text
stringlengths
8
5.77M
Bitcoin Prediction Markets fairshift.io swaps from and to BTC through ETH, DASH, LTC, and BCH. Currently Fairlay doesn’t charge any fee for using the Shift Exchange service, except for the transaction charges paid to the blockchain miners and the spread between ask and bid orders, which is normally between 0.1–0.5%. This makes the Shift Exchange the cheapest service provider compared to other exchange services and doesn't require any registration.
The migration of fines involves the movement of fine clay and/or non-clay particles (e.g. quartz, amorphous silica, feldspars, zeolites, carbonates, salts and micas) or similar materials within a subterranean reservoir formation due to drag and other forces during production of hydrocarbons or water. Fines migration may result from an unconsolidated or inherently unstable formation, or from the use of an incompatible treatment fluid that liberates fine particles. Fines migration may cause the very small particles suspended in the produced fluid to bridge the pore throats near the wellbore, thereby reducing well productivity. Damage created by fines is typically located within a radius of about 3 to 5 feet (about 1 to 2 meters) of the wellbore, and may occur in gravel-pack completions and other operations. Fines migration is a complex phenomenon governed largely by mineralogy, permeability, salinity and pH changes, as well as drag forces created by flow velocity, turbulence and fluid viscosity, as described in detail in J. Hibbeler, et al., “An Integrated Long-Term Solution for Migratory Fines Damage,” SPE 81017, SPE Latin American and Caribbean Petroleum Engineering Conference, Port-of-Spain, Trinidad, West Indies, 27-30 Apr. 2003, incorporated herein by reference in its entirety. The authors note that mobilization of fines can severely damage a well's productivity, and that fines damage is a multi-parameter, complex issue that may be due to one or more of the following downhole phenomena: (1) high flow rates, particularly abrupt changes to flow rates; (2) wettability effects, (3) ion exchange; (4) two-phase flow, particularly due to turbulence that destabilizes fines in the near-wellbore region; and (5) acidizing treatments of the wrong type or volume which can cause fines. J. Hibbeler, et al. note that fines, especially clays, tend to flow depending on their wettability, and since fines are typically water-wet, the introduction of water may trigger fines migration. However, they note that clay particles may become oil-wet or partially oil-wet, due to an outside influence, and thus the fines and clay particles may become attracted to and immersed in the oil phase. The authors also note that all clays have an overall negative charge and that during salinity decrease, pH increases in-situ due to ion exchange. A pH increase may also be induced via an injected fluid. As pH increases, surface potential of fines increases until de-flocculation and detachment occurs, aggravating fines migration. Fines fixation has become troublesome during oil and gas production and during many oil and gas recovery operations, such as acidizing, fracturing, gravel packing, and secondary and tertiary recovery procedures. Hydraulic fracturing is a method of using pump rate and hydraulic pressure to fracture or crack a subterranean formation. Once the crack or cracks are made, high permeability proppant, relative to the formation permeability, is pumped into the fracture to prop open the crack. When the applied pump rates and pressures are reduced or removed from the formation, the crack or fracture cannot close or heal completely because the high permeability proppant keeps the crack open. The propped crack or fracture provides a high permeability path connecting the producing wellbore to a larger formation area to enhance the production of hydrocarbons. Gravel packing is a sand-control method employed to prevent the production of formation sand. In gravel pack operations, a steel screen is placed in the wellbore and the surrounding annulus packed with a gravel of a specific size designed to prevent the passage of formation sand. The goal is to stabilize the formation while causing minimal impairment to well productivity. Operations combining fracturing and gravel packing are termed “frac packs”. It would be desirable if methods and/or compositions would be devised to help fix or stabilize fines within a subterranean formation so that their migration is reduced, inhibited or eliminated.
Trypanosoma evansi in dromedary camel: with a case report of zoonosis in greater Cairo, Egypt. Trypanosoma evansi (Steel, 1885) Balbiani, is the cause of trypanosomiasis (Surra) which multiples in the blood and body fluids. The incubation period varies from 7-15 days. The mortality rate was up to 20% and fatality rate may reach up to 100% in untreated camels. Three hundred randomly selected camels were 200 males 4-6 years old and 100 females 10-15 years. They were examined clinically and diagnosed by Giemsa stained blood smear, anti- trypanosomiasis-antibodies by ELISA and urine Thymol turbidity test for natural infection with T. evani (Surra). The results showed that camels were naturally infected with T. evansi as indicated by stained blood film examination and/or ELISA. Infection in males was 6.0% (stained blood smears), 8.0% (ELISA) and 5.0% (urine thymol turbidity test). In females the infection rate was 9.0%, 24.0% and 12% respectively. By correlation with suggestive clinical manifestations, ELISA proved to be more sensitive and specific (13.3%) than stained blood films (10.0%) and urine Thymol turbidity test (7.3%). Regarding humans, one out of 30 was positive as indicated by ELISA and stained blood smear but was negative by urine thymol turbidity test. The human case was successfully treated as indicated clinically, parasitologically and serologically. This is the first reported Egyptian human case of trypanosomiasis evansi, a neglected zoonosis.
