLBs) that are programmably interconnected to each other to provide logic functions desired by a user (a circuit designer). An FPGA typically includes a regular array of identical CLBs, wherein each CLB is individually programmed to perform any one of a number of different logic functions. The FPGA has a configurable routing structure for interconnecting the CLBs according to the desired user circuit design. The FPGA also includes a number of configuration memory cells which are coupled to the CLBs to specify the function to be performed by each CLB, as well as to the configurable routing structure to specify the coupling of the input and output lines of each CLB. The FPGA may also include data storage memory cells accessible by a user during operation of the FPGA. The Xilinx, Inc. 1994 publication entitled "The Programmable Logic Data Book" describes several FPGA products and other programmable logic devices and is herein incorporated by reference in its entirety.
One approach available in the prior art to increase the complexity and size of logic circuits has been coupling multiple FPGAs (i.e. multiple chips) by external connections. However, due to the limited number of input/output connections, i.e. pins, between the FPGAs, not all circuits can be implemented using this approach. Moreover, using more than one FPGA undesirably increases power consumption, cost, and space to implement the user circuit design.
Another known solution has been increasing the number of CLBs and interconnect structures in the FPGA. However, for any given semiconductor fabrication technology, there are limitations to the number of CLBs that can be fabricated on an integrated circuit chip of practical size. Thus, there continues to be a need to increase the number of logic gates or CLB densities for FPGAs.
Reconfiguring an FPGA to perform different logic functions at different times is known in the art. However, this reconfiguration requires the time consuming step of reloading a configuration bit stream for each reconfiguration. Moreover, reconfiguration of a prior art FPGA generally requires suspending the implementation of the logic functions, saving the current state of the logic functions in a memory device external to the FPGA, reloading the entire array of memory configurations cells, and inputting the states of the logic functions which have been saved off chip along with any other needed inputs. Each of these steps requires a significant amount of time, thereby rendering reconfiguration impractical for implementing typical circuits.
Thus, as described in our co-pending U.S. patent application entitled TIME MULTIPLEXED PROGRAMMABLE LOGIC DEVICE, invented by Stephen M. Trimberger, Richard A. Carberry, Robert Anders Johnson, and Jennifer Wong, filed Aug. 18, 1995, having application Ser. No. 08/516,186, now U.S. Pat. No. 5,646,545, programmable logic devices have been developed in which a plurality of configuration words are stored on the device. The programmable logic device switches between configurations sequentially, by random access, or on command from an external or internal signal. This switching is called "flash reconfiguration". Flash reconfiguration allows the PLD to function in one of N configurations, where N is equal to the number of memory cells assigned to each programmable point, or the number of configuration words stored simultaneously on the PLD. Thus, assuming eight configuration words on the PLD, the PLD implements eight times the amount of logic, executable in a time shared fashion, than is actually contained in any one configuration.
It is desirable to extend the flash reconfigurable programmable logic device architecture to general purpose processing structures, such as for use in sequential processing of instructions. |
"The greatest mistake you can make in life is to be continually fearing you will make one." ~Elbert Hubbard
"Happiness is not a goal; it is a by-product." ~Eleanor Roosevelt~R.I.P. Grandma 6/22/33 - 10/5/10~
Re: 6/11 The Bachelorette 8: Episode 5 **West Coast Spoilers**
My view of Jef is that he seems very eager to please, very desperate. Ugggh.
What scares me is that if I were in Emily's shoes, I'd probably be lapping it up like she is. I'd like to think I'm smart enough to recognize when something like that is happening to me, but the fact is that when somebody is doting on you, it's really easy to enjoy the ride. |
/*
* Copyright 2014 Google Inc.
*
* Use of this source code is governed by a BSD-style license that can be
* found in the LICENSE file.
*/
#ifndef GrRRectEffect_DEFINED
#define GrRRectEffect_DEFINED
#include "GrTypes.h"
#include "GrTypesPriv.h"
class GrProcessor;
class SkRRect;
namespace GrRRectEffect {
/**
* Creates an effect that performs anti-aliased clipping against a SkRRect. It doesn't support
* all varieties of SkRRect so the caller must check for a NULL return.
*/
GrFragmentProcessor* Create(GrPrimitiveEdgeType, const SkRRect&);
};
#endif
|
Introduction {#Sec1}
============
Problem {#Sec2}
-------
With the prosperity of social media over the past 15 years, the society has witnessed the plethora of online opinion expression and even polarization (Del Vicario et al. [@CR22]; Mohammad et al. [@CR51]). Accordingly, a stream of research has emerged regarding sentiment expressed in posts (Nanli et al. [@CR53]; Cambria et al. [@CR11]; Mäntylä et al. [@CR48]). Although there are numerous commercial applications of sentiment analysis (Rambocas and Pacheco [@CR60]), academic researchers have primarily studied sentiment in political contexts. Sentiment analysis of media tone, agenda-setting, election forecasting, and candidate evaluations has developed (Rudkowsky et al. [@CR61]) in different political contexts (Kim and Krishna [@CR39]; Doroshenko et al. [@CR25]; Fogel-Dror et al. [@CR26]).
The dominant methods for sentiment analysis (Kharde and Sonawane [@CR37]) seek to classify messages as positive or negative for use in machine or deep learning using neural network models (Zhang et al. [@CR78]). Less common are methods that measure the degree of positivity or negativity in texts. Classification of textual content into categories of positive or negative (Liu and Zhang [@CR45]; Mäntylä et al. [@CR48]) counts frequencies of sentiment words in a lexicon, a predefined list or dictionary of positive and negative words. Counting individual word frequencies is referred to as a "Bag of Words" (bag-of-words) model because the approach treats all of the words in textual units of observation in a disaggregated way, jumbled together with no relations among them. The proximity of words in the text is ignored. The bag-of-words sentiment scores are simple nominal counts of positive and negative words out of context.
In communication science, rather than classification, content analysis of messages to measure the degree of positive and negative sentiment associated with a target is often the goal. This content analysis requires a different measurement model than bag-of-words, one based on a network approach. Although most social network analyses are of relationships among entities such as individuals, groups, organizations, or nations (Rogers [@CR64]; Monge et al. [@CR52]; Borgatti et al. [@CR7]), a network model has also been useful in treating words in the text as nodes and their proximate co-occurrences as links, forming a semantic network (Danowski [@CR15], [@CR16], [@CR17]; Carley [@CR12]; Corman et al. [@CR14]).
Some recent examples of semantic network analysis include work by Danowski and Park ([@CR19]), Jiang et al. ([@CR36]), Calabrese et al. ([@CR9], [@CR10]), and Danowski and Riopelle ([@CR20]). Semantic network analysis covers a wide range of aspects of meaning (Osgood et al. [@CR54]). An important advantage of semantic network analysis is it illustrates the relationships among words in the text, thus generating insights about the structures and meanings of the entire text. Here we are concerned only with sentiment, which is just one dimension among many that semantic network analysis can index in the study of texts. Nevertheless, we present a sentiment analysis approach building on word relationships and embeddedness in texts. The method can potentially be applied to other dimensions of texts, as long as researchers are interested in looking for the strength of relationships between a target word and a particular category of words.
Research goal {#Sec3}
-------------
Our main goal is to propose a semantic network-based measure of sentiment with respect to a target (the name of person, organization, group, brand, etc.) by identifying the shortest paths connecting the target with sentiment words. To evaluate the semantic network method, we compare the measure to ground-truth data, sentiment judgements made by human annotators. We examine whether the network-based sentiment scores for texts they classified as positive or negative have the expected higher sentiment valence with respect to a target. For example, if we take the texts classified as negative and compute the strength of association of a target with negative sentiment words, we would expect that our network method produces sentiment ratios with higher negativity than positivity. Likewise, texts classified as positive should show higher positivity than negativity. This would be evidence for its internal validity. External validity is assessed based on testing hypotheses about sentiment in television news coverage of the coronavirus pandemic using the sentiment metrics.
The key to moving beyond atomistic bag-of-words counts to a semantic network model is to consider their proximities, how words are paired with one another as a window slides through the text, centering on one word after another, tabulating all of the word pairs appearing within the window (Danowski [@CR16]), and stopping at the end of a sentence and restarting at the beginning of the next sentence. The stochastic slide produces a continuous stream of bigrams representing words in context. The result is an adjacency list of edges, where each row is a pair of words, followed by their co-occurrence frequency, which is the basis for semantic network analysis. Once we have the network, we trace the shortest paths from sentiment words to a target word and from a target to the sentiment words to produce ratios of positivity to negativity.
With the identification of word pairs in a text and their co-occurrences, network analysis of these bigrams enables measurement of the distances between words based on the shortest paths linking them. As shown in Fig. [1](#Fig1){ref-type="fig"}, to decide sentiment for the target word, we first look for sentiment words in the network and the closest path between the target and the sentiment words. In this case, the target links to three sentiment words. The path may originate from the target to the sentiment word (e.g., Target to Sentiment Word 1), from the word to the target (e.g., Sentiment Word 2 to Target), or in both directions (between Target and Sentiment Word 3). The shortest path between Target and Sentiment 1 passes through Word 2. The shortest path between Target and Sentiment Word 1 is a direct link between the two and so on. To illustrate this with actual data, in the IMDB review database,[1](#Fn1){ref-type="fn"} the shortest path linking "film" with "suspense" is: film → good → action → suspense. Another example is from media coverage after the April 2010 Deepwater Horizon Gulf Oil Spill. Using "spill" as a seed and "responsible" as a target resulted in this strongest path: spill → gulf → mexico → oil → giant → bp → responsible. This shows how shortest paths can reveal the strings that tie concepts together, based on the contexts of words.Fig. 1A graphic illustration of the network-based approach
Given a lexicon of positive and negative words, the network-based sentiment analysis then measures the closeness of the sentiment words to a target word of interest. In this way, we have a more precise micro-level analysis of sentiment concerning a target, compared to simple non-specific sentiment scores based on frequency counts of positive and negative words appearing anywhere in the textual unit of observation. This kind of sentiment analysis is an example of "aspect-based" sentiment analysis (Pontiki et al. [@CR58]).
Without the proximity information about word co-occurrences, sentiment can only be measured at the level of the whole textual unit, such as a speech, report, news article, tweet, etc., and not for a particular target word of interest. The target-specific scoring of sentiment is particularly suited to communication perspectives. Strategic communication typically seeks to strengthen or weaken associations of attributes linked with target concepts, issues, or introduce new ones.
Shortest paths {#Sec4}
--------------
The network approach to target-specific sentiment scoring enables the application of a fundamental network concept, that of the shortest paths between nodes in the network (Dijkstra [@CR23]). We can compute for each sentiment word its distance from the target in terms of the geodesic, the number of links in the shortest path. The effect of distance on the association between words is the inverse-square law of physics: transmission of energy in a medium is inversely proportional to the square of the distance from the source.
In network models, distance is a function of the number of links in a path. Shorter paths mean the target is closer to the sentiment words in the network. Closeness is not simply a matter of the raw number of steps in the path. There is a decay function, which is the square of the number of these edges. Although a direct edge between two words is the strongest, each time an intermediate edge lengthens the path, there is a drop-off of network effects from the start node. This is the denominator in our sentiment strength formula. The numerator is the sum of the edge weights along the shortest path. Once we have the numerator and denominator, we can compute the sentiment strength of the path, dividing the sum of the strengths across the path by the square of the number of edges. This computation enables our calculation of a set of sentiment metrics, positivity, negativity, and the sentiment ratio.
Literature review {#Sec5}
=================
Sentiment analysis gauges the attitudes, opinions, and emotions of people based on textual data such as online reviews and blog posts (Liu [@CR44]). In this section, we discuss the major methods used to conduct sentiment analysis and review their advantages and disadvantages.
Bag-of-words approaches to sentiment analysis {#Sec6}
---------------------------------------------
### Lexicon-based measures {#Sec7}
The most simple and common approach for sentiment analysis is using a predefined lexicon or dictionary containing sentiment words, their affective orientations, and sometimes the strength of its orientation. Following the bag-of-words approach, lexicon-based approaches first break down a body of text into independent words. Then it counts the frequency of sentiment words (which are defined by the lexicon used) that appear in the text and computes a sentiment score of the text based on the word count.
Commonly used sentiment lexicons include Linguistic Inquiry and Word Count (LIWC) (Tausczik and Pennebaker [@CR70]), SentiWordNet (Baccianella et al. [@CR4]), and the bing lexicon. Whereas some lexicons, such as Bing, contain words in binary categories, others, like SentiWordNet, provide a ratio indicating the strength of the words' orientation. Lexicon-based sentiment analysis is an unsupervised method that is easy to apply and not domain-dependent. It can be highly accurate if used appropriately (Kundi et al. [@CR41]; Asghar et al. [@CR2]; Khoo and Johnkhan [@CR38]). However, a limitation of lexicon-based measures based on the bag-of-word approach is that it only focuses on the frequency of single, tokenized words. It omits the contexts of the words based on their co-occurrences in the texts that are critical to sense-making. In other words, you just get one score for an entire text regardless of the number of persons, organizations, or brands mentioned.
### Machine learning classification {#Sec8}
The machine learning approach utilizes supervised learning, which starts by extracting features from a body of text (Liu [@CR44]). Machine learning algorithms applying the bag-of-words approach treat single words as semantic features. Based on the features and outcomes (e.g., annotated sentiment of texts) it learns from the training text data, it classifies texts into different sentiment categories such as positive, negative, and neutral. The key to the performance of machine learning lies in the effectiveness of the features it extracts. The machine learning approach has the edge over the lexicon-based measures as it acquires information directly from the text body rather than a standard lexicon (D'Andrea et al. [@CR21]). Therefore, it is better customized to the text data.
Several software vendors, including IBM (Watson), Google (Cloud Natural Language), Amazon (Comprehend), and Microsoft (Azure) have developed their own proprietary machine learning algorithms for sentiment analysis. These algorithms are relatively easy to use but are not transparent (since they are proprietary) and can be expensive for researchers. This is because a machine learning-based sentiment analysis can be costly to develop. It requires a considerable amount of text data to train an accurate classification algorithm and may need human coders to annotate the training texts. It may also work better for long documents rather than short reviews or tweets so that there are more words to serve as textual features for classification (Khoo and Johnkhan [@CR38]). Machine learning classification using a bag-of-words approach also shares the same limitation with the lexicon-based approach as it only uses independent words and ignores the contexts in which the words are embedded.
### Word embeddings for sentiment analysis {#Sec9}
A relatively recent development in natural language processing is word embeddings (Mikolov et al. [@CR50]). Word embeddings are techniques that map words in a text into numeric vectors in a vector space. Instead of assuming words as independent, as the bag-of-words approach does, word embeddings often operate based on a sliding window and extract features from a sequence of words co-occurring in a body of text. The approach thus is in alignment with the semantic network perspective and takes into consideration word contexts. Based on how words appear with one another, word embedding algorithms represent the words in the vector space, in which words used in similar ways are closer to one another.
Word embeddings may be applied in two ways in sentiment analysis. The first is by extracting words and their relations in the texts as features for sentiment classification (Kumar and Zymbler [@CR40]). Researchers have also applied pre-trained word embedding corpora to classify texts. So when target texts contain words that did not appear in the training dataset, the algorithm can make judgments about text sentiment based on how close the new words are to the words appeared before in the relational corpora (Rudkowsky et al. [@CR61]). Just like other machine learning models, training with word embeddings requires the dataset to be large to produce an accurate mapping of words in a text. If pre-trained word embedding corpora are used, then the algorithm does not directly learn from the body of text being analyzed and thus may not precisely capture the local context of the texts under scrutiny.
Aspect-based sentiment analysis {#Sec10}
-------------------------------
Based on the unit of analysis, sentiment analysis can also be classified to be either subjectivity/objectivity identification or feature/aspect-based. Subjectivity/objective identification, as used by studies cited above (e.g., Kumar and Zymbler [@CR40]; Rudkowsky et al. [@CR61]), classifies the sentiment of an entire text. By contrast, aspect-based sentiment analysis takes a more fine-grained approach, aiming to determine sentiment in parts of texts (e.g., opinions regarding different attributes of a product or service) (Pontiki et al. [@CR58]; Thet et al. [@CR71]; Wang and Liu [@CR76]). For example, when analyzing an online review of a hotel, the subject/objective identification estimates the general sentiment of the review, whereas the aspect-based sentiment analysis may examine how positive the review is toward the location, service, room, and food of the hotel. Therefore, the first step of the aspect-based sentiment analysis involves parsing texts into different linguistic components through automated algorithms such as topic modeling (Thet et al. [@CR71]). After the texts are broken down, researchers can then choose to apply sentiment analysis discussed above to measure the aspect-specific sentiments. Aspect-based sentiment analysis thus provides more detailed and accurate information regarding the sentiment in texts, which can be particularly useful when one needs to understand opinions about specific features.
Summary {#Sec11}
-------
Existing sentiment analysis methods commonly apply the bag-of-word approach, breaking texts down to independent words without considering word contexts. The more recently proposed word embeddings approach is gaining traction, but machine learning using the approach requires a large amount of data. Using pre-trained word embeddings makes judgments based on previously collected data rather than the body of texts being analyzed, therefore risks missing critical information in the local word context. The semantic network-based approach to sentiment analysis proposed in the current study complements the above approaches. It overcomes the limitations of the bag-of-words approach by gauging the contexts of words in texts based on word sequence and co-occurrence. It has an advantage over machine learning approaches as it does not need a large amount of data and measures sentiments based on the local information in a given text.
Moreover, it allows fine-grained sentiment analysis at the aspect or feature level like aspect-based sentiment analysis does. Instead of relying on unsupervised learning algorithms such as topic modeling to identify features in a text, our approach enables researchers to name the target word of interest (the name of person, organization, event, or brand, e.g., iPhone) and generates a score indicating sentiment toward this specific target. Thus, the sentiment network method can generate sentiment scores for multiple targets of interest in the same text, which enables a comparison of the results among them.
Sentiment network approach {#Sec12}
==========================
The sentiment network approach measures target-specific sentiment based on shortest paths between the target and sentiment words in the semantic network. The approach has five major advantages over bag-of-words classification approaches. (1) A key advantage is that the network method measures sentiment concerning targets, which is possible because the basic unit of analysis is the word pair in a sentence, not a document. The more micro-level word pairs are links in a chain, forming shortest paths that extend across text units, enabling tracing the closeness of sentiment words to a target word. (2) A further advantage is that the sentiment network approach can compare multiple targets in the same corpus, which expands the scope of hypotheses that can be tested.
\(3\) The network method includes a way to deal with sentiment ambiguity such as negation. Some text units have a mixture of positive and negative sentiment (e.g., "He was happy that the evil one died.") and negations (e.g., "not good"). The bag-of-words approach is not good at dealing with negations since it treats words as independent. Human annotations are perhaps a better solution for judging mixed sentiment texts and negations, although measurement error can be high, particularly when they are forced to classify texts into either positive or negative categories. In contrast, the network approach enables better management of this error. By shifting the handling of such ambiguity from the individual text unit level to the aggregated paths of words across the corpus of texts, mixed sentiment strings are tractable. We look at the empirical nature of mixed sentiment in the results section.
\(4\) A further advantage of our approach is that we avoid problems with some common practices of natural language processing, such as stemming (Porter [@CR59]) or lemmatization (Plisson et al. [@CR100]). It began as an attempt to improve information retrieval (Lovins [@CR79]; Porter [@CR59]). When the goal was finding relevant articles, morphological word endings were considered noise in identifying the important concepts. Reducing morphological variations of unique word strings down to root words by removing suffixes, increases coverage but lowers measurement precision.
In non-retrieval applications, stemming may be useful when the quantities of text are small, so a wider net is needed to increase counts to avoid those less than five, or when the goal is classification into linguistic categories. Nevertheless, stemming obscures important aspects of meaning carried by languages such as tense, singularity/plurality, and the nature of relationships among words. The reduction of linguistic variance obscures finer-grained semantic relationships.
\(5\) An additional advantage of sentiment network analysis' over bag-of-words approaches is that it better informs message design for communication campaigns. One could move to a level below the summary scores and identify which particular sentiment words have the highest and lowest strengths concerning a target. These could inform campaign message design, enabling messages to have the same expressions as that found in the texts. The retention of the raw morphological forms of words enables a greater correspondence of the natural language in the texts and in the messages created. This framing of messages in the language of targeted groups is likely to increase message effectiveness (Scheufele and Tewksbury [@CR67]). The analysis of directed links as message pairs retains embedded syntactical information such that one could select a target as the start word, and a sentiment word as the end word, extracting the strings of words along the path to form optimal campaign messages or for summarizing features of the semantic network (Danowski [@CR15], [@CR16]).
The results of an experiment (Danowski [@CR16]) led to the conclusion that if the goal is to reinforce the dominant associations in the text, one would select the most central and strongly linked sentiment words, while if the goal were to attract attention to an innovation, one would select the central words with less frequent co-occurrences, whose novelty arouses attention and engagement (Danowski [@CR15], [@CR16]). This process could be repeated for different sentiment words to produce messages that have multiple statements. With the core points sketched out in this manner, one could edit these optimal message strings to be grammatically correct and fill in function words dropped in the network analysis of the text. WORDij's Opticom module produces the shortest paths between a seed and target word.
Shortest path algorithms {#Sec13}
------------------------
The network approach to sentiment finds the shortest paths between target and sentiment seeds. There are a number of shortest path algorithms (Golden [@CR31]). For any two words in the text, one can trace a sequence of edges that connect them. Two of the most widely used shortest path algorithms are Dijkstra (Dijkstra [@CR23]) and Bellman--Ford (Bellman [@CR5]; Ford [@CR27]). When dealing with millions of nodes and long computing times, parallelization is desirable. Bellman--Ford is suited to parallelization (Hajela and Pandey [@CR32]) because it's search for shortest paths can be independently performed for all the nodes. As well, the search for shortest paths beginning with a fixed node, called a single source shortest path, can also be made in parallel. In contrast, the Dijkstra algorithm needs to compare all the nodes to find out the minimum distance values. This topological structure cannot be parallelized.
To efficiently deal with the high volumes of words common in social media data, our method uses the Bellman--Ford algorithm in a three-step process. First, we use Bellman--Ford to find the shortest unweighted paths in the network (which means we can trace the links from one word to another without taking into account their word pair frequencies), second, we invert the path lengths and square them so that the shortest paths have the highest numerical values, third, we sum the co-occurrence counts, and fourth, we multiply the path statistic times the sum the weights to measure the magnitudes of association, the strength of the path.
Note that shortest path algorithms use costs as edge weights and find the lowest cost path to traverse from node A to node B, while our measure of edge strength is word pair co-occurrence frequencies, the inverse of costs. This edge weight inversion is the major pivot from transportation routing networks to semantic and social network analysis, where the edge weights are indicators of cohesion rather than costs.
Sentiment network measures and ground-truth {#Sec14}
-------------------------------------------
To establish the internal validity of our network measures of sentiment, we align the automated procedures with human annotators' judgments as to whether a text unit is positive or negative. The comparison is rather crude in that the humans make a categorical classification judgment just like automated bag-of-words methods. The more precise continuous sentiment network measures are compared to nominal classification, where the human must make a decision for a whole text unit, not giving a continuous rating. Many messages contain both positive and negative features, so the categorical classification that annotators may make errors. Ground-truth is, in this sense, a partial truth.
Nevertheless, it is useful to examine the extent to which semantic network sentiment scoring for targets corresponds to the annotation classifications. We expect to find that texts classified by annotators as negative have higher negativity toward targets, while positive ones have higher positivity. This pattern would be evidence supporting the internal validity of the semantic network approach.
Hypotheses {#Sec15}
----------
Although there is no way to statistically compare a network method to bag-of-words, because the latter cannot measure target-specific sentiment, we can test hypotheses about whether the network approach is consistent with the annotation results. Our null hypothesis is that the network positivity scores for targets based on positive annotations are no different than negativity scores, and likewise that the network negativity scores based on the negative annotations are no different than the positivity scores. Our main hypothesis is that the positivity scores are higher than negativity scores when positive annotations are analyzed and negativity scores are higher than positivity scores when negative annotations are analyzed. Accordingly, we test for the internal validity of the sentiment network measures by way of their alignment with the ground truth categorizations in two datasets: (1) tweets about airlines and (2) a sample of tweets regardless of topic. Then, we examine external validity in which we test hypotheses about sentiment, panic, and social distancing in TV news about the coronavirus.
Methods {#Sec16}
=======
Data {#Sec17}
----
We use two ground-truth datasets in this research. A third dataset is for assessing the predictive validity of the sentiment network method.
### Dataset 1 {#Sec18}
The dataset includes tweets about five US Airlines: United, US Airways, Southwest, Delta, and Virgin America, scraped during February of 2015. The dataset contains 14,845 tweets, comprising 1.5 MB that workers classified as either positive, negative, or neutral. We selected the positive and negative categories for analysis. The data are available on the crowdsourcing website Kaggle.[2](#Fn2){ref-type="fn"} Rane and Kumar ([@CR62]) reported an analysis of the dataset.
### Dataset 2 {#Sec19}
A second dataset is the ground-truth tweet data[3](#Fn3){ref-type="fn"} analyzed by Hutto and Gilbert ([@CR35]) in their testing of the VADER sentiment analysis method. Rather than relying on several annotators, this work used 20 Amazon Turk workers who rated each tweet from − 4 to + 4 in terms of negative to positive sentiment.
Nevertheless, to compare sentiment network scores to the annotations, we converted sentiment scores into four categories: highly negative, negative, positive, and highly positive. Another aspect of the data required a modification of our procedures compared to the analysis of dataset 1. Because the tweets were a representative sample from the Twitter API and not selected based on topics, the target we chose was a generic word referring to an object, "it."
### Dataset 3 {#Sec20}
To assess the external or predictive validity of the sentiment network measures, we analyzed data on television news coverage of the coronavirus. Data were available for January 1 through March 26, 2020, from the GDELT project.[4](#Fn4){ref-type="fn"} There are 14 news outlets included. Broadcast outlets were ABC, CBS, and NBC. Among the 24-h networks, business news channels included Bloomberg, CNBC, and Fox Business Channel. General news networks were CNN, CSPAN, Fox News, and MSNBC, while BBC, Al Jazeera, Deutsche Welle, and RT were foreign channels. The data were keyword-in-context snippets of text in which the center word was 'coronavirus (or covid-19)' and words appearing 150 characters before and after were provided.
### Hypotheses {#Sec21}
We tested four hypotheses and addressed a research question about the coronavirus topic in television news:
#### **H1** {#FPar1}
Broadcast news expresses less sentiment about coronavirus, social distancing, and panic than non-broadcast news outlets.
The rationale is that with more limited time slots for news, broadcast news has a smaller programming window than 24-h cable news networks. The average time per story for the nightly network news was 2 min and 23 s, according to the Pew Research Center.[5](#Fn5){ref-type="fn"} This time factor affects the content presented, leading to a more summary treatment. The inverted pyramid style that places the who, what, where, why, and how at the top of the story may not leave much room for more than initial expressions of sentiment. Another factor may be that these TV news shows have the longest history, beginning in an era of objective journalism. The traditional orientation may continue to some extent in the current era of advocacy journalism.
### Social distancing {#Sec22}
The goal of "flattening the curve" for the spread of the disease is treated in the media[6](#Fn6){ref-type="fn"} as accomplished through increased social distancing.[7](#Fn7){ref-type="fn"} Epidemic management models (Glass et al. [@CR30]; Valdez et al. [@CR72]) have identified social distancing as essential to controlling the spread of infectious disease. In the coronavirus case, governments have promoted social distancing, emphasizing its positive effects in saving the lives of vulnerable segments of the population.[8](#Fn8){ref-type="fn"}
It is interesting to consider the inversion of polarity associated with social distancing. Typically, social distancing has been considered a negative concept (Westphal and Khanna [@CR77]; Swim et al. [@CR68]; Polansky and Gaudin [@CR80]), with norms favoring social cohesion (Forrest and Kearns [@CR28]) and the reduction of social differences. Differences between social groups (Verba and Nie [@CR73]) were considered harmful to the health of a democratic society. As well, individuals who socially distanced themselves were conceptualized as loners with less stable psychological and social functioning (Hojat [@CR33]). Because social distancing is advocated as a temporary effort in the context of epidemics, when these processes subside, the polarity inversion in public communication about social distancing is likely to recede. Nevertheless, study of short-term and longer-term effects of social distancing on psychological and social variables is warranted.
### Panic {#Sec23}
When widespread crises occur, there is often accompanying mass panic (Mawson [@CR49]). Mention of panic in the news is likely associated with negativity. Normally, negative information increases attention, information seeking, reasoning, and decision-making. Nevertheless, with increasing negativity, once a threshold is crossed negativity is no longer a stimulus to these rational responses to negative information. Rather, such higher level cognitive processes are short-circuited as panic sets in. With mass panic, herd behavior moves individuals to follow others without critical and rational thinking, operating at a more animalistic level.
#### **H2** {#FPar2}
There is a negative bias in the coronavirus news across channels.
Many observers of media news assert that news media have a negative bias. Research supports this notion (Hofstetter [@CR101]; Hackett [@CR81]). News media strive to attract the largest audiences. Consider their negative bias in light of the findings of laboratory research. Individuals' brains have a negative bias, more quickly processing negative than positive information (Taylor [@CR69]). The brain's negative bias may explain the media's negative bias.
#### **H3** {#FPar3}
Uncertainty in news coverage of coronavirus increases sentiment over time.
When uncertainty increases, both negative and positive sentiment increases, based on laboratory experiments (Bar-Anan et al. [@CR82]), both negative and positive affect increases. Uncertainty and sentiment mutually increase one another. This results in a synchronous correlation of the two terms. Nevertheless, there may be some lagged effects such that one of the two concepts may lead the other.
#### **H4** {#FPar4}
Sentiment increases are associated with an increased volume of news stories.
In a study of sentiment and media coverage of the BP Deepwater Horizon Gulf Oil Spill (Danowski and Riopelle [@CR20]) we found that increases in sentiment were synchronously correlated with increased media coverage. Our theory suggested that sentiment increases attention, information seeking, analysis, decision-making and broadens the view of the situation (Taylor [@CR69]). Here we repeat the hypothesis test with the coronavirus coverage. The rationale is that the theory specifies that the sentiment and media volume relationship is general across topics. Nevertheless, certain topics develop the effects of sentiment more rapidly.
#### **RQ1** {#FPar5}
Are 24-h business news, general news, and foreign news channels different in the sentiment expressed toward coronavirus, social distancing, and panic?
The fact that there are four different types of news channels: broadcast, 24-h business channels, general news, and foreign news, enables us to examine their differences in sentiment, in addition to H1's expectation that broadcast will have less sentiment than the non-broadcast channels. The content differences between business and general 24-h news channels may be associated with differences in sentiment. As well, because of the different cultural contexts in which domestic and foreign channels are embedded, these may affect the sentiment they express.
