text stringlengths 8 5.77M |
|---|
The select committee says it still wants to hear from Mark Zuckerberg, either in person or via video link.
Photograph: Chris Ratcliffe/PA
Mark Zuckerberg has come under intense criticism from the UK parliamentary committee investigating fake news after the head of Facebook refused an invitation to testify in front of MPs for a third time.
The MP said: “I think, given the extraordinary evidence we’ve heard so far today, it is absolutely astonishing that Mark Zuckerberg is not prepared to submit himself to questioning in front of a parliamentary or congressional hearing, given these are questions of fundamental importance and concern to his users, as well as to this inquiry.
“I would certainly urge him to think again if he has any care for people that use his company’s services.”
Zuckerberg has been invited three times to speak to the committee, which is investigating the effects of fake news on UK democracy, but has always sent deputies to testify in his stead.
When the Commons committee travelled to Washington DC in February to obtain oral evidence from US companies, Facebook flew over its UK policy director rather than send a high-level executive to speak to the committee.
In response to the latest request, Facebook has suggested one of two executives could speak to parliament: Chris Cox, the company’ chief product officer, who is in charge of the Facebook news feed, or Mike Schroepfer, the chief technology officer, who heads up the developer platform.
However, Theresa May declined to back Collins. Pressed by the committee chairman at the Commons liaison committee later in the day, the prime minister said “Mr Zuckerberg will decide for himself” whether to give evidence to parliament.
She said the Cambridge Analytica affair “raises very deep concern in terms of what is suggested” and repeatedly said it was for Facebook, Cambridge Analytica and any individuals involved to “cooperate fully” with the information commissioner.
The company’s head of public policy, Rebecca Stimson, said in a letter to Collins: “Facebook fully recognises the level of public and parliamentary interest in these issues and support your belief that these issues must be addressed at the most senior levels of the company by those in an authoritative position to answer your questions. As such, Mr Zuckerberg has personally asked one of his deputies to make themselves available.”
Both men, Stimson wrote, “report directly to Mr Zuckerberg and are among the longest-serving senior representatives in Facebook’s 15-year history. Both of them have extensive expertise in these issues and are well placed to answer the committee’s questions on these complex subjects.”
During Tuesday’s committee hearing, Wylie suggested Facebook may have been aware of the large-scale harvesting of data carried out by Cambridge Analytica’s partner GSR even earlier than had been previously reported.
“I remember, and I think this was in around July 2014, [Aleksandr Kogan, GSR’s founder] was delayed for a couple of days because Facebook had throttled the app so that it couldn’t pull as much data, or there was some problem with pulling the data at the same speed as before.
“He told me he had had a conversation with some engineers at Facebook. So Facebook would have known from that moment about the project because he had a conversation with Facebook’s engineers, or at least that’s what he told me.”
It took until 2015 for Facebook to take action on the data-harvesting project, after a Guardian article detailing GSR’s data abuse in support of the Ted Cruz campaign for the Republican presidential nomination.
And it was not until last week, after Facebook had again been notified by the Observer about the harvesting, that the company released a statement noting that “the entire company is outraged that we were deceived”.
Wylie also claimed that Palantir, a national security contractor owned by the Facebook board member Peter Thiel, was allowed informal access to the Facebook data harvested by GSR.
“We actually had several meetings with Palantir,” Wylie said. “There were senior Palantir employees that were also working on the Facebook data. That was not an official contract between Palantir and CA, but there were Palantir staff who would come into the office and work on the data. And we would go and meet with Palantir staff at Palantir.”
Despite the confidentiality agreements he entered into with Cambridge Analytica, Wylie described Facebook’s attempts to kill last week’s story as being the most forceful.
“The most amount of legal pushback that I’ve got actually wasn’t from Cambridge Analytica, it was from Facebook. It’s Facebook who’s most upset about this story,” he said.
“They sent some fairly intimidating legal correspondence. They haven’t taken action on that. I think, I’m not sure exactly what they’re planning to do. They’ve gone silent, they won’t talk to me any more.”
Testifying alongside Wylie was Paul-Olivier Dehaye, the co-founder of personaldata.io, who has been fighting to force the social network to apply European data protection law. Dehaye revealed that Facebook repeatedly tried to argue it was exempt from fulfilling “subject access” requirements, which allow individuals to see the data that companies hold about them, because it would be too expensive to comply.
“They’re invoking exceptions … involving disproportionate effort,” Dehaye said. “They’re saying it’s too much effort to give me access to my data. I find that quite intriguing, because they’re making a technical and a business argument as to why I shouldn’t have access to this data.
“In the technical argument they’re shooting themselves in the foot, because they’re saying they’re so big the cost would be too large to provide me data.”
In effect, Dehaye said, Facebook told him it was too big to regulate. “They’re really arguing that they’re too big to comply with data protection law, the cost is too high, which is mind-boggling that they wouldn’t see the direction they’re going there. Do they really want to make this argument?” |
; RUN: llc < %s -relocation-model=pic -code-model=large
target datalayout = "e-p:64:64:64-i1:8:8-i8:8:8-i16:16:16-i32:32:32-i64:64:64-f32:32:32-f64:64:64-v64:64:64-v128:128:128-a0:0:64-s0:64:64-f80:128:128"
target triple = "x86_64-apple-darwin8"
declare void @xscanf(i64) nounwind
define void @foo() nounwind {
call void (i64)* @xscanf( i64 0 ) nounwind
unreachable
}
|
1. Introduction
===============
The multidrug-resistant pathogenic strains of *Escherichia coli* are responsible for opportunistic infections, including nosocomial ones, which are difficult to treat, especially in immunocompromised patients. *E. coli* is responsible for severe cases of urinary tract infection, meningitis in newborns, digestive system illnesses, and even pneumonia. In recent years, strains of *Enterobacteriaceae* producing an extended spectrum β-lactamase have become a concern in the antimicrobial treatment of persistent infections and control of infection in hospitals \[[@B1-molecules-18-09334],[@B2-molecules-18-09334],[@B3-molecules-18-09334],[@B4-molecules-18-09334],[@B5-molecules-18-09334]\]. The most severe clinical cases are isolated resistant strains of *Escherichia coli*, *Klebsiella pneumonia*, *Pseudomonas aeruginosa* and *Acinetobacter baumanii*. Extended-spectrum β-lactamases are enzymes produced by Gram-negative bacilli that mediate resistance to penicillin, cephalosporins, and monobactams \[[@B6-molecules-18-09334],[@B7-molecules-18-09334],[@B8-molecules-18-09334],[@B9-molecules-18-09334]\]. The widespread use of antimicrobial drugs, primarily antibiotics, and the transmissibility of resistance determinants mediated by plasmids, transposons, and gene cassettes in integrons contribute to the spread of resistance.
A worrying development is the fast spread of resistant clones of these bacteria on a global scale \[[@B10-molecules-18-09334],[@B11-molecules-18-09334],[@B12-molecules-18-09334]\]. Thanks to growing resistance to drugs commonly used in clinical practice, effective treatment availability is greatly reduced. This problem of increasing resistance has necessitated the search for safe and effective factors that may be used to treat persistent bacterial infections. Experimental research confirms the varied pharmaceutical activities of not only chemical compounds, but also many plant metabolites such as polysaccharides, flavonoids, coumarins, glycosides, phenolic acids, saponins and also essential oils. Plant metabolites are a very interesting alternative for synthetic preparations: many of them have strong antimicrobial activity \[[@B13-molecules-18-09334],[@B14-molecules-18-09334],[@B15-molecules-18-09334],[@B16-molecules-18-09334],[@B17-molecules-18-09334]\]. Their synergy of action with each other and in combination with antibiotic and chemotherapeutic therapy make them a valued complement to anti-infective therapy \[[@B18-molecules-18-09334],[@B19-molecules-18-09334],[@B20-molecules-18-09334],[@B21-molecules-18-09334],[@B22-molecules-18-09334],[@B23-molecules-18-09334]\].
The *Ocimum* L. (basil) and *Rosmarinus* L. (rosemary) genera belong to the family *Lamiaceae*. Among the plants known for medicinal value, basil and rosemary plants are highly regarded for their therapeutic potentials. *Ocimum basilicum* L. and *Rosmarinus officinalis* L. essential oils offer promise as biologically active constituents, in that they confer antibacterial, antifungal and antioxidant properties. Basil and rosemary oils have long been used for treating, among other things, colds, fever, cough, asthma, sinusitis and rheumatism, as well as accelerating the process of wound healing \[[@B24-molecules-18-09334],[@B25-molecules-18-09334],[@B26-molecules-18-09334],[@B27-molecules-18-09334],[@B28-molecules-18-09334]\]. The aim of this work was to determine the antibacterial activity of basil oil from *Ocimum basilicum* L. and rosemary oil from *Rosmarinus officinalis* L. against standard and clinical strains of *Escherichia coli* isolated from patients and from hospital equipment.
2. Results
==========
2.1. Chemical Composition of the Basil and Rosemary Essential Oils
------------------------------------------------------------------
Chemical analysis showed the presence of forty-eight constituents within basil oil from *Ocimum basilicum* L., the main ones being estragole (86.4%), 1,8-cineole (4.9%) and *trans*-α-bergamotene (3.0%). The chemical composition of the basil oil is presented in [Table 1](#molecules-18-09334-t001){ref-type="table"}. The essential oil from *Rosmarinus officinalis* L. contains thirty-seven components: the main ones being 1,8 cineole (46.4%), camphor (11.4%), α-pinene (11.0%), β-pinene (9.2%) and camphene (5.2%). The chemical composition of the rosemary oil is presented in [Table 2](#molecules-18-09334-t002){ref-type="table"}.
molecules-18-09334-t001_Table 1
######
Constituents of basil oil.
Number of compounds Compound \% RI
--------------------- ----------------------------- ---------- ---------- --
1 α-Pinene 0.4 929
2 Camphene 0.1 942
3 Sabinene 0.2 965
4 β-Pinene 0.6 969
5 2,3-Dehydro-1.8-cineole Tr 979
6 Myrcene 0.2 983
7 *p*-Cymene 0.1 1013
**8** **1,8-Cineole** **4.9** **1020**
9 Limonene 0.4 1021
10 (E)-β-Ocimene 0.6 1038
11 trans-Linalool oxide (f) Tr 1058
12 Fenchone 0.2 1067
13 cis-Linalool oxide (f) Tr 1073
14 Linalool 1.2 1085
15 endo-Fenchol 0.2 1098
16 Camphor 0.7 1119
17 Menthone 0.1 1134
18 Isomenthone Tr 1143
19 Borneol 0.2 1149
20 Menthol 0.3 1159
21 Terpinen-4-ol 0.1 1163
**22** **Estragole** **86.4** **1188**
23 Fenchyl acetate 0.3 1209
24 Bornyl acetate 0.3 1269
25 2-Hydroxycineol acetate Tr 1321
26 Eugenol methyl ether 0.5 1373
27 β-Bourbonene Tr 1385
28 β-Elemene 0.3 1389
29 cis-α-Bergamotene Tr 1412
30 β-Caryophyllene 0.1 1419
**31** **trans-α-Bergamotene** **3.0** **1435**
32 β-Sesquifenchene 0.2 1437
33 (Z)-β-Farnesene tr 1447
34 α-Humulene tr 1452
35 Cadina-1(6),4-diene tr 1459
36 trans-β-Bergamotene 0.2 1479
37 α-Bulnesene 0.1 1499
38 γ-Cdinene 0.5 1506
39 Calamenene tr 1510
40 β-Sesquiphellandrene 0.1 1514
41 *p*-Methoxycinnamaldehyde 0.5 1525
42 *p*-Methoxycinnamyl alcohol 0.4 1532
43 Spathulenol 0.1 1565
44 Caryophyllene oxide 0.1 1571
45 Humulene epoxide II 0.1 1595
46 1- *epi*-Cubenol 0.1 1603
47 T-Cadinol 0.7 1627
48 α-Cadinol tr 1639
RI-Retence Index; tr \< 0.05%.
molecules-18-09334-t002_Table 2
######
Constituents of rosemary oil.
Number of compounds Compound \% RI
--------------------- ----------------------- ---------- ----------
1 Tricyclene 0.2 919
2 α-Thujene 0.1 923
**3** **α-Pinene** **11.0** **932**
**4** **Camphene** **5.2** **944**
5 Sabinene 0.1 966
**6** **β-Pinene** **9.2** **971**
**7** **Myrcene** **1.2** **983**
8 α-Phellandrene 0.2 997
9 Car-3-ene 0.1 1005
10 α-Terpinolene 0.1 1010
11 *p*-Cymene 1.3 1017
**12** **1,8-Cineole** **46.4** **1027**
**13** **Limonene** **1.0** **1027**
14 γ-Terpinene 1.0 1050
15 *trans*-Sabinene tr 1054
16 Terpinolene 0.2 1079
17 Linalool 0.5 1087
18 α-Campholenol tr 1096
19 *endo*-Fenchol tr 1102
**20** **Camphor** **11.4** **1124**
**21** **Borneol** **3.1** **1152**
22 Terpinen-4-ol 0.4 1163
**23** **α-Terpineol** **1.8** **1175**
**24** **Bornyl acetate** **1.0** **1269**
25 α-Cubebene tr 1349
26 α-Ylangene tr 1372
27 α-Copaene 0.1 1377
28 Longifolene 0.1 1407
**29** **β-Caryophyllene** **3.5** **1421**
30 α-Humulene 0.4 1452
31 γ-Muurolene 0.1 1471
32 α-Selinene tr 1492
33 α-Muurolene tr 1494
34 γ-Cadinene tr 1506
35 *trans*-Calamenene tr 1511
36 δ-Cadinene 0.1 1514
37 β-Caryophyllene oxide 0.1 1571
RI-Retention Index; tr \< 0.05%.
2.2. Susceptibility Testing of Clinical *Escherichia coli* Strains
------------------------------------------------------------------
### 2.2.1. Susceptibility Testing of Clinical *Escherichia coli* (ESBL+) Strains
Extended spectrum β-lactamase production for the tested *Escherichia coli* clinical strains was detected for strains from the abdominal cavity (n = 4), bronchia (n = 4), wounds (n = 4), urine (n = 4) and for strains isolated from blood (n = 3) and catheters (n = 3). The results are shown in [Figure 1](#molecules-18-09334-f001){ref-type="fig"}. The tested strains of *Escherichia coli* (ESBL+) were generally resistant to β-lactams, aminoglycosides and quinolones recommended for susceptibility testing. Most of them were resistant to cephalosporins and β-lactam antibiotics with such inhibitors as clavulanic acid, sulbactam and tazobactam.
### 2.2.2. Susceptibility Testing of Clinical *Escherichia coli* (ESBL−) Strains
*Escherichia coli* ESBL negative strains, characterized by a much lower resistance to β-lactam antibiotics, were resistant mainly to ampicillin, piperacillin, tikarcillin and also to ticarcillin/clavulanic acid. Most of them were resistant to aminoglycosides (gentamicin, amikacin) and quinolones (ciprofloksacin) and tetracycline. The results are shown in [Figure 2](#molecules-18-09334-f002){ref-type="fig"}.
{#molecules-18-09334-f001}
The (ESBL+) and (ESBL−) *Escherichia coli* were found to demonstrate significant resistance to the reference antibiotics in the susceptibility tests. In our tests, all twenty-two of the tested clinical isolates of ESBL positive *E. coli* were resistant to AMC (n = 21, 95%), CZ (n = 10, 45%), CXM (n = 12, 54%), GM (n = 10, 45%), AM (n = 21, 95%), PIP (n = 21, 95%), TIC (n = 21, 95%), TIM (n = 18, 81%), FEP (n = 11, 50%), CIP (n = 14, 64%), AN (n = 12, 54%), NET (n = 13, 59%), C (n = 17, 77%), TE (n = 21, 95%) and SXT (n = 20, 91%). The thirty-eight tested ESBL negative *E. coli* strains were generally resistant to AMC (n = 21, 55%), GM (n = 15, 39%), PIP (n = 23, 60%), TIC (n = 26, 68%), TIM (n = 13, 34%), CIP (n = 16, 42%), AN (n = 14, 37%), C (n = 15, 39%), TE (n = 34, 89%) and SXT (n = 26, 68%).
{#molecules-18-09334-f002}
2.3. The Susceptibility *Escherichia coli* Bacterial Strains to Basil Oil
-------------------------------------------------------------------------
The MIC values for sixty tested *E. coli* strains were between 8.0 µL/mL to 11.5 µL/mL. The basil oil showed inhibitory activity against *E. coli* ATCC 25922 standard strain at 8.0 µL/mL.
### 2.3.1. The Susceptibility *Escherichia coli* (ESBL+) Strains to Basil Oil
Most *E. coli* ESBL+ strains isolated from the abdominal cavity (n = 4) and from the bronchia (n = 4) were sensitive to basil oil at a concentration range from 8.25 µL/mL to 9.0 µL/mL. For (ESBL+) clinical strains from wounds (n = 4), MIC values were between 8.5 µL/mL to 9.25 µL/mL. The growth inhibition concentrations for bacteria isolated from blood were 8.75 µL/mL (n = 1) and 9.25 µL/mL (n = 2). Basil oil at a concentration of 8.75 µL/mL inhibited the growth of one of the tested clinical strains isolated from urine, while 9.0 µL/mL inhibited the growth of three. The MIC values for strains from catheters were 8.75 µL/mL (n = 2) and 9.25 µL/mL (n = 1). The susceptibility of *Escherichia coli* (ESBL+) strains to basil oil is shown in [Figure 3](#molecules-18-09334-f003){ref-type="fig"}.
{#molecules-18-09334-f003}
### 2.3.2. The Susceptibility *Escherichia coli* (ESBL−) Strains to Basil Oil
The basil oil was active against *Escherichia coli* (ESBL−) strains at a concentration range from 8.25 µL/mL to 11.5 µL/mL. The most tested strains isolated from the abdominal cavity (n = 4) were inhibited by concentrations of 11.0--11.5 µL/mL. Clinical strains from the bronchia (n = 5) were sensitive to basil oil at concentrations of 10.25--11.5 µL/mL. The MIC values for most strains from wounds (n = 4) were from 10.0 µL/mL to 11.5 µL/mL. Most *Escherichia coli* (ESBL−) strains isolated from blood and urine were inhibited by basil oil at concentrations ranging from 9.5 µL/mL to 11.5 µL/mL. The MIC values for bacteria from the catheters (n = 6) were 10.0--11.5 µL/mL. The susceptibility of *Escherichia coli* (ESBL−) strains to basil oil is demonstrated in [Figure 3](#molecules-18-09334-f003){ref-type="fig"}.
2.4. The Susceptibility *Escherichia coli* Bacterial Strains to Rosemary Oil
----------------------------------------------------------------------------
The rosemary oil was less active against the sixty tested *Escherichia coli* clinical strains obtained from the diverse clinical materials and the hospital equipment. The MIC values were between 18.0 and 20.0 µL/mL. The standard strain *E. coli* ATCC 25922 was sensitive to rosemary oil at a concentration of 18.5 µL/mL.
### 2.4.1. The Susceptibility of *Escherichia coli* (ESBL+) Strains to Rosemary Oil
Most *Escherichia coli* (ESBL+) strains isolated from the abdominal cavity (n = 3) were sensitive to rosemary oil at concentrations from 18.0 µL/mL to 18.5 µL/mL, and (n = 1) at 19.25 µL/mL concentration. The MIC values for bacterial strains isolated from the bronchia (n = 4) and wounds (n = 4) were 18.25--19.0 µL/mL and 18.5--19.25 µL/mL, respectively. *E. coli* (ESBL+) strains isolated from blood were sensitive to rosemary oil at concentrations between 18.75 and 19.75 µL/mL. All strains from urine (n = 4) were inhibited in the concentration ranges 18.0 µL/mL to 18.75 µL/mL, while those from catheters (n = 3) were inhibited from 18.25 µL/mL to 18.75 µL/mL. The results of the tests detailing the susceptibility of *Escherichia coli* (ESBL+) strains to rosemary oil are presented in [Figure 4](#molecules-18-09334-f004){ref-type="fig"}.
{#molecules-18-09334-f004}
### 2.4.2. The Susceptibility of *Escherichia coli* (ESBL−) Strains to Rosemary Oil
Rosemary oil was found to have MIC values from 18.5 µL/mL to 19.75 µL/mL for isolates from the abdominal cavity (n = 6). Growth inhibition was found to occur at concentrations of 19.0--20.0 µL/mL for clinical bacterial strains obtained from the bronchia (n = 6). Rosemary oil at concentrations ranging from 18.25 µL/mL to 20.0 µL/mL inhibited the growth of all tested *Escherichia coli* (ESBL−) strains isolated from wounds. For the blood (n = 7) and urine (n = 6) isolates, the MIC values were in the range 18.25-19.75 µL/mL. Finally, similar MIC values were found (18.25--19.75 µL/mL) against *E. coli* (ESBL−) strains isolated from catheters (n = 7). The susceptibility of the *Escherichia coli* (ESBL−) strains to rosemary oil is shown in [Figure 4](#molecules-18-09334-f004){ref-type="fig"}.
3. Discussion
=============
In our investigation, all clinical strains of *Escherichia coli* were found to be sensitive to basil (*Ocimum basilicum* L.) and rosemary (*Rosmarinus officinalis* L.) essential oils, irrespective of the clinical conditions they were obtained under or the pattern of antibiotic resistance they demonstrated, but basil oil was more active against the tested bacteria. Out of the sixty clinical strains of *E. coli*, twenty-two strains were extended-spectrum beta-lactamase positive (ESBL+). Concentrations of basil oil ranging from 8.25 µL/mL to 9.25 µL/mL were seen to inhibit the growth of eighteen *Escherichia coli* (ESBL+) strains. For the extended-spectrum beta-lactamase negative strains, seventeen out of the thirty-eight were sensitive to basil oil at concentrations between 11.25--11.50 µL/mL. The MIC values for the other twenty-one *Escherichia coli* (ESBL−) strains ranged from 8.0 µL/mL to 11.0 µL/mL.
The rosemary oil demonstrated significantly lower activity. No apparent differences in activity of the essential oil were found against extended-spectrum β-lactamase-positive and negative strains. Out of the twenty-two clinical strains of *E. coli* (ESBL+), rosemary oil concentrations ranging from 18.0 µL/mL to 19.0 µL/mL were effective for eighteen of them. Eleven of the *Escherichia coli* (ESBL−) strains out of the thirty-eight obtained under various conditions were inhibited by 19.75 µL/mL of rosemary oil. MIC values ranging from 18.25 µL/mL to 19.5 µL/mL for comparable numbers of strains was obtained.
The results of our tests clearly demonstrate that basil and rosemary essential oils can be widely used to eliminate clinical strains of *Escherichia coli* found in different clinical conditions. It is also significant that extended-spectrum β-lactamase (ESBL)− producing clinical strains of *E. coli* are sensitive to these oils. Studies Orhan at al \[[@B29-molecules-18-09334]\], confirm that, essential oils from *Foeniculum* sp., *Mentha* sp., *Ocimum* sp., *Origanum*sp. and *Satureja* sp. (*Lamiaceae* family) possess strong antibacterial activity against extended-spectrum beta-lactamase (ESBL) positive strains of *Klebsiella pneumoniae* isolated from food. The obtained MIC values ranged from 32 to 64 μg/ml for a number of strains resistant to trimetoprime-sulfametoxazole, sulbactam-ampicilin, clavulonate-amoxicilin, ceftriaxon, cefepime, imipenem, ceftazidime, tobramicine, gentamisine, ofloxacin, and ciprofloxacin. According our investigations, the *Escherichia coli* (ESBL+) responsible for human infectious diseases were significantly more resistant to the basil and rosemary essential oils.
The antimicrobial properties of essential oils are strictly connected with their chemical composition. The usefulness of essential oils as effective antimicrobial agents can be evaluated only by analysing their individual components. Therefore, a thorough GC-FID-MS analysis of the tested basil and rosemary essential oils was conducted. The composition of the essential oil obtained from *Ocimum basilicum* L., is as given in the ISO-11043 standard. The composition of the tested basil oil corresponded to required standards, according to which the content of estragole must be higher than 75.0%. The composition of the essential oil derived from *Rosmarinus officinalis* L. was found to meet the requirements of the European Pharmacopoeia 6 \[[@B30-molecules-18-09334]\] and of the Polish Pharmacopoeia VIII \[[@B31-molecules-18-09334]\] for the nine main components. The content of β-pinene amounted to 9.2% (required 4.0%--9.0%) and limonene to 1.0% (required 1.5%--4.0%). Verbenone was not found among the components of the tested rosemary oil, although EP 6 and the Polish Pharmacopoeia VIII specify its content to be a maximum of 0.4%. For the tested rosemary essential oil, nine of the thirteen main constituents of the oil met the requirements given in the ISO-1342 standard: α-pinene, camphene, myrcene, 1,8-cineole, *p*-cymene, camphor, bornyl acetate, α-terpineol and borneol.
The highest antibacterial activity is demonstrated by phenolic compounds such as carvacrol, thymol and eugenol. Another effective group of active compounds are alcohols: terpinen-4-ol, γ-terpineol, geraniol, cytronellol, menthol and linalol. Many of them are synthesized by plants from the *Lamiaceae* family \[[@B32-molecules-18-09334]\]. For instance, the essential oil of *Satureja hortensis* L. demonstrates high levels of activity. Mihajilov-Kristev *et al*. \[[@B33-molecules-18-09334]\], showed that essential oil containing mainly carvacrol (67.0%) and γ-terpinene (15.3%) is effective against Gram-negative strains, including *Escherichia coli*, with MIC values from 0.025 µL/mL to 0.78 µL/mL according to the broth microdilution method. In our study for basil and rosemary essential oils, we obtained significantly higher MIC values. This high activity demonstrated by *Satureja hortensis* L. essential oil is certainly related to the high content of carvacrol, which is one of the most potent antimicrobial compounds.
The literature reports that basil oil, which contains mainly estragole and linalool, also possesses antibacterial agents which are effective against a variety of Gram-positive and Gram-negative bacteria \[[@B34-molecules-18-09334]\]. According to Saković *et al*. \[[@B35-molecules-18-09334]\], *Ocimum basilicum* essential oil possesses antibacterial activity against the human pathogenic bacteria *Bacillus subtilis*, *Enterobacter cloacae*, *Escherichia coli* O157:H7, *Micrococcus flavus*, *Proteus mirabilis*, *Pseudomonas aeruginosa*, *Salmonella enteritidis*, S. *typhimurium*, *Staphylococcus epidermidis* and *S. aureus*. According to the authors, basil essential oil containing 69.3% linalool as a main component possesses antibacterial properties against *Escherichia coli* O157:H7 with MIC and MBC values of 6.0 µg/mL when assessed by microdilution. The multidrug clinical strains of *E. coli* tested in this study were more resistant to basil essential oil containing mainly estragole (86.4%).
Results obtained by Sartoratto *et al*. \[[@B36-molecules-18-09334]\], show that basil oil from *Ocimum basilicum* containing mainly linallol 32.6% and eugenol 28.1%, and oil from *Ocimum gratissimum* containing 93.9% eugenol, have a broad spectrum of antibacterial activity against reference strains of Gram-positive, Gram-negative bacteria and *Candida albicans*. According to the authors, essential oils obtained from these two genera of *Ocimum* were active against *Escherichia coli* CCT0547 standard strain with a MIC value of \>2 mg/mL according to the microplate method. These results also confirm that oils with active constituents such as eugenol tend to have high antibacterial properties. Our results are slightly higher than those obtained by Sartoratto *et al*. The MIC values were in the range from 7.92 mg/mL to 11.04 mg/mL for clinical strains of *Escherichia coli* which were both positive and negative for extended-spectrum beta-lactamase activity.
Nakamura *et al*. \[[@B37-molecules-18-09334]\], demonstrated that the essential oil from *Ocimum gratissimum,* with eugenol as its main constituent, possesses antibacterial activity against clinical strains of *Escherichia coli* ATCC 25922 with MIC---6 mg/mL. The MICs of this essential oil against a group of other Gram-negative bacteria comprising *Shigella flexneri*, *Salmonella enteritidis*, *Klebsiella* sp. and *Proteus mirabilis* were found to be from 0.3 to 12 mg/mL. The MIC values given in our study were slightly higher than those given by Nakamura *et al*. Pereira *et al*. \[[@B10-molecules-18-09334]\], in their investigations, showed that oil from *Ocimum gratissimum* possesses antibacterial activity against clinical *Escherichia coli* strains isolated from urinary tract infections. The essential oil was found to be active against about 70% of tested *E. coli* clinical isolates. The results of the present study demonstrate that a chemotype containing mainly 1,8-cineole, eugenol, methyleugenol, thymol, *p*-cimene, *cis*-ocimene and *cis*-caryophyllene has lower activity.
In our tests, basil oil obtained from *Ocimum basilicum,* containing mainly estragole (86.4%), inhibited the growth all strains isolated from various clinical materials. Among them were bacteria isolated from urine, which were also extended-spectrum beta-lactamase positive. Our studies confirm that antibacterial activity is possessed by not only basil oil chemotypes with linalool or eugenol as their main components, but also that of *Ocimum basilicum,* containing mainly estragole. Our research showed that basil essential oil was significantly more effective against all clinical isolates than rosemary essential oil. Similar results were obtained by Hammer *et al* \[[@B38-molecules-18-09334]\], who studied the antimicrobial activity of basil and rosemary essential oils against *Acinetobacter baumanii*, *Aeromonas veronii* biogroup *sobria*, *Candida albicans*, *Enterococcus faecalis*, *Escherichia coli*, *Klebsiella pneumoniae*, *Pseudomonas aeruginosa*, *Salmonella enterica* subsp. *enterica* serotype *typhimurium*, *Serratia marcescens* and *Staphylococcus aureus*, using an agar dilution method. The authors confirmed that basil (*Ocimum basilicum*) oil is more active against *Escherichia coli* than rosemary (*Rosmarinus officinalis*). The MIC values were 0.5 and 1.0% (*v*/*v*), respectively.
According to Lopez *et al*. \[[@B39-molecules-18-09334]\], the oils from *Ocimum basilicum* and *Rosmarinus officinalis* have an antibacterial potential against the Gram-positive bacteria *Staphylococcus aureus*, *Enterococcus faecalis* and *Listeria monocytogenes* and against Gram-negative bacteria *Escherichia coli*, *Yersinia enterocolitica*, *Salmonella choleraesuis* and *Pseudomonas aeruginosa* as foodborne bacterial strains. The authors present a detailed analysis of the tested oils and their ability to inhibit the growth of bacteria. Their basil and rosemary essential oils were of a similar composition to the essential oils in our investigations. The main component of the basil essential oil was estragole---82% ± 1.2%, while the rosemary essential oil contains 1.8-cineole---48% ± 9.1%, camphor---17% ± 4.0, β-pinene---4.8% ± 0.9% and β-caryophyllene---6.8% ± 3.7%. The authors confirm that the basil oil is more effective at inhibiting the growth of *Escherichia coli* strains.
Probuseenivasan *et al* \[[@B27-molecules-18-09334]\], confirmed that rosemary essential oil strongly inhibits *Escherichia coli* ATCC 25922. Although the basil oil was also seen to demonstrate low activity against the tested bacteria, no data was given about the constituents of the essential oils. The minimal inhibitory concentration for rosemary oil against *E. coli* was \>6.4 mg/mL. The MIC values obtained by the present study were higher and ranged from 16.02 mg/mL to 17.35 mg/mL against *E. coli* clinical strains. Fabio *et al* \[[@B40-molecules-18-09334]\], report that rosemary oil has an antibacterial effect on a number of microorganisms responsible for respiratory infections, isolated from clinical specimens, among which were antibiotic-sensitive and antibiotic-resistant strains such as *Streptococcus pyogenes*, *S. agalactiae*, *S. pneumoniae* and *Klebsiella pneumoniae*, *Staphylococcus aureus* and *Stenotrophomonas maltophilia*. In our tests, rosemary oil was also found to demonstrate antibacterial activity against *Escherichia coli* strains with different patterns of resistance, including extended-spectrum β-lactamase positive strains isolated from various clinical materials. The rosemary essential oil used in the present study obtained from *Rosmarinus officinalis* contains mainly 1,8-cineole (46.4%), camphor (11.4%) and α-pinene (11.0%). The composition of the rosemary essential oil used by Jiang *et al.* \[[@B41-molecules-18-09334]\], was similar to that used by us: mainly 1,8-cineole (26.54%) and α-pinene (20.14%). The authors show that the tested oil possesses antibacterial activity against Gram-positive bacteria (*Staphylococcus epidermidis*, *Staphylococcus aureus* and *Bacillus subtilis*), Gram-negative bacteria (*Proteus vulgaris*, *Pseudomonas aeruginosa* and *Escherichia coli*) and fungi (*Candida albicans* and *Aspergillus niger*). Bendeddouche *et al* \[[@B42-molecules-18-09334]\], showed that of essential oil from *Rosmarinus tournefortii* De Noé growing wild in the occidental region of Algeria possesses antimicrobial activity also against Gram-negative (*Escherichia coli* and *Pseudomonas aeruginosa*) and Gram-positive (*Staphylococcus aureus*) pathogenic bacteria. The main constituents of the tested essential oil were camphor (37.6%), 1,8-cineole (10.0%), *p*-cymene-7-ol (7.8%) and borneol (5.4%).
A number of studies show that essential oils and their constituents possess useful properties concerning human health. Many of them may be applied in anticancer therapy, cardiovascular and nervous system disorders to reduce the level of cholesterol, to regulate the glucose level or to stimulate hormone production \[[@B43-molecules-18-09334]\]. They also might have great value in preventing and treating infectious diseases. Essential oils not only have bactericidal activity but also can inhibit multidrug bacterial strain formation. Their multiple antibacterial, antifungal, antiviral and also anti-inflammatory and antioxidant effects, have made them valuable agents in human treatment and for the prevention of pathological changes. In addition, essential oils have a number of beneficial properties as natural preservatives in cosmetics, toiletries, drugs and food products \[[@B44-molecules-18-09334],[@B45-molecules-18-09334],[@B46-molecules-18-09334]\]. Considering the huge increase in the number of multidrug resistant bacterial strains in health care facilities, essential oils may prove to be effective natural antimicrobial agents.
4. Experimental
===============
4.1. Bacterial Strains
----------------------
The standard strain, *E. coli* ATCC 25922, was obtained from the collection of the Medical and Sanitary Microbiology Department, Medical University of Lodz. The clinical strains of *Escherichia coli* were collected in 2011 and 2012 from a range of clinical materials recovered from patients and from the hospital equipment in various wards from one of the Medical University hospitals in Lodz: internal medicine, surgery, urology and the intensive care unit. The tested bacterial strains were isolated from the abdominal cavity (n = 10), bronchia (n = 10), wounds (n = 10), blood (n = 10), urine (n = 10) and from catheters (n = 10).
4.2. Bacterial Strain Identification
------------------------------------
*E. coli* strains were cultured on Columbia Agar (bioMerieux, Craponne, France) and on Mac Conkey Agar (bioMerieux). They were identified to the species by using API 20 E tests (bioMerieux). The bacteria were incubated at 37 °C for 24 h.
4.3. Essential Oil Analysis
---------------------------
Commercial essential oils from basil---*Ocimum basilicum* L. and rosemary---*Rosmarinus officinalis* L. were purchased from the manufacturer (POLLENA-AROMA, Warsaw, Poland) and analyzed by GC-FID-MS in the Institute of General Food Chemistry, Lodz University of Technology, using a Trace GC Ultra apparatus (Thermo Fisher Scientific Inc., Waltham, MA, USA) MS DSQ II detectors and FID-MS splitter (SGE). Operating conditions: apolar capillary column Rtx-1ms (Restek Corporation, Bellefonte, PA, USA), 60 m × 0.25 mm i.d., film thickness 0.25 µm; temperature program, 50--300 °C at 4 °C/min; SSL injector temperature 280 °C; FID temperature 300 °C; split ratio 1:20; carrier gas helium at regular pressure 200 kPa.; FID temperature 260 °C; carrier gas, helium; 0.5 mL/min; split ratio 1:20. Mass spectra were acquired over the mass range 30--400 Da, ionization voltage 70 eV; ion source temperature 200 °C. The analysis of the constituents of the oils were performed two times independently.
Identification of components was based on the comparison of their MS spectra with those of the laboratory-made MS library, commercial libraries (NIST 98.1, Wiley Registry of Mass Spectral Data, 8th Ed. and MassFinder 3.1) and with literature data \[[@B47-molecules-18-09334],[@B48-molecules-18-09334]\] along with the retention indices on the apolar column (Rtx-1, MassFinder 3.1) associated with a series of alkanes with linear interpolation (C~8~-C~26~). A quantitative analysis, expressed as percentages of each component, was carried out by peak area normalization measurements without correction factors.
4.4. Antibacterial Tests
------------------------
The standard and clinical strains were cultivated in Columbia Agar medium and incubated at 37 °C for 48 h in aerobic conditions. The microbial suspension was standardized to a cell density of 1--2∙× 10^8^ cells/mL, equal to an optical density of 0.5 on the Mc Farland scale, by a bioMerieux densitometer. The agar dilution method was employed for the screening of antimicrobial activities of the essential oils \[[@B32-molecules-18-09334],[@B38-molecules-18-09334],[@B49-molecules-18-09334],[@B50-molecules-18-09334],[@B51-molecules-18-09334]\]. The tested essential oils were diluted in 96% ethanol PURE (POCH, Gliwice, Poland) yielding a concentration of 97% *v*/*v* of oils. Although the tested essential oils dissolve well in ethanol, only minimum amounts were used, as it can inhibit the growth of the tested bacteria. This solution was mixed with a culture medium to obtain concentrations from 7.25 µL/mL to 11.75 µL/mL for basil oil and 17.75 µL/mL to 20.25 µL/mL for rosemary oil and poured into sterile Petri dishes. An inoculum containing 1--2 × 10^8^ cells/mL (0.1 mL) per spot was seeded upon the surface of the agar with various oil concentrations, as well as on agar with no oil added (acting as a control for strain growth). The Minimal Inhibitory Concentration, MIC, was determined after 24 h of incubation at 37 °C under aerobic conditions. The MIC was considered the lowest concentration of the sample at which no visible growth was observed. The analysis of the antibacterial activity of the oil was performed three times independently. Control media containing only alcohol at concentrations used in the dilutions of tested essential oils did not inhibit the growth of bacterial strains.
4.5. Susceptibility Testing
---------------------------
The following antibiotics (*Becton Dickinson*) were used for susceptibility testing of *Escherichia coli* strains (R---resistance; I---intermediate susceptibility; S---susceptibility): AM---ampicillin (10 µg) (R ≤ 13, 14 ≤ I ≤ 16, S ≥ 17), AMC---amoxicillin/clavulanic acid (20 µg/10 µg) (R ≤ 13, 14 ≤ I ≤ 17, S ≥ 18), CF---cefalotin (30 µg) (R ≤ 14, 15 ≤ I ≤ 17, S ≥ 18), CZ---cefazoline (30 µg) (R ≤ 14, 15 ≤ I ≤ 17, S ≥ 18), CXM---cefuroxime (30µg) (R ≤ 14, 15 ≤ I ≤ 17, S ≥ 18), GM---gentamicin (10 µg) (R ≤ 12, 13 ≤ I ≤ 14, S ≥ 15), TE---tetracycline (30 µg) (R ≤ 14, 15 ≤ I ≤ 18, S ≥ 19), NOR---norfloxacin (10 µg) (R ≤ 12, 13 ≤ I ≤ 16, S ≥ 17) (only for the isolates from urine), FTN---nitrofurantoin (300 µg) (R ≤ 14, 15 ≤ I ≤ 16, S ≥ 17) (as above), FOS---fosfomycin (200 µg) (R ≤ 12, 13 ≤ I ≤ 15, S ≥ 16) (as above), STX---trimethoprim/sulfamethoxazole (1.25 µg/23.75 µg) (R ≤ 10, 11 ≤ I ≤ 15, S ≥ 16), PIP---piperacillin (100 µg) (R ≤ 17, 18 ≤ I ≤ 20, S ≥ 21), TIC---tikarcillin (75 µg) (R ≤ 14, 15 ≤ I ≤ 19, S ≥ 20), TZP---piperacyllin/tazobaktam (100/10 µg) (R ≤ 17, 18 ≤ I ≤ 20, S ≥ 21), TIM---ticarcillin/clavulanic acid (75 µg/10 µg) (R \< 16, S \> 16), FOX---cefoxitin (30 µg) (R ≤ 14, 15 ≤ I ≤ 17, S ≥ 18), CTX---cefotaxim (30 µg) (R ≤ 14, 15 ≤ I ≤ 22, S ≥ 23), CAZ---ceftazidime (30 µg) (R ≤ 14, 15 ≤ I ≤ 17, S ≥ 18), FEP---cefepim (30 µg) (R ≤ 14, 15 ≤ I ≤ 17, S ≥ 18), ATM---aztreonam (30 µg) (R ≤ 15, 16 ≤ I ≤ 21, S ≥ 22), IMP---imipenem (10 µg) (R ≤ 13, 14 ≤ I ≤ 15, S ≥ 16), MEM---meropenem (10 µg) (R ≤ 13, 14 ≤ I ≤ 15, S ≥ 16), ETP---ertapenem 10 µg) (R ≤ 15, 16 ≤ I ≤ 18, S ≥ 19), DOR---doripenem (10 µg) (R ≤ 19, 20 ≤ I ≤ 23, S ≥ 24), CIP---ciprofloxacin (5 µg) (R ≤ 15, 16 ≤ I ≤ 20, S ≥ 21), AN---amikacin (30 µg) (R ≤ 14, 15 ≤ I ≤ 16, S ≥ 17), NET---netilmicin (30 µg) (R ≤ 12, 13 ≤ I ≤ 14, S ≥ 15), TOB---tobramycin (10 µg) (R ≤ 12, 13 ≤ I ≤ 14, S ≥ 15), C---chloramphenicol (30 µg) (R ≤ 12, 13 ≤ I ≤ 17, S ≥ 18), TGC---tigecyclin (15 µg) (R ≤ 14, 15 ≤ I ≤ 18, S ≥ 19).
Susceptibility testing was carried out using the disc-diffusion method, on Mueller-Hinton II Agar (bioMerieux). Cultures were incubated at 37 °C for 16--18 h. The results were interpreted according to EUCAST guidelines \[[@B52-molecules-18-09334]\].
The double-disk synergy test and combination disk method were used to determine ESBL production. The sensitivity of the DDST can be improved by reducing the distance between the disks of cephalosporins and clavulanate. The disk approximation method was performed on a Muller-Hinton agar plate inoculated with the clinical bacterial strain, by placing disks containing CAZ---ceftazidime (30 µg), CTX---cefotaxime (30 µg) and ATM---aztreonam (30 µg) 20 mm (edge to edge) from a disk of AMC---amoxicillin/clavulanic acid (20/10 µg). Following incubation for 16--18 h at 37 °C, any enhancement of the zone of inhibition between a cephalosporin and monobactam-aztreonam disk from the amoxicillin/clavulanic acid disk, was indicative of the presence of an ESBL. *E. coli* ATCC 25922 was used as a positive control \[[@B11-molecules-18-09334],[@B53-molecules-18-09334]\].
5. Conclusions
==============
1. The results of these experiments indicate the potential use of basil and rosemary essential oils against resistant *Escherichia coli* clinical strains, and also against extended-spectrum β-lactamase positive bacteria.
2. The tested basil oil was more active against all *Escherichia coli* clinical strains.
3. The action of essential oils against bacteria exhibiting different mechanisms ofresistance may beuseful, not only in treating but alsopreventingthe spreadof resistantstrains.
The authors wish to thank Danuta Kalemba from the Institute of General Food Chemistry, Lodz University of Technology for essential oil analysis. The research reported in this manuscript was supported by grant no 503/5-020-03/503-01 and has not been submitted elsewhere.
*Sample Availability*: Samples of the basil and rosemary essential oils (POLLENA-AROMA Poland) are available from the authors.
The authors declare no conflict of interest.
|
Q:
Matplotlib Mollweide/Hammer projection: region of interest only
I was wondering if there's a way to only show the region of interest from a plot based on Mollweide/Hammer projection in basemap (matplotlib).
I am trying to set the plot-bounds roughly to the Pacific plate, as in the link below. However, the set_xlim and set_ylim functions do not seem to have any effect. Thanks in advance for any guidance.
http://geology.gsapubs.org/content/29/8/695/F1.large.jpg
A:
From the documentation, both Hammer and Mollweide projections don't allow this as they print out entire world maps. Here's some code using Polyconic projection, but it is bounded by straight lines. The trick here is to define the corner longitude and latitudes on creation.
from mpl_toolkits.basemap import Basemap
import matplotlib.pyplot as plt
import numpy as np
my_map = Basemap(projection='poly', lat_0=0, lon_0=-160,
resolution = 'h', area_thresh = 0.1,
llcrnrlon=140, llcrnrlat=-60,
urcrnrlon=-100, urcrnrlat=60)
plt.figure(figsize=(16,12))
my_map.drawcoastlines()
my_map.drawcountries()
my_map.fillcontinents(color='coral', lake_color='aqua')
my_map.drawmapboundary(fill_color='aqua')
my_map.drawmeridians(np.arange(0, 360, 20))
my_map.drawparallels(np.arange(-90, 90, 10))
plt.show()
Result:
Note that this effectively shows less area than the one in the picture you provided.
|
@REM This batch file has been generated by the IAR Embedded Workbench
@REM C-SPY Debugger, as an aid to preparing a command line for running
@REM the cspybat command line utility using the appropriate settings.
@REM
@REM Note that this file is generated every time a new debug session
@REM is initialized, so you may want to move or rename the file before
@REM making changes.
@REM
@REM You can launch cspybat by typing the name of this batch file followed
@REM by the name of the debug file (usually an ELF/DWARF or UBROF file).
@REM
@REM Read about available command line parameters in the C-SPY Debugging
@REM Guide. Hints about additional command line parameters that may be
@REM useful in specific cases:
@REM --download_only Downloads a code image without starting a debug
@REM session afterwards.
@REM --silent Omits the sign-on message.
@REM --timeout Limits the maximum allowed execution time.
@REM
"C:\devtools\IAR Systems\Embedded Workbench 6.5\common\bin\cspybat" "C:\devtools\IAR Systems\Embedded Workbench 6.5\arm\bin\armproc.dll" "C:\devtools\IAR Systems\Embedded Workbench 6.5\arm\bin\armjlink.dll" %1 --plugin "C:\devtools\IAR Systems\Embedded Workbench 6.5\arm\bin\armbat.dll" --macro "C:\devtools\IAR Systems\Embedded Workbench 6.5\arm\config\debugger\Infineon\Trace_XMC4500.dmac" --flash_loader "C:\devtools\IAR Systems\Embedded Workbench 6.5\arm\config\flashloader\Infineon\FlashXMC4500.board" --backend -B "--endian=little" "--cpu=Cortex-M4F" "--fpu=VFPv4" "-p" "C:\devtools\IAR Systems\Embedded Workbench 6.5\arm\CONFIG\debugger\Infineon\xmc4500.ddf" "--drv_verify_download" "--semihosting" "--device=xmc4500" "--drv_communication=USB0" "--jlink_speed=auto" "--jlink_initial_speed=32" "--jlink_reset_strategy=0,0" "--jlink_interface=SWD" "--drv_catch_exceptions=0x000" "--jlink_script_file=C:\devtools\IAR Systems\Embedded Workbench 6.5\arm\config\debugger\Infineon\XMC4500.jlinkscript" "--drv_swo_clock_setup=72000000,0,2000000"
|
Rights and reality: monitoring the public's right to participate.
Exercising the right to a sustainable and healthy environment requires the ability to participate in government and business decisions that affect the environment. A global coalition of public interest groups and research organizations measured the public's ability to participate in such decisions in nine countries representing a range of income levels and development paths. The investigation assessed the three elements of public participation as defined at the Rio Earth Summit in 1992: access to information, access to the decision-making process, and access to redress. The results show that, despite considerable progress in these areas, serious gaps remain in the public's ability to participate in important environmental decisions. These gaps occur in both developed and developing nations, and reflect limited articulation of participation rights in national law and institutional practice. The results also suggest that the public is often unfamiliar with and unaccustomed to exercising the rights they already have. |
Allen Curnow
Thomas Allen Munro Curnow (17 June 1911 – 23 September 2001) was a New Zealand poet and journalist.
Life
Curnow was born in Timaru, New Zealand, the son of a fourth generation New Zealander, an Anglican clergyman, and he grew up in a religious family. The family was of Cornish origin. During his early childhood they often moved, living in Canterbury, Belfast, Malvern, Lyttelton and New Brighton. He was educated at Christchurch Boys' High School, Canterbury University, and Auckland University.
After completing his education, Curnow worked from 1929 to 1930 at the Christchurch Sun, before moving once again to Auckland to prepare for the Anglican ministry at St John's Theological College (1931–1933). In this period Curnow also published his first poems in University periodicals, such as Kiwi and Phoenix.
In 1934 Curnow returned to the South Island, where he started a correspondence with Iris Wilkinson and Alan Mulgan, as well as finding a job at The Press, the Christchurch morning daily newspaper, having decided against a career in the Anglican ministry. At the same time, he also started a lifelong friendship with Denis Glover and contributed to the Caxton Press, submitting some of his poems. He then taught English at Auckland University from 1950 to 1976.
Personal life
Curnow's first marriage, to Elizabeth "Betty" Le Cren, was dissolved in 1965; they had a daughter and two sons, one of whom is New Zealand poet and art critic Wystan Curnow. His second marriage was to Jennifer Tole.
Career
Curnow wrote a long-running weekly satirical poetry column under the pen-name of Whim Wham for The Press from 1937, and then the New Zealand Herald from 1951, finishing in 1988 - a far-reaching period in which he turned his keen wit to many world issues, from Franco, Hitler, Vietnam, Apartheid, and the White Australia policy, to the internal politics of Walter Nash and the eras of Rob Muldoon and David Lange, all interspersed with humorous commentary on New Zealand's obsession with rugby and other light-hearted subjects.
Curnow's publication Book of New Zealand Verse (1945) is seen as a landmark in New Zealand literature. He is, however, more celebrated as poet than as a satirist. His poetic works are heavily influenced by his training for the Anglican ministry, and subsequent rejection of that calling, with Christian imagery, myth and symbolism being included frequently, particularly in his early works (such as 'Valley of Decision'). He draws consistently on his experiences in childhood to shape a number of his poems, reflecting perhaps a childlike engagement with the environment in which he grew up, these poems bringing the hopeful, curious, questioning voice that a childlike view entails. Curnow's work of course is not all so innocently reflective. The satirist in Curnow is certainly not pushed aside in his poetic works, but is explored instead with a greater degree of emotional connectivity and self-reflection.
Curnow's works concerning the New Zealand landscape and the sense of isolation experienced by one who lives in an island colony are perhaps his most moving and most deeply pertinent works regarding the New Zealand condition. His landscape/isolation centered poetry reflects varying degrees of engaged fear, guilt, accusation, rage and possessiveness, creating an important but, both previously and still, much neglected dialog with the New Zealand landscape. He positions himself as an outside critic (he was far less religiously and politically involved than contemporaries like James K. Baxter, and far more conventional in his lifestyle also) and though perhaps less impassioned in his writing than his contemporaries, his poetic works are both prophetic and intelligent.
Awards
In the Queen's Birthday Honours 1986 Curnow was appointed Commander of The Order of the British Empire (CBE) for services to literature.
Queen's Gold Medal for Poetry, 1989
On 6 February 1990, Curnow was the fourteenth appointee to The Order of New Zealand.
New Zealand 1990 Commemoration Medal
New Zealand Book Award for Poetry; 1958, 1963, 1975, 1980, 1983, 1987, 2001
Commonwealth Poetry Prize 1988 (for Continuum)
Cholmondeley Award, 1992 (other winners that year: Donald Davie, Carol Ann Duffy, and Roger Woddis)
A W Reed Lifetime Achievement Award, 2000
Bibliography
1933: Valley of Decision : Poems. Auckland : Auckland University College Students' Association Press
1933: Another Argo: three poems from the Caxton Club Press (including "Doom at sunrise"), Christchurch: Caxton Club Press
1935: Three poems: Aspect of Monism, Restraint, The Wilderness, Christchurch: Caxton Club Press
1935: Poetry and Language, Christchurch: Caxton Club Press
1937: Enemies : Poems 1934-36, Christchurch: Caxton Press,1937
1939: Not in Narrow Seas : Poems with Prose, Christchurch: Caxton Press
1940: Present for Hitler and Other Verses, Christchurch: Caxton Press
1941: Recent Poems. By Allen Curnow, A. R. D. Fairburn, Denis Glover, R. A. K. Mason, Christchurch: Caxton Press
1941: Island and Time, Christchurch: Caxton Press
1942: Landfall in Unknown Seas, poem with music by Douglas Lilburn
1942: Whim-Wham. Verses, 1941-42, Christchurch: Caxton Press
1943: Whim-Wham. Verses, 1943, Wellington: Progressive Publishing Society
Circa 1946 (year uncertain): Sailing or Drowning: Poems, Wellington: Progressive Publishing Society
1946: Jack Without Magic: Poems, Christchurch: Caxton Press
1949: At Dead Low Water, and Sonnets, Christchurch: Caxton Press
1949: The Axe: a Verse Tragedy, Christchurch: Caxton Press, 1949 [i.e. 1950]
1957: Poems 1949-57, Wellington: Mermaid Press
Circa 1957 (year uncertain): The Hucksters and the University : or, Out of Site, Out of Mind; or Up Queen Street Without a Paddle. A happy little poem for all the family ... read by the author at a public poetry reading in the Auckland City Art Gallery on 24 May 1957, Auckland: Pilgrim Press (broadsheet)
1957: Mr Huckster of 1958 : another and still happier little poem..., Auckland: Pilgrim Press (broadsheet)
1958: Bright Sky, verse play, unpublished, cyclostyled copy held in University of Auckland Library, NZ Glass Case
1959: Best of Whim-Wham, Hamilton: Paul's Book Arcade
1959: Moon Section, unpublished play, performed 1959
1960: On the Tour : Verwoerd Be Our Vaatchwoerd..., Auckland: Pilgrim Press (broadsheet)
1961: The Overseas Expert, unpublished playscript in University of Auckland Library, New Zealand Glass Case
1962: A Small Room With Large Windows, London: Oxford University Press
1967: Whim Wham Land, Auckland: B. & J. Paul
1972: Four Plays, Wellington: A.W. and A.H. Reed, (Contains: The Axe, The Overseas Expert, The Duke's Miracle, Resident of Nowhere)
1972: Trees, Effigies, Moving Objects: a Sequence, Wellington: Catspaw Press
1973: An Abominable Temper, and Other Poems, Wellington: Catspaw Press
1974: Collected Poems 1933-1973, Wellington: A.W. and A.H. Reed
1979: An Incorrigible Music, Dunedin: Auckland University Press
1982: Editor, Allen Curnow Selected Poems, Auckland: Penguin
1982: You Will Know When You Get There: Poems 1979, Auckland: Auckland University Press
1986: The Loop in Lone Kauri Road, Auckland: Auckland University Press
1987: Look Back Harder: Critical Writings 1935-1984, edited with an introduction by Peter Simpson, Auckland: Auckland University Press
1988: Continuum: New and Later Poems 1972-1988, Auckland: Auckland University Press
1990: Selected Poems 1940-1989, London: Viking
1994: Looking West, Late Afternoon, Low Water, Limited edition, designed and made by Alan Loney in collaboration with Elizabeth Serjeant,Auckland: Holloway Press
Penguin Modern Poets 7, second series (1996) with Donald Davie and Samuel Menashe
1996: The Scrap-book; limited edition published in conjunction with Writers' and Readers' Week, 12-17 Mar 1996, Wellington: Wai-te-ata Press
1997: Early Days Yet : New and Collected Poems 1941-1997, Auckland: Auckland University Press
2001: The Bells of Saint Babel's: poems 1997-2001, Auckland: Auckland University Press
2005: Whim Wham's New Zealand: The Best of Whim Wham 1937-1988, edited by Terry Sturm
Edited
1945: Book of New Zealand Verse 1923-45, Christchurch: Caxton Press
1951: Book of New Zealand Verse 1923-50, Christchurch: Caxton Press
1960: Penguin Book of New Zealand Verse, Harmondsworth: Penguin Books
Documentary
Curnow was the subject of the 2001 documentary Early Days Yet, directed by Shirley Horrocks. Filmed in the final months of Curnow's life, it records him talking about his life and work, and visiting the setting of some of his important poems.