msgid "" msgstr "" "Project-Id-Version: \n" "Last-Translator: INAGAKI Hiroshi <musashino.open@gmail.com>\n" "Language-Team: none\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Plural-Forms: nplurals=2; plural=(n != 1);\n" "POT-Creation-Date: \n" "PO-Revision-Date: \n" "Language: en\n" "X-Generator: Poedit 1.8.11\n" #: applications/luci-app-commands/luasrc/model/cbi/commands.lua:16 msgid "A short textual description of the configured command" msgstr "A short textual description of the configured command" #: applications/luci-app-commands/luasrc/model/cbi/commands.lua:25 msgid "" "Allow executing the command and downloading its output without prior " "authentication" msgstr "" "Allow executing the command and downloading its output without prior " "authentication" #: applications/luci-app-commands/luasrc/model/cbi/commands.lua:22 msgid "Allow the user to provide additional command line arguments" msgstr "Allow the user to provide additional command line arguments" #: applications/luci-app-commands/luasrc/view/commands.htm:156 msgid "Arguments:" msgstr "Arguments:" #: applications/luci-app-commands/luasrc/view/commands.htm:66 msgid "Binary data not displayed, download instead." msgstr "Binary data not displayed, download instead." #: applications/luci-app-commands/luasrc/view/commands.htm:71 msgid "Code:" msgstr "Code:" #: applications/luci-app-commands/luasrc/view/commands.htm:176 msgid "Collecting data..." msgstr "Collecting data..." #: applications/luci-app-commands/luasrc/model/cbi/commands.lua:18 msgid "Command" msgstr "Command" #: applications/luci-app-commands/luasrc/view/commands_public.htm:30 msgid "Command executed successfully." msgstr "Command executed successfully." #: applications/luci-app-commands/luasrc/view/commands_public.htm:32 msgid "Command exited with status code" msgstr "Command exited with status code" #: applications/luci-app-commands/luasrc/view/commands.htm:73 msgid "Command failed" msgstr "Command failed" #: applications/luci-app-commands/luasrc/model/cbi/commands.lua:19 msgid "Command line to execute" msgstr "Command line to execute" #: applications/luci-app-commands/luasrc/view/commands.htm:73 msgid "Command successful" msgstr "Command successful" #: applications/luci-app-commands/luasrc/view/commands.htm:154 msgid "Command:" msgstr "Command:" #: applications/luci-app-commands/luasrc/controller/commands.lua:9 msgid "Configure" msgstr "Configure" #: applications/luci-app-commands/luasrc/controller/commands.lua:7 #: applications/luci-app-commands/luasrc/model/cbi/commands.lua:6 #: applications/luci-app-commands/luasrc/view/commands.htm:138 msgid "Custom Commands" msgstr "Custom Commands" #: applications/luci-app-commands/luasrc/model/cbi/commands.lua:21 msgid "Custom arguments" msgstr "Custom arguments" #: applications/luci-app-commands/luasrc/controller/commands.lua:8 msgid "Dashboard" msgstr "Dashboard" #: applications/luci-app-commands/luasrc/model/cbi/commands.lua:15 msgid "Description" msgstr "Description" #: applications/luci-app-commands/luasrc/view/commands.htm:160 msgid "Download" msgstr "Download" #: applications/luci-app-commands/luasrc/view/commands.htm:119 msgid "Download execution result" msgstr "Download execution result" #: applications/luci-app-commands/luasrc/view/commands.htm:79 msgid "Failed to execute command!" msgstr "Failed to execute command!" #: applications/luci-app-commands/root/usr/share/rpcd/acl.d/luci-app-commands.json:3 msgid "Grant UCI access for luci-app-commands" msgstr "" #: applications/luci-app-commands/luasrc/view/commands.htm:162 msgid "Link" msgstr "Link" #: applications/luci-app-commands/luasrc/view/commands.htm:53 msgid "Loading" msgstr "Loading" #: applications/luci-app-commands/luasrc/view/commands.htm:119 msgid "Or display result" msgstr "Or display result" #: applications/luci-app-commands/luasrc/model/cbi/commands.lua:24 msgid "Public access" msgstr "Public access" #: applications/luci-app-commands/luasrc/view/commands.htm:159 msgid "Run" msgstr "Run" #: applications/luci-app-commands/luasrc/view/commands_public.htm:41 msgid "Standard Error" msgstr "Standard Error" #: applications/luci-app-commands/luasrc/view/commands_public.htm:36 msgid "Standard Output" msgstr "Standard Output" #: applications/luci-app-commands/luasrc/model/cbi/commands.lua:7 msgid "" "This page allows you to configure custom shell commands which can be easily " "invoked from the web interface." msgstr "" "This page allows you to configure custom shell commands which can be easily " "invoked from the web interface." #: applications/luci-app-commands/luasrc/view/commands.htm:144 msgid "This section contains no values yet" msgstr "" #: applications/luci-app-commands/luasrc/view/commands.htm:54 msgid "Waiting for command to complete..." msgstr "Waiting for command to complete..." #~ msgid "Command exited with status code " #~ msgstr "Command exited with status code "
Pages BONY Battle Of New York Monday, February 4, 2008 The real Rangers? Or well timed mirage? Updated: Dane Byers has been recalled from Hartford. Shanahan is out tomorrow, meaning Byers will play on the fourth line. Hollweg's suspension was a formality, as two game misconducts means and automatic suspension now. Valiquette also will not be starting tomorrow. Basically, half of this post is inaccurate now. Thanks Tom Renney. Are these the real New York Rangers that we have had the pleasure of watching the last three game? A Rangers team that outplays Philadelphia, New Jersey and comes back from three goals down en route to scoring five unanswered goals is something that has been a rarity to see this season. Is it the real deal? Or are we in for a major let down tomorrow night against the Los Angeles Kings? I don't have the answer to those questions, but I do know a few other things. -- Ryan Hollweg was suspended for tomorrow night's game, as expected by everyone, including myself. As an advocate for clean play, I support the call. He was pissed, took another player into the boards dangerously and now gets to feel the consequences. As a player that toes the line between clean and dangerous, he can sometimes cross it. He needs to play with that fire still, no doubt about it, just make sure it's clean. -- Hollweg being out means that Ryan Callahan definitely sticks around for another game. Brendan Shanahan has never been one to sit out much, so he'll most likely be back as long as he is physically able to. Callahan looked good, but not great last night and I'd like to see him back in there for some time. -- Stephen Valiquette might get the nod tomorrow between the pipes. Makes sense, as the Rangers play a little tighter with him in net and it's a mediocre Kings team. Extra days off to keep Henrik Lundqvist healthy down the stretch isn't a bad thing either. -- Congratulations to Chris Drury, who was named the NHL's third star of the week. Hopefully he continues his resurgent play. The Rangers are back home tomorrow at 7. I'll check in again before then.
India unblocks The Pirate Bay and other sharing sites Web users in India are once again able to access video and file-sharing sites, including The Pirate Bay. The country's Madras High Court has changed its earlier censorship order which centred on the issue of internet copyright. The original ruling made Indian internet service providers (ISPs) block access to entire sites to prevent a single film from being shared online. The new order was issued following an appeal filed by a consortium of ISPs. It states that only specific web addresses - URLs - carrying the pirated content should be blocked, but not the entire website. "The order of interim injunction dated 25/04/2012 is hereby clarified that the interim injunction is granted only in respect of a particular URL where the infringing movie is kept and not in respect of the entire website," reads the updated decision. "Further, the applicant is directed to inform about the particulars of URL where the interim movie is kept within 48 hours." Hacking attacks In late March, Chennai-based Copyrightlabs, an Indian anti-piracy firm, won a court order that made Indian ISPs and phone firms stop their customers reaching websites that were illegally sharing copies of certain Bollywood films. TheAshok Kumar order- similar to a "John Doe" order in the United States and designed to protect the copyright of music, films and other content - allowed copyright holders to request a website be taken down to prevent users from downloading content illegally. The ruling led to a series of cyber-attacks by the hacker group Anonymous, which targeted a number of Indian websites, including those for government departments and India's Supreme Court. Anonymous said the attacks were carried out in retaliation against blocks imposed on video and file-sharing sites. The internet hacking group then staged numerous protests against "internet censorship" in India.