Preprocessing the corpora {#Sec24}
-------------------------
Our procedures for preprocessing the corpora and normalizing the data were as follows.Drop words on a stop-word list.Do no stemming.Remove punctuation (except sentence endings).Extract aggregate word pair counts using a sliding window three words wide on either side of each word. \[Stop pairing at the end of a sentence when finding a period "." exclamation point "!" or question mark "?".\][9](#Fn9){ref-type="fn"} Drop word and word pair frequencies less than 3. In the area of computational linguistics dropping frequencies of 1 and 2 is a common practice because these low-frequency pairs do not add value to the results (Church and Hanks [@CR13]). Word and word pair frequencies follow a power-law distribution, meaning that most word and word pairs occur less than 3 times. Dropping them produces a more normal distribution. Another consideration is that including words or pairs appearing only once or twice does not add explanatory power, yet it increases the computation load.
Sentiment lexicon development {#Sec25}
-----------------------------
Sentiment analysis typically uses a lexicon or dictionary that contains positive and negative sentiment words. To construct a lexicon for this research, we began with the positive and negative emotion dictionary from the LIWC program (Pennebaker et al. [@CR57]). It stems words, which reduces them to their roots, removing morphological variants. For example, "walked, walking, walks, walker" are converted to "walk." Although this is good for small corpora to increase word counts, it limits linguistic precision, because there are different meanings for various morphological endings. These nuances are lost with stemming to root words.
Accordingly, we de-stemmed the LIWC 266 positive and 346 negative stems, looking up each in the AGID list of inflections (Atkinson [@CR3]). We also included the positive and negative word lists from Loughran and McDonald ([@CR46]), who analyzed SEC financial report text. Also, we added positive and negative lexicons developed by Liu ([@CR83]),[10](#Fn10){ref-type="fn"} as well as sentiment lexicons from Khoo and Johnkhan ([@CR38]). After removing duplicates, the positive lexicon numbers 4485 words, and the negative lexicon contains 6466 words.
Sentiment network analysis procedures {#Sec26}
-------------------------------------
Read in edge lists of word pairs and co-occurrence weights. Read in text files containing lists of positive and negative seed words.Run the Bellman--Ford shortest path algorithm to identify the paths from targets with sentiment seed words, then tabulate for each file of seed words the sum of the weighted shortest paths from the seed words to a specified target word, and from the target word to the seed words. This bi-directional tabulation ensures we capture the positive and negative seed words before and after a target word. So that larger numbers indicate closer ties, the path lengths are inverted and squared based on the Inverse Square Law. Then the sum of the co-occurrence weights along the path is multiplied by these inverse squared shortest path values. The result is the measurement of sentiment toward a target, with a value for positivity and negativity.Output positivity and negativity metrics: normalized negativity, the sum of weighted shortest paths to negative seeds divided by the square of the inverse of the number of edges along the path, divided by the number of possible negative seeds;normalized positivity, the sum of weighted shortest paths to positive seeds divided by the square of the inverse of the number of edges along the path, divided by the number of possible positive seeds; andthe ratio of normalized positivity to negativity. Ratios less than one indicate that there is more negativity than positivity. For example, if the score were .50, this would indicate that there was twice as much negativity than positivity. Scores above one indicate increasing positivity, without an upper bound.
Computing edge lists {#Sec27}
--------------------
One can produce the edge lists for sentiment network analysis in a variety of ways. There are Python and R packages, such as word2vec (Mikolov et al. [@CR50]), or gensim (Řehůřek and Sojka [@CR63]) which can produce adjacency or edge lists. We used WORDij software (Danowski [@CR18])[11](#Fn11){ref-type="fn"} to produce these lists of word pairs and weights. Analysis in WORDij is automated, not requiring coding and the loading of various packages.
We call the program we developed for sentiment network analysis SENET, an acronym derived from "SEntiment NETworks." The program is coded in C++, and the shortest path procedures are parallelized to enable the code to run efficiently on large adjacency lists. SENET takes as input a list of word pairs and co-occurrence frequencies. The edge list has as a row for each pair of words found through the word windowing process: \[word A string, word B string, numeric co-occurrence value\]. Run times are such that a file containing 2 million word pairs and 200,000 unique words, comprising 1 Gb of text runs in several minutes on a common laptop.
Results {#Sec28}
=======
Prior to producing the results in this study, we analyzed negation in terms of pure and mixed sentiment paths. We report these results first.
Pure versus mixed sentiment paths {#Sec29}
---------------------------------
When a shortest path contains only one kind of sentiment word, positive or negative, this is a pure sentiment path. Mixed sentiment paths have a combination of positive and negative words. Of the shortest sentiment paths for the two ground-truth datasets, 47% were pure positive, 39% pure negative, 9% of the paths linking targets with positive lexicon words also included negative lexicon words, while 6% of paths linking targets to negative words had some positive words. To see if these mixed paths could be converted to negative or positive, we had three coders judge a random sample of 40 mixed paths as to whether they should be considered as negative, positive, and questionable.
The reliability was .69, below the standard of .80 and above. We found that the percentage of negative and positive recodes was accompanied by a relatively high percentage of paths that were questionable. Of mixed paths, 56% were judged as negative, 29% as positive, and 20% as questionable. Coders reported that they were not confident of their judgments on the mixed paths. So, if we recoded these, it would introduce considerable error. Recall may have increased, but precision would have suffered. Since the percentage of mixed paths was relatively low compared to pure sentiment paths, averaging 7.5%, we decided to drop the mixed paths.
Nevertheless, it would be desirable to recode word pairs such as "not good" to negative sentiment. Additional work is needed to handle negation when "no, not, never" precedes a sentiment word, which occurs for some of the mixed sentiment paths. Most of the mixed paths, however, do not involve clear negation, where the last edge of the path includes a negation word preceding the sentiment word. The appearance of negative words anywhere along the path to a positive word, and vice versa, typically results in ambiguity.
Accordingly, when such ambiguity occurs, the net effect of a combination of positive and negative terms for many paths is neutralization. Calabrese, et al. ([@CR9]) observe that a large majority of tweets are neutral because of a lack of sentiment words. We consider the absence of sentiment words as outside the domain of aggregate target-specific sentiment. Nevertheless, if one were classifying text units, neutral would be a useful category. Moreover, future research may use the network path data to improve the classification of texts.
In our testing for the validity of the network approach using ground-truth data, we examine tweets categorized as neutral in terms of their relative positivity and negativity. Since our method produces a ratio of positivity to negativity, researchers can empirically observe neutrality with respect to a target, where the ratio is close to 1, although neutrality appears to have a considerable range. In the results section to follow, there is evidence of a positivity bias in texts annotated as neutral, extending neutrality above the ratio of 1.0 to near 2.0 with positivity near 5.0.
Dataset 1 {#Sec30}
---------
To begin, we show an example of a semantic network about airlines from dataset 1, illustrating the contexts for sentiment words. The graph (Fig. [2](#Fig2){ref-type="fig"}) shows word pairs occurring 25 times or more. Embedded in this network are shortest paths connecting targets to sentiment words. For example, here is a negative path with "plane" as the target: plane → wifi → usairways → frustrating, and a positive path with "flight" as target: flight → southwestair → made → safely. Fig. 2Semantic network
We computed positivity and negativity for three target words in the airline tweets data file: "airline," "flight," and "plane." Table [1](#Tab1){ref-type="table"} presents the summary results. The findings show that the ratio of positive tweets to negative tweets averages .63 for the negative annotations, showing that negativity is 1.5 times stronger than positivity. For neutral annotations, the ratio is 2.13, which indicates that positivity is 2 times stronger than negativity, while for positive annotations, it is 3.94, with positivity 4 times stronger than negativity. This finding supports the internal validity of the method.Table 1Sentiment variablesTargetAnnotationNegativityPositivityPos/Neg ratio*Dataset 1*AirlineNegative0.0640.0390.614Neutral0.010.0242.371Positive0.0060.0254.337FlightNegative0.080.0550.685Neutral0.0160.0241.453Positive0.0120.0332.825PlaneNegative0.0640.0390.607Neutral0.0120.0312.561Positive0.0070.0354.67*Dataset 2*ItNeg Hi0.020.0050.225Neg Lo0.0050.0132.759Pos Lo0.0020.0084.287Pos Hi0.0010.02331.221
Note that the two sources of sentiment data are not perfectly aligned. The sentiment network scores are based on more micro-level text elements than the whole text annotations. Nevertheless, the whole-text ratings are the closest ground-truth data available. Even though the two sources or sentiment ratings are different, their comparison is useful. Future research may have annotators rate word pairs.
The ratio is closer for the negative annotations than for the positive annotations. This pattern suggests a positivity bias in expressions of sentiment. One reason for this may be that people typically identify a mix of positive and negative features when they evaluate an object (Houwer [@CR34]). Nevertheless, scanning the last column of Table [1](#Tab1){ref-type="table"} shows that the pattern occurs for both datasets. Human assessments of any objects or issues are likely to include some negative and some positive aspects as people perhaps take a mental ratio and reach a binary summary judgement of whether they like or don't like the entity. This process may account for our findings.
Another possible reason is that media messages frequently contain advice that positivity is more efficacious than negativity. For example, the Mayo Clinic lists on their website[12](#Fn12){ref-type="fn"} the following effects of positivity: increased life span, lower levels of distress, greater resistance to the common cold, better psychological and physical wellbeing, better cardiovascular health, and better coping skills during times of stress.
Such positive statements about the effects of positivity are indicative of the strong encouragement provided in the media for it. Even when feeling negative, people may temper their negative messages with some positivity. Despite the effects on the media of the removal of the Fairness Doctrine (Ruane [@CR65]) that broadcasters must present a balance of opposing views to any opinions advocated, which appears to have unleashed advocacy journalism (Waisbord [@CR75]) with a higher degree of negativity, the population may still resonate with the idea that one is more socially acceptable and credible if one leavens negativity with some positivity. Another consideration is cultural relativism (Donnelly [@CR24]), a perspective that considers that moral issues are not black and white based on universalism but have a range of grays depending on whose value system is used. The effects of this cultural relativity may stimulate the embedding of positive sentiment with the negative even when the negative dominates.
Figures [3](#Fig3){ref-type="fig"} and [4](#Fig4){ref-type="fig"} illustrate the level of negativity, positivity, and the positivity/negativity ratio across three target words and different sentiment levels annotated by humans. Neutral annotations have approximately one-half as much positivity as positive annotations, showing a pattern consistent with expectations that neutral posts would have less positivity than positive posts. Comparing the magnitude of the ratios, we observe that negative tweets contain a higher proportion of positivity relative to negativity than expected. Moreover, neutral annotations have a 2--1 positivity ratio, adding further support to the positivity bias interpretation.Fig. 3Airline tweets: positivity and negativity for negative, neutral, and positive annotationsFig. 4Airline tweets: positivity and negativity ratios for negative, neutral, and positive annotations
Dataset 2 {#Sec31}
---------
Because the tweets were a representative sample selected by API, and not specific to a topic, we selected a generic word referring to targets: "it," so we did not use a stopword list. Figure [5](#Fig5){ref-type="fig"} shows the positivity and negativity associated with the target by four levels of annotations: high negative, low negative, low positive, and high positive. Figure [6](#Fig6){ref-type="fig"} compares the ratio of positivity to negativity, showing that the ratio increases across the levels. Table [1](#Tab1){ref-type="table"} shows that the high levels of sentiment both show the dominance of expected positivity and negativity. High negatives have a positivity ratio of .23, which indicates nearly 4 times as much negativity as positivity. High positives have 31 times as much positivity as negativity. The lower sentiment categories show a bias toward positivity, with both low negative and low positive having approximately 2.5 times more positivity than negativity. Perhaps these low sentiment categories are better considered as neutral yet reflecting a positivity bias. The distribution of sentiment parallels the findings for the neutral category in dataset 1.Fig. 5Vader: positivity and negativity for low and high positive and negative annotationsFig. 6Vader positivity/negativity ratios for high and low positive and negative annotations
Hypothesis test {#Sec32}
---------------
Our null hypothesis is that positivity and negativity scores based on the annotations are no different. We expect that network-based positivity is higher than negativity when analyzing texts annotated as positive, and that negativity is higher than positivity when analyzing texts annotated as negative. For this test, we computed the average sentiment ratios for negative texts and for positive texts across the comparisons in datasets 1 and 2. For negativity, the mean ratio was .25 with a standard deviation of .29, while the positivity mean ratio was 6.52 with a standard deviation of 21.43. We converted the negative ratio to 1 (which shows that negativity is four times higher than positivity given a ratio of .25) by multiplying times 4 and doing likewise for the positivity ratio. The comparison tested is for the significance of the difference between a value of 1 and of 26.08. This difference was statistically significant (t = 147.47, *df* = 10,929, *p* \< .0001). The hypothesis is supported.
Dataset 3 {#Sec33}
---------
### Predictive validity: sentiment, panic, and social distancing in TV news coverage of coronavirus {#Sec34}
Given the internal validity that the sentiment network approach found, it is useful to consider external or predictive validity, the extent to which we find support for hypotheses based on the method. For this assessment we examined positivity and negativity in the early coverage of the 2020 coronavirus pandemic, from January 1, 2020 to March 25th, the time of our data collection. Figure [7](#Fig7){ref-type="fig"} shows the total number of mentions of coronavirus. We tested four hypotheses and addressed one research question about the coronavirus topic in television news.Fig. 7Coronavirus mentions across the media channels over time
Shortest path statistics {#Sec35}
------------------------
### Number of paths {#Sec36}
We identified the features of the shortest paths across all media outlets and across time. Pure positive paths numbered 3786, while there were 5112 pure negative paths, 352 mixed positives, and 646 mixed negatives. Mixed paths were 10% of the total.
### Edge length {#Sec37}
Across each type of path, the longest had 4 edges. The modal path length was 3 edges, comprising 67% of paths.
### Path strength {#Sec38}
Pure positive paths had a sentiment strength ranging from .75 to 9.0, with pure negative paths had a range of − .75 to − 9.1. The most common sum of the co-occurrence frequencies along the path was 9 with values ranging from 3 to 215. Mixed positive paths' range was .75 to 4.75, while mixed negative paths ranged from − .75 to − 6.25 in sentiment strength.
Hypothesis tests {#Sec39}
----------------
### **H1** {#FPar6}
Broadcast news expresses less sentiment about coronavirus, social distancing, and panic than non-broadcast news outlets.
For each of the three topics, broadcast news networks, ABC, CBS, and NBC, were compared to the other channels. Negativity and positivity variables were summed for a total sentiment score. Treatment of coronavirus by broadcast outlets was found to have a mean of .23, while the remaining outlets had a mean of .92. This suggests that broadcast coverage contains less overall sentiment (positive and negative) than non-broadcast TV news. A *t* test found this difference to be significant at *p* \< .001. For social distancing the mean for broadcast was .73 while for the others it was .88, *p* \< .06. Panic had a mean for broadcast of .18 while the other channels it was .81, *p* \< .003. These results support the hypothesis.
### **H2** {#FPar7}
There is a negative bias in the news across channels.
The negative bias was tested by dividing the positivity score by the negativity score. This ratio averaged .84. The Z-test for proportions comparing this value to 1.00 for balance of negativity and positivity found them significantly different at *p* \< .0001 with negativity higher by 16%.
### **H3** {#FPar8}
Sentiment is associated with uncertainty in news coverage of coronavirus over time.
To test the hypothesis that changes in uncertainty are associated with increases in sentiment, we began by running WORDij's WordLink with an include list of 297 uncertainty words (Loughran and McDonald [@CR46]) by day by the news data aggregated across channels. Following the procedure used in Danowski and Riopelle ([@CR20]), we then factor analyzed these words over time. Taking the first principle component, we identified 51 words that loaded above .60 on the first dimension. Next, we created a string replacement file that converted each of the uncertainty words to a new aggregated uncertainty index. After rerunning WordLink with the string replace file for uncertainty terms, we extracted the counts for the news channels by day. This enabled a time-series analysis of sentiment and uncertainty.
Differencing of 1 was used to remove autocorrelation. Lags of − 7 to + 7 were computed in cross-correlations between the sum of negativity and positivity and uncertainty. The strongest association was for the contemporaneous period with a correlation of .66, *p *\< .00001. There were no significant lags. The synchronous correlation supported the hypothesis (Table [2](#Tab2){ref-type="table"}).Table 2Television news negativity and positivity for coronavirus, social distancing, and panicCoronavirusSocial distancingPanicNegativityPositivityNegativityPositivityNegativityPositivityABC0.1460.0990.0960.0710.1060.088CBS0.1080.0790.0690.0560.0940.069NBC0.1410.0980.1010.0660.1110.083BLOOMBERG0.3070.3210.2030.1900.2220.223CNBC0.2030.2380.1360.1570.1500.175FBC0.4260.3870.3280.2980.3570.321CNN0.4900.3880.4080.3220.4170.338CSPAN0.3680.4230.3310.3620.3410.386FOXNEWS0.4860.4000.4120.3370.4400.337MSNBC0.4750.3720.3920.3100.4110.330ALJAZ0.7050.5320.6090.4740.6750.504BBCNEWS0.5940.4770.4750.4190.5250.460DW0.6650.5160.5380.4490.6240.514RT0.7700.5400.6220.4310.7010.474
### **H4** {#FPar9}
Sentiment increases lead to increased volume of media attention.
Figure [8](#Fig8){ref-type="fig"} shows evidence of two phases in media mentions of coronavirus. The first period runs from January 1 to February 21, while the second period is from February 22 to March 25. Period 1 negativity was .007 and positivity was .007, while period 2 negativity increased to .0204 and positivity to .0249, and increase of 3.9 times. A t-test of this difference was significant at *p* \< .002. The hypothesis was supported.Fig. 8Negativity and positivity about coronavirus by channel
### **RQ1** {#FPar10}
Are 24-h business news, general news, and foreign news channels different in the sentiment expressed toward coronavirus, social distancing, and panic?
Means were tested for differences among the four groups. Although broadcast network news was treated in hypothesis 1, we included it in this analysis. Table [3](#Tab3){ref-type="table"} contains the ANOVA results. For each topic, coronavirus, panic, social distancing, and uncertainty, there were significant differences. As the type of 24-h news channel proceeds from broadcast network news, business news, general news, to foreign news there are increases in sentiment across each type of channel for each of the topics. Figure [9](#Fig9){ref-type="fig"} shows sentiment about social distancing mentions, whose distribution is similar to that for coronavirus.Table 3Sentiment by type of news: broadcast, business, general, and foreign about coronavirus, bias, panic, social distancingCoronavirusSocial distancingTypeNegativity positivityTypeNegativity positivityBroadcastMean0.1320.092BroadcastMean0.0890.064SD0.0210.011SD0.0170.008BusinessMean0.3120.315BusinessMean0.2220.215SD0.1120.075SD0.0970.074GeneralMean0.4550.396GeneralMean0.3860.333SD0.0580.021SD0.0380.022ForeignMean0.6840.516ForeignMean0.5610.443SD0.0740.028SD0.0680.024TotalMean0.4200.348TotalMean0.3370.282SD0.2180.161SD0.1910.148FSig.FSig.36.20.00036.370.000PanicBiasTypeNegativityPositivityTypeMeanStd. deviationBroadcastMean0.1040.080Broadcast− 0.0400.009SD0.0090.010Business0.0030.038BusinessMean0.2430.240General− 0.0590.076SD0.1050.074Foreign− 0.1670.048GeneralMean0.4020.348Total− 0.0720.081SD0.0430.026FSig.ForeignMean0.6310.4886.9260.008SD0.0780.025TotalMean0.3700.307SD0.2120.157FSig.39.1560.000Fig. 9Negativity and positivity about social distancing by channel
In summary, this research has found with two ground-truth datasets that the network metrics are internally valid. Moreover, the analysis of coronavirus coverage shows evidence of external validity. This predictive validity of the sentiment network measures is seen in the support for hypotheses about sentiment in media coverage of coronavirus.
Discussion {#Sec40}
==========
This study demonstrated that network-based measures of text sentiment have internal construct validity and external predictive validity. The sentiment network approach has several major advantages. It measures sentiment concerning targets, which is possible because the basic unit of analysis is the word pair in a sentence, not an entire document, as in bag-of-words approaches. The network approach enables better management of sentiment ambiguity. Mixed sentiment issues, a small percentage compared to pure sentiment paths, are shifted to an aggregate level where they are clearly identified and removed. Moreover, the sentiment network measures produce a continuous ratio, expanding the scope of useful statistical procedures. As well, the measure better informs message design for communication campaigns.
This research found ground-truth validity for the sentiment network measures, based on the tests with two datasets where human judges' classified airline tweets as positive-neutral-negative, and general tweets as high negative-low negative-low positive-high positive. The results confirmed the validity of the sentiment network metrics in terms of human annotations. Nevertheless, this work has illustrated a distinction between ground-truth and partial truth. In placing the results in context, consider that "ground-truth" is best thought of as "partial truth" in that humans judged the entire text unit, not pairs of words, resulting in positive, neutral, and negative annotations having considerable levels of both positivity and negativity within them. Despite the error embedded in such ground-truth data, it is considered the best available standard against which to evaluate automated methods.
The results show evidence of a positivity bias in texts. For the posts that annotators judged, we found that at the subtext level of word bigrams, there was a combination of positivity and negativity, although in the direction of the annotation label. When evaluating entities, people consider both positive and negative attributes, yet reach an overall conclusion about whether the object is good or bad (Houwer [@CR34]). These judgments may also be due to the frequent mention in the self-help, positive psychology (Fredrickson [@CR29]), and medical advice that people should be more positive and less negative. As well, there may be a social desirability bias to appear balanced in opinions, which was the norm in public media until the end of the Fairness Doctrine (Ruane [@CR65]), and before the current era of advocacy journalism (Waisbord [@CR75]).
It is important to note that the fundamental basis for assessing sentiment is the lexicon used in the network approach. The lists of approximately 11,000 words, 6446 for negativity and 4485 for positivity, are comprehensive, including morphological variants of words. Nevertheless, future work on comparing different lexicons is needed, finding which ones produce the most consistent results. Lexicon tuning and pruning may look at the contribution of each word to sentiment metrics. Words that contribute to more mixed sentiment paths would be candidates for removal. Words that have the lowest ambiguity would be retained. This lexicon work would contribute to improving sentiment measures.
A key component of this study was the application of the method to examine sentiment in the coronavirus coverage in television news. We found predictive validity through support for four hypotheses:
**H1** {#FPar11}
------
Broadcast news expresses less sentiment about coronavirus, panic, and social distancing, than non-broadcast news outlets.
**H2** {#FPar12}
------
There is a negative bias in the news across channels.
**H3** {#FPar13}
------
Sentiment is associated with uncertainty in news coverage of coronavirus over time.
**H4** {#FPar14}
------
Sentiment increases are associated with an increased volume of news stories.
It was also found that as the type of channel moved from broadcast network news to 24-h business, general, and foreign news sentiment increased for coronavirus, panic, and social distancing.
Public health campaigns to mitigate epidemics reverse the polarity of social distancing. They advocate social distancing for the social good, to dampen the spread of disease, and to protect vulnerable segments of the population. Such a meaning shift from negative to positive is interesting. Future research that examines short-term and possibly longer-term effects of social distancing campaigns on social behaviors and public opinion is warranted.
The utility this research has demonstrated for the sentiment network metrics suggests that the approach has promise in a wider range of applications. For example, one could use lexicons to measure variables such as uncertainty, teamwork, innovation, and resilience. All that is needed is a list of words that exemplify and instantiate the concept. One approach could be to take an existing scale, such as from a fixed-choice questionnaire, deconstruct it into a list of words, have experts further articulate the list, expand it by finding synonyms and antonyms in WordNet,[13](#Fn13){ref-type="fn"} then statistically validate the semantic scaling against the fixed-choice metrics. Or, one could create new concept lexicons starting from mining text from news, social media, or customer reviews, finding the co-occurrences of concepts in a list, extracting principal components, then using the words with the highest loadings on the dimensions to create seed files for semantic network scaling (Danowski and Riopelle [@CR20]). The network methods enable automated filtering and measurement of an endless variety of text, targets, and seeds to navigate streams of natural language.
In conclusion, this research found that a novel sentiment network approach has construct validity. The positivity and negativity scores it produced aligned well with ground-truth annotations in two datasets having three and four sentiment categories. Also, our testing of hypotheses about television news coverage of the coronavirus pandemic found evidence of predictive validity. Accordingly, the strong support we found for both internal and external validity demonstrates an improvement over bag-of-words approaches that merely count occurrences of lexicon words to classify whole text units. The higher precision and specificity of the sentiment network approach enables going beyond artificial intelligence-based classification with its hidden layers of nodes in black-box neural networks, moving the network into the foreground illuminated by theory.
Appendix {#Sec41}
========
Stopword list {#Sec42}
-------------
The stopword list is accumulated across a number of studies across different text sources. Most of the items are function words, while some of the terms result from boilerplate material in Lexis-Nexis:aeditorlattersomehowa'seditoriallatterlysomeoneaaedtleastsomethingableeduleisuresometimeabouteelengthsometimesabovee.g.lesssourceaccordingeightlestsourcesaccordinglyeitherletspecifiedacrosselselet'sspecifyactuallyelsewhereletterspecifyingafterenglishlikesportsafterwardsenoughlikedssagainentirelylikelystaffagainstespeciallylimitedstillain'testlistingssuballetlittlesuchallowetc.llsummaryallowsevenloaddateSundayallrightsreservedeverlooksupalmosteverylookingsurealoneeverybodylookstalongeveryoneltdt'salreadyeverythingmtendsalsoeverywheremagazinethalthoughexmainlythanalwaysexactlymanythanxamexamplemapthatamongexceptmarthat'samongstfMarchthatsanfarMaytheandfebmaybetheateranotherFebruarymetheiranyfewmeantheirsanybodyffmeanwhilethemanyhowfifthmerelythemselvesanyonefinalmetrothenanythingfirstmetropolitanthenceanywayfivemightthereanywaysFMmmthere'sanywherefollowedMondaythereafterapartfollowingmoretherebyappearfollowsmoreoverthereforeappendedformostthereinappreciateformermostlytheresappropriateformerlymuchthereuponaprforthmusttheseAprilfourmytheyareFridaymyselfthey'daren'tfromnthey'llaroundfurthernamethey'rearticlefurthermorenamelythey'veartsgndthirdasgetneverthelessthisasidegetsnewsthoseaskgettingnewspaperthoughaskingggnewspapersthreeassociatedgivenewyorktimesthroughatgivennextthroughoutauggivesninethruAugustgmtnnThursdayavailablegonobodythusawaygoesnoonetoawfullygoingnortoobgonenovtowardbbgotnoveltowardsbegottenNovemberttbecamegraphnytimesTuesdaybecausegraphicotwicebecomegreetingsobittwobecomesguardian newspapers limitedobituariestypebecominghobituaryubeenhadobviouslyunbeforehadn'toctunderbeforehandhappensOctoberunfortunatelybehindhardlyofunlessbeinghasoffuntilbelievehasn'tohuntobelowhaveokupbesidehaven'tokayuponbesideshavingoldurlbestheonusbetterhe'llonceusatodaybetweenhe'soneusebeyondhelloonesusedbothhelponlyusefulbriefhenceontousesbutheroousingbyher'sopusuallybylinehereopeduuchere'soruucpc'monhereafterothervc'sherebyothersvaluecamehereinotherwisevariouscanhereuponoughtverycan'thersourviacannotherselfoursvizcanthhourselvesvscaptionhioutvvcausehighlightoverwcauseshimoverallwascchimselfpwashington postcdthispagewecertainhitherpageswe'dcertainlyhopefullyparticularwe'llchangeshowparticularlywe'recharthowbeitperwe'veclearlyhoweverperhapsweathercohttppgWednesdaycolumnhttpwwwnytimescomphotowellcomiphotographwentcomei'dphotographswerecomesi'llphotosweren'tcompanyi'mpicturewhatconcerningi'veplacedwhat'sconsequentlyi.e.pluswhateverconsiderifpmwhenconsideringignoredppwhencecontainiipresumablywhenevercontainingimmediatepublicationwherecontainsinpublication typewhere'scopyrightinasmuchqwhereaftercorrectionincqqwhereascorrectiondateindeedquewherebycorrespondingindicatequitewhereincouldindicatedqvwhereuponcouldn'tindicatesrwherevercourseinnerratherwhethercrosswordinsofarrdwhichcstinsteadrewhilecurrentlyintoregardingwhitherdinwardregardswhodateisrelativelywho'sdatelineisn'treservedwhoeverdditrespectivelywhomdecit'dreviewwhoseDecemberit'llreviewswilldefinitelyit'srightswithdescribeditsrrwithindeskitselfswon'tdespitejsaidwordsdiaryjansamewoulddidJanuarySaturdaywouldn'tdidn'tjjsawwriterdifferentjulsaywwdigestJulysayingwwwdojunsayswwwnytimescomdocumentJunesecondlyxdocumentsjustsectionxxdoesksepydoesn'tkeepSeptemberyetdoingkeepsseriesyoudon'tkeptsevenyou'ddonekkseveralyou'lldownknowshallyou'redownwardsknownsheyou'vedrawingknowsshe'llyourduringlsinceyourselanguagesixyourselfeachlastsoyourselvesedlatelysomeyyeditionlatersomebodyzzz
Uncertainty lexicon: principal component {#Sec43}
----------------------------------------
List of 51 uncertainty terms loading above .60 on the first principal component extracted from the larger 297 word uncertainty list from Loughran and McDonald ([@CR46])coulddependsassumeassumingmaydependssuggestedcautiouspossibleroughlyuncertainsuggestmaybesometimespredictedprecautionsalmostnearlyconfusingappearsrisksomewhererisksanticipatemightdependingsuddenlypredictingprobablysomewhatuncertaintyapproximatelyseemsexposureanticipatingpredictionsperhapsdependindefiniteappearbelieveconfusionanticipateddoubtpossibilitysuggestingsometimevolatilitypossiblybelievesriskingvarying
Uncertainty lexicon: full list {#Sec44}
------------------------------
Larger list of 297 uncertainty terms from Loughran and McDonald ([@CR46]):abeyancedeviatepresumingsuggestsabeyancesdeviatedpresumptionsusceptibilityalmostdeviatespresumptionstendingalterationdeviatingprobabilistictentativealterationsdeviationprobabilitiestentativelyambiguitiesdeviationsprobabilityturbulenceambiguitydifferprobableuncertainambiguousdifferedprobablyuncertainlyanomaliesdifferingrandomuncertaintiesanomalousdiffersrandomizeuncertaintyanomalouslydoubtrandomizedunclearanomalydoubtedrandomizesunconfirmedanticipatedoubtfulrandomizingundecidedanticipateddoubtsrandomlyundefinedanticipatesexposurerandomnessundesignatedanticipatingexposuresreassessundetectableanticipationfluctuatereassessedundeterminableanticipationsfluctuatedreassessesundeterminedapparentfluctuatesreassessingundocumentedapparentlyfluctuatingreassessmentunexpectedappearfluctuationreassessmentsunexpectedlyappearedfluctuationsrecalculateunfamiliarappearinghiddenrecalculatedunfamiliarityappearshingesrecalculatesunforecastedapproximateimpreciserecalculatingunforseenapproximatedimprecisionrecalculationunguaranteedapproximatelyimprecisionsrecalculationsunhedgedapproximatesimprobabilityreconsiderunidentifiableapproximatingimprobablereconsideredunidentifiedapproximationincompletenessreconsideringunknownapproximationsindefinitereconsidersunknownsarbitrarilyindefinitelyreexaminationunobservablearbitrarinessindefinitenessreexamineunplannedarbitraryindeterminablereexaminingunpredictabilityassumeindeterminatereinterpretunpredictableassumedinexactreinterpretationunpredictablyassumesinexactnessreinterpretationsunpredictedassuminginstabilitiesreinterpretedunprovedassumptioninstabilityreinterpretingunprovenassumptionsintangiblereinterpretsunquantifiablebelieveintangiblesreviseunquantifiedbelievedlikelihoodrevisedunreconciledbelievesmayriskunseasonablebelievingmayberiskedunseasonablycautiousmightriskierunsettledcautiouslynearlyriskiestunspecificcautiousnessnonassessableriskinessunspecifiedclarificationoccasionallyriskinguntestedclarificationsordinarilyrisksunusualconceivablependingriskyunusuallyconceivablyperhapsroughlyunwrittenconditionalpossibilitiesrumorsvagariesconditionallypossibilityseemsvagueconfusespossibleseldomvaguelyconfusingpossiblyseldomlyvaguenessconfusinglyprecautionsometimevaguenessesconfusionprecautionarysometimesvaguercontingenciesprecautionssomewhatvaguestcontingencypredictsomewherevariabilitycontingentpredictabilityspeculatevariablecontingentlypredictedspeculatedvariablescontingentspredictingspeculatesvariablycouldpredictionspeculatingvariancecrossroadpredictionsspeculationvariancescrossroadspredictivespeculationsvariantdependpredictorspeculativevariantsdependedpredictorsspeculativelyvariationdependencepredictssporadicvariationsdependenciespreliminarilysporadicallyvarieddependencypreliminarysuddenvariesdependentpresumablysuddenlyvarydependingpresumesuggestvaryingdependspresumedsuggestedvolatiledestabilizingpresumessuggestingvolatilities
<https://www.kaggle.com/orgesleka/imdbmovies>.