References
External links
from the Dictionary of New Zealand Biography
Poems by Allen Curnow
Category:1911 births
Category:2001 deaths
Category:New Zealand male poets
Category:People from Timaru
Category:People educated at Christchurch Boys' High School
Category:New Zealand people of Cornish descent
Category:20th-century New Zealand poets
Category:20th-century New Zealand male writers
Category:Members of the Order of New Zealand
Category:New Zealand Commanders of the Order of the British Empire |
Powered by American Cannabis Nurses Association
Powered by American Cannabis Nurses Association
Social links
Search the ACNA Blog
Search for:
ACNA Online Core Curriculum
The ACNA online core curriculum for cannabis nurses is now available. The curriculum was developed in collaboration with The Medical Cannabis Institute (TMCI) and includes the latest medical cannabis research, usage and clinical applications delivered by subject matter experts.
To register, click here.
California Legislature: ‘We’re Regulating Medical Marijuana’
On Thursday, August 27, 2015, the California Senate Appropriations Committee advanced historic medical cannabis regulations with a last-minute twist: nothing was in the bill. Assembly Bill 266 was gutted and amended to read: “It is the intention of the state legislature to regulate medical marijuana.” |
This article introduces the first English translation of one of Tanabe’s early essays on metaphysics. It questions the relation of the universal to the particular in context of logic, phenomenology, Neo-Kantian epistemology, and classical metaphysics. Tanabe provides his reflections on the nature of the concept of universality and its constitutive relation to phenomenal particulars through critical analyses of the issue as it is discussed across various schools of philosophy including: British Empiricism, the Marburg School, the Austrian School, the Kyoto School, (...) and Platonism. In this essay, Tanabe reveals his ability to think metaphysically the ground for the possibility of reasoning and dares to voice his own thought beyond references to the most prominent thinkers of his time from distinct intellectual traditions in both the east and the west. This essay, therefore, demonstrates that his strong tendency to move beyond the received epistemology and phenomenology of the European intellectual tradition to metaphysics was already present in the early days of his academic life and thereby marks a more general contribution of the Kyoto School of Philosophy to distinct European schools of thought in the early twentieth century. (shrink)
This paper presents the first English translation of one of Tanabe’s early essays on Kant. Tanabe marks the occasion of the first translation of the Critique of Practical Reason into Japanese by providing his reflections on Kant’s theory of freedom in this essay. This creative essay by Tanabe represents the hallmark Kyoto School interpretation of Kant. Tanabe weaves his account of Kant with elements from other philosophers in an attempt to think systematically about the nature of freedom. He agrees with (...) Kant that morality itself “rises and falls” with the idea of freedom; however, Tanabe also tries to rescue some of the pitfalls he sees in Kant’s theory by reconstructing Kant’s account. In this brief, but rich essay, Tanabe unfolds one of the more creative aspects of his philosophy through Kant. (shrink)
In 1919, Nishida Kitarō delivered a speech at Ōtani University discussing the relationship between Nicolaus of Cusa’s coincidentia oppositorum and love. The address, given within weeks of a disabling injury suffered by Nishida’s wife, Kotomi, gives evidence of how severe personal crisis would come to influence his philosophical work, and highlights several themes that would dominate the writings of the last twenty-five years of his life.
When the brother of the poet Anne Carson died she wrote an elegy for him “in the form of an epitaph.” Her 2010 work Nox is a beguiling and beautiful work, as difficult to characterize as the brother it seeks to commemorate. This article explores the sensory experience of reading Nox, a text, which appeals to an elusive awareness at the edge of memory and imagination. In describing her brother, Carson evokes “a certain fundamental opacity of human being, which likes (...) to show the truth by allowing it to be seen hiding.” The aim of this paper is to show how this opacity emerges in the encounter with this captivating work, to pursue what it means to let “night” appear. (shrink)
Oksala’s book is the latest in a series of attempts to examine Foucault’s work during the late 1970s. We can delineate two clear trends in recent Foucault scholarship on this period: the first trend provides analyses and evaluations of this period while asecond trend attempts to apply Foucault’s analyses of these key concepts to contemporary society. Oksala’s book attempts to do both, although if forced to choose one would have to place it more firmly in the first camp than the (...) second. Accordingly, the first section of this review essay situates Oksala’s book within this recent context. I discuss her analysis and reconstruction of Foucault’s late 1970s work before turning in the final section to the various ways that she applies this analysis to current legal and political debates. (shrink)
Nathan Widder’s Political Theory After Deleuze presents Deleuze’s political work in the context both of Deleuze’s ontology and a broader “ontological turn” in political theory. Contrasting Deleuze with both the “politics of lack” espoused by post-Hegelian and post-psychoanalytical theory, as well as with the “politics of abundance” proffered by pluralists such as William B. Connolly, Widder provides a subtle articulation of the contours and ultimate stakes of Deleuzian micropolitics. The book provides a powerful introduction both to Deleuze’s broader systematic work (...) and to the specifically political dimensions of that perspective. (shrink)
Which stance does philosophical thinking, namely practical philosophy, take in the face of the ever-growing challenge by science and technology? The central aim of this essay is to evaluate whether there are unexhausted resources that can be used to incorporate and cope with science and technology in the framework of a global experience of meaningfulness. The essay proceeds through an analysis of the state of present thinking under the conditions of technology and leads to a discussion about the possibilities for (...) knowledge of “practical” action in modernity. In order to account for the particularities of practical action in contrast to homogenous scientific methods and the scientific ideal, the concept of a “practical” knowledge as introduced by hermeneutics with reference to basic intuitions of Aristotelian practical philosophy will be developed. (shrink)
In this essay, I introduce Ikkyū Sōjun’s amoralism under the heading of negative ethics. I do so in the light of contemporary accounts of what some have called “Zen ethics.” Pushing away from such readings, the essay raises the issue of authority in Zen, whether it is construed as the authority of the dharma, the sangha, or the Buddha. Turning to the poetry of Ikkyū, I demonstrate that any such construing misses themark. As an alternative, I offer a reading of (...) Ikkyū that takes meta-ethics as its starting point. I read Ikkyū’s amoralism as a particular form of negative ethics. This point is drawn out further with an examination of the reversibility of seeming opposites. (shrink)
This essay conducts a reading of Jean-Luc Nancy’s and Jacques Rancière’s respective theorizations of the image. Using Nancy’s notion of literary communism, I first show how he and Rancière conceive the image as a site of community’s open writing and contestation. My reading then demonstrates how this “communism of the image” exposes Rancière’s repetition of an ontological gesture that he has attempted to dismiss as Heideggerian.
In response to Hegel’s thesis concerning the “end of art,” John Sallis suggests that the future or the “promise of art” may be opened in thinking through Heidegger’s essay “The Origin of the Work of Art.” Sallis proposes that this promise of art may lie in the capacity to “set forth various elements through transfigurement into shining.” In this paper I reflect on what this suggestion concerning the promise of art may mean. Furthermore, I propose that “The Origin of the (...) Work of Art” shows a resonance with Nietzsche’s Birth of Tragedy that Heidegger’s reading of Nietzsche obscures, and that this resonance is suggested in Sallis’ earlier work on Nietzsche’s book. I suggest that the Gestalt configuration of “world” and “earth” in Heidegger’s essay echoes the configuration of the Apollonian and Dionysian in Nietzsche’s thought. I further suggest in the conclusion that this resonance enables one to draw the connection between “The Origin of the Work of Art” and Heidegger’s later work in which the promise of art opens up a different mode of dwelling upon the earth. (shrink)
The Early Heidegger’s Philosophy of Life: Facticity, Being and Language offers an interpretation of Heidegger’s concept of facticity as it is articulated in connection with the ideas of life and language in the lecture courses from 1919225. The book argues that facticity is both the source of vitality for theory and a source of deception and falsehood and therefore cannot be viewed in either positive or negative terms exclusively, but must instead be viewed as ambiguous. This essay argues that this (...) basic thesis is correct and is supported by drawing a distinction between everydayness and inauthenticity. It is also argued that the analysis of language the book offers can be useful in clearing up misunderstandings of Heidegger’s concept of discourse in Being and Time. (shrink)
In Eichmann in Jerusalem: A Report on the Banality of Evil, Hannah Arendt aims to secure a more adequate understanding of the new crime of genocide so that it can be prosecuted in a manner that better serves justice. She criticizes the Nuremberg Trials and, to a lesser extent, the Jerusalem trial of Nazi war criminal Adolf Eichmann for miscasting this unprecedented crime in terms of familiar concepts and thereby obscuring it. Arendt claims that this atrocity, instead, demanded original thinking (...) that emanated from a closer grappling with these new experiences. I argue that her criticism reflects Heideggerian phenomenology. This approach questions absolute concepts from a position more consciously planted in the world, which Heidegger considers the source of original thinking. However, Arendt extends this approach to the domain of ethics and law and confronts genocide instead of aligning with those who perpetrated it. (shrink)
This article explores the philosophies of Heidegger and Wittgenstein to illustrate the thesis that philosophy is a human activity exhibiting a unity of investigative and therapeutic aims. For both philosophers, the purpose of philosophical concepts is to point toward a path of transformation rather than to explain. For both, a first step on this path is the recognition of constraining illusions, whether conventional or metaphysical. For both, such illusions are sedimented in linguistic practices, and for both, philosophical investigation is a (...) way of emancipating thought and life from illusion by bringing what is already prereflectively understood into the light of thematic explicitness. And what both philosophers bring into thematic explicitness are aspects of the context-embeddedness and finitude of human existence. It is hoped that comparing the works of these two philosophers will unveil features of each that are more difficult to discern in the works of either considered in isolation. (shrink)
In this essay, I examine Diagne’s claim that the fundamental intuition of Léopold Sédar Senghor’s thought is this: African art is philosophy. Diagne argues that it is from an experience of African art and an encounter with Bergson’s philosophy that Senghor comes to formulate his philosophical thought, which is better understood as vitalist rather than essentialist. I conclude by arguing that Senghor’s vitalism is a philosophy of becoming which nevertheless lacks an account of radical political change.
This paper approaches the experience of wonder phenomenologically. The account is descriptive. I suggest that in addition to the familiar treatments of wonder as constituted through a break with everyday involvement, on the one hand, and an awareness of the sheer fact of existence, on the other, the experience of wonder involves an intensification of the primary contact by which the world is given. That contact is prior to and presupposed by both our involvement with objects as implements of mediation (...) and our relation to others as persons. Because of that, wonder is depersonalizing and neutralizing, and so takes place outside any sense of ethical obligation. In contrast to efforts that aim at linking wonder and the good, I suggest that wonder is more aptly understood as making us deeper without making us better. (shrink)
Bernard Freydberg’s recent work is a careful and compact study of David Hume’s signature texts: An Enquiry Concerning Human Understanding , An Enquiry Concerning Principles of Morals , and “Of the Standard of Taste” . Contrary to traditional epistemological readings that comfortably situate Hume as an empiricist naturalist, Freydberg argues that he is better understood as a profound thinker of imagination and Socratic ignorance. Hume’s figurative and Platonic argumentation varies in each text, but Freydberg makes a convincing case that his (...) theoretical, moral, and aesthetic philosophies share a proto-phenomenological center in the artistry of human nature and perception. (shrink)
The recently published collection Japanese and Continental Philosophy: Conversations with the Kyoto School, edited by Bret Davis, Brian Schroeder, and Jason Wirth, gathers together the best in contemporary scholarship on the Kyoto School and its legacy. This review essay is an opportunity to raise questions about the implications of this scholarship and to reflect critically on the future of the field. Although early Kyoto School philosophers are renowned for their lofty intellectual rigor, almost every one at some point bemoaned the (...) overly abstract flavor of their own work and that of their contemporaries. The call to make the philosophy concrete is without a doubt the unfinished business of the Kyoto School. This review assesses the collected volume’s range of critical and creative perspectives on the practical implications of Kyoto School theory, while indicating room for further engagement with this issue in future research. (shrink)
In his new book, Ames defends his interpretation of Confucian ethics as "role ethics" through a detailed examination of the Confucian vocabulary. Through such vocabulary, we can see that the Confucian self is a being that cultivates itself as it lives and matures in the context of the family and society. As role ethics, Confucianism is distinct from the Western tradition and its Greek roots. However, in order to highlight the contrast between Confucianism and the Western tradition, Ames paints a (...) picture of the latter that is a little misleading. As it turns out, there are many strands in the Western philosophical fabric, including those in the Continental tradition, where we can find conceptions of the self not all that different from what is in Confucianism as interpreted by Ames. Content Type Journal Article Pages 141-150 Authors A. T. Nuyen, National University of Singapore Journal Comparative and Continental Philosophy Online ISSN 1757-0646 Print ISSN 1757-0638 Journal Volume Volume 4 Journal Issue Volume 4, Number 1 / 2012. (shrink) |
Product Summary
A single acting air cylinder pushes out as a spring returns the rod into the shaft. Single acting air cylinder uses the pressure imparted by compressed air to create a driving force in one direction (usually out), and a spring to return to the "home" position.
A single acting air cylinder with spring reset, with a piston which is guided and sealed in the housing, said piston, together with the housing constituting a primary chamber, being capable of being pressurized with compressed air, and a secondary chamber, communicating with the atmosphere by means of a one-way valve arrangement, the piston being displaceable on the piston rod between two stops, situated on the latter. |
Home/Life&Culture/ GIRAFFE ALERT: Could April the giraffe be expecting another baby?
GIRAFFE ALERT: Could April the giraffe be expecting another baby?
Guillermo Sutton |Friday, November 10, 2017
Inc. All rights reserved. This material may not be published broadcast rewritten or redistributed
The park owner's comment caused a social media frenzy, as April fans took to Twitter to express their shock at the possibility of another giraffe cam.
On Thursday morning, Patch stoked rumors that she might be expecting by saying he couldn't "confirm nor deny the possibility of another pregnancy".
April the giraffe, who captivated the Internet via livestream, already has one baby, but she may - or may not - be having another.
"I can not confirm nor deny the possibility of another pregnancy", Jordan Patch, owner of Adventure Park Zoo, said on Good Morning America.
April gave birth to Tajiri earlier this year. So perhaps next year, the world will be on "giraffe watch" once again.
In this photo provided by Animal Adventure Park in Binghamton, N.Y., a giraffe named April stands with her new calf on Saturday, April 15, 2017.
YouTube Help: Age-restricted content
If something slips through the net, it can again be flagged and reviewed by a specialist YouTube Kids team of moderators. Maybe watch YouTube with your kids or have what they're watching in plain sight (say through a TV in the living room).
'I Loved Him': Donna Brazile Chokes Up Over Seth Rich
The roundtable boasts frequent Real Time guests political commentator Chris Matthews and documentary filmmaker Michael Moore. She had previously managed Al Gore's 2000 presidential campaign and worked on other races around the country.
Allahabad Bank net profit up 8% in Q2
The drop came after the bank's bad loans had climbed since SBI merged its five subsidiary banks with itself earlier in the year. Net interest income grew by 27.3 percent year-on-year to Rs 18,585.9 crore in Q2 despite tepid loan growth.
The Singles Day Sales start tomorrow
It started as an informal holiday, sometimes dubbed an anti-Valentine's Day, meant to celebrate those not in relationships. JD.com has partnered with Tencent and Baidu to attract as many shoppers to its platform as possible.
Telcos forced to pay for giving you crap services
If a broadband or landline is not working on the day it was said to get fixed, providers will have to pay £5 a day. Ofcom hope the cash penalties for poor service will force ISPs to make a better effort with customer service.
Eminem Drops Surprise Single Featuring Beyoncé
Eminem had teased the track earlier this week in the form of a mock doctor's note featuring the words: " Walk On Water ". While we await further details on new music from Eminem , you can find both teasers below.
Just Dial stock rallies on talk of takeover by Google
Just Dial's core listing business has been facing tough competition from companies like Zomato and Practo in the recent times. Shares of Just Dial were trading at Rs 545.90 apiece at noon, up around 19 per cent from its previous day's closing.
Bond girl Karin Dor dies aged 79
Further Hollywood offers followed, including from director Alfred Hitchcock, who cast her in the 1969 spy thriller: " Topaz ". The German actress, played Bond girl Helga Brandt, the fearsome secretary of Japanese executive Mr.
Evra given season-long ban by UEFA
Evra got into a verbal argument with Marseille supporters before the match against Portuguese club Vitoria on November 2. The club went on to thank Evra for his impact since joining in January but accepted it was impossible for him to remain.
Angry wife gets Doha-Bali flight diverted to Chennai
She is then said to have started a fight after discovering evidence he was cheating on her, the Times of India reported. The flight departed and continued its journey to Bali while the family spent the day at Chennai airport.
Pakistan to allow wife to meet Kulbhushan Jadhav
The Pakistan Army said last month it is close to a decision on the mercy petition submitted by Jadhav. The spy was tried through (FGCM) under Pakistan Army Act (PAA) and awarded death sentence. |
Q:
Using two dataframes to calculate final value pandas
Currently, I have two dataframes where I am merging on 'KEY'. My first dataframe contains a KEY and the original price of a product. My second dataframe collects information for each time a person makes a payment. I need to create a final calculated column in df1 which shows the remaining balance. The remaining balance is calculated by subtracting payment_price from the original_price. The only caveat is that only certain price_codes reflect a payment (13, 14 and 15).
I'm not sure if the best approach utilizes merges or if I can simply refer to another df without having to merge (the latter approach would seem more ideal since both dfs have 500,000,000+ rows), but I can't find much content on this specific scenario.
df1 = pd.DataFrame({'KEY': ['100000555', '100000009','100000034','100000035', '100000036'],
'original_price': [1205.20,1253.25,1852.15,1452.36,1653.21],
'area': [12, 13, 12,12,12]})
df2 = pd.DataFrame({'KEY': ['100000555', '100000009', '100000009', '100000009', '100000009','100000034','100000034', '100000034'],
'payment_price': [134.04, 453.43, 422.32,23.23,10.43,10.47,243.09,23.45],
'Price_code': ['13', '13', '14','15','16','13','14','15']})
df1:
KEY area original_price
0 100000555 12 1205.20
1 100000009 13 1253.25
2 100000034 12 1852.15
3 100000035 12 1452.36
4 100000036 12 1653.21
df2:
KEY payment_price Price_code
0 100000555 134.04 13
1 100000009 453.43 13
2 100000009 422.32 14
3 100000009 23.23 15
4 100000009 10.43 16
5 100000034 10.47 13
6 100000034 243.09 14
7 100000034 23.45 15
I need to create a calculation where I need to subtract any payment_price from df2 if they match the key and have price_code values of 13,14, or 15.
final result
KEY area original_price calculated_price
0 100000555 12 1205.20 1071.16 # (1205.20 - 134.04)
1 100000009 13 1253.25 354.27 # (1253.25 - 453.43 - 422.32 - 23.23)
2 100000034 12 1852.15 1575.14 # (1852.15 - 10.47 - 243.09 - 23.45)
3 100000035 12 1452.36 1452.36
4 100000036 12 1653.21 1653.21
My initial inclination was to merge the two dfs and perform the calculation with a groupby statement. But my hesitation with this is that this seems resource heavy and my final df will be at least double the amount of rows. Additionally, I am running into a mental block to write the calculation to only include certain price_codes. So now I'm wondering if there is a better approach. I'm open to other approaches or help with this script.
I will be honest in that I'm not entirely sure how to write the the conditionals for the price_codes for something like this. The code below first merges the dfs, then creates a column (remaining_price). However, for KEY 10000009 I need to include only the price_codes 12, 14, 15 and exclude 16, however 16 is currently included.
result = pd.merge(df1, df2,how='left', on='KEY')
codes = [13,14,15]
result['remaining_price'] = result['original_price'] - result['payment_price'].groupby(result['KEY']).transform('sum')
Finally, I assume if this is the approach I use, that I would need to drop all duplicate rows on KEY and the two merged columns (price_code, payment_price).
result = result.drop_duplicates(subset=['KEY'],keep='first')
A:
Here is one way. There is no need for an explicit merge or to drop duplicates. This is where you might see a performance improvement.
Solution
s = df2[df2['Price_code'].isin([13, 14, 15])].groupby('KEY')['payment_price'].sum()
df1['calculated_price'] = df1['original_price'] - df1['KEY'].map(s).fillna(0)
Result
KEY area original_price calculated_price
0 100000555 12 1205.20 1071.16
1 100000009 13 1253.25 354.27
2 100000034 12 1852.15 1575.14
3 100000035 12 1452.36 1452.36
4 100000036 12 1653.21 1653.21
Explanation
Filter df2 by Price_code as required, aggregate payment_price by KEY and finally sum. The result is a series mapping KEY to sum of payments.
Use map to map these summations to KEY in df1 and subtract from original_price.
|
Evaluation of the DNA-dependent RNA polymerase β-subunit gene (rpoB) for phytoplasma classification and phylogeny.
Phytoplasmas are classified into 16Sr groups and subgroups and 'Candidatus Phytoplasma' species, largely or entirely based on analysis of 16S rRNA gene sequences. Yet, distinctions among closely related 'Ca. Phytoplasma' species and strains based on 16S rRNA genes alone have limitations imposed by the high degree of rRNA nucleotide sequence conservation across diverse phytoplasma lineages and by the presence in a phytoplasma genome of two, sometimes sequence-heterogeneous, copies of the 16S rRNA gene. Since the DNA-dependent RNA polymerase (DpRp) β-subunit gene (rpoB) exists as a single copy in the phytoplasma genome, we explored the use of rpoB for phytoplasma classification and phylogenetic analysis. We sequenced a clover phyllody (CPh) phytoplasma genetic locus containing ribosomal protein genes, a complete rpoB gene and a partial rpoC gene encoding the β'-subunit of DpRp. Primers and reaction conditions were designed for PCR-mediated amplification of rpoB gene fragments from diverse phytoplasmas. The rpoB gene sequences from phytoplasmas classified in groups 16SrI, 16SrII, 16SrIII, 16SrX and 16SrXII were subjected to sequence similarity and phylogenetic analyses. The rpoB gene sequences were more variable than 16S rRNA gene sequences, more clearly distinguishing among phytoplasma lineages. Phylogenetic trees based on 16S rRNA and rpoB gene sequences had similar topologies, and branch lengths in the rpoB tree facilitated distinctions among closely related phytoplasmas. Virtual RFLP analysis of rpoB gene sequences also improved distinctions among closely related lineages. The results indicate that the rpoB gene provides a useful additional marker for phytoplasma classification that should facilitate studies of disease aetiology and epidemiology. |
270 P.3d 1259 (2012)
Marc FINKEL, an Individual, Appellant,
v.
CASHMAN PROFESSIONAL, INC., a Nevada Corporation; Cashman Enterprises, Inc., a Nevada Corporation; and Cashman Photo Enterprises of Nevada, a Nevada Corporation, Respondents.
Marc Finkel, an Individual; IQ Variable Data, LLC, a Nevada Corporation; Richard Clark, an Individual; and MFRC Ventures, LLC, d/b/a Influent Solutions, a Nevada Corporation, Appellants,
v.
Cashman Professional, Inc., a Nevada Corporation; Cashman Enterprises, Inc., a Nevada Corporation; and Cashman Photo Enterprises of Nevada, a Nevada Corporation, Respondents.
Nos. 54520, 55377.
Supreme Court of Nevada.
March 1, 2012.
*1261 Law Office of Daniel Marks and Adam Levine, Daniel Marks, and Christopher L. Marchand, Las Vegas, for Appellants.
Kravitz, Schnitzer, Sloane & Johnson, Chtd., and Michael B. Lee and Martin J. Kravitz, Las Vegas, for Respondents.
BEFORE SAITTA, C.J., HARDESTY and PARRAGUIRRE, JJ.
OPINION
By the Court, PARRAGUIRRE, J.:
In this appeal, we review two district court orders: one granting a preliminary injunction to enforce restrictive provisions in a consulting agreement (the Agreement) and to prevent likely violations of Nevada's Uniform Trade Secrets Act, and the other refusing to dissolve that preliminary injunction after the Agreement had been terminated. Because substantial evidence supports the district court's findings that appellant likely breached the Agreement and violated Nevada's Uniform Trade Secrets Act, we affirm the district court's order granting respondents' request for preliminary injunctive relief. However, upon termination of the Agreement, the district court should have granted appellant's motion to dissolve the injunctive provisions that were grounded on findings that appellant likely breached the Agreement. With regard to the alleged trade secret violations, NRS 600A.040(1) requires the district court to make findings as to the continued existence of a trade secret and to what constitutes a "reasonable period of time" for maintaining an injunction under Nevada's Uniform Trade Secrets Act. Because the district court failed to make these findings, we reverse the district court's second order and remand to the district court for further proceedings regarding the extent that the injunctive provision related to likely violations of the Trade Secrets Act should continue to remain in effect.
FACTS AND PROCEDURAL HISTORY
Beginning in 2001, appellant Marc Finkel was employed in various executive positions at respondent Cashman Professional, Inc., which is affiliated with respondents Cashman Enterprises, Inc., and Cashman Photo Enterprises of Nevada (collectively, Cashman). During his employment, Finkel performed various tasks designed to expand and streamline Cashman's Las Vegas-based wedding photography business. Among other things, Finkel designed business software, negotiated sales contracts with customers, developed new sales strategies, drafted employment agreements, created training programs, and implemented new management techniques for the business.
Cashman went to great lengths to keep the above aspects of its business confidential. In particular, Finkel was one of only four people with access to Cashman's contracts, which were kept under lock and key to thwart attempts of underbidding by competitive companies.
Accordingly, when Finkel left his employment with Cashman in 2008, Cashman and Finkel entered into the Agreement, which, in large part, was designed to maintain the confidentiality of this information following Finkel's departure. The Agreement provided that Finkel would serve as a consultant to Cashman and would abide by several restrictive covenants in exchange for certain compensation. The restrictive covenants prohibited Finkel from engaging in a competing business, disparaging Cashman, soliciting Cashman's employees, and disclosing Cashman's confidential information.
In early 2009, Finkel purchased a printing company called IQ Variable Data, LLC (IQ), which he renamed as Influent Solutions. According to the parties, IQ was the only printing company in Las Vegas that could provide overnight printing of wedding photo books, and Cashman's photography business relied on IQ when overnight printing services were required. Finkel continued to provide the same services as IQ through Influent Solutions, *1262 and in doing so, he enlisted several Cashman employees to help establish his business. Finkel also approached at least two of Cashman's customers and solicited them to move their entire wedding photo and print production to Influent Solutions.
Detecting a threat to its business interests, Cashman filed a motion in the district court alleging breach of the Agreement and, in part, seeking a preliminary injunction to enforce the Agreement's restrictive covenants. The district court granted Cashman's request for a preliminary injunction in August 2009, concluding that Finkel had likely violated several provisions in the Agreement and misappropriated trade secrets in violation of Nevada's Uniform Trade Secrets Act, and that Cashman would suffer irreparable injury absent the issuance of an injunction. The preliminary injunction prevented Finkel from engaging in a competing business, making disparaging remarks about Cashman, soliciting Cashman's employees, and disclosing Cashman's confidential information. It further enjoined Finkel from misappropriating Cashman's trade secrets.
Finkel appealed from the preliminary injunction order and later informed Cashman that he was exercising his right to terminate the Agreement. Because the restrictive covenants were only applicable while the Agreement was in effect, Finkel then filed a motion to dissolve the preliminary injunction upon termination of the Agreement. After a hearing, the district court entered an order in January 2010, denying Finkel's motion to dissolve the injunction, finding that termination of the Agreement did not end the district court's authority to protect Cashman from an unfair competitive scenario. Finkel appealed from the order refusing to dissolve the injunction, and this court consolidated the two matters for resolution.
DISCUSSION
On appeal, Finkel first argues that the district court abused its discretion by issuing the preliminary injunction because substantial evidence does not support that Cashman would suffer irreparable harm and that Cashman would likely succeed in establishing that Finkel had breached the Agreement or misappropriated trade secrets.[1] As explained below, we disagree.
The order issuing the preliminary injunction was supported by substantial evidence
"A preliminary injunction is available when the moving party can demonstrate that the nonmoving party's conduct, if allowed to continue, will cause irreparable harm for which compensatory relief is inadequate and that the moving party has a reasonable likelihood of success on the merits." Boulder Oaks Cmty. Ass'n v. B & J Andrews, 125 Nev. 397, 403, 215 P.3d 27, 31 (2009).
Standard of review
This court reviews a district court's issuance of a preliminary injunction for an abuse of discretion. Guerin v. Guerin, 114 Nev. 127, 134, 953 P.2d 716, 721 (1998), abrogated on other grounds by Pengilly v. Rancho Santa Fe Homeowners, 116 Nev. 646, 648-49, 5 P.3d 569, 570-71 (2000). "A decision that lacks support in the form of substantial evidence is arbitrary or capricious and, therefore, an abuse of discretion." Stratosphere Gaming Corp. v. Las Vegas, 120 Nev. 523, 528, 96 P.3d 756, 760 (2004) (quotation omitted). "Substantial evidence has been defined as that which a reasonable mind might accept as adequate to support a conclusion." McClanahan v. Raley's, Inc., 117 Nev. 921, 924, 34 P.3d 573, 576 (2001) (quotations omitted).
*1263 Irreparable harm and likelihood of success on the merits
Finkel argues that the record lacks substantial evidence to support the district court's conclusion that Cashman would likely succeed on the merits on its breach of contract and related claims or that it would suffer irreparable harm absent the issuance of the injunction.
This court has held in the context of an appeal from an order granting an injunction that "acts committed without just cause which unreasonably interfere with a business or destroy its credit or profits, may do an irreparable injury." Sobol v. Capital Management, 102 Nev. 444, 446, 726 P.2d 335, 337 (1986). Here, the district court found that Finkel likely competed with Cashman, solicited Cashman's employees, disparaged Cashman, disclosed Cashman's confidential information, and misappropriated Cashman's trade secrets.
Contrary to Finkel's arguments, substantial record evidence supports the district court's conclusions. First, the Agreement restricted Finkel's ability to engage in a competing business, defined in part as any commercial photography or related service offered by Cashman, whether performed internally or by an outside service. It is undisputed that Finkel proceeded to acquire and operate the only vendor for wedding albums who could provide next-day printing in the relevant area, and that IQ had performed as an outside-service provider for Cashman in the past. Finkel argues that this fact is insufficient to show that he was participating in a competing business because Influent Solutions offered a variety of other commercial printing services. However, this does not undermine the district court's conclusion that Influent Solutions was in competition with Cashman, especially in light of Finkel's admission that he approached several of Cashman's customers, urging them to move their business to Influent Solutions.
Second, the Agreement prohibited Finkel from making any type of disparaging or derogatory remarks regarding Cashman. The record indicates that Finkel repeatedly violated this clause by referring to Cashman executives as untrustworthy, swindling "snake[s]," and other similar remarks.
Next, the Agreement restricted Finkel from inducing or attempting to induce any Cashman employee to leave Cashman. Here, the record indicates that Finkel likely violated this condition, as at least four Cashman employees visited Influent Solutions while still employed by Cashman, and Finkel made more than 155 calls lasting a total of 1,104 minutes to those employees. Also, Finkel enlisted one Cashman employee to set up his telephone and computer network and another employee to arrange a business meeting with one of Cashman's customers. Although Finkel argues that he did not violate the Agreement, since he only temporarily employed these individuals, the Agreement prohibited any attempt to induce a Cashman employee.
Finally, the Agreement prohibited Finkel from disclosing any nonpublic information, including information regarding Cashman's plans, pricing, customers, processes, or other data of any kind. The record supports that Finkel identified several of Cashman's customers in his online biography and that he described his invention of Cashman's point-of-sale operating system. Also, Finkel informed at least one outside party of Cashman's confidential pricing structures and marketing plans.
This is the precise sort of conduct that could cause a business irreparable harm. Sobol, 102 Nev. at 446, 726 P.2d at 337 (determining that where a person has "interfere[ed] with the operation of a legitimate business by creating public confusion, infringing on goodwill, and damaging reputation in the eyes of creditors," it may result in irreparable harm). Therefore, substantial evidence supported the district court's conclusion that Finkel's conduct likely breached multiple provisions of the party's Agreement and, if true, would likely cause irreparable harm to Cashman.
With respect to the district court's finding that Finkel likely misappropriated trade secrets, Finkel argues that any information that he may have used was not a "trade secret." We disagree. Nevada's Uniform Trade Secrets Act, NRS Chapter 600A, *1264 provides that the "[a]ctual or threatened misappropriation [of a trade secret] may be enjoined." NRS 600A.040(1). Broadly defined, a trade secret is information that "[d]erives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by the public," as well as information that "[i]s the subject of efforts that are reasonable under the circumstances to maintain its secrecy." NRS 600A.030(5)(a)-(b). Whether information is a trade secret generally is a question of fact. See Frantz v. Johnson, 116 Nev. 455, 466, 999 P.2d 351, 358 (2000). Factors to consider include:
(1) the extent to which the information is known outside of the business and the ease or difficulty with which the acquired information could be properly acquired by others; (2) whether the information was confidential or secret; (3) the extent and manner in which the employer guarded the secrecy of the information; and (4) the former employee's knowledge of customer's buying habits and other customer data and whether this information is known by the employer's competitors....
Id. at 467, 999 P.2d at 358-59 (quotation omitted).
Here, the district court found that Finkel acquired an intimate knowledge of Cashman's confidential information while employed as an executive for the company. This included Cashman's contracts, customers, processes, prices, and other business-related confidential information. Finkel acknowledged to the district court that confidential trade secrets would include: "costs; discounts; future plans; business affairs; processes; ... technical matters; customer lists; product designs; and, copyrights." While Finkel's admission is not necessarily dispositive of an item's trade-secret status, it may be considered as a factor weighing towards such classification.[2]See Frantz, 116 Nev. at 467, 999 P.2d at 358-59.
In addition to Finkel's admission, the parties' treatment of the above items tends to support their classification as trade secrets. Frantz, 116 Nev. at 466, 999 P.2d at 358. The record indicates that pricing schemes were kept confidential, the point-of-sale software was not shared with anyone outside the business, and Cashman required its employees to keep business-related information confidential. Moreover, Cashman went to extreme measures to protect its customer information, as only four people had access to its contracts and customer data. Thus, substantial evidence supports the district court's conclusion that the information allegedly misappropriated by Finkel would likely be confidential trade secrets and that such misappropriation could result in irreparable harm, making injunctive relief appropriate. See Saini v. International Game Technology, 434 F.Supp.2d 913, 919 (D.Nev.2006) ("[D]isclosure of confidential information or trade secrets" creates serious harms, "which are not readily addressed through payment of economic damages, [and] are sufficient to meet the irreparable injury requirement for a preliminary injunction.").
Upon termination of the Agreement, the district court should have dissolved the preliminary injunction as it applied to the restrictive covenants contained in the Agreement
Finkel argues that the district court erred in refusing to dissolve the injunction despite termination of the Agreement. We agree with Finkel that the injunctive provisions that restricted his business activities based on his likely violations of the Agreement should have been dissolved once the Agreement was no longer enforceable. However, we do not necessarily agree that the injunctive provisions that applied to prevent likely trade secret violations should have been dissolved.
*1265 Although this is an issue of first impression in Nevada, the majority of courts that have considered this matter have declined to enforce an agreement not to compete after the period set forth in the agreement had expired. Economics Laboratory, Inc. v. Donnolo, 612 F.2d 405, 408 (9th Cir.1979); see also id. at 409 ("There is no reason ... to enforce a covenant which by its terms is no longer in effect.").
We agree with the Ninth Circuit's reasoning, and therefore conclude that the district court abused its discretion by denying Finkel's motion to dissolve the injunction to the extent that it restricted Finkel's business activities based on the terminated Agreement, as there was no longer any basis for enforcing that portion of the injunction.[3] Accordingly, we reverse the district court's second order to the extent that it maintains the injunctive provisions relating to Finkel's alleged breach of the Agreement and remand with instructions to grant Finkel's motion to dissolve as to this portion of the injunction.
This brings us to the remaining portion of the injunction, which was based on Finkel's likely trade-secret violations. An injunction entered under Nevada's Uniform Trade Secrets Act "must be terminated when the trade secret has ceased to exist, but the injunction may be continued for an additional reasonable period of time to eliminate commercial or other advantage that otherwise would be derived from the misappropriation." NRS 600A.040(1).
Here, the district court maintained the preliminary injunction on the independent basis that Finkel had likely misappropriated Cashman's trade secrets. While this may be a valid ground for maintaining a preliminary injunction beyond the termination date of the parties' agreement, we conclude that additional findings were required by the district court. First, NRS 600A.040(1) requires that an injunction be terminated when the trade secret no longer exists. Here, the district court should have made findings as to the extent that Cashman's contracts, customer lists, process, and prices remained protected as trade secrets. Assuming that trade secrets are found to exist, an injunction may only be extended for a "reasonable period of time" pursuant to NRS 600A.040(1). Thus, the district court should also have articulated a duration for extending the injunction pursuant to statute.
This conclusion is consistent with the comments to the Uniform Trade Secrets Act, which indicate that "an injunction should last for as long as is necessary, but no longer than is necessary, to eliminate the commercial advantage or lead time' with respect to good faith competitors that a person has obtained through misappropriation." Unif. Trade Secrets Act § 2 cmt., 14 U.L.A. 620 (2005). Accordingly, such a determination should be made on a case-by-case basis by the district courts.
Therefore, we also reverse the part of the district court's January 2010 order in which it maintained the injunctive provisions based on Finkel's alleged misappropriation of trade secrets. On remand, the district court shall reconsider to what extent the injunctive provision should be maintained under NRS 600A.040(1) in light of this opinion.
CONCLUSION
Because substantial evidence exists to support the district court's decision to issue the preliminary injunction, we affirm the district court's first order. However, because the district court improperly relied on the terminated Agreement in declining to dissolve the injunction that prohibited Finkel from conducting business activities that likely violated the Agreement, and because the district court failed to make findings as to the continued existence of a trade secret and for what constitutes a "reasonable period of time" under NRS 600A.040(1), we reverse the district *1266 court's second order and remand for further proceedings consistent with this opinion.
We concur: SAITTA, C.J., and HARDESTY, J.
NOTES
[1] Finkel makes two alternative arguments. First, he argues that Cashman failed to provide him the contractually mandated notice and opportunity to cure before enforcing the Agreement. Although such actions would be required prior to termination, the Agreement does not mandate that notice and an opportunity to cure be given before an injunction is sought. Thus, we conclude that this argument lacks merit.
Finkel also argues that the preliminary injunction should be held void for vagueness, claiming that he could not ascertain which actions were prohibited. We find this argument unpersuasive, as the district court made detailed findings in enjoining Finkel's actions when issuing the preliminary injunction, and we conclude that he was sufficiently informed as to which acts were prohibited.
[2] Although Finkel admitted and the district court concluded that "customer lists" were confidential trade secrets, Finkel now argues that the identities of Cashman's well-known customers should not have been deemed confidential. See Cambridge Filter v. Intern. Filter Co., Inc., 548 F.Supp. 1301, 1306 (D.Nev.1982) ("Where the plaintiff's customers are known to competitors as potential customers, the plaintiff's customer list is not a trade secret."). Although it is possible that not all of Cashman's relationships would have qualified as trade secrets, we decline to address this matter based on the district court's finding that Finkel likely misappropriated other protected information. Instead, we instruct the district court on remand to specify which business relationships are to be afforded trade-secret status.
[3] The district court seems to have recognized its error, as it subsequently purported to modify its second order by removing the injunctive provisions that were based on the Agreement in an order entered in February 2010. However, the district court lacked jurisdiction to modify the order because Finkel had already filed this appeal. See Rust v. Clark Cty. School District, 103 Nev. 686, 688, 747 P.2d 1380, 1382 (1987) ("a timely notice of appeal divests the district court of jurisdiction to act").
|
Separating industrial hemp myths from reality
Kentucky Agriculture Commissioner James Comer has made it his top priority to win general assembly approval for the cultivation and production of industrial hemp in Kentucky. Addressing a federal ban enacted in the “Reefer Madness” atmosphere of 1937, Comer recently called on Congress to “get out of the way and let the private sector create jobs in rural communities manufacturing this product.”
Legislation now before the U.S. Senate would exclude industrial hemp from the legal definition of marijuana. Noteworthy is the level of bi-partisan support for this change. The bill’s sponsors run the political gamut from Republican Rand Paul of Kentucky to Democrats Ron Wyden and Jeff Merkley of Oregon and Independent Bernie Sanders of Vermont. A House version has 36 sponsors including Kentucky Republican Congressman Thomas Massie, and Louisville Democrat John Yarmuth has stated that he supports the effort to legalize industrial hemp.
The following is a collection of “myths and realities” concerning industrial hemp and marijuana, excerpted from a white paper by David P. West, a commercial corn breeder who holds a Ph.D. in plant breeding from the University of Minnesota. West has served as an advisor to the emerging hemp industry regarding industrial hemp germplasm. His work, Fiber Wars: the Extinction of Kentucky Hemp (1994), a pioneering discussion of the functional difference between hemp and marijuana, and his other writings on hemp and agriculture are available online.
Myth: United States law has always treated hemp and marijuana the same.
Reality: The history of federal drug laws clearly shows that at one time the U.S. government understood and accepted the distinction between hemp and marijuana.
Myth: Smoking industrial hemp gets a person high.
Reality: The THC levels in industrial hemp are so low that no one could get high from smoking it. Moreover, hemp contains a relatively high percentage of another cannabinoid, CBD, that actually blocks the marijuana high. Hemp, it turns out, is not only not marijuana; it could be called “antimarijuana.”
Myth: Hemp fields would be used to hide marijuana plants.
Reality: Hemp is grown quite differently from marijuana. Moreover, it is harvested at a different time than marijuana. Finally, cross-pollination between hemp and marijuana plants would significantly reduce the potency of the marijuana plants.
Hemp grown for fiber is planted in narrow row spacing (4 inches apart), branching is discouraged, and plants are not allowed to flower. The stems are kept small by the high density and foliage develops only on the top. Hemp plants crowd out weeds and other hemp plants not equal to the competition.
Marijuana plants, on the contrary, are spaced widely to encourage branching, and the flower is the harvested product. Marijuana is a horticultural crop planted in wide spacing to minimize stand competition and promote flower production. It branches thickly like a Christmas tree. In contrast, hemp selected for fiber has only a few branches.
Myth: Legalizing hemp while continuing the prohibition on marijuana would burden local police forces.
Reality: In countries where hemp is grown as an agricultural crop, the police have experienced no such burdens. The key to a regulated hemp industry is seed certification, a common practice in the international seed industry. The burden for producing hemp varieties compliant with the prescribed THC threshold falls on the seed producer and breeding operation. As mentioned, THC content is genetically determined.
Numerous low-THC varieties have been produced by European hemp breeders and these are certified by the appropriate government agency that publishes the approved list.
In countries that have recently legalized industrial hemp, individual farmers and manufacturers are licensed and registered. Field locations are recorded with local authorities. Only when there is probable cause does law enforcement need to concern itself with individual farmers. |
// Copyright (c) 2005 Stanford University (USA).
// All rights reserved.
//
// This file is part of CGAL (www.cgal.org); you can redistribute it and/or
// modify it under the terms of the GNU Lesser General Public License as
// published by the Free Software Foundation; either version 3 of the License,
// or (at your option) any later version.
//
// Licensees holding a valid commercial license may use this file in
// accordance with the commercial license agreement provided with the software.
//
// This file is provided AS IS with NO WARRANTY OF ANY KIND, INCLUDING THE
// WARRANTY OF DESIGN, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
//
// $URL$
// $Id$
//
//
// Author(s) : Daniel Russel <drussel@alumni.princeton.edu>
#ifndef CGAL_POLYNOMIAL_TOOLS_INTERVAL_ARITHMETIC_H
#define CGAL_POLYNOMIAL_TOOLS_INTERVAL_ARITHMETIC_H
#include <CGAL/Polynomial/basic.h>
#include <utility>
/*!
\file interval_arithmetic.h
\todo wrapper support for boost::interval
*/
#ifdef CGAL_POLYNOMIAL_USE_CGAL
#include <CGAL/Interval_nt.h>
#include <CGAL/double.h>
#include <CGAL/int.h>
namespace CGAL { namespace POLYNOMIAL {
//! The class we use for interval arithmetic.
/*!
This class is not protected, so the Interval_arithmetic_guard must be used when calculations
are peformed. This is not checked.
*/
typedef CGAL::Interval_nt_advanced Interval_nt;
//! This class sets the rounding modes for interval arithmetic.
/*!
Create an instance of this class when you want to perform interval arithmetic.
When the destructor is called, the mode will be automatically cleaned up.
*/
struct Interval_arithmetic_guard: public CGAL::Protect_FPU_rounding<true>{};
/*struct Interval_arithmetic_guard {
//! I should check that the rounding is not already upwards.
Interval_arithmetic_guard() {
bk_= FPU_get_and_set_cw(CGAL_FE_UPWARD);
};
Interval_arithmetic_guard(bool b) {
if (b){
bk_= FPU_get_and_set_cw(CGAL_FE_UPWARD);
} else {
bk_= CGAL_FE_UPWARD;
}
}
~Interval_arithmetic_guard(){
FPU_set_cw(bk_);
}
bool enabled() const {
return bk_== CGAL_FE_UPWARD;
}
void set_enabled(bool ft) {
if (ft != enabled()) {
bk_= FPU_get_and_set_cw(bk_);
}
}
protected:
FPU_CW_t bk_;
};*/
template <class NT>
class To_interval: public CGAL::To_interval<NT>
{
public:
To_interval(){}
};
/*template <class NT>
std::pair<double,double> to_interval(const NT&a){
return CGAL::to_interval(a);
}
std::pair<double,double> to_interval(double d){
return CGAL::to_interval(d);
}*/
//#define CGAL_POLYNOMIAL_TO_INTERVAL(nt) CGAL::to_interval(nt)
/*template <class NT>
std::pair<double, double> to_interval(const NT &nt){
//bool to_interval_general;
return CGAL::to_interval(nt);
}*/
//using CGAL::to_interval;
namespace internal
{
template <class Traits> class Simple_interval_root;
template <class R1, class R2> class Lazy_upper_bound_root_stack_root;
template <class R> class Explicit_root;
}
} } //namespace CGAL::POLYNOMIAL
#elif POLYNOMIAL_USE_BOOST_INTERVAL
Not implemented yet.
#else
No interval arithmetic support.
#endif
namespace CGAL { namespace POLYNOMIAL {
inline Extended_sign extended_sign(const Interval_nt &i)
{
if (i.inf() == 0 && i.sup() ==0) return EXTENDED_ZERO;
else if (i.inf() <=0 && i.sup() >=0) {
return EXTENDED_UNKNOWN;
}
else if (i.inf() >0 ) {
return EXTENDED_POSITIVE;
}
else {
return EXTENDED_NEGATIVE;
}
}
} } //namespace CGAL::POLYNOMIAL
#endif
|
The Alaska schools would be a stretch. I don't think the WAC is in a position to add the travel costs to each of its members, at this point.
The WAC needs to ensure that its members make $$$. And you don't make more money by increasing costs. So, find schools that fit 'geographically', are in major markets, and provide easy travel options.
Major markets with travel options:The markets that would help the WAC: Denver, Colorado Springs, Oklahoma City, St. Louis, Portland, Dallas, any major city in California. Unfortunately, there aren't too many major markets with Universities...in northern Arizona, southern Utah, northern New Mexico, west Texas, west Kansas. So, there is a large void in the footprint of the WAC. Which makes it all that more important to grab the major markets.
Schools within those markets:-Colorado: Metro State, Regis, UC Colorado Springs, School of Mines(fb), CSU Pueblo(fb). Any of these schools would really help cut down on travel with a two division system. -St. Louis: St. Louis could help make Chicago State and UM KC happier by cutting their travel. And if both are happy...they are less likely to leave. UM St. Louis or Lindenwood(fb)-Dallas: UD, UTD, Dallas Baptist...could help create an eastern division with Chicago, KC, St Louis, UTRGV, and whoever else(NMSU, Metro State, etc.) None of these schools have pushed hard for DI, so, without some motivation...this group could be tough to convince.-Oklahoma: C. Ok(fb), OKCU, ....? C Ok, is a solid choice for fb. OKCU, isn't all that big.-Portland: Portland State plays fb...and might compete better at a lower level, which the WAC would be with some DII call ups.
I feel there are enough decent options that are within the current footprint...even without listing any California schools. With just two schools in the Colorado area...the conferences travel budget would be cut by a good percentage. Especially, if visiting schools schedule double headers with the two Colorado schools and ...the two schools travel together for away games.
If the schools are saving money on travel...then that leaves more money in their pockets.
So, there are plenty of major markets within the WAC's footprint...they just need to focus on a few of them...and get 'er done. Reduce travel, create divisions, and get some regionality built into the conference.If the schools are making more money and traveling less....the situation gets better very quickly.
Nobody is fond of adding a bunch of DII schools, but realistically...there aren't many other options to solidify this conference.
Alaska Anchorage presents the same problem the WAC had with Montana - the #2 school in the state wasn't as ready to move to the next level. In this case Alaska (Fairbanks) is even farther behind, as the Nanooks only field 10 teams.
I think if Metro State wants to join the WAC, all it has to do is apply for Division I and pay the fee. The scheduling rules regarding transitional schools won't be an issue if the WAC only brings in one more school before 2017. Metro State plays baseball, softball, and both men's and women's soccer, which helps with satisfying AQ requirements.
Dixie State in Utah, if it shutters or finds a home for its football program, would also be a good catch. It might be easier to get Idaho to rejoin and get the Big Sky to take Dixie State.
Western Washington would also be a logical target as te school dropped football six years ago, and is 90 minutes from Seattle.
WAC FLIGHT RISKSUCSB - is waiting on the Big West invite.UMKC and Chicago St - are waiting on anyone in the Midwest to invite them except the Summit (and they might rethink that if they decide the travel is too much in the WAC)UTRGV - is waiting on a Southland inviteNMSU - is waiting on a Sun Belt full invite (or Southland non fb in invite)Seattle - is waiting on a WCC invite
If one or two members leaves they are in big trouble. The WAC knows they are a conference of last resort and the only DI school left to fill in is NJIT. I'm sure they tried to pursue other DII upgrades but only GCU said yes.
The Alaska schools (if they wanted to upgrade) would be an excellent pickup for the WAC. They guarantee long term stability even if all the above flight risks bolted. A core of GCU, UVU, and the 2 Alaska schools would become permanent member of the WAC that you could pair with a few outcast DI schools and a few DII upgrades for the next 100 years.
Now Alaska is the only state w/o a DI bball school in the US. I think they may be willing to eventually upgrade and I think the WAC should go ahead and start those conversation ASAP. But until then they really should try to secure another DII school just in case they lose a few in the next round of realignment.
_________________Fan of the Big 12 Conference, the Mountain West Conference and...
WAC FLIGHT RISKSUCSB - is waiting on the Big West invite.UMKC and Chicago St - are waiting on anyone in the Midwest to invite them except the Summit (and they might rethink that if they decide the travel is too much in the WAC)UTRGV - is waiting on a Southland inviteNMSU - is waiting on a Sun Belt full invite (or Southland non fb in invite)Seattle - is waiting on a WCC invite
Right, and I think there may be more options for some of these guys, too, than what's listed above, as they are the ultimate destination. I look at NMSU, UTRGV, CSU, CSUB, and SU as the most likely to split in a few years. I think the MVC is going to lose someone else soon, be it Wichita State, Missouri State, or Illinois State, and the backfilling from wherever they get that replacement (or replacements), could definitely be from the WAC (UMKC), or it's from the Horizon, Summit, OVC, or Southland, and *those* are where the WAC probably feels it. CSUB and Seattle could come out of whatever eventually happens with the WCC and BYU, or Hawaii's ollies...while I doubt Seattle goes right into the WCC, there's still Big West, Big Sky, and maybe a Summit spot in need of filling.
WAC FLIGHT RISKSUCSB - is waiting on the Big West invite.UMKC and Chicago St - are waiting on anyone in the Midwest to invite them except the Summit (and they might rethink that if they decide the travel is too much in the WAC)UTRGV - is waiting on a Southland inviteNMSU - is waiting on a Sun Belt full invite (or Southland non fb in invite)Seattle - is waiting on a WCC invite
While some of these schools might eventually be flight risks....they aren't flight risks, right now because there is no where for these schools to go, currently.
And the only way to make UMKC, CSU, and UTRGV 'flight risks', right now...is to add schools in Alaska. There is no way the eastern schools in this conference would want to travel to Alaska. NJIT is much closer.
UTRGV to Seattle is 2370 miles.UTRGV to Fairbanks is 4251 miles.UTRGV to Newark is 1952 miles.Chicago to Seattle is 2063 miles.Chicago to Fairbanks is 3455 miles.Chicago to Newark is 780 miles.
Round trip to Fairbanks for UTRGV would be 8500 miles.
Adding Alaska schools to this conference would be disastrous for the travel budgets and student welfare.
Adding Alaska schools to this conference would be disastrous for the travel budgets and student welfare.
I don't disagree, but what's the viability of basketball independence these days? How's NJIT really doing?
If it came to Alaska or independence, I have to bet some go for the Alaska route. Filling a schedule from January on is just not going to happen for a lot of these schools. A conference, no matter how far flung it is, provides that, as well as AQ.
WAC FLIGHT RISKSUCSB - is waiting on the Big West invite.UMKC and Chicago St - are waiting on anyone in the Midwest to invite them except the Summit (and they might rethink that if they decide the travel is too much in the WAC)UTRGV - is waiting on a Southland inviteNMSU - is waiting on a Sun Belt full invite (or Southland non fb in invite)Seattle - is waiting on a WCC invite
While some of these schools might eventually be flight risks....they aren't flight risks, right now because there is no where for these schools to go, currently.
And the only way to make UMKC, CSU, and UTRGV 'flight risks', right now...is to add schools in Alaska. There is no way the eastern schools in this conference would want to travel to Alaska. NJIT is much closer.
UTRGV to Seattle is 2370 miles.UTRGV to Fairbanks is 4251 miles.UTRGV to Newark is 1952 miles.Chicago to Seattle is 2063 miles.Chicago to Fairbanks is 3455 miles.Chicago to Newark is 780 miles.
Round trip to Fairbanks for UTRGV would be 8500 miles.
Adding Alaska schools to this conference would be disastrous for the travel budgets and student welfare.
A: The conference would have to vote for it for Alaska schools to get invited.B: Even if somehow the WAC managed to shove this down the throat of the WAC schools, only UMKC/ChiSt likely have an "open" invitation to leave right now. CSUB and UTRGV aren't leaving a post season bid in all sports to be independent, and neither will NMSU unless this pushed their fb to FCS (which I doubt). And Seattle is not a travel issue (further to UTRGV than to Alaska)C: Distance doesn't really matter, they make the Alaska travel partners a long weekend trip so each school only travels there once a year in every sport. And quiet honestly at that level of sports the student athletes will benefit from telling stories about where/who they played. People are playing football games all over in places Ireland and bball tourneys in Hawaii while talking about playing games in Mexico and Asia for the experience of the student athlete. Having a kid playing at Chicago State being able to tell his grandkids about the time he went up to Alaska and had a double double will be something they can talk about for years and years...more so than going to Las Crueces, Edinburg, and Bakersfield.D: Travel budgets would go up only slightly it cost $400 commercial to fly to Seattle from most WAC schools, Alaska is $800, that also removes a few random trips to travel to schools on the East coast for games and having to pay DII schools (often more than the increase in their travel budget) to come in to play them.
Still I'm not sure the Alaska school will upgrade, but if they did the WAC is the best option. If Alaska thinks its beneficial then the WAC should do everything is can to make it happen.
_________________Fan of the Big 12 Conference, the Mountain West Conference and...
Adding Alaska schools to this conference would be disastrous for the travel budgets and student welfare.
I don't disagree, but what's the viability of basketball independence these days? How's NJIT really doing?
If it came to Alaska or independence, I have to bet some go for the Alaska route. Filling a schedule from January on is just not going to happen for a lot of these schools. A conference, no matter how far flung it is, provides that, as well as AQ.
I agree.But, we are not at that point yet where Independence is upon us.There are still many options within the footprint...that have not been fully exhausted.
Why not focus on the heart of the conference for now? IF....and it's a big IF, the WAC can secure a school or two in Colorado...or a surrounding state. Then the whole situation has changed...and there wouldn't be a need to look to Alaska.
If the WAC does add some DII schools from the center of the conference...and they need a school to help with scheduling, then add NJIT for a short term run. Give them till the new schools get up to DI...then NJIT can find a new home.
There are just so many options...I can't believe Alaska is anywhere near the top of the list.Denver/Colorado needs to be at the top of the list.