"UNDER THE SIGN OF CAPRICORN" "My name is Morgana Dias Dos Santos Bantam." "If you like, you can add "from Saint Salvador de Bahia"." "It's not easy to draw Corto's natal chart." "He was born on 10th July;" "nevertheless Golden Mouth, the great voodoo priestess, told me as follows:" "since astrology has been the same for two thousand years while the polar axis shifted," "I can also make my calculations as if Corto was born a month earlier, in June, in which case he'd be a Gemini." "What's Corto looking for, here?" "A woman?" "A treasure?" "According to his friend Jeremiah Steiner, of the University of Prague, who's always precise, even when he's drunk, between 1916 and 1917 Corto stayed between the Caribbean and North America." "Stayed..." "That's not the proper word:" "actually he kept moving around the islands." "At first Corto went to Paramaribo, then to Saint-Laurent-du-Maroni and he finally came here, in Saint Salvador, Brazil." "In the Sertão, Corto met Golden Mouth." "The "cangaceiros" will never forget Corto." "Then Corto went to the island of Marajo, near the Amazon rainforest." "That isn't strange:" "his zodiac sign animals are the flying-fish, the monkey and the parrot." "Then Corto went to Saint Kitts, in the Antilles, north of Guadeloupe." "If you believe the cards, you can't tell off a Gemini:" "they'll answer with a smile, an ambiguous and sad smile like that of a clown." "Was Corto's smile like that?" "Geminis are truly complicated, above all when they were born in july." "Golden Mouth has to know Corto's secret but she won't speak, she'll stay quiet and keep smoking her cigarette." "Steiner, who stares at his glass of rum, doesn't think men should try to understand the ways of destiny." "Destiny knows its own ways." "And he told me: "To understand Corto, just look at the fortune line he cut on the palm of his own hand with a razor"." "Steiner is right..." "However Corto hates to show others that line." "Get out!" "And never come back!" "Forgive me..." "I apologize..." "You too, gentleman, I beg your pardon." "What's wrong?" "You don't feel well?" "No, I stopped feeling well a long time ago." "And, unfortunately, you can do nothing about it." "I never said I wanted to." "That's a polite way to tell me to go to hell..." "I'll take your advice." "Goodbye commander." "You know, Jeremiah hasn't always been like that." "Professor Jeremiah Steiner was well-known, once." "Professor?" "Yes." "He wrote important things which are still read by scholars." "But he no longer pays, so you have him kicked out." "You're always ready to judge others, Corto Maltese." "I have a lot of respect for Steiner." "I respect those who are thirsty for knowledge..." "You respect those who are thirsty, but prevent them from drinking." "You're complicated, Java." "I'll go have a look at my boat." "Sir..." "Sir!" "Excuse me sir, do you know Madam Java's guesthouse?" "Yes I do." "It'd be easier for you to ask for what you really want." "Java's guesthouse is that big house down there, the one with the porch." " Thank you, sir." " Not at all." "Apologise, or I'll rip your moustache and make you swallow it!" "Never!" "Oh well..." "Then you want to die, Steiner?" "Let go of him." "And you, what do you want?" "Only cowards beat up old men." "Really?" "I'm more wicked than you, Toad Eye." "Why did you do it?" "Should I explain it?" "You're the scientist..." "Alright, you're a frustrated boy scout." "I am." "But I regret it." "See you." "Wait!" "I haven't even thanked you!" "Better late that never." "Now, if you please, I'll go have a look at my boat." "A boat?" "Wait, I'm going with you!" "You have a strange look." "As if you wanted to read people's minds." "Why are you in Paramaribo, Steiner?" "What do you like here?" "The rum..." "I like the rum..." "And then, every place is the same." "I'm tired of moving around." "I'm..." "I'm tired." "What are you doing in the dark, Java?" "I was waiting for you." "I want you to meet someone." "I told him you'll listen to him." "Tristan is the son of Ronald Bantam... whom you know, I think." "We met a long time ago." "Good evening commander." "Tristan needs help." "It's a complicated story." "My father died three months ago, he left me a quota of his Company, the Financial Atlantic's." "My tutor, lawyer Milner from London, wants my quota." "I know nothing about finance," "I'd be glad to get rid of my quota, but..." "Go ahead..." "Strange things happen to me." "I'm not surprised." "Your father was a strange man." "I..." "I dream." "I see things... and hear voices." "Some are louder than others." "The loudest of all is Ogoun Ferraille's voice." "He formally advised me not to sell my quota." "And he asked... ordered me..." "to come here, to Paramaribo." "Ogoun Ferraille?" "You know that gentleman?" "Ogoun Ferraille is not a gentleman, he's a voodoo god, one of the most powerful." "To try and understand things is good, but your tutor isn't wrong," " it's a lot of money..." " Excuse me..." "This woman wants to see you, Tristan." "She says it's important." "See me?" "But..." "I don't know anybody here." "Ogoun Ferraille sent this message for you, through the big voodoo." "Ogoun Ferraille..." "That's impossible!" "What you told me is true, Tristan." "You have been called." "The text says: "You'll be turned into energy." "Your second life starts from now." "Signed:" "Golden Mouth"." "Golden Mouth is a big devil, she speaks through her mind, the brothers of Paramaribo can sense her." "It's a handy system." "Wait!" "I sense danger close by." "It comes from far, from London. it..." "The danger is here!" "I'm sorry, Tristan." "That bullet was meant for me." "No." "Golden Mouth says the danger was for Tristan." "She also says: "Come at once!"" "You too have been called, Corto Maltese." "And it's not the first time." " Is he still alive?" " Not for long." "You're fast, with the dagger." "What else should I do?" "It's over, Toad Eye." "I'm sorry, but it is." "Now tell me, did you come for me or the boy?" "You'd like to know, huh?" "Yes, but if you don't want to tell me it's okay." "Do you want a cigar?" "Is the boy dead?" "No, only wounded." "I no longer need the money I was paid to kill him." "Give it to the old man." "It was nothing personal." "I wanted to be his friend, but he didn't." "Who gave you that money?" "You're cunning..." "Make a guess." "He'll say no more." "He won't, but I will." "That jailbird used to work for lawyer Kerster." "Corto!" "Corto Maltese!" "Your boat is on fire!" "Move away!" "Stop, you cannot pass!" "Steiner!" "Steiner!" " Corto!" " I'm here!" "I'm okay, but the professor almost choked." "I saw him, the man who set the boat on fire." "It was the other one." "I tried to prevent him from doing it, but..." "Which other one?" "Toad Eye's friend." "I tried to stop him, but..." "I'm sorry." "It doesn't matter, Steiner." "I don't know how, but they're making me play a game which meant nothing to me only yesterday." " And now what?" " Now we'll see." " Tristan?" " Who is it?" "Who's spoken?" "It's me, Tristan, your shadow." "Here shadows can speak." "But that's crazy!" "Before being your shadow, I belonged to your father, and to Ogoun Ferraille." "I've come from a distant place..." "Don't run