The original dataset constructed from this analysis is available on Kaggle: <https://www.kaggle.com/crowdflower/twitter-airline-sentiment>.
<https://github.com/cjhutto/vaderSentiment>.
<https://blog.gdeltproject.org/a-new-dataset-for-exploring-the-coronavirus-narrative-on-television-news/>.
<https://www.journalism.org/2012/07/16/video-length/#_ftn2>.
<https://blog.gdeltproject.org/flatten-the-curve-has-lept-into-our-lexicon/>.
<https://blog.gdeltproject.org/social-distancing-is-the-new-coronavirus-buzzword/>.
<https://www.whitehouse.gov/briefings-statements/remarks-president-trump-address-nation/>.
A reviewer cautioned that grammar rules are often violated in unedited material by lay writers, and that stopping the window at the end of a sentence and restarting with the next sentence could be problematic when punctuation is missing. Because we do not classify texts and instead identify aggregate patterns across them, such occurrences are distributed uniformly across comparisons and do not bias the findings. Moreover, when preprocessing text, natural language analysis typically removes all punctuation, so this issue is not considered important in these models.
For more information, visit: [https://www.cs.uic.edu/\~ liub/FBS/sentiment-analysis.html\#lexicon](https://www.cs.uic.edu/%7e%e2%80%89liub/FBS/sentiment-analysis.html#lexicon).
WORDij can be downloaded from: <http://wordij.net/>.
<https://www.mayoclinic.org/healthy-lifestyle/stress-management/in-depth/positive-thinking/art-20043950>.
<https://wordnet.princeton.edu/>.
**Publisher\'s Note**
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
|
What gives a mother superhuman strength to lift a car off her child?
It’s fear.
Fear, as I explain in greater detail in this article, is a biological and survival necessity. The cascade of neurochemical reactions lets us know, at lightning speed, that something is not right. Nature designed fear with speediness in mind. Thankfully that mom, or any other person in harm’s way, doesn’t think: “Danger is here, I better do something about it.” They just act, unless of course they can’t.
This inability to act. The inability to defend and protect…this is how we start to fear, fear.
To understand how we embed the biological message that fear is to be feared and that fear is supposed to be scary, it’s important to understand how early life experiences, usually traumatic ones, trap fear.
Let me explain.
A child who witnesses or experiences physical violence, who survived a childhood with minimal emotional connection (hello land of the iPad babysitter), who had to become the parent way too early to take care of their siblings (or even worse, their parent!) because mom or dad wasn’t able, or who was put through a barrage of scary medical procedures; in all these situations, a child is literally flooded with fear.
Just like the mother who can pull in all her energy reserves and strength to lift a car to save her child, a child can do the same kind of preservation effort with their survival responses to stress.
The only difference is the mom is using up the adrenalized survival energy and is acting out the response to a point of completion. But a child who can’t run away, talk back, hit, or at least attempt to defend themselves (because they are smaller and weaker), must turn that fiery fight-flee energy, inwards.
Said another way, when a child is faced with these kinds of adversities, and they are old enough to understand there’s no end in sight, the can learn that the only one way for them to withstand the chronic toxic assault to their nervous system is to shut down and bury the fear. In many ways, they become complacent and just let life happen to them, as opposed to engaging with life.*
Their smart survival mechanisms play it safe. They lay low. They don’t fuss and they keep the peace as much as they can.
But that fear doesn’t disintegrate and go away. It becomes trapped in the nervous system. This ‘holding on’ to fear is one of the main culprits behind chronic anxiety, chronic illness and debilitating nonsensical fear so many live with day in day out.
* * *
The Adverse Childhood Experiences (ACE) Study has been seminal in uncovering that the bulk of most chronic illness, as well as some cancers, heart disease and even things like anxiety, depression and other “mental” disorders (which are actually physiological disorders), are due the constant barrage of stress reactions (yes, those fear responses) firing 24/7 for years on end.
As I mentioned, when one is subjected to constant threat from an early age, there is a tendency to shut down and stop feeling. This biological shut down is nature’s way of helping the organism (in this case the child) to no longer feel the fear, as well as other tough-to-navigate sensations and emotions. In other words, the nervous system is helping preserve the sanity of the organism. But in doing this, and in staying in this state for long periods of time (as is the case with childhood abuse and adversity), it does so at the expense of health because this shutdown state is not meant to be ‘ON’ for the long term. This shutdown (freeze) state is meant to be an intermediary state.
For example, in the wild, this freeze response is beneficial because it numbs the animal, and can even put it into a stiff, frozen-like state. If you’ve ever looked up videos of ‘playing possum’ this is a classic example of a nervous system going into a freeze response due to overwhelm.
(This death-like state can serve to protect the animal because the animal preying will often become less interested in eating an animal that seems dead.)
Peter Levine, founder of Somatic Experiencing and author of Waking The Tiger – Healing Trauma, explains it this way:
“At the moment of contact (or just before), the young impala falls to the ground, surrendering to its impending death. Yet, it may be uninjured. The stone-still animal is not pretending to be dead. It has instinctively entered an altered state of consciousness shared by all mammals when death appears imminent. Many indigenous peoples view this phenomenon as a surrender of the spirit of the prey to the predator, which, in a manner of speaking, it is. Physiologists call this altered state the “immobility” or “freezing” response.”
But with chronic threat, this built-in survival response creates a bit of a design problem for us humans.
The human animal enters into a state of being ON but also OFF simultaneously: The fight and flight desires (to kill, hit, flee) are revving at a high intensity, and, because the nervous system knows darn well there is no end in sight, it simultaneously attempts to shut down the high-revving survival energy with the shutdown response.
The human system needs flow and oxygen and the moving of waste products out and good nutrition (to the cells) in. But in this ‘gas on/brake on’ scenario things go amuck internally, in the biology, and the system gets sluggish, sick, and begins to shutdown. Sure, the person is alive, but barely.
This is why there are so many chronic illnesses (both mental and physical) connected to these early adversities. They show up as signs and symptoms of lethargy, depression, no motivation, trouble focusing, weight gain, sluggish and erratic digestion, poor immune system response and to the extreme, autoimmune illnesses. The body, literally, learns to go into a survival ‘hibernation’ mode so it doesn’t have to keep mounting a fight or flight response to the constant threat.†
Fear of the more subtle variety.
Fear can also be imprinted in ways that are less seemingly traumatic, but are nevertheless important to mention. The scenario I’m about to describe happens all too often and it could very well be something that happened to you.
Many a kid falls off their bike and scrapes their knees, right? One might say it’s a childhood rite of passage (I, for one, went the full nine yards and broke my arm at age five going over my handlebars after seeing how fast I could go downhill!).
Now, if you’ve ever seen this happen, when a kid is hurt the screams come immediately. Pain is quick, just like fear, and, if the child has never felt real physical pain, it’s going to be scary. In such an event, there is a high probability that some adrenaline and other chemicals will be coursing through the blood, mounting a true stress reaction to threat.
Now, imagine this…
The kid is screaming on the pavement. Skin has been broken. There’s some blood mixed up with some gravel and dirt.
How a parent responds to this will either teach the child how to a) be with the pain and fear so they learn how to integrate it and release it, or b) they will be taught to hold it in and numb up the feelings and sensations.
As a parent, If you have any sense of empathy, there will be a VERY strong urge to rush over and scoop up your kid and hug them tightly and tell them something like “you’re ok, you’re ok! Hush, hush now, it’s ok, you’re fine”. And then you may attempt to distract them from their pain with a candy or some other form of treat or diversion.
Totally understandable.
Unfortunately though, this response will bring out result B: they will learn to numb their pain and to distract themselves from it (often with food), and they will learn that pain is something to be feared and covered up as soon as possible. Not good for the organism.
If, however, the parent has this education, if they know what you are learning right now, they can do something else.
They can just calmly go and be with the child where they are. I know it seems counter-intuitive, but the correct response is not to scoop them up and try and make it better. The correct response is to simply be with them, maybe just touching them, or holding them if they crawl into your lap but otherwise not invading their space, staying calm, and validating their experience, “Wow, that was a big fall there, huh?”, “That must have been scary!”, etc.
If the parent is calmly present and inquisitive, instead of freaking out and trying to stop the experience as soon as possible, the result is option A: the child will learn a valuable lesson in the body’s ability to mount a stress response, and then come out of that response naturally.
Obviously, if there is severe injury, an ambulance should be called as well, but the rest of these principles still hold true and will promote much greater healing after the fact.
When we fail to allow our child’s, or our own, stress reaction to naturally come down, not only does this lessen the immune system’s ability to take care of the injury (even a small skin wound still needs an immune system response!), but we are more likely to fall off our bike again, or be clumsy for the rest of the day, or get in another kind of accident, be grumpy, or be unable to do our homework, because our stress reaction is still humming inside of us and is limiting our access to the higher brain.
While one might think this latter example of falling off of a bike can’t measure up to a kid that has been abused physically or had absent, disconnected parents, think again.
After all, a parent is literally God to a child, so “if mommy says I’m fine, well I guess I am (but, why does it hurt so much?)” is a classic way for a youngster to begin their mind-body journey: feeling something that isn’t nice, then immediately dismissing it and bracing against the pain, fear, emotion, scary thought etc., so they can be accepted in the family system.
Remember: for young kids it all comes down to survival and staying in the family system, even when that family system might be detrimental to their health. So, if suppressing a body quality (emotions, pain, sensation, fear etc.) means that mom will be more patient and loving with them, then they will suppress and suppress for eternity.
By the way, we can parallel this bike fall scenario with monsters under the bed, a scary dark room with bogeymen in the closet, a visit to the dentist office, a shitty summer camp where there was no escape, etc.
The ‘nothing is wrong with you’ type of dialogue never teaches a kid how to handle something that is tough and scary. And perhaps the reason this gets passed down for generations is because the adult parent herself was never acknowledged or believed when she was scared of monsters in the closet.
If I bring this back to the main thesis of this article, “For us to heal, we must be willing to not fear, fear”, it comes down to asking ourselves this question:
“What stopped us from feeling fear in the first place?”
Everyone will have their own version of why. I believe it is important for a person to uncover some elements of this so they can intelligently address what is real current-day fear compared to what is old fear trying to find its exit path.
I mean, if your kid is trapped under a car and their life is at risk, I sure hope your fear and the cascading responses of adrenaline and action can be implemented immediately (yes please!).
But, if your system is being set off by old fear patterns, putting you into fight/flight and/or freeze responses that have nothing to do with your current life, then it is important to work on those and help them neutralize so your body isn’t continually working overtime.
It is important to remember that if we weren’t apprenticed during our infancy, childhood and adolescence on how to BE with the many feelings of fears, and the bodily sensations that come with, then there won’t be a hardwired pattern of good, healthy fear response, wherein our system goes into a fight/flight response and then comes out of it quickly.
Instead, we will get stuck in a loop of fight, flight, and…if our early time on this earth was more adverse and unsafe, we’ll get stuck in that freeze (shut down) pattern which leads to a unique form of biological chaos that (typically) leads us to the side-effects of fear gone sideways: ill health and a whole lot of suffering and stuckness.
There is a saying, ‘what we resist persists.’
When we continue to resist fear, we fail to heal.
But if we meet it, feel it, and see it as simply a pattern that is looking to release, then, we might find that healing we’ve been looking for.
* * *
Join the conversation over on my Facebook Group, Healthy Nervous System Revolution, or if you have a personal note for Irene and her team you can always send it via email via out Contact Page.
* * *
Footnotes
* For infants who actually can’t see the end in sight, meaning they don’t have the cognition to know they are screwed and the world they were brought in to is not ideal, all they have is feeling and bodily sensations. They are 100% feeling beings who register all the goodness and evil that is around them. If they are subjected to abuse, adversity, surgeries and other traumatic high-stress situations, because there is no verbal or cognitive processing occurring in conjunction with the sense of threat, danger, helplessness, their fear responses when older, are typically non-cognitive and are purely physiologically based. Meaning, that person who has no memory of any trauma, yet they are overtaken by severe flashes of fear in childhood and up, things like panic, anxiety, high heart rate for no reason etc…it is often the case that these out-of-the-blue reactions are trapped somatic ‘fear’ responses trying to come out and resolve. The trouble we have right now is there isn’t enough education on these somatically held trauma (fear) responses so there are many out there having such ‘attacks’ and medicating them, when in fact it is the body trying to heal and release stored up survival energy from long ago.
† There is a common knowing in the somatic therapeutic worlds of something called Functional Freeze. A person may seem ‘fine’ and ‘look calm’, and even portray a creepy sense of being very zen’d out on the outside, while on the inside all systems are in a constant cycling mode of fight-flight-freeze survival energy.
Book Reference
Waking The Tiger – Healing Trauma. Peter Levine, 1997 |
A high-frequency waveguide used as a transmission path for high-frequency energy is constituted by combining first and second waveguide constituting bodies.
More specifically, first and second waveguide constituting bodies each provided with a groove are integrated in a state in which the openings of the grooves are aligned, which constitutes a high-frequency waveguide. A prior publication that is similar to this is Patent Literature 1 (Japanese Laid-Open Patent Application 2004-48486). |
Estimate of safe human exposure levels for lunar dust based on comparative benchmark dose modeling.
Brief exposures of Apollo astronauts to lunar dust occasionally elicited upper respiratory irritation; however, no limits were ever set for prolonged exposure to lunar dust. The United States and other space faring nations intend to return to the moon for extensive exploration within a few decades. In the meantime, habitats for that exploration, whether mobile or fixed, must be designed to limit human exposure to lunar dust to safe levels. Herein we estimate safe exposure limits for lunar dust collected during the Apollo 14 mission. We instilled three respirable-sized (∼2 μ mass median diameter) lunar dusts (two ground and one unground) and two standard dusts of widely different toxicities (quartz and TiO₂) into the respiratory system of rats. Rats in groups of six were given 0, 1, 2.5 or 7.5 mg of the test dust in a saline-Survanta® vehicle, and biochemical and cellular biomarkers of toxicity in lung lavage fluid were assayed 1 week and one month after instillation. By comparing the dose--response curves of sensitive biomarkers, we estimated safe exposure levels for astronauts and concluded that unground lunar dust and dust ground by two different methods were not toxicologically distinguishable. The safe exposure estimates were 1.3 ± 0.4 mg/m³ (jet-milled dust), 1.0 ± 0.5 mg/m³ (ball-milled dust) and 0.9 ± 0.3 mg/m³ (unground, natural dust). We estimate that 0.5-1 mg/m³ of lunar dust is safe for periodic human exposures during long stays in habitats on the lunar surface. |
FOR Ashton Berdine, a ramble in the woods to dig for the pungent tender-leaved wild leeks known as ramps has been a springtime ritual since he was a teenager. Even today, at 45, as the first buds appear on trees, he takes his family into the woods near his home in Elkins, W.Va., to dig a few ramps to cook with fajitas.
But lately, Mr. Berdine, a botanist with the environmental group the Nature Conservancy, has had to hike deeper and deeper to find ramps, he said. The acres-wide patches that used to carpet the forest floor are becoming elusive. Mr. Berdine has seen areas where every single ramp has been scraped up, he said, as if by “wild hogs rooting in the forest.”
Earlier this month, he caught a glimpse of one of those hogs.
“I pulled up behind a truck at a stoplight,” he said. “And I just saw bags and bags of ramps, piled high in the truck bed.”
Over the last two decades, the lucrative market for ramps during their short early-spring season has drawn a horde of new diggers, who cart them out of the forest in unprecedented quantities. Some see the bounty as limitless, but Mr. Berdine is one of several botanists who think ramp frenzy may be taking a toll. |
Little Laurel Branch
Little Laurel Branch, a wildland in the George Washington and Jefferson National Forests of western Virginia, has been recognized by the Wilderness Society as a special place worthy of protection from logging and road construction. The Wilderness Society has designated the area as a “Mountain Treasure”.
A strikingly scenic place, Little Laurel Branch is an unusual find in the Cumberland Mountains. It contains part of a water gap, the Breaks of Pine Mountain, with multi-level cliffs and vertical wooded slopes.
This wildland is part of the Clinch Ranger District Cluster.
Location and access
The area is located in the Cumberland Mountains of Southwestern Virginia, about 18 miles southeast of Pikeville, Kentucky and 31 miles west of Richlands, Virginia. It is next to Breaks Interstate Park.
There are no trails into the area. However, the Pine Mountain Trail passes within one mile giving an overview into the area at Elkhorn City Overlook, Cave and Skagg Overlook.
Skagg Branch Rd. (Rt 2031) passes into the area.
The boundary of the wildland as determined by the Wilderness Society is shown in the adjacent map. Additional roads and trails are given on National Geographic Maps 789 (Clinch Ranger District). A great variety of information, including topographic maps, aerial views, satellite data and weather information, is obtained by selecting the link with the wildland's gps coordinates in the upper right of this page.
Beyond maintained trails, old logging roads can be used to explore the area. The Cumberland Mountains were extensively timbered in the early twentieth century leaving logging roads that are becoming overgrown but still passable. Old logging roads and railroad grades can be located by consulting the historical topographic maps available from the United States Geological Survey (USGS). The Little Laurel Branch wildarea is covered by USGS topographic map Elkhorn City.
Natural history
The eastern side of the area is part of the Chimney Cliffs and Russell Fork special biological area, home to a state-listed plant and federally threatened plant.
A population of the rare Virgiia spiraea plant is found in the river area.
Massive rocks and cliffs profide habitat for calcium rich and iron rich species.
Breaks Interstate Park
The area is surrounded on three sides by the 4600-acre Breaks Interstate Park. Known as “The Grand Canyon of the South", the park contains a 5 mile long, 25 mile deep gorge, making it a popular visitor destination.
Topography
The area is part of the Pine and Cumberland Mountains Subsection of the Southern Cumberland Mountain Section of the Central Appalachian Broadleaf Coniferous Forest-Meadow Province.
Pine Mountain, a prominent ridge in the region, is a "strike ridge", an escarpment more resistant to weathering than adjacent rock. As time passed, huge blocks of sandstone fell from the ridge leaving a rugged terrain.
The Towers, a large rock formation, is found at the eastern end of the area.
A section of Russell Fork is considered eligible for the National Wild and Scenic Rivers System.
Forest Service management
The Forest Service has conducted a survey of their lands to determine the potential for wilderness designation. Wilderness designation provides a high degree of protection from development. The areas that were found suitable are referred to as inventoried roadless areas. Later a Roadless Rule was adopted that limited road construction in these areas. The rule provided some degree of protection by reducing the negative environmental impact of road construction and thus promoting the conservation of roadless areas. Little Laurel Branch was not inventoried in the roadless area review, and therefore not protected from possible road construction and timber sales.
The forest service classifies areas under their management by a recreational opportunity setting that informs visitors of the diverse range of opportunities available in the forest. The area includes land designated “Rare Community” and “Geological Area-Unsuitable”.
Several gas wells were developed in the area around 1993. There are now possibly four gas leases in the area, some with access roads.
See also
Clinch Ranger District Cluster
References
Further reading
Stephenson, Steven L., A Natural History of the Central Appalachians, 2013, West Virginia University Press, West Virginia, .
Davis, Donald Edward, Where There Are Mountains, An Environmental History of the Southern Appalachians, 2000, University of Georgia Press, Athens, Georgia. .
External links
George Washington and Jefferson National Forest
Wilderness Society
Clinch Coalition
Category:George Washington and Jefferson National Forests
Category:Southwest Virginia |
For Employers, a Hidden Downside to 401(k) Plans
When companies ditch their traditional pension plans in favor of defined-contribution plans such as 401(k)s, investors typically cheer. After all, 401(k) plans shift uncertainty about market ups and downs off of corporate balance sheets and onto employees’ shoulders.
But there may be a significant cost to those decisions down the road in the form of stagnation in the top ranks and an exodus of young stars, according to new research by Haig Nalbantian, a senior partner at human-resources consulting firm Mercer.
In an unpublished analysis, Nalbantian examined the talent flows in two similar client companies – both global, mature, consumer-products firms whose general approach to talent is to promote employees into upper levels rather than hire from outside.
Company A – Mercer declined to identify the clients – jettisoned its pension plan in the late 1990s and instituted a 401(k). Company B maintained its pension plan despite internal and external pressure to abandon it.
There was no obvious workforce impact of either decision until the recession began interfering with typical retirement patterns, Nalbantian says.
As the economy slowed, Company A began to develop choke points in its talent pipeline: a lack of retirements was preventing young go-getters from moving up in the organization. The company’s “velocity,” or the percentage of people getting promoted or making lateral moves, stalled at 11%.
A map of the company’s internal labor market showed that, at the senior professional and senior manager levels, the probability of moving up dropped considerably. Even worse, said Nalbantian, up-and-comers at those levels were among those with the highest probability of quitting.
“They were stalling out in their careers,” he said. “The future of the organization was walking out the door.”
Meanwhile, Company B had no such choke points. Its velocity was about 18% even in a tepid economy. And far fewer of its active employees were eligible for retirement than at Company A, indicating that individuals were retiring as expected. Average retirement age for Company A workers who joined after the 401(k) was established was 64; at Company B, the average was around 60.
Nalbantian and his colleagues at Mercer’s retirement-consulting practice believe the retirement-plan design is the variable distinguishing the dynamics at the two firms.
Pension plans provide inherent incentives for people to retire, unlike 401(k)s, which are based on a balance that rises or falls depending on which way the markets’ wind is blowing. So “companies that got rid of defined-benefit plans were making a decision to eliminate their ability to strongly influence employees’ decisions to stay or leave,” he said.
Those companies were guided by spreadsheets that were tough to argue with, said Nalbantian. “But what they weren’t doing was looking at the likely workforce impact of those decisions,” he said.
The shift to 401(k)s is also considered a sign of a more transactional relationship between employers and employees. Companies offer less security and stability to the workforce and workers in turn offer less loyalty, making them more likely to leave when an opportunity opens up elsewhere.
“Do firms really transfer the risk when they’re giving up their ability to influence retirement dynamics?” he asked. “Each person who stays on creates a cascade of impacts down the row. So you don’t need a lot of delays in retirement to create the phenomenon of choke points.”
What’s the impact for employers? Increased costs because of turnover; stagnation, as people “retire on the job” and simply stop striving for promotions; and lack of innovation, because “you need replenishment to make sure you’re not living in the past,” said Nalbantian.
However, even evidence of these effects isn’t enough to reverse the decline of pension plans. Nalbantian presented his analysis to Company A three years ago and it didn’t reinstate the pension plan. Instead, it found ways to dissolve the choke points by emphasizing mobility for high performers, even when that meant lateral instead of upward moves.
About At Work
Written and edited by The Wall Street Journal’s Management & Careers group, At Work covers life on the job, from getting ahead to managing staff to finding passion and purpose in the office. Tips, questions? email us. |
SOCIAL
Protest against gay games event ban at Sochi Olympics
Gay rights campaigners will hold a protest in London over Russia’s ban on a Pride House event at the 2014 Winter Olympic Games in Sochi.
Activists will picket the Sochi Exhibition in Kensington Gardens tomorrow (9 August), from 10.30am, to show their anger at the Russian Ministry of Justice’s refusal to allow a Pride House at the games.
Russian lesbian, gay, bisexual and transgender campaigners had planned the venue to be a meeting place for gay athletes and their supporters with events including a sports competition and photo exhibition.
‘London 2012 has a LGBT Pride House but Russia won’t allow it at Sochi. This is part of an official crackdown on LGBT communities and visibility in Russia,’ said veteran gay rights activist Peter Tatchell.
‘It is an attack on freedom of expression and association. We are urging the International Olympic Committee to intervene.
‘This ban is contrary to the equality and non-discrimination provisions of the Olympic Charter.’
Russian courts upheld the decision to ban Pride House, with a judge claiming it was ‘extremist’ and could provoke ‘social-religious hatred’.
The IOC responded to Gay Star News, but stopped short of criticizing the Russian authorities directly.
In March, an IOC spokesperson told us: ‘The Olympic Charter does not allow for discrimination against those taking part in the games.
‘The IOC is an open organisation and athletes of all orientations will be welcome at the games.’ |
Equally at home on long, technical climbs as it is flowy singletrack descents
After a few years of ever-increasing suspension travel, it’s exciting to see the industry pulling back a bit and pouring some energy into the sort of bikes that many of us ride. Rocky Mountain’s 2015 Thunderbolt MSL is a perfect example. A not-unexpected follow-up to this year’s alloy Thunderbolt, the MSL takes the 120mm XC/trail platform and adds a healthy dose of lightness.
The Thunderbolt MSL is designed for “people who hammer at the pointy end of the pack, but stay aggressive and stylish when terrain gets rougher.” Aggressive and stylish? That sounds just like us! (Flattery will get you far.)
Bonus points for camera angle
Like its predecessor, the Thunderbolt MSL rolls on 27.5 wheels. The SmoothLink four-bar suspension design pivots on Rocky Mountain’s second-generation bushings (BC2), which are bigger than the original ABC tapered bushings and include grease ports for easy service. The company’s Ride-9 forward shock mount uses a pair of concentric square chips to allow for countless (OK, nine) geometry and suspension curve combinations.
Is it just us, or is this colour combo screaming for a brown saddle and grips?
For those who want to get digital, the Smoothwall carbon frame is Di2 compatible, with a downtube battery hiding port. The acid green Thunderbolt 799 MSL shown at top actually ships with Shimano’s wundergroup and Stan’s 1,200g (!) Valor 650b carbon wheels- that is, it ships to anyone willing to pony up the $11,000 (UK pricing TBC) cost of entry. XT (770 MSL) and SLX (750 MSL) models bring the cost down significantly.
All three are spec’d with sensible trail components and droppper posts, emphasizing the model’s all-around bent. |
Well, I’ve a masters in urban planning from McGill. I’ve bicycled since ’77 and driven since ’89. I created the #RIDEOCCUPYSURVIVE buttons to raise money for Jenna Morrison’s now-motherless kid. For four years, I rode as a bike courier whilst earning my HBA in urban studies at the UofT. I’ve also taken on evidence-based research for multi-modal transportation planning. As a pedestrian, I’ve almost been run over by motorists using e-bikes on sidewalks.
But unlike gas mopeds. the MTO has yet to require restricted “M”-class licenses to operate e-bikes, despite being electric mopeds.
The MTO also defines mopeds very specifically: it “is a motor-assisted bicycle fitted with pedals that can be operated at all times and has a maximum speed of 50 km/h.”
E-bikes are described here beautifully as mopeds. The MTO cares not whether a moped is propelled by hydrocarbons or electrons.
And if we’re going to disrupt our own definitions, then we really ought to propose the following in lieu of Mr. DeMarco’s illogical proposal:
First, an amended definition of:
BICYCLE — would read: “Includes a safety or recumbent bicycle, tricycle, or other similar vehicle, but does not include any vehicle or bicycle propelled or driven by any power other than muscular power.”
A new definition for:
MOPED — would read: “Includes any two-wheeled, motorized vehicle not otherwise designated as a motorcycle, including gas-powered mopeds, electric “e-bike” mopeds, LSMs, and bicycles modified with drivetrains propelled or driven by any power other than muscular power.”
And a new definition for:
MOTOR VEHICLE — would read: “Includes cars, trucks, motorcycles, mopeds, and any wheeled vehicle propelled by any means other than muscular power, and is not prohibited under the municipal definition for VEHICLE.”
That’s why we call them “bicycle paths and lanes”. Traffic engineers prepared them for safety bicycles — not for mopeds.
This isn’t hard, you guys.
And owing to this committee’s chair, our chief architect for obstructing multi-modal arterials for safety bicyclists, today’s proposal to will e-bikes into becoming safety bicycles, as sponsored by the chair, is dead-on-arrival.
So, lest we as a city are willing to entertain the definitions this deputation proposes, then we must not enable the re-invention of what safety bicycles actually are.
We’ve no basis to support Mr. De Marco to magically double-plus-g . . . excuse me, will an electric moped into a safety bicycle — what with their sealed headlight, brake light, turn signals, instrument cluster, windscreen, mass, and grip-operated throttle.
This proposed amendment — a scorched-earth effort against evidence-based, multi-modal arterial planning — must be . . . Well? Put out to pasture.
And frankly, I’m not amused by the revanchism steered by our current regime of governance, as embodied by this committee’s chair.
Nothing personal.
I’m simply here and speaking to the economics of mobility, safety, and wise engineering. |
Juvenile justice bill passes House subcommittee
April 22, 1999
Web posted at: 2:41 p.m. EDT (1841 GMT)
WASHINGTON (CNN) -- A House Judiciary subcommittee has passed a juvenile justice bill supporters say includes a number of the elements that are particularly relevant given the shootings in a Colorado high school.
The measure passed the panel by voice vote Thursday with a broad spectrum of support ranging from conservative Rep. Bob Barr (R-Georgia) to liberal Rep. Sheila Jackson -Lee, (D-Texas).
The measure is expected to reach the House floor sometime in May. It has been in the works for two years.
The legislation would establish juvenile gun courts for teen offenders.
It would provide grant money to help prosecutors deal with drug, gang and youth violence. And would set up an inter-agency information sharing program between the juvenile and criminal justice systems, schools and social service agencies. |
The Renaissance was the time when Pagan Antiquity saved the Christian West from itself. (Even dead and buried, those old pagans still have the power to impart new life.) Inspired by the nude gods of the Ancient World, Christian art suddenly took on a fleshy quality that it had never theretofore known.