I agree that most if not all of the WAC schools would leave if they had an invite, but invites don't come easily. Chicago State was basically asked to leave the Summit, MidCon at the time, and I seriously doubt that there is any way they would be invited back. UMKC's departure from the Summit was made with the statement from then that they wanted a conference where they would be more likely to be able to compete. Their departure was seen as a real questionable move at the time and I think there is at best a 50-50 chance that they would be readmitted it they ask to cone back. Seattle has been turned down by there hoped for destination of the West Coast Conference. The Summit league was quoted a few months ago as saying that they could go to 14 teams immediately if they wanted to but they were only interested in good fits. I am guessing that most of the teams that were wanting in were WAC schools. The Summit is becoming a much more highly respected league in the past couple of years. It's post season men's basketball tournament is one of the most highly attended of any of the mid majors and the attendance at the women's post season tournament is greater than some of the major conferences.
In my opinion, the WAC's only opportunities are with move up DII schools. (Schools must have an invite to a conference before they can move up.
Chicago State's a mess. They retained accreditation, and maybe that's the first step toward recovery; that school, were it to "bounce back," shouldn't have a problem finding a more stable home (or, more stable than the WAC). Partly, I feel that way because the Summit was close to a free fall itself not a few years after losing CSU. I look at the Dakota schools, the "Horizon-despised" IUPU's, the flip-flopping UMKC and Oral Roberts (who isn't in great financial shape, either)...I think the Summit will take CSU back, even if they don't want them back.
I think Summit looks good now...but I still question the sustainability. And that hurts the WAC.
Wherever the WAC core could be, I don't think the conference ever overcame the MWC split. Too many hurt feelings, too much CUSA...it was a conference nobody really wanted to be in, and remains to this day. Building up a new core, even if states like Colorado, Utah, Washington, and California could continually pump out programs to D1, the nature of the school systems will drive these schools to look to other options: like UC or CSU and the Big West and MWC, the mountain state schools and the Big Sky...private schools and the WCC...the heartland and western front of the midwest and the MVC...it's those guys: MWC, BSC, BWC, WCC, and MVC who should never have to lose sleep.
What really hurts the WAC, as currently situated, is that Grand Canyon and Utah Valley are the only ones who really want to be there. There just aren't any other DII schools out west that are in the position to move up. it will always be one school away from collapse. It also lacks a geographic center which makes it hard to set an identity for the league other than being a halfway house between DII and more stable leagues.
Wondering why Chi State, UMKC and possibly UTRGV....haven't just moved over to the A-Sun? At least, the A-Sun isn't on the brink of collapse.
There are a ton more schools to chose from in the eastern half of the US...rather than the meager amount of schools to move up in the western half. Especially, if the WAC tries to add schools in Alaska.
Wondering why Chi State, UMKC and possibly UTRGV....haven't just moved over to the A-Sun? At least, the A-Sun isn't on the brink of collapse.
There are a ton more schools to chose from in the eastern half of the US...rather than the meager amount of schools to move up in the western half. Especially, if the WAC tries to add schools in Alaska.
All of these schools are way outside of the Atlantic Sun footprint. I doubt that the A Sun would want them.
The A-Sun, like the WAC, is one departure from potentially collapsing. I'd also argue the the WAC had more brand equity, and one of the two schools closest to Chicago State in the A-Sun, Lipscomb, has little in common with them. Both Lipscomb and NKU are the most likely to land somewhere else. If Chicago State or UMKC leave now, it is self-fulfilling that the WAC will collapse.
The A-Sun, like the WAC, is one departure from potentially collapsing. I'd also argue the the WAC had more brand equity, and one of the two schools closest to Chicago State in the A-Sun, Lipscomb, has little in common with them. Both Lipscomb and NKU are the most likely to land somewhere else. If Chicago State or UMKC leave now, it is self-fulfilling that the WAC will collapse.
I disagree.FGCU, N. Fla, Stetson, Jville, SC Upstate....none of these schools are going anywhere...nor, do they need to go anywhere. So, already ...the A-Sun has five schools that won't go anywhere. If you add....Chi State, UMKC and UTRGV to that list...you get a conference that is much more stable then the WAC. Oh, and don't forget NJIT. So, now you can add four to the A-Sun. Does it seem more stable than the WAC, now?
As has been stated....there are only two schools in the WAC that wouldn't leave....UVU and GCU.
If the A-Sun did loose a school or two...at least there are decent markets and schools to choose from in the eastern half of the US which fit in the footprint. In the WAC area....there is no consensus picks to move up....and two of the alternatives are in Alaska(which I feel will force these three to flee the conference).
If the WAC folds....it will be because of the conferences own inability to create something that had a chance of lasting. The current group of schools adds nothing to stability. The current footprint is un-sustainable....if they don't put some schools in the CENTER of the conference. So, I see the WAC folding no matter what.....because they can't or won't fix their own issues.
Who is online
Users browsing this forum: No registered users and 3 guests
You cannot post new topics in this forumYou cannot reply to topics in this forumYou cannot edit your posts in this forumYou cannot delete your posts in this forumYou cannot post attachments in this forum |
Viral vectors for gene therapy: past, present and future.
Gene delivery has been attempted in both experimental and clinical settings. These studies have shown that therapeutic gene transfer is possible, but it has not yet arrived as a practicable therapeutic intervention. This is due in large part to the inability of the vectors used to convey genetic material to a desired location in sufficient quantity and for long enough time to be effective. Current research on viral vectors for gene therapy has focused on reengineering viruses currently being tested as delivery agents, modifying the host to facilitate viral gene transfer and developing new viruses for use in gene transfer. It is too early to know which of these approaches will be effective; however, these ongoing studies are likely to make available in the future an array of gene delivery vehicles with different strengths and weaknesses. It is reasonable to expect that several of the vectors now being studied will prove useful for some therapeutic applications. |
Croatia's Filthy Manner of Life
Idolatry – From its freakish International Carnival of Rijeka (think Mardi Gras on steroids) to the Feast of St. Blaise (a day of feasting and fornication with false gods) to worshipping their warmongers of old, on Day of Antifascist Struggle to (wait for it) Animafest where they celebrate domestic and international works of animation (Walt Disney would be so proud but for him being a dead, filthy pervert who now resides in hell) to the vanity of the Dubrovnik Summer Festival and The Split Festival where they worship the gods of music, film and filth. The Croats are just full of way too much free time – WBC is just saying. Fast forward to November 1st where these witches and warlocks visit the graves on All Saints’ Day and of course no year of Idolatry would be complete without the false religious Celtic sun worshipping festival where they pretend to celebrate the birth of Jesus Christ when in reality they are worshipping the false god Baal, beginning with “St. Nicholas’” Day on December 6th and there you have a full year of what is the face of Croatian idolatry. Jeremiah 19:5 They have built also the high places of Baal, to burn their sons with fire for burnt offerings unto Baal, which I commanded not, nor spake it, neither came it into my mind: Jeremiah 32:35 And they built the high places of Baal, which are in the valley of the son of Hinnom, to cause their sons and their daughters to pass through the fire unto Molech; which I commanded them not, neither came it into my mind, that they should do this abomination, to cause Judah to sin. Just substitute “Croatia” for “Judah” and you see God hates Croatia!
Fags/Adultery/Fornication – You want to know whether or not fags are reigning in Croatia? Two words: Web Site. The fags got them their own Web Site so the rest as they say is history. Even though they claim to be staunch Catholics and the Catholics pretend to be against fags – you see that is a loud lie just like when they say they are against raping babies. By law it is forbidden to discriminate against anyone based on their sexuality. Enough said because that includes filthy brutes of all stripes: incest, bestiality, necrophilia must also be included along with fags, fornicators and adulterers – that is their “sexuality” after all. Croatia does boast only a 15% divorce rate, but what about adultery and fornication? Prostitution is not illegal in Croatia, only solicitation – WHAT?! That is what the law says, so Massage parlors, telephone services, entertainment places and restaurants front as brothels and are increasingly common and police will only enforce laws when they conduct occasional raids (no doubt because the owners will not bribe them) and then give a show of enforcing laws. This is a manner of life for the nation of Croatia, and it is exceedingly wicked. Isaiah 59:14 And judgment is turned away backward, and justice standeth afar off: for truth is fallen in the street, and equity cannot enter.
Abortion – in 2008 8,925 women murdered their little babies with the assistance of those pretending to be medical practitioners. God knows each of you and where you live, all things are open before the eyes of Him who made you. Deuteronomy 32:39 See now that I, even I, am he, and there is no god with me: I kill, and I make alive; I wound, and I heal: neither is there any that can deliver out of my hand.
Illicit Drugs (Sorceries) – DOOMED america’s Central Intelligence Agency says this about Croatia: they are a transit point along the Balkan route for Southwest Asian heroin to Western Europe; has been used as a transit point for maritime shipments of South American cocaine bound for Western Europe. That is all very interesting, and shows how stinking lazy the CIA is. Here’s the real information from their local and EU media. You have to go to the researchers, sillies! According to their statistics there were a total of 115 cases of drug-related deaths in 2007 with the cause being opiates and methadone. If you have opiates and methadone, you have drugs and substance abuse intervention gone badly. That is a curse from God, and will only get worse. If you do not believe WBC, just talk to the Ministry of Health and Social Welfare of Croatia. Revelation 9:21 Neither repented they of their murders, nor of their sorceries, nor of their fornication, nor of their thefts. |
Proteolytic processing of a plasma membrane-bound precursor to human macrophage colony-stimulating factor (CSF-1) is accelerated by phorbol ester.
A transmembrane precursor to human macrophage colony-stimulating factor (M-CSF, CSF-1) is stably expressed at the cell surface where it is slowly and inefficiently cleaved to yield a soluble form of the growth factor. Incubation in the presence of phorbol ester resulted in rapid cleavage of the plasma membrane-bound precursor and release of soluble CSF-1. Within 60 min after phorbol treatment the quantity of growth factor recovered in the medium was more than 30-fold greater than that observed in the absence of the agent. The growth factor released in the presence of phorbol was biologically active and exhibited the same electrophoretic mobility as that obtained in the absence of the drug. Phorbol ester-accelerated processing of the cell surface CSF-1 precursor was abrogated by long-term exposure to phorbol, but was not inhibited by pretreatment with cycloheximide or incubation in serum-free medium. These results suggest that the enhanced post-translational processing of the CSF-1 precursor resulted from activation of a pre-existing cellular protease via a mechanism involving phorbol ester-mediated stimulation of protein kinase C. |
Q:
Extracting prices from html using jQuery
I'm parsing an html document and I need to extract all the prices in it (the format is $99.00). So what I want to do is extract all the elements that contain the substring "Price" (or "price") in its class or id attribute. But I tried using something like $("[class*='Price']") or $("[id*='Price']") and then concatenate the results on an array but the jquery selector part is not working properly, is not finding anything. Am I doing something wrong, or is there a better way to do this? Any suggestions for a better approach?
Thank you.
UPDATE:I'm actually using a jQuery port called phpQuery for php.
UPDATE2: I don't know the exact class or id of the elements since this is a generic script that I will run on different e-commerce sites, so that's why I'm using the *= wildcard to get all elements (mostly a, div, span, etc, I don't need input). I figured it out and this is what I have so far:
function getPrice($doc){
phpQuery::selectDocument($doc);
$prices = array();
foreach(pq("[class*='Price'], [class*='price'], [id*='Price'], [id*='price']") as $res){
$each = pq($res);
if(preg_match('/\$\d+(?:\.\d+)?/', $each->text(), $matches)){
echo '<br>'.$matches[0].'</br>';
$prices[] = $each->html();
}
}
}
This is printing the correct elements. Now I need to extract the font-size of those elements so I can sort the array by font-size.
A:
Select by ID: $("#Price")
Select by Class: $(".Price")
Showing your HTML would help.
|
/*
* Copyright 2004 - 2013 Wayne Grant
* 2013 - 2020 Kai Kramer
*
* This file is part of KeyStore Explorer.
*
* KeyStore Explorer is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* KeyStore Explorer is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with KeyStore Explorer. If not, see <http://www.gnu.org/licenses/>.
*/
package org.kse.utilities.io;
/**
* Indentation sequence.
*
*/
public class IndentSequence {
public static final IndentSequence FOUR_SPACES = new IndentSequence(IndentChar.SPACE, 4);
public static final IndentSequence SINGLE_TAB = new IndentSequence(IndentChar.TAB, 1);
private IndentChar indentChar;
private int indentSize;
/**
* Construct IndentSequence.
*
* @param indentChar
* Indent character
* @param indentSize
* Indent size
*/
public IndentSequence(IndentChar indentChar, int indentSize) {
this.indentChar = indentChar;
this.indentSize = indentSize;
}
/**
* Get indent sequence for level.
*
* @param level
* Indent level
* @return Indent sequence for level
*/
public String toString(int level) {
StringBuilder sb = new StringBuilder();
for (int i = 0; i < level; i++) {
sb.append(toString());
}
return sb.toString();
}
/**
* Get indent sequence.
*
* @return Indent sequence
*/
@Override
public String toString() {
StringBuilder sb = new StringBuilder();
for (int i = 0; i < indentSize; i++) {
sb.append(indentChar.getIndentChar());
}
return sb.toString();
}
/**
* Get the indent character.
*
* @return
*/
public IndentChar getIndentChar() {
return indentChar;
}
}
|
Intranasal oxytocin as an adjunct to risperidone in patients with schizophrenia : an 8-week, randomized, double-blind, placebo-controlled study.
Impairment of oxytocinergic function and/or oxytocin receptor genetic abnormalities has been demonstrated in patients with schizophrenia. Oxytocin reverses emotional recognition deficit and might restore sense of trust in patients with schizophrenia. Some short-term studies have shown efficacy and tolerability of oxytocin in patients with schizophrenia. However, there is a lack of evidence on the efficacy and tolerability of oxytocin in patients with schizophrenia beyond 3 weeks. The objective of this study was to assess the efficacy and tolerability of oxytocin intranasal spray (given as an adjuvant to risperidone) in patients with schizophrenia. This was an 8-week, randomized, double-blind, placebo-controlled study. Inpatients of two large referral psychiatric hospitals in Iran were recruited for the study. Forty patients (male and female gender) aged 18-50 years with a diagnosis of schizophrenia (DSM-IV-TR) who were on a stable dose of risperidone for a minimum of 1 month and who were chronically partially responsive to antipsychotic monotherapy were included in the study. The patients were randomly assigned to oxytocin intranasal spray (Syntocinon(®); Novartis, Basel, Switzerland) or placebo intranasal spray containing normal saline (ACER, Tehran, Iran) for 8 weeks. Oxytocin spray was administered as 20 IU (five sprays) twice a day for the first week followed by 40 IU (ten sprays) twice a day for the following 7 weeks. Placebo spray was administered at the same dose as the oxytocin spray. In addition, participants were on a stable dose of risperidone (5 or 6 mg/day). The patients were assessed using Positive and Negative Syndrome Scale (PANSS) at baseline and at weeks 0, 2, 4, 6 and 8. Primary outcomes were the differences in the PANSS scores between the two groups at the end of the trial. Adverse effects were recorded using a checklist and the Extrapyramidal Symptom Rating Scale (ESRS) at baseline and at weeks 1, 2, 4, 6 and 8. All patients had at least one post-baseline measurement and 37 patients (19 in the oxytocin and 18 in the placebo group) completed the study. Repeated measure analysis of variance showed significant effect for time X treatment interaction on the PANSS total [F(2.291,87.065) = 22.124, p < 0.001], positive [F(1.285,48.825) = 11.655, p = 0.001], negative [F(2.754,104.649) = 11.818, p < 0.001] and general psychopathology [F(1.627,61.839) = 4.022, p = 0.03] subscale scores. By week 8, patients in the oxytocin group showed significantly greater improvement on the positive (Cohen's d = 1.2, 20 % vs. 4 % reduction in score, p < 0.001), negative (Cohen's d = 1.4, 7 % vs. 2 % reduction in score, p < 0.001) and general psychopathology (Cohen's d = 0.8, 8 % vs. 2 % reduction in score, p = 0.021) subscales and total (Cohen's d = 1.9, 11 % vs. 2 % reduction in score, p < 0.001) PANSS scores than the placebo group. Adverse effects including the sodium concentration change were similar between the two groups. Oxytocin as an adjunct to risperidone tolerably and efficaciously improves positive symptoms of schizophrenia. In addition, effects on negative and total psychopathology scores were statistically significant, but likely to be clinically insignificant. The interesting findings from the present pilot study need further replication in a larger population of patients. |
BRCA1 mutation analysis in breast/ovarian cancer families from Greece.
Germline mutations in BRCA1 gene account for varying proportions of breast/ovarian cancer families, and demonstrate considerable variation in mutational spectra coincident with ethnic and geographical diversity. We have screened for mutations the entire coding sequence of BRCA1 in 30 breast/ovarian cancer women with family history of two or more cases of breast cancer under age 50 and/or ovarian cancer at any age. Genomic DNA from patient was initially analyzed for truncating mutations in exon 11 with PTT followed by DNA sequencing. In the cases where no frameshift mutation was observed in exon 11, all other exons were screened with direct sequencing. Two novel (3099delT, 3277insG) and three already described (3741insA, 1623del5-TTAAA, 5382insC-twice) truncating mutations were identified. In addition, 6 point mutations (L771L, P871L, E1038G, K1183R, S1436S, S1613G) which are already classified as polymorphisms were identified. Three unclassified intronic variants (IVS16-68 G>A, IVS16-92 G>A, IVS18+65G>A) were also detected. These results show that BRCA1 deleterious mutations are present in a fraction (20%) of Greek breast/ovarian cancer families similar to other European countries. Mutations were detected in high- (>/=3 members) as well as in moderate-risk (2 members) families. This is the first report of BRCA1 mutation analysis in Greece. |
Player Progress Report
We had a lot of fun this summer counting down the Top 60 players at UM. But now that we're in season, I figured we could keep the theme rolling week-to-week with our very own Player Progress Report.
This Top 10 list will take into account what the players do over the course of the season and what they mean to the team. Injuries are obviously part of the game and the guys who aren't playing could return to the Top 10 once they resume playing.
1. QB Jacory Harris: Provided the type of leadership at quarterback Miami hasn't seen since Ken Dorsey was here. He broke a team record with passing yards against FSU and made every important throw Miami needed him to in the come-from-behind victory. Previous ranking: 2.
2. RB Graig Cooper: Was absolutely electric in his return to special teams, averaging 35.4 yards on five returns. He ran for just 31 yards on seven carries, but scored the winning touchdown and caught another touchdown to help Miami in ints come-from-behind victory against the Noles. Previous ranking: 3.
3. LT Jason Fox: Started his 37th game with a false start, but quickly settled down and helped the Canes protect their quarterback for most of the night. He was also blocking on the side Graig Cooper dashed into the end zone for the winning score. Previous ranking: 4.
4. LB Sean Spence: Rough debut for the ACC's Defensive Rookie of the Year. He had three tackles and got beat for a touchdown. Now, he has to learn how to keep himself in the game even when teams go away from him. Previous ranking: 1.
5. LB Colin McCarthy: Returned from his season-ending shoulder injury a year ago and chalked up seven tackles, second most on the team while battling cramps. Miami's run defense certainly looked a lot better than it did a year ago and McCarthy was a big reason. Previous ranking: 7.
6. DT Allen Bailey: UM's pass rush struggled to get past FSU's stout offensive line. But Bailey was a big reason UM didn't carved up on the ground. He helped stuff the run in the middle and broke through once to sack Ponder before FSU scored on the next play. Still, his value is beginning to show. Previous ranking: 8.
7. DE Marcus Robinson: He made just two tackles but came up with the biggest defensive play of the game when it mattered most, sacking and stripping the ball from Ponder with FSU leading 23-17 and looking to score again at the UM 29-yard line. With Eric Moncur and Adewale Ojomo hurt, his value has shot through the roof. Previous ranking: 11.
8. S Randy Phillips: Miami's secondary had a rough night, but Phillips made plays when he was called upon. He made a diving interception in the end zone before the half and finished third on the team with six tackles. With Vaughn Telemaque and Miami shorthanded with injuries all over its defense, Phillips provided the leadership late when UM's defense needed to make a stop. Previous ranking: 12.
9. WR Travis Benjamin: Even before Aldarius Johnson and LaRon Byrd went down, Benjamin was already making the biggest plays of any Canes receiver. He hauled in a 39-yard touchdown pass to start the game, made a huge third down catch and then put UM in position for go-ahead touchdown on a 40-yard reception at the FSU 2. Big time players make plays... Previous ranking: 17.
10. RB Javarris James: So much for being No. 2 in the backfield. James looked every bit as good as advertised by his teammates. He didn't have a monster night -- 11 carries, 36 yards, 1 TD. But he served notice he's not that slow, injured guy anymore. I especially liked what I saw from him in the passing game as he made two catches for big yards. Previous ranking: 20.
> Knocking on the Top 10 door: CB Brandon Harris (previously 20) and TE Dedrick Epps (previously 19). Harris led UM with nine tackles against FSU and had two pass deflections, including one late in the game to preserve the win. Looks like he's taken the next step and is the Canes best corner. Epps made a nice return with two catches for 46 yards.
> Dropped out of the Top 10: WR Aldarius Johnson (previously 5), WR LaRon Byrd (previously 6), K Matt Bosher (previously 9), OL Orlando Franklin (previously 10). Not easy dropping AJ and Byrd from the Top 10, but they were hurt and now we aren't exactly sure when either will be back. When they do, they can earn their way back into the Top 10. Bosher had a rough day on kickoffs.
> Five on the rise: WR Leonard Hankerson (previously 37), DE Steven Wesley (previously 42), RT Matt Pipho (No. 43), RB Lee Chambers (previously 44), DE Olivier Vernon (previously 45). Hankerson had two drops, but looked improved. Wesley had a nice three yard tackle for a loss. Pipho did a decent job in his first start at right tackle. Chambers is clearly the No. 3 RB and Vernon is without question the most impactful freshman. |
---
abstract: 'A many body theory for a two-component system of spin polarized interacting fermions in a one-dimensional harmonic trap is developed. The model considers two different states of the same fermionic species and treats the dominant interactions between the two using the bosonization method for forward scattering. Asymptotically exact results for the one-particle matrix elements at zero temperature are given. Using them, occupation probabilities of oscillator states are discussed. Particle and momentum densities are calculated and displayed. It is demonstrated how interactions modify all these quantities. An asymptotic connection with Luttinger liquids is suggested. The relation of the coupling constant of the theory to the dipole-dipole interaction is also discussed.'
address: 'Abteilung für Mathematische Physik, Universität Ulm, D89069 Ulm, Germany'
author:
- 'Gao Xianlong and W. Wonneberger'
date: Received 28 August 2001
title: 'Two-component Fermi gas in a one-dimensional harmonic trap'
---
0em
Introduction
============
The achievement of Bose-Einstein condensation in dilute ultracold gases [@ADB95] renewed the interest in fermionic many body systems [@BDL98; @BB98; @ZGOM00] and their superfluid properties [@HFSt97; @BP98; @HSt99; @C99]. Recent experimental successes in obtaining degeneracy in three dimensional Fermi vapors [@DMJ99; @SFCCKMS01] intensified the interest in confined Fermi gases.
Using microtrap technology [@VFP98; @FGZ98; @DCS99; @RHH99], it will become possible in the near future to produce a neutral ultracold quantum gas of quasi one-dimensional degenerate fermions.
In many cases, identical spin polarized fermions experience only a weak residual interaction because s-wave scattering is forbidden. This restriction does not hold for a two-component system of spin polarized fermions and significant interactions between the components are possible. For instance, the dipole-dipole interaction [@GER01] can become relevant, especially in the case of polar molecules [@BBC00].
The confinement of a trapped ultracold gas can be realized by a harmonic potential, which is more realistic than trapping between hard walls (“open boundary conditions”). The latter system of interacting one-dimensional fermions constitutes a bounded Luttinger liquid, which allows an exact treatment for certain types of interactions [@C84; @EA92; @FG95; @EG95; @WVF96; @MEJ97; @VYG00].
In this article, we consider a quasi one-dimensional spin polarized Fermi gas composed of an equal number of atoms in two different internal states and confined by a harmonic potential. One possible realization consists of trapped (electron) spin polarized fermions in two different hyperfine states as discussed in [@HFSt97] for the case of $^6Li$.
We consider the inter-component interaction between the two components. As in [@WW01], we apply the bosonization method known from the Luttinger model (for reviews we refer to [@E79; @V95; @Sch95]) to treat the interactions. The generalization to two components is analogous to the inclusion of spin $\hbar/2$ into the Luttinger model [@LE74]. The bosonization method relies on fermion-boson transmutation in one spatial dimension: Physical quantities can be calculated in a bosonic formulation instead of the fermionic theory, and the two calculations give the same answer [@DL73; @F76; @GMR79; @Haldane].
We show how interactions modify the one-particle properties of the two-component Fermi gas. Results for the non-interacting Fermi gas in a one-dimensional harmonic trap were given in [@VMT00; @GWSZ00].
The paper is organized as follows. Section II develops the theory for the two-component case. Section III applies the theory to the calculation of the one-particle matrix elements. In Section IV, occupation probabilities, off-diagonal matrix elements, and densities of particles and momenta are evaluated numerically for two different interaction models. Section V discusses the problem of the Fermi edge in the present case and a possible relation to the standard Luttinger model result is pointed out. In Section VI, the relation of the coupling constant of the theory to the dipole-dipole interaction is discussed. An Appendix is concerned with the bosonization procedure for bilinear forms of auxiliary fields in the case of two components.
Two-Component Theory
====================
The two component Fermi gas of uniform mass $m_A$ is confined by the one-dimensional harmonic potential
$$\label{1.1}
V(z) = \frac{1}{2} m_A \omega ^2 _{\ell} z^2,$$
with longitudinal trap frequency $\omega _\ell$. The unperturbed Hamiltonian in second quantization is
$$\label{1.2}
\hat{H}_0 = \sum^\infty _{n=0,\sigma=\pm 1} \hbar \omega _n\,\hat{c}^+_{n \sigma}
\hat{c}_{n \sigma}.$$
The index $\sigma=\pm 1$ refers to the two components and $\hat{c}_{n \sigma}^+$ creates a fermion of species $\sigma$ in the oscillator state $|n \rangle$.
The one-particle energies
$$\label{1.2a}
\hbar \omega _n = \hbar \omega _{\ell} (n+1/2),\,\,\, n=0,1,...\,,$$
are seen to depend linearily on the quantum number $n$ of oscillator states. This is one of the requirements for bosonization. In addition, exact solvability rests on the presence of an anomalous vacuum (cf. [@E79; @V95; @Sch95]), which is constructed by extending the linear dispersion of oscillator states to arbitrarily negative energies and then filling all states of negative energy. However, the anomalous vacuum has little effect for processes near the Fermi energy $\epsilon _F = \hbar \omega _\ell(N-1/2) $ provided $N$ is sufficiently large [@Haldane], making the treatment asymptotically exact.
The success of the Luttinger model is based on the possibility to express forward scattering processes entirely in terms of the density fluctuation operators. For the two component system, these operators are
$$\begin{aligned}
\label{1.3}
\hat{\rho}_\sigma (p) \equiv \sum _{q} \hat{c}^+_{q+p\, \sigma} \hat{c}_{q \sigma}. \end{aligned}$$
Due to the presence of the anomalous vacuum, they obey bosonic commutation relations
$$\begin{aligned}
\label{1.4}
[\hat{\rho}_\sigma (-p), \hat{\rho}_{\sigma'} (q)] = p\, \delta _{\sigma, \sigma'}\,
\delta _{p,q}.\end{aligned}$$
In our case, the interaction Hamiltonian is given by a two particle interaction
$$\begin{aligned}
\label{1.5}
\hat{V} =\frac{1}{2} \sum _{mnpq,\sigma,\sigma'}
V(m \sigma',p \sigma;q\sigma',n \sigma)\,(\hat{c}^+_{m \sigma'} \hat{c}_{q \sigma'} )
( \hat{c}^+_{p \sigma} \hat{c}_{n \sigma})\end{aligned}$$
without “component flip”, i.e., the possibility for a fermion to change its state $\sigma$ in the collision process is excluded.
The case $\sigma = \sigma\prime$ corresponds to a weak intra-component interaction $V_\parallel$, while $\sigma = -\sigma \prime$ is a relevant inter-component interaction $V_\perp$.
Similar to [@WW01], two cases of solvable forward scattering processes can be identified:
$$\label{1.6}
\hat{V} = \hat{V_a}+\hat{V_b}$$
with
$$\begin{aligned}
\label{1.7}
\hat{V_a}&=&\frac{1}{2} \sum _{p,\sigma} V_{a \parallel}(|p|)\, \hat{\rho} _{\sigma}(-p)
\,\hat{\rho}_{\sigma}(p)+\frac{1}{2} \sum _{p,\sigma} V_{a \perp}(|p|)\,\hat{\rho}_{- \sigma}(-p)
\,\hat{\rho}_{\sigma}(p),
\\[3mm]\nonumber
\hat{V_b}&=&\frac{1}{2} \sum _{p,\sigma} V_{b \parallel}(|p|)\,\hat{\rho}_{\sigma}(p)\,
\hat{\rho}_{\sigma}(p)+\frac{1}{2} \sum _{p,\sigma} V_{b \perp}(|p|)\,\hat{\rho}_{\sigma}(p)
\hat{\rho}_{-\sigma}(p).\end{aligned}$$
The coupling functions $V_{a \perp}$ and $V_{b \perp}$ are the analogues of $g_{4 \perp}$ and $g_{2 \perp}$ of the Luttinger model.
Forward scattering dominates when the pair interaction is sufficiently long ranged, e.g., in the case of dipole-dipole interactions. In [@GW01], a detailed discussion is given, how the assumed forms (\[1.7\]) can be related to real scattering potentials.
The case of two components requires canonical transformations to mass fluctuation operators
$$\begin{aligned}
\label{1.8}
\hat{\rho}(p)\equiv \frac{1}{\sqrt{2}}\,\left[\hat{\rho}_+(p)+\hat{\rho}_-(p)\right],\end{aligned}$$
and component fluctuation operators
$$\begin{aligned}
\label{1.9}
\hat{\sigma}(p)\equiv\frac{1}{\sqrt{2}}\,\left[\hat{\rho}_+(p) -\hat{\rho}_-(p)\right],\end{aligned}$$
such that the Hamiltonian for low lying excitations separates into $\tilde{H}=\tilde{H}_\rho + \hat{H}_\sigma$ in analogy to the spin $1/2$ case [@LE74] of the Luttinger model.
The transformation to new bosonic operators
$$\begin{aligned}
\label{1.10}
\hat{\rho} (p) = \left \{
\begin{array}{lll}
\sqrt{|p|} & \hat{d}_{|p|+}, & p< 0,\\
\sqrt{p} & \hat{d}^+_{p+}, & p> 0,
\end{array} \right.\quad
\hat{\sigma} (p) = \left \{
\begin{array}{lll}
\sqrt{|p|} & \hat{d}_{|p|-}, & p< 0,\\
\sqrt{p} & \hat{d}^+_{p-}, & p> 0,
\end{array} \right. \end{aligned}$$
leads to canonical commutation relations
$$\begin{aligned}
\label{1.11}
[\hat{d}_{m \mu}, \hat{d}^+_{n \nu} ] = \delta _{\mu, \nu}\,\delta _{m, n}. \end{aligned}$$
The new label $\nu=\pm 1$ refers to mass and component fluctuations.
The bosonic version of the unperturbed Hamiltonian in the N-fermion sector is [@Haldane; @deK35]:
$$\begin{aligned}
\label{1.12}
\tilde{H}_0 = \frac{\hbar \omega _\ell}{2}\, \sum _{m>0,\nu} m \,\left\{\hat{d}^+_{m \nu}
\hat{d}_{m \nu} +\hat{d}_{m \nu} \hat{d}^+_{m \nu} \right\}.\end{aligned}$$
The complete bosonic interaction operator becomes
$$\begin{aligned}
\label{1.13}
\hat{V} &=& \frac{1}{2} \sum _{m>0,\nu} m
[V_{a\parallel} (m)+\nu \,V _{a \perp} (m) ]
\left\{\hat{d}^+_{m \nu}
\hat{d}_{m \nu} +\hat{d}_{m \nu} \hat{d}^+_{m \nu} \right\}
\\[4mm]\nonumber
&+& \frac{1}{2} \sum _{m>0,\nu} m
[V_{b\parallel} (m)+\nu \,V _{b \perp} (m) ]
\left\{ \hat{d}^{+2}_{m \nu} + \hat{d}^2_{m \nu} \right\}. \end{aligned}$$
The total bosonic Hamiltonian is diagonalized in a standard way using the Bogoliubov transformation
$$\begin{aligned}
\label{1.13a}
\hat{d} _{m \nu} =\hat{S}^+\hat{f}_{m \nu}\hat{S}
= \hat{f} _{m \nu} \cosh \zeta _{m \nu} - \hat{f}^+ _{m \nu} \sinh \zeta _{m \nu}, \end{aligned}$$
with
$$\begin{aligned}
\label{1.13b}
\hat{S}=\exp \left\{\frac{1}{2}\sum _{m>0, \nu=\pm 1}\zeta _{m \nu}(\hat{f}_{m \nu}^2
-\hat{f}^{+2}_{m \nu}) \right\}.\end{aligned}$$
The transformation parameters $\zeta _{m \nu}$ are determined by the diagonalization conditions
$$\label{1.14}
\tanh(2 \zeta _{m \nu}) = \frac{V_{b \parallel} (m)+\nu\,V_{b \perp} (m)}
{\hbar \omega _\ell + V_{a\parallel} (m)+\nu V_{a \perp} (m) }.$$
Finally, we arrive at the free bosonic Hamiltonian
$$\begin{aligned}
\label{1.15}
\tilde{H}=\sum _{m>0,\nu} m\,\epsilon _{m \nu} \hat{f}^+_{m \nu} \hat{f}_{m \nu}
+\mbox{const.}, \end{aligned}$$
describing density wave excitations in the two-component Fermi gas. The excitation spectra are
$$\label{1.16}
\epsilon _{m \nu} = \frac{ \hbar \omega _\ell + V_{a \parallel} (m) + \nu V_{a \perp} (m)}
{\cosh(2 \zeta _{m \nu})}.$$
In connection with the calculation of one-particle matrix elements, scaled coupling constants
$$\begin{aligned}
\label{1.17}
\alpha _{m \nu} \equiv \frac{1}{2}\, \sinh(2 \zeta _{m \nu}),\quad
\gamma _{m \nu} \equiv \sinh^2 \zeta _{m \nu}\end{aligned}$$
will appear.
Usually, the intra-component scattering is negligible ($V_\parallel \rightarrow 0$, the case $V_\parallel \ne 0$ was considered in [@WW01] for the one-component system) and dominant forward scattering for the inter-component part results [@GW01] in
$$\begin{aligned}
\label{1.18}
V_{a \perp}(m)= V_{b \perp}(m) \equiv V(m)\,\hbar\,\omega _\ell.\end{aligned}$$
Then the simpler relations
$$\begin{aligned}
\label{1.19}
\epsilon _{m \nu} = \hbar \omega _\ell\,\sqrt{1+ 2 \nu\,V(m)},\quad
\alpha _{m \nu} = \frac{\nu\,V(m)}{2 \sqrt{1+ 2 \nu\,V(m)}}\end{aligned}$$
hold for $|V(m)|<\hbar \omega _\ell/2$.
Following [@WW01], we will also consider two specific interaction models: A simplified model IM1, when only one mode $V(m)=V(1)(\delta _{m,1}+
\delta _{m,-1})$ contributes. This model preserves many of the features of the interaction in the full model (interaction model 2, see IM2 below), when infinitely many modes are superimposed.
In the case of IM1, the relevant coupling constants are
$$\begin{aligned}
\label{1.20a}
\zeta _{1 \nu} = \frac{1}{2}\,\mbox{artanh}\left(\frac{\nu\,V(1)}{1 +\nu V(1)}
\right),\quad
\alpha _{1 \nu} = \frac{1}{2}\sinh(2 \zeta _{1 \nu}),\quad
\gamma _{1 \nu} = \frac{1}{2}\left(\sqrt{1+4\,\alpha _{1 \nu}^2}-1 \right).\end{aligned}$$
In the case of IM2, the coupling constants decay exponentially according to
$$\begin{aligned}
\label{1.20b}
\alpha _{m \nu}=\exp(-r_\alpha m/2)\,\alpha _{0 \nu},\quad
\alpha _{0 \nu} = \exp(r_\alpha/2 )\,\alpha _{1 \nu},\quad
\gamma _{m \nu} = \exp(-r_\gamma m)\,\gamma _0, \quad \gamma _{0 \nu} =\exp(r_\gamma)
\,\gamma _{1 \nu}.\end{aligned}$$
An essential step in the actual calculation of physical quantities is the connection between fermionic operators and bosonic fields. The bosonization of fermion generation and destruction operators is completely solved for the Luttinger model [@Haldane; @LP74; @M74; @HSU80].
In the present case, the situation is less comfortable: Apart from the above association of mass and component fluctuation operators with the $\hat{d}$ operators, we can bosonize only bilinear forms of an auxiliary field following the prescription of [@SchM96]. The auxiliary field is defined by
$$\label{1.21}
\hat{\psi} _{a \sigma} (v) \equiv \sum^\infty _{l=-\infty} e^{ilv} \hat{c}_{l \sigma}
= \hat{\psi}_{a \sigma} (v + 2 \pi).$$
The Appendix demonstrates that the required bosonization for a two-component Fermi gas is
$$\begin{aligned}
\label{1.22}
\hat{\psi}^+_{a \sigma} (u) \hat{\psi}_{a \sigma} (v) = G_N ( u - v )
%\\[4mm]\nonumber
\,\exp \left\{ - i \left( \hat{\phi}_\sigma^+(u) - \hat{\phi}_\sigma^+(v) \right) \right\}
\,\exp \left\{ - i \left(\hat{\phi}_\sigma (u) -\hat{\phi}_\sigma (v) \right) \right\},\end{aligned}$$
using the two-component non-Hermetian bosonic field
$$\begin{aligned}
\label{1.23}
\hat{\phi}_\sigma (v) = -i \sum^\infty _{n = 1} \frac{1}{ \sqrt {2 n} }\, e^{i n v}
\,(\hat{d}_{n+} +\sigma \hat{d}_{n-})\neq \hat{\phi}_\sigma^+(v).\end{aligned}$$
The distribution-valued prefactor $G_N (u)$ is the same as in [@SchM96]:
$$\begin{aligned}
\label{1.24}
\quad G_N (u) = \sum^{N-1} _{l = - \infty} e^{-i l (u+i \eta)}.\end{aligned}$$
One-Particle Matrix Elements
============================
The above prescription allows to calculate analytically all m-particle matrix elements of bilinear fermion operators.
It is not difficult to carry the calculation of one-particle matrix elements in [@WW01] over to the present case of two components:
$$\begin{aligned}
\label{1.25}
\langle \hat{c}^+ _{n \sigma} \hat{c}_{q \sigma} \rangle =
\sum _{l=-\infty}^{N-1} \int^{2 \pi}_0 \int^{2 \pi}_0 \,\frac{du dv}{4 \pi^2}
%\\[4mm]\nonumber
e^{i(n-l)(u+i \epsilon) - i(q-l)(v-i \epsilon)}
%\\[4mm]\nonumber
\langle e^{-i \hat{\phi}_\sigma^+ (u) + i \hat{\phi}_\sigma^+ (v)}
e^{-i \hat{\phi}_\sigma (u) + i \hat{\phi}_\sigma (v)} \rangle. \end{aligned}$$
Using the bosonic Wick theorem, the expectation value $\langle \quad\rangle \equiv \exp[-W_\sigma]$ on the r.h.s. can be evaluated. At zero temperature, the function $W_\sigma$ is given by
$$\begin{aligned}
\label{1.26}
W_\sigma= W_\sigma(u,v) = \sum _\nu \sum^\infty _{m=1} \frac{1}{m}
\left[\gamma _{m \nu} - \alpha _{m \nu} \,\cos m(u + v) \right]
%\\[4mm]\nonumber
\left\{ 1 - \cos m (u - v) \right\}.\end{aligned}$$
This quantity is independent of component label $\sigma$, as expected.
Comparing (\[1.26\]) with (39) in [@WW01], it is seen that the effective coupling constants in the two-component case are
$$\begin{aligned}
\label{1.26a}
\bar{\alpha} _m=\frac{1}{2}\,\sum _{\nu=1}^2 \alpha _{m \nu},\quad
\bar{\gamma} _m=\frac{1}{2}\,\sum _{\nu=1}^2 \gamma _{m \nu}.\end{aligned}$$
W is a real and an even function of its arguments leading to the symmetries
$$\begin{aligned}
\label{1.27}
\langle \hat{c}^+ _{n \sigma} \hat{c} _{q \sigma} \rangle =\langle \hat{c}^+ _{q \sigma}
\hat{c} _{n \sigma} \rangle
=\langle \hat{c}^+ _{n \sigma} \hat{c} _{q \sigma} \rangle^*\end{aligned}$$
and to the condition $n+q=2m$, $m=0,1,2,...\,$.
For the interaction model IM1, one of the integrations in (\[1.26\]) can be performed giving the closed expression for the matrix elements of each component:
$$\begin{aligned}
\label{1.28}
M(m,p)\equiv \langle \hat{c}^+_{m-p}\hat{c}_{m+p}\rangle=\frac{1}{2}\delta _{p,0}
%\\[4mm]\nonumber
-&&\frac{1}{2\pi}\int _{-\pi}^\pi ds\left\{\frac{\sin((m+1/2-N)s)}{2 \sin(s/2)}\right\}
\\[4mm]\nonumber
&&\times\exp[-2 \bar{\gamma} _{1}(1-\cos(s))]\,I_p(2 \bar{\alpha} _{1}(1-\cos(s))).\end{aligned}$$
Due to the factor $\{\sin(...)\}$, the following symmetries hold:
$$\begin{aligned}
\label{1.29}
\langle \hat{c}^+ _{2N-1-m-p \,\sigma}\hat{c} _{2N-1-m+p \,\sigma} \rangle
= \delta _{p,0}-\langle \hat{c}^+ _{m-p \,\sigma}\hat{c} _{m+p \,\sigma} \rangle.\end{aligned}$$
Similarily, IM2 leads to:
$$\begin{aligned}
\label{1.30}
M(m,p)=%\langle \hat{c}^+ _{M-p}\hat{c} _{M+p}\rangle =
\frac{1}{2}\,\delta _{p,0}
%\\[4mm]\nonumber
-&&\int^{\pi}_{-\pi}\frac{dt}{2 \pi}\, \frac{\cos(p \,t)}{[1+Z_\alpha-\cos(t)]
^{\bar{\alpha} _{0}}}
%\\[4mm]\nonumber
\,\int^{\pi}_{-\pi} \frac{ds}{2 \pi}\,\left\{\frac{\sin((m+1/2-N)s)}{2 \sin(s/2))}\right\}
\\[4mm]\nonumber
&&\times\left[\frac{Z_\gamma}{1+Z_\gamma-\cos(s)}\right]^{\bar{\gamma} _{0}}
%\\[4mm]\nonumber
\,[(1+Z_\alpha - \cos(t-s))(1+Z_\alpha-\cos(t+s))]^{\bar{\alpha} _{0}/2}, \end{aligned}$$
with decay parameters
$$\begin{aligned}
\label{1.31}
Z_\gamma=\cosh(r_\gamma)-1,\quad Z_\alpha=\cosh(r_\alpha/2)-1.\end{aligned}$$
Numerical Results
=================
The main results of the paper are the formulae (\[1.28\]) and (\[1.30\]) for the one-particle matrix elements. They are identical in form to those in [@WW01], depend, however, differently on the coupling constants. This leads to very different physical predictions, which are presented in a number of figures for fermion numbers $2N=14+14$.
Using (\[1.14\]) and (\[1.17\]), it is found that the main coupling parameters $\bar{\alpha}_m$
$$\begin{aligned}
\label{2.1}
\bar{\alpha} _m =\frac{V(m)}{4}\left\{\frac{1}{\sqrt{1+2\,V(m)}}
-\frac{1}{\sqrt{1-2\,V(m)}} \right\} \end{aligned}$$
are non-positive and even functions of the interactions $V(m)$: Irrespective of the sign of the interaction between the two components, the effective interaction in each component of the Fermi gas is attractive.
In the case of IM1, only $\bar{\alpha}_1$ is needed as input parameter in the calculation of the matrix elements. $|V(1)|$ is obtained via (\[2.1\]) and all other quantities such as $\zeta _{1 \nu}$ and $\bar{\gamma}_1$ can be calculated from (\[1.20a\]) and (\[1.26a\]).
We start with the discussion of the occupation probabilities $P(m) \equiv M(m,p=0)$ of oscillator states as shown in Fig. 1. It is seen that interactions smooth out the Fermi edge at $m_F=N-1$, but still leave a gap (not an energy gap!) at $m_F$.
Fig. 2 displays the off-diagonal matrix elements for $p=1$. They are significant near the Fermi edge $m_F=N-1$ and cannot be neglected. Their values increase further with increasing coupling strength.
We also present results for the particle density and the momentum density. Both are expected to show Friedel oscillations [@F58] as noted in [@WW01; @GWSZ00]. In agreement with [@WW01], the effective intra-component interaction, which is always attractive, suppresses the Friedel oscillations in the particle density
$$\begin{aligned}
\label{2.2}
n (z) = \sum _{m = 0}^\infty\sum _{p=-m}^m \psi _{m-p}
(z)\,\psi _{m+p} (z)\,M(m,p),\end{aligned}$$
as is seen in Fig. 3. In (\[2.2\]), $\psi _m(z)$ is the oscillator state $|m \rangle $ in position representation.
Conversely, the Friedel oscillations in the momentum density
$$\begin{aligned}
\label{2.3}
p(k)=\sum _{m = 0}^\infty\sum _{p=-m}^m (-1)^p \,\psi _{m-p}
(k)\,\psi _{m+p} (k)\,M(m,p)\end{aligned}$$
are enhanced [@WW01]. This is displayed in Fig. 4 for strong coupling ($\bar{\alpha}_1=-10$). We have chosen the oscillator length $\ell \equiv \sqrt{\hbar/(m_A\,\omega _\ell)}$ as unit of length, rendering $n(z)$ and $z$ as well as $p(k)$ and $k$ dimensionless.
In the case of IM2, some modifications occur. We again set $\bar{\alpha}_1
=-1$. We need $\bar{\alpha}_m$ and $\bar{\gamma}_m$ ($m=0,1,2...$) for the evaluation of (\[1.30\]). This requires the knowledge of the decay constants $r_\alpha$ and $r _\gamma$ (cf. (\[1.20b\])). For convenience, we set $r_\alpha =r_\gamma \equiv r$ and estimate $r$ by the following argument: The minimum wave number increment in the trap is $\Delta k \approx 1/L_F \propto
1/\sqrt{N}$, where $L_F=\sqrt{2N-1}$ is the half-width of the classically allowed region at the Fermi energy. We, therefore, set $r \approx 1/\sqrt{N}$ or roughly $r=0.3$ for the present case $N=14$. This gives $\bar{\alpha}_0=-1.16$ for $\bar{\alpha}_1 =-1$ and $\bar{\gamma}_0=1.19$.
Fig. 5 shows the occupation probabilities of oscillator states for IM2. It is seen that they are more smoothly distributed than in the case of IM1, but still leave a gap at the Fermi edge.
Finally, we show the momentum density for IM2 in Fig. 6. The Friedel oscillations are still recognizable for small momenta, but strongly suppressed for momenta approaching $k_F=\sqrt{2N-1}$.
The off-diagonal matrix elements are significantly smaller for IM2 than for IM1. Nevertheless, they cannot be neglected: By comparing (\[2.2\]) with (\[2.3\]), it is seen that particle and momentum density would coincide in such an approximation.
Fermi Edge
==========
Fig. 1 and also Fig. 5 do not show the gapless distribution of occupation probabilities near the Fermi edge $m_F=N-1$, which is characteristic of a Luttinger liquid, i.e., our system is not a Luttinger liquid. This cannot be expected because the system is finite.
We can, however, get a glimpse at Luttinger liquid behaviour in a special limit, which also presupposes a large particle number $N$.
First, we consider a very slow decay of the interaction modes $V(m)$ in IM2, i.e., $r_\alpha \rightarrow r_\gamma \ll 1$. The factor
$$\begin{aligned}
\label{3.1}
\left[\frac{Z_\gamma}{1+Z_\gamma-\cos(s)}\right]^{\bar{\gamma} _0}\rightarrow
\left(\frac{r_\gamma^2}{r_\gamma^2+s^2}\right)^{\bar{\gamma} _0}\end{aligned}$$
in the large square brackets of the integrand in (\[1.30\]) then becomes sharply localized at $s=0$.
We now calculate the occupation probability $P(\Delta k_n)$
$$\begin{aligned}
\label{3.2}
\langle \hat{c}^+ _{N-1+n}\hat{c} _{N-1+n} \rangle =
\langle \hat{c}^+ _{\Delta k_n}\hat{c} _{\Delta k_n} \rangle\equiv P(\Delta k_n) \end{aligned}$$
near the Fermi edge and for $N \gg 1$. $P(\Delta k_n)$ becomes a quasi continuous function of the wave number deviation $\Delta k_n =k_n-k_F= n/L_F \rightarrow \Delta k$, provided $|n|\ll \mbox{min}(N,1/r_\gamma)$ is fulfilled. Using (\[3.1\]) in (\[1.30\]) we obtain
$$\begin{aligned}
\label{3.3}
P(\Delta k) =\frac{1}{2}-
\left[_3 F_2\left(\bar{\gamma}_0,\frac{1}{2},1;1,\frac{3}{2};-\left(\frac{\pi}
{r_\gamma}\right)^2 \right)\,r_{\gamma} \,L_F\right] \, \Delta k\end{aligned}$$
in terms of a generalized hypergeometric function. It is seen that $P(\Delta k)$ depends linearly on the wave number deviation in a small region near the Fermi edge. This can be compared with the Luttinger liquid prediction (cf. e.g., [@V95])
$$\begin{aligned}
\label{3.4}
P_{LL}(\Delta k) =\frac{1}{2}-\mbox{sgn}\,(\Delta k)\, C \,|\Delta k|^\beta.\end{aligned}$$
$C$ is a constant and the exponent $\beta$ depends on the Luttinger liquid coupling strength $\gamma _{LL}$ according to
$$\begin{aligned}
\label{3.5}
\quad \beta =2 \gamma _{LL}\quad \mbox{for}\,\, \gamma _{LL} < \frac{1}{2}, \end{aligned}$$
and
$$\begin{aligned}
\beta=1 \quad \mbox{for}\,\, \gamma _{LL} \ge \frac{1}{2}.\end{aligned}$$
We conclude that the above limit of our model agrees with the case $\gamma _{LL} \ge 1/2$ of the Luttinger liquid.
Discussion and Summary
======================
For the interaction to become significant in the quantities calculated, its strength $V(1)$ should be as large as $|V(1)| \stackrel{<}{\approx} 0.5 $. We demonstrate that this condition is within experimental reach.
To this order, we consider the dipole-dipole interaction [@GER01]. It is marginally long ranged and thus favors forward scattering. In [@GW01], it is shown that the inter-component interaction between longitudinally aligned dipoles reduces exactly to the effective one-dimensional potential
$$\tilde{V}_{\rm 1D}(k)=-\frac{\mu _0 \mu^2 \alpha _t^2}{2 \pi}
\left[1-\frac{k^2}{2 \alpha _t^2} \,\exp\left(\frac{k^2}{2 \alpha _t^2}\right)\,
{\rm Ei}\left(-\frac{k^2}{2 \alpha _t^2}\right)\right]$$
in momentum space. Here, $\alpha _t$ is the inverse of the transverse oscillator length, $\mu$ the magnetic dipole moment, and ${\rm Ei}$ denotes the exponential integral.
Using this equation in the exact formula (A.13) in [@WW01], $V(1)$ for $N=14$ is found to be
$$V(1) = 0.8 \,\left(\frac{\mu _0 \mu^2 m_A^{3/2} \omega _\ell^{1/2}}{2 \pi \hbar^{5/2}}
\right)\,\frac{1}{F}.$$
The quantity $F$ denotes the filling factor $F=N \omega _\ell/\omega _t$. For example in $^{53}{\rm Cr}$, $V(1)$ becomes of the required magnitude provided $F$ is very small, i.e., the trap is highly anisotropic.
In summary, the bosonization method has been used to construct a theory for a two component gas of spin polarized fermions in a one-dimensional harmonic potential with forward scattering between the two components. Asymptotic results with respect to the fermion number $N$ were obtained for the one-particle matrix elements and used to discuss occupation probabilities for oscillator states, off-diagonal matrix elements, and distribution functions for particles and momenta in the harmonic trap. All these quantities can be significantly affected by the attractive interaction generated within each component. Specifically, the Friedel oscillations in the particle density are suppressed, while they survive in the momentum density.
It has to be seen, whether the predicted Friedel oscillations can be observed experimentally. The amplitudes of the Friedel oscillations scale as $1/N$ [@GWSZ00], hence Friedel oscillations are unobservable in a macroscopic bounded Fermi sea. Small particle numbers pose, however, severe detection problems. A conceivable experimental method to observe Friedel oscillations for atom numbers of the order of $100$ is indicated in [@GWSZ00]. The method proposes microfabrication techniques to produce arrays of microtraps.
On the other hand, the asymptotic bosonization method requires particle numbers, which are not too small. This is due to the presence of the anomalous vacuum, which couples to the real particles. For instance, the sum rule $\sum _n P(n) =N$ gives a somewhat larger value than the number $N$ of real particles when (\[1.28\]) or (\[1.30\]) are used. The excess $\Delta N >0$ grows with coupling strength and decreasing particle number. For $N=14$ and very strong coupling $\bar{\alpha} _1 =-10$, $\Delta N$ is about $8 \cdot 10^{-3}$, for $\bar{\alpha} _1=-1$, $\Delta N$ is less than $10^{-10}$.
The atom number $2N=14+14$ and the coupling values employed here are appropriate to give visible Friedel oscillations and reliable results of the bosonization method.
[**Acknowledgements**]{}: The authors thank S. N. Artemenko, F. Gleisberg, and W. P. Schleich for valuable discussions and the Deutsche Forschungsgemeinschaft for financial support.
Appendix
========
In this Appendix, we extend the bosonization procedure in [@SchM96] to the case of two components.
Instead of $\hat{d}_{p \pm}$ operators, which are needed for the diagonalization of the interacting Hamiltonian, the following set of operators play the role of the $\hat{b}$ and $\hat{b}^+$ operators ($n \ge 1$) in [@SchM96]:
$$\begin{aligned}
\label{A.1}
\hat{b}^+_{n \sigma}\equiv \frac{1}{\sqrt{2}}\,[\hat{d}^+_{n +}+\sigma \hat{d}^+_{n -} ],
\quad\hat{b}_{n \sigma}\equiv \frac{1}{\sqrt{2}}\,[\hat{d}_{n +}+\sigma \hat{d}_{n -} ].\end{aligned}$$
They are canonical conjugates. Evidently:
$$\begin{aligned}
\label{A.2}
\hat{b}^+_{n \sigma}\equiv \frac{1}{\sqrt{n}}\,\hat{\rho}_\sigma(n). \end{aligned}$$
Then the two relations hold
$$\begin{aligned}
\label{A.3}
[\hat{b}^+_{n \sigma},\hat{c}^+_{k \sigma'}\hat{c}_{l \sigma'}]
&=&\delta _{\sigma,\sigma'}\,\frac{1}{\sqrt{n}}\,(\hat{c}^+_{k+n \sigma}\hat{c}_{l \sigma}
-\hat{c}^+_{k \sigma}\hat{c}_{l-n \sigma}),
\\[4mm]\nonumber
[\hat{b}_{n \sigma},\hat{c}^+_{k \sigma'}\hat{c}_{l \sigma'}]
&=&\delta _{\sigma,\sigma'}\,\frac{1}{\sqrt{n}}\,(\hat{c}^+_{k-n \sigma}\hat{c}_{l \sigma}
-\hat{c}^+_{k \sigma}\hat{c}_{l+n \sigma}).\end{aligned}$$
Following the arguments in [@SchM96], the associated Bose fields for $\sigma=\sigma'$ are
$$\begin{aligned}
\label{A.4}
\hat{\phi}_\sigma (v) = -i \sum^\infty _{n = 1} \frac{1}{ \sqrt {n} }\, e^{i n v}
\,\hat{b}_{n \sigma}
\equiv -i \sum^\infty _{n = 1} \frac{1}{ \sqrt {2 n} }\, e^{i n v}
\,(\hat{d}_{n+} +\sigma \hat{d}_{n-})\neq \hat{\phi}_\sigma^+(v).\end{aligned}$$
[111111]{}
M. H. Anderson [*et al.*]{}, Science [**269**]{}, 198 (1995); K. B. Davis [*et al.*]{}, Phys. Rev. Lett. [**75**]{}, 3969 (1995); C. C. Bradley [*et al.*]{}, [*ibid.*]{} [**75**]{}, 1687 (1995).