away, Tristan." " Help!" " Don't run away!" " How's the wound?" " Which wound?" "That's nothing." "Now he has to face a different battle, and he's all alone." "Good morning, I'd like to speak with Mr. Kerster." "Lawyer Kerster is very busy." "You can speak with me, and make it brief." "I'll say it again, then." "Good morning." "I'd like to speak with..." "What you did was not very polite." "I'm not very polite." "Alright." "You want Kerster?" "I'm lawyer Kerster." "How can I help you?" "Last night a sailor shot a boy." "He missed him, and died instead." "I know that sailor was a friend of yours." "What makes you think I've got such friends?" "The money you gave him to kill the boy." "He had it in his pocket." "Charming... but do tell me, have you ever thought of writing adventure novels?" "You're an idiot, you killed him!" "What's wrong with you?" "There was no evidence against you." "You were threatening him, I thought I had to do it." "He knew all about the plan." "Now tell me what you know." "If I like what I hear, I'll keep the money he gave you to set my boat on fire, and I'll let you go." "I wasn't paid to set your boat on fire," "I wanted revenge for last night's fight." "It's true, Kerster paid Toad Eye to kill the boy... but there's someone else behind him." "Someone more important." "If he's so important, he must have a name..." "I don't know his name." "Kerster had his own business, we didn't care for it." "Very well, then, we'll go to the police." "Milner." "He wants the boy to die." "Milner?" "He's a gentleman from London, a businessman." "I've said everything I know, Corto Maltese." "I swear." "I believe you, I believe you." "Come on, let's go to the police." "You're a bloody liar!" "But of course I'm a liar..." "Let's go." "My father also left me a few letters, but I still couldn't understand much." "I had these documents checked in London." "Some people seemed interested, but then things got complicated." "I was asked for money, too much money." "Those are strange symbols." "I've seen similar inscriptions on a rock on a South Pacific island." "My father copied these during a journey to Brazil, in the region of Xingu." "In his notes he speaks of a mysterious kingdom, ...whose name is Mu." "Mu..." "The lost continent." " No, no, it's too early." " Excuse me?" "To drink..." "It's too early." "I thought it was never too early for you." "Tristan's father's documents are interesting." "Many have looked for Mu, and Northern Xingu is an original guess..." "I'd like to see where it leads." "Even if I you had to leave Paramaribo, the rum, and Mrs. Java's discreet affection?" "If you want, Mr. Steiner," "I'll gladly show you the rest of the documents." "I'm glad to see you standing, Tristan." "I've just bought Mrs. Java's boat." "I want to sail up to Golden Mouth's." "It's a long way..." "It is..." "And to be honest, now that know you," "I don't think I could make it without your help." "Tristan, you don't need to flatter me." "If I'm accepting it's just because it suits me." "Me too, because it suits me." "Here." "Send it to lawyer Milner." "Yesterday's priestess gave it to me." "She has assured me it's a great devil and those who receive it will die in deep pain." "I don't believe it, but I've nothing to lose." "I'll do as you wish, Corto, but I won't touch this horrible thing with my hands." "It's bad, but I thought you had to know." "I don't understand, Mr. Milner was a good friend of my father's." "But it doesn't look like he's a friend of yours..." "I was thinking of the person we're about to see..." "Golden Mouth?" "The woman who cured me, said she's 200 years old!" "That's odd!" " Did your father ever mention her?" " No." "And I find it hard to understand." "What had he got to do with those... wizards?" "What is it, then?" "Come closer." "Don't tell me you fear a poor old woman..." "Oh, that handsome sailor must be Mr. Corto Maltese." "Corto Maltese, the son of the niña of Gibraltar." "Did you know that Ingres made her portrait?" "Oh, yes... yes..." "She was famous, the gipsy of Gibraltar..." "Then one day she left for Malta with a sailor from Cornwall." "Unbelievable..." "It's like watching the family album with an old aunt." "A very old aunt, then." "Shall I tell you about your great-grandfather?" "The one who fought in Queimada, in Northern Brazil?" "I knew him as well." "Queimada?" "But it was 200 years ago..." "You don't look like your age, Golden Mouth." "And you know why?" "I'm always among happy people." "Look, I've even made Tristan smile." "You resemble your sister a lot, my boy." "My sister?" "But I..." "I don't have..." "The world opens before you, Tristan Bantam." "You're less lonely than you think." "You have a sister." "Oh yes... yes... and new friends." "But also a very powerful enemy." "A sister?" "And she..." "Is she here?" "Here?" "Oh, yes, yes." "Here and elsewhere." "We're close, Morgana and I." "Morgana..." "Follow me, Corto Maltese." "To avoid misunderstanding, Corto Maltese," "I'll tell you my proposal is based on moral principles." "My dear Golden Mouth," "I don't believe in principles." "Oh yes..." "They change with the tide, they're like chameleons." "Then let me think of something more stable." "A thousand golden pounds." "How about that?" "A thousand pounds?" "Oh yes, yes..." "It's a lot of money." "but you're going to ask me a lot, too." "Perhaps." "See, I have a friend in the Sertão, of those we call "cangaceiros"." "He's the head of the revolt against a landowner, colonel Gonçalves, who hired mercenaries to kill the rebel farmers." "My friend needs weapons and money." "And you, Corto Maltese, will go up the river San Francisco, and give him what he needs." "And Tristan?" "Oh, Tristan..." "He should stay here." "Oh yes, yes... it would be wiser." "But after all, life in itself is unwise." "Tristan will come with you." "A thousand pounds... it's a nice sum." "I could really accept." "Oh, yes, yes..." "You always try to be clever, Corto Maltese." "It's your defect." "But you're honest, and that's good enough for me." "Women could be my ruin..." "Oh, yes, yes..." "But you're always on guard, aren't you?" "I try, Golden Mouth." "I try." "Good, then we'll load the boat tomorrow morning." "Do you think I can count on you, Tristan Bantam?" "On me?" "But..." "I don't even know what you want me to do..." "But you saw what I showed you." "Yes, I saw it." " Are you afraid?" " Yes, I was afraid, but I also want to know." "And you will know." "Oh yes, when you're ready..." "But this time you'll leave with Corto Maltese." "You'll be my eyes and my voice." "You're naive." "How you can believe that colonel Gonçalves controls a part of the state without the complicity of his government?" "I haven't said that." "Golden Mouth and Gonçalves look after their own interest, the colonel after his own, and I after my own." "That's all." "I may be an old drunk but I don't get why you got involved in this matter." "But don't say it's for money." " Why should I do it, then?" " I'm very disappointed, Corto." "I thought you were better than that." "Listen, I took you with me because I like you, but if you're here to lecture me, you can get off." "I'm not serious enough to give advice, and I'm too serious