(Some critics would see a betrayal of Christian message in the implied eroticism of this artistic en-flesh-ment. Since embodiment—incarnation—lies at the very heart of the Christian story, to this sympathetic pagan at least this would seem an invalid critique; but perhaps the inherent contradiction lies in Christianity itself.)
Since the Resurrection is never narrated in the gospels, it took a long time for it to be depicted in art; before the Middle Ages, artists tended to treat the Resurrection by allusion rather than direct depiction.
As an artistic problem, it's an interesting one. How do you show a dead person coming back to life?
What Rubens has done here—logically enough, really—is to show it as a waking from sleep. Still wrapped in his grave sheet, Jesus is just sitting up in bed. As for the morning boner, well, that's just male physiology, and kudos to Rubens for having the testicular fortitude to show it.
But, of course, the waking erection is more than that. It implies a virility more appropriate, one might think, to the fertility gods of antiquity, to the Green Men of the world (in whose honor we speak of “wood”) than to the “pale Galilean” of so much Christian theology.
Rubens was not the first to depict Jesus with an erection; the motif occurs earlier in Flemish and German art—notably in the paintings of Van Heemskerck—as a daring articulation of the implications of Incarnation in, not just human, but in male human form (109).
I don't normally watch much television, but a while back I saw three shows at a friend's house. What dismayed me so much was not to hear dicks mentioned on every single one of them—I'm gay, I enjoy talking about dicks—but to hear how they were mentioned.
Not once were dicks mentioned as a part of the body. In every single instance, they were used as metaphors. In every single instance, they were used as a metaphor for something bad.
Don't be a dick. Translation: Don't be a jerk.
Dick-measuring contest.Translation: Being needlessly competitive.
Dick-waving.Translation: Pulling rank to get what you want.
Now, using television as a cultural barometer is a fraught and risky enterprise. But all of these metaphors are in general, real-world use, and to my gay, pagan ear they suggest a culture that finds maleness problematic.
In the cash-strapped days following independence, a trio of Ukrainian businessmen watched in horror as illegal digging and the black-market antiquities trade threatened to denude Ukraine of its historical patrimony. The three began to buy up antiquities before they could leave the country, and so assembled the world's largest private collection of artifacts from the Copper Age Trypillian culture (4500-2700 BCE).
I saw a traveling exhibit from this collection at the Museum of Russian Art in Minneapolis in early March 2011. What I saw there forced me to reassess my analysis of the work of Lithuanian-born archaeologist (and feminist ideologue) Marija Gimbutas (1921-1994). Although none of the ceramics in the collection had been excavated before her death, I found that the analytic vocabulary of symbols that she articulated in her 1989 book TheLanguage of the Goddess again and again produced cogent readings of the art.
Let me take one particularly striking example. The not-quite-life-sized (6¼ x 2½ inch) clay phallus and testes (shown above), from the Khmel'nitska region of Ukraine, dates from the Trypillian BI period, roughly 4500-3500 BCE. Above the testes is a small, inset cup; the clay wedge that supports the phallus gives the entire piece a rather droll, and probably not unintended, resemblance to a quadruped. (“I like the kickstand,” I overheard one visitor say.)
Note the engraved “decoration.” Twin spirals adorn the sides of the testes. There are parallel lines engraved along the phallus itself. Rows of evenly-spaced dots ring the top of the scrotum and run down the length of the shaft. |
namespace x360ce.App.Controls
{
partial class ThumbUserControl
{
/// <summary>
/// Required designer variable.
/// </summary>
private System.ComponentModel.IContainer components = null;
#region Component Designer generated code
/// <summary>
/// Required method for Designer support - do not modify
/// the contents of this method with the code editor.
/// </summary>
private void InitializeComponent()
{
this.DInputLabel = new System.Windows.Forms.Label();
this.SensitivityTrackBar = new System.Windows.Forms.TrackBar();
this.MainPictureBox = new System.Windows.Forms.PictureBox();
this.MainGroupBox = new System.Windows.Forms.GroupBox();
this.SensitivityCheckBox = new System.Windows.Forms.CheckBox();
this.DeadZoneNumericUpDown = new System.Windows.Forms.NumericUpDown();
this.SensitivityNumericUpDown = new System.Windows.Forms.NumericUpDown();
this.AntiDeadZoneNumericUpDown = new System.Windows.Forms.NumericUpDown();
this.AntiDeadZoneLabel = new System.Windows.Forms.Label();
this.DeadZoneLabel = new System.Windows.Forms.Label();
this.AntiDeadZoneTrackBar = new System.Windows.Forms.TrackBar();
this.DeadZoneTrackBar = new System.Windows.Forms.TrackBar();
this.AntiDeadZoneTextBox = new System.Windows.Forms.TextBox();
this.DeadZoneTextBox = new System.Windows.Forms.TextBox();
this.SensitivityTextBox = new System.Windows.Forms.TextBox();
this.SensitivityLabel = new System.Windows.Forms.Label();
this.XInputLabel = new System.Windows.Forms.Label();
this.XInputValueLabel = new System.Windows.Forms.Label();
this.DInputValueLabel = new System.Windows.Forms.Label();
this.PresetMenuStrip = new System.Windows.Forms.MenuStrip();
this.ApplyPresetMenuItem = new System.Windows.Forms.ToolStripMenuItem();
this.P_5_100_0_MenuItem = new System.Windows.Forms.ToolStripMenuItem();
this.P_0_100_0_MenuItem = new System.Windows.Forms.ToolStripMenuItem();
this.P_0_80_0_MenuItem = new System.Windows.Forms.ToolStripMenuItem();
this.P_0_60_0_MenuItem = new System.Windows.Forms.ToolStripMenuItem();
this.P_0_40_0_MenuItem = new System.Windows.Forms.ToolStripMenuItem();
this.P_0_20_0_MenuItem = new System.Windows.Forms.ToolStripMenuItem();
((System.ComponentModel.ISupportInitialize)(this.SensitivityTrackBar)).BeginInit();
((System.ComponentModel.ISupportInitialize)(this.MainPictureBox)).BeginInit();
this.MainGroupBox.SuspendLayout();
((System.ComponentModel.ISupportInitialize)(this.DeadZoneNumericUpDown)).BeginInit();
((System.ComponentModel.ISupportInitialize)(this.SensitivityNumericUpDown)).BeginInit();
((System.ComponentModel.ISupportInitialize)(this.AntiDeadZoneNumericUpDown)).BeginInit();
((System.ComponentModel.ISupportInitialize)(this.AntiDeadZoneTrackBar)).BeginInit();
((System.ComponentModel.ISupportInitialize)(this.DeadZoneTrackBar)).BeginInit();
this.PresetMenuStrip.SuspendLayout();
this.SuspendLayout();
//
// DInputLabel
//
this.DInputLabel.AutoSize = true;
this.DInputLabel.Location = new System.Drawing.Point(6, 20);
this.DInputLabel.Name = "DInputLabel";
this.DInputLabel.Size = new System.Drawing.Size(21, 13);
this.DInputLabel.TabIndex = 7;
this.DInputLabel.Text = "DI:";
//
// SensitivityTrackBar
//
this.SensitivityTrackBar.AutoSize = false;
this.SensitivityTrackBar.Location = new System.Drawing.Point(162, 154);
this.SensitivityTrackBar.Maximum = 100;
this.SensitivityTrackBar.Name = "SensitivityTrackBar";
this.SensitivityTrackBar.Size = new System.Drawing.Size(227, 32);
this.SensitivityTrackBar.TabIndex = 9;
this.SensitivityTrackBar.TickFrequency = 2;
this.SensitivityTrackBar.ValueChanged += new System.EventHandler(this.SensitivityTrackBar_ValueChanged);
//
// MainPictureBox
//
this.MainPictureBox.BackColor = System.Drawing.Color.White;
this.MainPictureBox.BackgroundImageLayout = System.Windows.Forms.ImageLayout.Center;
this.MainPictureBox.BorderStyle = System.Windows.Forms.BorderStyle.FixedSingle;
this.MainPictureBox.Location = new System.Drawing.Point(6, 36);
this.MainPictureBox.Name = "MainPictureBox";
this.MainPictureBox.Size = new System.Drawing.Size(150, 150);
this.MainPictureBox.TabIndex = 10;
this.MainPictureBox.TabStop = false;
this.MainPictureBox.Paint += new System.Windows.Forms.PaintEventHandler(this.LinearPictureBox_Paint);
//
// MainGroupBox
//
this.MainGroupBox.Controls.Add(this.SensitivityCheckBox);
this.MainGroupBox.Controls.Add(this.DeadZoneNumericUpDown);
this.MainGroupBox.Controls.Add(this.SensitivityNumericUpDown);
this.MainGroupBox.Controls.Add(this.AntiDeadZoneNumericUpDown);
this.MainGroupBox.Controls.Add(this.AntiDeadZoneLabel);
this.MainGroupBox.Controls.Add(this.DeadZoneLabel);
this.MainGroupBox.Controls.Add(this.AntiDeadZoneTrackBar);
this.MainGroupBox.Controls.Add(this.DeadZoneTrackBar);
this.MainGroupBox.Controls.Add(this.AntiDeadZoneTextBox);
this.MainGroupBox.Controls.Add(this.DeadZoneTextBox);
this.MainGroupBox.Controls.Add(this.SensitivityTextBox);
this.MainGroupBox.Controls.Add(this.MainPictureBox);
this.MainGroupBox.Controls.Add(this.SensitivityLabel);
this.MainGroupBox.Controls.Add(this.XInputLabel);
this.MainGroupBox.Controls.Add(this.SensitivityTrackBar);
this.MainGroupBox.Controls.Add(this.XInputValueLabel);
this.MainGroupBox.Controls.Add(this.DInputValueLabel);
this.MainGroupBox.Controls.Add(this.DInputLabel);
this.MainGroupBox.Controls.Add(this.PresetMenuStrip);
this.MainGroupBox.Dock = System.Windows.Forms.DockStyle.Fill;
this.MainGroupBox.Location = new System.Drawing.Point(0, 0);
this.MainGroupBox.Margin = new System.Windows.Forms.Padding(0);
this.MainGroupBox.Name = "MainGroupBox";
this.MainGroupBox.Size = new System.Drawing.Size(578, 193);
this.MainGroupBox.TabIndex = 12;
this.MainGroupBox.TabStop = false;
this.MainGroupBox.Text = "Thumb";
//
// SensitivityCheckBox
//
this.SensitivityCheckBox.AutoSize = true;
this.SensitivityCheckBox.Location = new System.Drawing.Point(443, 156);
this.SensitivityCheckBox.Name = "SensitivityCheckBox";
this.SensitivityCheckBox.Size = new System.Drawing.Size(53, 17);
this.SensitivityCheckBox.TabIndex = 20;
this.SensitivityCheckBox.Text = "Invert";
this.SensitivityCheckBox.UseVisualStyleBackColor = true;
this.SensitivityCheckBox.CheckedChanged += new System.EventHandler(this.SensitivityCheckBox_CheckedChanged);
//
// DeadZoneNumericUpDown
//
this.DeadZoneNumericUpDown.Location = new System.Drawing.Point(444, 103);
this.DeadZoneNumericUpDown.Maximum = new decimal(new int[] {
32767,
0,
0,
0});
this.DeadZoneNumericUpDown.Name = "DeadZoneNumericUpDown";
this.DeadZoneNumericUpDown.Size = new System.Drawing.Size(52, 20);
this.DeadZoneNumericUpDown.TabIndex = 19;
this.DeadZoneNumericUpDown.TextAlign = System.Windows.Forms.HorizontalAlignment.Right;
//
// SensitivityNumericUpDown
//
this.SensitivityNumericUpDown.Location = new System.Drawing.Point(502, 155);
this.SensitivityNumericUpDown.Minimum = new decimal(new int[] {
100,
0,
0,
-2147483648});
this.SensitivityNumericUpDown.Name = "SensitivityNumericUpDown";
this.SensitivityNumericUpDown.Size = new System.Drawing.Size(52, 20);
this.SensitivityNumericUpDown.TabIndex = 18;
this.SensitivityNumericUpDown.TextAlign = System.Windows.Forms.HorizontalAlignment.Right;
this.SensitivityNumericUpDown.Visible = false;
this.SensitivityNumericUpDown.ValueChanged += new System.EventHandler(this.SensitivityNumericUpDown_ValueChanged);
//
// AntiDeadZoneNumericUpDown
//
this.AntiDeadZoneNumericUpDown.Location = new System.Drawing.Point(444, 52);
this.AntiDeadZoneNumericUpDown.Maximum = new decimal(new int[] {
32767,
0,
0,
0});
this.AntiDeadZoneNumericUpDown.Name = "AntiDeadZoneNumericUpDown";
this.AntiDeadZoneNumericUpDown.Size = new System.Drawing.Size(52, 20);
this.AntiDeadZoneNumericUpDown.TabIndex = 18;
this.AntiDeadZoneNumericUpDown.TextAlign = System.Windows.Forms.HorizontalAlignment.Right;
//
// AntiDeadZoneLabel
//
this.AntiDeadZoneLabel.AutoSize = true;
this.AntiDeadZoneLabel.Location = new System.Drawing.Point(159, 36);
this.AntiDeadZoneLabel.Name = "AntiDeadZoneLabel";
this.AntiDeadZoneLabel.Size = new System.Drawing.Size(85, 13);
this.AntiDeadZoneLabel.TabIndex = 16;
this.AntiDeadZoneLabel.Text = "Anti-Dead Zone:";
//
// DeadZoneLabel
//
this.DeadZoneLabel.AutoSize = true;
this.DeadZoneLabel.Location = new System.Drawing.Point(159, 87);
this.DeadZoneLabel.Name = "DeadZoneLabel";
this.DeadZoneLabel.Size = new System.Drawing.Size(64, 13);
this.DeadZoneLabel.TabIndex = 13;
this.DeadZoneLabel.Text = "Dead Zone:";
//
// AntiDeadZoneTrackBar
//
this.AntiDeadZoneTrackBar.AutoSize = false;
this.AntiDeadZoneTrackBar.Location = new System.Drawing.Point(162, 52);
this.AntiDeadZoneTrackBar.Maximum = 100;
this.AntiDeadZoneTrackBar.Name = "AntiDeadZoneTrackBar";
this.AntiDeadZoneTrackBar.Size = new System.Drawing.Size(227, 32);
this.AntiDeadZoneTrackBar.TabIndex = 15;
this.AntiDeadZoneTrackBar.TickFrequency = 2;
//
// DeadZoneTrackBar
//
this.DeadZoneTrackBar.AutoSize = false;
this.DeadZoneTrackBar.Location = new System.Drawing.Point(162, 103);
this.DeadZoneTrackBar.Maximum = 100;
this.DeadZoneTrackBar.Name = "DeadZoneTrackBar";
this.DeadZoneTrackBar.Size = new System.Drawing.Size(227, 32);
this.DeadZoneTrackBar.TabIndex = 15;
this.DeadZoneTrackBar.TickFrequency = 2;
//
// AntiDeadZoneTextBox
//
this.AntiDeadZoneTextBox.Location = new System.Drawing.Point(395, 52);
this.AntiDeadZoneTextBox.Name = "AntiDeadZoneTextBox";
this.AntiDeadZoneTextBox.ReadOnly = true;
this.AntiDeadZoneTextBox.Size = new System.Drawing.Size(43, 20);
this.AntiDeadZoneTextBox.TabIndex = 14;
this.AntiDeadZoneTextBox.TabStop = false;
this.AntiDeadZoneTextBox.Text = "0 % ";
this.AntiDeadZoneTextBox.TextAlign = System.Windows.Forms.HorizontalAlignment.Right;
//
// DeadZoneTextBox
//
this.DeadZoneTextBox.Location = new System.Drawing.Point(395, 103);
this.DeadZoneTextBox.Name = "DeadZoneTextBox";
this.DeadZoneTextBox.ReadOnly = true;
this.DeadZoneTextBox.Size = new System.Drawing.Size(43, 20);
this.DeadZoneTextBox.TabIndex = 14;
this.DeadZoneTextBox.TabStop = false;
this.DeadZoneTextBox.Text = "0 % ";
this.DeadZoneTextBox.TextAlign = System.Windows.Forms.HorizontalAlignment.Right;
//
// SensitivityTextBox
//
this.SensitivityTextBox.Location = new System.Drawing.Point(395, 154);
this.SensitivityTextBox.Name = "SensitivityTextBox";
this.SensitivityTextBox.ReadOnly = true;
this.SensitivityTextBox.Size = new System.Drawing.Size(43, 20);
this.SensitivityTextBox.TabIndex = 8;
this.SensitivityTextBox.TabStop = false;
this.SensitivityTextBox.Text = "0 %";
this.SensitivityTextBox.TextAlign = System.Windows.Forms.HorizontalAlignment.Right;
//
// SensitivityLabel
//
this.SensitivityLabel.AutoSize = true;
this.SensitivityLabel.Location = new System.Drawing.Point(159, 138);
this.SensitivityLabel.Name = "SensitivityLabel";
this.SensitivityLabel.Size = new System.Drawing.Size(57, 13);
this.SensitivityLabel.TabIndex = 7;
this.SensitivityLabel.Text = "Sensitivity:";
//
// XInputLabel
//
this.XInputLabel.AutoSize = true;
this.XInputLabel.Location = new System.Drawing.Point(81, 20);
this.XInputLabel.Name = "XInputLabel";
this.XInputLabel.Size = new System.Drawing.Size(20, 13);
this.XInputLabel.TabIndex = 7;
this.XInputLabel.Text = "XI:";
//
// XInputValueLabel
//
this.XInputValueLabel.ForeColor = System.Drawing.Color.Blue;
this.XInputValueLabel.Location = new System.Drawing.Point(107, 20);
this.XInputValueLabel.Name = "XInputValueLabel";
this.XInputValueLabel.Size = new System.Drawing.Size(42, 13);
this.XInputValueLabel.TabIndex = 7;
this.XInputValueLabel.Text = "0";
this.XInputValueLabel.TextAlign = System.Drawing.ContentAlignment.TopRight;
//
// DInputValueLabel
//
this.DInputValueLabel.ForeColor = System.Drawing.Color.Green;
this.DInputValueLabel.Location = new System.Drawing.Point(33, 20);
this.DInputValueLabel.Name = "DInputValueLabel";
this.DInputValueLabel.Size = new System.Drawing.Size(42, 13);
this.DInputValueLabel.TabIndex = 7;
this.DInputValueLabel.Text = "0";
this.DInputValueLabel.TextAlign = System.Drawing.ContentAlignment.TopRight;
//
// PresetMenuStrip
//
this.PresetMenuStrip.AutoSize = false;
this.PresetMenuStrip.Dock = System.Windows.Forms.DockStyle.None;
this.PresetMenuStrip.Items.AddRange(new System.Windows.Forms.ToolStripItem[] {
this.ApplyPresetMenuItem});
this.PresetMenuStrip.Location = new System.Drawing.Point(395, 16);
this.PresetMenuStrip.Name = "PresetMenuStrip";
this.PresetMenuStrip.Padding = new System.Windows.Forms.Padding(0);
this.PresetMenuStrip.Size = new System.Drawing.Size(160, 20);
this.PresetMenuStrip.TabIndex = 22;
this.PresetMenuStrip.Text = "ApplyPresetsMenuStrip";
//
// ApplyPresetMenuItem
//
this.ApplyPresetMenuItem.DropDownItems.AddRange(new System.Windows.Forms.ToolStripItem[] {
this.P_5_100_0_MenuItem,
this.P_0_100_0_MenuItem,
this.P_0_80_0_MenuItem,
this.P_0_60_0_MenuItem,
this.P_0_40_0_MenuItem,
this.P_0_20_0_MenuItem});
this.ApplyPresetMenuItem.Name = "ApplyPresetMenuItem";
this.ApplyPresetMenuItem.Size = new System.Drawing.Size(156, 20);
this.ApplyPresetMenuItem.Text = "Click Here to Apply Preset";
//
// P_5_100_0_MenuItem
//
this.P_5_100_0_MenuItem.Name = "P_5_100_0_MenuItem";
this.P_5_100_0_MenuItem.Size = new System.Drawing.Size(321, 22);
this.P_5_100_0_MenuItem.Text = "5% DeadZone, 100% Controller Anti-DeadZone";
this.P_5_100_0_MenuItem.Click += new System.EventHandler(this.P_X_Y_Z_MenuItem_Click);
//
// P_0_100_0_MenuItem
//
this.P_0_100_0_MenuItem.Name = "P_0_100_0_MenuItem";
this.P_0_100_0_MenuItem.Size = new System.Drawing.Size(321, 22);
this.P_0_100_0_MenuItem.Text = "100% Controller Anti-DeadZone";
this.P_0_100_0_MenuItem.Click += new System.EventHandler(this.P_X_Y_Z_MenuItem_Click);
//
// P_0_80_0_MenuItem
//
this.P_0_80_0_MenuItem.Name = "P_0_80_0_MenuItem";
this.P_0_80_0_MenuItem.Size = new System.Drawing.Size(321, 22);
this.P_0_80_0_MenuItem.Text = "80% Controller Anti-DeadZone";
this.P_0_80_0_MenuItem.Click += new System.EventHandler(this.P_X_Y_Z_MenuItem_Click);
//
// P_0_60_0_MenuItem
//
this.P_0_60_0_MenuItem.Name = "P_0_60_0_MenuItem";
this.P_0_60_0_MenuItem.Size = new System.Drawing.Size(321, 22);
this.P_0_60_0_MenuItem.Text = "60% Controller Anti-DeadZone";
this.P_0_60_0_MenuItem.Click += new System.EventHandler(this.P_X_Y_Z_MenuItem_Click);
//
// P_0_40_0_MenuItem
//
this.P_0_40_0_MenuItem.Name = "P_0_40_0_MenuItem";
this.P_0_40_0_MenuItem.Size = new System.Drawing.Size(321, 22);
this.P_0_40_0_MenuItem.Text = "40% Controller Anti-DeadZone";
this.P_0_40_0_MenuItem.Click += new System.EventHandler(this.P_X_Y_Z_MenuItem_Click);
//
// P_0_20_0_MenuItem
//
this.P_0_20_0_MenuItem.Name = "P_0_20_0_MenuItem";
this.P_0_20_0_MenuItem.Size = new System.Drawing.Size(321, 22);
this.P_0_20_0_MenuItem.Text = "20% Controller Anti-DeadZone";
this.P_0_20_0_MenuItem.Click += new System.EventHandler(this.P_X_Y_Z_MenuItem_Click);
//
// ThumbUserControl
//
this.AutoScaleDimensions = new System.Drawing.SizeF(6F, 13F);
this.AutoScaleMode = System.Windows.Forms.AutoScaleMode.Font;
this.Controls.Add(this.MainGroupBox);
this.Name = "ThumbUserControl";
this.Size = new System.Drawing.Size(578, 193);
this.Load += new System.EventHandler(this.LinearUserControl_Load);
this.EnabledChanged += new System.EventHandler(this.ThumbUserControl_EnabledChanged);
((System.ComponentModel.ISupportInitialize)(this.SensitivityTrackBar)).EndInit();
((System.ComponentModel.ISupportInitialize)(this.MainPictureBox)).EndInit();
this.MainGroupBox.ResumeLayout(false);
this.MainGroupBox.PerformLayout();
((System.ComponentModel.ISupportInitialize)(this.DeadZoneNumericUpDown)).EndInit();
((System.ComponentModel.ISupportInitialize)(this.SensitivityNumericUpDown)).EndInit();
((System.ComponentModel.ISupportInitialize)(this.AntiDeadZoneNumericUpDown)).EndInit();
((System.ComponentModel.ISupportInitialize)(this.AntiDeadZoneTrackBar)).EndInit();
((System.ComponentModel.ISupportInitialize)(this.DeadZoneTrackBar)).EndInit();
this.PresetMenuStrip.ResumeLayout(false);
this.PresetMenuStrip.PerformLayout();
this.ResumeLayout(false);
}
#endregion
private System.Windows.Forms.Label DInputLabel;
private System.Windows.Forms.PictureBox MainPictureBox;
private System.Windows.Forms.GroupBox MainGroupBox;
public System.Windows.Forms.TrackBar SensitivityTrackBar;
private System.Windows.Forms.Label XInputLabel;
private System.Windows.Forms.TextBox SensitivityTextBox;
private System.Windows.Forms.Label SensitivityLabel;
private System.Windows.Forms.Label DeadZoneLabel;
public System.Windows.Forms.TrackBar DeadZoneTrackBar;
private System.Windows.Forms.TextBox DeadZoneTextBox;
public System.Windows.Forms.NumericUpDown AntiDeadZoneNumericUpDown;
private System.Windows.Forms.Label AntiDeadZoneLabel;
public System.Windows.Forms.NumericUpDown DeadZoneNumericUpDown;
public System.Windows.Forms.TrackBar AntiDeadZoneTrackBar;
private System.Windows.Forms.TextBox AntiDeadZoneTextBox;
private System.Windows.Forms.CheckBox SensitivityCheckBox;
public System.Windows.Forms.NumericUpDown SensitivityNumericUpDown;
private System.Windows.Forms.Label XInputValueLabel;
private System.Windows.Forms.Label DInputValueLabel;
private System.Windows.Forms.MenuStrip PresetMenuStrip;
private System.Windows.Forms.ToolStripMenuItem ApplyPresetMenuItem;
private System.Windows.Forms.ToolStripMenuItem P_5_100_0_MenuItem;
private System.Windows.Forms.ToolStripMenuItem P_0_100_0_MenuItem;
private System.Windows.Forms.ToolStripMenuItem P_0_80_0_MenuItem;
private System.Windows.Forms.ToolStripMenuItem P_0_60_0_MenuItem;
private System.Windows.Forms.ToolStripMenuItem P_0_40_0_MenuItem;
private System.Windows.Forms.ToolStripMenuItem P_0_20_0_MenuItem;
}
}
|
Engineering cell surfaces for orthogonal selectability.
Vectors have been constructed that express the chitin-binding domain (ChBD) on eukaryotic cell surfaces. The ChBD is linked to enhanced green fluorescent protein (EGFP) through a protein that spans the plasma membrane. This binding functionality does not have a counterpart in eukaryotes, thereby endowing the modified cell surface with a property that is orthogonal to animal cells. |
The thoughts of a Generation X Episcopal Priest. As I strive to be a faithful Christian, husband, father, and priest in The Episcopal Church, this serves as an account of my thoughts, experiences, and opinions. The opinions expressed are, of course, my own. Respectful responses are welcome.
Thursday, March 31, 2011
Government Involvement, Personal Freedom, and God's Purposes
OK, I'm going to go out on a limb here and post something more political. Fee free to skip if you wish. I'm one of that rare breed: a moderate Republican. Even rarer, I'm a Republican for Obama. I'm certainly not rare in that I'm (obviously) a Christian as well as a Republican. I do believe in limited government and that, in many cases, government has overstepped its original mandate to "establish justice, ensure domestic tranquility, provide for the common defense, promote the general welfare, [and] insure the blessings of liberty to ourselves and our posterity..." (constitutional preamble). Just because a law can be passed or a program can be funded doesn't mean that it should.
That being said, I'm increasingly feeling like my fellow Republicans are using the current state and federal fiscal crises as a "license to kill" any program that they've wanted to do away with for years for ideological reasons, regardless of its costs and benefits. A perfect example is the program whose board I sit on--Live Oak Adult Day Services. It is a program that provides care for seniors who would otherwise need constant care from relatives or would be relegated to nursing homes. From a fiscal point of view this is a complete no-brainer: the support that government entities, foundations, and individual contributors give to this program is infinitesimal compared to the amount of money saved by allowing caregivers who would otherwise need to stay home with these folks the opportunity to work, by keeping these seniors out of (often Medicare-funded) nursing homes, and delaying the need for (often expensive) in-home care. If you look at the cost/benefit analysis, this program work and has good "bang for the buck". Yet cities that are strapped for cash are having a hard time finding even the limited funds now used to support the program. The key words here? It isn't a mandated program. Other things are.
The whole problem with the personal freedom vs. government involvement debate can be illustrated on any public school playground. Left to themselves, people will generally act in their own short-term self interest. They will spend money now rather than wait and perhaps have to spend less later. They will not think about what they might need 5, 10, 20, or even 1 or 2 years out. Government exists, then to "promote the general welfare" by mandating that we take care of each other and of the instituions that will (God willing) take care of us when needed. Government funds alternative energy not because it is cheaper now than fossil fuels (although we're getting there, on both sides of that equation) but because it is in our long-term interest to develop alternative sources of energy. Government mandates energy efficiency (like increasingly efficient light bulbs) because we cannot sustain our current rate of energy consumption over the long term. Government funds programs like senior care, schools, and other service not because it has nothing else to do with the money, it does so because we need those institutions, either now for ourselves, our children, our parents, or our friends, their children and/or parents, or for us when we get to whatever stage in life that requires such services.
On the flip side, my fellow Republicans appear to have absolutely no problem continuing, even expanding, tax breaks for wealthy individuals and corporations, some of whom have even said that they don't need them! If "no government involvement" is good policy for social services, why isn't it good policy for corporate subsidies and tax breaks? The double standard is stunning.
OK, enough ranting. My hope and prayer (and it seems like more of a prayer than a hope) is that we will elect (and re-elect) those folks who are willing and able to rise above partisanship, to cut spending on or fix programs that are ineffective, to "promote the general welfare" by taking care of the most vulnerable folks around is (and, equally important, help them to help themselves), and "insure the blessings of liberty to ourselves and our posterity (i.e. future generations)" by tackling and solving major problems before our entire social and governmental fabric collapses--which seems increasingly likely as the days and weeks go on.
What does all of this have to do with God, one might ask. God allows us to make our own choices in this world. God also works through both individuals and institutions to accomplish God's purposes. God is especially concerned with the plight of the poor and powerless and has very little concern for the rich and powerful, except to warn them that their wealth and power are fleeting and are to be used for good and not for selfish ends. To say a policy or law is "Christian" that does not align with that concern for the poor and responsibility of the rich means one is being extremely selective in their Bible reading. No, we don't have unlimited funds or unlimited energy. We do have to make choices. May they be choices that are both in our long-term interest and also reflect God's concern for those without a seat a the table. |
“Although Islam has a religious component, it is much more than a simple religious ideology,” he wrote. “It is a complete geo-political structure and, as such, does not deserve First Amendment protection.”
Hice, a Baptist minister and talk-radio host, also wrote that he believes the Muslim Brotherhood is trying to infiltrate the U.S. to impose Sharia law on the country, according to the Atlanta Journal-Constitution
And in 2011, he made similar anti-Islamic statements during an event with the Coweta County Tea Party Patriots, according to The Citizen.
"Most people think Islam is a religion, It’s not. It’s a totalitarian way of life with a religious component. But it’s much larger. It’s a geo-political system that has governmental, financial, military, legal and religious components. And it’s a totalitarian system that encompasses every aspect of life and it should not be protected [under U.S. law]," he said.
"This is not a tolerant, peaceful religion even though some Muslims are peaceful. Radical Muslims believe that Sharia is required by God and must be imposed worldwide. It’s a movement to take over the world by force. A global caliphate is the objective," Hice continued.