F. Brosens, J. T. Devreese, and L. F. Lemmens, Phys. Rev. E [**57**]{}, 3871 (1998).
G. M. Bruun and K. Burnett, Phys. Rev. A [**58**]{}, 2427 (1998).
M. A. Zaluska-Kotur, M. Gajda, A. Orlowski, and J. Mostowski, Phys. Rev. A [**61**]{}, 033613 (2000).
M. Houbiers, R. Ferwerda, H. T. C. Stoof, W. I. McAlexander, C. A. Sackett and R. G. Hulet, Phys. Rev. A [**56**]{}, 4864 (1997).
M. A. Baranov and D. S. Petrov, Phys. Rev. A [**58**]{}, R801 (1998).
M. Houbiers and H. T. C. Stoof, Phys. Rev. A [**59**]{}, 1556 (1999).
R. Combescot, Phys. Rev. Lett. [**83**]{}, 3766 (1999).
B. DeMarco and D. S. Jin, Science [**285**]{}, 1703 (1999).
F. Schreck, G. Ferrari, K. L. Corwin, J. Cuizolles, L. Khaykovich, M.-O. Mewes, and C. Salomon, Phys. Rev. A [**64**]{}, 011402(R) (2001).
V. Vuletic, T. Fischer, M. Praeger, T. W. Hänsch, and C. Zimmermann, Phys. Rev. Lett. [**80**]{}, 1634 (1998).
J. Fortagh, A. Grossmann, C. Zimmermann, and T. W. Hänsch, Phys. Rev. Lett. [**81**]{}, 5310 (1998).
J. Denschlag, D. Cassettari, and J. Schmiedmayer, Phys. Rev. Lett. [**82**]{}, 2014 (1999).
J. Reichel, W. Hänsel, and T. W. Hänsch, Phys. Rev. Lett. [**83**]{}, 3398 (1999).
K. Goral, B-G. Englert, and K. Rzazewski, Phys. Rev. A [**63**]{}, 033606 (2001).
H. L. Bethlem, G. Berden, F. M. H. Crompvoets, R. T. Jongma, A. J. A. van Roij, and G. Meijer, Nature (London) [**406**]{}, 491 (2000).
J. L. Cardy, J. Phys. A [**17**]{}, L385 (1984).
S. Eggert and I. Affleck, Phys. Rev. B [**46**]{}, 10866 (1992).
M. Fabrizio and A. O. Gogolin, Phys. Rev. B [**51**]{}, 17827 (1995).
R. Egger and H. Grabert, Phys. Rev. Lett. [**75**]{}, 3505 (1995).
Y. Wang, J. Voit, and Fu-Cho Pu, Phys. Rev. B [**54**]{}, 8491 (1996).
A. E. Mattsson, S. Eggert, and H. Johannesson, Phys. Rev. B [**56**]{}, 15615 (1997).
J. Voit, Yupeng Wang, and M. Grioni, Phys. Rev. B [**61**]{}, 7930 (2000).
W. Wonneberger, Phys. Rev. A [**63**]{}, 063607 (2001).
V. J. Emery, [*Theory of the One-Dimensional Electron Gas*]{}, in [*Highly Conducting One-Dimensional Solids*]{}, edited by J. T. Devreese, R. P. Evard, and V. E. van Doren (Plenum, New York, 1979), p247.
J. Voit, Rep. Prog. Phys. [**58**]{}, 977 (1995).
H. J. Schulz [*Fermi Liquids and Non-Fermi Liquids*]{}, in [*Mesoscopic Quantum Physics*]{}, edited by E. Akkermans, G. Montambaux, J.-L. Pichard, and J. Zinn-Justin (Elsevier, Amsterdam, 1995), p533.
A. Luther and V. J. Emery, Phys. Rev. Lett. [**33**]{}, 589 (1974).
I. E. Dzyaloshinskii and A. I. Larkin, Zh. Eksp. Teor. Fiz. [**65**]{}, 411 (1973); (Sov. Phys. JETP [**38**]{}, 202 (1974)).
H. C. Fogedby, J. Phys. C: Solid State Phys. [**9**]{}, 3757 (1976).
G. Grinstein, P. Minnhagen, and A. Rosengren, J. Phys. C: Solid State Phys. [**12**]{}, 1271 (1979).
F. D. M. Haldane, J. Phys. C: Solid State Phys. [**14**]{}, 2585 (1981).
P. Vignolo, A. Minguzzi, and M. P. Tosi, Phys. Rev. Lett. [**85**]{}, 2850 (2000).
F. Gleisberg, W. Wonneberger, U. Schlöder, and C. Zimmermann, Phys. Rev. A [**62**]{}, 063602 (2000).
F. Gleisberg and W. Wonneberger, unpublished.
R. de L. Kronig, Physica [**2**]{}, 968 (1935).
A. Luther and I. Peschel, Phys. Rev. B [**9**]{}, 2911 (1974).
D. C. Mattis, J. Math. Phys. [**15**]{}, 609 (1974).
R. Heidenreich, R. Seiler, and D.A. Uhlenbrock, J. Stat. Phys. [**22**]{}, 27 (1980).
K. Schönhammer and V. Meden, Am. J. Phys. [**64**]{}, 1168 (1996).
J. Friedel, Nuovo Cimento Suppl. [**7**]{}, 287 (1958).
|
Q:
Escaping MYSQL command lines via Bash Scripting
PHP has mysql_real_escape_string() to correctly escape any characters that might cause problems. What is the best way to mimic this functionality for BASH?
Is there anyway to do prepared mysql statements using bash? This seems to be the best way.
Most of my variables won't (shouldn't) have special characters, however I give the user complete freedom for their password. It may include characters like ' and ".
I may be doing multiple SQL statements so I'll want to make a script that takes in parameters and then runs the statement. This is what I have so far:
doSQL.sh:
#!/bin/sh
SQLUSER="root"
SQLPASS="passwor339c"
SQLHOST="localhost"
SQL="$1"
SQLDB="$2"
if [ -z "$SQL" ]; then echo "ERROR: SQL not defined"; exit 1; fi
if [ -z "$SQLDB" ]; then SQLDB="records"; fi
echo "$SQL" | mysql -u$SQLUSER -p$SQLPASS -h$SQLHOST $SQLDB
and an example using said command:
example.sh:
PASSWORD=$1
doSQL "INSERT INTO active_records (password) VALUES ('$PASSWORD')"
Obviously this would fail if the password password contained a single quote in it.
A:
In Bash, printf can do the escaping for you:
$ a=''\''"\;:#[]{}()|&^$@!?, .<>abc123'
$ printf -v var "%q" "$a"
$ echo "$var"
\'\"\\\;:#\[\]\{\}\(\)\|\&\^\$@\!\?\,\ .\<\>abc123
I'll leave it to you to decide if that's aggressive enough.
A:
This seems like a classic case of using the wrong tool for the job.
You've got a lot of work ahead of you to implement the escaping done by mysql_real_escape_string() in bash. Note that mysql_real_escape_string() actually delegates the escaping to the MySQL library which takes into account the connection and database character sets. It's called "real" because its predecessor mysql_escape_string() did not take the character set into consideration, and could be tricked into injecting SQL.
I'd suggest using a scripting language that has a MySQL library, such as Ruby, Python, or PHP.
If you insist on bash, then use the MySQL Prepared Statements syntax.
|
Audit of local authorities
The Agency audits local authorities' enforcement services and provides a report that outlines areas where the authority can focus its efforts on improvements, while also celebrating good practice.
Authorities are audited against the Feed and Food Law Enforcement Standard in the Framework Agreement, which sets out the minimum standards of performance expected from local authorities across the full range of their feed and food law enforcement activities. The scheme is implemented on a UK basis, with the FSA in England, Wales and Northern Ireland each co-ordinating their own audit programme.
Local authorities are selected to represent a cross-section of local authority types, geographical location and level of enforcement activity as indicated by yearly monitoring returns.
More in this section
The FSA has carried out a number of focused audits on a particular aspect of enforcement work in a selection of local authorities. The authorities represent a cross-section of local authority types and geographical location. |
This is fyi. We need to be more careful on this point and refer to the schedule they send us. Please if you have any questions call.
DS
-----Original Message-----
From: "Kenneth G Gruhl" <kggruhl@duke-energy.com>@ENRON [mailto:IMCEANOTES-+22Kenneth+20G+20Gruhl+22+20+3Ckggruhl+40duke-energy+2Ecom+3E+40ENRON@ENRON.com]
Sent: Tuesday, September 04, 2001 8:52 AM
To: Schoolcraft, Darrell
Cc: DL-ETS Gas Controllers; kggruhl@duke-energy.com; David Bowers; rjnewson@duke-energy.com; kswhite@duke-energy.com
Subject: Re: Griffith Power Plant
We did manage to avoid a complete plant outage, but the loss of gas
pressure yesterday morning was still a major upset.
CT #1 did trip off and then subsequently it took several hours of
struggling to get back to where we needed to be. We didn't get back to
peak load until 2:00 PM in the afternoon.
I'll send you data on gas usage for yesterday by separate E-Mail for your
information.
Your assistance to get all the facts related to this event will be much
appreciated so we can learn how to not go there again.
"Schoolcraft,
Darrell" To: "DL-ETS Gas Controllers" <DL-ETSGasControllers@enron.com>
<Darrell.Schoolcraft@ cc: <kggruhl@duke-energy.com>
enron.com> bcc:
Subject: Griffith Power Plant
09/04/01 05:12 AM
We need to keep our communications open to the plant. I know that
during their test mode they have had a variance in load projections.
Hopefully when they become operational their loads will be more steady.
Ken,
Sorry about yesterday. Thanks to your quick responce to our gas control
so we could correct the problem before the plant
went down.
If you have any more questions please call.
Thanks DS 713-853-4299
**********************************************************************
This e-mail is the property of Enron Corp. and/or its relevant affiliate
and may contain confidential and privileged material for the sole use of
the intended recipient (s). Any review, use, distribution or disclosure by
others is strictly prohibited. If you are not the intended recipient (or
authorized to receive for the recipient), please contact the sender or
reply to Enron Corp. at enron.messaging.administration@enron.com and delete
all copies of the message. This e-mail (and any attachments hereto) are not
intended to be an offer (or an acceptance) and do not create or evidence a
binding and enforceable contract between Enron Corp. (or any of its
affiliates) and the intended recipient or any other party, and may not be
relied on by anyone as the basis of a contract by estoppel or otherwise.
Thank you.
********************************************************************** |
Q:
UART - Output Hex Value Without Bitmasks and Shifts?
Easy question:
I'm working on debugging an array of some hex values. Is there a convenient way to output a hex value over a UART line, without looping through each hex value and using bitmasks and shifts to transmit each bit?
I'm trying to avoid having to write the looping routine, if there is some other way I'm not aware of. Maybe there is some C magic I don't know? Some trick here?
Example Array:
char MyArray[5];
MyArray[0] = 0x55;
MyArray[1] = 0x55;
MyArray[2] = 0x55;
MyArray[3] = 0x55;
MyArray[4] = 0x55;
My desired outcome is to just UartSend(MyArray[0]), versus shifting each bit and sending one bit at a time. Is there some trick to do this?
Trying to save myself an hour of coding up the loop to bitmask this thing.
A:
Use printf()
printf("OutBuf=%02X %02X %02X %02X %02X %02X\n\r", outbuf[0],
outbuf[1], outbuf[2], outbuf[3], outbuf[4],
outbuf[5]);
uchar outbuf[6]; // is an arrray
|
Disturbing, powerful and emotionally devastating, Tears of Gaza is less a conventional documentary than a shocking record: of the 2008-2009 3-week bombing of Gaza by the Israeli military (backed by the U.S., using US-made weapons). Photographed by several Palestinian cameramen both during and after the offensive, this powerful film by Norwegian director Vibeke Løkkeberg focuses on the impact of the attacks on the civilian population. Similar events certainly occurred in Dresden, Tokyo, Baghdad and Sarajevo, but of course Gaza isn’t those places. Tears of Gaza demands that we examine the costs of war on a civilian populace. (Excerpted mostly from Steve Gravestock, 2011 Toronto International Film Festival)
Donation $10, BCC Students $5
Following the film will be a panel discussion and update, hosted by Palestinian Refugee and MECA Associate Director Ziad Abbas. |
Investigation of the dynamics of the viral immediate-early protein 1 in different conformations and oligomerization states.
The viral immediate-early protein 1 (IE1) is crucial for efficient replication of cytomegalovirus (CMV). A recent crystal structure of the IE1 protein from rhesus CMV revealed that the protein exhibits a novel fold and crystallizes in two slightly different dimeric arrangements. Molecular dynamics simulations and energetic analyses performed in this study show that both dimers are stable and allowed us to identify a common set of five residues that appear particularly important for dimer formation. These residues are distributed over the entire dimer interface and do not form a typical hot spot for protein interactions. In addition, the dimer interface of IE1 proved to include a high portion of hydrophilic interactions pointing toward the transient nature of dimer formation. Characterization of monomeric and dimeric IE1 revealed three sequentially discontinuous dynamic domains that exhibit correlated motion within the domain and are simultaneously anti-correlated to the adjacent domains. The hinge motions observed between the dynamic domains increase the shape complementarity to the coiled-coil region of tripartite motif proteins, suggesting that the detected dynamics of IE1 might be physiologically important by enabling a better interaction with its cellular target molecules. |
Manchester United's New Away Kit
English Premier League football team Manchester United manager David Moyes (R) speaks during a press briefing to announce their new away uniforms for the 2013-14 season at Osaka Castle on July 25, 2013 while player Shinji Kagawa (L) and Jonny Evans (C) look on. Manchester United will face Japanese J-League club Cerezo Osaka at Nagai Stadium on July 26 as part of their Asian tour. (Photo: AFP/Getty Images)
English Premier League football team Manchester United manager David Moyes (R) speaks during a press briefing to announce their new away uniforms for the 2013-14 season at Osaka Castle on July 25, 2013 while player Shinji Kagawa (L) and Jonny Evans (C) look on. Manchester United will face Japanese J-League club Cerezo Osaka at Nagai Stadium on July 26 as part of their Asian tour. (Photo: AFP/Getty Images)
English Premier League football team Manchester United manager David Moyes speaks during a press briefing to announce their new away uniforms for the 2013-14 season at Osaka Castle on July 25, 2013. Manchester United will face Japanese J-League club Cerezo Osaka at Nagai Stadium on July 26 as part of their Asian tour.(Photo: AFP/Getty Images)
Members of English Premier League football team, Manchester United, wearing their new away uniforms for the 2013-14 season, (L to R) Rio Ferdinand, Tom Cleverley, Patrice Evra, Shinji Kagawa, Jonny Evans and David Moyes, pose for photographers at a press briefing at Osaka Castle on July 25, 2013. Manchester United will face Japanese J-League club Cerezo Osaka at Nagai Stadium on July 26 as part of their Asian tour. (Photo: AFP/Getty Images)
Manchester United players (L-R) Rio Ferdinand, Tom Cleverley, Patrice Evra, Shinji Kagawa and Jonny Evans pose as they wear their new away uniforms for the 2013-14 season at an unveiling at Osaka Castle in Osaka, western Japan in this photo taken by Kyodo July 25, 2013. Manchester United will compete in an international friendly match against Cerezo Osaka on July 26, 2013 as part of their Asian tour 2013. Mandatory Credit. (Photo: Reuters)
Members of English Premier League football club Manchester United players (L to R) Rio Ferdinand, Tom Cleverley, Patrice Evra, Shinji Kagawa and Jonny Evans wear their new away uniforms for the 2013-14 season as they pose for photographers at a press briefing at Osaka Castle on July 25, 2013. Manchester United will face J-League club Cerezo Osaka at Nagai Stadium on July 26 as part of their Asian tour.(Photo: AFP/Getty Images)
Members of English Premier League football club Manchester United players (L to R) Rio Ferdinand, Tom Cleverley, Patrice Evra, Shinji Kagawa and Jonny Evans wear their new away uniforms for the 2013-14 season as they pose for photographers at a press briefing at Osaka Castle on July 25, 2013. Manchester United will face J-League club Cerezo Osaka at Nagai Stadium on July 26 as part of their Asian tour. (Photo: AFP/Getty Images)
Members of English Premier League football club Manchester United, wearing their new away uniforms for the 2013-14 season, (2nd L to 2nd R) Rio Ferdinand, Tom Cleverley, Patrice Evra, Shinji Kagawa, Jonny Evans and David Moyes, pose for photographers at a press briefing at Osaka Castle on July 25, 2013. Manchester United will face J-League club Cerezo Osaka at Nagai Stadium on July 26 as part of their Asian tour.(Photo: AFP/Getty Images)
Members of English Premier League football club Manchester United, wearing their new away uniforms for the 2013-14 season, (2nd L to 2nd R) Rio Ferdinand, Tom Cleverley, Patrice Evra, Shinji Kagawa, Jonny Evans and David Moyes, pose for photographers at a press briefing at Osaka Castle on July 25, 2013. Manchester United will face J-League club Cerezo Osaka at Nagai Stadium on July 26 as part of their Asian tour. (Photo: AFP/Getty Images)
Members of English Premier League football club Manchester United players wearing their new away uniforms for the 2013-14 season, (L to R) Rio Ferdinand, Tom Cleverley, Patrice Evra, Shinji Kagawa and Jonny Evans pose for photographers at a press briefing at Osaka Castle on July 25, 2013. Manchester United will face J-League club Cerezo Osaka at Nagai Stadium on July 26 as part of their Asian tour. (Photo: AFP/Getty Images) |
2013–14 Juventus F.C. season
The 2013–14 season was Juventus Football Club's 116th in existence and seventh consecutive season in the top flight of Italian football. The club won their third Serie A title in a row with a record 102 points and 33 wins, finishing 17 points ahead of second-place Roma.
Players
Squad information
Players and squad numbers last updated on 1 February 2014.Note: Flags indicate national team as has been defined under FIFA eligibility rules. Players may hold more than one non-FIFA nationality.
Non-playing staff
Source: Juventus.com (archive link)
Transfers
In
Total spending: €23 million
Out
Total income: €26.75 million
Pre-season and friendlies
Competitions
Supercoppa Italiana
Serie A
League table
Results summary
Results by round
Matches
Coppa Italia
Juventus started the Coppa Italia directly in the round of 16, as one of the eight best seeded teams.
UEFA Champions League
Group stage
UEFA Europa League
Knockout phase
Round of 32
Round of 16
Quarter-finals
Semi-finals
Statistics
Appearances and goals
|-
! colspan=14 style="background:#DCDCDC; text-align:center"| Goalkeepers
|-
! colspan=14 style="background:#DCDCDC; text-align:center"| Defenders
|-
! colspan=14 style="background:#DCDCDC; text-align:center"| Midfielders
|-
! colspan=14 style="background:#DCDCDC; text-align:center"| Forwards
|-
! colspan=14 style="background:#DCDCDC; text-align:center"| Players transferred out during the season
Goalscorers
Last updated: 18 May 2014
Clean sheets
Last updated: 18 May 2014
Disciplinary record
Last updated: 18 May 2014
References
Category:Juventus F.C. seasons
Juventus
Juventus
Category:Scudetto-winning seasons |
On the go and no time to finish that story right now? Your News is the place for you to save content to read later from any device. Register with us and content you save will appear here so you can access them to read later.
Southland shearer Nathan Stratford will make his second trip to the UK as a New Zealand team member after winning the New Zealand Shears Circuit final in Te Kuiti last night.
Holding the candle for the South Island in a sparse mainland representation among more than 170 shearers and woolhandlers in the three-day season-ending New Zealand Shearing and Woolhandling Championships, "Stratty" had a 1.829pts winning margin over runner-up and reigning World champion John Kirkpatrick in the tough six-man final of 15 sheep each, comprising five merinos, five crossbred ewes and five lambs.
Stratford had previously won the circuit final in 2012 and toured the UK with that year's New Zealand Open champion, Napier shearer Kirkpatrick, with whom he partnered to win the Teams title at the 2017 World Shearing and Woolhandling Championships in home-city Invercargill.
Outside of the World title, the latest win will go down as possibly the best of his 61 wins in his 21 seasons in the Open class, which also included a Corwen Shears win in Wales in 2012, premier multi-sheep-types championship the PGG Wrightson National Circuit final in Masterton in 2014, and, surprisingly his first South Island Shearer of the Year title in February this year.
Taumarunui shearer, 2015 New Zealand Championships Senior winner and first-time Open circuit finalist Floyde Neil made a valiant attempt to claim the title on speed, the only finalist to finish in under 19 minutes and shearing the 15 sheep in 18min 53.71sec.
He was in front at all stages, through the five South Island merinos and the five crossbred ewes to hold-on in the run home over five lambs, beating second-man-off Kirkpatrick by 13 seconds.
The 43-year-old, acclaimed a Master Shearer by Shearing Sports New Zealand in 2014, in the circuit's top six for a seventh time in a row and 15th time overall, and the most-expert on merinos, with three New Zealand Merino Championships wins in Alexandra to his name, Stratford kept in touch to finish in 19min 24.85sec.
It was just over one time-point down on Kirkpatrick, who was also out to win the Circuit for a second time and complete the multi-types double after winning the national circuit final in Masterton on March 3.
But the southern man's quality was up to the expected mark, and he had clearly the best quality ponts, both on the board and in the pens judging.
Neil was ultimately fourth, Manawatu shearer Murray Hernderson fifth and James Ruki, of Te Kuiti sixth, the culmination of a series from which 12 semi-finalists were found based on their best five heats performances in other selected shows around the country.
Shortly afterwards Stratford was fifth in his 10th Te Kuiti shears New Zealand Open championship final, Smith returning immediately to winning form in the more familiar environment of a contest of 20 second-shear sheep each. It was Smith's sixth win in the Open, among them in 2013 when Stratford was second.
Stratford's win last night was the second of two South Island wins at the 2018 championships, the other having gone to Winton shearer Brandon Maguire Ratima on Friday night when he completed a Golden Shears and New Zealand Intermediate championships double. His father, Eddie, won the New Zealand championships Junior, Intermediate and Senior titles, in 1989-1992. |
I’m hoping for some advice regarding a newly dot-and-dabbed and skimmed wall in my living room.Old stone cottage with narrow cavity, brick inner walls. External walls felt damp and cold (north and east facing). Had the room moisture tested by a damp ‘specialist’ a year ago when I moved in, he said there was no damp, but a condensation problem, he prescribed a dehumidifier/heat/ventilation. Nevertheless, I installed a DPC on the north wall ‘just in case’ (I was doing the kitchen and living room anyway as they were damp, and had the stuff leftover). When I striped the wallpaper off in the living room, it looked like the plaster had been painted with some sort of sealant by the previous owner, which I think we causing the room to sweat. When the dehumidifier was on, the plaster was dry. Turn it off and walls were wet again within a day. I then decided to remove all the plaster to see what was going on underneath, and the brickwork appeared dry, whether the dehumidifier was on or not. No salt deposits on the brick. Also found an airbrick which had been blocked up, so I unblocked that for ventilation. I scrubbed the outside (north and east walls) with biocide as there was moss growth at the bottom, filled any small gaps in the mortar and then used a StormDry masonry paint as a breathable waterproofing for the outside. The east wall (gable end) has been re-pointed by previous owner and looks in good nick. The 2 radiators in that room were removed about 6 months so there has been no heat in there, however it’s not been particular cold (weather-wise).2 weeks ago we boarded the room with dot and dab, and one week later the plasterer came and skimmed. Plaster appears dry (light pink and even) so last night (4 days after it was skimmed) did the first mist coat (60% water 40% trade emulsion). This morning, the while mist coats has big dark spots where the dot is, only on the north and east walls (south side, also external, is fine, as is the internal wall). The whole of the walls are affected, you can see every area where adhesive was applied, from floor to ceiling. Could this be from damp in the brick tracking through the adhesive? Can this happen after just 4 days? Or maybe is the plasterboard adhesive not dry? Is there a solution or am I going to have to remove the skim and plasterboard and baton the wall instead? I feel like if the issue is caused by damp, it would have taken longer than 13 days to come through, and it would be more patchy, not so regimented.I’d be really grateful for any advice! (Sorry for the long post too).
DIY how to tutorial projects and guides - Did you know we have a DIY Projects section? Well, if no, then we certainly do! Within this area of our site have literally hundreds of how-to guides and tutorials that cover a huge range of home improvement tasks. Each page also comes with pictures and a video to make completing those jobs even easier! |
1. Field of the Invention
The present invention relates to Viterbi decoders for determining a maximum likelihood path through a trellis created by a convolutional code.
2. Description of the Prior Art
A Viterbi decoder is used to decode convolutional codes, such codes being used to reduce error rates and increase the signal-to-noise ratio in a transmission system over band limited transmission channels. The Viterbi decoder is described in detail in an article entitled "The Viterbi Algorithm" in the Proceedings of the IEEE, Vol. 61, No. 3, March, 1973.
Depending on the encoder design, 2-dimensional convolutional encoding is used as shown in U.S. Pat. No. 4,601,044 to Kromer, III. et al or multidimensional coding (where the number of dimensions is greater than 2) is used as shown in European patent application No. 85300803.5 to Gallager. The Viterbi decoder in the receiver uses the received 2-dimensional or multidimensional signals to estimate the original path of the encoder through the trellis. The maximum likelihood path is determined by finding the possible sequence of 2-dimensional symbol subsets (which trellis path) which is closest to the sequence of received signals. The receiver computes the minimum cost path and from the path history, determines an estimated received symbol.
As to the specific way in which the Viterbi decoder was implemented in the computer programs of the prior art modems, the following description is provided. Referring to FIGS. 1A through 1C, the prior art implementation of the Viterbi decoder will be illustrated in a simple example. In this example, the Viterbi algorithm is used in conjunction with a simple convolutional encoder having four states identified as 0, 1, 2, and 3 in the trellis of FIG. 1A. A convolutional encoder is a finite state device which passes through a succession of the states, with each state being separated in time as shown by time unit j. The trellis is used to diagram all permissible transitions between the present state to the next state of the encoder, with each of the branches between states being identified by a unique encoder binary output, referred to as the subset-selecting bits and designated in FIG. 1A as a, b, c, or d. Each of these subset-selecting bits (a pair of bits in this case) map upon a given subset of symbols.
Beginning at time unit j=m+1, the branch metric is calculated for the paths, i.e., branches, entering each state 0, 1, 2 and 3, as shown in FIG. 1A. For each state at time unit m+1, the survivor path with the smallest metric w' is determined, as shown in FIG. 1B. The paths are stored, either by storing the subset-identifying bits or the states, and the metrics w' for the paths are stored. Referring to FIG. 1C, the unit time j is increased by one. Metrics w" for all of the paths entering the states at j=m+2 are computed by adding calculated branch metrics of the branches from j=m+1 to j=m+2 to the surviving metrics w' of the connecting survivor paths at the preceding unit. At this point, each surviving metric w' includes only the previously calculated branch metric, but with the passing of more time units, each surviving metric w' for a given path will be the summation of all the branch metrics of the path up to that time unit. Again for each state, the path with the smallest metric (the survivor) is selected, eliminating all other paths and reducing the trellis to that shown in FIG. 1C. For each state, the surviving path is stored, together with its metric.
The path histories are extended each time unit as described above. Once the stored path histories are extended so that j=m+L-1 (where L is the truncation length), the decoder finds the minimum cost path (smallest metric) among the surviving paths. For the surviving path, the decoder provides the best estimate of the subset or state at j=m. This is repeated each time unit, so that, e.g., at j=m+L, the decision is made for the state or subset at j+m+1.
There are 2.sup.k states in the trellis (k=2 in this example). Consequently, for each time unit, 2.sup.k words of storage are needed for the survivors and to store the entire path histories, an information sequence of length 2.sup.k .times.L must be stored. As shown in FIG. 2A, the prior art technique for storing these information sequences in memory comprised a memory array as shown. For each time unit, the subset-selecting bits (or states) of a given surviving path are stored in a row. Referring to FIG. 2A, if we assume at time interval j-1 that the subset-selecting bits are ordered in the trillis a, b, c, d and that the extension of the path will result in the subset-selecting bits being reorganized in the order of a, c, b, and d at time unit j, each of the rows representing the path histories must be shifted as shown by the arrows in FIG. 2A to obtain a rearranged memory of FIG. 2B. To accomplish this, it is assumed that the states are sequentially updated. At state 0, register 3 is written in FIG. 2A to the first row in FIG. 2B. As a result, the register 0 is destroyed by register 3. So when state 1 is updated, the survivor in register 0 is lost. One way of solving problem is to store register 3 in a buffer (not shown) and then copy register 2 in FIG. 2A to row 3 in FIG. 2B, register 1 in FIG. 2A to row 2 in FIG. 2B, register 0 in FIG. 2A to row 1 in FIG. 2B, and store the row stored in the buffer back to row 0. For a convolutional code with many states, the algorithm is very complex.
Consequently, from an implementation point of view, each time j is updated, each state could come from multiple states of time j-1. Therefore, all the paths need to be reshuffled according to the new order of the subset-selecting bits at time j. In addition, in order to rearrange the path of a particular state when the survivors of all the other states have not been determined, it is necessary to have temporary buffers to prevent overwriting of the path's history. An alternative would be to maintain two tables.
As a result of this prior art design, at each time instant j, the operation of reading the past paths and writing to the new locations is required. For a convolutional code with many states, it creates a great number of data moves. For example, a 64 states convolutional code with a truncation length of 20 needs 64.times.20 read and write operations.
In prior art schemes the states have been stored instead of the subset-selecting bits and a look-up table has been used to generate the subset-selecting bits, when needed. In other words, in the above example, with the knowledge of two sequential inputs to the encoder, i.e., the old and new states, an output of the encoder, i.e., the subset-selecting bits, can be determined or vice versa. Since the encoder adds one bit of redundancy per time unit, the prior art scheme took advantage of this fact by storing the input of the encoder instead of the required output, so as to reduce memory requirements at the cost of having to use the lookup table to recreate the subset-selecting bits.
The above example is for 2-dimensional coded modulation wherein the output of the encoder consists of subset-defining bits that map onto two-dimensional subsets of signal points. The unit time is one baud, i.e., symbol interval or modulation period. The above example is also applicable to an N-dimensional coded modulation system (N>2), wherein the subset-defining bits map onto a multidimensional subset. In this case, the unit time is a group interval comprising a plurality of bauds and the trellis has parallel branches between states. |
Q:
how to make a batch file to rename a folder when I start and close a program?
How to make a batch file to rename a folder when I start a program? - Let's say I want to start my word.exe, at the same time I need to rename a folder c:\users\my profile\my word documents to be my documents and when I exist the word.exe the batch rename the folder to its original name.
--edited later--
here what I need to do
start the program
wait until the program is fully loaded
rename the folder
the program waits until I close it
when I'm about to close the program it must not close (wait) until the batch rename the folder back
close the program
A:
Just use the CALL statement to tell the batch script to wait while the program is open:
@ECHO OFF
RENAME "C:\users\my profile\my word documents" "my documents"
CALL "C:\Program Files\Microsoft Office\Office15\winword.exe"
RENAME "C:\users\my profile\my documents" "my word documents"
Just don't close the batch window yourself or else the folder won't be renamed back afterwards. You can minimize the likelihood of that happening by using a shortcut to run the script minimized or use VBS to run it hidden.
Update
I think this should accomplish the (nearly) equivalent task as you asked for without all of the headache. By simply keeping the intermediate copies around you should be able to achieve what you really want (which we are all still guessing at).
@ECHO OFF
SET source=C:\test
SET dest=C:\test_tmp
MKDIR "%dest%"
COPY /Y "%source%\*.*" "%dest%\"
CALL "C:\Program Files\Microsoft Office\Office15\winword.exe"
RMDIR /S /Q "%source%"
MKDIR "%source%"
COPY /Y "%dest%\*.*" "%source%\"
RMDIR /S /Q "%dest%"
If this isn't good enough for you then your best bet is to make a VBA script or .NET Application-Level Add-Ins for part of this because this can't really be done in BATCH alone.
|
Vocation
This is what happens when I attempt to write a short "flash" story. I feel sincere admiration for authors who can craft a well-formed tale in a few thousand words; I don't have that gift.
Readers should be warned this is an extremely graphic -- or graphically extreme -- story. If you have read my other stories, this one is darker. I was inspired to try my hand after reading some erotic horror anthologies, and the genre is not the one I usually practice. I've tried to attach appropriate story codes to warn off those who might be squicked, but proceed at your own risk. I sincerely hope that nobody still reading is clueless enough to think these activities are in any way condoned or legal in real life; this is fiction.
The genesis of this tale (pardon the pun) is a particularly interesting shower curtain that hangs in my bathroom. It has been repurposed, in somewhat modified form, in the story below. All other characters, places, and furnishings not incidental to the story are entirely the products of my imagination. Enjoy.
*
Lily inhaled deeply and held the breath, letting the clean air purge her body of stress. Releasing it, she turned and smiled at Adam. "I feel better already!"
He grinned at her exuberance. Although it was unseasonably warm, the car's heater was still working overtime to battle the cold air that was streaming in the open window and teasing his wife's dirty blonde tresses into disarray. "Worth waiting for?"
"God, yes! Two weeks alone, just the two of us!" Both of them young, and newly-employed, their honeymoon last summer had been a weekend in a local hotel. They were making up for it now, renting a cottage not too far from the beach. It was early in the season, before the spring break crush (and price increases) hit, and the weather was more than cooperating.
The cottage was enchanting, just like its picture on the web site. There were others, but nestled in among the trees and not too close, and the beach was just visible a quarter mile further down the narrow unpaved road. The managers, in the cottage next door, not so much.
"Wow," Adam commented, sotto voice, as they walked back to the car after checking in.
"Eew," you mean, Lily corrected him. She discreetly wiped her hand on her jeans. "He gives me the creeps."
Sam looked nice enough, toned and fit from working outdoors, with teeth white enough for Hollywood. He had a firm, professional handshake, but something about it hadn't felt right. And the look he'd given her! Lily was familiar with guys perving on her, but it wasn't that; Sam's dark eyes had felt like they were piercing deep inside her, stirring dusty corners of dark rooms within her soul.
"Go right on 'not noticing' -- both of them," she threatened, mostly joking.
Norma, Sam's wife -- or whatever, she didn't wear a ring -- was a slut. Her heavy-lidded eyes had undressed both of them. Norma's lacquered nails had traced Lily's palm when they'd shook hands, and lingered inappropriately long in Adam's grip. Her deep auburn hair had an alluring distressed look Lily couldn't have achieved if she'd tried, and she'd never seen somebody who could make a sundress and cardigan sweater seem suggestive -- until now. And Norma smelled like sex. Not semen, or sweat, or anything tangible, but... sex.
Lily took another breath of the clean outdoors to wipe away the taint, and shook herself. The important thing was that she and Adam could concentrate on each other. She was smiling again by the time they had the luggage out of the trunk and into the cottage.
The cottage was just as adorable on the inside. It consisted of a small front room with a fireplace that doubled as a living and eating area, a cramped but fully-equipped kitchen, and a bedroom in the back. The bedroom was nearly filled by the queen bed and a dresser, because a sizeable chunk of it had been sectioned off to provide a modern bathroom.
Since Lily was a fervent believer in the virtues of flush toilets relative to outhouses, she wasn't going to complain. Besides, they were going to be doing nothing except sleeping in the bedroom, anyway. Lily giggled. "Well, almost nothing!"
"What?" Adam asked, but was more than game when Lily pulled him onto the bed on top of her. They wriggled out of their jeans and made delicious love to each other right then and there.
Lily felt so decadent, letting Adam make love to her on top of the covers right in the middle of the day! Her orgasm felt extra intense, and she didn't push him away after he climaxed inside her, the way she usually did.
"I love you," Adam crooned, nuzzling her hair and snaking a hand beneath her flannel shirt to cup a breast.
"I love you, too," Lily sighed. She kissed Adam tenderly while extracting his hand before it could work its way under the cup of her bra. "But you came like a horse, you stud" -- the dirty language felt slightly naughty -- "and I'm going to leak all over the covers if I don't go clean up."
"Hey, it's not our comforter," Adam laughed, even as he rolled off her. "Let somebody else do the laundry; we're on vacation!"
The first defect of the cottage struck Lily once she was standing, bottomless, in the bathroom. The huge picture window doubtless provided occupants of the large whirlpool tub a fine view of the scenic woods, but the only window treatment was a gauzy sheer. There didn't seem to be much difference between standing outside or standing in the glass-lined shower stall.
There was no way she was going to take a bath and sit in water with Adam's jizz floating around in it. Lily hurried through her shower, keeping her back to the window as much as possible and trying not to think about it.
Maybe it was well water or something, but Lily didn't feel clean when she emerged, although the soap smelled pretty and left her skin silky soft.
The other thing was the wallpaper in the bedroom. Lily noticed it that night, after they'd made love again. Adam was already asleep beside her, and she was lying on her back watching the play of shadows made by the faint illumination from the fireplace in the front room.
It was a busy pattern, in deep burgundy and gold, and she hadn't paid much attention during the day, thinking it was floral or paisley or something, and that she was glad it wasn't in her house. Like an optical illusion, something suddenly flipped in Lily's brain, and the pattern became something entirely different.
Maybe it was post-coital bliss. Lily lifted herself on one elbow and craned her head, but it still looked the same. She saw, as if from above, a couple fucking. The woman lay on her back, hair arrayed about her head like a corona, and her mouth wide open as if screaming in ecstasy. Her jutting breasts protruded just above her partner's head. His looming form obscured the rest of her body, but Lily knew his penis was buried within her. The image repeated over and over, covering the walls of the room.
It was dirty, and erotic, and Lily couldn't get it out of her head once she'd imagined it. Finally she rolled on her side and stared determinedly at Adam; it took forever for her to drift off.
It was still there in the morning, but Lily decided not to mention it. After breakfast, hoping the weather would hold, they donned shorts and light jackets, and set off to explore the beach.
The world belonged to them alone. Birds called from the trees, occasional squirrels looking for last fall's nuts crossed the road ahead of them, and it was easy to believe civilization did not exist. The sun filtered through the new greenery, calling them forward to where the barely audible waves shushed on the sand.
Hand in hand, Adam and Lily paced the dwindling road, now a path, until they reached an opening in the scrub growth and stepped out on the sandy dirt. For a moment it felt like they were adventurers laying eyes on a vista no human before them had seen.
"Oh, fuck!" A throaty exclamation destroyed the fantasy.
Perhaps fifteen yards to their right, Sam was fucking Norma. They were stark naked, and Norma lay back against a conveniently shaped tree trunk that allowed Sam to stand while pounding into her so forcefully the branches above them swayed with each thrust.
Lily didn't know if she'd made a noise or if some movement alerted him, but suddenly Sam turned his head and looked straight at them. He smiled broadly, never missing a stroke, while Lily blushed furiously, paralyzed by surprise.
Then Norma was looking their way too, licking her lips in a way Lily just knew was aimed at Adam.
Before either of them could react, Sam slapped Norma across the face, hard. Lily jumped at the sound, as did Adam, but Norma just looked up at Sam and started pulling on her nipples.
Thinking as one, Lily and Adam turned and fled back down the path. "What a slut," Lily said shakily after they'd gone a few hundred yards.
"Yeah, and on a public beach," Adam agreed, sounding as upset as she was. She noticed he had an erection, though.
After taking a long walk through the woods, taking care to stay well away from the beach, they returned to the cottage for lunch. Lily was just putting out the sandwich makings when a knock at the door interrupted them.
Adam opened the door to find Sam waiting on the porch.
"Hey, folks," Sam said, sounding diffident. His eyes looked anything but, and sought out Lily. "We just wanted to apologize for this morning."
Lily moved to join Adam so she could look out the doorway. Sam was clad only in a pair of worn jeans; they had the look of a pair that had gotten that way through use. His skin had a faint tinge that suggested he was flirting with sunburn, and his package looked like he had a loaf of bread shoved down there.
Disgusted with her thoughts, Lily raised her eyes. Norma was standing at the edge of the road, wearing a string bikini so skimpy she might as well as have been still naked. As she watched, Norma shifted her weight to the other hip, making her breasts sway slightly. Slut!
Sam smiled back, but Lily had the feeling it was at her rather than with her. "I completely understand. It's just early season; we've gotten used to having the place to ourselves. That'll change soon enough, I suppose." He shook his head regretfully. "In the meantime, you folks enjoy this marvelous weather. And if there's anything Norma or I can do to make your visit more enjoyable, just stop by anytime and ask."
"That's very kind; thanks again," Adam said.
He was so clueless. Lily fumed silently, knowing exactly what was being offered. She watched Norma raise her hand and wave, making her rack sway enticingly. The battle lines were drawn, then.
"Do you think I'm sexy?" Lily asked when Adam had closed the door.
"What? Of course," he said, looking confused. Probably he was still thinking of her.
Without giving herself time to think about it, Lily unzipped Adam's shorts and pulled them down. As she'd expected, he was partially erect already. She squatted and sucked the head of his organ into her mouth, trying to hide her distaste and reminding herself that there were lots of people who did oral sex.
"Jesus, Lily, what's with you?" Adam yelped. He made a token attempt to pull away from her, but got harder almost immediately. She'd gotten to him just in time.
Lily had never asked if another girl had done this for him before they'd met. She had no experience with giving head, but apparently the novelty of the experience was sufficient for Adam. Her tongue pushed at his organ, and she bobbed up and down on the first few inches, alternately sucking and blowing on it.
She'd already decided it was too degrading to let him cum in her mouth, but Adam caught her by surprise. Lily coughed on the first burst of sperm before pulling him out and directing the remainder of his spunk onto her T-shirt above her breasts. Hopefully that would be sexy enough for him!
The scent of sperm was heavy in her nostrils when they'd finished, but it was better than that slut's perfume. Lily wiped her mouth on the back of her hand while Adam fastened his shorts back in place.
"Wow," he said. "I guess they must have really gotten you worked up, huh?"
Lily forebore to argue and point out he was the one who'd been worked up. "Whatever. What do you want on your sandwich? Roast beef?"
"Um, Sure," Adam agreed. Men would eat anything put in front of them; that was part of the problem. "Ah, are you going to change?"
She looked up from the food. His scum was pretty viscous to start with, and soaking into the cotton; it wouldn't be going anywhere. "Why? Don't you like me this way?"
"Aaaaaaah," he prevaricated, trying to work out the safe response. "It's just... not you." Adam flashed a quick smile, happy to have found a good non-answer.
"Okay," she decided. He was thinking about her instead of Norma, which was the important part, and the smell was getting almost nauseating. "I'll be right back."
In the bedroom, Lily pulled the T-shirt over her head, taking care not to get any semen in her hair. She tossed it in the bathroom to deal with later, and then pulled a clean shirt from the dresser. Lily had the shirt over her head when she paused, thinking.
A moment later, she unfastened her bra and put it away. With the shirt in place, she stepped into the bathroom and checked the material. Her breasts were good, and didn't really need the support; the fabric was dark, and nothing showed. Satisfied, Lily returned to her husband.
Several days later they were at the beach again, after having checked to see they'd have it to themselves. The weather was holding, and they were wearing swimsuits and flip-flops. Lily had a pair of shorts on over her one-piece, and Adam was carrying some towels and sunblock. It looked perfect for basking.
"The chairs!" Adam exclaimed, smacking himself lightly in the forehead. The folding camp chairs were sitting on the porch of the cottage.
Lily shook her head. "Don't worry about it, Adam. We have the towels; we can just lie out, the sand will be soft."
"I don't know how you do that," Adam disagreed. "It drives me crazy. Look, just stay here and I'll run back for them -- it'll only be five minutes."
She honestly didn't care, but obviously it meant something to him. "Oh, okay. Just don't get lost; you hear me?"
Adam grinned. "I promise." He handed over the towels, gave Lily a kiss, and jogged back up the path.
Lily looked around. The beach was deserted; even the seagulls had found somewhere else to be. There wasn't a cloud in the sky, the blue above fading into grey haze far in the distance beyond the gentle waves. Even the sand in front of her was free of tracks or debris larger than a shell.
Unwillingly, Lily found her gaze drawn to the tree on her right. It felt stupid to just stand there, and it was only a tree. Fruit of some kind, she guessed. She slowly walked over to it. The wood was gnarled and polished smooth by decades of exposure to wind and sand... and other things, apparently.
"It's more comfortable than it looks," Norma spoke up beside her, startling Lily so much that she dropped the towels and sunblock. "Oh, I didn't mean to startle you!"
"I'm fine," muttered Lily, who knelt to retrieve her belongings. She looked sideways at Norma, who was wearing her sluttish bikini; the redhead had a pair of camp chairs leaning against one long leg. "Did you see Adam?"
"No," replied Norma, who extended Lily a hand up; the blonde ignored it. "Sam told me the two of you were coming down, and I saw you'd left the chairs, so I brought them out. I came on the forest path; it's less boring than the road."
Lily smiled. "Thanks. I guess he'll be along in a few minutes, then." Norma's presence bothered her, but it was better than the alternative -- that the redhead and Adam could have been alone together.
"Can I help you with the sunblock? You gotta be careful of the sun," Norma asked, seeing the lotion.
"No!" Lily yelped, before hurriedly moderating her tone. "I put some on back at the cottage." Just the thought of Norma touching her raised goose bumps. The slut would want to rub her everywhere; her fingers would drift along the edges of Lily's suit, forcing their way along her breasts, across the curve of her ass, between her legs. She'd try to put them inside Lily, and maybe--
"Can I use some, then?"
Lily felt she needed to reestablish some civility after her outburst. "Sure." Unwillingly, she added, "It looks like you're a little late for your butt." Norma had turned around to lean the chairs against the tree, revealing angry red flesh surrounding the scrap of fabric that was pulling into her crack.
"Oh, that?" Norma laughed, and then shocked Lily by pulling the ties and slinging the bottom over a branch. "That's not sunburn. Sam tanned me something awful yesterday." She rubbed a generous amount of lotion on her buns, wiping her oily hand down her crack and between her legs before turning around.
Feeling stunned, Lily stared at the other woman's crotch. Of course, it was completely bare; she couldn't have worn the bikini otherwise. It looked a little reddened too, if nothing like her backside. Still, the way Norma casually stood there and rubbed herself was unbelievable. Lily blinked, sure she'd seen a finger disappear for a moment.
Norma pushed up her top, revealing her breasts, and Lily couldn't hold back a gasp. "Those are bite marks!"
"Oh, yeah, sometimes Sam likes it rough," the redhead sighed dreamily, massaging lotion onto herself with both hands until her nipples popped erect. She opened her eyes again and amplified, "Me, too. Here, can you hold this?" Norma held out the bottle to Lily.
Now she felt like she couldn't walk away. Instead, the blonde stood there while Norma kicked up a leg against the tree, further exposing herself, and worked both hands down the length of her leg. Did the slut have no shame? Lily wordlessly held out the bottle and watched as the process was repeated with the other leg.
The ordeal wasn't over. "Can you put some on my back?" Norma asked, turning away from Lily and pulling her hair forward over one shoulder. Her skin was decorated with several long marks that might have come from fingernails. "Please?" she repeated, when she sensed Lily was hesitating.
Heaving a heavy sigh, Lily squirted some sunblock into her palm and gingerly started smoothing it across Norma's back.
"I'm not going to break, you know."
Stung, Lily rubbed harder. Trying not to think about Sam hitting Norma. About the skin she was touching, covered with sweat, shifting against sheets as Norma pulled her legs wider, sluttishly offering herself to Sam -- or whomever stood over her. She froze.
"Thanks," Norma said, oblivious to her thoughts. "Are you like that in bed, too? A little china doll? 'Eek eek eek.'" She giggled. "Lily, trust me on this; men are animals -- they like it more forceful once in a while." Before Lily could process the insult, the other woman reached around and whacked her on the ass.
"How dare you!" Lily snapped, and then slapped Norma across the face. The impact of her oily hand sounded like a branch breaking, making her think she'd gone too far. She trembled, wanting to run but afraid to turn her back to her opponent.
"Like that," Norma agreed, running her tongue over her lips to taste for blood and then smiling. "And don't try to tell me you didn't like it," she smirked, eyes dropping to Lily's chest. |
Connect
Cronin: Pacific Pivot Will be Difficult to Execute
ALEXANDRIA, Va. — The U.S. defense strategy rolled out in January 2012 placing a renewed emphasis toward Asia and the Pacific is “less than desired, more difficult to execute than we think,” says a defense analyst.
Dr. Patrick Cronin, senior adviser and senior director of Asia Pacific Security Programs at the Center for a New American Security, told an audience March 20 at the Expeditionary Operations Symposium sponsored by the Defense Strategies Institute that, despite the military power of the United States in the region, “political constraints are all over the region” and the United States seems to have an “inability for us to pull together our capability” to influence events.
Citing the case of North Korea’s advances in developing nuclear weapons and delivery systems, “We can’t even squeeze a rogue proliferator,” he said.
Cronin said that China is testing the boundaries, “pressing up against our allies and friends,” and asserting its own rules in violation of accepted international law and norms.
He cited China’s disputes with Vietnam regarding the Paracel Islands, with the Philippines regarding Scarborough Shoal and with Japan regarding the Senkaku Islands as examples of its push to dominate politically the first island chain beyond the Asian mainland. China has said that the United Nations Convention on the Law of the Sea does not apply in some of these disputes.
In the case of the Senkakus, Cronin said, the United States transferred authority over the islands to Japan when nearby Okinawa was returned to Japan in 1972. Japan claims to administer the uninhabited islands. China also claims to administer them, paying fishermen to fish in the adjacent waters and then sending authorities to arrest them, thereby asserting its authority over the islands.
“Neither China or Japan wants a war,” Cronin said, “but there is the possibility of a miscalculation.”
Cronin predicts more incidents in the future in the form of challenges to the U.S. concept of freedom of navigation.
China is “trying a lot of different strategies right now,” he said, and seems to be saying to the region, ‘You can discount the Americans right now.’”
China finds the United States weakest in the South China Sea.
“Four [Littoral Combat Ships forward-deployed to Singapore] are not going to send a shudder to China,” Cronin said, but noting that the agreement to deploy them to Singapore “locks in a U.S. presence” in the South China Sea.
He said that “China thinks we’re rebalancing too much, [but our] allies want us to do more. Our allies and partners want strategic clarity. Our budget insecurity will lead to greater ambiguity.” |
Tag Archives: diabetes diet
Weight control is essential with diabetes. Let diabetes not escape from control. One should have an efficient control over blood glucose levels as a way to make sure excellent health and long life with no complications. It is also dependent on your present character level.
The previous type is among the harshest kinds which happen in pregnant women because their entire body is unable to create enough insulin to counter the development of insulin amounts in their physique. If someone cuts out sugary and fatty foods diabetes can really be cured and somebody can add quite a few years to … Read the rest |
Michael Murphy of Chattanooga proposes to his sweetheart, Olivia Wyatt, on Lookout Mountain. The couple met at Lee University in Cleveland, Tenn., and were wed Sept. 21.
By David Tulis
For local economy to prosper, we Chattanoogans need to live out underlying truths that make up Western civilization. More than any other system of thought or life, Christianity has informed the world in which we live, whether giving rise to science, invention, industry or academic pursuits such as physics, according to Vishal Mangalwadi, India’s greatest Christian intellectual whose latest book was published out of Nashville.‡
Living out the promises of God by his creational pattern and in terms of his commandments gives people in my hometown and yours a real prospect for growth and longevity. One great promise of God is marriage, the loving and promise-filled relationship between a man and his wife that mirrors Christ’s love of His people, for whom He sacrificed Himself. To the home come children, the seed of the future; children are the framework of yet other houses, of future neighborhoods, cities in the beyond.
Marriage is under attack by people who know better than God how His creation is ordered. Fierce arguments against marriage were made in oral arguments before the federal supreme court recently. The grittiest smackdown of marriage since the Washington, D.C., hearings are comments made by Masha Gessen, a journalist and a homosexual.
“It’s a no-brainer that (homosexual activists) should have the right to marry, but I also think equally that it’s a no-brainer that the institution of marriage should not exist,” she says in a radio interview. “[F]ighting for gay marriage generally involves lying about what we are going to do with marriage when we get there — because we lie that the institution of marriage is not going to change, and that is a lie. The institution of marriage is going to change, and it should change. And again, I don’t think it should exist. And I don’t like taking part in creating fictions about my life. That’s sort of not what I had in mind when I came out thirty years ago” (italics are mine).
The admission of lying by the homosexual lobby is noteworthy, but not surprising. Its members’ effort is a bold assault on creation and on God, who ordained the marital union as part of a most pleasing natural order. As against the desire espoused by ideologues to end the institution of marriage, marriage in Tennessee is defined in a famous case whose premises should be understood as standing — regardless how the U.S. supreme court rules in the next months.‡‡
The Tennessee case is about a woman who entered into a seemingly sham marriage with a drunken dirtbag to avoid claims against her deceased husband’s estate by a creditor. The widow’s sole purpose in entering the marriage was to defeat her creditors. The case McKinney vs. Clarke rose out of a chancery court case in Fayetteville, Tenn., in 1852 and tells about the legal underpinnings of the united state.
A husband ‘loathsome in appearance and habits’
The story as recounted by the judges is pathetic. Mrs. Clarke, a widow named Sullivan, lived under terms of a will that gave her a plantation and six slaves “during her natural life or widowhood,” with remainder to her children. But she ran into financial trouble and borrowed. Her troubles did not end with the loans. In seeking payment, the lender Mr. McKinney won several judgments against Mrs. Sullivan. To force the passage of the estate to the Sullivan children and avoid losing land and slaves to the creditor, Mrs. Sullivan married Mr. Clarke.
Mr. Clarke was a remarkable man, a “drunken sot, degraded in reputation and loathsome in appearance and habits.” Judge McKinney, in his opinion, decries the marriage. “The motives and conduct of said Mary, in forming this matrimonial alliance, are of a character, as exhibited in this record, to shock the moral sense of the community, and to outrage all the decencies of social life. It is probable from the proof, that she has not, in fact, and perhaps never intended to co-habit with said Clarke,” whom he proceeds to describe as a disaster of a man. (He may even have been a black, as the record says Mrs. Clarke “intermarried” with the defendant in the case.)
The goal of the plaintiff was to have the judges undo the marriage. A chancery judge agreed and annulled the marriage. The facts of the case “leave no doubt upon the mind that the object of the marriage was to defeat the rights of the complainant.” It was a marriage of convenience with no intention of the parties to cohabit and enjoy a married life together.
The issue before the court is what is marriage, how inviolable is it, how unique is it among the world of agreements, contracts, covenants and deals.
‘An institution of society’
Quoting a footnote from Mr. Story, the ruling says marriage “is something more than a mere contract. It is rather to be deemed an institution of society, founded upon the consent and contract of the parties; and in this view has some peculiarities in its nature, character, operation, and extent of obligation, different from what belong to ordinary contracts.”
Unlike other contracts, it is indissoluble between the parties. When consummated according to law, it is of perpetual obligation, and cannot be renounced at the will of either or of both parties. It continues to exist until a dissolution is produced either by the death of one of the parties, or by a divorce. [citations omitted] It differs in another respect from all other contracts; the rights and duties growing out of it, are not left to the option or agreement of the parties; but, to some extent, are matters of municipal regulation, over which the will of the parties can have no control. It continues to subsist in full force, even although one of the parties should be rendered incapable forever of performing his or her part of the mutual contract, as in case of incurable insanity, or the like.
Such is the nature of the contract of marriage; an institution which lies at the very foundation of all social order and morality, and constitutes the chief corner stone of the whole structure of civilized society.
The contract of marriage, then, having its foundation in nature, and resting, in its origin, upon the mere consent and mutual agreement of the parties, when complete according to civil regulations, becomes indissoluble, except by death or divorce; and so long as the relation is acquiesced in by the immediate parties, no tribunal on earth is clothed with the jurisdiction to interpose to annul it. No more startling or absurd proposition can be conceived, than that a marriage, legal in form, acquiesced in and held obligatory by the parties, and recognized as valid by law, might be annulled at the instance of a third person, for any cause whatever. So far as regards the legal consequences resulting from marriage, either as respects the parties or third persons, it can be of no consequence what were the motives or inducements to the contract. The only inquiry, at least as to third persons is, does a marriage in fact exist according to the prescribed forms of law? If so, the motive which prompted to the marriage, or the consequences flowing from it, are wholly irrelevant, so far as relates to the validity or effect of such marriage.