to take it." "There you are, at last." "But... it's impossible!" "Why?" "You're not just one, you're also all those who have lived, and all those who'll live in the future." "But then... you... who are you?" "I'm you, a reflection of you projected on the past, or on the future... understand?" " Not really." " You're in the kingdom of Mu, Tristan, or in what remains of it." "Look, Tristan!" " Here, Quetzalcoatl..." " Quetzal... who?" "Hurry up, Tristan!" "Mu will soon disappear in a sea of fire." "Hurry!" "Quetzalcoatl..." "I don't understand." "Good morning, Mr. Maltese." "Good morning, Mr. Steiner." "Good morning Mr. Bantam." "I was choking down in the cabin." "The colonel's gunboat." "What's that boat doing on the San Francisco, captain?" "We'll soon find out." "We're sent by the Office against the exploitation of native manpower." "Professor Steiner has to examine colonel Gonçalves's projects." "I wasn't informed." "Señor Gonçalves is not here, he's in Nice or Monte Carlo." "And then a drunk and a sailor with a pierced ear sound false." "Alright then." "Why don't you believe me?" "You're un unlikely captain as well." " Who shot?" " It came from there." "You too, sailor." "Then, stranger?" "You don't understand?" "I understood, but I want to talk to your chief." "Their chief?" "That scum no longer has a chief, I killed him with my hands." "Tristan!" "No!" "What's wrong, Firm Shot?" "Aren't you happy to see some friends?" "Good morning, Golden Mouth." "How are you?" "I'm well." "Oh... yes... yes..." "But tell me, what happened to Sebastian?" "He was killed." "The Saviour was killed." "How did it happened?" "The colonel captured his wife and child." "Sebastian surrendered to have them released." "but you know the colonel, he had them killed." "What a pity..." "Oh... yes... yes... a real pity." "He had the three of them killed." "Listen, Firm Shot..." "I did what I had to do." "The weapons and the money Golden Mouth sent you, are on the boat." "I'll take the weapons, but I no longer need the money." "Without the Saviour the struggle makes no more sense." "Only he could report the colonel's crimes." "Only he?" "A chief who surrenders for his family problems doesn't seem very competent to me." "Stop it." "Don't say that about the Saviour, or I kill you." "To assault the gunboat took courage." "Why did you do it?" "To kill captain Oliveira and avenge the death of the Saviour." "Well, you've killed the hand, but how about the mind?" "That colonel who oppresses the whole region will keep terrorizing you with his pistoleros." "What should I do?" "Take the Saviour's place." "Who, me?" "But I'm a bandit." "Who would follow me?" "I'm almost as feared as the colonel." "Firm Shot, what shall we do with the prisoners?" "Shoot them." "You can only think of gunpowder, can you?" "What would the Saviour do?" "Act like him, and then spread the word that the Saviour is alive again, and is still fighting against the colonel, and you'll see the people will follow you, sooner or later." "The Saviour knew how to talk to the people, he could explain things." "I..." "I'm a man of action." "You're already arguing... good sign." "And then don't worry." "The politicians and the talkers will soon arrive." "Go away." "Firm Shot the Saviour sets you free." "Hey, Firm Shot... since you didn't kill me I want to tell you something." "Oliveira lied." "The colonel is in his property in Queimada, down there, on the San Francisco." "What are you doing?" "I've told you the truth!" "If it's a trap, I swear I'll kill you after torturing you a thousand times." "Come on!" "Let's fight the evil dragon!" "Well done, Corto." "Thanks to you we have a new political leader." "What?" "Firm Shot was already a leader..." "I only care for my pounds." "I've never met anyone more romantic than you!" "I bet that in autumn you sit on a bench all alone and watch the leaves falling." "Next week I'll leave for Bahia." "I have to go and meet our partner in London." "No need to worry, colonel." "the Saviour is dead, and the rebellion will die too." "The government no longer needs to thrust their nose into our business." "Set a price in any case..." "A thousand escudos on the head of Firm Shot." "Once he's dead, our problems will be over." "You can give me the thousand escudos." "I've brought you my head personally." "Firm Shot!" "It's Firm Shot!" "Firm Shot has killed the colonel!" "To arms!" " The gunboat!" "It's captain Oliveira!" " Good timing." "It's all in your hands, stranger..." "If I'm not back in a hour... you're on your own." "We'll meet again down there." "But..." "They'll slaughter us!" "Maybe you need gunpowder, guys?" "Firm Shot!" "Firm Shot!" "It's over." "Then?" "Are you deaf or what?" "I'm sorry, my friends." "I was too late." "You have lost your new leader." "Yes, you won." "For the time being." "Because a new colonel will soon arrive and will try to impose his law." "No doubt..." "But now for every colonel there will be a hundred Firm Shots." "We've learned our lesson, stranger." "What's your name, young fellow?" "Corisco de São Jorge." "Take the hat of Firm Shot, Corisco de São Jorge, and continue the struggle against evil." "Thanks, stranger." "I won't forget you." "Goodbye, Firm Shot..." "At least we'll have proved that even a dark hero whose friends are also dark, can deserve a bright funeral." "You've done a good job in the Sertão." "Corisco de São Jorge has continued the struggle against the slave traders." "Oh, yes... yes..." "With great success..." "That's what they say, oh yes." "Ah, Corto Maltese..." "Why do you always pretend to take no interest in whatever happens around you?" "Your mother, the niña of Gibraltar, was more open..." "Here are your thousand pounds..." "With a little addition to thank you for the help you gave to Firm Shot." "I don't want it." "If Firm Shot is dead it's also my fault." "Send it to the locals down there." "You're so proud!" "You're doing an unselfish deed, but tomorrow you'll regret not taking the money." "Tomorrow I'll probably cry, but today we'll do as I said." "What's wrong, Corto Maltese?" "What?" "You, who can enter people's heads you don't know?" "You're playing a dangerous game with Tristan." "The most important thing is for the Financial Atlantic's to work." "It's what allows me keep on with our struggle... and my people's." "You're using that boy like a tool." "What will you do when his task is over?" "Tristan is white, he doesn't belong to my people." "You're also white, but we're more alike..." "The boat is ready, Corto." "Mr. Steiner is waiting on the dock." "Great..." "I'm going." "You'll stay here." "This woman has to tell you something even if you don't belong to her." "What's happening?" "What's wrong with him?" "See, Tristan..." "Your father left you a quota of the Financial Atlantic's." "That, however, is part of a wider association... an association..." "Oh, yes..." "yes..." "I'm interested in." "And now you know well, how much I worry for my people." "If I had allowed you to sell your quota, you would have let the scorpion in my house and you don't want to let it in, do you Tristan Bantam?" "Holy Heaven, no!" "But..." "Oh yes..." "All this passes through you." "You're pursuing another aim." "You're