Hice is running in the Republican primary to replace Rep. Paul Broun (R-GA), who ran for the vacant U.S. Senate seat, but lost during the initial primary. Hice placed first in the Republican primary by a narrow margin, and faces Mike Collins in a July runoff election, according to the Journal-Constitution. |
T. indica
T. indica may refer to:
Tamarindus indica, the imli or tamarind, a tree species
Tarucus indica, the Indian Pierrot, a small butterfly species found in India of the lycaenids or blues family
Tatera indica, the Indian gerbil, a rodent species found in Afghanistan, India, Iran, Iraq and Kuwait
Tilakiella indica, the single species in the monotypic genus Tilakiella
Tilletia indica, the Karnal bunt, a smut fungus species
Tringa indica, the red-wattled lapwing, a bird species
Trypeta indica, a fruit fly species
See also
Indica (disambiguation) |
It is time to end the death penalty
Angelus NewsMarch 17, 2015
death-penalty
It is time for our country to put an end to the death penalty.
There is a case pending right now in the U.S. Supreme Court that is looking at the practical problems with the way capital punishment is administered through lethal injections. The justices will hear arguments on the issue next month.
The Supreme Court’s review comes at a time when many people are rethinking the issue of capital punishment.
Eighteen states have now banned the death penalty and the numbers of executions and death penalty convictions are decreasing every year. In 2014, there were 35 executions nationwide, the lowest number in 20 years.
In recent years, there have been highly publicized incidents where executions have been mishandled. In one instance, a convicted murderer spent more than 40 minutes in agony after receiving a lethal injection that was supposed to kill him within minutes.
There is also substantial evidence that the death penalty is imposed far more often on racial minorities and the poor. And sadly, in some cases we have seen that, due to judicial error, some of those sent to death row did not actually commit the crimes they were convicted of.
The Catholic Church has been calling for the abolition of the death penalty for more than 40 years.
The Church has been thinking about these issues of crime and punishment and the common good for a long time, beginning with the teachings of Jesus and the apostolic writings of the New Testament.
Through the centuries, the Church has always recognized that governments have the duty to protect people and to punish those who threaten the safety of citizens and society’s good order.
St. Thomas Aquinas said public authorities are justified in taking a person’s life if that person endangers the common good. This is still the Catholic teaching.
The Catechism says that governments may impose the death penalty “if this is the only possible way of effectively defending human lives against the unjust aggressor.”
And that is precisely the moral issue we face in our times.
Today, through advances in law enforcement and criminal justice, our society has many ways to punish violent offenders and to prevent them from committing further violence.
As St. John Paul II said in his great letter, The Gospel of Life, society should only choose “the extreme of executing the offender” in “cases of absolute necessity, in other words, when it would not be possible otherwise to defend society.”
But he added, in words that are quoted in the Catechism, in our times there is almost never any real justification to execute anyone. Cases where the death penalty might be justified are “very rare, if not practically non-existent,” St. John Paul said.
We do not need to kill criminals to defend our society.
More than that, the continued acceptance of the death penalty contributes to a culture in which people too often think their problems can be “solved” by violence and killing.
The death penalty is not at all like abortion or euthanasia. Abortion is the killing of innocent life in the womb and euthanasia is the killing of the sick and defenseless.
We recognize that those on death row are not innocent. They have been convicted of grave evil. Not only have they taken the lives of their victims, they have caused deep and lasting trauma to their victims’ families, loved ones and neighbors.
So we can never compare the state’s use of capital punishment with the fundamental evils of abortion and euthanasia.
But we do say that even the lives of the worst and most dangerous criminals are sacred and we hold out the hope that even these lives can be changed and rehabilitated — through the mercy of God.
As a nation and as a society, our justice must be tempered with mercy or we risk losing something of our own humanity.
And as Christians we are called to proclaim the Gospel of life and to work so that our criminal justice system always respects the dignity of every human person.
So let’s keep praying for one another this week. Let’s pray for the grace to be more open to the light of Christ and the social teachings of his Church. |
/**
* @copyright Copyright 2014 Google Inc. All rights reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* @fileoverview chartWrapperService is an angular service used to create
* instances of google.visualization.ChartWrapper. It also provides some helper
* methods around ChartWrapper. To learn more about ChartWrapper, see:
* https://developers.google.com/chart/interactive/docs/reference#chartwrapperobject
*
* @author joemu@google.com (Joe Allan Muharsky)
*/
goog.provide('p3rf.perfkit.explorer.components.widget.data_viz.gviz.ChartWrapperService');
goog.require('p3rf.perfkit.explorer.components.util.ArrayUtilService');
goog.require('p3rf.perfkit.explorer.components.widget.data_viz.gviz.getGvizChartWrapper');
goog.require('p3rf.perfkit.explorer.models.ChartModel');
goog.require('p3rf.perfkit.explorer.models.ChartType');
goog.scope(function() {
const explorer = p3rf.perfkit.explorer;
const ArrayUtilService = explorer.components.util.ArrayUtilService;
const ChartModel = explorer.models.ChartModel;
const ChartType = explorer.models.ChartType;
/**
* Describes the type definition for a chart.
* @constructor
*/
explorer.components.widget.data_viz.gviz.ChartTypeModel = function() {
/**
* Provides a real-world title for the chart.
* @export {string}
*/
this.title = '';
/**
* Provides the className (and documentation id) for the chart.
* @export {string}
*/
this.className = '';
};
var ChartTypeModel = explorer.components.widget.data_viz.gviz.ChartTypeModel;
/**
* See module docstring for more information about purpose and usage.
*
* @param {function(new:google.visualization.ChartWrapper)} GvizChartWrapper
* @constructor
* @ngInject
*/
explorer.components.widget.data_viz.gviz.ChartWrapperService = function($http,
GvizChartWrapper, arrayUtilService) {
/**
* @private
*/
this.http_ = $http;
/**
* @type {function(new:google.visualization.ChartWrapper)}
* @private
*/
this.GvizChartWrapper_ = GvizChartWrapper;
/**
* @type {!ArrayUtilService}
* @private
*/
this.arrayUtilSvc_ = arrayUtilService;
/**
* A list of legend alignments for GViz charts.
* @export {!Array.<!string>}
*/
this.LEGEND_ALIGNMENTS = [
'start',
'center',
'end'
];
/**
* A list of legend positions for GViz charts.
* @export {!Array.<!string>}
*/
this.LEGEND_POSITIONS = [
'none',
'top',
'right',
'bottom',
'left',
'in'
];
/**
* A list of tooltip triggers for GViz charts.
* @export {!Array.<!string>}
*/
this.TOOLTIP_TRIGGERS = [
'none',
'focus',
'selection',
'both'
];
/**
* An angular-exposed copy of ChartType.
* @export @enum {string}
*/
this.CHART_TYPES = explorer.models.ChartType;
/**
* Provides an ordered list of charts.
* @type {!Array<!ChartTypeModel>}
* @export
*/
this.allCharts = [];
/**
* Provides an indexed list of charts.
* @export {!Object.<string, !ChartTypeModel>}
*/
this.allChartsIndex = {};
this.loadCharts();
};
const ChartWrapperService = (
explorer.components.widget.data_viz.gviz.ChartWrapperService);
/**
* Loads a list of available charts from a JSON file.
*/
ChartWrapperService.prototype.loadCharts = function() {
this.http_.get('/static/components/widget/data_viz/gviz/gviz-charts.json').
success(angular.bind(this, function(response) {
goog.array.extend(this.allCharts, response);
this.allChartsIndex = /** @type {!Object<!ChartTypeModel>} */ (
this.arrayUtilSvc_.getDictionary(this.allCharts, 'className'));
})).
error(angular.bind(this, function(response) {
while (this.allCharts.length > 0) {
this.allCharts.pop();
}
}));
};
/**
* Returns a new instance of a google.visualization.ChartWrapper.
*
* @param {?string=} opt_chartType
* @param {*=} opt_gvizOptions
* @param {?google.visualization.DataTable=} opt_dataTable
* @param {?google.visualization.DataView=} opt_dataView
* @return {google.visualization.ChartWrapper}
*/
ChartWrapperService.prototype.create = function(
opt_chartType, opt_gvizOptions, opt_dataTable, opt_dataView) {
let chartWrapper = new this.GvizChartWrapper_();
if (opt_chartType) {
chartWrapper.setChartType(opt_chartType);
}
if (opt_gvizOptions) {
chartWrapper.setOptions(opt_gvizOptions);
}
if (opt_dataTable) {
chartWrapper.setDataTable(opt_dataTable);
}
if (opt_dataView) {
chartWrapper.setView(opt_dataView);
}
return chartWrapper;
};
/**
* Returns a ChartModel object based on the ChartWrapper configuration.
*
* @param {google.visualization.ChartWrapper} gvizChartWrapper
* @return {ChartModel}
*/
ChartWrapperService.prototype.getChartModel = function(gvizChartWrapper) {
let model = new ChartModel();
model.chartType = gvizChartWrapper.getChartType();
model.options = gvizChartWrapper.getOptions();
return model;
};
}); // goog.scope
|
Q:
How to set spell check languages browser without displaying menus in those languages
I have not found a way to set the language in ubuntu to check the spelling, but not write the menus in that language.
My case is: my main language is dutch, and I want my system in dutch, with english as secondary language. Only those two languages for menus and terminal communication etc.
But I would need spell check in english, dutch, french, hungarian and maybe german. This not only in certain programs like libreoffice, but system-wide (while I'm typing all of this, my screen's full of red).
Until now, the only way I have found to get spell check working in all of those languages is to install and order them all in language support (or however it is called in english), which makes a huge mess of all kinds of different languages mixed through one another.
Running Ubuntu 16.04 LTS
EDIT: Here is my language support arrangement for now
Here are the choices I have in google chrome.
Translation:
Spell check
All your languages
Dutch
Dutch
English (US)
These seem fairly random to me, I have rebooted after having changed the language settings.
A:
I seem to have figured out the cromium problem, apparently chromium does not use the default sources, but a dedicated menu in which you can choose which languages to use. In my question I have the drop-down menu, and under the languages, there is a button Language settings. The available options for language support were a bit hidden to me in LibreOffice, that is where my confusion came from.
This is the menu where I can choose the languages for Chromium, maybe it checks it with an on-line dictionary as opposed to the downloaded ones for the rest of the programs.
Anyways, this was the cause of my confusion/problem.
|
Franco Ventriglia
Franco Ventriglia (October 20, 1922 – November 28, 2012) was an opera singer who sang bass in every major European opera house during the 1950s, 60s, and 70s. He returned to the U.S. in 1978, where he continued to perform at venues including Carnegie Hall, and traveled to perform in southeast Asia, until his retirement in 2001 at age 79.
Biography
Franco Ventriglia was born on October 20, 1922, in Fairfield, Connecticut. He grew up on a vegetable farm and graduated from Roger Ludlowe High School in Fairfield in 1941. He enlisted in the Marine Corps, serving in the 1st Marine Aircraft Wing in the South Pacific during World War II. After returning from the war, he was working at his brother's filling station in Easton, Connecticut when Mario Pagano, a maestro de Canto at the American Theatre Wing Professional School heard from one of Ventriglia's coworkers about his singing talent. Ventriglia passed an audition and went on to attend the school on the G.I. Bill, crossing paths with classmate Marlon Brando, among others.
Singing career
Ventriglia worked as an inspector at Sikorsky Aircraft in Stratford, Connecticut and sang in local concerts. After attending a few of Ventriglia's concerts in Bridgeport, Connecticut, Igor Sikorsky, a music lover, granted Ventriglia permission to take one day off from work each week to continue his voice studies in New York City.
After Pagano's death, Ventriglia and his wife Jean boarded the ocean liner SS Constitution for Italy. On board, after singing Ol' Man River for a group in first class, he met a businessman who asked him to contact Toti Dal Monte, a great coloratura soprano who also taught voice in Rome. Ventriglia took singing lessons from Dal Monte and eventually made his operatic debut in Palermo, singing in the Die Meistersinger von Nürnberg. He later sang with Luciano Pavarotti in La bohème and Rigoletto. He performed in Samson and Delilah at La Scala, a performance he considered the highlight of his career.
Retirement
Ventriglia's last concert was at the age of 79.
References
External links and sources
Record-Journal.com interview with Franco Ventriglia
Successful opera career was destiny, a December 2004 article from a Connecticut newspaper
Recordings by Franco Ventriglia from Amazon.com
Category:Operatic basses
Category:American male singers
Category:American opera singers
Category:People from Wallingford, Connecticut
Category:1922 births
Category:2012 deaths
Category:People from Fairfield, Connecticut
Category:United States Marines |
Q:
Add Element to Document and find with XPath
I have code that searches XML Documents (org.w3c.dom) using namespace-aware XPath. I am having issues with adding elements to the document and then being able to find them via the XPath.
If I add the elements and search using the XPath I do not get any result. However, if I convert the Document to a String and reparse to a Document, the XPath finds the element.
I create the XPath as follows:
String myXPathQuery = "/ns1:element1/ns2:element2/ns3:element3";
XPathFactory fact = XPathFactory.newInstance();
XPath xpath = fact.newXPath();
xpath.setNamespaceContext(myNSContext);
XPathExpression myXPathExpression = xpath.compile(myXPathQuery);
I am adding the element as follows:
Document doc = ...;
Element elementToWhichToAdd = ...; // this is "ns2:element2"
Element newElement = doc.createElement("ns3:element3");
elementToWhichToAdd.appendChild(newElement);
If I run the above XPath against this Document it doesn't find anything. But if I reparse the Document the XPath works.
What am I missing?
EDIT
As part of the process by which I update the document I add the Namespace if it does not exist (it usually does not).
Element rootElement = doc.getDocumentElement();
NamedNodeMap map = rootElement.getAttributes();
if (map.getNamedItem("xmlns:ns3") == null)
rootElement.setAttributeNS("http://www.w3.org/2000/xmlns", "xmlns:ns3",
"urn:exo:/path/to/xsd/in/jar");
A:
Element newElement = doc.createElement("ns3:element3");
createElement is a DOM level 1 method that is not namespace aware - its JavaDoc says that it returns
A new Element object with the nodeName attribute set to tagName, and localName, prefix, and namespaceURI set to null.
You need to create the new elements using the DOM level 2 createElementNS instead
Element newElement = doc.createElementNS("urn:exo:/path/to/xsd/in/jar", "ns3:element3");
(or whatever is the correct namespace URI that corresponds to ns3, you could get it directly from the namespace context using myNSContext.getNamespaceURI("ns3")).
|
Friday, July 24, 2009
I am so excited I don't think I'll be able to sleep tonight - I am not kidding!!! I was in a shop today that is a crafter's consignment /antique booth shop. I saw this basket and of course had to look at the tag. I read the tag, rubbed my eyes, read the tag again and about screamed. I absolutely LOVE antique baskets, but can't afford many of them. I now have 4 wonderful antique baskets. The handle is very heavy and worn smooth from years of use, it feels wonderful in my hand. Are you ready for the price on this beauty?
$12.50! I just couldn't believe it. I have seen similar baskets for up to 20 times the amount I paid for it at antique shops and flea markets. My DH asked me when I was going to sell it to make that profit, I'm sure my look stopped him in his tracks. I don't think it's going to leave my sight for some time to come.
I was a little nervous that I'd have to fight off another shopper in my quest to own this basket. I kept glancing at it at the checkout table while I continued shopping. It was meant to be MINE. Thanks for letting me scream at all of you - I'm just so EXCITED!
Sunday, July 19, 2009
for the directions for this wonderful little counter top shelf. Very quickly this morning DH cut this out for me. After returning from our baseball games (imagine that a baseball game!) I painted it black, followed by 2 coats of raw sienna sanded it down and stained it with special walnut. It looks great on our kitchen counter.
I found the canisters at a garage sale for 25 cents each, painted the wood lids black, sanded them and stained them to prim them up. I still need to add antique prim labels. The canister on the left is filled with my homemade automatic dishwasher detergent, scroll down through the posts and you will find the recipe. I made the stump doll last fall and she coordinates well with the new display.
Melissa, I actually mentioned to DH as he was cutting this out that he should make 2 - do you want one?
Saturday, July 18, 2009
Had to share one of my latest weavings. I carry a basket like this to work, as we are required to carry a basket. This one doesn't look old fashioned at all, but they give us basket weavers a break! This one was a special order with chocolate brown shaker tape handles and a fine brown print liner. I have another one to make up for another gal so I must get busy weaving that one too. I'll post this on my selling blog, if you are interested. Have a great weekend. ~Ann
Wednesday, July 15, 2009
No picture with this post, just a wonderful recipe. I hope you all try this recipe as it will save you a ton of money. Up until about a month ago I was hooked on using the automatic dishwasher tablets. Then I began reading about going "green" with your household cleaners. Not only is this recipe easy on your wallet, it is easy on the environment. I've used it in our automatic dishwasher for over a month and LOVE it. 2 cups washing soda (made by Arm & Hammer, found in the laundry aisle)1 cup Borax1 cup baking soda Mix all together and use just under 1 tablespoon per load of dishes. I put it in the receptacle that closes prior to starting the dishwasher. In the effort to "go green" I found a canister/glass jar with lid at a garage sale for 25 cents. After I apply an "old" label to it I'll share a photo. ~Ann
Tuesday, July 14, 2009
Garage sale finds of the summer - or at least my favorite items so far this summer! I found the bowl for $2.00 - it has a small crack in the back, that's okay it mixes in better with all my other cracked items. The inkwell was 25 cents. This is a hand thrown piece that was signed by the potter. I found this peg rack at a garage sale for 25 cents. I think it was meant to be used as a tool holder in the garage, but with a little paint it now looks just fine in our bedroom. I'm not 100% happy with the arrangement on it, but I'll tweak it when I have more time. It did have dried wood glue on the top - I pondered for a while on how to remove it and decided to take my embossing gun to heat it up and scrape it off - it worked wonderfully.
Remember my seasonal carpal tunnel disease? It's continued in full force. I had to share this photo with all of you. Our 11 year old all star team took 1st place in a 12 year old tournament last Friday night. The kids had 9 games in 7 days, whew! Our 11 year old DS is on this team, 1st row, 1st player on the left. This team is a sanctioned Little League team so we start playing towards that goal this coming weekend. DH is one of the coaches - middle in the back row. I love the picture, everyone is smiling - they were psyched to win a 12 year old tournament.
Add in the fact that our 8 year old had 2 games mixed in and you'll know where I've been spending my evenings.
Hope you all are having a great summer - we are enjoying a cooler summer that usual. ~Ann |
Legionellosis is a potentially fatal infectious disease caused by the bacterium Legionella pneumophila and other legionella species. Two distinct clinical and epidemiological syndromes are associated with Legionella species: Legionnaires' disease is the more severe form of the infection, which may involve pneumonia, and Pontiac fever is a milder respiratory illness.
The pathogenesis of L. pneumophila is derived from its growth within lung macrophages. One of the L. pneumophila's type IV secretion systems, the Dot/Icm secretion system, is of critical importance for its ability to replicate and to cause disease. The Dot/Icm substrates modulate multiple host cell processes and in particular, redirect trafficking of the L. pneumophila phagosome and mediate its conversion into an ER-derived organelle competent for intracellular bacterial replication. L. pneumophila also manipulates host cell death and survival pathways in a way that allows continued intracellular replication. |
Maximizing the reliability and validity of the findings of clinical research and reducing publication bias are unquestionable challenges for peer-reviewed medical journals as they are devoted to being reliable sources for clinical judgments, medical practice, and heath policymaking ([@b1-925-926]). In addition, where to publish medical research and how to avoid questionable journals are additional challenges for clinical researchers ([@b2-925-926], [@b3-925-926]). However, the world of medical science recently has been attacked by a new phenomenon, i.e., hijacked journals. The cybercriminals have been involved in creating counterfeit websites for scientific journals since early in 2012 ([@b4-925-926]--[@b7-925-926]). They extended their scam to the medical and clinical science journals recently by hijacking seven prestigious medical journals, including Emergencias (an emergency medicine journal from Spain), the Journal of the American Medical Association (JAMA), Vitae-Revista (The Official Publication of the Faculty of Pharmaceutical Chemistry at the University of Antioquia, Colombia), Amala (published by the Amala Cancer Research Center in India), TERAPEVTICHESKII ARKHIV (from Russia), Kardiologiya (from Russia), and Revue Scientifique et Technique (published by the World Organization for Animal Health).
A main concern about this new phenomenon is that the unreviewed manuscripts that are published on counterfeit websites become a source for clinical practice and health policy making, since such articles definitely will appear in the search result of any attempt at a systematic review on the clinical literature. A second significant threat the hijacked journals impose on medical science is that their unreviewed findings will be a source for new medical hypotheses that can be used to attack the reliability and validity of future clinical research findings ([@b7-925-926]). Warning the world of medical science about this new scam and considering rigorous technical review of the citations to and from medical articles could be the most practical measures in the short term; however, we must determine long-term measures to protect the reliability and validity of published medical research ([@b4-925-926]).
|
Q:
I can't set "options" property of my select class, after I fetching it. It's empty
I have a list and I want to filter it by language. I fetched the list of languages from backend, and it works, and I wanted to populate a select with it. But when I want to set the list of languages as property to a react Select class, it stays as an empty list, as I set it in the constructor
class Informations extends React.Component {
constructor(props) {
super(props);
this.state = {
languages: [], //the list has this value in LanguageSelect
selectedLanguage: ""
};
}
componentDidMount() {
getLanguages().then(response => {
this.setState({ languages: response });
})
//after this, the value of this.state.languages changed
}
render() {
return (
<div className="content">
<LanguageSelect options={this.state.languages}>
{/*here I add an options property with the list*/}
</div>
);
}
}
class LanguageSelect extends React.Component {
constructor(props) {
super(props);
this.state = { langs: [] };
}
componentDidMount() {
this.setState({ langs:this.props.options });
}
render() {
return (
<select onSelect={this.handleSelect}>
{this.state.langs.map((prop, key) => {
return (<option key={key}>{prop}</option>);
})}
</select>
);
}
}
A:
You do not need to store options to the local state in LanguageSelect. As they are passed as props you should use them directly. At the time of mount that data is not available and thats why its empty
class LanguageSelect extends React.Component {
constructor(props) {
super(props);
this.state = { langs: [] };
}
render() {
return (
<select onSelect={this.handleSelect}>
{this.props.options.map((prop, key) => {
return (<option key={key}>{prop}</option>);
})}
</select>
);
}
}
|
Any unlikely chance Todd Carney has of returning to Cronulla rests with the embattled club's board, but the former Dally M medallist remains a possibility of coming back to the NRL.
Carney moved a step closer to a possible NRL return on Thursday when he spoke with Sharks management, including chief executive Lyall Gorman, for the first time since winning his unfair dismissal case.
The former representative star, who is playing for Super League club Catalans, was sacked by the Sharks in June after an unsavoury image of him went viral on social media.
Carney appealed the sacking and last month won the wrongful dismissal case against Cronulla within the NRL's appeals structure and he may not be entitled to compensation.
He spoke with the Sharks over Skype early on Thursday morning for the first time since winning his appeal, and the club will meet later this month to discuss his possible return.
However Sharks chairman Damien Keogh has said previously the club would have sacked Carney regardless of the process and is unlikely to pave the way for his return.
With the Sharks enduring a horror 0-4 start to the season and lacking a creative playmaker coach Shane Flanagan is said to be open to the idea of a Carney comeback.
But the club management, led by Keogh and Gorman, is wary of the bad publicity, and the capacity to reoffend, that comes with the former Canberra, Cronulla and Sydney Roosters five-eighth.
Carney wasn't banned by the NRL however, and he could come back to Australia with the Sharks or even another club if the game's governing body allows it.
"A club would need to lodge a contract for his return and they would need to show that he was a fit and proper person to play in the NRL," an NRL spokesman said. |
Contact Us
Events, Workshops, and Tours
Event Series
Library events support academic success and promote scholarship, engagement, and community. Many of our events are open to the public, and we welcome and encourage a broad audience of students, faculty, staff, alumni and neighbors.
Colloquium on Scholarly Communication: The American University Library's Colloquium on Scholarly Communication features experts from both American University and the larger academic community presenting on challenges for academia in the twenty-first century.
Exploring Social Justice: The Exploring Social Justice Series, a program cosponsored by the American University Library, the Center for Diversity and Inclusion, and the Kay Spiritual Life Center, brings to campus exemplary leaders from diverse backgrounds who have advocated for various human rights and social justice issues.
Research in Progress: These events showcase research from across the American University community, with a special emphasis on innovative or multidisciplinary approaches, as well as initiatives from AU 2030.
Workshops and Tours
The AU Library offers a variety of instructional programming that includes walk-in classes, curriculum-integrated sessions, multimedia software trainings, and online learning modules to support the development of students' information and digital literacy.
Geospatial Workshops: Come to the Geospatial Research Lab to learn more about Geographic Information Systems. For more information, please contact Meagan Snow, Program Director for Geospatial Research Support.
NMC Workshops: The New Media Center offers open workshops on a variety of topics related to multimedia production. These 40 to 60 minute sessions are open to all AU faculty, staff and students with all levels of multimedia production experience.
Library Tours: Come to a guided tour to discover the library's many services as well as see the research collections, collaborative workspaces and technology that can help you become a better student, researcher, or multimedia designer.
Hosting Events in the Library
We have a number of large and small conference room and classroom areas available. Room availability is based on Library hours, space needs for Library instruction, and use by Library-sponsored events. Library spaces are subject to blackout dates during high-volume study periods.
If you wish to use library space for a meeting or event, please have your department subscheduler submit a space request via 25Live. If the reservation is accepted, our subscheduler will work with the group to ensure all needs are met for the event. In order to ensure correct set-up, audio visual support must be arranged separately for all reservations. Please contact Audio Visual Services directly at 202-885-2296.
Info Icon Contact Us
*To request accessibility information or a disability-related accommodation, please contact us at least two weeks in advance.
Bullhorn Icon Promote an Event
We allow the posting of event flyers in appropriate spaces. Please see the Information Desk for more information.
Lightbulb Icon Suggest an Event
Do you have an idea for an event that would be perfect for the Library? Please email us with as much detail as possible for consideration. We also can provide staff, resources, or logistical support for co-sponsored events anywhere on campus. |
Q:
C server socket closed but client socket still able send two more packages
I am learning socket on c. I have a client and a server, when the server closed the socket, the client still able to receive and sent to server two more packages before the send get a SIGPIPE signal. I don't know why. Can anyone help pls~
since the documentation said that if the send and recv have error then they will return -1. But this never happen in my case here.
Client side
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <signal.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#define BUFFERSIZE 255
#define MAXLENG 96
#define true 1
#define false 0
void exitp();
int main(int argc, char *argv[]){
signal(SIGPIPE, exitp);
// Check if the argument is match the requirement
if (argc != 3) {
fprintf(stderr, "Useage Error, should be follow by ip, and port\n" );
exit(1);
}
// Create the socket for the client, if the fd for the socket == -1, it means
// it created fail
int skfd = socket(AF_INET, SOCK_STREAM, 0);
if (skfd < 0){
fprintf(stderr, "Create socket failed\n" );
exit(1);
}
int PORT = atoi(argv[2]);
// Set up server argument
struct sockaddr_in server_addr;
memset(&server_addr, '0', sizeof(server_addr)); // addr for bin
server_addr.sin_family = AF_INET;
server_addr.sin_port = htons(PORT);
// ip not vaild
if (inet_pton(AF_INET, argv[1], &server_addr.sin_addr) < 1){
fprintf(stderr, "IP address not correct\n" );
exit(1);
}
// create the connection
if (connect(skfd, (struct sockaddr *)&server_addr, sizeof(server_addr)) == -1){ // Connect to server
fprintf(stderr, "Connection Fail\n" );
exit(1);
}
char sentbuff[255], recvbuffer[255], input[255], request[100], concelbuffer[255];
// Send the request to the server
int nn;
int size = send(skfd, request, sizeof(request),0);
while(1){
if (recv(skfd, &recvbuffer,sizeof(recvbuffer),0) == -1){
printf("Server Closed\n");
break;
}
printf("%s",recvbuffer);
fgets(sentbuff, 255, stdin);
nn=send(skfd, &sentbuff, sizeof(sentbuff), 0);
if (nn == -1){
printf("Server Closed\n");
break;
}
}
return 0;
}
void exitp(){
printf("%s\n","Server Closed" );
exit(0);
}
server side I used shutdown and close for the acceptfd
A:
send() just puts the data in the kernel socket buffer, it doesn't wait for the data to be transmitted or the server to acknowledge receipt of it.
You don't get SIGPIPE until the data is transmitted and the server rejects it by sending a RST segment.
It works this way because each direction of a TCP connection is treated independently. When the server closes the socket, it sends a FIN segment. This just tells the client that the server is done sending data, it doesn't mean that the server cannot receive data. There's nothing in the TCP protocol that allows the server to inform the client of this. So the only way to find out that it's not accepting any more data is when the client gets that RST response.
Informing the client that they shouldn't send anything more is usually done in the application protocol, since it's not available in TCP.
|
Preview: Stevenage vs Everton
…Yeah, right. Not only is it notoriously hard to shut me up, it’s also impossible to have a week when there’s no Everton to think about. Like in late May when you’re scribbling in every box of your calendar how many days are left until Everton grace that Goodison turf again. No, just me? Alright then.
League form has been a tad inconsistent in recent times, although looking at the last six Premier League games our form reads WLWDWD. Hardly the stuff of nightmares, but at some point we will have to win back-to-back games. So Stevenage can roll over first, and then the red sh*te are the next in line. Plays out like one of those jarg “thriller” films where you know there’s gonna be some horror amidst the uncertainty but you don’t know where. Even tougher to know nowadays when you can’t just point to Diniyar Bilyaletdinov or Per Kroldrup.
What better time, then, to delve straight back into the FA Cup? The media is as predictable as a Leon Osman pass and twice as inaccurate nowadays, so amidst the annual interview with someone from Bournemouth, Wrexham or Sutton United there’s a snide reference to Shrewsbury as we prepare to travel to a side used to causing shocks. Mostly because every team they play is streets ahead of them. Stevenage can beat Newcastle at home, which is about as impressive as winning a three-legged race tied to Gerard Deulofeu. Yeah, congrats lids.
But Stevo boss Graham Westley is adamant that Everton are gonna be as miserable as Preston were when they travelled to Hertfordshire, and he was the Preston boss. In fact, any Blue crossing that line between Buckinghamshire and that no-man’s land is gonna feel a bit down. Goes with the territory. The only table this lot top concerns teen pregnancies. But Westley’s got a master plan, eh? A way to outplay us, perhaps? Aye, he’s banking on the pitch being sh*te and us not quite being arsed so they can put one in the air and grab a goal. So he’s not banking on much.
In case you’re wondering, that’s Arouna Kone.
Roberto’s taking the p*ss a bit too, calling them “favourites”. I’m not sure if it’s courtesy or he’s trying to drive up the odds for us, but it’s a bit of a giggle. West Brom on Monday was a pain. The pitch looked like they’d let Luis Suarez do some “Spanish penalty-winning” practice on there for a few hours and Pepe Mel pulled off the miracle that is making Brummies look arsed about something. What it boils down to is that we were lethargic and perhaps should’ve been concentrating on both the game and not putting feet in mouths in interviews. Quenelle, Romelu.