The judges have no authority to judge motives for entering a marriage. The best a third party can do is to assure itself that proper forms were followed. The judges say there is “want of all jurisdiction” for them to pursue Mrs. Sullivan entering marriage with Mr. Clarke. They have no authority to inquire why she acted as she did. Mrs. Clarke was willing to forfeit her estate in a hasty marriage under the terms of her late husband’s will, her children presumably taking possession of the land and the slaves.
‡‡ I mean to say that if the federal supreme court intends to impose a divisive and monolithic definition of marriage as including homosexuals on Tennessee, our state should simply nullify said ruling by an act of the General Assembly.
‡ Vishal Mangalwadi, The Book that Made Your World[;] How the Bible Created the Soul of Western Civilization, 2011, 442 pp. I highly recommend this author, with whose wife, Ruth, my wife, Jeannette, has a friendly acquaintance.
About The Author
David Tulis hosts a talk show weekdays 1 to 3 p.m. on NoogaRadio 92.7 FM 95.3 FM HD4 (digital), covering local economy and free markets in Chattanooga and beyond. Nothing on this website should be construed as legal advice; all discussions about law and practices favoring a free people are opinion and educational; if you want legal advice consult a licensed attorney. |
Q:
trying to understand why a tuple is preferred over a list for a specific python example (from a tutorial)
I'm trying to learn what iterators and generators are in python, going through a tutorial i found online which used this fibonacci iterator as an example. I'm having trouble with the comment on lines 9-11. What does it mean that "the old values of self.fn1 and self.nf2 are used in assigning the new value"? I understand that tuples are immutable objects but i'm failing to see here why using tuple is preferred over a list. I guess I'm failing to see why using a tuple here is better than using a list and I would like to understand better if anyone can help explain it :/
4 class fibnum:
5 def __init__(self):
6 self.fn2 = 1 # "f_{n-2}"
7 self.fn1 = 1 # "f_{n-1}"
8 def next(self): # next() is the heart of any iterator
9 # note the use of the following tuple to not only save lines of
10 # code but also to insure that only the old values of self.fn1 and
11 # self.fn2 are used in assigning the new values
12 (self.fn1,self.fn2,oldfn2) = (self.fn1+self.fn2,self.fn1,self.fn2)
13 return oldfn2
14 def __iter__(self):
15 return self
from : http://heather.cs.ucdavis.edu/~matloff/Python/PyIterGen.pdf
A:
There's no point in using a list here, because you're always dealing with three elements, rather than a variable number of them. By "insure [sic] that only the old values of self.fn1 and self.fn2 are used in assigning the new values", the programmer seems to be comparing this method with the alternative:
self.fn1 = X
self.fn2 = Y
oldfn2 = Z
which wouldn't work out of the box since self.fn1 is reassigned before its old value can be assigned to self.fn2. Reordering the assignments can fix that, but with the tuple assignment, you don't need to worry about the order.
This could have been written without the parens, btw:
self.fn1, self.fn2, oldfn2 = self.fn1+self.fn2, self.fn1, self.fn2
|
Daily Edition
Twitter: The Reason Behind BET's Surprise Success for 'The Game'
The current issue of the Hollywood Reporter magazine looks at how the network worked the social media tool to help make the show an out-of-nowhere smash.
The following story appears in the current issue of The Hollywood Reporter. Current subscribers can read the story online.
On Jan. 12, Hollywood collectively gasped when ratings were released for the previous night's series premiere on BET.
The show drew an extraordinary 7.7 million viewers. After the TV industry overcame its shock, the next question was, "What was the name of that show again?"
In fact, fans of The Game — and they are legion — have been pining for the show's return since the CW axed it in 2009. A grass-roots social media campaign combined with a dearth of scripted programming for African-American viewers helped juice tune-in to unprecedented levels. Game set a record as the most-watched scripted-series premiere ever on ad-supported cable. And it was the second-most-watched program in BET’s 30-year history, behind only the 2009 BET Awards, which aired three days after Michael Jackson died and pulled in 10.2 million viewers.
"The social networking movement really kept the fan base alive," says David Wilson, founder and managing editor of African-American news site TheGrio.com. "A lot of people who hadn’t seen the show picked up on it through social media. And that really united the show’s fan base."
But The Game wasn't exactly burning up mainstream-media buzz meters. There was no full-blitz ad campaign like the wall-to-wall promos for American Idol, just a smattering of billboards around town and a handful of reviews. In fact, Game’s news cycle had probably peaked in April, when BET and CBS Television Studios announced they were partnering to produce new episodes of the show. But if you looked a littler closer in the online world, the dramedy about pro football player Derwin (Pooch Hall) and his wife Melanie (Tia Mowry) was a very hot topic on Twitter and Facebook.
"I heard a lot of people had FB statuses that night that said, "Don't bother me from 10 to 11, I'm watching The Game!" says Debra Lee, CEO and chairwoman of BET Networks. "People also used the show’s photos as their profile pics."
And so it is, just as execs are still getting their heads around digital streaming and DVRs, TV in the Twitter era has become an invaluable weapon in the race for ratings.
A spinoff of the 2000-08 CW sitcom Girlfriends, Game averaged 2.3 million viewers in its first season on the CW (2006-07), climbing to 2.5 million in its second. But by Season 3, the CW had begun to target young women with dramas including zeitgeist hit Gossip Girl, and Game was shunted to the Friday night graveyard, where it languished, finishing the season with an average viewership of 1.8 million. Creator and executive producer Mara Brock tried in vain to convince the CW to turn Game into an hour drama while the show's cast launched a YouTube campaign called "Save The Game."
When the CW canceled it anyway, producers Brock Akil and Kelsey Grammer sold Game to BET, which began running off-net reruns. By that time, broadcast TV had become rather monochromatic. The CW — the last redoubt for shows that spoke directly to African-American audiences — had canceled Girlfriends in 2008, and Chris Rock’s Everybody Hates Chris finished its four-season run the year before.
"A lot of networks have abandoned African-American viewers," Wilson adds. "There are actually fewer shows, particularly scripted shows, for African-Americans than there were in the '90s," he adds, rattling off a slew of network comedies of yesteryear including The Fresh Prince of Bel-Air, The Cosby Show and its spinoff A Different World. "So The Game is bound to get a lot of attention."
To take advantage of that attention, BET embarked on a multifaceted and social media-oriented marketing campaign. Its digital division monitored social networks such as YouTube, Facebook and Twitter; and instead of creating its own Facebook page for the show, executives found 35-year-old Stacey Mattocks, an insurance agent from Miramar, Fla., who created a page for The Game on her own while the sitcom was still on the CW. BET brought Mattocks onto the team part-time and paid her to run the page. Mattocks even attended the show’s BET premiere and walked the red carpet. The Facebook page now has more than 3.5 million members, up from 3 million in April. The official Twitter feed — @BETTheGame, which BET uses to tweet tune-in reminders and links to preview clips — has only 133,278 followers; BET as a whole has 279,000 followers on its feed. But all those followers have followers. And so on.
"We've definitely been experimenting," Lee says. "It's hard because something has to happen organically. The more you try to influence, the less it works. Fans and audience have to be passionate for it to work. It's a good supplement to traditional marketing. Social networking helps us stretch the dollar. Fans do the promoting for us."
Perhaps even more important, BET took advantage of the stunning figures for Twitter usage by African-Americans: They make up 12 percent of the U.S. population but represent 25 percent of Twitter users, according to a study by Edison Research that’s been widely disseminated and dissected since it was published in the spring. Indeed, Twitter in many ways can be more influential than Facebook — which, after all, is largely about a user’s private social network. Twitter is about having your own public broadcast channel; BET can cut out the middleman and share information directly with friends, yes, but also strangers, who will happily retweet for you.
BET learned this lesson after the 2009 BET Awards. On the night of the three-hour-plus telecast, the 10 top-trending topics on Twitter were related to the event, and BET’s Twitter feed for the show jumped from slightly more than 10,000 followers to 40,000-plus. Meanwhile, traffic at BET.com doubled compared to the previous year’s BET Awards.
And BET saw similar Twitter trends in the run-up to the Jan. 11 premiere of The Game.
"We found Twitter to be a great early indicator as to how well The Game was going to do," Lee says. "The night of the premiere, the show was one of the top 10 trending topics. People were talking about the cast the night of the show and DNA testing, which was part of the story line. All in all, I was hoping it would be a hit but no idea it would be this big. It's all a very pleasant surprise."
For those on the ground in social media, Game’s success is not surprising. Angela Benton — a fan of the show and the founder of Black Web 2.0, which covers technology and new media — was as glued to the television as she was to her laptop during the show, scanning her Twitter stream for comments from friends and strangers during commercial breaks. While watching a recent episode, she says, "I checked in to make sure I wasn't crazy for thinking Melanie was wrong for taking a DNA sample of Derwin’s baby without his permission," says Benton, 29, a divorced mother of three who lives in Charlotte, N.C.
In other words, The Game is more than appointment TV: It is television as a real-time, interactive, collective community, where conversations can at once distract and enhance the TV-watching experience.
This season's second episode of Game was down from the opener but maintained impressive audience levels, averaging 5.9 million viewers. And the show has helped BET launch the comedy Let's Stay Together.
"I hope one of the lessons that the industry will learn from this is that you can have a show that is targeted at African-Americans and it can do well," Wilson says. "You just have to engage the audience on several levels. You cant just run a 30-second spot because people aren't living there. They’re living on Facebook. They’re living on Twitter. Fortunately for The Game, it had this grass-roots social media following that translated into viewers." |
Q:
What is the point of WPF data binding? Implementing INotifyPropertyChange versus manual GUI updating
I recently made a very simple app in WPF that simply reads data from a few TextBoxes and updates records in an SQL Server database. I also put back and forward buttons to allow the user to scroll through the available records. Everytime the user clicks Next on the app, the UI gets updated with the values from the new record through a method I called updateControls(), which looks like this:
private void updateControls()
{
IQueryable<Comment> query = from t in container.Comment
where t.Id == browseIndex
select t;
if (query.Count<Comment>() > 0)
{
currentComment = query.First<Comment>();
txtID.Text = currentThought.Id.ToString();
txtComment.Text = currentComment.thought;
txtDate.DisplayDate = currentComment.date;
txtDate.Text = currentComment.date.ToString();
}
}
This is simple, and it works like a charm. But I recently discovered the world of data-binding, where you can supposedly eliminate all this boilerplate code of manually updating controls and have them update themselves whenever the model changes.
After much experimentation and reading through various tutorials, I find that, for this to work, my data object must implement the INotifyPropertyChanged interface, which means need to use explicit setters on the properties I wish to update on my UI, like this:
public class Comment: INotifyPropertyChanged {
private string comment;
public event PropertyChangedEventHandler PropertyChanged;
public string Comment { get { return this.comment;}
set {
this.comment = value;
NotifyPropertyChanged("Comment");
}
public void NotifyPropertyChanged(string propName)
{
if (this.PropertyChanged != null ) this.PropertyChanged(this, new PropertyChangedEventArgs(propName));
}
}
This is a lot more code than simply manually updating my UI with the data I want. Also, since this class is part of an Entity Model, the INotifyPropertyChanged interface has to be implemented in a class apart from the model classes, since model classes get regenerated when the model is updated. Which leads me to my question: why ever would I want to use data-binding in a real world application when it is much simpler to simply update my UI manually? Or is there an alternative way to do this that I'm not seeing?
A:
The MVVM pattern dissociates the GUI logic from the core logic.
You can have the same model for several totally different controls and on the other way have one complex control leverage on several totally different models (the ViewModel is just the glue).
If you work on a team, you may have one guy working on the GUI part and another one dedicated to databases.
The database (model) is no more enslaved by the way you show the data, as long as the ViewModel notifies its changes, it'll be up to the View to decide to catch it or not (with a simple binding)
when you work with datatemplate, everything will make a lot more sense because it'll be VERY easy to render complex
There are many reasons why this pattern is great, there are plenty of articles on internet
|
1. Martin Shkreli walking down hallway toward hearing room POOL - AP CLIENTS ONLY Washington - 4 February 2016 ++CUTAWAYS AT SOURCE++ 2. Various of Martin Shkreli entering hearing 3. SOUNDBITE (English) Rep. Elijiah Cummings, (D) Maryland: “Like a Ponzi scheme, it appears that Turing may be using revenues from Daraprim to research and identify the next drug it will acquire and then impose similarly massive price increases on future victims. It’s not funny, Mr. Shkreli. People are dying and they’re getting sicker and sicker. Based on the documents obtained by the committee, we know exactly what these companies will say as part of their public relation strategy. They will try to distract from their massive price increases by talking about their R&D (research and development.) They will downplay their massive profits by claiming that they help patients who can’t afford their exorbitant prices. The testimony from the drug companies today will be the same. But the difference now that we’ve been behind their smoke screen.” 4. Cutaway 5. SOUNDBITE (English) Rep. Elijiah Cummings, (D) Maryland: “The people in my district are not on the Forbes billionaire last. They don’t buy Wu-Tang Clan albums for $2 million. They can’t liquidate assets to free up millions of dollars. They work hard. They get the early bus and many take home decent salaries, but like many Americans, they struggle every single month to support their families and to pay for their increasing cost of housing, education and health care. They live from paycheck to paycheck and sometimes from no check to no check.” 6. Cutaway 7. SOUNDBITE (English) Rep. Jason Chaffetz, (R) Utah: “Do you think you’ve done anything wrong?” SOUNDBITE (English) Martin Shkreli, Former Turing Pharmaceuticals CEO: “On the advice of counsel, I invoke my fifth amendment privilege against self-incrimination and respectfully decline to answer your question 8. Cutaway 9. SOUNDBITE (English) Rep. Trey Gowdy, (R) South Carolina: “Is it pronounced Shkreli? UPSOUND (English) Martin Shkreli, Former Turing Pharmaceuticals CEO: “Yes sir. SOUNDBITE (English) Rep. Trey Gowdy, (R) South Carolina: “There you can answer some questions, that one didn’t incriminate you, I just want to make sure you understand you are welcome to answer quetsions and not all of your answers are going to subject you to incrimination you understand that don’t you?” SOUNDBITE (English) Martin Shkreli, Former Turing Pharmaceuticals CEO “I intend to follow the advice of my counsel.” |
Ms Carolyn Steyn
Carolyn Steyn holds and honours degree in Speech and Drama from the University of the Witwatersrand and a T.L.S.D. (Teacher's Licentiate in Speech and Drama) from the University of South Africa. Carolyn lived in the United States for ten years and in England for five years. She was nominated as one of the 'Most Exciting Women', by the Beverly Hills Sheet in 2004. In the US she studied at the Beverly Hills Playhouse for five years under acting guru, Milton Katselas along with fellow students Kate Hudson, Giovanni Ribisi, Jeffrey Tambor, Tony Danza and Doris Roberts amongst others. She had roles in the television series' Melrose Place and Babylon 5 and appeared in numerous plays in Los Angeles including Harold Pinter's 'Betrayal', 'Private Lives' and 'Shadowlands'.
In South Africa, Carolyn performed for PACT (Performing Arts Company of the Transvaal) Drama for several years. notably in the production "Poppie Nongena", which ran for an entire year to rave reviews. Carolyn then joined the Radion 5 team (5FM), where she became a familiar voice reading the news and co-hosting the weekend breakfast show with Martin Locke. Carolyn currently co-hosts a Radio Today show called 'Whispers with Carolyn Steyn and Michael de Pinna' and is a host on the televison show "Tongue in Cheek" on SABC 3. She also serves as a Patron of the Joburg Ballet, the Patron of the Auto & General Theatre on the Square and a Naledi Theatre Awards judge and "Arts Angel". She is an ambassador for "Peace Starts" in South Africa.
Carolyn specialises in voice-overs for radion and television. Recent voice-overs include the Colgate television commercial for various international territories as well as promotional voice-overs for M-Net television.
Carolyn is the Founder for 67 Blankets for Nelson Mandela Day, a "little initiative with a big heart" which has thousands of members not only in South Africa but also around the world. Last year Carolyn shot scenes for 'Generations', Africa's most popular soapie. She played the role of 'Carolyn Steyn', Founder of 67 Blankets for Nelson Mandela Day. She will be returning to Generations in 2015 to do a "call to action" for South Africa to create 21 000 blankets by 21 April 2015 to lay at the feet of the statue of Nelson Mandela at the Union Buildings and to cover the grounds in a sea of blankets to celebrate 21 years of democracy in South Africa.
67 Blankets for Nelson Mandela Day has recently celebrated its first anniversary at the Nelson Mandela Foundation. It has realised many milestones in its first year of existence, including winning the coveted Campaign of The Year at the South African of the Year Awards (against corporate giants Coca-Cola, Kellogs, KFC and Knorr) and has been described as an initiative that is "binding together a nation in a way no government has been able to do."
Carolyn Steyn matriculated from Jeppe High School for Girls in 1977.
She went on to complete a BA Honours Degree in Dramatic Art at the University of the Witwatersrand in 1981.
She also completed a TLSD with Distinction at UNISA.
In 1982, Carolyn began performing for PACT Drama, notably in the production Poppie Nongena, which ran for an entire year. Poppie Nongena, which starred Nomsa Nene as Poppie, opened in Soweto and toured the entire country.
At PACT, Carolyn also ran various school programmes and featured in the plays like Hotel Paradiso and Robin van der Merwe of Knysa Forest.
Carolyn joined Radio 5 Team (5FM) in 1985, where she became a familiar voice reading the news and co-hosting the weekend breakfast show with Martin Locke.
In 1989, Carolyn moved to California to study at the Beverly Hills Playhouse under acting guru, Milton Katselas.
In the US, Carolyn had roles in the televison series' Melrose Place, The Larry Sanders Show and Babylon 5.
She also appeared in numerous plays in Los Angeles like Harold Pinter's Betrayal, Private Lives at the La Mirada Playhouse, and Shadowlands which was produced by the late former Governor of Michigan, George Romney. |
Modulation of small GTPase activity by NME proteins.
NME proteins are reported to influence signal transduction activity of small GTPases from the Ras superfamily by diverse mechanisms in addition to their generic NDP kinase activity, which replenishes the cytoplasmic pool of GTP. Comprehensive evidence shows that NME proteins modulate the activity of Ras GTPases, in particular members of the Rho family, via binding to their major activators GEFs. Direct interaction between several NMEs and Ras GTPases were also indicated in vitro and in vivo. These modes of regulation are mainly independent of the NME's kinase activity. NMEs also modulate the Ras-mediated signal transduction by interfering with the formation of a Ras signaling complex at the plasma membrane. In several examples, NMEs were proposed to perform the role of GAP proteins by promoting hydrolysis of the bound GTP, but this activity still requires additional verification. Early suggestions that NMEs can activate small GTPases by direct phosphorylation of the bound GDP, or by high-rate loading of GTP onto a closely apposed GTPase, were largely dismissed. In this review article, we survey and put into perspective published examples of identified and hypothetical mechanisms of Ras signaling modulation by NME proteins. We also point out involvement of NMEs in the transcriptional regulation of components of Ras GTPases-mediated signal transduction pathways, and reciprocal regulation of NME function by small GTPases, particularly related to NME's binding to membranes. |
Introduction
============
Fast growing *Populus* clones are among the most common lignocellulosic feedstocks for second-generation bioenergy production in Europe ([@B3]; [@B86]; [@B82]; [@B26]). A recent report of the International Poplar Commission indicates that the total area of short rotation coppice (SRC) *Populus* across Europe is about 23,502 ha ([@B30]). However, the current surface area planted with SRC *Populus* in Europe was estimated at about 45,000 ha by Alasia Franco Vivai (Franco Alasia, Personal Communication), taking into account the establishment of few thousands ha in recent years in Poland. Compared to alternative bioenergy crops, SRC plantations offer versatile year-round coppice cycles and high yield to input ratio ([@B91]). To alleviate the conflict between food and biofuel production ([@B80]; [@B27]), SRC plantations are typically grown on marginal lands, which are inadequate for high productivity crop growth ([@B43]), thus generating an income without the need for a land remediation period ([@B69]).
Short rotation coppice *Populus* clones are selected from world-wide breeding programs based on interspecific hybridization, whereby black poplar (*Populus nigra* L.) is a fundamental parental pool ([@B93]); being widely and naturally spread in Europe, typically associated with riparian ecosystems, and characterized by large phenotypic and genetic variability ([@B101]; [@B77]; [@B22]). Moreover, *P. nigra* has been thoroughly studied due to its numerous adaptive characteristics, including easy clonal propagation, good coppicing ability, resistance to pathogens and parasites ([@B8]), prolonged growing season ([@B81]), and high plasticity in response to environmental conditions ([@B15]). Breeding strategies based on recurrent selection and testing are frequently implemented for gradual population improvement ([@B65]). Acceleration of the *Populus* domestication is also expected through recurrent intraspecific crossing and higher order species mixes, yet to be supplemented by genomic selection, association genetics, and genetic engineering ([@B42]). While first-generation hybridization (F~1~) is adopted to obtain heterosis for growth rate ([@B94]), advanced generation breeding, such as F~2~ hybridization, among closely related *Populus* species, has proved to be an efficient strategy toward genetic improvement ([@B92]).
Field-grown trees are routinely exposed to environmental stress and are likely to experience unprecedented rises in temperature and increases in the frequency and severity of summer drought episodes in the future ([@B58]; [@B46]). The physiological responses to drought are complex and traits vary in their importance depending on intensity, duration, and timing of the drought ([@B11]; [@B98]; [@B41]). These traits present as reduced leaf size, decreased leaf growth rate, lowered stomatal aperture and density, reduced stomatal conductance (*g*~s~), and altered patterns of root development ([@B98]). Furthermore, inside the leaf, prolonged drought periods reduce CO~2~ assimilation rates and the extra energy dissipation, with a consequent increase in reactive oxygen species production, leading to leaf senescence and yield loss ([@B70]). Physiological and molecular studies on drought tolerance in *Populus* have shed light on the considerable divergence in response to water deficit between different genotypes ([@B61]; [@B63]; [@B95]; [@B45]; [@B75]; [@B18]; [@B102]).
Plant tolerance to abiotic stresses is an ambiguous concept, even after distinguishing different strategies such as avoidance, tolerance, and escape ([@B57]). Depending on their genetically dictated molecular and physiological attributes, plants budget their water in very different ways, along a continuum that ranges from the water-conserving or risk-aversion behavior displayed by isohydric plants to the risk-taking behavior displayed by anisohydric plants ([@B97]; [@B64]; [@B84]; [@B5]).
In reduced water availability conditions, the relationship between *g*~s~ and leaf temperature has been utilized as a valid indicator of trees' response ([@B16]; [@B12]; [@B50]; [@B19]; [@B74]; [@B96]). Therefore, relating the leaf temperature of individuals to the average value of a population exposed to similar environmental conditions may be indicative of the trees' state of stress.
A major obstacle to a more effective dissection of plant response to drought is the difficulty in properly phenotyping in a high-throughput fashion. To relieve a phenotyping bottleneck, phenotypic traits should be turned into quantifiable, objective, and consistent measures. Furthermore, automated and high-throughput phenotyping (HTP) on large-scale plant populations is expected to increase the probability of detecting crucial traits and, thus, identifying effective genotype-phenotype relationships ([@B36]). HTP envisions a suite of strategies to speed up the phenotyping process and maximize the number of studied plants per experiment ([@B36]). These methods enable automated, non-destructive, and non-invasive screening of high dimensionality populations, and thus, allowing the same plants and their responses to changing environmental factors to be monitored throughout their life cycle ([@B28]). To facilitate data interpretation, HTP platforms often involve observations in controlled conditions, such as growth chambers and greenhouses. However, plant performance in highly controlled conditions is poorly correlated with breeders' target commercial and real-world environments ([@B105]; [@B4]; [@B20]; [@B35]; [@B47]; [@B71]). With regards to the specific case of drought, phenotyping under controlled conditions is highly challenging. In fact, the declining soil moisture content and increasing mechanical impedance typical of droughts are difficult to replicate in pots that are much smaller than the volume of soil available in the field ([@B13]; [@B68]). This fact may result in fast plant response through stomatal closure, which may, in turn, mask slower adaptive processes.
High-throughput phenotyping approaches seek to gather remote information; however, close-range (proximal) sensing is frequently required to provide the adequate resolution to decipher phenotypic traits ([@B105]). Proximal HTP combines robotic technology and imaging to enable high-dimensional phenotype screening and capture. Unmanned aerial vehicles (UAVs) equipped with cameras and sensors are proximal remote sensing that bridge the gap between time consuming ground-based measurements and satellite/airborne observations ([@B34]). Compared to traditional ground-based techniques, UAVs enable rapid and non-destructive measurements. They also offer much quicker turnaround times than satellites at competitive costs ([@B9]). In terms of spatial resolution, different from satellites, UAVs allow the acquisition of images whose pixels are significantly smaller than objects of interest, thus minimizing the bias effect due to background intensity (mixed-pixel problem) ([@B54]). In contrast to aircrafts, such as manned helicopters, UAVs can safely hover at low altitudes in the proximity of plants, thus allowing high resolutions at low costs ([@B105]). In light of such advantages, UAVs are expected to open new avenues in field-based phenotyping of multiple stress traits and large populations rapidly, precisely, and accurately.
With regards to the evaluation of drought response, conventional ground-based methods typically require *g*~s~ measurements, which involve time consuming contact with leaves ([@B59]; [@B19]). Alternatively, based on the relationship between *g*~s~ and leaf temperature, UAVs have been furnished with thermometers and thermal infrared (TIR) cameras to capture images of large-scale populations ([@B9]). TIR cameras show great potential in phenotyping as thermal images contain spatially distributed information about the energy emitted from body surfaces, such as plant leaves. Thermal images can be used to detect the state of stress due to drought and indirectly estimate *g*~s~ through the leaf energy balance equation ([@B51], [@B52]). Since canopy temperature (*T*~c~) has long been recognized as a measure of plant water status ([@B53]), UAVs mounting sensors have been used for mapping drought response of agricultural crops at 20--40 cm spatial resolution ([@B88], [@B89]; [@B108]).
Although imaging has revolutionized plant phenotyping through the early and quantitative detection of plant traits in objective terms ([@B23]; [@B36]), massive image data handling and processing remains the rate-limiting step in HTP ([@B29]). Image post-processing may include several steps, such as calibration and undistortion ([@B9]; [@B109]; [@B4]), which should be automated in data management pipelines to boost HTP. Within data post-processing, the identification of objects of interest in images against other objects and the background (segmentation) ([@B49]) is often the most critical step ([@B23]). In phenotyping studies, segmentation algorithms have been developed for plant three-dimensional measurements ([@B17]) and to estimate crown architecture parameters ([@B24]). For imaging to substantially contribute to HTP, standardized semi-automated image processing tools should be introduced and complemented with ground-truthing through well-established point measurement sensors ([@B29]).
Here, we developed a novel methodology for field HTP (HTFP) of drought stress in a *P. nigra* F~2~ partially inbred population using TIR images recorded from a UAV platform. The objectives of this study were to establish a field-scale HTP procedure to rapidly and precisely examine drought stress in trees; to provide objective image-based tools and statistical protocols to quantify phenotypic traits of moderately stressed and non-stressed trees; and to use HTFP to identify promising drought-tolerant genotypes for potential use within *Populus* breeding programs.
Materials and Methods {#s1}
=====================
The workflow of the developed methodology is illustrated in **Figure [1](#F1){ref-type="fig"}**. The HTFP method involves the following four steps: (1) UAV-based thermography to capture tree *T*~c~; (2) semi-automatic georeferencing, orthorectification, and mosaicking of TIR images; (3) tree canopy identification against bare soil through two independent image segmentation approaches; and (4) ground-truthing validation of UAV-based thermal data with *g*~s~ data.
{#F1}
Field Experiments
-----------------
### Plant Material and Experimental Design
POP6 is a full-sib F~2~ partially inbred population consisting of 691 genotypes obtained from an intraspecific controlled cross between two *P. nigra* parents, P64 and P36. Parents have been randomly selected from an F~1~ breeding population (POP5) of 457 genotypes, obtained from an intraspecific *P. nigra* controlled cross between genotypes 58-861 and Poli (**Figure [1A](#F1){ref-type="fig"}**). Such genotypes originated from natural populations in divergent environmental conditions: 58-861 is from cold/wet climates typical of Val Cenischia (Northern Italy; 45°09′N, 07°01′E, 597 m above sea level), whereas Poli originates from warm/dry climates typical of Policoro (Southern Italy; 40°09′N, 16°41′E, 7 m above sea level). These genotypes are characterized by contrasting responses to water stress ([@B75]; [@B18]).
In January 2012, F~2~ genotypes were used to establish a stool bed and produce 1-year old material. Such material was harvested in January 2013 to produce hardwood cuttings. A large number of hardwood cuttings (20 cm long) was obtained per each genotype, and cuttings whose diameter was within 3--4 cm and with a large number of intact buds were labeled and stored at +4°C.
The experimental field-scale plots were located in Savigliano (Northern Italy; 44°35′36.97″N, 07°37′15.27″E, 349 m above sea level), and were established in April 2013. Two adjacent plots (1.67 ha of total extension) were developed to expose POP6 genotypes to two different water treatments (see Section "Water Treatment") (**Figure [1B](#F1){ref-type="fig"}**). Each plot featured a completely randomized block design with four blocks. A single hardwood cutting per genotype was randomly assigned to each block to minimize variability attributable to eventually uncontrollable environmental factors (such as soil composition and fertility). Differently, for P64, P36, 58-861, and Poli, four cuttings were replicated per each block to ensure larger data availability. Cuttings were planted at a distance of 2.5 m × 1 m, between and within rows, respectively. In addition, the border effect, i.e., trees planted at external locations of plots display better growth conditions, was minimized by planting a double border row of *P. nigra* cv. Jean Pourtet around the sides of each plot. Therefore, a total of 6716 trees were planted in the experimental plots.
In March 2013, multiple sprouts were thinned to a single stem per stamp, choosing the most vigorous. During the first growing season in 2013, drought treatment was not applied to ensure a homogeneous root system development and, thus, minimize effects on shoot growth due to different cutting dimensions. In the same growing season, both plots were regularly irrigated with a drip irrigation system during dry periods, and weeds were controlled using mechanized and chemical practices. In February 2014, experimental plots were coppiced, and for the second growing season in 2014, plots were managed similarly to 2013. In February 2015, trees were again coppiced and, in March 2015, re-sprouts were thinned to a single stem. Finally, due to a mortality of 12.7% of the original trees planted in 2013, 4603 plants (503 genotypes) were available at the beginning of the drought experiment in July 2015.
### Weather and Soil Condition Analysis
Weather data at the experimental setup were obtained from a meteorological station managed by Agency for Protection of Environment -- Piemonte (ARPA-Piemonte^[1](#fn01){ref-type="fn"}^) and located at 10 km from the experimental plots. Observations gathered from 1994 to 2013 indicate an annual mean temperature of 11.8°C and a total annual rainfall of 740 mm at the site. According to Köppen-Geiger classification ([@B56]), climate was classified as Cfb, that is, warm temperate, fully humid and with warm summers. During the experiment in 2015, a 2 km distant meteorological station (Delta-T Devices Ltd., United Kingdom) was also used to record hourly air temperature (*T*~air~), air humidity, and precipitation.
Soil samples were collected from the middle of plots to quantify soil texture and to estimate field capacity and permanent wilting point. These samples were taken from topsoil down to a maximum depth of 0.5 m. The soil type was a sandy loam (50.5% sand, 35.5% loam, and 14.0% clay), using the United States Department of Agriculture soil taxonomy. Soil field capacity and permanent wilting point were estimated to 34 and 9.5%, respectively. Soil texture was estimated using gravimetric analysis, whereas soil field capacity and permanent wilting point were evaluated using the pressure-based method ([@B76]).
### Water Treatment
Response to drought stress was investigated by exposing POP6 to different water regimes for a period of 26 days, from 2nd July 2015 (day of the year; DOY 183) to 28th July 2015 (DOY 209). In one plot, well-watered (WW) conditions were maintained, whereby water lost during the day through tree evapotranspiration (*ET*~c~, mm) was daily restored via drip irrigation, see **Figure [1B](#F1){ref-type="fig"}**. Water provisioned through drip irrigation was estimated based on site-specific reference evapotranspiration (*ET*~0~, mm) and on *Populus* crop coefficient (k~c~). *ET*~0~ was found according to FAO-56 Penman-Monteith equation ([@B1]), and k~c~ was set to 0.84 in July and to 1.21 in August ([@B40]). In the other plot, moderate drought (mDr) conditions were established by exposing plants only to natural rainfall. Drought was imposed by withholding irrigation from DOY 183, and monitoring the progressive reduction of soil moisture until a pre-wilting (i.e., sub-lethal) level of soil water content was achieved.
In each plot, soil water content was daily monitored through a time domain reflectometry SM150 Soil Moisture Sensor (Delta-T Devices Ltd., United Kingdom) installed at 50 cm underneath the soil surface. Four measures per day were recorded using a DL6 Data Logger (Delta-T Devices Ltd., United Kingdom), and the daily average soil water content was estimated. Such system allowed controllability over the experiment, by ensuring that WW and mDr conditions were maintained in the plots. During the drought experiment, daily average *T*~air~ (°C), daily rainfall (mm), daily water deficit (mm), and soil water content expressed as percentage of water field capacity (%FC) in WW and mDr plots were reported (Supplementary Figures [S1A--C](#SM1){ref-type="supplementary-material"}). Soil permanent wilting point is reported as a percentage of the water field capacity (%FC = 27.9%). Daily water deficit was calculated as the difference between precipitation and *ET*~c~, according to [@B14].
Data Acquisition and Processing
-------------------------------
### UAV Campaign
An unmanned FlyNovex^®^ multi-copter (FlyTop, Italy) was integrated with a FLIR A35 TIR camera (FLIR Systems, United States), see **Figure [1D](#F1){ref-type="fig"}**. FlyNovex^®^ is a versatile and powerful (24V-6S motors) hexacopter (120 cm diagonal size) with a highly resistant carbon fiber frame and offering a 7 kg take-off weight. Its maximum transmission distance is 2 km and its maximum flight time is 20 min. The FLIR A35 was equipped with a 9 mm f1.25 lens. Its thermal sensitivity is less than 0.05°C at 30°C and the camera enables measurements in the range -25°C to +135°C. The image sensor is a Focal Plane Array (FPA) based on uncooled microbolometers with a spectral response in the range 7.5--13 μm. The camera field of view is equal to 48° (horizontally) × 39° (vertically), its resolution to 320 pixels × 256 pixels, and its spatial resolution to 2.78 mrad. The camera captures images at an acquisition frequency of 60 Hz.
Pictures are stored as 14 bit digital raw images. The camera is radiometrically calibrated, and its high accuracy and pixel-to-pixel sensitivity circumvent the need for ground infrared calibration targets and temperature correction during post-processing ([@B21]; [@B37]). The camera is controlled by an embedded computer (Pico PC with a Cortex 9 processor) that stores raw images on an internal micro SDD memory card for the entire duration of the flight.
A total of 16 highly visible targets were positioned along the borders of the experimental plots (8 targets per plot were located at the corners and in the middle of each side) and used as ground control points (GCPs). The targets were used for georeferencing thermal images. A Real-Time Kinematic global positioning system (GPS; Leica Geosystems, Switzerland) GS08plus model with an accuracy of 3 mm was used for capturing GCP locations.
### Flight Plan and Thermal Imaging
The flight mission was planned using the open source autopilot Mission Planner (APM Mission Planner, United States). The UAV was flown in the autonomous mode (GPS-waypoint navigation) at a nominal speed of 3 m/s. Experimental plots were scanned during two 11-min flights conducted on 28th July 2015 under stable cloudless and low-wind conditions. To ensure similar solar illumination angles and consistent proportions of sunlit and shaded leaves ([@B20]), flights were performed at 13:41 local time above WW and at 14:30 local time above mDr.
To capture the experimental plots in a single flight pass while maximizing image resolution, flight plan consisted of transects parallel to the plant rows, see **Figure [1E](#F1){ref-type="fig"}**. A ground station processed the UAV safety manual control and sent telemetry data (position, attitude, and status data) through a radio link at 2.4 GHz to a laptop computer. This communication link also allowed operation of the onboard TIR camera.
Thermal images were recorded at an elevation of 25 m from ground level, thus yielding an 8.9 (vertical) m × 11.1 (horizontal) m and a pixel size of 6 cm × 6 cm. Such a resolution is within POP6 average leaf area (46.47 cm^2^ or 1.3 pixels, unpublished data). Flying at such an elevation minimizes image distortions due to atmospheric effects. The selected flight plan enabled capture of thousands of high quality single images presenting 30% overlap and 50% sidelap. Since images captured during take-off, landing, and flight maneuvers were discarded from further processing, acquisition of images took a few minutes per experimental plot.
### Stomatal Conductance Ground-truthing
To validate the UAV-based approach, we studied the relationship between ground-based midday stomatal conductance (*g*~s~, mmol m^-2^ s^-1^) and *T*~c~ collected from the UAV for selected genotypes, see **Figure [1C](#F1){ref-type="fig"}**. At the same time of UAV flights, we collected abaxial *g*~s~ data using a dynamic diffusion porometer (AP4, Delta-T devices Ltd., United Kingdom). Measurements were taken on three biological replicates per two water treatments on each of the four parental genotypes (3 × 2 × 4 = 24 trees). On each tree, two *g*~s~ technical replicates were taken on the first sunlit fully expanded leaf from the canopy top. For each plot, before measurements, the porometer was calibrated according to the experimental site *T*~air~ and humidity. Instrument calibration, *g*~s~ measurements, and moving within and between plots required approximately 3 h.
### Thermal Image Processing
We collected a total of 7836 thermal images (".fff" files) during the UAV campaign. Given the high overlap and sidelap, one frame every 20 (392 images) was converted to radiometric ".jpg" through IRT Analyzer (Grayess, United States), and fish-eye undistorted through Adobe Photoshop CC (Adobe Systems, United States) (lens adjustment tool) by setting the camera focal length to 9 mm, see **Figure [1F](#F1){ref-type="fig"}**. Image mosaicking was performed with the Image Composite Editor software (Microsoft Corporation, United States), and radiometric mosaics were then converted to grid data with Surfer (Golden Software, United States). Mosaics were orthorectified and georeferenced with ArcGIS 9.2 (ESRI, United States). Orthomosaics were georeferenced by manually matching the surveyed 16 GCPs (**Figure [1F](#F1){ref-type="fig"}**).
Mosaics were processed to remove bare soil pixels ([@B54]), and used to estimate average *T*~c~ (°C) for each tree. In particular, radiometric mosaics were combined with the position of the tree centers and spacing in the experimental plots (**Figure [2](#F2){ref-type="fig"}**). Firstly, radiometric mosaics were segmented to automatically identify regions depicting trees. Canopy identification was achieved through two independent semi-automatic image segmentation approaches (**Figure [1G](#F1){ref-type="fig"}**). We utilized the eCognition commercial software (eCognition Developer 9, Tremble Inc., United States) that is commonly adopted in image-based analysis for environmental applications. Further, we in-house developed a second segmentation algorithm in a Matlab environment (Matlab R2014a, The Mathworks Inc., United States).
{#F2}
In the eCognition segmentation, parameters such as canopy shape (set to 0.1), compactness (set to 0.5), and scale (set to 10) were used to identify trees. To address bare soil pixel removal, two pixel classes were introduced. One class included pixels at temperatures ranging from 15 to 27°C and from 14 to 28°C for WW and mDr, respectively (named "Poplar" in **Figure [1G](#F1){ref-type="fig"}**). Conversely, the second class consisted of pixels at temperatures lower and higher than the above ranges (named "Weed" and "Soil" in **Figure [1G](#F1){ref-type="fig"}**). We visually ascertained in the radiometric mosaics that the first class of temperatures was related to plants, and the second to soil and weed. Segmented areas "Weed" and "Soil" were discarded in the subsequent temperature extraction analysis.
In the alternative segmentation approach, Otsu's threshold selection method was implemented on the entire radiometric mosaics ([@B67]). Mosaic histograms were thresholded to obtain nine level-segmented images. The effectiveness of the segmentation was assessed through Otsu's objective criterion (*N* = 0.99 in case of eight thresholds). Based on visual inspection of the mosaics, pixels at temperatures ranging from 15 to 27°C (WW) and from 14 to 28°C (mDr) were retained for estimating average *T*~c~.
After segmentation, pixels relative to soil and weed were assigned null temperature values in the radiometric mosaics. Then, 40 cm-radius circular buffers centered on the trees were intersected with the segmented mosaics (**Figure [2](#F2){ref-type="fig"}**). Since neighboring plants were spaced by 1 m within a row, such conservative buffer was selected to guarantee the precise identification of each plant canopy. Finally, *T*~c~ for each tree was calculated by averaging pixel values lying inside each intersected buffer.
### Statistical Analysis
Phenotypic variance of a total of 503 genotypes was investigated using R software (R v.3.1.3, R Foundation for Statistical Computing, Austria). Due to natural replicates mortality since plot establishment, only genotypes with at least three replicates in both WW and mDr were retained in the analysis. Two-way ANOVA (ANalysis Of VAriance) inferential statistic procedure was used to describe the effects of genotype, treatment, and their interaction on total phenotypic variance observed in POP6. To respect ANOVA assumptions, the Box-Cox procedure ([@B10]) was performed on the additive model to yield optimal data transformation, and Bartlett's test was used to test the homogeneity of variance. When statistically significant differences among blocks were found, block effect adjustment was conducted to minimize the influence of competition among neighboring trees on genotype-specific response to drought conditions. Adjustment was performed according to [@B25], and it was repeated separately for each experimental plot.
The generalized linear mixed model was built to test differences among genotypes within each treatment and between the two treatments, and differences due to the genotype by treatment interaction (G × T). G × T aims at testing the consistency in the relative performance of genotypes grown in different conditions ([@B106]). Statistical significance was considered for *p*-values ≤ 0.05. To capture the proportion of total phenotypic variance due to genetic variation, broad-sense heritability (*H*^2^) was estimated for *T*~c~ in each treatment according to [@B87]:
H
2
=
σ
G
2
/
\[
σ
G
2
\+
(
σ
ϵ
2
/
r
)
\]
Here, $\sigma_{G}^{2}$ and σ~ε~^2^ are the genetic and residual variance components, respectively, and *r* is the average number of replicates for a genotype within treatment (i.e., 3.5).
Moreover, to provide a better estimation, *H*^2^ was calculated over combined treatments, taking into account the G × T effects on total variance:
H
2
=
σ
G
2
/
\[
σ
G
2
\+
(
σ
G
×
T
2
/
n
)
\+
(
σ
ϵ
2
/
n
r
)
\]
Here, $\sigma_{G \times T}^{2}$ is the G × T variance component, *n* is the number of treatments, and *r* is the average number of replicates for a genotype in the experiment (i.e., 7.3).
Variance components were obtained using the restricted maximum likelihood (REML) procedure, with treatment as fixed effect, and genotype and G × T as random effects.
Finally, to evaluate the robustness of the independent segmentation procedures, differences between *T*~c~ datasets obtained with eCognition and Matlab, and the precision of both procedures was tested using the Student's *t-*test and the Spearman's rank correlation test. Statistical significance of the correlation coefficient (*ρ*) was considered for *p*-values ≤ 0.05.
### Stress Susceptibility Index
*Populus nigra* genotype response to drought was dissected by computing the Stress Susceptibility Index (SSI) on UAV-based *T*~c~. Such an index has proved to be an efficient tool to classify plants according to their tolerance or sensitivity to water stress ([@B85]). SSI was calculated based on genotypic mean *T*~c~ according to [@B32]:
S
S
I
=
\[
1
−
(
T
c
m
D
r
/
T
c
W
W
)
\]
/
\[
1
−
(
T
c
¯
m
D
r
/
T
c
¯
W
W
)
\]
Here, *T*~c~mDr and *T*~c~WW correspond to genotypic means under mDr and WW conditions, respectively, and ~c~mDr and ~c~WW correspond to POP6 means in mDr and WW conditions, respectively.
Negative SSI values correspond to a decrease in the genotypic mean *T*~c~mDr with respect to *T*~c~WW together with an increase in ~c~mDr with respect to ~c~WW. SSI values equal to 0 indicate consistent genotype means in mDr and WW conditions, regardless to POP6 mean responses. SSI values comprised between 0 and 1 indicate that *T*~c~ increase in mDr with respect to WW in the genotype is lower than *T*~c~ increase observed in the population. SSI values equal to 1 correspond to consistent deviations between mDr and WW conditions for both genotype and population means. SSI values greater than 1 indicate that *T*~c~ increase in mDr with respect to WW in the genotype is greater than *T*~c~ increase observed in the population. Therefore, genotypes whose index lies between 0 and 1 suggest an improved response to drought as compared to the overall population behavior.
Results
=======
UAV-Based HTFP for Detecting Response to Drought
------------------------------------------------
The UAV-based methodology allowed collection of high-throughput thermal data on experimental plots covering an area of 1.67 ha in only 22 min. While ground-truthing required 3 h to obtain *g*~s~ data on 24 trees, by performing only two low-elevation UAV flights, we were able to capture the response to drought of 6716 trees with a spatial resolution of 6 cm × 6 cm, that is, at POP6 sub-leaf definition. The methodology was simple to implement in the field: TIR camera required no infrared target-based calibration; standard GCPs were located in the experimental plots; and the UAV was autonomously navigated based on pre-planned mission (**Figure [1](#F1){ref-type="fig"}**). Data processing was almost fully automated: images were undistorted, mosaicked, and orthorectified with commercial user-friendly software. The supervision of an expert was mandatory to georeference the orthomosaics and to segment images. Image segmentation allowed for addressing the mixed-pixel problem and automatically identifying tree canopies through two independent algorithms. Both methodologies required an expert user to set parameters and classes based on visual inspection of the orthomosaics, and their implementation was computationally inexpensive. The extraction of tree *T*~c~ from radiometric orthomosaics for both treatments was executed within 1 h, and computational time devoted to statistical analyses was on the order of a few minutes.
To validate UAV-based data, we utilized *T*~c~ of selected genotypes to recover the well-known inverse correlation between *g*~s~ and the difference between *T*~c~ and *T*~air~ ([@B31]; [@B19]; [@B103]). **Figure [3](#F3){ref-type="fig"}** illustrates the relationship between *g*~s~ and the difference between *T*~c~ and the air temperature at the time of the UAV flight (T~a~) for parental genotypes. They were chosen due to specific morphological and ecological traits, which were expected to lead to divergent drought responses. In **Figure [3A](#F3){ref-type="fig"}**, we show eCognition-based data, and, in **Figure [3B](#F3){ref-type="fig"}**, we report Matlab-based data. In both graphs, data relative to mDr conditions are found at high values on the *X*-axis and with *g*~s~ ranging from 154--434 mmol m^-2^ s^-1^ on the *Y*-axis, whereas lower WW data correspond to higher *g*~s~ values (ranging from 422 to 700 mmol m^-2^ s^-1^). Both data sets were fitted with a linear regression, statistically significant at an *R*^2^ of 0.49 (*p*-value \< 0.05), suggesting that UAV-based thermal data accurately captured plant response to drought conditions. *T*~c~ and *g*~s~ mean values, with relative standard errors, are shown in **Table [1](#T1){ref-type="table"}**.
{#F3}
######
Phenotypic data for *T*~c~ and *g*~s~ for poplar parental genotypes.
*g*~s~ (mmol m^-2^ s^-1^) eCognition-based *T*~c~ -*T*~a~ (°C) Matlab-based *T*~c~ -*T*~a~ (°C)
-------- --------------------------- -------------------------------------- ---------------------------------- -------------- -------------- --------------
Poli 700 ± 60 434 ± 16 -7.86 ± 1.33 -7.08 ± 0.73 -7.86 ± 1.33 -7.08 ± 0.70
58-861 422 ± 32 154 ± 6 -9.48 ± 1.25 -5.77 ± 0.36 -9.29 ± 1.44 -5.95 ± 0.18
P36 631 ± 95 414 ± 215 -9.25 ± 0.80 -7.82 ± 1.50 -9.05 ± 0.99 -7.82 ± 1.49
P64 639 ± 120 366 ± 45 -9.66 ± 0.69 -5.96 ± 1.21 -9.66 ± 0.69 -5.99 ± 1.17
Mean values with standard errors (Mean ± SE) within each drought treatment for
g
s
(mmol m
\-
2
s
\-
1
) and for the difference between
T
c
and
T
a
(°C).
Remarkably, both segmentation approaches led to consistent relationships. To further assess the robustness of the independent segmentation methodologies, we computed the Student's *t-*test on POP6 genotypic mean *T*~c~, separately for mDr and WW conditions. Notably, differences in data obtained with eCognition and Matlab were not statistically significant for both treatments (WW: *p*-value = 0.82 and mDr: *p*-value = 0.36). Moreover, on data sets obtained with eCognition and Matlab, we also evaluated the Spearman's rank correlation test, and *ρ*-values of 0.98 (*p*-value \< 0.001) were found for both WW and mDr conditions. Based on such strongly significant correlation, both segmentation methods showed consistent *T*~c~ estimations and, therefore, could be interchangeably utilized to extract *T*~c~ from thermal images. In the succeeding figures, we report results for eCognition data; genotypic mean *T*~c~ along with standard error and SSI values for both eCognition and Matlab are provided in the Supplementary Tables [S1](#SM1){ref-type="supplementary-material"}, [S2](#SM1){ref-type="supplementary-material"}.
POP6 Response to Drought
------------------------
We report results for 503 genotypes (out of the original 691, due to tree mortality) for eCognition and Matlab-based segmentations. We only retained genotypes with at least three survived replicates in both mDr and WW conditions.
To show within-population and within-genotype variability in *T*~c~, **Figure [4](#F4){ref-type="fig"}** displays genotypic mean *T*~c~ in WW (A) and mDr (B) conditions as obtained after segmentation with eCognition. In addition, in **Figure [4C](#F4){ref-type="fig"}**, we compared the genotypic response to drought by reporting the relative increase in *T*~c~mDr with respect to *T*~c~WW (*T*~c~mDr/*T*~c~WW). Genotypes were ordered based on increasing *T*~c~ (**Figures [4A,B](#F4){ref-type="fig"}**) and *T*~c~mDr/*T*~c~WW (**Figure [4C](#F4){ref-type="fig"}**). Dashed red lines show POP6 mean *T*~c~ (**Figures [4A,B](#F4){ref-type="fig"}**) and *T*~c~mDr/*T*~c~WW (**Figure [4C](#F4){ref-type="fig"}**).
{#F4}
In **Figure [4A](#F4){ref-type="fig"}**, a percentage of 49.3% of genotypes lies above the average *T*~c~ of 19.55°C. For Matlab, 48.4% of genotypes were found above a consistent average *T*~c~ of 19.55°C. Further, the standard error of each genotypic mean ranges from 0.05 to 2.86 for eCognition and from 0.05 to 3.24 for Matlab. In **Figure [4B](#F4){ref-type="fig"}**, a percentage of 46.3% of genotypes lies above the average *T*~c~ of 21.60°C. For Matlab, 47.4% of genotypes were found above a similar average *T*~c~ of 21.55°C. Further, the standard error of each genotypic mean ranges from 0.08 to 3.56 for eCognition and from 0.16 to 3.17 for Matlab. Genotypic mean *T*~c~ in mDr was on average warmer than in WW conditions. In WW settings, in eCognition, average *T*~c~ ranged from 16.62 to 23.33°C (Matlab: *T*~c~ ranged from 16.62 to 23.06°C). With regards to mDr settings, in eCognition, average *T*~c~ spanned from 18.16 to 26.00°C (average *T*~c~ in mDr ranged from 18.14 to 24.87°C for Matlab).
In **Figure [4C](#F4){ref-type="fig"}**, the average ratio is equal to 1.11 for both eCognition and Matlab. The percentage of genotypes lying above such value (up to a maximum value of 1.41) is equal to 49.7 and 48.6% for eCognition and Matlab, respectively. A total of 37.38% (Matlab: 38.49%) of genotypes are found between 1 and 1.11, whereas only 12.92% (Matlab: 12.90%) of genotypes have ratios ranging from 0.79 to 1.
To inspect the frequency distribution of genotypic response to drought, in **Figure [5](#F5){ref-type="fig"}** we report histograms for genotypic mean *T*~c~ obtained with eCognition for WW (A) and mDr (B) conditions. Such frequency distribution is expected to provide insights into POP6 average response to treatments and also the population response with respect to 58-861 and Poli. Both graphs display an approximately symmetric distribution (skewness lower than 0.4) with a slightly platykurtic shape (kurtosis almost equal to 0). Similar data distributions were found for Matlab (**Table [2](#T2){ref-type="table"}**). Further, we show average *T*~c~ for 58-861 and Poli genotypes. In WW, parental genotypes present a similar *T*~c~ (58-861 equal to 19.84 and 19.80°C; Poli equal to 19.76 and 19.75°C in eCognition and Matlab, respectively). Conversely, a greater difference in *T*~c~ between parental genotypes was found in mDr than in WW (58-861 equal to 20.88 and 20.93°C; Poli equal to 21.78 and 21.66°C in eCognition and Matlab, respectively). Different from parental genotypes, POP6 showed a large range of variation within WW and mDr treatments for both segmentation procedures. Indeed, for eCognition, average *T*~c~ ranged from 16.62 to 23.33°C in WW, and from 18.20 to 26.01°C in mDr. For Matlab, a very similar range of variation (with respect to eCognition) was found in WW (from 16.62 to 23.05°C), whereas a narrower range was observed in mDr (from 18.16 to 24.84°C).
{#F5}
######
Frequency distribution shape parameters.
Segmentation Procedure Treatment Mean (°C) Median (°C) Kurtosis Skewness
------------------------- ----------- ----------- ------------- ---------- ----------
eCognition-based *T*~c~ WW 19.55 19.53 -0.13 0.27
mDr 21.60 21.49 -0.01 0.35
Matlab-based *T*~c~ WW 19.55 19.48 -0.13 0.28
mDr 21.55 21.48 -0.30 0.18
T
c
Mean (°C), median (°C), kurtosis, and skewness values for histograms in
Figure
5
.
To quantitatively assess the effect of the treatments on POP6, a two-way ANOVA was used to analyze *T*~c~ differences among genotypes, between treatments, and due to G × T interaction (**Table [3](#T3){ref-type="table"}**). Notably, differences among genotypes were not statistically significant. On the other hand, differences between treatments were statistically significant. Finally, G × T interaction was not statistically significant for both eCognition- and Matlab-based *T*~c~.
######
Two-way ANalysis Of VAriance (ANOVA) on eCognition and Matlab-based *T*~c~ (°C) in POP6.
Segmentation procedure Source of variance Degrees of freedom Sums of squares Mean square *F*-ratio *p*-value
---------------------------- -------------------- -------------------- ----------------- ------------- ----------- -----------
eCognition-based *T*~c~^∗^ Genotype 498 0.01564 0.000031 1.056 0.211
Treatment 1 0.02108 0.021077 708.437 \<0.001
G × T 498 0.01542 0.000031 1.041 0.276
Error 2634 0.07836 0.000030
Total 3631 0.13050
Matlab-based *T*~c~^∗∗^ Genotype 498 0.0751 0.00015 1.037 0.295
Treatment 1 0.1038 0.10380 713.445 \<0.001
G × T 498 0.0765 0.00015 1.056 0.209
Error 2642 0.3844 0.00015
Total 3639 0.6398
∗
To respect ANOVA assumptions, individual eCognition-based
T
c
raw data were transformed by ˆ-1.
∗∗
To respect ANOVA assumptions, individual Matlab-based T
c
raw data were transformed by ˆ-0.5. Effects of genotype, treatment (well-watered, WW and moderate drought, mDr), and two-factor interaction (G × T) on
T
c
.
To address the relationship between genetic and environmental sources of variance, *H*^2^ of the *T*~c~ was estimated. Within treatment analysis resulted in very low *H*^2^ for both eCognition (WW: 0.09, mDr: \<0.01) and Matlab-based *T*~c~ (WW: 0.10, mDr: \<0.01). Similarly, very low *H*^2^ (0.015 in eCognition and \<0.01 in Matlab) was observed for combined treatments.