walking on your father's footsteps." "Ronald Bantam was a man we really loved." "Oh yes, yes..." "His death made us all very sad." "But now I need to know..." "When you find yourself on the Threshold, like him will you draw back, Tristan?" "I don't know." "I don't understand, Golden Mouth..." "I feel enormously responsible, but..." "It's terrible." "Oh yes, yes..." "But I don't understand." "Yet it's simple." "You won't have to draw back, you'll have to cross the Threshold." "And then, you won't get back empty-handed." "Now you'll go to Bahia." "Your sister is waiting in your father's house." "Morgana..." "There you'll also find your enemy." "And there you two will play the final game, each with their own purposes, as it's written." "And you... will you be with me?" "No, not this time." "But Corto Maltese will." "I think you've made a friend, Tristan." "We'll get off here to pick up some fruits and to stretch our legs." "Where exactly are we?" "Near Saint-Laurent-du-Maroni, in French Guyana." "Help!" "Hey you, down there, on the boat!" "Help!" "Take the rifles!" "Follow me!" "Don't shoot, sailor!" "Don't shoot!" "The Indians are right, Frou-Frou went completely crazy." "He killed two young girls from the tribe." "And you?" "Who are you?" "Call me Cayenne..." "I'm a fugitive." "We waited for two Dutch who had to take us to Paramaribo." "But there was a problem." "Wait..." "They're good people." "They won't hurt anybody, if they aren't provoked as Frou-Frou did." "I tried to defend him, but the elderly condemned him." "They help us, they hide us, they give us food, and want nothing in change." "Their chief said one of you has to know." "Tristan Bantam." "Me?" "But what..." "In the fire I read the messages of those who lived before our moon." "We had three moons, during the night." "Two of them were eaten by the earth." "You're linked to the second moon." "The land you're looking for has four ways in, Tristan." "You'll cross the fourth." "He's referring to Mu!" "The most extraordinary thing is he speaks our language." "Don't trust him, he's a cheater." "He must have studied in a missionary school." "That isn't true." "He's from the Caribbean, but he spoke Russian and Arabic with my two prison mates." "When he reads in the fire, strange things happen to him." "Okay, Cayenne." "He's a strange type." "The Fourth Door is in the labyrinth of the questions and answers, in the silence of the languages." "It's the easiest door even if you don't believe it, Corto Maltese." "How do you know who I am?" "I don't know, but I see..." "I see an island in the South Seas, a fake monk and a scar in your hand on the fortune line that you cut with your father's razor because you didn't like the one you had." "I could also tell you of a train full of gold, and of the dark bowels of a mountain where lays..." "Enough, now, it's enough." "If you tell me everything, I'll lose interest in the future." "Fair enough, Corto Maltese." "The fire has already said what it should." "It said to watch Tristan." "For his own good." "What are you going to do, Cayenne?" "Wait for your Dutch friends?" "They aren't my friends anymore." "Unfortunately there's a problem." "Now I'd strangle them with pleasure." "But to do that, I should go to Paramaribo." "We're going to Bahia." "I could take you on board if you don't strangle us." "I should be crazy!" "And I'm not." "At times I'm almost sorry for that... because my life would be easier." "Easier ...and shorter." "Good-bye, my friends." "Thanks a lot." "There's only one way of escaping from the Cayenne, and that's to turn to the Association." "It's expensive, but they take care of everything and those they take care of, are never caught back." "Yet, there was a problem." "Five of us escaped." "The Dutch waited for us as planned..." "A big guy with eyes like a toad, and another guy with a hook for his hand." "They took our money and killed three of us." "I could run away with Frou-Frou." "Toad Eye is dead, Cayenne..." "and Hook is in jail." "This is bad news." "They worked for a lawyer in Paramaribo, Kerster." "Kerster..." "Then it's him I'll kill." "Sorry mate, but Kerster is also dead." "However, in Bahia there's a chance for you to find one of the heads of the Association, a certain Milner..." "He's behind everything." "Tell me about this Milner, Corto." "I hate to kill someone I don't know." "He paid Toad Eye to kill Tristan." "He hopes he can lay his hands on a quota of a company the boy and his sister own, and apparently, he's the one who helps the prisoners escape." "Well, Tristan, we're on the same boat, then." "It's unbelievable!" "We all seem part of the same club." "A literary club, I'd say..." "There..." "That has to be Morgana's place." "Looks like she's waiting for you." "Tristan!" "What a handsome boy!" " How pale he is!" "Come in." " But..." "Come." "My sister is black?" "Don't talk nonsense, she's beautiful." "Great mother of God!" "They're two drops of water!" "Welcome, Tristan." "Morgana!" "I'm sorry, I..." "I don't..." "Don't apologise, Tristan." "It's so important for us to have you here." "Our father lives back in you." "Ogoun Ferraille will soon be with us again." "Here are commander Corto Maltese and professor Steiner, who's helped me decipher the documents which my our father left us." "Miss Bantam, to me you were a mystery for a long time, an enchanting mystery." "You'll be comfortable here." "My room is nearby." "Those are the documents our father gave me before going back to London." "Mu..." "If you know how to look, you'll find what you're looking for." "He wrote he felt a presence around him for many nights." "I've also felt... things... and I've hade some strange dreams." "See you later, dear Tristan." "I don't understand." "I spent more than a week on every Arcanum." "Time and good will are not enough to read the tarots, Morgana." "It takes natural predisposition." "In the last three weeks the sign of the Scorpio appeared seven times in Three Devils' game, and Cancer and Gemini as well." "Do you know what these three signs are doing together?" "You're a Gemini, your brother is an Aquarius, therefore you two have nothing to do with it." "And then, there should be another Gemini..." "Come on, my child, Geminis can sometimes be together, above all if it's for a short time." "Did you know your father's enemy was in Bahia?" "He's staying at the 'Barra'." "Golden Mouth told me that." "The Financial Atlantic's is giving him a hard time." "I guess he's busy." "Let's go see him, and let's put an end to it!" "Morgana..." "You haven't learnt what I and Golden Mouth have taught you..." "Destiny must follow its natural course." "Sometimes a chain made with flowers is more difficult to break than a chain made of steel." "Who's watching him?" "The Capoeiras of Chamé Chamé, and then..." "Look, they're finally moving." "Quetzalcoatl!" "Your father looked for our world for a long time... and he almost found us with the help of magic." "But look..." "Father!" "He was killed before crossing the Threshold." "My father... has been murdered?" "Yes, and now his murderer is your enemy." "You're here to continue your father's work." "Now I'll give you the means to stay in touch with our world." "That