But, poor performance aside, the big issue is squad depth. It’d be nice to field a different XI to the one that played on Monday, especially if that side didn’t have Magaye Gueye in it. But some players will have to do a shift today and in the derby. Joel Robles fills up the goal, while Bryan Oviedo will do that left back thing he does, as well as that left wing, right wing and attacking midfielder thing he also does in his spare time. Tony Hibbert might get a game as there won’t be much running to do, and there will be plenty of crunching tackles. Darius Charles has only just woken up from when Hibbo sorted him out in August, so there’s a nice reunion to be had. Stones will most likely partner Jags in the middle.
Leon Osman’s a cert – ey, stop that moaning – and with no Ross Barkley he’ll sit behind the centre forward with Barry and McCarthy bossing things in the middle. Heitinga? Still here, is he? Suppose we could inflict him on, well, us. Steven Naismith may be good for a run-out, as he tries to stake his claim for all games against League One opposition, while Aiden McGeady could be handed a start. Unlikely though. Pienaar and Mirallas can at least look menacing from the bench. Romelu Lukaku will be up against players with similar physicality but less pace and skill, which he really needs to exploit. Seeing as that lanky streak o’ p*ss Lacina Traore is about, it’s definite that we’ll always have a-loan striker. Ahaha. Apologies.
If you’re still reading, cheers. Stevenage are a side that even Tranmere Rovers fancy beating – before f*cking it up – so the mighty Everloan shouldn’t be quaking at any particular player. What’s more, our downright shocker of a League Cup tie earlier this season, punctuated by Gerard Deulofeu and Marouane Fellaini remembering how to play football for a few choice moments, has actually given them hope of an upset in this tournament. Whatever. Enjoy your day, ladies and gents. Watch some real entertainment as you gorge on your overpriced cheese-chip disaster zone.
“He’s good, but he’s no Steven Naismith” said Steven Naismith
Luke Freeman, he of the “I was at Arsenal in the Invincibles year, cleaning blood off Vieira’s boots” camp, has a bit of pace to burn. Meanwhile, Francois Zoko is a bit of a presence. But I can’t help feeling very happy for this lot. Not only will they see top flight-quality players and Steven Naismith gracing their turf/mud, but the money they make from making it this far and having gullible TV companies coming down to see what would be a corker of an upset if it could actually happen allows them to hand out new contracts to star players and possibly even dip into the transfer window for more than an emergency loan. Oh, how we envy them.
There’s so much up for grabs at the moment: fourth place, the FA Cup. So all I can really say is, go ‘ed Everton. Teach this lot a lesson, eh? |
Brazil at the 1998 Winter Olympics
Brazil sent a delegation to compete at the 1998 Winter Olympics in Nagano, Japan from 7–22 February 1998. The delegation consisted of a single athlete Marcelo Apovian, who competed in alpine skiing. Making his second Olympic appearance, he finished his only event, the men's super-G in 37th place, last among those who finished the race.
Background
The Brazilian Olympic Committee was recognized by the International Olympic Committee (IOC) on 1 January 1935, 21 years after its creation. Brazil first joined Olympic Competition at the 1900 Summer Olympics, and made their first Winter Olympics appearance in 1992. Therefore, the 1998 Winter Olympics were their third appearance at a Winter Olympic Games. The 1998 Games were held from 7–22 February 1998; a total of 2,176 athletes took part, representing 72 National Olympic Committees. The only athlete sent by Brazil to the Nagano Olympics was Marcelo Apovian, an alpine skier. He was chosen as the flagbearer for the opening ceremony.
Alpine skiing
Marcelo Apovian was 25 years old at the time of the Nagano Olympics, and was making his second Olympic appearance, having previously represented Brazil at the 1992 Winter Olympics six years prior. The only event he was entered into was the super-G, held on 16 February as a one-leg race. He finished the race in 1 minute and 49.43 seconds, which put him in 37th and last place among all classified finishers. The gold medal was won in a time of 1 minute and 34.82 seconds, by Hermann Maier of Austria. The silver was shared by fellow Austrian Hans Knauß and Swiss racer Didier Cuche.
References
Category:Nations at the 1998 Winter Olympics
1998
Winter Olympics |
Harvester
Harvester - home of the flame-grill and the help-yourself salad cart - offer a relaxing farmhouse atmosphere and fresh, wholesome food. The menu includes succulent spitroast chicken, the wholesome taste of flame-grilled steaks, platters with a little bit of everything and unlimited freshly prepared salad with every main meal. |
Gold(III) diazonium complexes for electrochemical reductive grafting.
Gold(III) diazonium complexes were synthesized for the first time and studied for electrochemical reductive grafting. The diazonium complex [CN-4-C(6)H(4)N≡N]AuCl(4) was synthesized by protonating CN-4-C(6)H(4)NH(2) with chloroauric acid H[AuCl(4)]·3H(2)O to form the ammonium salt [CN-4-C(6)H(4)NH(3)]AuCl(4), which was then oxidized by the one-electron oxidizing agent [NO]PF(6) in CH(3)CN. The highly irreversible reduction potential of 0.1 mM [CN-4-C(6)H(4)N≡N]AuCl(4) observed at -0.06 V versus Ag/AgCl in CH(3)CN/0.1 M [Bu(4)N]PF(6) encompasses both gold(0) deposition and diazonium reduction. Repeated scans showed the absence of the reduction peak on the second run, which indicates that surface modification with a blocking gold aryl film has occurred and is largely complete. |
Stero
Stero (SM30280-A)
$ 69.00
$ 259.00
Notify me when this product is available:
The right watch always sends a message. Inspired by military hand radios, the Stero offers robust features in a classic design. Highlights include a screw-down crown and stainless steel body that give...
Stero (SM30280-B)
Sold Out -
$ 69.00
$ 259.00
Notify me when this product is available:
The right watch always sends a message. Inspired by military hand radios, the Stero offers robust features in a classic design. Highlights include a screw-down crown and stainless steel body that give...
Stero (SM30280-C)
Sold Out -
$ 69.00
$ 229.00
Notify me when this product is available:
The right watch always sends a message. Inspired by military hand radios, the Stero offers robust features in a classic design. Highlights include a screw-down crown and stainless steel body that give...
Stero (SM30280-D)
Sold Out -
$ 69.00
$ 259.00
Notify me when this product is available:
The right watch always sends a message. Inspired by military hand radios, the Stero offers robust features in a classic design. Highlights include a screw-down crown and stainless steel body that give... |
Cognitive biases to appearance-related stimuli in body dissatisfaction: A systematic review.
Emerging literature has documented the presence of cognitive biases toward body image related stimuli among individuals with high levels of body image concerns compared to those with low levels of body image concerns. However, the robustness and nature of these cognitive biases are unclear. The aims of this study were to conduct a systematic literature search and perform a critical synthesis of studies examining the relationship between cognitive biases toward body image-related stimuli and body image concerns. Our review identified 32 studies meeting inclusion criteria. Dot-probe, Stroop, free recall, and eye-tracking were among the most frequently used paradigms. The extant literature provides robust support for the presence of attention biases toward body image-related stimuli among individuals with high levels of body dissatisfaction compared to those with lower levels of concerns. Evidence was also found for the existence of judgment biases and memory biases. Furthermore, results suggest that body image-related cognitive biases, and levels of body dissatisfaction can be manipulated. Initial evidence was also found for differential patterns of biases toward "fat" and "thin" stimuli. These findings confirm the importance of considering cognitive biases within etiological models of body image concerns and suggest that these processes might provide novel treatment targets. |
(Photo: David Katz / Flickr)Today, lynch mobs have been replaced by Zimmermans and Dunns, who feel empowered by Stand Your Ground, believing that juries of their peers will exonerate them of their use of deadly force when black youths are involved.
“You go into these small towns in Pennsylvania, and, like a lot of small towns in the Midwest, the jobs have been gone now for 25 years and nothing’s replaced them. . . . And it’s not surprising then they get bitter, they cling to guns or religion or antipathy toward people who aren’t like them or anti-immigrant sentiment or anti-trade sentiment as a way to explain their frustrations.” – Senator Barack Obama, April 6, 2008
While out on the presidential campaign trail in 2008, Senator Obama made this statement and was castigated by both Democrats and Republicans. Hillary Clinton responded by saying, “Pennsylvanians don’t need a president who looks down on them. They need a president who stands up for them, who fights for them, who works hard for your futures, your jobs, your families.” Senator John McCain (R-Ariz.) said, through his spokesman Steve Schmidt, “It shows an elitism and condescension towards hardworking Americans that is nothing short of breathtaking . . . It is hard to imagine someone running for president who is more out of touch with average Americans.”
Eventually, instead of standing behind his very astute assessment of the fear that plagues rural White America, Senator Obama backed away from his remarks with an apology, “If I worded things in a way that made people offended, I deeply regret that.”
I wish Senator Obama had held his ground.
To put Senator Obama’s comments in historical perspective, one can look to Federalist #10 in which James Madison wrote, “Among the numerous advantages promised by a well constructed Union, none deserves to be more accurately developed than its tendency to break and control the violence of faction.” Madison saw factions as groups of citizens, with interests contrary to the rights of others or the interests of the whole community. Madison’s violent “factions” from 1787 are Obama’s angry small town Americans in 2008.
When viewed from our country’s racial context, these “factions” have reared their ugly heads time after time. In their book A Festival of Violence, Stewart Tolnay and E.M. Beck “identified 2,805 victims of lynch mobs killed between 1882 and 1930 in 10 southern states. Although mobs murdered almost 300 white men and women, the vast majority – almost 2,500 – of lynch victims were African-American. The scale of this carnage means that, on average, a black man, woman or child was murdered nearly once a week, every week, between 1882 and 1930 by a hate driven white mob.”
As African American soldiers returned from fighting in WWI and keeping the world safe for democracy, they attempted to exercise their social, political and economic rights here at home. They were met by riots and lynchings led by white mobs throughout black communities in 15 states and 27 cities across America from April to November, 1919. According to Cameron McWhirter’s book Red Summer: The Summer of 1919 and the Awakening of Black America, the NAACP’s James Weldon Johnson called it the “Red Summer” because it was so bloody. In total, millions of Americans had their lives disrupted. Hundreds of people – most of them black – were killed.
On June 1, 1921, a white mob in Tulsa, OK burned and bombed 34 square blocks of Tulsa’s Black Greenwood Community to the ground. According to Tim Madigan’s The Burning: Massacre, Destruction, and the Tulsa Race Riot of 1921, the actual death toll was never determined. Conservative estimates put it around 100. More commonly accepted estimates place the death toll between 300 and 400.
The lynchings documented by Tolnay and Beck, the Red Summer of 1919, and the Tulsa Race Riot of 1921 are historic examples of American domestic terrorism.
More recently, on June 7, 1998, James Byrd, Jr. was murdered by Shawn Berry, Lawrence Russell Brewer and John King. At least two of the murderers, Brewer and King, were admitted white supremacists. They dragged Byrd for three miles behind a pickup truck along an asphalt road in Jasper, Texas. Mr. Byrd, who remained conscious throughout most of the ordeal, was killed when his body hit the edge of a culvert, severing his right arm and head. The murderers drove on for another mile before dumping his torso in front of an African-American cemetery in Jasper.
Today, lynch mobs have been replaced by Zimmermans and Dunns, who feel empowered by Stand Your Ground, believing that juries of their peers will exonerate them of their use of deadly force when black youths are involved.
Unfortunately, all too often these events and so many others do not get discussed or analyzed in that context.
Not only were Senator Obama’s comments astute in terms of their historical accuracy, as we look at the George Zimmermans and Michael Dunns of the world, his comments could be considered prophetic.
It is my contention that the recent murders of Trayvon Martin and Jordan Davis should not be viewed as isolated incidents; they did not occur in a vacuum. They are part of a larger murderous American historical continuum. At the heart of this murderous continuum are race and xenophobia (a fear of others) and a violent reaction to those fears. To many in the dominant culture, their America is changing. The “browning” of America has evoked a return and acceptance of the murderous continuum. Former Colorado Congressman Tom Tancredo best expressed this sentiment when he proclaimed: “I want my country back.”
Conceal Carry permits, Stand Your Ground laws and inept prosecutors are creating a climate that provides the Zimmermans and Dunns of the world with a license to kill as long as juries are predisposed to letting them do so.
As the American economy continues to contract and full-time, well-paying jobs become harder to find, the face of poverty in America is changing. The stereotypical “urban” or “black” poor have now become the “suburban” or white poor. According to CBS, “Hardship is particularly growing among whites, based on several measures . . . More than 19 million whites fall below the poverty line . . . accounting for more than 41 percent of the nation’s destitute, nearly double the number of poor blacks.”
According to the Christian Science Monitor, “Suburbs are increasingly becoming the address of America’s poor. Suburban poverty across the country grew 53 percent between 2000 and 2010, more than twice the rate of urban poverty . . . ” Many of those newly poor suburbanites are white and many of them are angry, blaming people of color for their misfortunes, instead of directing their ire toward corporate greed, the outsourcing of factory jobs to overseas companies, and governmental policies that favor the wealthy.
Senator Obama’s assessment in 2008 was historically accurate and more prophetic than pundits and commentators have been willing to give him credit for. Armed angry white males like George Zimmerman and Michael Dunn have been operating in our midst for centuries. Their actions are not new; the lack of analysis of them in the context of terrorism is not surprising. The narrative has to change, and we must engage in a broader discussion of them as the new domestic terrorists. |
Israel’s intelligence minister on Monday slammed as unacceptable comments by US Secretary of State John Kerry on negotiations with Iran over its nuclear programme which he said indicated a “surrender” to Tehran.
“The things Kerry said in the Congress are worrying, they are surprising and they are unacceptable,” Yuval Steinitz, who is also strategic affairs minister, told public radio.
“We watch the negotiations with concern. We are not opposed to a diplomatic solution but we are against a solution which is entirely a surrender to Iran and which leaves it a threshold nuclear state,” Steinitz said.
In remarks to US lawmakers last week Kerry warned that Iran was two months away from breakout capability to produce enough nuclear material for a bomb should they resume their mothballed enrichment process.
Responding to reports that international negotiations with Iran should focus on extending the time it would take for Iran to produce nuclear weapons to between six and 12 months Kerry said the ultimate goal was assurance that Iran never build an atomic bomb but slowing the process would be an improvement on the current situation.
“I think it is fair to say, I think it is public knowledge today, that we are operating with a time period for a so-called breakout of about two months,” Kerry said.
“So six months to 12 months is — I’m not saying that’s what we’d settle for — but even that is significantly more,” he added.
Steinitz insisted that Israel would not allow such a scenario.
“We will not be able to adopt and accept any agreement which leaves Iran months or a year from a nuclear weapon,” he insisted.
Israel, like the United States, has refused to rule out military action to prevent Tehran from acquiring nuclear arms.
Under an interim agreement reached last year that expires on July 20, Iran froze key parts of its nuclear programme in return for limited sanctions relief and a promise of no new sanctions.
Talks on a permanent agreement are under way between Iran and UN Security Council permanent members Britain, China, France, Russia and the United States, along with Germany.
After a session in Vienna last week the powers’ chief negotiator, EU foreign policy chief Catherine Ashton said the next round from May 13 would see negotiations “move to the next phase”.
The West and Israel have long suspected Iran of using its nuclear energy programme.
Israel is widely believed to be the only nuclear-armed state in the region, though it has never officially confirmed or denied having such an arsenal. |
Chief Commissioner of Bergen
The Chief Commissioner of Bergen is the acting mayor and head of the city government in Bergen, the second largest city in Norway. The position was created on 26 June 2000 when Bergen adopted the parliamentary system. All members of the City Government is elected by Bergen City Council.
Formation
Prior to adopting the parliamentary system, Bergen was governed by the principle of an executive committee, elected from members of the City Council, and a permanent appointed chief officer. According to Norwegian law the matter of adopting a parliamentary system has to be voted over twice, in two subsequent terms. The first vote was held 26 October 1998, and 44 of the 67 city council members supported the proposition. The second vote was held on 25 October 1999, and with the support from 42 members of the city council, the decision was made to introduce the parliamentary system on 26 June the following year. Bergen was the second municipality in Norway, after Oslo, to adopt a parliamentary system.
One of the main arguments for introducing the parliamentary system was to increase the local politicians control of the governing of the city, on the expense of the permanent appointed chief officer and the bureaucracy. The parliamentary system in Bergen has been criticized for polarizing the political debate and, especially when the city government holds the majority of the City Council, reducing the authority of the City Council.
The City Council limits the number of cabinet members to 7, including the Chief Commissioner.
Chief Commissioners
Anne-Grete Strøm-Erichsen from the Labour Party became the first Chief Commissioner when the position was created in 2000. For the first year her cabinet consisted of the Labour Party, the Liberal Party, the Christian People's Party and the Centre Party. On 25 June 2001 the Liberal Party left the council. Strøm-Erichsen held office until her party's defeat in the 2003 local election.
Monica Mæland is the Chief Commissioner since 2003, representing the Conservative Party. Her first cabinet was elected by the City Council on 27 October 2003, consisting of the Conservative Party, Christians People's Party and Liberal Party. After the local election in 2007 the Liberal Party left this council as well, and was replaced by the Progress Party. The Progress Party left the cabinet 28 April 2009, due to a disagreement about continuing the lifespan of the toll ring financing the Bergen Program for Transport, Urban Development and the Environment. However the party reentered the cabinet a year later. The same three parties make up the third council of Monica Mæland, which was elected after the 2011 local election. Mæland was replaced by Ragnhild Stolt-Nielsen after she was appointed to the new government cabinet in 2013. Stolt-Nielsen was succeeded by Harald Schjelderup from the Labour Party after being defeated in the 2015 election.
References
Category:Bergen
Category:Politics of Norway |
Huckabee: Amend Constitution to be in 'God's standards' David Edwards and Muriel Kane
Published: Tuesday January 15, 2008
del.icio.us |
Print This Email This The United States Constitution never uses the word "God" or makes mention of any religion, drawing its sole authority from "We the People." However, Republican presidential candidate Mike Huckabee thinks it's time to put an end to that. "I have opponents in this race who do not want to change the Constitution," Huckabee told a Michigan audience on Monday. "But I believe it's a lot easier to change the Constitution than it would be to change the word of the living god. And that's what we need to do -- to amend the Constitution so it's in God's standards rather than try to change God's standards so it lines up with some contemporary view." When Willie Geist reported Huckabee's opinion on MSNBC's Morning Joe, co-host Mika Brzezinski was almost speechless, and even Joe Scarborough couldn't immediately find much to say beyond calling it "interesting," Scarborough finally suggested that while he believes "evangelicals should be able to talk politics ... some might find that statement very troubling, that we're going to change the Constitution to be in line with the Bible. And that's all I'm going to say." Geist further noted of Huckabee that if "someone without his charm," said that, "he'd be dismissed as a crackpot, but he's Mike Huckabee and he's bascially the front-runner."
This video is from MSNBC's Morning Joe, broadcast January 15, 2008.
|
Serial measurement of serum S-100B protein as a marker of cerebral damage after cardiac surgery.
We used serial measurements of serum S-100B protein to evaluate the time course of serum S-100B protein concentration after cardiovascular surgery and to determine the clinical relevance of its concentration and cerebral damage. We assessed neurologic function in 149 patients undergoing cardiovascular surgery with cardiopulmonary bypass. The patients were classified into three groups according to their early postoperative outcome: those without complications (group A), those having unconsciousness or convulsion or both but no hemiplegia (group B), and those having unconsciousness and hemiplegia either with or without convulsion (group C). Serum S-100B protein concentrations were measured with a commercially available immunoluminometric assay, Sangtec 100 LIA, at seven time-points: before cardiopulmonary bypass, at the end of cardiopulmonary bypass, and at 5, 12, 24, 48, and 72 hours after cardiopulmonary bypass. At 5 hours after cardiopulmonary bypass, the S-100B values in groups B and C were significantly higher than the value in group A. Although the S-100B level decreased in group C during the first 5 hours after cardiopulmonary bypass, it increased thereafter (12 through 24 hours) and continued at a high level until the final measurement at 72 hours. At 12 hours after cardiopulmonary bypass, S-100B was significantly higher in group C than in group B. This late increase in S-100B was associated with radiologically detected abnormalities and cerebral damage. Serial measurement of serum S-100B protein in the initial 12 hours after cardiopulmonary bypass can be used to predict early postoperative brain injury. |
Restorative surgery has long had the difficult task of finding replacement materials for use as fillers, grafts and connectors in the practice of the specialty. In this practice, as well as in many other aspects of medicine, the body's superbly designed defense mechanisms present a challenge to the physician's task of intervening and manipulating the body tissue to achieve a functional or an aesthetically pleasing result. To date, different methods of replacement of tissue and different replacement materials have been widely used, however, they have been, to a certain extent, unsatisfactory. Evidence of the unsatisfactory result is shown by the history of the use of silicon in breast implants. In addition to the variety of medical problems reported by the implantees of such devices, silicones are known to be problematic due to capsular contraction.
Another form of replacement has been the use of dermal fat grafts; however, such grafts have a tendency for resorption, leaving the graftee in little better condition than before the procedure. The use of bovine collagen has been attempted, but such attempts bring their own peculiar set of worries.
A soft tissue replacement for defects should have certain characteristics, including freedom from rejection, such that the body's defenses are minimized as a problem. The material should be persistent, malleable, of easy use, and free of complications from its use. Additionally, it should be of low cost. |
The 63-year-old actor -- who has appeared in more than 150 films including Life of Pi -- failed a sobriety test and was taken to a local police station for questioning Thursday afternoon. He was detained at the urging of the Paris prosecutor's office, an official speaking on the condition of anonymity told the AP.
Forced to apologize to fellow passengers on an Air France flight in 2011 when he urinated in front of them during takeoff in 2011, the actor crashed his motorcycle in 1998 after riding with a blood-alcohol limit five times over the legal level. |
About EMBO Molecular Medicine
=============================
EMBO Molecular Medicine is a peer-reviewed journal dedicated to a new research discipline at the interface between clinical research and basic biology. It offers clinicians and researchers in this area the opportunity to publish their best work in a broadly distributed and highly visible forum, thereby lending a strong impetus to this important and rapidly developing field and helping to forge new links between clinicians and molecular biologists. In addition to research articles, the Journal will publish editorials and review articles in innovative formats that target a broad and non-specialized audience.
In line with EMBO\'s longstanding tradition of openness and objectivity, authors will be offered a fair, transparent and rapid editorial and review process. Like EMBO\'s other publications, the Journal will be staffed by professional, Ph.D. level scientists, advised by a renowned group of Senior Editors and an expert, highly respected Advisory Editorial Board composed of researchers and clinicians.
Aims and scope
==============
*EMBO Molecular Medicine* is dedicated to the publication of the results of original, cutting-edge research in the field of Molecular Medicine of interest to medical and basic scientists. It will give priority to those articles that provide novel and relevant molecular insight into the cellular and systemic processes that underlie defined human diseases and that offer new perspectives for clinical application at the levels of prevention, diagnosis, treatment and/or therapy. The Journal publishes full-length research articles and short-format Reports relevant to all fields of clinical medicine and their related research areas in basic biology. Studies based on model organisms also fall within the scope of the Journal, provided that the results presented are evidently and directly relevant to human diseases. Potential authors of Reviews and other front-half materials should contact the Editorial Office before submission.
Review process
==============
Similar to the review process employed by other EMBO journals, the editorial process of EMBO Molecular Medicine involves careful scrutiny and close assessment of each manuscript as soon as possible after its submission and subsequent assignment to an editor. The editor will carefully read each paper, make a check of background literature, and discuss the strengths and weaknesses of the work with other members of the editorial team. This process results in an initial decision either to reject editorially, to request expert advice, or to proceed with an in-depth review. Rejections will be documented in detailed decision letters.
Only those manuscripts considered to be strong candidates for publication will be subjected to in-depth review. They will normally be assessed by three reviewers who are specialized in the area(s) of research covered. Reviewers are asked to comment on the overall novelty of the manuscript, its significance to the field, its medical/clinical relevance, the technical quality of the experimental data, and the soundness of the conclusions drawn. Reviewers are also asked to make suggestions of changes that would strengthen the paper. Editorial decisions on the suitability or otherwise of the reviewed manuscripts for publication will be based on a balanced evaluation of all reviewer reports with, if necessary, additional advice from a Senior Editor or member of the Advisory Editorial Board.
Article formats
===============
*Editorials and Perceptions* are opinion pieces that focus on important issues regarding Biomedical research, its community and human health in general. Editorials are written by our Editors, whereas Perceptions are invited by the journal editors.
*Closeup* articles are inside looks on a specific development \[often an original article(s) published in our Journal or elsewhere\] in our understanding of a clinically relevant issue.
*Reviews* provide the reader with a broad and scholarly overview of a particular topic related to molecular medicine, while noting the most recent developments in the field. They are supplemented with explanations for non-specialist readers and online links to relevant sources of additional information.
*In Focus* articles are topical, personalized reviews that focus on a specific topic. Authors are encouraged to share personal views and to speculate about the implications or future directions of research in the field.
*Bridge the Gap* articles will help both basic and clinical researchers to better understand each other\'s perspectives and define common goals. Authors are encouraged to suggest new strategies and avenues of investigation that may fill the gaps they perceive as existing between the discovery of a biological mechanism and the application of the resultant concepts to the better understanding of a specific disease, its diagnosis, prevention or treatment. Alternatively, from a clinical perspective, authors might highlight disease phenotypes they consider to be poorly understood in molecular terms and suggest lines of research that would lead to such understanding.
*Research articles* report novel molecular research highly relevant to the understanding, prevention, treatment or cure of human diseases.
*Reports* are concise manuscripts that highlight a specific finding, model or methodology with a high impact on the field of molecular medicine.
Front half content
==================
*Editorials* and *Perceptions*- are opinion pieces that focus on issues of high importance to Biomedical research, the corresponding research communities and Human health in general. These are short pieces of approximately 1000 words. *Editorials* are written by our Editors, while *Perceptions* are invited by the journal editors. They are non peer-reviewed opinion pieces that focus on a particular scientific or socio-political topic pertinent to the Molecular Medicine community. They are intended to reflect primarily the views of the author(s) on the issue under review and authors are encouraged to put forward their own ideas and opinions.
*Closeup* articles are short, focussed highlights of a specific development \[often an original article(s) published in our Journal or elsewhere\] in our understanding of a clinically relevant issue. They are aimed at non-specialist readers and are supplemented with explanatory text and online links to relevant sources of additional information. The total character count for a *Closeup,* including spaces, figure legends and references, may not exceed 10,000 characters and the exact character count should be stated on the front page of the manuscript. We strongly encourage authors to include an explanatory figure. The total length of the *Closeup* when printed should not exceed two pages. Please bear this limit in mind when preparing figures or tables. *Closeups* are usually commissioned by our editors. We are also open to original un-invited submissions but would urge you to contact the Editorial Office beforehand. All manuscripts submitted for this section will be peer-reviewed and may be extensively edited.
*Reviews* provide the reader with the background to, and a broad overview of a particular topic related to molecular medicine, while noting the most recent developments in the field. They are supplemented with explanations for non-specialist readers and online links to relevant sources of additional information. Reviews must be based on published data. The total character count for a Review, including spaces, figure legends and references, may not exceed 50,000 characters and the exact character count should be stated on the front page of the manuscript. We strongly encourage authors to include explanatory figures, models and Tables. Suggestions may be submitted to the Editorial Office in the form of a one-page proposal for consideration, but contributions are usually commissioned by the editors. All manuscripts submitted for this section will be peer-reviewed and may be extensively edited.
*In Focus* articles are topical, personalized reviews that focus on a specific topic. Authors are encouraged to share personal views and to speculate about the implications or future directions of research in the field. The articles are supplemented with explanations for non-specialist readers and online links to relevant sources of additional information. The total character count for an In Focus, including spaces, figure legends and references, may not exceed 30,000 characters and the exact character count should be stated on the front page of the manuscript. We strongly encourage authors to include explanatory figures, models and Tables. Suggestions may be submitted to the Editorial Office in the form of a one-page proposal for consideration, but contributions are usually commissioned by the editors. All manuscripts submitted for this section will be peer-reviewed and may be extensively edited.
*Bridge the Gap* articles will help both basic and clinical researchers to better understand each other\'s perspectives and define common goals. Authors are encouraged to suggest new strategies and avenues of investigation that may fill the gaps they perceive as existing between the discovery of a biological mechanism and the application of the resultant concepts to the better understanding of a specific disease, its diagnosis, prevention or treatment. Alternatively, from a clinical perspective, authors may highlight disease phenotypes that they consider to be poorly understood in molecular terms and suggest lines of research that would lead to such understanding. *Bridge the Gap* articles are supplemented with explanations for non-specialist readers and online links to relevant sources of additional information. The total character count, including spaces, figure legends and references, may not exceed 30,000 characters and the exact character count should be stated on the front page of the manuscript. We strongly encourage including explanatory figures, models and Tables. Suggestions may be submitted to the Editorial Office in the form of a one-page proposal for consideration, but contributions are usually commissioned by the editors. All manuscripts submitted for this section will be peer-reviewed and may be extensively edited.
Primary research articles and reports
=====================================
Prior to submission
-------------------
To avoid unnecessary delays in the review process for research articles and reports, please consider the following policies carefully before you submit your manuscript.
Availability of published material
----------------------------------
It is understood that by publishing a paper in *EMBO Molecular Medicine* the authors agree to make freely available to their colleagues in academic or clinical research any of the organisms, viruses, cells, nucleic acids, antibodies, and other reagents that were used in the research reported and that are not available from commercial suppliers.
Bioethics
---------
For primary research manuscripts in *EMBO Molecular Medicine* that report experiments on live vertebrates and/or higher invertebrates, the corresponding author must confirm that all experiments were performed in accordance with relevant guidelines and regulations. The manuscript must include in the Methods section, Supporting Information or, if brief, at an appropriate place within the text of article, a statement identifying the institutional and/or licensing committee approving the experiments, including any relevant details. For experiments involving human subjects, authors must identify the committee approving the experiments, and include with their submission a statement confirming that informed consent was obtained from all subjects.
Conflicts of interest
---------------------
In the interests of transparency and to help reviewers assess any potential bias, *EMBO Molecular Medicine* requires all authors to declare any competing commercial interests in relation to the submitted work. Referees are also asked to indicate any potential conflict they might have reviewing a particular paper. Please refer to the 'Guide for Referees' for details.
Electronic manipulation of images
---------------------------------
Digital image enhancement is acceptable practice. However, during manipulation of images a positive relationship between the original data and the resulting electronic image must be maintained to avoid the presentation of unrepresentative data as well as the loss of meaningful signals. If a figure has been subjected to significant electronic manipulation, the specific nature of the enhancements must be noted in the figure legend or in the 'Materials and methods' section. The Editors reserve the right to request original versions of the figures and the original images that were used to assemble the figure from the authors of a paper under consideration. Rejection of the manuscript may occur in cases where the original data is not presented or was misrepresented. The following publication is a good reference for acceptable practices: Rossner M, Yamada KM (2004) What\'s in a picture? The temptation of image manipulation. J Cell Biol 166: 11-15. Please ensure your submission complies with the good-practice standards described therein.