Selection of Putative Drought-Tolerant Genotypes
------------------------------------------------
Although the genotypic effect did not show a statistically significant influence on trait variance, we further analyzed *T*~c~ data to identify genotypes with improved drought tolerance. Genotype performance in response to drought is illustrated in **Figure [6](#F6){ref-type="fig"}**. Herein, the difference between single genotypic mean *T*~c~mDr and POP6 ~c~mDr is plotted against the difference between genotypic mean *T*~c~mDr and *T*~c~WW conditions. Data show a positive correlation, where highly stressed individuals are located at the tails of the distribution and correspond to a less frequent behavior. Genotypes are mostly evenly distributed above and below the *X*-axis; however, stressed conditions lead to a majority of data points lying in the first and fourth quadrants.
~c~mDr) less than 0 (genotypes are less stressed than the average POP6 response), and whose stress susceptibility index (SSI, defined in Section "Stress Susceptibility Index") lies between 0 and 1 (the temperature increase in mDr with respect to WW in the genotype is lower than the temperature increase observed in the population). Such genotypes suggest an improved response to drought stress as compared to the overall population behavior.](fpls-08-01681-g006){#F6}
From a drought-response perspective, the fourth quadrant in the biplot in **Figure [6](#F6){ref-type="fig"}** provides the most relevant information. Genotypes lying in the first and fourth quadrants \[436 (86.68%) in eCognition and 438 (86.88%) in Matlab\] present a *T*~c~mDr greater than *T*~c~WW. While genotypes in the first quadrant have a *T*~c~mDr greater than ~c~mDr, those in the fourth quadrant show a *T*~c~mDr smaller than ~c~mDr. A few genotypes display greater *T*~c~WW than *T*~c~mDr \[data points in the second and third quadrants, 67 (13.32%) out of the total number of genotypes in eCognition and 66 (13.12%) in Matlab\].
Due to mDr treatment, in genotypes found in the fourth quadrant (*T*~c~mDr \> *T*~c~WW and *T*~c~mDr \< ~c~mDr), *T*~c~ increased less than POP6 ~c~mDr. This suggested the onset of acclimation mechanisms and, therefore, an improved response to drought stress with respect to the overall population. Among such drought-tolerant genotypes, 25% of the total number of tested ones (25.65% in eCognition and 25.79% in Matlab) presented an SSI ranging from 0 to 1, that is, the relative increase in *T*~c~ from WW to mDr conditions was lower than the increase observed on average in the population. Genotypes 58-861 and Poli were also located in the fourth quadrant; however, none of them had an SSI comprised between 0 and 1.
Discussion
==========
In this study, we developed a UAV-based HTFP approach to investigate the response of *P. nigra* to mDr conditions in the field. We assessed the effects of two water treatments on the observed phenotypic variance of an F~2~ partially inbred population of 503 genotypes. Notably, we remotely captured high resolution images, whereby image pixels were several orders of magnitude smaller than a single tree crown, and smaller than POP6 average leaf area. Such a resolution could be essential to uncover physiological differences within single crowns. A large leaf-to-leaf variability has been observed for *g*~s~ and leaf temperature in wheat (*Triticum aestivum*), which has led to low values of *H*^2^ when estimated on a single-leaf basis ([@B73], [@B74]). [@B38] detected in mildly stressed almond (*Prunus dulcis*) that few areas within the crown had substantial stomatal closure while, in the rest of the crown, the stomata were still open and this increased heterogeneity of the *T*~c~. It has also been proposed that in cotton (*Gossypium* sp.) the variability of leaf temperature may provide important information about the degree of stomatal closure ([@B33]). In apple trees (*Malus pumila*) grown under drought conditions, the spatial variability of leaf temperature and *g*~s~ was higher for the whole crown than for the top crown ([@B66]). By contrast, our UAV-based thermal imaging provides an ideal approach for the collection of the large number of individual leaf temperatures, which are necessary for methods based on temperature frequency distributions simultaneously in one image, rather than point-wise approaches for investigating tree response to drought. We also expect *g*~s~ to be consistently homogeneous in the upper canopy, that is, where *g*~s~ measurements were conducted herein.
High image resolution enabled the extraction of biologically meaningful data; in fact, plant leaves were attributed several image pixels, thus allowing accurate estimations of *T*~c~. Such a rapid and non-invasive UAV-based procedure is expected to highly benefit phenotypic-based assisted-mass selection in early generation screening in breeding programs for bioenergy purposes. UAVs could, indeed, be adopted to capture high resolution images over sparsely vegetated environments, such as orchards ([@B88]; [@B89]), or over very extended areas, such as natural forests ([@B100]). While UAV-based phenotyping approaches have been already tested in agriculture, screening high dimensionality populations is a remarkable bottleneck in forestry applications and this is the first time that these measures have been applied to forest species.
Image processing at high speeds is a central challenge in the field of HTFP. Thermal imaging also allows leaves to be distinguished from the background. If done manually, however, the necessary image processing can be rather labor-intensive and may also be dependent on subjective image interpretation. Our images also identified thousands of tree canopies against background soil and weed through two independent semi-automated segmentation procedures. Segmentation was utilized to reduce the mixed-pixel problem by extracting contours of areas at consistent temperatures. Then, areas relative to trees were identified based on visual inspection of orthomosaics and retained for data processing. Alternative approaches, which are based on manually drawing tree canopies ([@B103]), would be extremely time-consuming and may lead to user-biased results. In this study, we developed and standardized a semi-automated image-based analysis procedure and directly applied it on thermal orthomosaics. Without relying on RGB images, we evaluated the sensitivity of the method to image segmentation by experimenting with two independent algorithms. Remarkably, both segmentations led to statistically similar tree responses to drought, thus supporting the robustness of the methodology.
The level of stress induced by the treatment was fully captured through thermal images. This was indicated by the inverse linear relationship between *g*~s~ and *T*~c~. An increase in the difference of *T*~c~ with respect to *T*~a~ corresponded to a decrease in transpiration flux and, therefore, to a decrease in the ratio of actual to potential transpiration ([@B31]; [@B103]). Similar linear regressions with slightly higher *R*^2^ have also been observed for orange (*Citrus sinensis*) (*R*^2^ = 0.70--0.78) ([@B108]; [@B6]), persimmon (*Diospyros kaki*) (*R*^2^ = 0.46) ([@B7]), and almond (*Prunus dulcis*) (*R*^2^ = 0.59--0.66) ([@B38]), using UAV, small airplanes, and ground screening techniques. However, comparable results for forest tree species through UAV-based phenomics are still undocumented.
As already pointed out in a previous greenhouse study on early effects of drought on *P. nigra*, Poli tended to quickly respond to stress by closing stomata due to the fact that Poli is adapted to dry/hot climatic conditions. However, 58-861 reacted more slowly to drought as it is considered better adapted to cool and moist climates ([@B18]). This behavior could be explained by proved geographical and environmental gradients of *g~s~*, with higher *g~s~* values observed in northern proveniences of *Populus* sp. ([@B62]; [@B55]). This motivates lower *T*~c~ values for 58-861 than Poli as observed in **Figure [5B](#F5){ref-type="fig"}**.
Due to drought stress, POP6 *T*~c~ increased and tended to the temperature of the environment as similarly seen in [@B60]. During the UAV flights, *T*~a~ was equal to 28.75°C; in WW conditions, the average difference between *T*~c~ and *T*~a~ was equal to -9.19°C. Similar differences (from 10 to 15°C) between air and leaf temperatures have already been demonstrated to be plausible ([@B48]). As expected, such a difference decreased to -7.14°C in case of mDr conditions, when transpiration flux was reduced. These findings are consistent with previous drought studies ([@B108]; [@B6],[@B7]). Also, in agreement with [@B6],[@B7]), and [@B19], the treatment resulted in a difference of 2°C between WW and mDr POP6 average *T*~c~. **Figures [5A,B](#F5){ref-type="fig"}** demonstrated that drought induced high phenotypic variability (large ranges of variation in frequency distributions). In fact, genotypic mean *T*~c~ followed a Gaussian distribution with a high degree of transgressive segregation in both treatments (thermal response of POP6 was extreme as compared to parental response). The high variability in F~2~ populations may be due to the transgressive segregation as was previously observed by [@B107] and [@B72] for growth-related traits in similar populations. This suggests that thermal response to drought is a quantitative trait controlled by several genes (polygenic trait) ([@B106]), and that *T*~c~ is under complex but repeatable genetic control ([@B74]). In our study, the lack of statistically significant G × T interaction suggests that POP6 response is consistent between both treatments (i.e., stressed genotypes increase their *T*~c~, and genotypes with higher *T*~c~WW with respect to other genotypes also display higher *T*~c~mDr). Such consistency may facilitate the selection of genotypes of interest.
Poplar *T*~c~ response to water stress was further explored by investigating *H*^2^. A very low *H*^2^ was observed for POP6, due to a large residual error and a modest genetic influence on the phenotypic variance. Generally, *H*^2^ of a trait varies across different populations and environments ([@B39]), and it is overestimated when G × T interaction is significant ([@B106]). To the best of our knowledge, *H*^2^ estimation of *T*~c~ in forest tree species is still not reported. Yet, it was observed in the range from 0.05 to 0.91 in *T. aestivum*, with higher values of *H*^2^ obtained for multi-year and multi-environment trials ([@B74]). Such a large variation supports the urge to conduct experiments in different environments and water limitation conditions. Moreover, it is noted that recurrent selection is optimal for improving traits with low *H*^2^ ([@B44]). Therefore, recurrent selection of the herein identified putative drought-tolerant genotypes would be a promising approach to accumulate favorable alleles in future crosses of POP6.
In addition, our technique aids in identifying genotypes that appear to be risk-takers versus those that are risk-averse; such an observation is known to occur in response to drought ([@B83]; [@B64]; [@B5]). In our experiment, Poli exhibits a risk-averse strategy by limiting transpiration and allowing *T*~c~ to increase, as opposed to 58-861, which appears to be a risk-taker genotype. In fact, Poli considerably increases its *T*~c~ from WW to mDr conditions. This response supports the fact that Poli could have a sensing mechanism that detects reduced water availability, and thereby closes stomata to avoid stress due to drought. Closed stomata at high light intensities could lead to photo-damage, and thus drought stress may become photo-oxidative stress, ultimately leading to biomass yield loss. In 58-861, a lower *T*~c~ increment (1.05°C in eCognition and 1.12°C in Matlab) than Poli was observed between treatments. This suggests that 58-861 could employ a less conservative strategy, and thus, being a putative risk-taker, which developed an anisohydric survival strategy to drought. This adaptive choice may be beneficial in moderate stress conditions; however, it may not provide any advantages in case of prolonged and more intense drought conditions. The likelihood of anisohydric genotypes to succumb earlier to drought would increase, and that of isohydric genotypes to more likely die of carbon starvation is a function of drought intensity and duration.
Our findings show that, among trees exposed to mDr conditions, 63 (13.32%) out of 503 genotypes were found in the third quadrant in **Figure [6](#F6){ref-type="fig"}**, thus indicating greater *T*~c~WW than *T*~c~mDr. This behavior may be attributed to lower-density canopies (with short and sparse branches and with a small canopy surface area covered with leaves) in WW than in mDr. Conversely, 129 genotypes (25%) were located in the fourth quadrant and displayed an SSI comprised between 0 and 1. Even though *g*~s~ measurements are required to validate this response, these POP6 genotypes could be considered more risk-takers, which supposedly maintain high *g*~s~ and lower *T*~c~. However, whether or not these risk-taker genotypes could be considered drought tolerant would depend on the period and severity of drought, and on the rate at which plants recover from drought exposure ([@B83]). For example, in [@B2], anisohydric purple lovegrass (*Eragrostis spectabilis*) maintained higher *g*~s~ and CO~2~ assimilation, and showed better performance than isohydric miscanthus (*Miscanthus sinensis*) plants under optimal and mild-to-moderate drought conditions, but little difference was noted when both plants were subjected to severe drought. A greater research effort is currently needed to better understand the physiological mechanisms involved when plants tend to be risk-takers in stressed and risk-averse in non-stressed conditions.
Even if genotypic effect was not statistically significant, risk-taking genotypes accounting for 25% of the tested ones support that crossing genotypes with divergent morphological and ecological traits, such as 58-861 and Poli, resulted in augmented phenotypic variability (see also the large ranges of variation in **Figure [5](#F5){ref-type="fig"}**) in the early F~2~ POP6 generation. Higher-order crossings with differential breeding techniques based on selection are expected to lead to higher *H*^2^ and improved genetic gains. Promising genotypes were capable of controlling stomatal closure to raise their *T*~c~ by less than 2°C with respect to non-stressed conditions (SSI ranging from 0 to 1). Interestingly, in [@B78], [@B79]), upon similar drought conditions, leaf temperature increased by 2--5°C. This supports our finding that trees whose *T*~c~ increases by less than 2°C showed a better response within POP6.
The extensive HTP executed in this study was done in drought trials under natural field conditions. The results of this study prove that this methodology enabled high-throughput data analysis in the field upon fast and non-invasive acquisition of thermal images. Notably, this approach allowed efficient and precise phenotyping of large population of individuals at the same time, thus minimizing the influence of variable meteorological conditions on control (in this case WW) and treated (in this case mDr) trees. Image resolution was remarkably higher than in previous studies ([@B9]) and highly sufficient for accurately characterizing tree response even at crown and leaf levels. We indicate that flight elevation was also standardized to 25 m to ensure high image definition while guaranteeing that UAV rotor downwash did not disturb *T*~c~. Finally, the degree of automation employed in the developed HTFP method is highly desirable and will be widely adopted in field-based phenomics for forest trees genetics and genomics research. Since *T*~c~ is strongly related to *g*~s~, photosynthetic rate ([@B104]), and leaf water potential ([@B99]), UAV-based thermal sensing may be an efficient, robust, and high-throughput tool for indirectly screening breeding populations, for selecting drought-tolerant, as well as risk-takers and risk-averse genotypes. This methodology is also promising toward monitoring the dynamics of stomatal movement in response to environmental stresses through rapid and repeated surveys. Improved knowledge of stress response will also be enabled through the synergistic integration of UAV remote sensing with more direct ground-based measurements (i.e., leaf fluorescence, leaf gas exchange, leaf water potential, leaf morphology, tree sap flow, and biomass production). Coupled with ground-penetrating radar, field-based phenomics will accelerate screening for drought tolerance by multi-scale analysis of root, crown, and leaf traits. Currently, UAVs have been outfitted with multispectral, hyperspectral, thermal, RGB, and near-infrared cameras, which are useful to evaluate plant response to stress ([@B19]; [@B90]). Future technological ameliorations will afford unprecedented measurements such as chlorophyll fluorescence imaging and 3D mapping using light detection and ranging (LIDAR) sensors, directly from drones, thus opening novel avenues in high-throughput stress phenotyping in forest trees. Promising examples of this vision can also include UAV integrated platforms equipped with multiple sensors for simultaneous data collection.
In breeding programs, this new aerial screening method may sensibly alleviate the effect of environmental factors such as varying exposure to sunlight according to time of the day, local climatic conditions, background radiation due to soil vegetative cover and soil water content, being precise, automated and quick. In fact, utilizing highly sensitive radiometrically calibrated TIR cameras may speed up tree screening, thus enabling repeated observations over longer periods of time and larger scale areas. Furthermore, augmenting breeders' visual definition by selecting low flight altitudes may provide novel insights on the response to drought stress at the single leaf scale.
Conclusion
==========
In this study, we developed a high-resolution and high-throughput UAV-based phenomics method to investigate drought in the field. We applied this screening method to precisely and efficiently assess the response to drought of a *P. nigra* F~2~ population consisting of 503 genotypes planted on an area of 1.67 ha. We captured thermal images of stressed and non-stressed trees from an elevation of 25 m. We reconstructed thermal mosaics and extracted the average *T*~c~ by using two independent image segmentation techniques. We statistically analyzed genotypic temperatures, and identified putative drought-tolerant genotypes. This newly developed approach enabled high resolution thermal orthomosaics from quick UAV-based acquisitions and simultaneous screening of a significant number of individuals.
Two segmentation techniques for accurately analyzing TIR images, one developed in-house using Matlab, and another relying on commercial software eCognition, were successfully implemented to eliminate the mixed-pixel problem. They both led to consistent results, indicating that it is possible to use HTFP-based thermography for the screening of tolerance to drought stress in forest trees. However, considering the complexity of drought tolerance, we suggest it can only act as an accessory means in an active breeding program for drought by contributing significantly to phenotyping of tree response to water stress. Future studies will aim at extending the methodology to rapidly generate environmentally nuanced temporal measurements of physiological differences to contribute to predictive environmental stress response models. Through the approach developed here, candidate genes for drought stress responses can also be identified when this HTFP is combined with advanced genomics approaches.
Based on our analysis, a good correlation was found between UAV-based parental genotypic mean *T*~c~ and ground-truth *g*~s~ measurements. Genotypic mean temperatures exhibited a Gaussian distribution centered about parental behavior. Furthermore, the statistically significant differences observed between treatments were attributed to environmental conditions. Finally, based on SSI values, 25% of the population exhibited increase in temperature under mDr conditions by less than 2°C, and, thus, can be regarded as candidate drought-tolerant genotypes.
The use of UAV for field-based tree phenotyping under drought conditions is novel, but is expected to become an important tool for improving efficiency in forest-tree breeding for climate change. To date, no studies have been carried out attempting to use UAV-based HTFP for forest tree phenotyping in managed stress trials in which specific and well-defined conditions are imposed, and effectively deploy such platform in a breeding program. Thanks to its high resolution aerial imagery, accurate data processing, and relatively simple implementation, this HTFP shows promise as a precise and efficient tool for use in phenomics studies.
Author Contributions
====================
RL performed the ground-truthing, analyzed experimental data, and executed phenotypic and statistical data analyses. FT executed Matlab segmentation and, together with RL, developed results and wrote the manuscript. RS planned the airborne campaign, reconstructed thermal mosaics, and executed eCognition segmentation. SK contributed to develop the workflow and write the manuscript. GSM contributed to the original concept of the project. AH conceived the project and its components, designed and supervised the study, and revised the manuscript. All authors discussed the results, read and approved the manuscript.
Conflict of Interest Statement
==============================
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
**Funding.** This research was partially supported by the Regione Lazio/Lazio Innova under the grant "AgroEnVision -*Unmanned Aerial Vehicles as Mobile Multi-Sensor Platforms for Innovative and Sustainable Management of Agro-Environmental Ecosystems*" (FILAS-RU-2014-1191), grants from the European Community's Seventh Framework Program (WATBIO FP7-311929) and the Brain Gain Program (Rientro dei cervelli) of the Italian Ministry of Education, University, and Research (AH).
We wish to thank Vincenzo Mantovano for providing the UAV remote sensing platform. We are very grateful to Francesco Fabbrini for his help in developing the experimental design, to Paolo Latini and Chiara Evangelistella for their assistance during the airborne campaign and for collecting ground-truth data, and to Maurizio Sabatti for providing plant material. All authors thank Alasia Franco Vivai for plantation management and field maintenance.
<http://www.arpa.piemonte.it>
Supplementary Material
======================
The Supplementary Material for this article can be found online at: <http://journal.frontiersin.org/article/10.3389/fpls.2017.01681/full#supplementary-material>
######
Click here for additional data file.
[^1]: Edited by: *John Doonan, Aberystwyth University, United Kingdom*
[^2]: Reviewed by: *Véronique Jorge, Institut National de Recherche Agronomique, France; Stephen Hunt, Queen's University, Canada*
[^3]: ^†^*These authors have contributed equally to this work.*
[^4]: This article was submitted to Technical Advances in Plant Science, a section of the journal Frontiers in Plant Science
|
"One should either write ruthlessly what one believes to be the truth, or else shut up." — Arthur Koestler
Big Government has a statement from Sarah Palin’s brother, Chuck Heath Jr., in which he calls Joe McGinniss’s book as “one lie after another.” What intrigued me was Heath’s description of how McGinniss “included in his book comments falsely attributed to me by one of his unnamed sources” and didn’t even ask Heath if he’d actually said what the “sources” said he had said.
This is journalistic malpractice of the worse sort.
If Person X tells you that Person Y said something derogatory about Person Z, you cannot publish this derogatory statement, attributed to Person Y, based on the hearsay assertion of Person X, especially when you name Person Y and Person Z but grant Person X the cloak of anonymity.
This is to allow an anonymous source (X) to accuse Y of defaming Z.
Under the Sullivan precedent, a public figure like Sarah Palin would have a hard time prosecuting a libel suit against McGinniss, but Chuck Heath Jr. is not a public figure. So for McGinniss to accuse Heath of badmouthing the Palins, based on hearsay from an anonymous source, is a dangerous thing, from a legal perspective. And it’s just plain despicable, from an ethical point of view.
The recklessness of McGinniss is astonishing, as is the irresponsibility of Random House in publishing such shoddy work.
UPDATE: In reference to some of the comments below, I am will state as a fact that McGinniss’s tale about Sarah Palin and Glenn Rice is a lie. While I offer no source for this statement, permit me to explain the dynamics of this particular situation, for which McGinniss and Random House are entirely responsible.
Notice that Glenn Rice has said nothing — not one word — about McGinniss’s book since its publication. Does that not strike you as curious?
Further notice that McGinniss did not merely claim that Sarah Palin had a one-night stand with Rice. He attributes to an anonymous “friend” of the Palins this quote: “Sarah and her sisters had a fetish for black guys for a while.”
So the alleged tryst with Rice is, according to McGinniss’s source, merely the tip of a massive iceberg of “Jungle Fever” also involving Sarah and her sisters Heather Heath Bruce and Molly Heath McCann. Does it strike you as odd that no other Palin-hating liberal journalist has ever made such a claim? Or that no witness has stepped forward in the past two weeks to vouch for the truth of this widely publicized claim by McGinniss?
According to the anonymous “friend” quoted by McGinniss, all three Heath sisters were carrying on “for a while” like Lili Von Shtupp with Sheriff Bart in Blazing Saddles: “It’s twue! It’s twue!”
Well . . . NTTAWWT and YMMV, but we may suppose that such behavior would have been so widely known in Wasilla that McGinniss could have found more than one “friend” to say it, and that somehow this alleged “fetish” of the Heath sisters might have been reported by some of the other journalists who’ve made the pilgrimage to Wasilla in search of anti-Palin anecdotes.
McGinniss made this lurid accusation knowing full well that if Sarah (or her sisters) were to deny it, this would give Sarah’s enemies a chance to exclaim, “A-ha! That proves it! She’s a racist!”
Sarah and Todd have said nothing about this. But it’s kind of strange that no reporters have gotten any comment from Glenn Rice, nor have any of them attempted to verify McGinniss’s false “fetish” smear on the Heath sisters.
If you want to know why the Hollywood blacklist against conservatives is real and why Hollywood conservatives stay in the closet, look no further than The Stephen Hanks Management Company.
Bingo. And the same implacable hatred of conservatives also pervades academia and journalism, so that whether you seek to engage in the war of ideas through entertainment, education or journalism, the conservative communicator is always surrounded by remorseless enemies.
Comments
James Banzer
You are 100% correct about McGinniss. He is shoddiness personified. He’ll probably make a lot of money, and that will encourage him to go write another book, this time about Rick Perry or some other person who is not liked by the left.
DaveO
This could work!
Considering Random House’s owners, and McGinniss want to engage the Palins in a costly, subversive lawsuit, having her brother sue them on his own behalf may undermine the publishers and author’s intent.
And, Chuck Heath Jr. may not be the only person defamed. Class action suit?
Quartermaster
The Sullivan precedent is unconscionable. Just because a person is a public figure does not change the nature of defamation. A public figure has more to lose and making a defamation suit harder solves nothing. It simply deprives someone of their day in court. The 1st amendment is not upheld in any way by the Sullivan doctrine.
The Supreme Court, alas, is the supreme scoff law.
http://thepagantemple.blogspot.com/ ThePaganTemple
I want to hear exactly what Glen Rice has to say before I go out on a limb and say its all lies, but its pretty obvious this book was intended as a hit piece. And even if the story about Rice is true, I don’t really give a shit. That was years and years ago, and for that matter, it doesn’t prove a damn thing. So she had sex with some guy before she and Todd were married. I’m not buying the whole meme about how this proves she’s a hypocrite for promoting family values and abstinence before marriage. That’s like saying an ex-drug addict doesn’t have a right to warn kids to stay off drugs.
http://pulse.yahoo.com/_ICUSM5QH2DC5LSQLWUEBLHCPMA anthony
Glenn Rice never admitted to anything in the book. Joe inferred the was a relationship.
http://pulse.yahoo.com/_ICUSM5QH2DC5LSQLWUEBLHCPMA anthony
Everything Joe said is complete B.S. If there was any serious hookups before her marriage especially to former NBA star, it would have definitely came out in the Presidential campaign.
http://ace.mu.nu/archives/279942.php Andrew Sullivan
Well you have to forgive McGinniss because it is Palin. Don’t you know, rules of fairness do not apply when it comes to bad mouthing the Palins? We litterally obsess about her all the time.
Look at me.
Anonymous
Effing Breitbart! How does he work?
J.
http://thepagantemple.blogspot.com/ ThePaganTemple
Why would it have come out if nobody knew anything about it? The point is, its not important. It doesn’t matter. Leaving aside the fact that its really nobody’s business to begin with, outside the principles involved, its playing right into the Democrats and McGinniss’s hands to make out like it does matter. They’re just dying for Republicans, especially Christian conservatives, to get all outraged and scream “there’s no way Sara would do that with a-with a-with a-with a BASKETBALL PLAYER!”
Don’t you see? The point, as far as leftists are concerned, isn’t whether the story is true or not, the point is how you react to it.
http://pulse.yahoo.com/_ICUSM5QH2DC5LSQLWUEBLHCPMA anthony
What your supposing is Joe is great reporter. Again what the rumor was according to Joe’s book was they were friendly according to unnamed sources which I believe is quite possibly. Joe was the one who inserted sex through innuedo. In fact, Joe admitted he never even ask Glenn Rice if there friendships was sexual in any way. Believe me, no stone goes unturned during a national campaign.
What Joe did was create new accusation to simple sell books and gain attention.
http://twitter.com/Weirddave0 Dave
PT, it’s not even that, it’s simpler and almost funny. The libtard left is so utterly convinced of it’s own narrative that it acts irrationally. They think we’re all racists, we just are. Any we say to the contrary, anything we do that demonstrates that we aren’t…it’s all just a lie, a BIG LIE! I firmly believe that McGinniss (along with his fellow travelers Olbermann, Maddow, Garofalo, etc) honestly thought, utterly believed, just KNEW, damnit, that the reaction on the right to the Glen Rice allegation would be (apologies for the vile language, I’m trying to convey what they thought we would think, IYKWIM) “OMG! Sarah Palin fucked a nigger!!!! Unclean! Unclean!” and that we would reject Palin utterly en mass because she had allowed the precious flower of her virginal white maidenhead to be violated by a subhuman specimen of the negroid race. Utter bollocks, of course, you know it, I know it, but I don’t think that they know it. They are deeply convinced, on a visceral level, that that’s how we think, and I bet they though that they finally had the stake for the heart of the Palin vampire in this allegation. I bet that many of them are puzzled that it didn’t work like that. Truly puzzled, because of course their assumptions can’t be wrong, so why aren’t we reacting like the troglodytes that we are?
http://thepagantemple.blogspot.com/ ThePaganTemple
Exactly, Dave, you hit the nail on the head. Well, the stated purpose of it was to point out her supposed “hypocrisy”, but the hidden, unstated, real reason is exactly what you said. We’re all supposed to be so disgusted at the thought of Sara getting it on with a black guy it was assumed we would just turn against her, and that would not only be the end of any potential future in politics, it would perhaps even more importantly spell the end of her as any kind of influence at all. After all, those racist Tea-Party groups sure aren’t going to pay her any money to give a speech, or take her advice when she speaks for or against anything, or listen to her when she endorses a candidate. In fact, they probably figured no one from that point on would welcome her endorsement, and would in fact shun such an endorsement. It’s all so obvious what the intention was, its almost sickening and funny at the same time.
Anonymous
That may be the best way to target McGinniss legally – with a non-public figure plaintiff. I’m convinced that once-respected publishers such as Random House do not limit themselves to a legal analysis when accessing possibly defamatory statements re super-public figures such as Sarah Palin; in borderline cases, they also add practical considerations to the analysis. They know that defamation plaintiffs concerned with their public image necessarily call attention to the original defamation (and will be mocked for it); they know that the plaintiff will be characterized as “playing the victim” and that news stories of the lawsuit will drown out stories about a politician-plaintiff’s substantive achievements and policy positions.
Thus, even in the 1 in 10,000 case in which a publisher transgresses the incredibly defendant-friendly “actual malice” standard in public-figure defamation cases, they figure, rightly, that they’ll almost certainly get away with it.
http://pulse.yahoo.com/_ICUSM5QH2DC5LSQLWUEBLHCPMA anthony
Olbermann actually defended Sarah on these accusation. It’s not the race issue. Joe is trying to sexualize Sarah. During the campaign, they were never able to dig up any sex stories on Sarah. I assuming because they weren’t able to find any. Believe me if they could have they would have. She is obviously a nice looking women, and the press would have love the opportunity to speak with past lovers if they would have.
Again, Joe was not trying to report actual news. He is simply out to slander her. And to assume the story’s truth, he are giving he credit for digging up something no one else has found. He is simply not credible.
Anonymous
I’m sure the research for the book went something like this.
“Stalking the Dark Lady: An Investigative Journalist’s Tale”
Right on McCain on your follow-up response. I believe the lies is more insidious than just race. Joe is implying she is some sort of a slut groupy. Joe is beyond repair. As I have said below, he is attempting to sexualize her. |
Eye program saves millions, expands care options
The government is expanding a pilot project that has made life better for more than 14,000 Albertans facing vision loss while saving millions of dollars.
Sarah Hoffman, Deputy Premier and Minister of Health with Dr. Amin Kherani and Rebecca Bailer at Calgary Retina Consultants clinic to announce the addition of a new drug to the RAPID program.
In October 2015, the province launched the Retina Anti-Vascular Endothelial Growth Factor Program for Intraocular Disease (RAPID), in partnership with the Retina Society of Alberta. The pilot gave patients with retinal conditions like macular degeneration two different treatment options: Lucentis and Avastin. RAPID, which has saved more than $20 million in tax dollars by offering a wider range of medication options that provide the same clinical benefit, is expanding to include Eylea, effective August 1, 2017.
“This government is working hard to protect and improve health care by listening to patients and clinicians and using evidence to guide its decisions. By partnering with retinal specialists, we are providing more Albertans with access to retinal eye care and more treatment options while saving millions of tax dollars at the same time.”
Sarah Hoffman, Deputy Premier and Minister of Health
“As a retinal specialist and partner in the RAPID program, I have seen the value of this initiative. These treatments help preserve and, in some cases, improve people’s vision, which has an impact on their quality of life. Now, through the program, there is an additional treatment option available to benefit Albertans.”
Dr. Amin Kherani
The RAPID program and prescription drugs are provided at no cost, so patients have no out-of-pocket co-payments for their treatments.
“I’m very, very pleased that government has decided to cover this drug. It’s a huge relief that it’s covered and that it’s taken care of now. I’m glad they understand the urgency and the importance of happiness and health. There’s also the cost benefit ratio - if you can prevent even one person from losing their eyesight, they can contribute to society.”
Rebecca Bailer, patient
No additional costs or savings are anticipated when Eylea is added to the RAPID program because initial estimates included the medication. |
//
// Generated by class-dump 3.5 (64 bit) (Debug version compiled Sep 17 2017 16:24:48).
//
// class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2015 by Steve Nygard.
//
#import <objc/NSObject.h>
@protocol FBSDKURLOpening;
@interface FBSDKApplicationDelegate : NSObject
{
id <FBSDKURLOpening> _pendingURLOpen;
_Bool _expectingResign;
_Bool _active;
}
+ (id)sharedInstance;
@property(readonly, nonatomic, getter=isActive) _Bool active; // @synthesize active=_active;
- (void).cxx_destruct;
- (_Bool)openURL:(id)arg1 sender:(id)arg2;
- (void)applicationDidBecomeActive:(id)arg1;
- (void)applicationWillResignActive:(id)arg1;
- (_Bool)application:(id)arg1 didFinishLaunchingWithOptions:(id)arg2;
- (_Bool)application:(id)arg1 openURL:(id)arg2 sourceApplication:(id)arg3 annotation:(id)arg4;
- (void)dealloc;
- (id)init;
- (id)_init;
@end
|
Southern Upland Way Day 11: Brattleburn Bothy to Over Phawhope Bothy, via Moffatt
Published 13 February 2012
Waking from my slumber around 6am I could hear the sound of water and promptly pulled the sleeping bag over my head. Rain. Urgh. By the time I dragged myself out of bed at eight I was fearing the worse. With sleep filled eyes I looked out of the bothy’s grimy window to be confronted with the truth. The truth that somehow I’d been transported to another place; a land of blue skies and sunshine, with not a drop of rain to be seen. The sound of water? Oh, well, that would be the large, fast flowing steam a few metres away from the bothy.
Most of the morning went by in a blur as my feet squelched, sploshed and skidded on the rain drenched forest floor. Only when I saw an information shelter did I suddenly realise the track had got a lot firmer and that I’d soon be heading out of the trees towards the village of Beattock.
A lane of the finest tarmacadam led me on until, all of a sudden, civilisation was laid out below me, accompanied by the thundering noise of the West Coast mainline railway and the M74 motorway.
Even the most urban of people would have struggled to describe Beattock as pretty. Industrial units and railway sidings littered the landscape whilst lorries thundered along the busy roads. I’d almost forgotten what traffic looked like. For days I’d been blithely wandering around in the middle of quiet country lanes, often completely oblivious to the single car patiently hovering behind me. Eleven days away from normality and already I seemed to have lost my road sense, so I was more than glad that when I came to a large roundabout, there was not a road vehicle to be seen.
Picking my way on a footpath underneath the motorway, alongside a river that had similarly been subjugated and hidden from view, I sought the turn-off that would take me to the shops and facilities of Moffat. The mile and a half journey on the busy A701, with caravans, cars and trucks speeding past, could hardly claim to be a highlight of my walking. The clouds above chose this moment to unleash a mighty volley of rain and a lazy roll of thunder. I was being welcomed to Moffat in style.
Moffat’s town centre seemed, rather disappointingly, to prefer automobiles to anything else and the multitude of vehicles almost hid the town’s mighty centrepiece. A fountain topped with a giant statue of a ram, it celebrated the area’s importance to sheep breeding, whilst the cars sat around its base celebrated the area’s love of car parking.
It was lunch time and the whole place was bursting with school kids scoffing cones of chips. Shops advertised Moffat toffee and freshly made ice cream and the smells wafting out of the Indian restaurant made me consider having an early finish and staying the night. But my guidebook told me that the next ten miles would be fairly fast going and with that in mind I was sure I could polish it all off in an afternoon. Over Phawhope Bothy was where I would be staying the night and no amount of rain or curry could stop me.
The rain was now coming down in fits and starts; heavy then light, heavy then light once more but as I entered yet another forest, the path rising gently uphill, I could see blue skies across the valley. There was hope after all, but it was a shame it was taking so long to get to me.
My frustration with the weather came to a head a few miles on when a necessary change-over for my map was confounded by yet more rain, meaning the paper was changing from a map to a mushy soggy pulp of uselessness. It transpired though that it was just one last hurrah and the sun finally made its way out.
The hard gravel path gave way too, replaced by a gentle, well drained woodland-esque trail with a crystal clear burn gurgling away besides it. It looked like the kind of path that belonged to the Lord of the Rings, perhaps with some hobbits bouncing up and down it, but today there was just me. It even looked like it would provide a lovely wild camping spot and I would have been minded to pitch up had the grass not been so wet.
I had to work to get to the bothy though, as the path left the forest and headed on to a narrow ledge on the side of a steep hill. I was glad the bad weather had gone as the path was tricky enough to navigate, especially with a steep drop down to Selcoth Burn on one side. The surrounding hills were full of gravel and rock and it was clear I was no longer in the Shire but perhaps on my way to Mordor.
Crossing the burn the path became less precarious (although, ironically, I began to slip more frequently) and someone’s decision to “hide” another of the Southern Upland Way’s kists up a steep scramble wasn’t totally appreciated, even if it did now mean I’d upped by kist-finding success rate to 50%.
Made out of lots of stones placed on a pivot, the kist looked like some sort of wild creature, and was the very kist that adorned the cover of a leaflet about the Waymerks project that I’d picked up at one of the leaflet boxes a few days before. Despite its weight, the whole thing seemed to sway in the wind leaving the creature’s head and mouth at right angles. I gently corrected its position only for it to swing lazily back the way I’d found it so I scooped up my coin, shrugged and let it be.
Another steep hill led me up Ettrick Head. Footsore and increasingly tired, I left Dumfries and Galloway and entered into the Scottish Borders. If I’d hoped the Scottish Borders would see a major change in scenery I would be sorely disappointed as the path plunged back into forest straight away, however it was only short lived and a mile or so later I was walking into a large valley with the stone buildings of the bothy sat waiting for me in the distance.
Opening the door to a bothy was always a moment of trepidation. What state would it be in? Would there be anyone else there? But there was no need to fear here. The bothy was empty but in great condition, even with a bench outside where a tired walker could sit in the evening and watch the sun setting.
Inside I found that, despite being in the middle of absolutely nowhere, the bothy was holding an art installation with pictures painted on the wall, a “bench of poetry” and a solar powered torch and mobile phone charger dedicated to Scottish philosopher, David Hume, who lived in the 18th century. It was all impressive stuff; more so given how few people must have seen it. Once again I was the only visitor and the log book suggested not many had been passing by.
As I sat on the Bench of Poetry I thought how the Bothy’s art installation summed up much about the Southern Upland Way. With its striding arches, kists and now a bothy, this was a walk for art perhaps more than anything, but what a shame so few people walked the route and would ever see it. I’d seen just three women near Dalry and hadn’t seen anyone else on the trail. And frankly I was beginning to doubt I ever would.
Next time on Day 12, I see another walker! Yes that’s right! Someone else who is actually walking! No. They weren’t walking the Southern Upland Way but hey, another walker!
Connect with us
Rambling Man is a participant in the Amazon EU Associates Programme, an affiliate advertising programme designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.co.uk |
Lung cancer is the most common malignancy worldwide, and the leading cause of cancer-related death. The estimated incidence of lung cancer was 1.8 million in 2012, representing 12.9% of all newly diagnosed cancers[@b1]. Among these two major types of lung cancers, non-small cell lung cancer (NSCLC) accounts for approximately 85% of all cases; and in clinic, most NSCLC patients present with locally advanced or metastatic diseases[@b2][@b3]. Limited by effective chemotherapeutic agents, the overall 5-year survival of NSCLC marginally increased over the last decade (from 15.7% to 17.4%)[@b4]. Therefore, it is imperative to develop effective and safe therapies that target the aggressive progression and metastasis of NSCLC.
CD47 is a transmembrane glycoprotein that is ubiquitously expressed in normal tissues and mediates a "self/don't-eat-me" signal on normal cells by inhibiting macrophage phagocytosis through its interaction with macrophage signal regulatory protein alpha (SIRPα)[@b5][@b6]. The enhanced expression of CD47 has also been reported in various malignancies including leukemia[@b7][@b8], lymphoma[@b9], multiple myeloma[@b10] and solid tumors such as breast[@b11], colon[@b12], hepatocellular carcinoma[@b13], and melanoma[@b14]. It has been demonstrated that CD47 expression facilitates the immunological evasion of tumor cells[@b15], implying the therapeutic potential of targeting CD47 in various malignancies[@b16]. However, few are known on the expression and functional significance of CD47 in NSCLC. On account of the molecular mediator of CD47, cell division control protein 42 (Cdc42) has been shown to be activated downstream of CD47 to promote neurite and filopodium formation[@b17][@b18]. Cdc42 is a member of the Rho family of small GTPases, is identified as an important regulator of metastasis[@b19], and is overexpressed in a number of human cancers[@b20]. Subsequent studies have demonstrated that CD47 and its downstream signaling effector, Cdc42, can facilitate the formation of protrusions of the lamellipodia and filopodia to impact cell mobility[@b17][@b21]. Nevertheless, whether Cdc42 is a clinically relevant downstream target of CD47 with a critical role in promoting invasion and metastasis in NSCLC needs to be further explored.
In the present study, we investigated the expression of CD47 in NSCLC in clinic, as well as the experimental settings; and explored the therapeutic potential of targeting CD47 with small interfering RNA (siRNA) and the underlying regulatory mechanisms, with specific focus on Cdc42, both *in vitro* and *in vivo.*
Results
=======
CD47 is overexpressed in primary human NSCLC tissues and NSCLC cell lines
-------------------------------------------------------------------------
CD47 overexpression has been reported in many human cancers; however, its expression in NSCLC remains unclear. In order to address this question, western blot analyses were performed on 20 pairs of matched NSCLC tumor tissues and adjacent non-tumor tissues. Results revealed that the expression of CD47 was significantly higher in cancer tissues than in matched adjacent non-tumor tissues ([Fig. 1A](#f1){ref-type="fig"}). Furthermore, CD47 expression was measured on protein ([Fig. 1B](#f1){ref-type="fig"}) and steady-state mRNA levels ([Fig. 1C](#f1){ref-type="fig"}) in a series of NSCLC cell lines (NCI-H1975, NCI-H520, SPCA-1, SK-MES-1, A549 and 95D) and in normal human bronchial epithelial cell line 16-HBE. The analyses revealed that all cancer cell lines, except SPCA-1, expressed significantly higher levels of CD47 protein and mRNA than 16HBE cells. Consistently, the immunofluorescence staining of CD47 on these cells revealed that a strong membrane staining of CD47 in A549 cells, intermediate staining in NCI-H520 cells and minimal staining in SPCA-1 and 16-HBE cells ([Fig. 1D](#f1){ref-type="fig"}).
Increased expression of CD47 correlates with metastasis and progression in human NSCLC
--------------------------------------------------------------------------------------
The overexpression of CD47 in human NSCLC tumor tissues and cell lines suggest that it might be associated with disease progression. In order to test this possibility, CD47 expression was examined in 80 human NSCLC tissues by IHC, expression levels were quantified using the staining index, and the relationship between CD47 expression and the different clinicopathologic features of these NSCLC patients were analyzed. IHC staining revealed a strong CD47-positive staining in the membrane and cytoplasm of tumor cells, compared with that in adjacent normal lung cells, which had a weak stain or no staining ([Fig. 1E](#f1){ref-type="fig"}). Based on staining index scores, the cohort of 80 NSCLC patients was divided into low and high CD47 expression groups. As shown in [Table 1](#t1){ref-type="table"}, higher CD47 expression levels positively and significantly correlated with the T classification, clinical staging, lymph node metastasis and distant metastasis of NSCLC; but not with age, gender, differentiation status or histological subtypes.
CD47 critically controls NSCLC cell migration/invasion, but exerts minimal effects on cell viability *in vitro*.
----------------------------------------------------------------------------------------------------------------
In order to characterize the functional significance of CD47 in NSCLC cells, a homemade microfluidic chip ([Fig. 2](#f2){ref-type="fig"}) was constructed to measure the migration and invasion of target cells from a liquid environment, through 20-μm pores and into the Matrigel. As shown in [Fig. 3A](#f3){ref-type="fig"}, using 20% FBS as a chemoattractant, NCI-H520 cells progressively exited from the cell micro-channel through the micro-gaps, and invaded into the gel micro-channel over 72 hours. Next, A549 and NCI-H520 cells were transfected with siRNA, specifically targeting CD47 (CD47-siRNA); and revealed that CD47-siRNA dramatically reduced the endogenous expression of CD47 ([Fig. 3B](#f3){ref-type="fig"}). By comparing with the migration/invasion of control siRNA-transfected cells, we found that CD47 knockdown significantly suppressed A549 and NCI-H520 cell migration/invasion ([Fig. 3D,E](#f3){ref-type="fig"}, *P* \< 0.05). Furthermore, the overexpression of CD47 in A549 and NCI-H520 cells by transient transfection of pcDNA3.1-3xFlag-CD47 was confirmed by western blot ([Fig. 3C](#f3){ref-type="fig"}). The migration/invasion of pcDNA3.1-3xFlag-CD47-transfected cells significantly increased migration and invasion abilities, compared to that of control cells ([Fig. 3D,E](#f3){ref-type="fig"}, *P* \< 0.05). These results indicate that the migration and invasion of NSCLC cells were significantly increased by the exogenous overexpression of CD47, while the downregulation of CD47 by small interfering RNA molecules suppressed the metastatic potential of NSCLC cells. Thus, CD47 activation appears to be tightly correlated with cell migration and invasion ability; hence, CD47 might be an important regulator of migration and invasion in lung cancer cells. In contrast, when focusing on cell viability, the knockdown of endogenous CD47 did not reduce cell viability over 72 hours after siRNA transfection ([Fig. 3F](#f3){ref-type="fig"}); indicating that the action of CD47-siRNA in reducing A549 migration/invasion was probably not due to the significant cytotoxic effect of CD47 knockdown.
Cdc42 is a downstream mediator for CD47-induced migration in NSCLC
------------------------------------------------------------------
In order to understand the molecular mechanism underlying CD47-induced migration/invasion of NSCLC cells, we focused on Cdc42, a pleotropic protein known to be overexpressed in NSCLC[@b22], and correlated this with NSCLC cell colonization and metastasis formation[@b11]. Recent studies have shown that Cdc42 is activated downstream of CD47 and regulates melanoma cell migration[@b17]. Therefore, we tested whether Cdc42 may also be a downstream mediator of CD47-induced tumor invasion in NSCLC. First, the expression level of CD47 was found to be correlated with that of Cdc42 in NSCLC cell lines ([Fig. 4A](#f4){ref-type="fig"}). Second, the knockdown of endogenous CD47 in A549 and NCI-H520 cells with siRNA significantly reduced Cdc42 levels in these cells, while ectopically expressing CD47 in A549 and NCI-H520 cells significantly boosted Cdc42 levels ([Fig. 4B](#f4){ref-type="fig"}); suggesting the control by CD47 on Cdc42 expression. Functionally, in A549 and NCI-H520 cells that ectopically expressed CD47, the knockdown of Cdc42 levels with siRNA significantly reduced cell migration/invasion ([Fig. 4C](#f4){ref-type="fig"}). Conversely, when we elevated the expression of Cdc42 in CD47-siRNA-transfected A549 or NCI-H520 cells, the reduced migration/invasion was significantly boosted ([Fig. 4D](#f4){ref-type="fig"}), suggesting the essential role of Cdc42 in CD47-induced NSCLC migration/invasion. Lastly, the clinical correlation between CD47 and Cdc42 expression was examined in 80 NSCLC patients with advanced diseases. As shown in [Fig. 4E](#f4){ref-type="fig"}, strong co-staining of both proteins from sequential sections could be detected in tumor samples with high CD47 expression, while minimal staining of Cdc42 was detected in those with low CD47 expression. Statistical analysis revealed that 80.4% of NSCLC specimens with high CD47 expression also exhibited strong Cdc42 staining signals, and 85.3% of the tumor samples with low CD47 expression displayed low or undetectable Cdc42 signals (*X*^*2*^ = 33.87, *P* \< 0.01). Therefore, CD47 most likely controls Cdc42 expression in NSCLC, and Cdc42 in return mediates the CD47-induced migration/invasion phenotype of these cells.
CD47 contributes to NSCLC tumor growth and metastasis *in vivo*
---------------------------------------------------------------
In order to understand the functional significance of CD47 in NSCLC tumor development, xenograft tumors were established using A549 cells stably transfected with either CD47-shRNA or control shRNA, and followed tumor growth over time. As shown in [Fig. 5A](#f5){ref-type="fig"}, the knockdown of CD47 in A549 cells significantly inhibited tumor growth *in vivo,* leading to much smaller tumors at 36 days after A549 injection. Mean tumor volume by day 36 was 285.2 ± 23.7 mm^3^ in the CD47-shRNA group and 714.1 ± 31.8 mm^3^ in the control shRNA group ([Fig. 5B,C](#f5){ref-type="fig"}, *P* \< 0.05).
In order to assess the effect of CD47 on *in vivo* tumor metastasis, A549 transfected with control shRNA or CD47-shRNA was injected through the tail vein and quantified the number of metastatic foci in the liver after four weeks[@b23]. As shown in [Fig. 5D](#f5){ref-type="fig"}, mice injected with CD47-shRNA cells displayed a significantly lower number of metastatic nodules in the liver when compared to the corresponding control group (*P* \< 0.05).
Discussion
==========
This study is the first to reveal that CD47 was overexpressed in NSCLC tumor tissues and cell lines, compared to matching adjacent non-tumor tissues and normal bronchial epithelial cells, respectively. The overexpression of CD47 significantly correlated with T classification, clinical staging, lymph node metastasis and distant metastasis. On the cellular level, CD47 critically controlled the migration/invasion behavior of NSCLC cells, which was mediated through the regulation of Cdc42 expression. Consistently, targeting CD47 significantly inhibited tumor growth and metastasis *in vivo.* These results revealed that CD47 is an important prognostic marker and a potential therapeutic target for NSCLC.
Previous studies have indicated that CD47 is a novel prognostic biomarker for several malignancies[@b8][@b9][@b24][@b25][@b26]. For example, Baccelli *et al*. reported that the presence of luminal breast cancer metastasis-initiating cells (MICs) with the characteristic EPCAM^+^CD44^+^CD47^+^MET^+/−^ phenotype correlates with lower overall survival and increased number of metastatic sites[@b5]. Furthermore, circulating tumor cells (CTC) positive for CD47 expression are responsible for tumor relapse and metastasis in breast cancer patients[@b27], while constitutive CD47 upregulation is essential for non-Hodgkin lymphoma immunotolerance and dissemination[@b9]. In colorectal cancer, the upregulation of the *CD47* gene, as a potential immune-escape mechanism, is related to distant metastasis[@b12]. Consistent with these reports, siRNA targeting CD47 effectively inhibited melanoma growth and lung metastasis[@b14]. Furthermore, blocking CD47 signaling inhibits tumor growth and metastasis, proving its benefits for the treatment of several types of cancers[@b28][@b29]. In this study, we provided novel evidence for the overexpression of CD47, as well as its biological significance and functional consequence in NSCLC, using both human tumor tissues and cancer cell lines.
In order to investigate the migration and invasion behavior of NSCLC cells, we constructed a three-dimensional (3D) microfluidic chip-based *in vitro* assay system. This system overcomes some of the limitations associated with conventional 2D experimental systems (such as wound assay and Boyden chamber assay), including cell migration that occurs over a 2-dimensional (2D) substrate. Furthermore, these systems do not represent environments such as those found *in vivo*, and its quantification is somewhat arbitrary and does not reflect real-time changes[@b30][@b31][@b32][@b33]. In the 3D microfluidic chip, cancer cells are cultured in suspension within the medium channel, mimicking the *in vivo* state of these cells in the circulation[@b34]. The presence of micro-gaps in micro-columns that separating these two medium channels from the central gel channel allows the diffusion of chemoattractants from serum into the Matrigel, as well as the migration/invasion of tumor cells in response to the gradient of these chemoattractants. Although other studies have included multiple cell types into the gel channel to better mimick an *in vivo* vascular endothelium and perivascular microenvironment[@b31], our model provides a proof-of-principle method to investigate the extravasation behavior of tumor cells. Cell migration/invasion was quantified on those moving from the cell micro-channel, through the micro-gaps, and into the gel micro-channel. Using this chip, we studied the effect of altering CD47 expression in NSCLC cells on cell migration. For A549 and NCI-H520 cells, the knockdown of CD47 with siRNA significantly inhibited cell migration/invasion. Meanwhile, the ectopic transfection of CD47 into A549 and NCI-H520 cell significantly enhanced cell migration/invasion, indicating that CD47 is both necessary and sufficient for regulating the NSCLC migration/invasion phenotype. Furthermore, we did not detect any direct cytotoxicity of CD47 siRNA on NSCLC cells by MTT assay, suggesting that benefits from CD47 siRNA at least *in vitro* was not due to the direct toxicity on tumor cells, but rather from the inhibition of cell migration/invasion. Furthermore, we found that the downregulation of CD47 in NSCLC cells *in vivo* significantly inhibited tumor growth and metastasis; suggesting that CD47 critically controls tumor cell growth and metastasis *in vivo*, and supporting the therapeutic potential of targeting CD47 for NSCLC treatment.
Although many recent studies[@b16][@b35] have focused on the "don't eat me" signal mediated through the interaction between CD47 on cancer cells and SIRPα on macrophages, additional mechanisms may also contribute to the anti-tumor effects of CD47 siRNA[@b36]. Cdc42 has been shown to be activated downstream of CD47[@b18] and facilitate the formation of protrusions of lamellipodia and filopodia to impact cell mobility[@b17][@b21]. Cdc42 overexpression was also detected in lung cancer[@b22] and served as a disease marker and prognosis predictor[@b37][@b38]. Consistently, we demonstrated the overexpression of Cdc42 in NSCLC tissues, compared with normal tissues (data not shown). Furthermore, we identified the significant correlation between the expression levels of CD47 and Cdc42, both in NSCLC tissues and cell lines. By using both gain-of-function and loss-of-function approaches in different NSCLC cell lines, we demonstrated that the overexpression of CD47 led to increased Cdc42 expression; while the knockdown of CD47 had an opposite effect. Nevertheless, the precise molecular mechanism underlying the CD47-induced upregulation of Cdc42 remains unknown. CD47, as an integrin-associated protein, regulates multiple cellular behaviors through its interaction with integrin, in addition to other ligands, including cell adhesion, migration, and invasion[@b39]. Integrin may also signal through 14-3-3zeta to activate Cdc42 and Rac1, and modulate cytoskeletal re-organization[@b40]. Thus, integrin may link the activation between CD47 and Cdc42. Further studies are required in order to identify the specific integrin member, since integrin is a family of cell surface receptors that contain 24 heterodimers from the 18α-subunits and 8β-subunits[@b41]. It should be noted that, in this study, we also explored the relationship between the expression of CD47 and several markers involved in epithelial-mesenchymal transition (EMT). This is critical for the metastasis of NSCLC, including E-cadherin, N-cadherin, Snail-1 and Snail-2. Furthermore, no relevance was identified ([Supplemental Fig. 1](#S1){ref-type="supplementary-material"}); suggesting that the pro-migration/invasion activity of CD47 could not be achieved through regulation in the EMT program. Meanwhile, the role of EMT in metastasis remains under debate. Gao *et al*. found that lung metastases mainly consist of non-EMT tumor cells that maintain their epithelial phenotype. This study suggests that EMT is not required for lung metastasis[@b42].
In summary, we revealed that CD47 is overexpressed in NSCLC, and that it is correlated with advanced tumor progression and more aggressive metastasis. More remarkably, our findings suggest that the knockdown of CD47 significantly reduced cell migration *in vitro*, and inhibited NSCLC tumor growth and metastasis *in vivo*. Furthermore, Cdc42 is a downstream mediator for CD47-induced NSCLC migration/invasion. Therefore, our study provides a promising molecular target for designing rational therapeutic modalities to control NSCLC.
Materials and Methods
=====================
Patients and tissue samples
---------------------------
From January 2006 to May 2015, 80 patients who underwent surgical resections for NSCLC at the Second Affiliated Hospital of Dalian Medical University (Dalian, China) were recruited into this study. Clinical characteristics and pathological information of these patients were obtained from their medical records. During the surgery, at least two tissue samples were obtained from each patient: tumor tissues (T) from the center of the primary cancer, and adjacent non-tumor tissues (ANT) approximately 3 cm from the tumor periphery. All tissue samples were prepared into formalin-fixed paraffin-embedded sections (FFPE, 4 μm) for later analysis by immunohistochemistry (IHC). In addition, for the last 20 consecutive patients, an extra pair of T and ANT samples was obtained from each patient, which was snapped-frozen in liquid nitrogen before storage at −80 °C for future western blotting analysis. The experimental protocol was approved by the Ethics Review Committee of the Second Hospital of Dalian Medical University, and this study was conducted in compliance with ethical and safe research practices involving human subjects or tissues. Informed consent was obtained from all subjects.
Cell lines
----------
Human NSCLC cell lines A549, NCI-H520, NCI-H1975, 95D, SK-MES-1 and SPCA-1, as well as normal human bronchial epithelial cell line 16-HBE, were obtained from the Cell Bank of Type Culture Collection of Chinese Academy of Sciences (Shanghai, China). These were cultured in recommended medium at 37 °C in a humidified atmosphere of 20% O~2~ and 5% CO~2~. All experiments were performed using exponentially growing cells.