way, we'll live in you." "Tezcatlipoca!" "Brother!" "You have been chosen to establish the link between our dimension and the one of the future." "Follow Tristan Bantam on his way back." "Feathered Snake, brother... to return to his world, Tristan Bantam must be sacrificed." "No!" "Nooo!" "I don't want to die!" "No!" "My God!" "Then Tristan?" "You're still having nightmares?" "I came to Bahia to see your chocolate sister whose existence you ignored." "John Milner!" "Don't say those things about her!" "Ah, Tristan, Tristan..." "You sent a killer for me, you killed my father!" "You're a traitor, a traitor and a murderer!" "That's your point of view." "The truth is I'm a businessman." "If you had been less curious, you'd have let me administer your inheritance, but now that you know all" "I'm forced to kill both you and your sister." "But why?" "You were a friend of my father's!" "Friendship exists until it's over." "I'm a man... whose habits are expensive." "I'm always in need of money." "I can show you my contempt only with a slap, but if Corto Maltese were here, he..." "Corto Maltese?" "The guy who sent me the pinned puppet?" "You know, the offices and the house of London went up in flames after I received it." "I'd like to meet your friend alive." " Satisfied, lawyer?" " Where have you come from?" "The entrance is guarded, how did you get in here?" "I didn't get in, I was already inside." "It's impossible, we searched every corner!" "Where were you hidden?" "You're curious." "That's an indiscreet question." "Spare me your sarcasm, stage hero!" "I don't want to be a hero, to be a throat-cutter is enough for me." "Do you carry any money?" " Yes..." " Great." "Tristan!" "Tell Cayenne our friend Milner is here." "Oh, you're having fun without us..." "That's not nice at all." "I tried to stop the lawyer, Corto." "but his men locked me up with the women." "I see." "These two romantic witches were caught." "Am I wrong, or you're on the way out as diviners?" "Golden Mouth's cards say no one should force destiny." "According to them the jack of spades, sign of the interfering Gemini," " will get rid of the king of diamonds..." " Thanks, I trust you." "If Golden Mouth's cards say that..." "In the meantime we'll play a game." "I'm sure you like playing cards." "Not at all..." "At least not with you." "You're wrong, because the result of the game concerns you." "If you win, I'll give you paper and ink, then you'll sign a confession and I'll let you go." "If you lose, you'll end up in the ocean, in an iron box." "Oh, I forgot, lawyer:" "I'm a cheater." "I'm telling you now, so you don't complain later." "I won't, Corto Maltese." "You've lost, I have a royal flush." "That's amazing!" "But I win with my five aces." "That cannot be!" "There are only four aces in a deck!" "In fact, that's never happened to me before." "Am I too early, Corto Maltese?" "No, perfect timing." "So, I've just won the life of lawyer Milner." "Stop it..." "I've got money." "I can..." "Look at him, Cayenne..." "Tonight I'm thinking of your friends who died because of him, and I want to be generous." "Yes, I'll give you this lawyer." "That's a magnificent present, Corto." "I'll unwrap it on my birthday, on 18th June." "18th June!" "But then, you're the interfering Gemini!" "The jack of spades who had to get rid of the king of diamonds!" "Miss..." "I don't understand what you're saying, but I'll leave with my present before the dawn." "Are you sure you can make it on your own?" "No one's out there." "Listen!" "The wind says it's for Tristan." "The skull of Tezcatlipoca!" "But am I..." "Am I still dreaming?" "No, Tristan." "You've just waken up." "Here." "Here, he came for you." "What had to be done, was done." "Between the world your father built and the one he wanted to save from destruction, there's now a bridge." "The partition was made, my children." "Golden Mouth!" "I owe you everything!" "What are you saying, Morgana?" "I'm so happy to see you." "Meeting your brother must have been wonderful..." "Everything went well, I see." "Good morning, madam." "Corto Maltese saved the Financial Atlantic's..." "Thanks to him Mr. Steiner has started writing again, and Tristan has finally become what he was meant to be." "That's what everybody's saying, however it's strange, because I've remained the same." "That proves you've become very wise, Tristan Bantam." "Good morning, Corto Maltese." "Good morning, Golden Mouth." "Good morning and goodbye." "Here is everything you need, Corto Maltese, but you're as blind as a mole." "Maybe, Golden Mouth, but it's my problem." "Oh, yes... yes..." "Here will always be your home." "Don't get back when you're too old..." "what you're looking for doesn't exist." "And how do you know?" "By personal experience." "Goodbye, dark eyes." "I already miss you, Tristan." "I'll never forget you." "Neither will I." "Ever." "Here professor." "This amulet will bring you good luck." "It's the sign of Solomon!" "It was first seen in Jerusalem in the 15th century." "It's exciting to find it here." "Exciting and mysterious..." "Tell me, Steiner..." "Have I ever told you about the four aces of whalebone?" "The four aces of whalebone?" "Whalebone, yes." "Put together, they lead to..." "Let me guess..." "A treasure, right?" " A treasure?" " And how do you know?" "It's simple." "Two days ago I was in the Café with Cleopatra's mummy, and..." "There you go..." "You're making fun of us." "Excuse me?" "You can all talk with the spirits... but me?" "He's one of my ancestors, a man of fortune." "He was famous over these seas." "I know his reputation." "Ambiguité de Poincy." "Sorry for making you wait." "What did you want to meet me for?" "The four aces of whalebone." "The four aces... it's an old story told by the sailors." "And aren't we old sailors?" "Mine shows the position of the island." "It was given to me by a smuggler in Shanghai just before he died." "The last time I heard of them, the ace of clubs was in St. Petersburg." "Now that you've seen mine, I'd appreciate seeing yours." "It's the ace of diamonds." "After the death of my ancestor, it's never left my family." "Ten feet to the left..." "Is that all?" "That's no big deal." "The ace of hearts could tell us more." "The ace of hearts..." "I've seen it once on an island of the South Seas in the hands of an old friend, a monk I lost contact with." "A monk?" "How strange..." "Maybe he lost it, since now the ace of hearts is here in Paramaribo, in the hands of the most blasphemous of men." "Here?" "And how do you know?" "How did you know I had the ace of diamonds?" "Hey, on the boat!" "I'm Ambiguité de Poincy, and this gentleman here is commander Corto Maltese." "We'd like to see the captain, can we get on?" "But of course, Miss de Poincy." "The captain is on board." "Are you coming, or did you change your mind?" "But what a coincidence, to always find you in my way." "I guess it's my destiny." "I could kill you, or leave you with a little souvenir," "I could cut your nose, for example, or make you blind..." "You're scared, huh?" "But unfortunately you saved my life." "I've done better things." "It still matters to me." "I didn't forget." " My knife." " Your friend is beautiful." "Don't get me