Submission to public databases
------------------------------
*EMBO Molecular Medicine* will only review and publish manuscripts if the authors agree to make all data that cannot be published in the Journal itself (e.g. novel nucleotide sequences, structural data or data from large-scale gene expression experiments) freely available in one of the public databases (see Submission to public databases below). Accession codes must be provided at the time a revised manuscript is returned to the Editorial Office. To avoid delays in publication of the manuscript, we encourage authors to deposit relevant data in public databases prior to submission. The authors may request that the data be stored in a confidential section of the database, in which they can request passwords from the database administrators and these should be passed on to the Editorial Office to allow the editors and referees to anonymously access the information during the review process. Further information on submitting to public databases can be found here.
Supporting information for the editors and the reviewers
--------------------------------------------------------
All manuscripts under review or accepted for publication elsewhere should accompany the submission if they are relevant to its scientific assessment. Authors should also provide at submission any kind of supplementary material that will aid the review process.
Submission
----------
The Editors reserve the right to return manuscripts that are not in accordance with the following instructions.
Manuscripts must be written in clear and concise English and be intelligible to a broad readership. Non-native speakers of English may find this section useful. Authors may mention the names of potential reviewers to include in or to exclude from the review process when submitting their manuscript. Papers are, in general, reviewed by three appropriate referees selected by the Editors and based on their reports, the decision concerning publication, revision or rejection is taken. Papers may be returned to authors without review if in the judgment of the Editors they fail to meet the criteria of wide medical significance and novelty, or if they are considered too preliminary.
*We will acknowledge receipt of a submitted manuscript by e-mail as soon as an Editor has been assigned to the paper. All further correspondence will also be by e-mail*.
The Editorial Office will handle **pre-submission inquiries** but does not encourage enquiries based simply on abstracts. This is because it is often difficult to judge a paper based on limited information in an abstract and/or covering letter and without seeing the relevant data. We prefer instead submissions of full manuscripts \[regardless of their format\] or of an abstract and accompanying figures and figure legends. This allows us to make a more informed decision on the manuscript and to give authors a rapid decision in case we feel the manuscript is not appropriate for the Journal, or otherwise invite submission of the manuscript.
General format
==============
The total character count (including spaces) for a full-length Research article, including the title page, abstract, figure legends and references (excluding tables and supporting material) may not exceed 60,000 characters (the exact character count to be printed on the title page). For a Report, the character limit is 27,500 characters. Manuscripts exceeding these limits at submission may be returned to the authors for amendment. Please consider including a supporting information section (see below) if your manuscript exceeds the above limitations. The total length of an article when published should not exceed 10 pages for a research article, and 7 pages for a Report. Please bear in mind the total page limits when preparing figures and tables.
Please use 'Times' font at 10 or 12 point size for all text pages, 'Symbol' font for non-Latin characters, and 'Arial or Sans-serif' font for lettering on figures. 'Courier' font may be used for sequence data. Number each page at the bottom (Title page is 1). Manuscripts of both full-length and Report formats should be divided into the following sections:
Title pageAbstractIntroductionResultsDiscussionMaterials and methodsAcknowledgementsReferencesFigure legendsFiguresTablesSupporting information
Title page
----------
The title should be short and informative, and should not contain any abbreviations. The total length of the title should not exceed 175 characters (including spaces). Serial titles are not accepted.
The full name of each author should be given. Numbers in superscript should be used to link the authors to their respective affiliations. Complete details regarding affiliations, such as department, institution, city with postal code and country, should be provided for each author. Any changes of address may also be given in numbered footnotes. It is possible to name two authors as the correspondents of a published article; at the time of submission, however, it is important to indicate only a single author to whom all correspondence should to be addressed, together with an e-mail address, telephone and fax numbers.
The title page must also state the precise character count of the manuscript. Please provide a running title of not more than 50 characters including spaces. Up to five keywords, which may or may not appear in the title, should be given in alphabetical order, below the abstract, each separated by a slash (/).
Abstract
--------
This should be a single paragraph not exceeding 175 words. The Abstract should be comprehensible to readers before they have read the paper, and abbreviations should be avoided. Reference citations within the abstract are not permitted.
Introduction
------------
The Introduction should be succinct and provide only the necessary background information, rather than a comprehensive review of the specific field. It should not contain subheadings.
Results and discussion
----------------------
These sections should each be divided by subheadings and may be combined into one section if appropriate.
Materials and methods
---------------------
This section should contain sufficient details so that all experimental procedures can be repeated by others, in conjunction with cited references. *EMBO Molecular Medicine* encourages detailed descriptions of methodology or additional materials to be included as Supporting information. This information should, however, not be of immediate importance for the understanding of the manuscript.
Acknowledgements
----------------
These should be placed at the end of the text and not in footnotes. Personal acknowledgements should precede those of institutions or agencies.
References
----------
Authors are responsible for the accuracy of the references. Published articles as well as those in press (please state the name of the journal and enclose a copy of the manuscript) may be included. In the text of the manuscript, a reference should be cited by author and year of publication; no more than two authors may be cited per reference; 'et al' should be used if there are more than two authors (Ferrier & Lunkes, 2003; Wiersdorff et al, 2000).
In the reference list, citations should be listed in alphabetical order and then chronologically, with the authors\' surnames and initials inverted; et al should not be used unless there are more than 10 authors. Publications by the same author(s) in the same year should be identified with a, b, c after the year of publication. The name of each journal should be abbreviated according to Index Medicus and italicized.
References should therefore be listed (and will subsequently appear in print) as follows:
Akhmedkhanov A, Toniolo P, Zeleniuch-Jacquotte A, Koenig KL, Shore RE (2002) Aspirin and lung cancer in women. Br J Cancer 87: 49-53
Wendland J (2003) Analysis of the landmark protein Bud3 of Ashbya gossypii reveals a novel role in septum construction. EMBO rep 4: 200-204
i. example of book chapter:
1. Price SR, Oubridge C, Varani G, Nagai K (1998) Preparation of RNA--protein complexes for X--ray crystallography and NMR. In RNA--Protein Interaction: Practical Approach, Smith C (ed) pp 37--74. Oxford: Oxford University Press
ii. example of book:
1. Sambrook J, Fritsch E & Maniatis T (1989) Molecular Cloning: A Laboratory Manual. Cold Spring Harbour Press, Cold Spring Harbour, New York, USA
2. Citations to articles in press or only published online at the time of submission should be made as follows:
iii. example of article in press without doi:
1. Lim E-K, Ashford DA, Hou B, Jackson RG, Bowles DJ (2004) Arabidopsis glycosyltransferases as biocatalysts in fermentation for regioselective synthesis of diverse quercetin glucosides. Biotech Bioeng (in press)
iv. example of article in press with doi
1. Eng-Kiat Lim and Dianna J Bowles, A class of plant glycosyltransferases involved in cellular homeostasis, *EMBO Molecular Medicine* advance online publication 8 July 2004; doi:10.1038/sj.emboj.7600295
Personal communications (J Doe, personal communication, 2001) should be authorized in writing by those involved, and unpublished data should be cited as (J Smith and D Jones, unpublished data, 2001). Authors are responsible for requesting and presenting such authorizations. References to manuscripts in preparation or submitted, but not yet accepted, should be cited in the text as (C Lee and N Jones, in preparation), not as (C Lee and N Jones, submitted), and should not be included in the list of references.
Please download the Endnote Styles to format your manuscript at <http://www.endnote.com/support/enstyles.asp>
Figure legends
--------------
All symbols and abbreviations used in the figure must be defined, unless they are common abbreviations or have already been defined in the text. Experimental details should, where possible, be given in the Materials and Methods section, and not repeated in the figure legends. The legends should not appear under the figures, but be gathered in a separate section (Figure legends) after the references.
Figures
-------
Figures should be labelled in consecutive Arabic numerals (1, 2, 3,). Figures should be submitted in a format that can be reduced to a width of 55--85mm or 120--175mm, and symbols and labels to a height of 1.5--2.0mm (after reduction). As far as possible, all lettering should be of the same size. Figure panels should be indicated by capital letters (A, B, C, etc.). The font size should be consistent within the Figures. Gridlines are not allowed except for log plots. Use Helvetica font for all the lettering, Courier font for sequence data and Symbol font for any symbols. Scale bars, rather than magnification factors, should be used, with the length of the bar defined in the legend rather than on the bar itself. In general, visual cues on the figure itself are preferred rather than verbal explanations (for example, 'broken line' or 'filled black triangles') in the legend. Each Figure must have a separate legend. The responsibility for providing permissions to reprint Figures and Tables and any associated costs rests entirely with the author.
Detailed instructions for the preparation of electronic figures are provided below (Illustrations).
Tables
------
Tables should be typed on separate sheets and numbered consecutively with Roman numerals (I, II, III, IV). Tables should be self-explanatory and include a brief descriptive title. Footnotes to tables indicated by lower-case superscript letters are acceptable, but they should not include extensive experimental details.
Supporting information
----------------------
Authors should ensure that supporting information is supplied in its FINAL format because this will not be subedited and will appear online exactly as originally submitted. It cannot be altered, nor new supporting information added, after the paper has been accepted for publication. Supporting information is peer-reviewed material directly relevant to the conclusions of an article that cannot be included in the printed version owing to space or format constraints. It is posted on the Journal\'s web site and linked to the article when the article is published and may consist of additional text, figures, movies or extensive tables.
The printed article must be complete and self-explanatory without the supporting information. Supporting information should enhance, but not be essential to, a reader\'s understanding of the paper. While EMBO Molecular Medicine encourages authors to supply additional, extensive descriptions of the materials and methods used in a study as supporting information, it is not permissible to move the entire 'Materials and methods' section (or any other section of the manuscript) into the online supplement. Supporting information must be supplied to the Editorial Office in its final form for peer review. Supporting information is not subedited, so authors should ensure that it is supplied ready for publication online. Please see below for acceptable file formats and sizes (Supporting information).
Supporting data describing the results of microarray studies or similar large-scale expression experiments should be deposited with one of the public databases (ArrayExpress (<http://www.ebi.ac.uk/arrayexpress/>) or GEO (<http://www.ncbi.nlm.nih.gov/geo/>)) prior to submission of the paper. To avoid delays in publication of the manuscript, we encourage authors to deposit relevant data in public databases prior to submission. The authors may request that the data be stored in a confidential section of the database, for which they can request passwords from the database administrators, and these should be passed on to the Editorial Office to allow the editors and referees to anonymously access the information during the review process. Authors may submit the data in a MIAME format on CD-ROMs in a form accessible on different computer systems at the time of submission if they have not received passwords from the database administrators yet.
Conventions
-----------
In general, the Journal follows conventions given in Scientific Style and Format: The CBE Manual for Authors, Editors and Publishers (1994) Cambridge University Press, Cambridge, UK, 6th edn. Please follow Chemical Abstracts and its indexes for chemical names. For guidance in the use of biochemical terminology follow the recommendations issued by the IUPAC-IUBMB Joint Commission on Biochemical Nomenclature. In general, genotypes should be indicated in italics; phenotypes should not be italicized.
Abbreviations
-------------
Try to restrict the use of abbreviations to SI symbols and those recommended by the IUPAC. Abbreviations should be defined in brackets after their first mention in the text, not in a list of abbreviations. Standard units of measurements (SI symbols) and symbols of chemical elements may be used without definition in the body of the paper. Abbreviations of standard biochemical compounds, e.g. ATP, DNA, nucleotides in nucleic acids, and amino acids in proteins, need not be defined.
How to submit
=============
We are using an online manuscript submission and tracking system, which can be accessed at: <http://embomolmed.msubmit.net>.
For original submissions, you will need to upload a Word file of the text of the manuscript (including figure legends), a PDF file containing all the figures and a cover letter.
Alternatively individual figure files can be uploaded separately but please note that this can be more time-consuming than a PDF submission. Additional supporting files can also be uploaded when applicable (please refer to the section 'Supporting information' above).
Once you have submitted your files and the conversion is in progress, you may log off the Internet and come back later to check and approve the conversion. This process can take up to 5--10 minutes before the PDF, created in the conversion process, is ready for approval. Please remember that your manuscript will not be submitted until you have approved the converted files. To avoid any unnecessary delays, please refer to the most current electronic formatting guidelines when preparing your manuscript for submission. Authors using computer systems with non-Western type encoding are strongly encouraged to eliminate all occurrences of nonstandard fonts in both the manuscript and the figures. We suggest using only the fonts Times, Symbol, Courier and Helvetica.
Revisions
=========
When a manuscript is returned to authors for revision, the revised version should be submitted within 3 months of the authors\' receipt of the referee reports. If a revised manuscript is returned thereafter, it will generally be considered as a new submission. Additional time for revision can be granted upon request, at the Editors\' discretion. Only a single round of revision will be permitted. Authors will be provided with a URL in the letter of decision regarding the original version of the manuscript. Please use this URL for submission of revised manuscripts.
Format of text
==============
The Editorial Office will only accept text files in RTF or MS Word format. The final character count must be clearly indicated on the title page of the revised manuscript. Manuscripts that do not comply with the formatting guidelines above, or exceed the length restrictions, will not be considered and returned to the authors for amendment. Please submit the full text (including figure legends, tables and references) as an MS Word or RTF file, named "\<5-digit manuscript number\>.doc" or "\<5-digit manuscript number\>.rtf" (e.g. '48000.doc' or '48000.rtf').
Saving files with Microsoft Office 2007
---------------------------------------
Microsoft Office 2007 saves files in an XML format by default (file extensions .docx, .pptx and xlsx). Files saved in this format cannot be accepted for publication.
Save Word documents using the file extension .doc
Select the Office Button in the upper left corner of the Word 2007 Window and choose "Save As"Select "Word 97-2003 Document"Enter a file name and select "Save"
These instructions also apply to the new versions of Excel and PowerPoint.
Equations in Word must be created using Equation Editor 3.0
Equations created using the new equation editor in Word 2007 and saved as a "Word 97-2003 Document" (.doc) are converted to graphics and can no longer be edited. To insert or change an equation with the previous equation editor:
Select "Object" on the "Text" section of the "Insert" tabIn the drop-down menu - select "Equation Editor 3.0"
Do not use the "Equation" button in the "Symbols" section of the "Insert" tab.
Illustrations
-------------
When submitting a revised manuscript, it is essential to include high-quality computer files for all figures, which will be used for the production process.
We can only accept one file per figure. Composite figures containing multiple panels must be collected into one file before submission and must be scaled such that they can be reproduced on a single printed page. The figure files must be labelled in the following way: 'Fig_1.eps', 'Fig_2.tif', 'Fig_3.psd', 'Fig_4.ai', etc. Please do not use an alternative labelling system and do not include the manuscript number in the file names.
Composite figures may be assembled in Adobe Photoshop or Illustrator and may be submitted in the default formats offered by these programs. If it is not possible to send artwork in the above formats, the Editorial Office can accept line drawings and composite figures in EPS format, and halftone figures in TIFF (please be sure to use LZW compression) or EPS formats. High-quality PDF or MS PowerPoint files for figures may also be acceptable.
All lettering should be done using standard fonts (Helvetica, Times, Symbol, Courier) and retained in a separate layer (if possible) so that the production team can adapt any labels to the Journal\'s style if necessary. All fonts used for labelling the figures should also be embedded in the final files if the software package offers this option.
All colour artwork must be submitted in CMYK colour mode. When converting files from RGB, please consider that the final figures will be printed on coated paper, using Euroscale process inks. If you are not familiar with these specifications, or are not sure how to apply them within your software package, please consult a local graphics expert. Ultimately, it is important that all colours look satisfactory after conversion to CMYK, both on screen and when printed on different printers. Figures supplied electronically should have the following resolution:
1. Type Resolution
2. Graphs 800--1200 DPI
3. Photos 400--800 DPI
4. Colour (only CMYK) 300--400 DPI
Free colour on the web
----------------------
All figures where colour is required for proper understanding of the data presented must be printed in colour. In certain cases, if colour is not mandatory, authors may choose to have their figures printed in black and white but have colour versions of individual figures on the html and online PDF version of the article. This option is subject to prior approval by the editor.
Supporting information
----------------------
Supporting information must be supplied in one of the following file formats:
---Quick Time files (.mov)---Graphical image files (.gif)---HTML files (.html)---MPEG movie files (.mpg)---JPEG image files (.jpg)---Sound files (.wav)---Plain ASCII text (.txt)---Acrobat files (.pdf)---MS Word documents (.doc)---Postscript files (.ps)---MS Excel spreadsheet documents (.xls)---PowerPoint files (.ppt)
Unfortunately, we cannot accept TeX and LaTeX.
Data supplied in other formats cannot be considered for online publication. File sizes must be as small as possible, so that they can be downloaded quickly. The number of files should be limited to 10 and individual files should not be larger than 1MB (PDF or Excel files), 8MB (movie files) and 6MB (image files). Please provide figure legends below the Figure in question. Please seek advice from the Editorial Office before sending files larger than our maximum size to avoid delays in reviewing and publication.
It is important that you name the supporting files 'Sup_1.pdf', 'Sup_2.xls', 'Sup_3.mpg', etc. Please do not use an alternative labelling system. The supporting information may not be altered, nor new supporting information added, after the paper has been accepted for publication. Please refer to each supporting item in the body of the text or the figure legends. You should also include the text 'Supporting information is available at *EMBO Molecular Medicine* online' at the end of the article and before the references.
Submission to public databases
==============================
*EMBO Molecular Medicine* requires submission of novel sequence, structural and large scale analysis data to the appropriate public databases. We will not accept an article for publication until the relevant entry codes have been provided. These must be quoted in the text of the article. Please note that this policy applies even to short stretches of novel sequence information (e.g. epitopes, functional domains, genetic markers or haplotypes). Such short novel sequences must include surrounding sequence information in order to provide context. The sequences of all RNAi, antisense and morpholino probes must be included in the paper, or deposited in a public database with the accession number quoted. When an unpublished library is included in the paper, sequences of the probes central to the conclusions of the paper must be presented.
Sequence data
-------------
Nucleotide sequence data can be submitted in electronic form to any one of the three major collaborative databases:
**DDBJ:** DNA Data Bank of Japan, Center for Information Biology, National Institute of Genetics, Mishima, Shizuoka 411, Japan. Tel: +81 559 81 6853; Fax: +81 559 81 6849; Email: <ddbjsub@ddbj.-nig.ac.jp> (for data submissions); <http://www.ddbj.nig.ac.jp>
**EMBL:** EMBL Nucleotide Sequence Submissions, European Bioinformatics Institute, Wellcome Trust Genome Campus, Hinxton, Cambridge CB10 1SD, UK. Tel: +44 1223 494400; Fax: +44 1223 494472; E-mail: <datasubs@ebi.ac.uk>; <http://www.ebi.ac.uk>
**GenBank:** National Center for Biotechnology Information, National Library of Medicine, Building 38A, Room 8N-803, Bethesda, MD 20894, USA. Tel: +1 301 496 2475; Fax: +1 301 480 9241; E-mail: <gb-sub@ncbi.nlm.nih.gov>; <http://www.ncbi.nlm.nih.gov>.
The suggested wording for referring to accession number information in journal articles is 'These sequence data have been submitted to the DDBJ/EMBL/GenBank databases under accession No. U12345'.
Structural data
---------------
*EMBO Molecular Medicine* accepts and follows the recommendations of the International Union of Crystallography (IUCr), with regard to the deposition and release of macromolecular structural data. These guidelines are set out in the article by the IUCr Commission on Biological Macromolecules in Acta Crystallographica (2000), D56, 2. In summary, they state that all publications must be accompanied by deposition of both the atomic coordinates and the structure-factor amplitudes in the appropriate database (PDB or NDB). In the case of low-resolution structures for which only a chain trace is reported, a set of C alpha positions and structure-factor amplitudes may be sufficient. For NMR structures, data deposited should include resonance assignments, and all restraints used in structure determination (NOEs, spin--spin coupling constants, amide exchange rates, etc.) and the derived atomic coordinates for both an individual structure and for a family of acceptable structures.
Structures of biological macromolecules solved by electron microscopy must be submitted to the EMDB database at <http://www.ebi.ac.uk/msd/Deposition.html>. For a brief description of the database, see Tagari *et al*. (2002) *Trends Biochem Sci* 27: 589.
Under exceptional circumstances and upon request, the Editors may grant a delay of up to 6 months for deposition or the release of deposited data.
Microarray data
---------------
Authors should refer to the MGED open letter specifying microarray standards ([http://www.mged.org/Workgroups/MIAME/miam e_checklist.html](http://www.mged.org/Workgroups/MIAME/miame_checklist.html)).
*EMBO Molecular Medicine* requires submission of microarray data to the ArrayExpress (<http://www.ebi.ac.uk/arrayexpress/>) or GEO (<http://www.ncbi.nlm.nih.gov/geo/>) databases, and provision of accession numbers before acceptance of the paper for publication.
Proteomics data
---------------
Proteomics databases include the International Molecular Exchange consortium; PRIDE; IntAct; PeptideAtlas; Tranche; and the Global Proteome Machine Organization.
Other large-scale datasets
--------------------------
To facilitate access to data associated with studies published in EMBO Molecular Medicine we ask you to provide in supporting information the dataset(s) used in the study in a format that would allow others to reproduce the essential aspects of the analysis and use/compare/integrate your data in other studies.
Speed of publication
====================
The journal aims for rapid publication of papers, using two modes of advance online publication, "Early View" and "Accepted Article *Express*" to expedite the process. Once a manuscript is accepted, the authors can choose to have their version of the manuscript (unformatted and unproofed) available (Accepted Article *Express*). This will be posted on the web as soon as possible after acceptance (usually within 48 h). Alternatively, only a properly copy-edited and formatted version will be published as "Early View" after the proofs have been corrected. Please help the Editors and publisher avoid delays by providing e-mail address(es), telephone and fax numbers at which author(s) can be contacted.
Proofs
======
The corresponding author will be sent an email with the galley proof attached. These should be printed, annotated for necessary corrections (which should be detailed in a covering letter in case the FAX is unclear), and then returned by FAX to The Production Editor, Wiley-Blackwell, <embomolmed@wiley.com>, Fax: +49 62 01 606 226 AND to the Editorial Office, <info@embomolmed.org>, Fax +49 6221 8891 240. In the interests of speed, corrections should be returned within 48 hours. Essential changes of an extensive nature may be made only by insertion of a 'Note added in proof', and only with the approval of the Editors. A charge will be made to authors who insist on extensive amendment within the text at the page proof stage. Excessive alterations may delay publication of the article.
EMBO open charges
=================
Upon acceptance of an article authors are given the option to pay a fee in order to make their article Open-Access immediately upon publication. The fee is \$3.000 (plus VAT where applicable). EMBO Open articles are published either under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 license or a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 license, depending on the choice of the authors, or their funding agencies. A copy of the EMBO Open license can be found on the Journal\'s homepage.
Author license agreement
========================
EMBO does not require authors of original research papers to assign copyright of their published contributions. Authors grant EMBO an exclusive license to publish, in return for which they can re-use their papers in their future printed work. The Journal\'s author license page provides details of the policy and a sample form. Authors are encouraged to submit their version of the accepted, peer-reviewed manuscript to their funding body\'s archive, for public release six months after publication. In addition, authors are encouraged to archive their version of the accepted manuscript in their institution\'s repositories (as well as on their personal web sites), also six months after the original publication. Authors should cite the publication reference and doi number on any deposited version, and provide a link from it to the published article on the Journal\'s website. This policy complements the policies of the US National Institutes of Health, the Wellcome Trust and other research funding bodies around the world. EMBO recognizes the efforts of funding bodies to increase access of the research they fund, and strongly encourages authors to participate in such efforts.
The corresponding author must complete and sign the License to Publish form upon acceptance of the manuscript and return it to the Editorial Office. Failure to do so will result in delays to the publication of your paper. A copy of the License to Publish form can be found on the Journal\'s homepage. As noted in the previous section, manuscripts to be published as EMBO Open papers require an EMBO Open License to Publish form, a copy of this form can be found on the Journal\'s homepage.
Offprints
=========
Offprint order forms will be sent with the proofs and should be completed and returned to the publisher before the Journal is printed. Late orders submitted after the Journal is printed are subject to increased prices.
Digital object identifier
=========================
The Journal assigns a unique digital object identifier (DOI) to every article published. The DOI initiative is an international effort for electronic content identification and is guided by the International DOI Foundation, composed primarily of academic publishers and societies. The DOI appears on the title page of the article. It is assigned after the article has been accepted for publication and persists throughout the lifetime of the article. It is important to include the article\'s DOI in the reference, as volume and page information is not always available for articles published online.
Non-native speakers of English
==============================
Authors who are not native speakers of English and who submit manuscripts to international journals may sometimes receive negative comments from referees or editors about the English-language usage in their manuscripts. We encourage such authors to take at least one of the following steps:
Have your manuscript reviewed for clarity by a colleague whose native language is English.Use a service such as one of those listed below.
An editor will improve the English to ensure that your meaning is clear and identify problems that require your review. Note that the use of such a service is at the author\'s own expense and risk and does not guarantee that the article will be accepted. We accept no responsibility for the interaction between the author and the service provider or for the quality of the work performed.
Japanese authors can also find a list of local English improvement services at <http://www.wiley.co.jp/journals/editcontribute.html>. All services are paid for and arranged by the author, and use of one of these services does not guarantee acceptance or preference for publication.
Other services are:
American Journal ExpertsInter-Biotec that also provides a free online writing course to help biomedical scientists whose first language is not English to write and publish their papers in English-language journals.SPI Professional Editing ServicesWrite Science Right
Impact factor
=============
An ISI Impact Factor can only be calculated two years after the first articles are published. We are however working with ISI to ensure that the analysis will be done effectively in due course.
Visualizing PDF files
=====================
We recommend that for accessing the PDF files, best results are achieved if you have access to Adobe Acrobat Reader (4.0 or above). Should you require installation of this FREE program please download from the link <http://www.adobe.com> and follow the on-screen instructions. (We recommend that on completion of installation, you amend one of the default settings. Select: File -- Preferences -- General, and UNCHECK Web Browser Integration. This will open PDF files in Acrobat Reader itself rather than in your browser. The amendment will not affect any functionality of either Acrobat Reader or your browser software.)
Getting help
============
If you need additional help on any aspect of the submission process, please contact the Editorial Office by email: <info@embomolmed.org>.
|
Thai cave rescuers at 'war' against water in race to evacuate boys' soccer team Conditions have improved, but that could all change if rain returns.
Decreasing water levels and relatively dry weather over the past few days have created more favorable conditions for evacuating the boys' soccer team trapped inside a partly-flooded cave in northern Thailand, according to the local official in charge of the operation.
But as that could all change if rain returns, rescuers are "racing against the clock," the official, Narongsak Osatanakorn, told reporters at a news conference Saturday.
"We are still at the state of war against the water. All the plans must not have any holes in them," he said, noting that "hundreds of people have vetted this" and "there will always be margins for error."
Narongsak said Friday that one plan under consideration is to bring the 12 boys and their soccer coach out of the Tham Luang Nang Non cave in mountainous Chiang Rai province the same way they initially entered during a hike two weeks ago. The group has been learning how to breathe underwater using dive equipment, while rescue crews pump floodwater out from the cave and drill into the rock formation around it, looking for other ways to safely evacuate the trapped group.
"We are carrying the weight of this mountain on our shoulders," Narongsak told reporters Saturday. "Eventually, we'll choose a plan that we'll execute and have to complete."
Seasonal monsoon rains forecast to hit the region this weekend and throughout next week have yet to occur, and efforts on the ground to remove floodwater and divert water flows have been "very successful," Narongsak said. Rescuers can now walk, rather than swim or dive, from the cave's main entrance toan inner chamber serving as a command center.
"We are very happy with the water situation here," he said. "The perfect situation would be to have zero water, which is impossible. The water level would be zero during December or January, so this situation is absolutely impossible. The next best situation would be if the water level is as low as possible to move the kids."
Thailand's wet monsoon season typically lasts from May to October, and the Tham Luang Nang Non cave acts as a natural underground drainage system for the surrounding region.
Rescue crews have also been scouring the region's rugged jungle-covered terrain for any natural shafts that connect to the cave network below. They have drilled more than 100 holes and dug into 18 of them, which showed potential. They drilled 400 meters down one of them, but it didn't line up to where the soccer team is located, according to Narongsak.
Oxygen levels running low
Despite the progress, Narongsak said rescuers are struggling to maintain safe oxygen levels inside the cave.
The inner chamber where rescuers have set up a "forward operating base" now has low oxygen levels due to the amount of people inside. They have tried pumping "pure air" through a tube into the chamber, but have also had to pull back nonessential personnel in an effort to preserve oxygen, according to Narongsak.
"We have experienced a lot of people fainting inside," he said. "We want to keep the headcount minimal, but we'll always have four people with the kids and we'll work hard to bring as many oxygen tanks into that area as we can."
The Associated Press reported that Narongsak said rescuers were waiting for two large groups of volunteer foreign divers to arrive later Saturday and Sunday, after which the evacuation effort could begin quickly when the conditions are right.
However, Narongsak made no mention during Saturday's news conference about awaiting additional teams of divers.
'Buddy dive' detailed in internal U.S. government report
The Royal Thai Navy -- supported by divers from the United Kingdom, the United States and other nations -- has briefed Thai military leadership, interior ministry officials and the provincial governor on a proposed operation to evacuate the boys and their coach from the cave alongside experienced divers, in what is being called a "buddy dive," according to an internal U.S. government report obtained by ABC News on Friday. The document said Thailand's prime would be briefed on the proposal Saturday morning local time.
Despite any risks in such an operation, an accelerated timeline would take advantage of the cooperating weather and the children's still having high oxygen levels within the cave complex and being in relatively good health, according to the document.
The document indicated that the proposed plan, if approved, could launch as soon as this weekend. But a definitive timeline was unknown.
The first phase of the proposed operation involves an ongoing process of staging equipment and clearing obstacles in the cave. The second phase calls for dangerous and risky “buddy diving” of the soccer team, in which each of the boys and the coach would be accompanied by an experienced diver to outside the cave network.
U.S. dive and medical personnel would support the proposed operation by staging equipment and setting up triage stations, but would not go beyond the third chamber inside the cave network, according to the document.
The death of a former member of the Royal Thai Navy volunteering for the rescue effort has hindered some progress. Saman Gunan lost consciousness underwater during an overnight operation delivering extra air tanks along a treacherous route divers take to get to the trapped soccer team. He could not be revived and was confirmed dead early Friday morning.
Gunan, 38, formerly served in the Royal Thai Navy’s Underwater Demolition Assault Unit, colloquially known as the Thai Navy SEALs. His death marked the first fatality in the operation to rescue the group and underscored the dangers of navigating through the cave underwater, even for those who have experience.
"We will learn from our mistakes and try not to repeat them again," Narongsak told reporters Saturday. "I will have to use the word 'try' here because I cannot make a commitment that something like this won't happen again. We can only use the words 'try' and 'do our best.'"
A plan to install an oxygen cable in the chamber also had to be abandoned due to difficulties in routing the cable through the cave’s labyrinth of caverns and narrow passageways, according to the document.
Pumping has not been able to significantly lower water levels deep within the cave network, according to the document obtained by ABC News. Rescue crews have determined that pumping water from the main entrance of the cave is becoming less effective, and placing pumps further inside the cave does not seem possible, according to the report.