Western blotting
----------------
For western blotting, cells or tissues were directly lysed in RIPA buffer (Cell Signaling Technology) containing a cocktail of protease inhibitors (Sigma, St. Louis, MO, USA). Total proteins were separated by SDS-PAGE electrophoresis and transferred onto BioTrace nitrocellulose membranes (Pall Corporation, San Diego, CA, USA). Then, membranes were blocked with 5% milk-TBST buffer (TBS plus 0.1% Tween-20) for one hour at room temperature and incubated with anti-CD47 (Abcam, Cambridge, UK), anti-Cdc42 (Abcam), or anti-GAPDH (internal control; Sigma) primary antibodies overnight at 4 °C. The membranes were washed with TBST buffer three times and incubated with corresponding secondary antibodies (anti-rabbit IgG or anti-mouse IgG; Cell Signaling Technology, Danvers, MA, USA) for one hour at room temperature. Protein detection was achieved using a Super Signal West Pico Kit (Thermo Fisher Scientific Inc., Anthem, AZ, USA), followed by quantitative densitometric analysis using Eagle Eye II software (London, England). The expression of a target protein was normalized to that of GAPDH, and each experiment was repeated three times.
Immunohistochemistry
--------------------
For IHC analysis on tissue CD47 or Cdc42, FFPE sections were blocked with 1% BSA and incubated with mouse anti-CD47 antibody (Sigma) or mouse anti-Cdc42 antibody (Abcam) overnight at 4 °C. Then, the sections were incubated with goat anti-mouse IgG (Maxim, Fuzhou, China) for one hour. Staining results were scored by two investigators blinded to the clinical data. The staining index was calculated as the product of the proportion of positively stained tumor cells and staining intensity. The former was scored based on the percentage of positively stained tumor cells: 0 (0%), 1 (\<10%), 2 (10--35%), 3 (35--70%) and 4 (\>70%); while staining intensity was graded as: 0 (no staining), 1 (weak), 2 (moderate) and 3 (strong). Therefore, the staining index has a score between 0 and 12. A staining index score ≥6 indicates a high expression, while a score \<6 indicate a low expression.
Reverse transcription and quantitative real-time PCR (qRT-PCR)
--------------------------------------------------------------
Total RNA was isolated from cells using TRIzol reagent (Life Technologies, Carlsbad, CA, USA), according to manufacturer's instructions. cDNA was synthesized using TransScript One-Step gDNA Removal and cDNA Synthesis SuperMix (Transgen Biotech, Beijing, China). In order to quantitate the expression of human CD47 mRNA, qRT-PCR was performed using TransStart Top Green qPCRSuperMix (Transgen Biotech). Oligonucleotide primers used for CD47 and GAPDH (internal control) were as follows: CD47, 5′-AGATCCGGTGGTATGGATGAGA-3′ (sense) and 5′-GTCACAATTAAACCAAGGCCAGTAG-3′ (antisense); GAPDH, 5′-GCACCGTCAAGGCTGAGAAC-3′ (sense) and 5′-TGGTGAAGACGCCAGTGGA-3′ (antisense). All samples were run in triplicate for target and internal control genes. Cycle threshold (Ct) values of CD47 cDNA were normalized to GAPDH using the ΔΔCt method[@b43].
Immunofluorescence assay
------------------------
For immunofluorescence staining, cells were grown on a Glass Bottom Cell Culture Dish (Nest, Wuxi, China) until 50--60% confluence, fixed with 4% paraformaldehyde and permeabilized with 0.3% Triton X-100. After washing three times with cold PBS, cells were incubated with anti-CD47 antibodies (Santa Cruz Biotechnology, Santa Cruz, CA, USA) at 4 °C for one hour, followed by Alexa Fluor 594-labeled secondary antibody (Abcam) for one hour, and counterstained with DAPI (Life Technologies). Images were subsequently captured using a confocal microscope (Leica TCS SP5, Mannheim, Germany) and analyzed using ImageJ software.
Transient or stable transfection of lung cancer cell lines
----------------------------------------------------------
As a gain-of-function strategy, A549 and NCI-H520 cells were transfected with pcDNA3.1-3xFlag-CD47, pcDNA3.1-3xFlag-Cdc42, or control vector pcDNA3.1-3xFlag plasmids (Youbio Biological Technology Co., Ltd., Beijing China). As a loss-of-function approach, target cells were transfected with CD47 siRNA, Cdc42 siRNA, or control siRNA (Invitrogen, Carlsbad, CA, USA). All transfections were performed with Lipofectamine 3000 (Invitrogen), according to manufacturer's instructions. The transfected cells were incubated in a humidified incubator at 37 °C with 5% CO~2~ for 72 hours, and collected for further experiments. For stable transfection, a shRNA-expressing plasmid that contain the CD47-targeting sequence (5′-AAAAGCTACTGGCCTTGGTTTAATTCTCGAGAATTAAACCAAGGCCAGTAGC-3′) or a vector containing a scrambled sequence was transfected into the target cells, followed by selection using 2 μg/mL of puromycin for 48 hours. Stable transfected cells were used for subsequent studies.
Tetrazolium dye methylthiotetrazole (MTT) assay
-----------------------------------------------
In order to assess cell viability, A549 cells were seeded into 96-well plates (10^3^ cells/well) and transfected with 100 nM of anti-CD47 siRNA or control siRNA. After incubation at 37 °C for 24, 48 and 72 hours, respectively, 20 μg/mL of MTT (Promega, Madison, WI, USA) was added into each well; and cells were allowed to further incubate at 37 °C for four hours. Then, culture media was removed from the wells, MTT solubilization solution was added, incubated at 37 °C for 15 minutes, and absorbance was measured at 590 nm with a reference filter of 620 nm.
Fabrication of the microfluidic chip and *in vitro* cell migration/invasion assay
---------------------------------------------------------------------------------
The microfluidic system was fabricated on a micropatterned polydimethylsiloxane (PDMS, Sylgard 184; Dow Chemical, Midland, MI, USA) chip using the standard soft lithographic method, as modified from a previous study[@b31]. The system composed of a glass coverslip, one central gel micro-channel (9,000 × 1,000 × 40 μm), and two lateral media micro-channels (6,000 × 1,000 × 40 μm) separated by two arrays of micro-columns (200 × 50 × 40 μm, [Fig. 2](#f2){ref-type="fig"}). Each micro-column contained gaps of 50 × 20 × 40 μm in size. In order to quantify cancer cell extravasation, the Matrigel (BD Biosciences, San Jose, CA, USA) was first introduced into the gel micro-channel and incubated at 37 °C in a CO~2~ incubator for 30 minutes to allow hydrogel formation. Then, 50 μL of tumor cells (1 × 10^5^/mL) in serum-free medium were seeded into the cell micro-channel, and medium containing 20% FBS was placed in the media micro-channel as a chemoattractant. Cell migration/invasion was allowed to proceed at 37 °C in a CO~2~ incubator for 72 hours, after which the chip was visualized under a Nikon ECLIPS Ti inverted microscope (Nikon, Tokyo, Japan), with images acquired using a Nikon DS-Ri2camera (Nikon). Three independent experiments were performed for each condition.
Animal studies
--------------
For the establishment of the xenograft tumor model, 5 × 10^6^ cells of A549 cells stably transfected with either control or CD47 shRNA were subcutaneously implanted into the right axillar of 4--5 week-old BALB/c nude mice (*n* = 6 per group, Dalian Medical University). Tumor formation in nude mice was monitored for 36 days, with the length and width measured every three days. Then, mice were euthanized for tumor excision. Tumor volume was calculated as (1/2 × L × W^2^).
For experimental lung metastasis, A549 cells stably transfected with either control or CD47 shRNA (5 × 10^6 ^cells/mouse) were injected into the 4-week-old BALB/c nude mice through tail veins (n = 6 per group). Four weeks later, the mice were sacrificed, with the liver tissues dissected, fixed in 10% formalin, examined under the microscope for metastatic foci. All procedures involving animals were conducted in compliance with a protocol approved by the Institutional Animal Care and Use Committee of the Second Hospital of Dalian Medical University. The experiments were carried out in accordance with approved guidelines.
Statistical analysis
--------------------
All statistical analyses were carried out using SPSS 13.0 statistical software package (Chicago, IL, USA). Data were expressed as mean ± standard deviation (SD). Statistical significance of the differences between experimental groups was determined using Student's *t*-test or *X*^*2*^-test. *P* \< 0.05 was considered statistically significant.
Additional Information
======================
**How to cite this article**: Zhao, H. *et al*. CD47 Promotes Tumor Invasion and Metastasis in Non-small Cell Lung Cancer. *Sci. Rep.* **6**, 29719; doi: 10.1038/srep29719 (2016).
Supplementary Material {#S1}
======================
###### Supplementary Information
This work was supported by The National High Technology Research and Development Program ("863" Program) of China (2015AA020409) and the Project of Liaoning Province Education Department (L2014358).
**Author Contributions** H.Z., J.W., X.K. and E.L. performed the experiments. H.Z. and Q.W. designed the study. H.Z., Q.W. and Y.Z. wrote the manuscript. Y.L., X.D., Z.K. and Y.T. provided technical help. H.Z., Y.K. and Z.Y. performed statistical analysis. Y.Z. and Q.W. provided scientific discussion. All authors contributed to the discussion and review of the manuscript.
{#f1}
{#f2}
{#f3}
{#f4}
{#f5}
###### Correlation between CD47 expression level and clinicopathologic characteristics of 80 NSCLC patients.
Variables CD47 *P-*value
-------------------------- ------ ----------- ---- -------
Age (years)
60 29 12 17 0.878
\>60 51 22 29
Gender
Male 35 14 21 0.690
Female 45 20 25
Histological type
Squamous cell carcinoma 12 5 7 0.310
Adenocarcinoma 65 29 36
Other 3 0 3
T factor
T1 + T2 51 33 18 0.000
T3 + T4 29 1 28
Lymph node metastasis
N0 + N1 64 33 31 0.001
N2 + N3 16 1 15
Distant metastasis
M0 59 33 26 0.000
M1 21 1 20
Clinical stage
I + II 43 33 10 0.000
III + IV 37 1 36
Differentiation
Low 23 10 13 0.910
Moderate + high 57 24 33
[^1]: These authors contributed equally to this work.
|
Fresno City Senior Amateur & Master City Championship
Riverside GC
May 18-19, 2013
FRESNO – David Smith of Fresno earned a three-shot victory in the Fresno City Senior Championship at Riverside GC, firing a 36-hole total of 143, one-under par. After opening with a two-under par 70 and alone in second, Smith followed with a one-over par 73 to finish atop the leaderboard. Fellow Fresno resident Doug Johnson had the low final round score to move up the leaderboard and finish second place. After a first round two-over par 74, Johnson carded an even-par 72 to finish at 146. Tied for third at 148, four-over par were Bill Storey and Rob Adolph. Storey showed consistency with back-to-back 74s, while conversely Adolph who had the first round lead with a three-under par 69, closed with a seven-over par 79. Rounding out the top five was Greg Saiki at 149, five over par, with rounds of 73 and 76.
In the Master Division Championship another three-shot victory was in store as Mike Stieler of Coarsegold finished at 141, three-under par. Stieler opened with a three-under par 69 to take a two-shot advantage on the field and also allowed him to cruise in the final round to an even-par 72. Greg Loosigian took second at 144 with rounds of 71 and 73, while Troy Williams finished alone in third at 150 with matching 75s. Tied for fourth at 151, seven-over par were Darren Segrue (77-74) and Ty Murphy (76-75). |
Continued in situ DNA fragmentation of microglia/macrophages in white matter weeks and months after traumatic brain injury.
Paraffin-embedded material from the pons of head-injured patients whose disability could be attributed to diffuse traumatic axonal injury, and controls, was identified from the department's archive. The cases were divided into three groups based on survival, viz Group 1 (n = 5) who survived for between 4 and 8 weeks, Group 2 (n = 5) for between 3 and 9 months, and Group 3 (n = 5) who survived for more that 12 months. Sections were stained by the TUNEL (TdT-mediated UTP nick end labelling) technique, and by H&E, LFB/CV and immunohistochemically for astrocytes (GFAP) and microglia/macrophages (CD68). Microscopic abnormalities were mapped onto line diagrams of two levels of the pons and quantitation of the response determined by an eye-piece graticule placed over the medial lemmisci, cortico-spinal and transverse fiber tracts. Data were pooled by region of interest. In the H&E and LFB/CV stained sections, there was variable pallor of staining in ascending and descending fiber tracts due to loss of myelin: within these same tracts there was an astrocytosis and increased numbers of microglia/macrophages compared with controls. In the white matter tracts of the controls, there was on average 1-2 TUNEL+ cells per unit area. In contrast, there were on average 2-16 TUNEL+ cells in the cortico-spinal tracts and in the medial lemnisci of all groups of head-injured patients. CD68+ cells co-located with the TUNEL+, and their number mirrored the TUNEL + staining with on average 16-30 cells per unit area in Group 1, 14-27 cells per unit area in Group 2, and 12-14 cells per unit area in Group 3. There was a statistical association between the TUNEL+ and CD68+ cells. Few changes were seen in the transverse fiber tracts of the pons. These findings indicate that most of the in situ DNA fragmentation occurred in microglia/macrophages in ascending and descending fiber tracts of the brain stem in which by conventional light microscopy there is Wallerian degeneration. However, in addition, a few TUNEL+ oligodendrocyte-like cells were also seen. |
Proteomic evaluation to identify biomarkers for carpal tunnel syndrome: a comparative serum analysis.
Carpal tunnel syndrome (CTS) is the most common peripheral nerve entrapment, causing pain, impairment, and disability. To identify proteins of CTS comprehensively, a comparative serum analysis of CTS patients and normal control subjects was performed. The two-dimensional electrophoresis patterns of serum obtained from six CTS patients and six normal control subjects were compared. We found 10 proteins that were significantly altered in the serum of CTS patients, among which four were upregulated and six were downregulated. The upregulated spots were identified as Chain A, heat shock 70-kDa protein, 42-kDa ATPase N-terminal domain; glutathione-insulin transhydrogenase (216AA); cAMP-dependent protein kinase inhibitor alpha; and mutant β-globin. The downregulated spots were identified as vitamin D-binding protein (VDBP), fibrinogen gamma chain, apolipoprotein A-IV (ApoA-IV), clusterin, heterogeneous nuclear ribonucleoprotein H1 (hnRNP H1), and one unidentified protein. The information obtained from this proteomic analysis will be very useful in understanding the pathophysiology of CTS and in finding suitable proteins that can serve as new diagnostic biomarkers of CTS. |
package se.citerus.cqrs.bookstore.ordercontext.resource;
import se.citerus.cqrs.bookstore.event.DomainEvent;
import se.citerus.cqrs.bookstore.event.DomainEventStore;
import se.citerus.cqrs.bookstore.ordercontext.query.QueryService;
import se.citerus.cqrs.bookstore.ordercontext.query.orderlist.OrderProjection;
import javax.ws.rs.Consumes;
import javax.ws.rs.GET;
import javax.ws.rs.Path;
import javax.ws.rs.Produces;
import java.util.Collection;
import java.util.LinkedList;
import java.util.List;
import java.util.Map;
import static javax.ws.rs.core.MediaType.APPLICATION_JSON;
@Path("query")
@Produces(APPLICATION_JSON)
@Consumes(APPLICATION_JSON)
public class QueryResource {
private final QueryService queryService;
private final DomainEventStore eventStore;
public QueryResource(QueryService queryService, DomainEventStore eventStore) {
this.queryService = queryService;
this.eventStore = eventStore;
}
@GET
@Path("events")
public List<Object[]> getAllEvents() {
List<DomainEvent> allEvents = eventStore.getAllEvents();
List<Object[]> eventsToReturn = new LinkedList<>();
for (DomainEvent event : allEvents) {
eventsToReturn.add(new Object[]{event.getClass().getSimpleName(), event});
}
return eventsToReturn;
}
@GET
@Path("orders")
public Collection<OrderProjection> getOrders() {
return queryService.getOrders();
}
@GET
@Path("orders-per-day")
public Map getOrdersPerDay() {
return queryService.getOrdersPerDay();
}
}
|
Q:
Pandas: convert grouped df into list of dict with two columns as key, value pair
I have the following df:
YEAR MONTH VALUE
0 2010 january 1
1 2010 february 0
2 2010 march 2
3 2010 april 1
4 2010 may -2
5 2010 june -0
6 2010 july 1
7 2010 august 0
8 2010 september 1
9 2010 october 2
10 2010 november -0
11 2010 december 0
12 2011 january 1
13 2011 february 0
14 2011 march 0
15 2011 april -0
16 2011 may 0
17 2011 june -0
18 2011 july -0
19 2011 august -1
20 2011 september -1
21 2011 october 1
22 2011 november 0
23 2011 december 1
I need to convert it into the following format
[{"id":0,"year":2010,"january":1,"february":1,"march":2,"april":1,"may":null,"june":null,"july":null,"august":null,"september":null,"october":null,"november":null,"december":null
Basically I have grouped the df by the year. Now I want a single dictionary for each group that has the month as key and its corresponding value as value. There's an extra key, value for the year and the group number (id=0)
PS: Ignore the null values in my desired format. They should all have corresponding value for the month
A:
You can create a dictionary from the values by simply calling dict(df.values), then you just need to chain the groups in the right way to construct your list.
out = []
for idx, (key, group) in enumerate(df.groupby('YEAR')):
year = dict(group.iloc[:, ~group.columns.isin(['YEAR'])].values)
year.update({'id': idx})
out.append(year)
Or as a list comprehension.
dict_merge = lambda a,b: a.update(b) or a
out = [dict_merge(dict(group.iloc[:, 1:].values), {'id': idx}) for idx, (key, group) in enumerate(groups)]
print(out)
[{'april': 1.56,
'august': 0.95,
'december': 0.83,
'february': 0.81,
'id': 0,
'january': 1.02,
'july': 1.32,
'june': -0.57,
'march': 2.66,
'may': -2.02,
'november': -0.53,
'october': 2.17,
'september': 1.79},
{'april': -0.17,
'august': -1.81,
'december': 1.36,
'february': 0.84,
'id': 1,
'january': 1.06,
'july': -0.04,
'june': -0.27,
'march': 0.11,
'may': 0.15,
'november': 0.75,
'october': 1.95,
'september': -1.55}]
|
Q:
What does it mean when frequency has dimension of (1/cm)?
I have to solve this problem.
Let WDOS (weighted DOS) be
$$ \rho (\omega) = A \omega e^{- \omega / \omega _0}\ \ \ \ \ \ (1) $$
where $\omega _0 = 30\ \color{red}{\text{cm}^{-1}}$ and $A$ is a constant.
The amplitude of fluctuation $D$ is given as
$$ D^2 (T) = \int _0 ^\infty \rho (\omega) \omega ^2 \text{coth} \left( \frac{\hbar \omega}{2 k_B T} \right) d\omega .\ \ \ \ \ \ (2)$$
Numerically determine the value of $A$, assuming $D = 100\ \text{cm}^{-1}$ when $T = 300\ \text{K}$.
... (A middle level problem.)
... (A higher level problem.)
I don't even understand the problem. If $\omega _0$ has dimension of cm${}^{-1}$, the frequency $\omega$ should have the same dimension to make $\omega / \omega _0$ dimensionless in eq.(1). If so, however, $\hbar \omega / 2 k_B T$ in eq.(2) does have dimension, which is so strange that we cannot determine dimension of $\text{coth} \left( \frac{\hbar \omega}{2 k_B T} \right)$.
Is the problem incorrect? But please note that, in the field of spectroscopy, sometimes it seems frequency has dimension of length. For example, see this plot from this paper.
How can we handle frequency whose dimension is cm${}^{-1}$?
For the future reader:
I found a related post Why does this paper use 1/cm for units of frequency?
A:
It means that the units of $\hbar$ have also been adjusted to match.
Multiply your frequency by $c$ to get a conventional angular frequency in rad/s, or multiply $\hbar \mapsto\hbar c$ to get the appropriate units for $\hbar$.
|
Webcam2favicon - exercise in literate coffeescript - franze
https://github.com/franzenzenhofer/webcam2favicon
======
franze
hi, i coded/wrote this for my latest <http://www.viennajs.org/> meetup talk.
basically a midnight experiment in literate programming. the experimental
point is, the README.md you see the github repo is the actual source.
|
GOP Blasts Obama’s|Recess Appointments
WASHINGTON (CN) – Republican on the House Judiciary Committee claimed Wednesday that President Obama’s recess appointments in January “go well beyond past presidential practice and raise serious constitutional concerns.” In a nearly 3-hour hearing, Republicans slammed Obama for appointing three people to the National Labor Relations Board, and naming Richard Cordray director of the Consumer Financial Protection Bureau while the Senate was in quasi-recess. Committee Democrats, led by Rep. John Conyers of Michigan and Rep. Jerrold Nadler of New York, said the real problem was the 41 Senate Republicans telling the administration that they would block any appointments Obama made no matter what the appointees’ party affiliation. “Because the Recess Appointments Clause permits the president, under the specified circumstances, to bypass the Senate and make appointments unilaterally, it has been a rich source of conflict between residents and Congresses since the early days of the republic,” said Charles Cooper, a partner with Cooper & Kirk who was called to testify at the hearing. Cooper backed the Republicans’ claim that Obama exceeded his constitutional authority to make appointments while the Senate is at recess. Though the debate and questioning became heated at times, both Nadler and Conyers said the committee had no standing to resolve the issue, leaving the question to the courts. Rep. Mel Watt, D-N.C., casually turned the pages of the Washington Post Sports section while Rep. Trent Franks, R-Ariz., blasted Obama, exclaiming that “never before in this country’s history has a president made recess appointments when the Senate was not in recess.” Obama’s Jan. 4 appointments were made during a series of “pro forma” Senate sessions designed to break the holiday period into 3-day adjournments, to comply with its constitutional obligation not to adjourn for more than 3 days during a session, according to Cooper. Though pro forma sessions are used to fulfill the Senate’s obligation to simply show up, legislating hardly ever occurs during such sessions. But during a recent round of pro forma sessions, the Senate voted to extend the payroll tax cut, an act the Republicans interpreted as business as usual. “In my opinion, these appointments circumvent the delicate balance of power in our Constitution and radically distort the purpose of the Recess Appointments Clause,” testified Jonathan Turley, a law professor from George Washington University. “Regardless of one’s interpretation of the language and history of this clause, there should be consensus – certainly in Congress – that these latest appointments do both the Constitution and our country a disservice,” Turley said. In a rare bit of bipartisan amity, the hearing ended with Committee Chairman Lamar Smith, R-Texas, praising Rep. Dan Lungren, R-Calif., for being the only committee member to stick around through the entire hearing. “He gets the attendance award,” Smith said. |
Sunday, 14 February 2016
Finland´s Europhile finance minister, former Prime Minister Alexander Stubb is worried about the future of the European Union. Here is what he said in an interview when asked about the possible downfall of the Union:
"I do not know whether the EU is eternal, probably not. In 2020 we will probably see whether we will survive this. It is interesting to see, what the world looks like 15 years from now."If a leading Europhile expresses himself in this way, be prepared for huge changes 15 years from now, or probably earlier ... |
Game Audio To Be Highlighted At AES
The 135th Audio Engineering Society Convention (Thursday, October 17, through Sunday, October 20, 2013, at the Javits Center in New York City) will feature a comprehensive Game Audio Track, focusing on audio trends and issues in the gaming industry. As the track's co-chairs, industry veterans Michael Kelly and Steve Martz have assembled a compelling and highly inclusive series of panels, sessions and presentations that address the many dimensions of this complex sector of professional audio. These include multichannel game audio, 3D sound, sound effects, immersive game sound, the emotional components of game audio, and other key points of topic.
As any gamer or developer knows, gaming is growing in diversity, as the industry moves further into an online model and the ways that consumers can access games continue to expand. Throughout this revolutionary period of change, audio will continue to be of fundamental importance to the gaming experience, and the Game Audio Track at the AES Show will keep those involved in the industry at the top of their game.
"This year's Game Audio Track is going to be particularly fascinating, because of several key changes in the gaming industry," observes Michael Kelly, who in addition to co-chairing the Game Audio Track is also Director, Research and Development, for DTS and Chair of the AES's Technical Committee on Audio for Games. Kelly, who has co-chaired the technical committee since 2004 with Steve Martz and jointly organized the convention activity since then, points out, "The games track at U.S. AES conventions has grown into a major event. This is the first time we've officially shared the chair for the games track, in order to keep on top of the planning. Undoubtedly, the biggest change in the larger industry this year will be the launch of new gaming consoles. That's always an exciting event for any games track, and a lot of our events will be covering that. In particular, we have leaders from both Sony and Microsoft looking at where sound in games is going in the future. We've also got a strong focus on mobile and web-based gaming to reflect the significance of that sector of the games industry."
Kelly is excited for several of the topics on the program for the Game Audio Track this year. "I'm really looking forward to the Planes, Trains and Automobiles session with Mike Caviezel," he says. "That was a real hit in Europe. We try not to repeat sessions, but that was one we just had to bring over for the U.S. audience. The In the Trenches session promises to be good too; it's always great to get to deeper issues, and that's something that we have the opportunity to do really well at AES events. I think the loudness session is also something worth seeing. After years of sessions in this area, we could be close to something that works practically for the industry. With an added sprinkling of sessions about specific games, it's looking like an exciting line-up this year!" |
Regressive logistic modeling of familial aggregation for asthma in 7,394 population-based nuclear families.
The aim of this population-based study was to determine whether asthma aggregates in families, and if so, whether aggregation was consistent with environmental and/or genetic etiologies. Data were from 7,394 nuclear families (41,506 individuals) from the 1968 Tasmanian Asthma Survey, in which all Tasmanian schoolchildren born in 1961 were surveyed by respiratory questionnaire completed by their parents. Similar data were obtained for parents and siblings of probands. For a child, having ever had asthma was predicted by a parent or sibling having ever had asthma; odds ratio (OR) = 3.13 (95% confidence interval [CI] 2.82-3.48) for mother, 2.99 (2.69-3.32) for father, and 3.47 (3.23-3.72) for a sibling. Regressive logistic modeling showed that, in addition to parent-offspring effects, the data were consistent with the existence of an unmeasured factor shared by siblings, evident in 15% (SE 2%) of families and associated with a conditional OR of 9.68 (8.27-11.32). Familial aggregation was best described by a general oligogenic model with non-Mendelian transmission probabilities. Of the Mendelian models, a codominant model with an allele frequency of 16% (SE 0.3%) was preferred. Under a dominant model there was evidence for additional parent-offspring and sibling effects of similar magnitude. It is unlikely that there is one major loci influencing asthma susceptibility; the overall effects of asthma genes in the population are more likely to be inherited codominantly, at least for the majority of loci of major etiological importance. The role of environmental factors in explaining part of familial aggregation for asthma cannot be ruled out, as major triggers of asthma attacks are familial. |
Natural health: Nutrition and hormones affect nail health
Age could be more of a key to the root cause of nail troubles rather than diet and garlic can be used to treat or prevent ear infections |
Why babies should never sleep alone: a review of the co-sleeping controversy in relation to SIDS, bedsharing and breast feeding.
There has been much controversy over whether infants should co-sleep or bedshare with an adult caregiver and over whether such practises increase the risk of SIDS or fatal accident. However, despite opposition from medical authorities or the police, many western parents are increasingly adopting night-time infant caregiving patterns that include some co-sleeping, especially by those mothers who choose to breast feed. This review will show that the relationships between infant sleep patterns, infant sleeping arrangements and development both in the short and long term, whether having positive or negative outcomes, is anything but simple and the traditional habit of labelling one sleeping arrangement as being superior to another without an awareness of family, social and ethnic context is not only wrong but possibly harmful. We will show that there are many good reasons to insist that the definitions of different types of co-sleeping and bedsharing be recognised and distinguished. We will examine the conceptual issues related to the biological functions of mother-infant co-sleeping, bedsharing and what relationship each has to SIDS. At very least, we hope that the studies and data described in this paper, which show that co-sleeping at least in the form of roomsharing especially with an actively breast feeding mother saves lives, is a powerful reason why the simplistic, scientifically inaccurate and misleading statement 'never sleep with your baby' needs to be rescinded, wherever and whenever it is published. |
Q:
SharePoint Search TrimDuplicates=true removes unique content, is this a known bug?
I'm running a FullTextSqlQuery where TrimDuplicates is set to true and have been searching for days on why certain items are not in the results. I just found out today that the result appears when I set TrimDuplicates=false.
Is this a known SharePoint search bug?
My code is simple:
using (var fullTextSqlQuery = new FullTextSqlQuery(_searchServiceApplicationProxy))
{
fullTextSqlQuery.QueryText = querytext;
fullTextSqlQuery.ResultsProvider = SearchProvider.Default;
fullTextSqlQuery.TrimDuplicates = true;
fullTextSqlQuery.EnableStemming = true;
fullTextSqlQuery.EnableNicknames = true;
fullTextSqlQuery.IgnoreAllNoiseQuery = true;
fullTextSqlQuery.ResultTypes |= ResultType.RelevantResults;
if (pageSize.HasValue && pageSize.Value > 0)
{
fullTextSqlQuery.RowLimit = pageSize.Value;
fullTextSqlQuery.TotalRowsExactMinimum = pageSize.Value;
if (selectedPage.HasValue && selectedPage.Value > 0)
fullTextSqlQuery.StartRow = (selectedPage.Value - 1) * pageSize.Value;
}
searchResults = fullTextSqlQuery.Execute();
}
Thanks in advance for your answers.
A:
Found a partial answer in: https://sharepoint.stackexchange.com/questions/14460/sharepoint-2010-search-when-is-a-document-a-duplicate
It seems like TrimDuplicates removes search results if the data is similar to a certain degree (does not have to be 100%). Though the actual % is not known.
In short, there's no bug in Trim Duplicates, just not a lot of understanding on how this feature behaves.
Now my problem is figuring out which data it is comparing. Since it seems like even when I make the data in my custom columns unique, do an index reset and another full crawl, the page I'm looking for is still trimmed off.
|
Senate Majority Leader Mitch McConnell says the receipt of the FBI background report on Brett Kavanaugh won't be used as a delay on the vote on the nomination.
McConnell, when asked how long he planned to give between the FBI report being sent to the Senate and when he calls for a vote, said, "It shouldn’t take long. As interesting as this all is I can’t imagine senators who want to read it won’t go over and read it."
He added, it "won’t be used as a delay I can tell you that.”
Senate Minority Leader Chuck Schumer had called for 24 hours before the vote. |
Aromatic intermediate formation during oxidative degradation of Bisphenol A by homogeneous sub-stoichiometric Fenton reaction.
The elimination of Bisphenol A (BPA) from contaminated waters is an urgent challenge. This contribution focuses on BPA degradation by homogeneous Fenton reagent based on reactive ()OH radicals. Pronounced sub-stoichiometric amounts of H(2)O(2) oxidant were used to simulate economically viable processes and operation under not fully controlled conditions, as for example in in situ groundwater remediation. Aside from the most abundant benzenediols and the monohydroxylated BPA intermediate (which were detected as stable intermediates in earlier contributions), a wide array of aromatic products in the molecular weight range between 94 Da (phenol) and approximately 500 Da could be detected, the overwhelming majority of which have not been reported thus far. The identification was carried out by GC/MS analysis of trimethylsilyl ethers. The structural assignments were confirmed through the use of fully deuterated [(2)H(16)] BPA as the substrate, as well as using retention indices calculated on the basis of the increment system. The occurrence of aromatic intermediates larger than BPA, which typically share either a biphenyl- or a diphenylether structure, can be explained by oxidative coupling reactions of stabilized free radicals or by the addition of organoradicals (organocations) onto BPA molecules or benzenediols. The hydroxycyclohexadienyl radical of BPA was recognized to play central role in the degradation pathways. Ring opening products, including lactic, acetic and dicarboxylic acids, could be detected in addition to aromatic intermediates. Since some of those intermediates and products are recalcitrant to further oxidation under the conditions of sub-stoichiometric Fenton reaction, they should be carefully considered when designing and optimizing Fenton-driven remediation systems. |
TV Shows:
Battlestar Galactica, Chuck, Castle, The Big Bang Theory, Firefly,
Dr. Who, How I Met Your Mother, Eureka, Psych, Once upon a Time,
Lost Girl, Friends, Futurama, The Simpsons, The Fairly OddParents,
Whose line is it anyway?,etc... |
1. Field of the Invention
The present invention relates to a photovoltaic device, and more particularly, it relates to a photovoltaic device comprising a photovoltaic element including a transparent conductive oxide film and a paste electrode formed thereon.
2. Description of the Background Art
A photovoltaic element having a structure obtained by inserting a substantially intrinsic amorphous semiconductor layer between a fist conductivity type crystalline semiconductor layer and a second conductivity type amorphous semiconductor layer thereby improving junction characteristics and comprising a transparent conductive oxide film formed on the second conductivity type amorphous semiconductor layer and a paste electrode formed thereon is known in general. For example, Japanese Patent Laying-Open No. 2003-197943 discloses this type of photovoltaic element.
According to the structure of the aforementioned photovoltaic element disclosed in Japanese Patent Laying-Open No. 2003-197943, amorphous semiconductor layers can be formed by plasma CVD at a low temperature of not more than about 200° C. When the photovoltaic element is formed through such a low-temperature process, a paste electrode is formed on a transparent conductive oxide film with low-temperature fired paste hardenable by firing at a temperature of not more than about 200° C.
In the structure of the aforementioned photovoltaic element disclosed in Japanese Patent Laying-Open No. 2003-197943, however, relatively small adhesiveness of the low-temperature fired paste to the transparent conductive oxide film may reduce adhesiveness of the paste electrode to the transparent conductive oxide film. If external force is applied to the paste electrode through an electric wire when a photovoltaic device (photovoltaic module) is prepared by connecting a plurality of photovoltaic elements having such paste electrodes with each other through the electric wire, therefore, the electric wire and the paste electrode may separate from the transparent conductive oxide film of the photovoltaic element. Consequently, the yield in production of the photovoltaic device is disadvantageously reduced. |
USS S-1 (SS-105)
{|
{{Infobox ship career
|Hide header=title
|Ship country=United Kingdom
|Ship flag=
|Ship name=HMS P552|Ship acquired=20 April 1942
|Ship commissioned=
|Ship decommissioned=
|Ship in service=
|Ship out of service=
|Ship struck=
|Ship fate=Suffered a collision in Durban harbor and declared unseaworthy, January 1944, nominally returned to the United States and sold for scrap locally
|Ship status=
}}
|}USS S-1 (SS-105)''' was the lead boat of the S class of submarines of the United States Navy. The Navy had awarded contracts for the first three S boats under the same general specifications but of different design types. S-1 was what was known as a "Holland-type", while was a "Lake-type" and a "Government-type".S-1s prime contractor, the Electric Boat Company, subcontracted her construction to the Fore River Shipbuilding Company of Quincy, Massachusetts. Her keel was laid down on 11 December 1917. She was launched on 26 October 1918 sponsored by Mrs. Emory S. Land, and commissioned on 5 June 1920, with Lieutenant Commander Thomas G. Berrien in command.
Service history
United States Navy
Inter-war periodS-1 began her service operations in July 1920 with a cruise to Bermuda attached to Submarine Division 2 (SubDiv 2), with subsequent operations out of New London, Connecticut, cruising the New England coast until 1923.
On 2 January 1923, she shifted to SubDiv Zero, a division created for experimental work, and conducted winter maneuvers in the Caribbean Sea. As a single-ship division, SubDiv Zero, she returned to New London in the spring to continue experimental duty.
As part of a series of studies conducted by the United States Navy after World War I into the possibility of submarine-borne observation and scouting aircraft, S-1 became the experimental platform for this project late in 1923. She was altered by having a steel capsule mounted abaft the conning tower; a cylindrical pod which could house a small collapsible seaplane, the Martin MS-1. After surfacing, this plane could be rolled out, quickly assembled, and launched by ballasting the sub until the deck was awash. These experiments were carried out into 1926 using the Martin-built plane, constructed of wood and fabric, and the all-metal Cox-Klemin versions, XS-1 and XS-2. The first full cycle of surfacing, assembly, launching, retrieving, disassembly, and submergence took place on 28 July 1926, on the Thames River at New London.
Following the aircraft experiments, S-1 served as flagship for SubDiv 2 until July 1927, when she was transferred to SubDiv 4. While attached to this division, she made operational cruises to the Panama Canal Zone in 1928–1930, during the spring months. She visited ports at Cristobal, Canal Zone and Coco Solo, Canal Zone; Cartagena, Colombia; Kingston, Jamaica; and Guantánamo Bay, Cuba, during these cruises, and spent the remaining months of those years operating along the New England coast, out of New London.
January 1931 found her at Pearl Harbor. She remained there into 1937; first, attached to SubDiv 7, SubRon 4, then, from July 1932 – July 1933, attached to Rotating Reserve SubDiv 14. She was returned to SubDiv 7 in August, and remained with that division until departing in May 1937 for Philadelphia. S-1 arrived at Philadelphia on 22 July and commenced overhaul for deactivation. She was decommissioned on 20 October.
World War II
On 16 October 1940, S-1 was recommissioned at Philadelphia. She then made two cruises to Bermuda, training submariners, and returned to Philadelphia from the second cruise on 7 December 1941. There, she prepared for transfer to Britain under the Lend-Lease program. She was decommissioned and turned over to the British on 20 April 1942. Her name was struck from the Naval Vessel Register on 24 June.
Royal NavyS-1 served the Royal Navy as HMS P.552'' as a training vessel for anti-submarine warfare. In poor condition after arriving in Durban, Natal, South Africa, she was often in repair and she was declared unseaworthy in January 1944.
She was returned to the U.S. Navy at Durban on 16 October 1944, where she was stripped of vital parts and machinery, and her hull was sold for local scrapping on 20 July 1945 and she was scrapped there on 14 September of that year.
References
Category:United States S-class submarines
Category:Ships built in Quincy, Massachusetts
Category:1918 ships
Category:World War II submarines of the United States
Category:Ships transferred from the United States Navy to the Royal Navy
Category:United States S-class submarines of the Royal Navy
Category:World War II submarines of the United Kingdom |
The skin consists mainly of three layers, namely, starting from the outermost: epidermis, dermis and hypodermis.
The epidermis consists in particular of keratinocytes (primarily), melanocytes (involved in skin pigmentation) and Langerhans cells. Its function is to protect the body from the external environment and ensure its integrity, and notably to block the penetration of microorganisms or of chemical substances, and prevent evaporation of the water contained in the skin.
For this purpose, the keratinocytes undergo a continuous process of directed maturation, in which the keratinocytes located in the basal layer of the epidermis form, in the terminal stage of their differentiation, corneocytes, which are cells resulting from cornification (a particular form of apoptosis). These corneocytes are very inter-cohesive, fully keratinized in the form of cornified envelopes and surrounded by an extracellular medium that is very rich in lipids. The constituent elements of these cells, as well as the enzymes that regulate their detachment to permit desquamation, are mainly synthesized by the keratinocytes of the underlying cellular layer, the stratum granulosum or granular layer. The granular keratinocytes correspond to the last nucleated stage of keratinocyte differentiation, before cornification, which is accompanied by nuclear lysis with stoppage of all activity of transcription and translation. It is at this stage that there is culmination of the production of the precursors of the cornified envelope and other specific cellular constituents indispensable to the barrier function of the epidermis such as ceramides, cholesterol and free fatty acids. The cornified envelope formed during cornification replaces the lipid bilayer of granular keratinocytes. It represents 7% of the dry weight of the stratum corneum. It consists of proteins that are bound to one another or to the lamellar lipid envelope covalently by transglutaminases, forming a macromolecular complex that is particularly stable, insoluble and impermeable, which is essential for the physical strength and the barrier function of the stratum corneum.
Epidermal differentiation is a complex phenomenon requiring fine regulation of the expression of the genes permitting manufacture of the various constituents of the keratinocytes and then of the corneocytes. A great many transcription factors are involved in this process. The genes of numerous proteins of the cornified envelope are localized within one and the same cluster of 2.5 Mb called the “Epidermal Differentiation Complex” (EDC) in position 1q21.3. The EDC comprises more than 50 different genes, expressed principally in the epidermis. Most of the genes coding for the structural proteins necessary for terminal differentiation, such as loricrin, filaggrin and involucrin, are found there. The EDC also contains several families of genes, at least 18 of which code for the late proteins of the Late Cornified Envelope (LCE) (Marshall et al. 2001, Differentially expressed late constituents of the epidermal cornified envelope. Proc Natl Acad Sci USA. 98: 13031-6). In the course of cornification, these proteins of the LCE family are incorporated in the cornified envelope owing to the action of transglutaminases, which establish an ε-(γ-glutamyl) lysyl linkage between a donor glutamine residue and an acceptor amine group, in a calcium-dependent manner.
The barrier function of the epidermis may be disturbed in certain climatic conditions (under the effect of cold and/or wind, for example); under the effect of stress or fatigue; under the effect of certain chemical factors (pollution, ultraviolet radiation, alcohol, irritating soaps, domestic cleaning products, detergents, etc.).
Many skin disorders that are characterized by production of a thickened stratum corneum and by abnormal desquamation, i.e. hyperkeratosis, also display an altered barrier function. Hyperkeratosis can occur on all anatomic skin areas and in very varied clinical contexts. Its underlying physiopathology and its causes are varied. As examples we may mention: xerosis (or dry skin), ichthyoses, psoriasis, certain benign or malignant tumoral lesions, reactive hyperkeratoses. Conversely, certain pathological manifestations involve thinning of the epidermis and especially of the stratum corneum, which is reflected in excessive fragility of the skin. The latter can occur in various anatomical regions, its cause is variable and it can be constitutional or acquired. As examples we may mention: trophic skin disorders of the lower limbs in patients with vascular disorders, varices, arteriopathies (diabetes, arteriosclerosis, etc.), trophic skin disorders in the context of an algodystrophic syndrome, trophic disorders following abnormal healing.
The barrier function of the epidermis may also be disturbed during aging. Thus, older subjects, and notably those over 50 years of age, are often found to have a xerosis or a dryness of the mucosae, linked to a decrease in secretion of sebum, hormonal changes or to slowing of the flow of water through the epidermis. These disturbances of the barrier of the epidermis cause a decrease in the amount of organized water, a desynchronization of the synthesis or a change in the structure and/or composition of the bilayers of the granular layer. These changes thus promote desquamation of the stratum corneum, penetration of allergens, of irritants or of microorganisms, which thus cause dry skin, which may give rise to sensations of discomfort such as tightness or redness, as well as affecting the radiance of the complexion and the flexibility of the skin.
To prevent this phenomenon or correct it, it is known to apply cosmetic or pharmaceutical compositions on the skin, said compositions containing hygroscopic agents, such as sugars or polyols, or urea and lactic acid (components of the NMF, Natural Moisturizer Factor) intended to capture the water present in the skin and thus block its evaporation. Classically, fats have also been used for forming an occlusive film on the skin, such as petroleum jelly, which helps to block the evaporation of water. Moreover, these compositions frequently incorporate active ingredients acting on one or more of the various biological targets involved either in the processes of regeneration of the skin, in particular in the differentiation of the keratinocytes, synthesis of the epidermal lipids and cohesion of the corneocytes, or in the endogenous synthesis of constituents of the natural moisturizer factor (NMF) of the skin, in particular in the synthesis of proteoglycans.
However, there is still a need for new cosmetic or pharmaceutical active ingredients for more effectively combating dry skin, disorders of the barrier function and/or development of fragility of the epidermis. |
The Marvel and Disney tentpole will play in more than 4,080 theaters, the widest August release in history; “It’s much more of a space opera than a superhero movie,” says director James Gunn.
Gunning for one of the top August openings of all time in North America, Guardians of the Galaxy is expected to open to at least $65 million this weekend, a strong start for Marvel Studios’ new franchise.
Some believe director James Gunn‘s Guardians has a shot at approaching, or crossing, $70 million, although no one is placing any bets considering the steep downturn overall at the summer box office. If it does, it would eclipse the $69.2 million domestic debut of record-holder The Bourne Ultimatum on the same weekend in 2007. The No. 2 August title is Rush Hour 2, which opened to $67.4 million in 2001.
I don’t know if it’s going to quite make it to $70 Million, but I suspect this is going to be a pretty big one.
We reivew movies and TV shows, aggregate movie and TV news, offer opinions and analysis, and most of all, have good fun and greaet disucssion. We love filim and TV and we want to share that love with you. |
Attractive Patio And Garden Design Ideas Small Patio Garden Design Home Design Ideas Pictures Remodel And - You have a large variety of patio area styles and motifs you can pick if you desire that wonderful patio area. Do you have a pool or a wonderful garden? If you do, the patio area suggestions you develop might rotate around them. Whatever has to look great together so you need to consider the outdoor patios environments when you pick a patio area layout. A patio area is simply one element of a garden layout, but it is one of one of the most costly components of any kind of garden construct. Since the patio area satisfies several various functions it requires be offered mindful factor to consider. Next off, we will certainly provide you a few images of patio and garden design ideas might be your house style motivation.
The Attractive Patio And Garden Design Ideas Small Patio Garden Design Home Design Ideas Pictures Remodel And above is a photo with the size 500 x 400 and the part of patio and garden design ideas, selects the top series together with greatest image resolution exclusively for you all, and this pictures is actually one among photographs series in your best photographs gallery concerning patio and garden design ideas. I hope you can as it. |
1) Take jicama, green pepper, onion and cucumber in a bowl and mix them.
2) Add olive oil along with vinegar and oregano. Mix them well.
3) Pour the olive oil mixture over the vegetables and mix them.
4) Add salt and pepper. |
Q:
Example of using hylang with python multiprocessing
I am looking for an example of using python multiprocessing (i.e. a process-pool/threadpool, job queue etc.) with hylang.
A:
The first example from the multiprocessing documentation can be literally translated to Hy like so:
(import [multiprocessing [Pool]])
(defn f [x]
(* x x))
(when (= __name__ "__main__")
(with [p (Pool 5)]
(print (.map p f [1 2 3]))))
|
Q:
Linear fit including all errors with NumPy/SciPy
I have a lot of x-y data points with errors on y that I need to fit non-linear functions to. Those functions can be linear in some cases, but are more usually exponential decay, gauss curves and so on. SciPy supports this kind of fitting with scipy.optimize.curve_fit, and I can also specify the weight of each point. This gives me weighted non-linear fitting which is great. From the results, I can extract the parameters and their respective errors.
There is just one caveat: The errors are only used as weights, but not included in the error. If I double the errors on all of my data points, I would expect that the uncertainty of the result increases as well. So I built a test case (source code) to test this.
Fit with scipy.optimize.curve_fit gives me:
Parameters: [ 1.99900756 2.99695535]
Errors: [ 0.00424833 0.00943236]
Same but with 2 * y_err:
Parameters: [ 1.99900756 2.99695535]
Errors: [ 0.00424833 0.00943236]
Same but with 2 * y_err:
So you can see that the values are identical. This tells me that the algorithm does not take those into account, but I think the values should be different.
I read about another fit method here as well, so I tried to fit with scipy.odr as well:
Beta: [ 2.00538124 2.95000413]
Beta Std Error: [ 0.00652719 0.03870884]
Same but with 20 * y_err:
Beta: [ 2.00517894 2.9489472 ]
Beta Std Error: [ 0.00642428 0.03647149]
The values are slightly different, but I do think that this accounts for the increase in the error at all. I think that this is just rounding errors or a little different weighting.
Is there some package that allows me to fit the data and get the actual errors? I have the formulas here in a book, but I do not want to implement this myself if I do not have to.
I have now read about linfit.py in another question. This handles what I have in mind quite well. It supports both modes, and the first one is what I need.
Fit with linfit:
Parameters: [ 2.02600849 2.91759066]
Errors: [ 0.00772283 0.04449971]
Same but with 20 * y_err:
Parameters: [ 2.02600849 2.91759066]
Errors: [ 0.15445662 0.88999413]
Fit with linfit(relsigma=True):
Parameters: [ 2.02600849 2.91759066]
Errors: [ 0.00622595 0.03587451]
Same but with 20 * y_err:
Parameters: [ 2.02600849 2.91759066]
Errors: [ 0.00622595 0.03587451]
Should I answer my question or just close/delete it now?
A:
Please note that, from the documentation of curvefit:
sigma : None or N-length sequence
If not None, this vector will be used as relative weights in the
least-squares problem.
The key point here is as relative weights, therefore, yerr in line 53 and 2*yerr in 57 should give you similar, if not the same result.
When you increase the actually residue error, you will see the values in the covariance matrix grow large. Say if we change the y += random to y += 5*random in function generate_data():
Fit with scipy.optimize.curve_fit:
('Parameters:', array([ 1.92810458, 3.97843448]))
('Errors: ', array([ 0.09617346, 0.64127574]))
Compares to the original result:
Fit with scipy.optimize.curve_fit:
('Parameters:', array([ 2.00760386, 2.97817514]))
('Errors: ', array([ 0.00782591, 0.02983339]))
Also notice that the parameter estimate is now further off from (2,3), as we would expect from increased residue error and larger confidence interval of parameter estimates.
A:
One way that works well and actually gives a better result is the bootstrap method. When data points with errors are given, one uses a parametric bootstrap and let each x and y value describe a Gaussian distribution. Then one will draw a point from each of those distributions and obtains a new bootstrapped sample. Performing a simple unweighted fit gives one value for the parameters.
This process is repeated some 300 to a couple thousand times. One will end up with a distribution of the fit parameters where one can take mean and standard deviation to obtain value and error.
Another neat thing is that one does not obtain a single fit curve as a result, but lots of them. For each interpolated x value one can again take mean and standard deviation of the many values f(x, param) and obtain an error band:
Further steps in the analysis are then performed again hundreds of times with the various fit parameters. This will then also take into account the correlation of the fit parameters as one can see clearly in the plot above: Although a symmetric function was fitted to the data, the error band is asymmetric. This will mean that interpolated values on the left have a larger uncertainty than on the right.
|
Q:
How to make desktop notifications from long-running shell commands?
I'm currently trying to configure sphinxsearch. The indexing takes around 7 minutes. Too long to wait so I usually start doing some other tasks before testing the results. But I would like to be notified when the indexing is finished - what are your ideas? The problem is also that the sessions are running through ssh. Ideal would be some tray notification that would watch changes on the terminal that is either minimized or shown on a different virtual desktop.
A:
A couple possibilities off the top of my head:
play a music or alarmish sound file
open a particular 'I'm done!' webpage with your browser (most browsers will just open a new tab or window if you they're already open)
notify-send or gmessage or xmessage, which all do approximately the same thing: pop up an x-windows window with the message you specify.
A:
To elaborate on @pjz's answer, you could use xmessage (or any other command that will make something happen visually) like this:
long-running-command; xmessage "I'm Done"
This will pop up a small notification window when your command is done.
|
Q:
What is oob in func (*UDPConn) ReadMsgUDP?
This link has information about OOB in TCP.
With out-of-band data we want the byte-stream service layer on the
sending side to send this data before any other data that it has
buffered. Similarly we want the receiving end to pass this data to its
user process ahead of any data that it might have buffered.
But what about UDP?
In golang, the ReadMsgUDP function requires an oob byte slice.
func (c *UDPConn) ReadMsgUDP(b, oob []byte) (n, oobn, flags int, addr *UDPAddr, err error)
What is the oob for? Are there any use cases in open source code? Or should I use PacketConn instead of UDPConn?
A:
Well, as I tried, when you want other infomation(such as pktinfo) to get local address with setting syscall.setsockoption, you will need it. This happens when you don't want connection-oriented UDP.
|
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<maintainer type="person">
<email>soap@gentoo.org</email>
<name>David Seifert</name>
</maintainer>
<use>
<flag name="xrandr">Add support for xrandr</flag>
</use>
<upstream>
<remote-id type="sourceforge">notion</remote-id>
<remote-id type="github">raboof/notion</remote-id>
</upstream>
</pkgmetadata>
|
67 Ill.2d 544 (1977)
367 N.E.2d 1273
In re CHARLES STEPHENSON, Appellant. (The People of the State of Illinois, Appellee.)
No. 48390.
Supreme Court of Illinois.
Opinion filed September 20, 1977.
*545 *546 *547 *548 Michael J. Rovell, Jeffrey D. Colman, and Lisa Salkovitz, of Chicago (Jenner & Block, of counsel), for appellant.
Bernard Carey, State's Attorney, of Chicago (Paul P. Biebel, Jr., Deputy State's Attorney, and Henry A. Hauser and Timothy Szwed, Assistant State's Attorneys, of counsel), for the People.
Judgment affirmed.
*549 MR. JUSTICE UNDERWOOD delivered the opinion of the court:
The Cook County grand jury returned indictments charging that defendant, Charles Stephenson, murdered two persons. Subsequent proceedings resulted in a January 3, 1974, finding that he was unfit to stand trial, and his confinement in a State institution pending recovery. On January 10 a petition alleging defendant to be in need of mental treatment was filed accompanied by the certificates of two psychiatrists, both stating defendant was in need of hospitalization on an emergency basis because he was, in the words of one doctor, a "[p]ossible danger to self if depression increases in severity" and, as stated by the other, was "likely to physically harm others unless hospitalized." Following a February 15 evidentiary hearing defendant was found to be in need of mental treatment and committed to the Department of Mental Health for care and treatment in the Manteno State Hospital.
Defendant appealed and the Appellate Court for the First District affirmed. (36 Ill. App.3d 746.) We allowed defendant's petition for leave to appeal, and now consider whether the due process requirements of the Federal and State constitutions in involuntary commitment proceedings are satisfied by a standard of proof less demanding than the proof beyond a reasonable doubt standard applicable to criminal trials. The trial judge in this case believed proceedings for the commitment of the mentally ill were civil in nature, thus permitting the use of the ordinary preponderance of the evidence standard. The appellate court disagreed, holding that the indefinite loss of personal liberty which could result necessitated the more stringent standard of clear and convincing evidence. That court held, however, that the evidence before the trial court clearly and convincingly established defendant's need for mental treatment and accordingly affirmed the judgment.
*550 While it could be argued the issue is moot since defendant is no longer subject to the judgment being reviewed, the issue is a constantly recurring one upon which judicial opinions diverge. It has been thoroughly briefed and argued, and its resolution will relieve existing uncertainties and contribute to the efficient operation of our system of justice. We therefore consider it. In re Estate of Brooks (1965), 32 Ill.2d 361, 364-65; People ex rel. Wallace v. Labrenz (1952), 411 Ill. 618, 622-23.
Civil commitments are governed by the Mental Health Code of 1967 (Ill. Rev. Stat. 1973, ch. 91 1/2, pars. 1-1 through 20-1). Section 1-11 defines a "Person in Need of Mental Treatment" as "any person afflicted with a mental disorder, not including a person who is mentally retarded, as defined in this Act, if that person, as a result of such mental disorder, is reasonably expected at the time the determination is being made or within a reasonable time thereafter to intentionally or unintentionally physically injure himself or other persons, or is unable to care for himself so as to guard himself from physical injury or to provide for his own physical needs. This term does not include a person whose mental processes have merely been weakened or impaired by reason of advanced years." (Ill. Rev. Stat. 1973, ch. 91 1/2, par. 1-11.) Other sections provide extensive safeguards clearly intended to minimize the possibility of confinement of persons for whose protection, or the protection of others, confinement is unnecessary. Among those are: sections 3-8 and 3-9 (Ill. Rev. Stat. 1973, ch. 91 1/2, pars. 3-8, 3-9), requiring an explanation of the status and rights to be given every hospitalized patient in a language he understands within 12 hours of his admission; section 9-2 (Ill. Rev. Stat. 1973, ch. 91 1/2, par. 9-2) providing for jury trials on the question of the need for mental treatment if such trial is requested by the patient, his spouse, relative, friend or an attorney for any of them; section 9-4 (Ill. Rev. Stat. 1973, ch. *551 91 1/2, par. 9-4), providing for counsel and requiring the presence of the patient at any court hearing unless waived by counsel or the court finds such attendance would cause the patient serious risk of physical or emotional injury in which event the court or jury must personally observe and confer with the patient; sections 9-6 and 9-7 (Ill. Rev. Stat. 1973, ch. 91 1/2, pars. 9-6, 9-7), limiting the authority of custodians; section 9-11 (Ill. Rev. Stat. 1973, ch. 91 1/2, par. 9-11), providing that commitment as in need of mental treatment is not an adjudication of, and creates no presumption of, legal incompetency and does not deprive the patient of his civil rights (although the efficacy of the latter provision is questioned by defendant, who cites other statutory provisions authorizing revocations or suspensions of licenses, etc., following a finding that the holder is in need of mental treatment (e.g., Ill. Rev. Stat. 1973, ch. 91, par. 55.13-6)); section 10-1 (Ill. Rev. Stat. 1973, ch. 91 1/2, par. 10-1), permitting patients to file requests for discharge accompanied by a physician's certificate; and section 10-2 (Ill. Rev. Stat. 1973, ch. 91 1/2, par. 10-2), providing:
"The superintendent of any hospital in which any patient is hospitalized as in need of mental treatment or as mentally ill under this Act or any prior Act shall, as frequently as practicable but not less than every 6 months, review the need for continued hospitalization of the patient, and make the results of such examination a part of the patient's record. At least once during the first year of a patient's hospitalization and once during each 2-year period thereafter, the superintendent shall file with the Department a written report, on a form which it prescribes, setting forth the reasons supporting the need for further hospitalization of the patient. At the same time this written report is filed, the superintendent shall give notice of such report to the patient, his attorney, his nearest relative, 2 other persons designated by the patient, and to the court which conducted the consultation or ordered the patient's hospitalization or continued hospitalization, *552 whichever was later. Such notice must set forth the right which the patient or any person on his behalf shall have to secure a hearing on the need for continued hospitalization of the patient, by sending a request for hearing to the superintendent, the Department, or the court. Such request must be made to the court, Department, or hospital within 10 days, excluding Saturdays, Sundays and holidays, after the notice is received by the person who makes such request for hearing. If the request is made to the hospital or Department, such recipient shall notify the court of such request forthwith."