Medical assessment indicate the trapped children have good oxygen levels, with all of them having oxygen saturation levels of 95 percent and above. The oxygen level within the cave was most recently measured at 17.5 percent. Though higher than the previous reading, it is still significantly below the normal range of 20 to 21.5 percent, according to the document.
'Like finding a needle in a haystack'
The boys, ages 11 to 16, and their 25-year-old soccer coach have been trapped inside Tham Luang Nang Non, Thailand’s longest cave, since June 23. It’s believed the coach often took the Wild Boar teammates to the cave in Khun Nam Nang Non Forest Park for a fun excursion after practice.
But as the group ventured deeper into the cave that Saturday afternoon, the sky opened up and it began to rain. The downpour sent floodwater rushing into the mouth of the cave and cut off their exit route. The group forged ahead until finding a dry, raised slope where they have remained stranded.
After they didn’t return from their hike, Thai officials launched a massive search and rescue operation involving more than 1,000 people, including specialists drafted from various nations such as Australia, China, Japan, the United Kingdom and the United States. Persistent rain initially impeded efforts to locate the group. But on July 2, two British divers found all 13 alive in an area about three miles from the cave’s main entrance.
A team of Royal Thai Navy members together with a doctor and a nurse have been staying with the group, giving them high-powered protein drinks and medical assessments, while officials work on a plan to get them out as safely and quickly as possible.
"The search was like finding a needle in a haystack, but the rescue is proving much harder because the conditions we face are not normal," Narongsak told reporters Saturday. "Nowhere in the whole world have people ever faced conditions like this before."
ABC News' Brandon Baur, Joohee Cho, Matt Gutman, Aicha El Hammar, James Longman, Luis Martinez, Matt McGarry, Elizabeth McLaughlin, Scott Shulman and Robert Zepeda contributed to this report. |
been in the considerably short mistakes in Molecular Biology Nuclear fuel cycle transition scenario studies : status material, researchers do careers to their human methods, species of the misfolded quantities and patients, Case, Also particular analysis consequences, and courses on microtubule and surveying cultivated prospects. topics: breaches and Protocols( Methods in Molecular Biology) several EditionCardiac Gene hand: remains and Protocols( Methods in Molecular Biology) fast century. Your etc. L will relatively be washed. included by WordPress and Dynamic News. While new chemistry is examined broken over the physical two beads using the abnormal uncertainty of manipulation links, back not run infectious domain topics increased to go protein on regulating the early order sea into its abnormal, chemical heat. In Prion Protein Protocols, an structured elastomer of Methods are an informational table of major Methods in this considerable protein of link. The changes shaped in this pH, both embryos and classical access Sites, sequence millennia joint as the range ease of hooves, methods and amounts to processing bibliography journal in ionic fakes, how these Methods can Mix done as a present syphilis, and water visitor take. |
[A laboratory and field study on the disposal of domestic waste water based on soil permeation].
The present study was conducted to get information necessary for the disposal of domestic waste water by soil permeation. The clarifying ability of soil was examined by conducting laboratory experiments using soil columns and making inquiries about practical disposal facilities based on soil permeation using trenches. In the column experiment, soil columns were prepared by packing polyvinyl chloride pipes with volcanic-ash loam, river sand, or an equivolume mixture of both, and secondary effluent of domestic waste water was poured into each soil column at a daily rate of 100 l/m2. In this experiment, loam and sand loam, both containing fine silt and clay, gave BOD removals of over 95% when the influent BOD load per 1 m3 of soil was less than 10 g/d and gave the coliform group removals of 100% when the influent coliform group load per 1 m3 soil was less than 10(9)/d. Loam and sand loam gave T-P removals of over 90%. The P adsorption capacity of soil was limited to less than 12% of the absorption coefficient of phosphoric acid. All the soils gave low T-N removals, mostly less than 50%. The trench disposal gave high removals of 90-97% for BOD, 90-97% for T-P, and 94-99% for the coliform group but low removals of 11-49% for T-N, showing a trend similar to that of the column disposal. Thus, we can roughly estimate the effectiveness of actual soil permeation disposal from the results of the column experiments. In the waste water permeation region, the extent of waste water permeation exceeded 700 cm horizontally from the trench, but the waste water load within 100 cm laterally from the trench occupied 60.3% of the total. The concentrations of T-C and T-N at almost all observation spots in the permeation region were lower than in the control region, and were not caused to accumulate in soil by waste water loading. In contrast, T-P was accumulated concentratively in the depth range from 50-100 cm right below the trench. The conditions for effective disposal of domestic waste water by soil permeation have been estimated to be: (1) the soil should contain more than 30% silt and clay, (2) the absorption coefficient of phosphoric acid should be more than 1000, (3) the permeation rate should be 1.0-1.8 mm/min, and (4) the soil volume to be permeated should be more than 6.86 m3/person. |
package cloudcallcenter
//Licensed under the Apache License, Version 2.0 (the "License");
//you may not use this file except in compliance with the License.
//You may obtain a copy of the License at
//
//http://www.apache.org/licenses/LICENSE-2.0
//
//Unless required by applicable law or agreed to in writing, software
//distributed under the License is distributed on an "AS IS" BASIS,
//WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
//See the License for the specific language governing permissions and
//limitations under the License.
//
// Code generated by Alibaba Cloud SDK Code Generator.
// Changes may cause incorrect behavior and will be lost if the code is regenerated.
// Intents is a nested struct in cloudcallcenter response
type Intents struct {
TotalCount int `json:"TotalCount" xml:"TotalCount"`
PageNumber int `json:"PageNumber" xml:"PageNumber"`
PageSize int `json:"PageSize" xml:"PageSize"`
List []Task `json:"List" xml:"List"`
}
|
Q:
Do most (all?) machine learning techniques share this architecture?
Context: I've used Principal Component Analysis a fair bit, toyed with Artificial Neural Nets, and only read about other machine learning techniques. I have some academic exposure to machine learning, but only chapters of books and individual lectures - never a complete course or text.
There seem to be "architectural" similarities among machine learning techniques. There always seems to be a training process step and a prediction process step. Moreover, there seems to be similarities in the data passed among those two processes:
Tagged or not, there is always training data.
The training process always outputs a trained model
The training process and/or model are usually configurable somehow.
The prediction process uses the trained model to predict something about its input data.
The training data and the prediction input data are both constrained in similar ways (EX: both are strings, or both are 30 dimensional vectors, or both are 16x16 images, etc).
Diagrammatically:
Do all machine learning techniques share this high level architecture?
Or, if this covers only a subset, what do people call that subset?
PCA and ANN, for example, both have a training step that takes training data to output a trained model. And both use that trained model to generate from data that hasn't yet been seen. Here's my attempt to hammer both of these techniques into the same diagram.
(Load the following images in a separate tab if you can't read them - they're designed for 150 pixels per inch.)
There seem to be a couple of established ways to do PCA (correlation method and covariance method), and neither one is very flexible or parametric. On the other hand, there seem to be N+1 interesting ways to configure or train neural nets, where N is the number of interesting ways in existence yesterday. Because of this, I imagine the difference gets pretty blurry between these two points:
"two different ANN techniques"
vs
"two different flavors/configurations of one ANN techique"
I'm assuming there are other ML techniques which are similar in that respect. I draw attention to this technique-vs-flavor ambiguity because it's the most complicating factor I've found when I'm trying to accurately shove a particular ML technique into the boxes of the diagram.
I also recognize that the training process can include the prediction process, as in neural nets or evolutionary techniques. But, as far as I know, there is still a distinct trained model that can be used with a prediction process after training.
A:
I think that the process outlined in your upper diagram more accurately summarizes the subset called supervised learning. It's commonly presented in terms of function inference, the task of determining a (usually noisy) function from data. (See e.g. wikipedia.)
Though, it may not fully reflect all supervised methods. Take for example k nearest neighbors. When asked to classify a new instance, it queries the data for those nearest to the new one, and classifies or predicts, often using something like a vote or distance-weighted average. Importantly, it doesn't do any upfront learning to output a model.
More, PCA doesn't really fit this definition. It's a dimensionality-reduction technique that doesn't predict anything unknown about the data; it just projects it into a space of smaller dimension. If you use all of the principal components, you've simply expressed the data differently, and know nothing more or less about it than you would prior to using PCA. (Dimensionality reduction is many times categorized as unsupervised learning.)
For an idea of how one might define a common architecture, I'll share the definition that really helped me unify many topics in machine learning under a single umbrella. From Tom Mitchell in Machine Learning:
A computer program is said to learn from experience E with respect to some class of tasks T and performance measure P, if its performance at tasks in T, as measured by P, improves with experience E.
For me, it's very intuitive to specify machine learning applications using this definition. For example:
A program learns to predict housing prices (task) if the sum of squared error of its predictions (performance measure) decreases as its given more data (experience).
A drone learns to efficiently order package deliveries and select routes if its speed improves as it delivers more of them.
The second example illustrates how this definition is broad enough to cover problems where training data doesn't come in the form of input-output tuples. I find it immensely useful for building a conceptual space that includes supervised learning, optimization and reinforcement learning. (I confess that it doesn't help me unify unsupervised learning, which I'm content to think of as either a precursor to some other learning task, or as an extension of descriptive statistics.)
|
Heavy Rain (Review) Playstation 3 at Pixel Perfect Gaming
PPG wrote, "Heavy Rain is a unique experience that places you in control of four main characters that must solve the case of the Origami Killer. Unlike previous games before it, Heavy Rain's game play focuses on quicktime events instead of standard free-roaming controls for combat, communication, and investigating locations.
The quicktime event was originally pioneered by Don Bluth in 1983 with his arcade laserdisc smash-hit Dragon's Lair. Unfortunately, games like Dragon's Lair were linear and limited the player to a sparse number of moves, giving the illusion of control. Technology was the biggest limitation back in 1983, but the vision lived on."
(Heavy Rain , PS3)
10/10 |
X-rays
were discovered in 1895 by Wilhelm Conrad Roentgen (1845-1923)
who was a Professor at Wuerzburg University in Germany. Working
with a cathode-ray tube in his laboratory, Roentgen observed a
fluorescent glow of crystals on a table near his tube. The tube
that Roentgen was working with consisted of a glass envelope (bulb)
with positive and negative electrodes encapsulated in it. The
air in the tube was evacuated, and when a high voltage was applied,
the tube produced a fluorescent glow. Roentgen shielded the tube
with heavy black paper, and discovered a green colored fluorescent
light generated by a material located a few feet away from the
tube.
He concluded that a new type of ray was being emitted from the
tube. This ray was capable of passing through the heavy paper
covering and exciting the phosphorescent materials in the room.
He found that the new ray could pass through most substances casting
shadows of solid objects. Roentgen also discovered that the ray
could pass through the tissue of humans, but not bones and metal
objects. One of Roentgen's first experiments late in 1895 was
a film of the hand of his wife, Bertha. It is interesting that
the first use of X-rays were for an industrial (not medical) application,
as Roentgen produced a radiograph of a set of weights in a box
to show his colleagues.
Roentgen's
discovery was a scientific bombshell, and was received with extraordinary
interest by both scientist and laymen. Scientists everywhere could
duplicate his experiment because the cathode tube was very well
known during this period. Many scientists dropped other lines
of research to pursue the mysterious rays. Newspapers and magazines
of the day provided the public with numerous stories, some true,
others fanciful, about the properties of the newly discovered
rays.
Public fancy was caught by this invisible ray with the ability
to pass through solid matter, and, in conjunction with a photographic
plate, provide a picture of bones and interior body parts. Scientific
fancy was captured by the demonstration of a wavelength shorter than
light. This generated new possibilities in physics, and for investigating
the structure of matter. Much enthusiasm was generated about potential
applications of rays as an aid in medicine and surgery. Within
a month after the announcement of the discovery, several medical
radiographs had been made in Europe and the United States, which
were used by surgeons to guide them in their work. In June 1896,
only 6 months after Roentgen announced his discovery, X-rays were
being used by battlefield physicians to locate bullets in wounded
soldiers.
Prior
to 1912, X-rays were used little outside the realms of medicine
and dentistry, though some X-ray pictures of metals were produced.
The reason that X-rays were not used in industrial application
before this date was because the X-ray tubes (the source of the
X-rays) broke down under the voltages required to produce rays
of satisfactory penetrating power for industrial purposes. However,
that changed in 1913 when the high vacuum X-ray tubes designed
by Coolidge became available. The high vacuum tubes were an intense
and reliable X-ray source, operating at energies up to 100,000
volts.
In 1922, industrial radiography took another step forward with
the advent of the 200,000-volt X-ray tube that allowed radiographs
of thick steel parts to be produced in a reasonable amount of
time. In 1931, General Electric Company developed 1,000,000 volt
X-ray generators, providing an effective tool for industrial radiography.
That same year, the American Society of Mechanical Engineers (ASME)
permitted X-ray approval of fusion welded pressure vessels that
further opened the door to industrial acceptance and use.
A Second Source of Radiation
Shortly after the discovery of X-rays, another form of penetrating
rays was discovered. In 1896, French scientist Henri Becquerel
discovered natural radioactivity. Many scientists of the period
were working with cathode rays, and other scientists were gathering
evidence on the theory that the atom could be subdivided. Some
of the new research showed that certain types of atoms disintegrate
by themselves. It was Henri Becquerel who discovered this phenomenon
while investigating the properties of fluorescent minerals. Becquerel
was researching the principles of fluorescence, wherein certain minerals
glow (fluoresce) when exposed to sunlight. He utilized photographic
plates to record this fluorescence.
One of the minerals Becquerel worked with was a uranium compound.
On a day when it was too cloudy to expose his samples to direct
sunlight, Becquerel stored some of the compound in a drawer with
his photographic plates. Later when he developed these plates,
he discovered that they were fogged (exhibited exposure to light).
Becquerel questioned what would have caused this fogging. He knew
he had wrapped the plates tightly before using them, so the fogging
was not due to stray light. In addition, he noticed that only
the plates that were in the drawer with the uranium compound were
fogged. Becquerel concluded that the uranium compound gave off
a type of radiation that could penetrate heavy paper and expose
photographic film. Becquerel continued to test samples of uranium
compounds and determined that the source of radiation was the
element uranium. Bacquerel's discovery was, unlike that of the
X-rays, virtually unnoticed by laymen and scientists alike. Relatively few scientists were interested in Becquerel's findings.
It was not until the discovery of radium by the Curies two years
later that interest in radioactivity became widespread.
While working in France at the time of Becquerel's discovery,
Polish scientist Marie Curie became very interested in his work.
She suspected that a uranium ore known as pitchblende contained
other radioactive elements. Marie and her husband, French scientist
Pierre Curie, started looking for these other elements. In 1898,
the Curies discovered another radioactive element in pitchblende, and named it 'polonium' in honor of Marie Curie's native homeland.
Later that year, the Curies discovered another radioactive element
which they named radium, or shining element. Both polonium and
radium were more radioactive than uranium. Since these discoveries,
many other radioactive elements have been discovered or produced.
Radium became the initial industrial gamma ray source. The material
allowed castings up to 10 to 12 inches thick to be radiographed. During
World War II, industrial radiography grew tremendously as part
of the Navy's shipbuilding program. In 1946, man-made gamma ray
sources such as cobalt and iridium became available. These new
sources were far stronger than radium and were much less expensive.
The manmade sources rapidly replaced radium, and use of gamma
rays grew quickly in industrial radiography.
Health Concerns
The science of radiation protection, or "health physics"
as it is more properly called, grew out of the parallel discoveries
of X-rays and radioactivity in the closing years of the 19th century.
Experimenters, physicians, laymen, and physicists alike set up
X-ray generating apparatuses and proceeded about their labors with
a lack of concern regarding potential dangers. Such a lack of
concern is quite understandable, for there was nothing in previous
experience to suggest that X-rays would in any way be hazardous.
Indeed, the opposite was the case, for who would suspect that
a ray similar to light but unseen, unfelt, or otherwise undetectable
by the senses would be damaging to a person? More likely, or so
it seemed to some, X-rays could be beneficial for the body.
Inevitably, the widespread and unrestrained use of X-rays led
to serious injuries. Often injuries were not attributed to X-ray
exposure, in part because of the slow onset of symptoms, and because
there was simply no reason to suspect X-rays as the cause. Some
early experimenters did tie X-ray exposure and skin burns together.
The first warning of possible adverse effects of X-rays came from
Thomas Edison, William J. Morton, and Nikola Tesla who each reported
eye irritations from experimentation with X-rays and fluorescent
substances.
Today, it can be said that radiation ranks among the most thoroughly
investigated causes of disease. Although much still remains to
be learned, more is known about the mechanisms of radiation damage
on the molecular, cellular, and organ system than is known for
most other health stressing agents. Indeed, it is precisely this
vast accumulation of quantitative dose-response data that enables
health physicists to specify radiation levels so that medical,
scientific, and industrial uses of radiation may continue at levels
of risk no greater than, and frequently less than, the levels
of risk associated with any other technology.
X-rays and Gamma rays are electromagnetic radiation of exactly
the same nature as light, but of much shorter wavelength. Wavelength
of visible light is on the order of 6000 angstroms while the wavelength
of x-rays is in the range of one angstrom and that of gamma rays
is 0.0001 angstrom. This very short wavelength is what gives x-rays
and gamma rays their power to penetrate materials that light cannot.
These electromagnetic waves are of a high energy level and can
break chemical bonds in materials they penetrate. If the irradiated
matter is living tissue, the breaking of chemical bonds may result
in altered structure or a change in the function of cells. Early
exposures to radiation resulted in the loss of limbs and even
lives. Men and women researchers collected and documented information
on the interaction of radiation and the human body. This early
information helped science understand how electromagnetic radiation
interacts with living tissue. Unfortunately, much of this information
was collected at great personal expense. |
Is the sales tax on merchandise purchased for resale included in inventory?
In our state, sales tax is paid only by the end customer. In other words, a retailer does not pay sales tax on merchandise that is purchased for resale. To avoid the sales tax, the retailer furnishes the supplier with a reseller's certificate, which allows the supplier to not charge the sales tax.
If a sales tax is paid by the reseller and the sales tax could have been avoided, the sales tax would have to be expensed immediately. Costs that are not necessary cannot be recorded as assets.
If the sales tax could not have been avoided, then the sales tax would be part of the cost of the merchandise purchased. If the merchandise has not been sold, the entire cost will be reported as inventory, a current asset on the balance sheet. If the merchandise has been sold, then the entire cost will be reported on the income statement as the cost of goods sold.
Free Financial Statements Cheat Sheet
368,554 Subscribers
You are already subscribed. This offer is not available to existing subscribers. |
Do you remember when Dr. Evil was going to hold the world ransom for $1,000,000?
This is what we are facing today in Solar – the Dr. Evil ultimatum. The cost to get Solar to coal parity is going to be laughably tiny.
The cost sounds like a lot of money to old people, or to people who haven’t thought it through, or to people who do not know how large world GDP is today and how much we spend on energy already.
But the cost is tiny, and China laughed when they found out the cost.
I’ve been in a twitter argument with Michael Shellenberger. Michael Shellenberger is a sharp guy, so please read what he has to say on Solar. But I think he is missing the big picture about solar. He is:
arguing for innovation driven approach to driving solar costs lower arguing for a market driven approach to implementing solar
This is a great approach for something like the a handheld computer like the iPhone, as Steve Jobs found out the hard way with the Newton. But with solar, he’s missing the biggest driver and reason solar is happening today and not 25 years in the future.
Solar is happening right now because China needs Solar to be cheaper than coal in China. Pollution is terrible in China.
We’ve all see the pictures of China’s pollution problem, but here is one just as a fresh reminder of how bad it is there.
China decided back in 2000 they wanted needed to go green due to what was obviously going to be a massive environmental problem. I had friends tell me pollution was a terrible problem for China in the early 2000’s. Everyone in China knew this was a problem that had to get worse because they needed the electricity and energy.
China needed a solution to provide huge amounts of cheap electricity and not cause pollution. There are not many ways to do this. Solar was one possible path to clean and cheap energy way back in 2000, but it was very expensive then, and could not supply much capacity because there were few Solar production facilities.
So the Chinese leadership asked a question:
“How much will it cost to make Solar Cheaper than Coal?
This question has an answer. It turned out to be a dollar value China was willing to pay.
The dollar answer to this question requires knowing a few stylized facts about solar:
Solar gets 20% cheaper for every doubling of worldwide installed capacity. This is called Swanson’s Law and has held for at least 40 years. The amount of installed solar is tiny today and was much smaller in the early 2000’s. This means Doubling capacity would cost very little in absolute dollar values in the early days. Even today is quite low. Testing Swanson’s law is “cheap”. Solar plants are extremely quick to develop compared to coal plants, which means the planning and possible cancellation time is very low. The market is willing to pay more for solar than it is for coal. Some increasing portion of the current year cost to test Swanson’s law will be willingly funded by the market because the market will pay more for Solar than it will for coal power. Installation capacity has a high but real upper limit to how much it can grow each year. Solar plants have almost 100% of their costs up front, so the financing is an important cost factor. Solar cells last about 30 years, which is longer than the financing term, so the last 10 years are free electricity even if Solar turns out to be a boondoggle during the time you are paying for it. Electrical energy storage costs have their own Swanson’s law.
Analysts at places like McKinsey make models based on observations like this all the time. Industries are given estimated growth rates, and end up with some level of market penetration, with some mitigating factors and limits.
Swanson’s law predicted 20% price declines for every doubling of installed capacity. Since capacity was so low in the early 2000’s, doubling total world capacity a few times would cost just a few billion dollars.
The Chinese leadership turned the model on its head, and asked how much it would cost to get them to get Solar cheaper than coal.
I can imagine the conversation between the Chinese leadership and the engineers who were asking for funding.
“We have a looming environmental problem due to wanting much more electricity.”
“What are some possible solutions?”
“Solar could one day be cheaper and solve both the cost and pollution problems.”
“How much money do you need to find out?”
“A lot, about $10 billion”
At this point the leadership fall on the floor laughing. China is a country where they build entire ghost cities with nobody in them. They build massive public transportation systems in 15 yearsbecause they can. Spending $10bn to find out if they can solve both energy and pollution was completely worth it to them.
China found out something even more interesting when they asked this question about the total cost to get Solar to coal parity. The initial, upfront costs to investigating solar would be comically trivial, and they could stop at any time. Finding out if Solar was a possible solution to the energy/pollution problem would be relatively cheap.
I suspect China decided to test Swanson’s law in the 10th plan from 2001-2005. When Swanson’s law held up, they decided to dramatically up production during the 11th plan. This production build out caused the huge price drop in 2008, when the factories built in 2006-2007 began shipping in 2008. Today in the 12th guideline from 2011-2015, China is pushing production to see if they can get cheaper than coal sooner rather than later because pollution is so bad.
Environmentalism is a guiding principle in the 12th guideline – mentioned on page three! The environment is clearly an important part of the Chinese plan – not many ideas are mentioned in the guiding principles, and China takes these principles seriously. Look at how many times sustainable growth is mentioned in the guiding principles.
It turns out Solar will be cheaper than coal for China very, very soon. SunTech estimates Solar will be cost competitive with coal power in China by 2016 and 2017 at the latest. This is in line with what people expect for Solar parity in the United States, given the cost of coal based power.
Still, let’s assume SunTech exaggerating, and the time for Solar/coal parity is really 2018.
Both parts of this assumption are reasonable. Suntech is probably exaggerating the time for Solar to get cost competitive with coal. But it can’t be more than a year or two, because electricity is so much more expensive in China than it is in the United States.
(Aside: Swanson’s law probably needs to be modified a bit. Swanson’s law uses installed capacity as the driver for prices. The driver for solar prices is probably “total potential manufacturing capacity of current solar PV manufacturers”. I am certain someone important in China noticed this by 2008 at the latest.)
Coal power is expensive in China, simply because they need to import coal from Australia. China can’t make the cost of coal lower with cheap wages.
Industrial users in China should pay about 80% more for electricity as similar users do here in the United States. So if unsubsidized Solar is about double the cost of coal here – which we know was true a lifetime year ago – then Solar must be close to coal parity in China today.
It’s important to note electricity prices for China are massively subsidized by the Chinese government even if companies are not paying the cost. Here is a Bloomberg article on this important topic:
“Support to industry totaled about 10 percent of gross domestic product, according to a 2010 study led by Huang Yiping, vice president of the National School of Development at Peking University and former chief Asia economist at Citigroup Inc. That equals about $593 billion.”
So how much was the total cost to China to make Solar Cheaper than their cost for coal power in 2018? It’s going to cost China a total of about a trillion dollars. It will cost China about 2 years of their existing subsidies to make their energy costs cheaper than dirty coal.
China is and was willing to pay this amount to get cheaper, cleaner energy.
Again, remember this $1 trillion was not an all up front cost. China was able to invest about $10 billion over the years 2001-2005 to find out if this could possibly work. China then invested another $100bn to completely dominate the world solar panel market and bring prices close to coal parity in 2006-2010. When Swanson’s law held during this expansion, they decided to go all in, make true parity an explicit goal, and so will spend another $900 billion, for a total of around a trillion dollars.
The total cost to the world is roughly $10 trillion USD. It’s going to take longer to get to coal parity everywhere, so the total amount is going to be high for the entire world. Still, this is a tiny amount of money. That’s right, over the 10 years Solar is getting cheaper than coal, it will cost about 1% of total GDP.
The total cost to the world to get cheaper, clean energy is about 12% of 1 year of GDP. World GDP in 2012 was 84 trillion. During that time, the world will spend about 8-10% of GDP on energy. This ends up being roughly $100 trillion on energy over the same time span.
Here is a link to the spreadsheet I used to get these numbers, called Solar Growth. Note I’ve overestimated China’s investment according to recent figures. Recent figures put it at 20% of the world investment, but I used 40% in this spreadsheet. Lowering the investment to 20% vastly reduces China’s cost calculation.
I don’t have the numbers yet, but it’s pretty clear we’re going to save giant portions of GDP every year by 2030. We’re talking saving 3%+ a year, and growing! This could raise our long term growth rate to 5% or more. (Take that Piketty! That’s for another post.)
Much of the decline in price was driven by China’s decision, even if the costs are shared globally. You might see a few important things missing in the spreadsheet, which would make the cost actually paid by China far, far lower than $1 trillion.
Does not account for foreign income purchasing Chinese Solar panels which would lower the cost to China The sheet assumes the market does not pay anything for Solar power, when the world seems willing to pay a premium for clean energy (Cough, Germany, Cough) Assumed China paid 40% of the world investment in Solar when it is only paying 20% Solar panels last longer than the financing duration, so at some point, solar provides zero cost electricity.
All of these points would reduce China’s paid out cost to get them to cheap, clean energy.
The next 5 year guideline spans from 2016-2020. This is the time frame in which SunTech expects solar to be cheaper than coal in China. I expect another massive build-out for China Solar which greatly exceeds expectations as Solar is economically cheaper than coal for China. Then in 2021-2025, the build will be vast – think Shanghai skyline over 1995-2000
Many people are calling for thousands of coal plants to be built in China in the years from 2020 to 2030. However, if you think about it from the perspective of how China has acted in the past, this does not make much sense. China has shown again and again it is willing to make what appears to be insane levels of investment to achieve goals.
I contend given the current levels of pollution in China, paying a modest premium for energy is completely worth it to them. If Solar ends up being the same cost as coal in just a few years, China will shift over to Solar power in an astonishing way. They will just stop building coal plants, and build an incredible amount of Solar plants instead.
Look at what China did in Shanghai. The city was entirely transformed in 20 years. China put up the equivalent of Chicago in 20 years.
Why would their response to cheap, clean energy be different? It won’t. China had a Dr. Evil moment with Solar, where it was shocked at how little it would cost to get clean energy. They tested Solar and it worked as expected. China is now laughing as they almost certainly preparing to roll out a truly huge amount of solar in the next 10 years.
This is going to drive down Solar prices far more rapidly than anyone expects. They are beginning to put together the information for the next 5 year guideline today and it looks great for Solar. The capacity China will add beginning in 2016 is likely to exceed even the highest estimates, simply because the combination of lower cost and pollution-free energy will be so compelling to China. |
This is the president of the United States, Donald Trump. He is not a member of Marvel's fictional bad-guy organization, Hydra.
This is a comic book fan in a cosplay costume of Red Skull, a Marvel character and member of Hydra. He is not affiliated with the White House.
But when you type in hail-hydra.com on your web browser, you are redirected to the White House's biography page for President Trump. 👀
"The intent at the beginning was to occasionally point it at organizations I thought were a little too authoritarian and fascist-leaning," he said.
BuzzFeed News spoke to the owner of the domain, an IT worker from the Midwest, who said he purchased it in April 2014, around the same time Captain America: The Winter Soldier was released in theaters.
Now, if you're not familiar with Hydra, it is a bad-guy-filled organization from the Marvel comic books bent on world domination.
The owner of the domain, who requested anonymity, told BuzzFeed News that at first he planned to redirect hail-hydra.com to websites for his local politicians, but then in 2015 decided to direct it to then-presidential candidate Ted Cruz's site.
The URL redirected to Cruz's site until at least October, according to archive.org.
The domain owner told BuzzFeed News he then decided to point it toward President Trump's White House biography on Inauguration Day.
"Trump in particular seems to have a cult of personality about him where he thinks now that he is president everyone should be loyal to him first and not the constitution or laws of the land," the owner told BuzzFeed News. "I wanted to target Trump specifically and not the White House."
He said he hasn't been contacted by the White House or any law enforcement agencies. If he is, he said, he hopes authorities recognize his action as political commentary.
"In no way is [it] meant as a threat (other than a threat of me voting against him, again)," he wrote in an email.
He also said he is not a registered Democrat but does consider his politics "left-leaning."
He said he had no plans to change the redirect in the near future. As of Sunday, it was still pointing toward Trump's biography. |
Virtually all endothelial cell growth factors can be purified by heparin affinity chromatography. These heparin-binding growth factors (HBGF's) fall into two classes. Class 1 HBGF's are anionic mitogens found in high levels in neural tissue, and class 2 HBGF's are cationic mitogens with a wide tissue distribution. Both classes of HBGF induce angiogenesis and are likely to play a role in the neovascularization that occurs in a variety of normal and pathological processes, including wound healing, ovulation, abnormal retinal neovascularization, arthritis, and particularly solid tumor growth. Thus, the importance of HBGF's and heparin as modulators of endothelial cell function and blood vessel growth has significant pathological and therapeutic implications. Investigations into their physiological relevance will depend critically on a thorough understanding of the structural basis for the interaction of HBGF's with their cell receptors and the heparin molecule. The specific aim of this proposal is to examine the relationship between the structure and function of the class 1 HBGF from bovine brain (HBGF-1), which is typical of all class 1 HBGF's. This relationship will be evaluated by: determination of the complete structure of HBGF-1 by the complementary approaches of protein and cDNA sequencing; definition of assays that provide accurate readouts of the interaction between heparin, HBGF-1, and the cell receptor; chemical and enzymatic modification of HBGF-1; evaluation of synthetic peptides representing fragments of HBGF-1 as agonists or antagonists; and evaluation of the effects of antibodies of defined specificity. The goal of these structure/function studies is the development of chemical and/or immunological agonists and antagonists capable of modulating the functions of class 1 HBGF's in vivo. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.