Section 10-3 (Ill. Rev. Stat. 1973, ch. 91 1/2, par. 10-3) requires the court to appoint physicians to examine those patients who are indigent and file requests for discharge under section 10-1, and establishes the procedures for court hearings on such requests, including the appointment of counsel and jury trials for hearings under both sections 10-1 and 10-2. The continued use of writs of habeas corpus is expressly recognized by section 10-6. (Ill. Rev. Stat. 1973, ch. 91 1/2, par. 10-6.) Section 10-8 (Ill. Rev. Stat. 1973, ch. 91 1/2, par. 10-8) incorporates a 1969 amendment requiring review within 6 months by the superintendent of each hospital of all unrestored patients committed as mentally ill prior to January 1, 1964, for the purpose of determining their current competence and whether they might be adequately cared for outside the hospital; that amendment further required a petition and physician's certificate to be filed with the court in the cases of the pre-1964 committed patients and a determination by the court of the patients' competence, and, if still incompetent, appointment of conservators of the person and, if appropriate, of the estate. Sections 12-2 and 12-3 (Ill. Rev. Stat. 1973, ch. 91 1/2, pars. 12-2, 12-3) contain specific provisions for the rights of patients to have visitors, telephonic communication and uncensored correspondence with attorneys and public officials, with any restriction upon visitation and telephonic communications *553 and the reasons therefor to be made a part of the patient's clinical record. Inspection of hospital records or divulging information regarding clinical or clerical data is severely limited. Section 10-4 (Ill. Rev. Stat. 1973, ch. 91 1/2, par. 10-4) authorizes the hospital superintendents to grant patients absolute or conditional discharges or temporary releases.
These provisions of Illinois' comprehensive Mental Health Code are stated in some detail, not because we regard them as dispositive of the issue before us, but because we regard them as relevant in our consideration of the consequences attendant upon involuntary commitments. Those consequences are of primary concern in a determination of the required standard of proof.
Defendant contends that the reasonable doubt standard of proof is constitutionally required because the loss of individual liberty is at stake, and permanent and substantial stigmatization results from a civil commitment. Due process, however, is a flexible concept and depends, at least in part, on the circumstances of the particular matter in issue. Morrissey v. Brewer (1972), 408 U.S. 471, 481, 33 L.Ed.2d 484, 494, 92 S.Ct. 2593, 2600.
Our society places an especially high but not completely unlimited value upon personal liberty and freedom, and, in criminal cases, the conviction of an innocent person is regarded as a greater encroachment upon those values than is the acquittal of one who is guilty. To minimize the possibility of the former, proof beyond a reasonable doubt is required to sustain a criminal conviction. (In re Winship (1970), 397 U.S. 358, 364, 25 L.Ed.2d 368, 375, 90 S.Ct. 1068, 1073.) In contrast, the decision in the ordinary civil case only determines which party must bear an economic loss. Because there are no sound reasons for favoring one party over another, a preponderance of the evidence standard is used. (In re Winship (1970), 397 U.S. 358, 371, 25 L.Ed.2d 368, *554 379, 90 S.Ct. 1068, 1076 (Harlan, J., concurring).) The case we deal with here, like many others, does not fit easily into either category. Thus, although commitments of the mentally ill are usually regarded as civil proceedings, analogies may be drawn to criminal proceedings. The most obvious, of course, is the potential loss of liberty which may well be of substantial duration. In our judgment, however, the application of labels or use of simplistic analogies is of little real assistance. More to the point, we believe, is an appraisal of the interests of the allegedly mentally ill individual and the society of which he is a part. Those interests are, in part, competing.
The fundamental liberty interest of the person facing commitment is self-evident. The Mental Health Code of 1967, as earlier noted, reflects a concern for that interest and, in its present form, represents a serious attempt to provide beneficial treatment and care for the mentally ill with the minimum ostracism and confinement consistent with protection of the public. Our free society's interest in prospectively protecting itself from dangerous or harmful conduct, standing alone, suffices to justify only minimal infringements upon an individual's personal liberty. A high value has also been placed, however, on our society's obligation to protect and care for those of its members unable to protect or care for themselves. It is important to a concerned and humane society that the margin of error be held to a minimum in denying such protection and care. Moreover, the individual involved, as well as society, has a strong interest in getting needed care or treatment which will enable him to function normally, and it seems to us that neither the interests of society nor the mentally ill are well served by a standard requiring proof so conclusive that many persons will be denied needed treatment, care and protection. Additionally, the release of an individual who is unable to control his conduct and likely to injure or endanger himself or others jeopardizes the interest of *555 society in the protection of its members. In contrast, of course, a standard of proof which tends to favor erroneous commitments infringes upon personal liberty, and this consideration persuades us, as it has the State, of the necessity for a standard more nearly conclusive than a mere preponderance of the evidence. But, in our judgment, the degree of infringement here is not so great as to require the proof beyond a reasonable doubt rule applicable in criminal cases. There are substantial differences. The line between guilt and innocence is, in an abstract sense, clear, i.e., either defendant did or did not commit the offense, but the boundary between those persons who are dangerously mentally ill and those who are not is less well marked. It is a matter of the degree of disturbance, an appraisal of which is dependent upon subjective determinations and predictions. It is not unlikely that the mental health of a person erroneously committed will nevertheless be close to a point of serious illness, and that such persons might well benefit from the treatment accorded them while committed. In contrast, it is difficult to imagine any corresponding benefit accruing to an imprisoned innocent person. A further difference is to be found in that, even if the alternatives provided by section 9-6 are not utilized by the court and the individual is hospitalized, section 10-1 provides an opportunity for the speedy release of one no longer in need of mental treatment upon his own application; and the required periodic review and report by the superintendent of the hospital (section 10-2) is unparalleled in the laws controlling release of those serving criminal sentences.
On balance we believe that proof beyond a reasonable doubt is an inappropriate standard for use in involuntary civil commitment proceedings. Predictions of dangerousness can hardly be beyond a reasonable doubt in the undeveloped framework of the science of psychiatric diagnosis and prediction, for the subjective determinations *556 therein involved are incapable of meeting objective certainty. (Tippett v. Maryland (4th Cir.1971), 436 F.2d 1153, 1165 (Sobeloff, J., concurring in part and dissenting in part), cert. dismissed as improvidently granted sub nom. Murel v. Baltimore City Criminal Court (1972), 407 U.S. 355, 32 L.Ed.2d 791, 92 S.Ct. 2091; Doremus v. Farrell (D. Neb. 1975), 407 F. Supp. 509, 516-17; Bartley v. Kremens (E.D. Pa. 1975), 402 F. Supp. 1039, 1052, prob. juris. noted (1976), 424 U.S. 964, 47 L.Ed.2d 731, 96 S.Ct. 1457; Lynch v. Baxley (M.D. Ala. 1974), 386 F. Supp. 378, 393; and In re Valdez (1975), 88 N.M. 338, 342-43, 540 P.2d 818, 822-23.) See also Ennis & Litwack, Psychiatry and the Presumption of Expertise: Flipping Coins in the Courtroom, 62 Calif. L. Rev. 693 (1974); Diamond, The Psychiatric Prediction of Dangerousness, 123 U. Pa. L. Rev. 439 (1974); Rosenhan, On Being Sane in Insane Places, 179 Sci. 250 (1973); Scheff, Being Mentally Ill: A Sociological Theory 130-53 (1966).
Finally, we deem undesirable any additional steps which might erode the differences between mental health commitment proceedings and traditional criminal trials. (See McKeiver v. Pennsylvania (1971), 403 U.S. 528, 29 L.Ed.2d 647, 91 S.Ct. 1976; In re Winship (1970), 397 U.S. 358, 375-76, 25 L.Ed.2d 368, 90 S.Ct. 1068, 1079 (Burger, C.J., dissenting).) Mental illness is not a crime, and a person in need of mental treatment is not by reason thereof a criminal. But proof beyond a reasonable doubt is directly related to and associated with criminal trials and procedure, further exemplifying, in our opinion, its inappropriateness here.
As earlier intimated, we believe the appropriate standard of proof to be clear and convincing evidence. It is, in our opinion, compatible with the competing interests and consistent with due process. It requires a high level of certainty before finding an individual in need of mental treatment and curtailing his liberty, but does not place an *557 impossible burden on the State in proving its case.
The clear and convincing evidence rule applies in many areas of the law where a strict standard is desirable, and it is no stranger to Illinois. (E.g., Galapeaux v. Orviller (1954), 4 Ill.2d 442, 446 (oral contract to devise); Chicago Land Clearance Com. v. Yablong (1960), 20 Ill.2d 204, 207 (constructive trust); Wright v. Wright (1954), 2 Ill.2d 246, 251 (resulting trust).) Due process requirements appear satisfied since this standard, or a lesser one, is frequently used in cases which are not purely civil or criminal but which have a substantial impact on fundamental rights and liberties. The Supreme Court has applied this standard in deportation proceedings (Woodby v. Immigration & Naturalization Service (1966), 385 U.S. 276, 286, 17 L.Ed.2d 362, 87 S.Ct. 483, 488), in proceedings for the revocation of naturalization (Chaunt v. United States (1960), 364 U.S. 350, 5 L.Ed.2d 120, 81 S.Ct. 147), and in expatriation proceedings (Nishikawa v. Dulles (1958), 356 U.S. 129, 2 L.Ed. 659, 78 S.Ct. 612). In this State, allegations of misconduct in attorney disciplinary proceedings must be proved by clear and convincing evidence. (In re Bossov (1975), 60 Ill.2d 439, 441, cert. denied (1975), 423 U.S. 928, 46 L.Ed.2d 256, 96 S.Ct. 275; In re Simpson (1971), 47 Ill.2d 562, 566.) A similar standard of proof is applicable in conservatorship proceedings. (Loss v. Loss (1962), 25 Ill.2d 515, 521.) Only "a clear preponderance of the evidence and not proof beyond a reasonable doubt" is required in a prosecution for a violation of a municipal ordinance. (City of Chicago v. Mayer (1974), 56 Ill.2d 366, 371.) "[A] violation of the conditions of probation must be proved by a preponderance of the evidence." (People v. Crowell (1973), 53 Ill.2d 447, 451; Ill. Rev. Stat. 1975, ch. 38, par. 1005-6-4(c).) This is so even though "the individual facing probation revocation may lose his liberty just as swiftly and surely as a defendant in a criminal case." (People v. Grayson (1974), *558 58 Ill.2d 260, 265, cert. denied (1975), 421 U.S. 994, 44 L.Ed.2d 484, 95 S.Ct. 2001.) The preponderance of the evidence standard also applies in paternity actions (Mitchell v. Hindman (1894), 150 Ill. 538, 540); and New York has upheld the compulsory commitment of narcotics addicts for treatment based on a preponderance of the evidence (People v. Fuller (1969), 24 N.Y.2d 292, 304, 248 N.E.2d 17, 22). We note, too, that while the principal issue in this case is one of first impression in this court, several of our appellate courts, beginning with People v. Sansone (1974), 18 Ill. App.3d 315, 326, have uniformly held that clear and convincing evidence is the proper standard of proof. In addition, a slight majority of decisions from other jurisdictions where this issue has arisen or been discussed have used or upheld the clear and convincing evidence standard. (French v. Blackburn (M.D.N.C. 1977), 428 F. Supp. 1351, 1360); Stamus v. Leonhardt (S.D. Iowa 1976), 414 F. Supp. 439, 449; Doremus v. Farrell (D. Neb. 1975), 407 F. Supp. 509, 517; Bartley v. Kremens (E.D. Pa. 1975), 402 F. Supp. 1039, 1052, vacated on other grounds (1977), 431 U.S. 119, 52 L.Ed.2d 184, 97 S.Ct. 1709; Lynch v. Baxley (M.D. Ala. 1974), 386 F. Supp. 378, 393; In re Valdez (1975), 88 N.M. 338, 343, 540 P.2d 818, 823; Fhagen v. Miller (Sup. Ct. N.Y. County 1970), 65 Misc.2d 163, 317 N.Y.S.2d 128, 138, modified (1971), 36 App. Div.2d 926, 321 N.Y.S.2d 61, modified (1972), 29 N.Y.2d 348, 328 N.Y.S.2d 393, cert. denied (1972), 409 U.S. 845, 34 L.Ed.2d 85, 93 S.Ct. 47 (reasonable doubt standard rejected); In re Salem (1976), 31 N.C. App. 57, 228 S.E.2d 649; Powers v. State (Tex. Civ. App. 1976), 543 S.W.2d 194, 196; In re Levias (1973), 83 Wash.2d 253, 256, 517 P.2d 588, 590; and State ex rel. Hawks v. Lazaro (W. Va. 1973), 202 S.E.2d 109, 126. See also Tippett v. Maryland (4th Cir.1971), 436 F.2d 1153, 1156, cert. dismissed as improvidently granted sub. nom. Murel v. Baltimore City *559 Criminal Court (1972), 407 U.S. 355, 32 L.Ed.2d 791, 92 S.Ct. 2091 (preponderance of the evidence); and Sabon v. People (1960), 142 Colo. 323, 350 P.2d 576 (preponderance of the evidence). Contra In re Ballay (D.C. Cir.1973), 482 F.2d 648; Suzuki v. Quisenberry (D. Hawaii 1976), 411 F. Supp. 1113, 1132; Lessard v. Schmidt (E.D. Wis. 1972), 349 F. Supp. 1078, 1095, vacated on other grounds (1974), 414 U.S. 473, 38 L.Ed.2d 661, 94 S.Ct. 713; In re Conservatorship of Roulet (1976), 134 Cal. Rptr. 722, 725; In re Pickles (Fla. App. 1965), 170 So.2d 603, 614; Denton v. Commonwealth (Ky. 1964), 383 S.W.2d 681, 683 (implied); Lausche v. Commissioner of Public Welfare (1974), 302 Minn. 65, 225 N.W.2d 366, 369, cert. denied (1975), 420 U.S. 993, 43 L.Ed.2d 674, 95 S.Ct. 1430; In re Perry (1945), 137 N.J. Eq. 161, 164, 43 A.2d 885, 887; Turner v. State (Tex. Civ. App. 1976), 543 S.W.2d 453, 455.) Also, in Lynch v. Overholser (1962), 369 U.S. 705, 714, 8 L.Ed.2d 211, 217, 82 S.Ct. 1063, 1069, the United States Supreme Court refers with apparent approval to the prohibition of pretrial mental commitment of a defendant "unless the Government is able to prove, by a preponderance of the evidence, that the accused is presently of unsound mind." Our review of these authorities fortifies our conclusion that a clear and convincing evidence standard passes constitutional muster.
We would add that, to the extent the adoption of a reasonable doubt standard is a protest against inadequate staff, facilities or treatment (see In re Winship (1970), 397 U.S. 358, 376, 25 L.Ed.2d 368, 382, 90 S.Ct. 1068, 1079 (Burger, C.J., dissenting), and In re Ballay (D.C. Cir.1973), 482 F.2d 648, 659-60), the result is inappropriate, for those problems should be presented and resolved in the legislative forum. Quite simply, the problem, if one exists, of inadequate treatment for the mentally ill is better resolved by improving the treatment provided than by *560 reducing the number to whom it can be given.
There is a third crucial distinction between this case and every case which adopts the reasonable doubt standard. Defendant's commitment in this case, unlike the commitments in all the other cases, was predicated upon evidence which, as hereinafter indicated, met the clear and convincing evidence standard. In essence, the holdings in those cases are rejections of the preponderance of the evidence standard, and, in that sense, are consistent with this opinion. Neither the parties nor we have found a single case holding a clear and convincing evidence standard unconstitutional. We perceive no good reason to do so in this case.
The defendant urges that In re Winship (1970), 397 U.S. 358, 25 L.Ed.2d 368, 90 S.Ct. 1068, requires use of the reasonable doubt standard. Winship, after comparing juvenile delinquency proceedings with criminal proceedings, held that proof beyond a reasonable doubt is necessary in both. In our judgment, however, the retributive and deterrent thrusts of incarceration for criminal conduct in criminal and juvenile proceedings are substantially dissimilar to the emphasis on medical treatment to be accorded the mentally ill through commitment proceedings. We are not prepared to say that a mental health hospital is merely a euphemism for prison. (See Powell v. Texas (1968), 392 U.S. 514, 529, 20 L.Ed.2d 1254, 1265-66, 88 S.Ct. 2145, 2152; In re Gault (1967), 387 U.S. 1, 27, 18 L.Ed.2d 527, 546, 87 S.Ct. 1428, 1443; In re Urbasek (1967), 38 Ill.2d 535, 541.) Winship, Gault and Urbasek were all deeply concerned with the criminal aspect of juvenile proceedings the child was in reality being convicted of a criminal offense and at times imprisoned therefor. Earlier in this opinion we emphasized the differences between mental health commitment proceedings and the criminal cases, and it is unnecessary to repeat them here. Finally, even if the analogies were *561 stronger, as in juvenile proceedings, due process would not require that all rights of a criminal defendant be accorded to the person whose commitment is sought. Cf. McKeiver v. Pennsylvania (1971), 403 U.S. 528, 29 L.Ed.2d 647, 91 S.Ct. 1976.
A similar concern regarding what are, in substance, the equivalents of criminal convictions was manifested in People v. Pembrock (1976), 62 Ill.2d 317, where this court held that proof beyond a reasonable doubt was required under the Sexually Dangerous Persons Act (Ill. Rev. Stat. 1975, ch. 38, par. 105-1.01 et seq.). The defendant argues that this decision requires the application of the same standard of proof in this case. We do not find Pembrock controlling, however, for it was carefully noted that "[a] `sexually dangerous person' creates different societal problems, and his past conduct is different in degree and kind from the conduct of persons in the larger, more inclusive class defined under the Mental Health Code" (62 Ill.2d 317, 322). We continue to believe that the distinctions between criminal, juvenile and sexually dangerous person proceedings and involuntary civil commitments are sufficiently substantial to permit the use of different standards of proof.
The defendant urges that the evidence introduced at the commitment hearing did not meet the clear and convincing standard even if that is the correct standard. We do not agree. Two witnesses testified on behalf of the State. The substance of Willie Wilson's testimony was that defendant walked into a package liquor store where Wilson worked, said "This is it," shot the proprietor with a shotgun and then turned around and walked out. Dr. Robert DeVito, a board certified psychiatrist, testified he had examined defendant on February 11, had examined the records at the Illinois State Psychiatric Institute, and had talked to other doctors and staff personnel there regarding defendant's behavior and their observation of *562 him. Dr. DeVito related defendant's history, including an episode of mental illness resulting in his discharge from service when he was 20 years of age, separate episodes in 1972 and 1973 at the Cook County jail during which defendant was unable to sleep, paced around, experienced auditory hallucinations, thought "he was God or that he had some special gift that God had given him" and read biblical passages in the jail. The doctor concluded that defendant "was suffering schizophrenia paranoid type," and that, while "there was strong evidence [defendant] had improved considerable since being at the [Institute]," he was still suffering from a mental disorder and, in the doctor's opinion, "there is reasonable doubt as to whether he could control his actions in terms of being potentially dangerous to others or potentially dangerous to himself." Dr. DeVito also stated: "There is a chance he might be dangerous to others if returned to society at this time."
Dr. V. Siomopoulos, a staff psychiatrist at the Institute, was called by the defendant as an expert witness. Dr. Siomopoulos had observed defendant on several occasions during formal psychiatric interviews and informally on an almost daily basis for about four weeks. Defense counsel asked the following question: "Doctor, do you have an opinion based on a reasonable degree of psychiatric certainty and based upon your examination of Mr. Stephenson, whether Mr. Stephenson can reasonably be expected to intentionally or unintentionally injure himself now or within a reasonable time thereafter?" Dr. Siomopoulos replied: "Yes. I think there is a reasonable expectation that Mr. Stephenson would respond in a psychotic manner to the usual stresses of life if he is not hospitalized." He further stated that "there is a good possibility that if he became psychotic that he may become dangerous to himself or to others." After the court sustained an objection to a question preliminary to showing a prior inconsistent statement by the doctor, an *563 offer of proof was made by defense counsel and not ruled on by the court. In the course of that testimony the doctor explained that he had just become aware of the "subtleties" of section 1-11 of the Mental Health Code of 1967 (Ill. Rev. Stat. 1973, ch. 91 1/2, par. 1-11), which was why he had changed his former opinion that the defendant was not in need of mental treatment as defined in the Mental Health Code of 1967. The doctor conceded that the chance of Stephenson becoming psychotic was not beyond a reasonable doubt, but stated he thought "there is a good reasonable expectation that within a reasonable time from this hearing he would become psychotic" and that "if exposed to life's stresses, common life stresses, he may respond in a psychotic manner and perhaps in homicide." The doctor also stated he could not recall personally observing any violent behavior by defendant nor noting any in the nurses' reports. Contrary to defendant's assertion, we find in the record no indications of inaccuracy or unreliability in the psychiatric testimony nor that future treatment of defendant will be inadequate. We agree with the appellate court that this evidence clearly and convincingly establishes defendant as a person in need of mental treatment and hospitalization.
The defendant lastly argues that Wilson's testimony concerning the murder was irrelevant and severely prejudicial since, he urges, conduct occurring 15 months earlier can have no bearing on his need for mental treatment at the time of the hearing. While there may well be a point where the lapse of time has been so great that the probative value of prior conduct has diminished to irrelevancy, Stephenson's shooting of the liquor store proprietor does not fall in that category and is not so disassociated with the hearing as to be irrelevant. Quite the contrary is true: the petition to commit the defendant was presented as a direct result of that conduct, and this evidence is highly relevant to the issue of the reasonable *564 expectation of the defendant's dangerousness. Defendant argues that the failure of the expert witnesses to consider this conduct in drawing their conclusions demonstrates its irrelevance. But that argument overlooks the fact that it is the trier of fact who is to consider all the evidence and make the final decision (see Humphrey v. Cady (1972), 405 U.S. 504, 509, 31 L.Ed.2d 394, 402-03, 92 S.Ct. 1048, 1052; People v. Ford (1968), 39 Ill.2d 318, 320;In re Graham (1976), 40 Ill. App.3d 452, 454), not the psychiatrists. It is clearly proper for the court to consider and base its decision on evidence in addition to the expert testimony.
The judgment of the appellate court is accordingly affirmed.
Judgment affirmed.
|
I’m gonna start this with a little note that due to some other, non-Satellaview events going on, I probably won’t update much through the first half of August if at all. Ok, so I suppose I have went longer without an update, but still
I’m also gonna apologize to ChronoMoogle, since because of my mixture of procrastination and distraction he’s been on my case about the ROMs I’ve been obviously holding back. And I kinda still am, because this only has one of them so far, and not even the one I teased earlier. Tsk, bad, bad Kiddo!
And, well… besides the fact that the video is in PAL mode for whatever reason, that pretty much sums it up!
Yet another Puyo Puyo demo for the Satellaview audience, this time for “Super Puyo Puyo Tsuu Remix”. While the demo for the original release of the game featured 1-on-1 VS, this demo highlights the 3/4-player mode. It also, of course, has some of the “Remixed” tracks.
I don’t particularly know why there’s no “BS Ban” appended at the end of the header like with the previous one. Man, sometimes I wish the Satellaview had some more consistency… |
Q:
Multiple font markers in shapefiles in QGIS?
I'm making a UK phase 1 vegetation survey map and require to show the dominant plant species in a given polygon. In phase 1 these are shown as 2- or 3-letter codes e g Ri, Cys. These codes need to be located very precisely and as far as I can see, the various labelling options in QGIS do not allow sufficient precision. I am therefore trying to create point shapefiles for each dominant plant species. Is there a way of using multiple letters in the "font marker" symbol layer type?
A:
You can add another symbol layer:
Select the new symbol layer, add your letter/symbol and alter the Offset X,Y, so in your case it would just be the X.
A:
You do not need to use symbols because labels are more efficient (and easy to use).
You can set the label position exactly where you want it.
You first create a column in your file with x coord and one with y, then set them (as you see in the image):
and then after that, you can move the label (using the tool "Move label").
|
TTI-Chicago and the University of Chicago are hosting a Machine Learning Summer School from May 16-27. This will include all the machine learning and learning theory that can be covered in 2 weeks of intense instruction. The target audience is anyone interested in the subject including graduate students and academic and industry researchers. Please join us.
In addition, the summer school will be colocated with two workshops and the 'special emphasis on learning theory' quarter at TTI-Chicago. Attendees of the school will be able to attend the workshops and vice-versa. For further details on the quarter see: |
Tuesday, November 25, 2003
A lot of things can be said about Microsoft strategies but in the end whenever they turn into a new market a lot of new ideas emerge and progress is made in that area. It looks like Microsoft will continue to push into the Search Engine market now. In two to five years will there still be a Google ? |
Q:
Ejabberd: A user can see other (foreign) chat content
A have tested ejabberd 20.03 on my Archlinux box for a few weeks now as a possible WhatsApp replacement within the family. I use a postgresql backend for my user database. All went very well until today: I created a third account for my sister. Login is OK and we can chat with each other. Here comes the problem: she can see the chat history of me and here son, which was/is the first non-admin user! And his chat history is cleartext while mine is not readable.
I did not create a chat room and almost every thing (besides the user authentication thing) is the default. We all use the current Conversations on Android. I have no idea what's going on here...
The modules section:
modules:
mod_adhoc: {}
mod_admin_extra: {}
mod_announce:
access: announce
mod_avatar: {}
mod_blocking: {}
mod_bosh: {}
mod_caps: {}
mod_carboncopy: {}
mod_client_state: {}
mod_configure: {}
mod_disco: {}
mod_fail2ban: {}
mod_http_api: {}
mod_http_upload:
put_url: https://@HOST@:5443/upload
mod_last: {}
mod_mam:
## Mnesia is limited to 2GB, better to use an SQL backend
## For small servers SQLite is a good fit and is very easy
## to configure. Uncomment this when you have SQL configured:
db_type: sql
assume_mam_usage: true
default: always
mod_mqtt: {}
mod_muc:
access:
- allow
access_admin:
- allow: admin
access_create: muc_create
access_persistent: muc_create
access_mam:
- allow
default_room_options:
mam: true
mod_muc_admin: {}
mod_offline:
access_max_user_messages: max_user_offline_messages
mod_ping: {}
mod_privacy: {}
mod_private: {}
mod_proxy65:
access: local
max_connections: 5
mod_pubsub:
access_createnode: pubsub_createnode
plugins:
- flat
- pep
force_node_config:
## Avoid buggy clients to make their bookmarks public
storage:bookmarks:
access_model: whitelist
mod_push: {}
mod_push_keepalive: {}
mod_register:
## Only accept registration requests from the "trusted"
## network (see access_rules section above).
## Think twice before enabling registration from any
## address. See the Jabber SPAM Manifesto for details:
## https://github.com/ge0rg/jabber-spam-fighting-manifesto
ip_access: trusted_network
mod_roster:
versioning: true
# mod_s2s_dialback: {}
mod_shared_roster: {}
mod_stream_mgmt:
resend_on_timeout: if_offline
mod_vcard: {}
mod_vcard_xupdate: {}
mod_version:
show_os: false
A:
Obviously there's something else going on here that you didn't notice and have not mentioned.
Maybe the fact that mod_mam is enabled, and configured to archive by default all conversations. But there's necessary something else going on, maybe your clients are reusing accounts, so different people have access to the same accounts...
|
[Vascular tone in adolescents with autonomic vascular dysfunction of hypotensive type (according to the data of tetrapolar rheovasography)].
408 teenagers at the age of 11-14 y.o. have been investigated. All of them underwent tetrapolar longitudinal reovasography. 339 were found with hypotensive type vegetovascular dysfunction. It was established, that the vascular component plays an essential part in genesis of vegetovascular disfunction; vessels are losing their elasticity, that leads to decreasing of vascular tone, blood filling of some parts of the body, decelerating pulse-wave velocity, at the end transforming in steady decreasing of arterial tension. |
/*
* Copyright (c) 2017-2019 superblaubeere27, Sam Sun, MarcoMC
*
* Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*/
package me.superblaubeere27.annotations;
public enum ObfuscationTransformer {
FLOW_OBFUSCATION,
LINE_NUMBER_REMOVER,
NUMBER_OBFUSCATION,
STRING_ENCRYPTION,
HWID_PROTECTION,
PEEPHOLE_OPTIMIZER,
CRASHER,
INVOKE_DYNAMIC,
REFERENCE_PROXY,
SHUFFLE_MEMBERS,
INNER_CLASS_REMOVER,
NAME_OBFUSCATION,
HIDE_MEMBERS,
INLINING
}
|
An Internet search under "surfactants environment" will turn up numerous sources of information from different viewpoints.
The Soap and Detergent Association (SDA), which repesents chemical companies and manufacturers, takes the following position: "Extensive laboratory testing and ''real-world'' monitoring studies have shown that the major surfactants biodegrade quickly and thoroughly and do not present a risk to organisms living in the environment. The slight differences in biodegradation rates ... — Lynn E. Krafft, ICAN-ATEX Associate Editor, lekrafft@juno.com |
Q:
Problem adding leading zeros to a nested SELECT value using SQL Server 2016
I am trying to add leading zeros to an nvarchar data type value that needs to be a length of 9 but I'm not having any luck with my attempts. I am building a flat file and every field is an nvarchar data type.
Here is my original SQL code:
SELECT (SELECT MAX([Record Number])+1 FROM #tempFINAL) as [Record Number]
After doing some googling here is attempt #1:
SELECT RIGHT(REPLICATE('0', 9) + (SELECT MAX([Record Number]+1) FROM #tempFINAL), 9) as [Record Number]
Here is attempt #2:
SELECT RIGHT('000000000' + (SELECT MAX([Record Number]+1) FROM #tempFINAL), 9) as [Record Number]
Neither attempts worked. Any help/direction would be appreciated. I must be missing something fairly easy. Thanks.
A:
Sean is correct, your mixing a string with an int. Here are 4 quick options:
Select [Record Number] = Format(max([Record Number])+1,'000000000') from #tempFINAL
Select [Record Number] = right(concat('000000000',max([Record Number])+1),9) from #tempFINAL
Select [Record Number] = right('000000000'+convert(varchar(10),max([Record Number])+1),9) from #tempFINAL
Select [Record Number] = right('000000000'+left(max([Record Number])+1,10),9) from #tempFINAL
|
1. Field of the Invention
The present invention relates to an improved calcium phosphate gel for the preparation of adsorbed vaccines. It includes the vaccines adsorbed by a novel gel of this kind.
2. Description of the Prior Art
The advantages of adsorbed vaccines are known. The concentrated form in which they may be present provides the advantage of only requiring a small space for their storage, whilst it is possible to prepare, when needed, large quantities of vaccines in very little time from this form. This is particularly valuable in the event of epidemics or other occurrences when the vaccines might be necessary immediately. The adsorbed preparations, which remain stable for several years, enable the need for control of their dilution products to be considerably reduced, since the necessary titrations have been carried out on the concentrated products.
For these reasons, the adsorbed vaccines have been the subject of various investigations, not all of which have led to satisfactory results. In fact, the majority of adsorbants which have been proposed have the drawback that they are irritants, that they exhibit poor adsorption of the antigens, or that they are difficult to adapt to an industrial scale preparation.
Some progress has been made with the use of a calcium phosphate gel prepared by the known method of Tiselius, that is to say, a gel formed of brushite wherein the phosphate is in the form of PO.sub.4 HCa.2H.sub.2 O. However, even in this form, the gel does not adsorb sufficient antigens in all cases of interest and quite often its deleterious properties leave much to be desired. A further improvement has ameliorated the vaccines adsorbed on calcium phosphate gel, i.e., the one which forms the subject of Belgian Pat. No. 721,141 or U.S. Pat. No. 3,608,071 and which consists of precipitating the phosphate within a medium containing the antigen. The gel still has the composition of brushite. |
// flow-typed signature: 408473ded89f671a9c25dbf296aab3fe
// flow-typed version: <<STUB>>/babel-plugin-transform-es2015-template-literals_v^6.8.0/flow_v0.33.0
/**
* This is an autogenerated libdef stub for:
*
* 'babel-plugin-transform-es2015-template-literals'
*
* Fill this stub out by replacing all the `any` types.
*
* Once filled out, we encourage you to share your work with the
* community by sending a pull request to:
* https://github.com/flowtype/flow-typed
*/
declare module 'babel-plugin-transform-es2015-template-literals' {
declare module.exports: any;
}
/**
* We include stubs for each file inside this npm package in case you need to
* require those files directly. Feel free to delete any files that aren't
* needed.
*/
declare module 'babel-plugin-transform-es2015-template-literals/lib/index' {
declare module.exports: any;
}
// Filename aliases
declare module 'babel-plugin-transform-es2015-template-literals/lib/index.js' {
declare module.exports: $Exports<'babel-plugin-transform-es2015-template-literals/lib/index'>;
}
|
Q:
Subsetting data frames while dropping rows which fulfill certain conditions
I want to subset a data Frame. Most time one reduces an original data frame by keeping observations which fulfil certain conditions in its variables and dropping the rest.
A working code is:
Companies.Exchanges.1 <- subset(Companies.Exchanges.0,
(Frankfurt == 1 & London == 1))
I want to do it the other way round: Dropping all observations which fulfil certain conditions and keeping the rest - which violates at last one condition - in a new data frame.
How do I have to reformulate the above code to do this this?
A:
Try negating your filtering conditions with !
Companies.Exchanges.1 <- subset(Companies.Exchanges.0,
!(Frankfurt == 1 & London == 1))
When you specify filtering conditions for subset or in general, R takes all of your rows and checks them against the conditions you set. Think of it as adding another boolean vector to your dataframe where matching criteria = TRUE, and not matching = FALSE. The ! operator reverses this invisible vector.
|
LONDON — Mandy Patinkin is angry. Not the sort of simmering frustration he exudes while playing Saul Berenson on "Homeland," but something far more visceral and candid.
"There's real fear and there's made-up, false fear, OK?" he said, jabbing his finger. "Real fear is when your house is on fire, or a bomb's coming through your living room."
Mandy Patinkin Alexander Smith / NBC News
The "false fear," he said, is when politicians in America or Europe say: "You need to be afraid of refugees, and we have to ban all of these people because they are a threat to our safety."
The 64-year-old sat down to speak with NBC News Monday after traveling with the International Rescue Committee along one of Europe's migrant routes.
It's a perilous path on which hundreds of thousands of people have fled, escaping war-torn countries in the Middle East and Africa and risking death in search of better lives in Europe and beyond.
After a four-decade career — with highlights including "Homeland," the 1980s cult classic "The Princess Bride," and a Tony-winning Broadway career — the actor turned to refugee activism in 2015, when he first traveled to the Greek islands.
"Donald Trump is, first and foremost, a human being. And human beings have hearts and compassion and morality and ethics and I believe, at Donald Trump's core, he too has that."
Like Trump's promise to build a wall on the Mexico border and curb immigration, Europe's leaders have begun tightening their own controls.
The mountains of life jackets, the desperate families, the children plucked from dinghies — all of it had a profound impact on Patinkin. He calls global mistrust of refugees "a tragic cancer of fear that is growing in epidemic proportions — based on falsehoods."
That falsehood is the allegation that refugees are dangerous, when in fact Patinkin points out that the facts suggest otherwise.
Of 3,024 deadly terrorist incidents by foreign-born attackers since 1975, only three were refugees — all Cubans who committed their attacks in the 1970s before more thorough screening was introduced in the next decade — according to a report by the Cato Institute last year.
Let our news meet your inbox. The news and stories that matters, delivered weekday mornings. This site is protected by recaptcha
The chance of an American being killed in a terror attack perpetrated by a refugee is 1 in 3.64 billion, the study said.
"I will repeat these facts until I have no more breath," Patinkin said of the disparity between evidence and public opinion.
Last week, he traveled to the Greek island of Lesbos, where people land on flimsy, overcrowded boats, and others wash up drowned. He went to the Serbian capital of Belgrade, a choke-point along the transit route, and then to Germany, the destination many people are trying to reach.
It's no coincidence, the shared themes between his activism and the plot lines of "Homeland," a show he co-produces while playing an emotionally tortured CIA chief.
Actor Mandy Patinkin, left, hugs Zahra Nawrozi, 18, an Afghan refugee, at the Sid accommodation center, in Sid, Serbia, on March 2. Tara Todras-Whitehill / for the International Rescue Committee
"It is a privilege to try to hold the mirror up to nature," he said of the show. "And the nature of the world is burning and on fire all around us … All I wanted to do … was to connect with reality, not the fictional world I was making my living in, but reality."
His connection to the crisis is also rooted in his own family history. Patinkin is a Jew whose grandfather fled the Nazis in German-occupied Poland, and whose grandmother escaped the Russian pogroms.
"I wouldn't be sitting here if America hadn't opened its arms to refugees," he said.
And while Europe has been rattled by a border crisis over the past three years, Patinkin is most animated by the mention of President Donald Trump.
Does Patinkin believe that he could change the president's mind? Would Trump be swayed if he were to travel to the Greek islands and witnessed the human suffering firsthand?
"I know it would get through to him. I believe it," Patinkin said. "I believe it because Donald Trump is, first and foremost, a human being. And human beings have hearts and compassion and morality and ethics and I believe, at Donald Trump's core, he too has that."
He added that, for all the people he reaches through his activism, "the man I want to get to more than anyone" is Trump.
After challenges by the courts, on Monday the president signed a revised version of an executive order banning people from Iran, Somalia, Sudan, Yemen, Syria and Libya. Iraq was removed from the list.
The president's view appears to be a popular one. In January, a poll by the Pew Research Center found that 46 percent of Americans thought that "a large number of refugees leaving countries such as Iraq and Syria" was a major threat to American security.
Actor Mandy Patinkin and his wife Kathryn Grody listen to Hanife, age 9, second left, and Attife, age 11, at their container in the Kara Tepe camp in Lesbos, Greece, on Feb. 28. The family described a treacherous journey through the mountains of Iran to Turkey, with snow up to their necks. Tara Todras-Whitehill / for the International Rescue Committee
Patinkin has no doubt where the blame for that lies: politicians scaring people to bolster their own support.
"The biggest tool of this fear game is what you're watching with Donald Trump and his administration right at this moment," he said. "He's trying to pay back the people who voted for him. And how did he win their vote?... [he said], 'I'll put up a wall. I'll ban Muslims to make you afraid of them. And I will keep you safe.'"
Patinkin continues to assume Trump's voice, now shouting and pointing across the table: "'I will fix your fear. I will fix you. I will make you safe. You vote for me … even if it's not based on fact or necessity.'"
But while Patinkin is clearly angry about their direction of travel, he is careful not to demonize people who back Trump's agenda.
"I put my feet in their shoes every minute that I possibly can. I have great empathy for them," he said. "If you don't have a job, or healthcare or opportunity for god-knows how many years because the government isn't working for you, you need a change. And if you want that change to be something that's outside of the status quo, you vote for the one available person that was there and that guy's name was Donald Trump. I get it, OK? These are my neighbors, these aren't my enemies, these are my fellow citizens."
His solution?
"We talk. We listen to each other," he said, decelerating his tone from fiery sermon to almost a whisper. "That's one of the big cancers that happening in the world: People don't listen to each other." |
Greek Orthodox Archbishop Theodosios (Atallah) Hanna during a visit with released Palestinian prisoner Ahmad Khalaf in occupied East Jerusalem, 1 January 2014. Saeed Qaq APA images
Israel arrested a prominent Palestinian Christian leader on Saturday during a demonstration in the Hebron area of the occupied West Bank.
Atallah Hanna, activist and Archbishop of the Orthodox Patriarchate at the Church of the Holy Sepulchre in Jerusalem, was detained and interrogated by Israeli occupation forces as dozens of Palestinian and foreign activists had gathered to protest the takeover of a Palestinian church compound by Israeli settlers, according to an Arabic-language report in al-Araby al-Jadeed.
“[Israeli] occupation forces prevented the activists from reaching the building,” Hassan Barajiya, an activist from the National Committee Against the Wall and Settlements, told al-Araby al-Jadeed. “They managed to arrest Archbishop Atallah Hanna, who was close to the soldiers, and take him to the side.”
Archbishop Hanna was subsequently transferred to the Etzion detention center in a nearby Israeli settlement, where he was issued a summons to return for interrogation before eventually being released.
Secret deal
Beit al-Baraka, the church compound where the protest was staged, is situated between the al-Aroub refugee camp and Hebron, a Palestinian city in the southern West Bank.
The compound was secretly purchased three years ago, through a Swedish organization, by Aryeh King, founder of the Israel Land Fund, a right-wing settlement organization that aims to push Palestinians off their land and replace them with Jewish Israelis, according to a recent investigation by the Israeli daily Haaretz.
King, who is known for buying Palestinian homes or properties through proxies, was funded by Irving Moskowitz, an American millionaire with a long history of funding Israeli settlement expansion in the West Bank, especially in East Jerusalem.
In recent months, settler organizations have been preparing the site to house 20 settler families. Establishing an outpost there would, according to Haaretz, “also allow the settlers to spread out from the site” into adjacent lands.
Earlier in June, Israeli occupation forces forcibly prevented a similar march to Beit al-Baraka, assaulting and injuring protestors, according to Ma’an News Agency, and declaring the area a “closed military zone.”
Protest organizer Yousef Abu Maria told Ma’an that Palestinians feared the new settlement would threaten not only the refugee camp, but also a nearby Palestinian college and school. Israel already has plans to build a road for settlers in the area.
Arrested without charges
Archbishop Hanna’s arrest came just days after Israeli occupation forces arrested Daoud al-Ghoul, a Palestinian activist and tour guide from East Jerusalem.
In December 2014, Israel banned al-Ghoul and other local activists from entering Jerusalem for “security reasons” for four months, as reported by The Electronic Intifada at the time.
After relocating to Ramallah, al-Ghoul received another military order informing him that he was also banned from being in the West Bank and had to move to Haifa, a coastal city in northern present-day Israel.
Although al-Ghoul has not been accused of or charged with any crimes, Israeli authorities barred him from international travel until October 2015 and renewed the ban on his ability to visit Jerusalem or the West Bank twice since April.
After being summoned for questioning to the Russian Compound – an Israeli interrogation center in Jerusalem – al-Ghoul was arrested on 25 June.
Prisoners protest
Meanwhile, more than 60 Palestinian administrative detainees – held on “secret evidence” without charge or trial – are boycotting Israeli military courts to protest their detention, according to Addameer, a Ramallah-based group that monitors Israel’s arrests and detentions of Palestinians.
Addameer has documented at least 401 Palestinians presently being held as administrative detainees, including six lawmakers from the Palestinian Legislative Council. Among those is Khalida Jarrar, a prominent left-wing lawmaker who Israel has hit with a dozen charges related to her prisoner solidarity work and activism.
Israel has issued more than 50,000 administrative detention orders against Palestinians since 1967, when its military occupied the West Bank, including East Jerusalem, and the Gaza Strip.
“The Palestinian prisoners’ movement has been fighting against the policy of administrative detention for decades, which includes boycotting military courts and hunger strikes on the individual and collective levels,” Addameer reports in its press release. “Between 2011 and 2015, dozens of administrative detainees launched an open hunger strike against the policy of administrative detention.”
Earlier this week, Palestinian prisoner Khader Adnan ended a 55-day hunger strike against his being held in administrative detention. In exchange for ending the strike, Israel has agreed to release him on 12 July.
“Thank God that my husband is coming back to us victorious,” his wife Randa said at a press conference about her husband’s release. |
Exodus 21:1-24:18
The understanding of the Torah (תּוֹרָ֣ה direction, instruction, law) among many New Testament Christians tends to be relegated only to the Ten Commandments that all of Israel heard blasted like thunder from Mount Sinai in chapter 20 of Exodus. However, the rest of the rules in the subsequent chapters are inextricably linked as God continues to give instructions regarding other matters, such as building an altar and offering sacrifices (20:22-26). The Torah is not limited to ten commandments, but includes all that Yehovah spoke to Moses.
The chapters following the Ten Commandments give instructions on how to treat other people. Even when, due to differences in time, place, and culture, we cannot literally follow the instructions, we should extract the principle meaning and purpose of the instructions and apply them to our own lives as best as we can.
Hebrew slaves worked to pay their debt no more than 6 years at a time. Non-Hebrew slaves did not have this time limit (Ex. 21:2; Deut. 15:12).
Hebrew slaves were freed and returned to their ancestor’s property at the end of every Jubilee cycle (at the end of every 49 years) on the Hebrew calendar. Non-Hebrew slaves did not have this time limit (Lev. 25: 39-40).
Masters must generously give starting capital to the slaves after they are freed (Deut. 15:13-14).
Slave masters sometimes provided a wife and family for the slaves (Ex. 21:4).
Slaves sometimes chose to remain with their masters for a lifetime (Ex. 21:5).
If a master changes his mind about a female slave, he must sell her back to relatives (Ex. 21:8).
If a female slave marries into the master’s family, she must have rights as a daughter (Ex. 21:9).
If the master marries a female slave, she shall have full rights as his wife (Ex. 21:10-11).
Masters should not rule ruthlessly but treat the slaves as hired servants year by year (Lev. 25:43, 52-53).
Female captives of war cannot be married until they have a time of mourning for their families and the man has time to consider the decision. Once married, she has rights as a wife. If divorced, cannot become a slave once again but must go as she pleases (Deut. 21:10-14).
The pivotal event ending Israel as a nation was the destruction of Jerusalem and slavery into Babylon. This was the penalty for Israel mistreating their slaves (Jeremiah 34:8-22). Today, those who have outstanding debt may have their wages garnished or may be imprisoned. Garnishing wages is a similar concept to the debt slavery practiced in ancient Israel. Curiously absent from the Torah is any consideration of a prison system.
The next group of instructions explain in detail how we should treat others. Various punishments ensue after physically harming people. Due to secular government law, the punishments cannot be implemented. God’s people should attempt to obey the instructions as best as they can even though the punishments incurred for disobedience may be different. For example, God protected the rights of the unborn child and required severe punishment to those who caused an unborn child harm, but most governments today allow abortion. God’s people must still oppose abortion even though this action has no legal punishment today.
Intentional injury to others requires a punishment of the same, regardless of social status as a free man or a slave (Ex. 21:12, 20).
Unintentional injury to others requires the guilty person to run away to a city of refuge. (21:13).
Unintentional injury done to an unborn child requires punishment of the same injury (21:22-25). Those doing violence toward or swearing violence toward parents receive the death penalty (21:15, 17). Swearing violence toward the government rulers is forbidden (22:28).
Kidnapping receives the death penalty (21:16).
People can use lethal force to defend themselves and their property from burglars and home intruders, but killing the intruder should be avoided if possible (22:2-3).Injury resulting in loss of work requires worker’s compensation (21:18-19).
Mistreating others is especially abhorrent if they cannot defend themselves, for example a foreigner, an orphan, or a widow (22:21-24).
If proper precautions are not observed when doing field work or other work changing the environment (such as digging a hole), and this causes injury to someone’s animals or other people, then the person is responsible (21:33-34).Animals that cause injury to humans or other animals must be put to death (21:28-29, 35-36).
People should be good neighbors by returning property to them when found or by rescuing their animals (23:4-5)
Masters who permanently injure their slaves must let the slaves go free (21:26-28). Animals known to be violent that cause death to a person must be put to death along with the animals’ owners (21:29).
Stealing from others requires reimbursement and sometimes even paying back more than the value of the items (22:1).
Damaging other people’s property requires reimbursement (22:5-6).
Losing a neighbor’s property results in a stricter punishment if the person has received payment to keep his neighbor’s property safe (22:7-11). If he has been paid to keep it safe, he has to reimburse the value of the lost property. If he was not paid and kept his neighbor’s property as a favor, he makes an oath – swears by Yehovah – that he no longer has the property and doesn’t know where it is.
Damage done to things borrowed from a neighbor results in a stricter if the neighbor has lent it out for free (22:14-15). If the things are damaged while lent to someone, that person must make full reimbursement. If the things are damaged while rented to someone, that person does not have to pay any more fee except for the rental fee.
Lenders should not require high interest from borrowers, especially if they borrower is poor. Lenders trying to collect their loans should not take away from the borrower the basic property needed to live (22:25-27).
Sex outside of marriage requires a wedding and marriage covenant. If no marriage covenant is made, the man must pay a fine to the family of the woman (22:16-17).
Bestiality results in the death penalty (22:19).
Sorcery and other dealings with evil spirits requires the death penalty (22:18).
Sacrificing or worshiping any other god except for Yehovah results in the death penalty (22:20).
We should generously and quickly give our offerings to God (22:29-30).
God gave great detail about maintaining justice in the courtroom by avoiding lies, avoiding partial justice, and having consistent laws even for foreigners (23:1-9). Overall, all of these instructions in this reading passage teach us to be fair and honest with people, regardless of their social status, financial status, gender, or nationality. We should take great strides to understand the purpose of each law and apply the spirit (principle) of the law to our own lives.
An ancient seat of Moses (of authority) from New Testament times, located at the old village of Chorazin
God re-emphasized the importance of the weekly Sabbath (23:10-12), and he introduced three major annual Sabbaths that require traveling to the religious center of Israel. (23:14-19). These three annual Sabbaths are called by different names in Scripture: (1) Passover, called Unleavened Bread (2) Pentecost, called Harvest (3) and Tabernacles, called Ingathering.
Yehovah repeated multiple times to obey all of his instructions. He emphatically stated that when Israel entered the promised land of Canaan, they were to completely obliterate the Canaanites and their religious structures (23:23-33). He gave instructions not to remember or speak about the names of other gods (23:13) or to do what other people do for worshiping other gods (23:19b). God promised them victory over their enemies, blessings, many children, health, and wellness if they obeyed him fully. God promised the borders of Israel would be from the Red Sea in the south to the Mediterranean Sea in the west, to the desert in the north, to the Euphrates in the east.
After giving all of these instructions, warnings, and promises, Moses made a blood covenant with the people of Israel. Moses read all of these laws to the people and sprinkled blood on them, sealing the contract that the people had made with God (24:1-8). Then God invited Moses and the chiefs of Israel to come up Mount Sinai where they saw God in some form (24:9-11). Moses climbed higher into the fiery mountain top and received a set of the Ten Commandments from God to replace the ones that he has broken (24:12-18).
Exodus 21 by Sweet Media
Then he took the book of the covenant and read it in the hearing of the people; and they said, “All that Yehovah has spoken we will do, and we will be obedient!”
So Moses took the blood and sprinkled it on the people, and said, “Behold the blood of the covenant, which Yehovah has made with you in accordance with all these words.”
Like this:
LikeLoading...
Related
About Jonathan Lankford
Jonathan has a Bachelor of Arts degree (BA) in Bible with a concentration in missions and intercultural communication. He also earned his Master's in Business Quality Management (MBQPM) and graduated Summa Cum Laude with a Master's in Education (MEd) focusing on Administration. He has been an educator since 2007, teaching English and humanities in Vietnamese universities. He currently holds the position of Associate Registrar at Tan Tao University, Vietnam. |
[Kallikrein in a double-blind study in idiopathic oligozoospermia].
In a double blind study the effectivity of kallikrein (Padutin 100) was investigated in 90 men with idiopathic oligozoospermia. After oral application of kallikrein (600 Kallikrein units per day) over a period of seven weeks a statistically significant increase of the sperm number and sperm motility was observed compared to the placebo group. The conception rate was 38% in the kallikrein group and 16% in the placebo group. |
men and attitude- vent
Does all men have to have this attitude like doctor Phil says. Cant understand it. If they talk about things, they take it out on us or mine gets hateful or ignored. Mood swings (menopause) aint helping me out right now lol i could cry at the drop of a pin .
Why cant men mean what they say. And just tell it like it was suppose to be, I can handle the problems not the attitude lol
I am sorry miss thrifty. I have been watching Dr. Phil the last couple of days with those "mean" husbands on. My relationship isn't as bad as those seem, but we get into fights over the stupidest things and mine resorts to name calling and yelling sometimes. He knows how it makes me feel, but he still does it! I have been trying to ignore my fiance's "bad" moods and I won't play into his arguing, that way it doesn't escalate into a fight. I realize that I can only control my own actions, but it's hard when the other person trys to make their problem yours.
I know my husbnad bottles alot inside. But most do i guess. Just that I wish hed stop being so hateful at times. He's not a control freak or tries to tell me what i can do or not do. Hes not one of those men on tv. God no!!
Just venting because I wish we were more like friends lately and let me in. u know what I mean ?
I do! I have that problem with my grown son. He evn told me once that he "has to" yell at me because I'm the only one he "can" yell at. I told him that trusting someone not to bail on him if he yells doesn't make it fair to that person, and that it is very harmful to someone you care for to yell at them when they aren't really the problem. He's gotten a little better.
I don't believe that all men are like that. My dh and I have our hard times, but nothing that we can't work out. I can tell you and if my dh yelled at me or called me names, that would be a hugh issuse with me. I know that alot of men keep things bottles up, but relationships take alot of work..and it's hard work. My dh isn't perfect by any means and I am sure that I am not a peach to live with at times, but if you are committed to your relationship communication is the key to a good healthy relationship. Sometimes it just takes a while to learn your partners moods. I know when to approach my dh and when not to. It is all just a learning process about each other. We have been together for 18 years and sometimes I feel like I know this man like the back of my hand and other times I feel like he is a stranger to me. But finding out about each other is just part of the journey. But please do not tolerate someone yelling at you or calling you names. Be sure to stand up for yourself and tell your partner that you are not willing to put up with that kind of behavior...JMO....Blessings..kathy
Hmmmmmm.....my huband came home from a hockey game last night and bitched about the house being a mess and supper not being good enough. I'm never home and it shows. I don't take to that kind of critisism very kindly to say the least. I slept on the couch while he sprawled out on the nice comfy bed. We're still not speaking to eachother. Although he definitely got what he wanted......the house it clean and supper was fantastic! What a jerk. Sorry I can't give you any good advice........
Today was better. We chatted and I walked away out the door. He knew I was mad. He appologized when I came back. he knows better just thinks he can get away being crappy on me. If all the women was all pms at the same time, what would all the men do in the world? poor things. lol lol
My Dh makes so..mad sometimes. This is one of those sometimes. He is terrible at productive communicating. He will do what I call "hit and run." He can say nasty things, then shuts down. Then he will act like nothing ever happened, while I am still thinking about his words. Dr. Phil says, it takes something like 20 nice things said to make up for the one mean thing said. I believe that.
Being criticised in this house would result in no acknowlegment at all of his bad mood, nothing would be done to change said mood, ie, nothing special done in the housekeeping arena and I would not be sleeping on the couch. Dinner would be whatever I had planned on cooking. My evening would go on as if he were in a good mood.
I no longer participate in dh's bad moods and it has changed our relationship alot. My well being and my self esteem are not tied to his decision to be moody. I'm to old for it!
Being criticised in this house would result in no acknowlegment at all of his bad mood, nothing would be done to change said mood, ie, nothing special done in the housekeeping arena and I would not be sleeping on the couch. Dinner would be whatever I had planned on cooking. My evening would go on as if he were in a good mood.
I no longer participate in dh's bad moods and it has changed our relationship alot. My well being and my self esteem are not tied to his decision to be moody. I'm to old for it!
I applaud your self control. I strive for that, and succeed much of the time, but it feels kind of like the saying about alcoholics - there is no cure, you will always be working on it!
Edna, it is hard but we've been through couple's counseling and I went by myself, in fact I'm doing a "checkup" over the next couple of weeks. I learned 15 years ago what I needed to do to keep from hurting him Dh goes to Celebrate Recovery and actually runs the program now and is doing so good. I figure with marriage you're always going to be workin' on somthing. I found out the only person I could change was me and that's what I've been doing! |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.