started, Corto." "She owns an ace, and therefore she can participate in the hunt." "Don't forget that we should all respect the rules of the C.B." "The C.B.?" "What's that?" "But the Cheerful Brotherhood, idiot!" "You still don't get it?" "Alright, don't get angry." "I've understood." "Will you just stop it?" "You look like two lovers." "Actually you've understood nothing." "In Cayman-Brac, two months ago, all the men of fortune signed a treaty, and since you weren't there, I signed in your place." "Then?" "What do you say, are we partners?" "The ace of clubs shows the position of the island." "On the ace of diamonds is written: "Ten feet to the left", and on the ace of hearts..." ""From the dead tree you'll see the wreck"." "Do you think we'll find the treasure without the ace of spades?" "Frankly, we could also do without your ace of diamonds, Ambiguité." "Ten feet to the left..." "The left of what?" "Don't squeeze your brains." "I'll even walk ten thousand feet, now that I know where the wreck is." "In fact, my map is the most important." "Of course, mine doesn't count... it only shows the position of the island." "Ah, Corto, my friend!" "Do you realise what we could do with all that Spanish gold?" "We'll start a nice shipping company, you and I, like in the good old times!" "Wait a moment, part of that society belongs to me!" "Quiet, girl!" "You're not allowed in my dreams without being invited!" "Are you awake now, or still dreaming?" "You're crazy!" "My cheek!" "He didn't have to be very pretty, not even without that spyglass in his skull." "What do you see?" "The dead tree... but ten feet to the left of the tree there's the sea." "What a pity we don't have the ace of spades." "He reminds me of someone..." "with such high cheekbones..." "He could be an ancestor of yours, Ambiguité..." "You're right." "He seems Barracuda-touches-all." "Who did that to you, granny?" "Come on, tell me..." "Who's that fool?" "Don't touch me!" "Let go of me!" "Let go of me!" "I want to kill him!" "But of course..." "Kill me if you want, so I won't show you the coral ship." "The coral ship?" "What do you mean?" "Leave him alone, Rasputin, he's a madman." "Me mad?" "Ah, poor idiots!" "Followed me and you'll see." " Here it is." " What?" "Now we have to wait." "To wait?" "I'll kill him, to pass the time." "Stop it, Rasputin." "Oh..." "look!" "It's the coral ship..." "But of course!" "The vertical rock is the base of the mainmast." "Then that's the wreck!" "Yes, it rests under two centuries of coral, ten feet from the dead tree." "You can understand, now, why I can't lower my guard... but I must confess I'm tired now." "Terribly tired..." "That's enough!" "Down there is my gold, therefore let's hurry before the tide rises!" "Our gold, Rasputin." "Our gold." "But tell me, how are you going to retreive it?" "Will you scratch the coral away?" "We need dynamite." "There's some on the boat." "Either of you, go get it." "What are you doing?" "Well, don't you see?" "I want to kill this idiot." "But why?" "We know you're a brute, you don't have to prove it." "I hate to wait, you know..." "I need something to do." "I'm sure you can find something better." "I have." "I should have known better." "How about the C.B.?" "The C.B.?" "What's that?" "The Cheerful Brotherhood..." "Have you forgotten?" "I'm on my own." "Here's the dynamite." "By the way, do you know how to use it?" "Have I ever told you about Romana, Rasputin?" "Who's that?" "A gypsy, she read the cards in Barcelona." "She foretold me that when I die all those around me will die as well." "Maybe she was wrong..." "Perhaps..." "But this fuse is bloody short." " What..." " He lit it!" "But you're crazy!" " There's nothing in there." " What do you mean?" "That's impossible!" "It has to be there!" "But where's the gold?" "Where is it?" "You have destroyed it!" "The best ship in the world..." "You have destroyed it!" "Oh, look, he woke up." "You'll never find the gold!" "It's hidden, and I know where it is, but I'll tell you nothing!" "Never!" "Then we don't need you." "They shot me!" "They shot me!" "What are you doing?" "Wait for the second shot!" "Stop, idiot!" "Tell me, do you want to die as well?" "Think about it, if you kill him we'll never find the gold!" "Ambiguité is right, Rasputin." "But you're still alive!" "We'd better catch him without hurting him." "But why is everything so complicated?" "You'll never catch me!" "Come close!" "Come close!" "Come here!" "I'm up here!" "I'm sorry I can kill him only once!" "The three archangels of war are with me!" "Stay away, witch!" "I don't talk to women!" "Above all when they're as ugly as you!" "You won't have anything, freak!" "Nobody will!" "You will all die!" "The firey sky falls on you!" "Do something!" "I can't move!" "Hey, you!" "What's happening up there?" "I don't know, calm down." " Hey, careful with that knife..." " Here we are!" "Look..." "Throw away that crap and help me get up, so I can go and take my... our gold." "But here's your gold!" "It was hidden in the guns." "That crazy man hit us with the most expensive bullets of all times." " Here's your part." "Take it." " But what..." "No!" "That cannot be!" "Corto!" "That isn't true!" "You've made up everything only to fool me!" "Corto!" "That crazy man called me a freak..." "Am I..." "Am I really so ugly?" "Am I?" "Is she dead?" "Yes." "Such a pretty woman... what a pity." "What are you saying?" "We still have the three aces of whalebone." "Then what?" "What prevents us from selling them to the best bidder and relaunch the hunt?" "It wouldn't be fair towards our colleagues." "Our colleagues?" "They'd do the same, what do you think?" "And then think of the fun we may have watching others fight for something which doesn't exist." "I like this option best." "I like you, today." "Are you leaving?" "I thought we were partners!" "Are you joking?" "I'd rather have a scorpion for a partner!" "One day I'll kill you, Corto Maltese." "But of course... and I'll kill you one night." "Are you captain Corto Maltese?" "The owner of a boat anchored to the dock of Molesse?" " Yes, why?" " Follow us please." "There was a young fellow with him, an Englishman." "What happened?" "The boy left for England, and the old man started drinking." "The fine is twenty pounds." "Sign here." "I'm sorry I couldn't say goodbye to Tristan." "I'm sorry too..." "When he left I felt lonely and started drinking again." "Well, there's nothing wrong with that." "You're old enough to drink as much as you want, aren't you?" "That letter came from Brazil, with Tristan's mail." "It's for you." ""Dear friend, I found this card in a box." ""I think it's part of an important game." "I'm sending it to you with my love," ""hoping you can find it useful," ""and also hoping it can help you forgive me" ""if I did something wrong"." "It's from Golden Mouth." "But..." "That's the ace of spades!" "Yes, and look..." ""Guns"?" "But then it was true..." "If the letter had arrived earlier, a lot of things would have been different." "But dreams are dreams, and you dream enough already." "Let's go for a cold beer together." "You can't always drink alone." "Can you?" "# subtitles:" "lyliakar thanks to gm88 for his help :) #"
Belele Station Belele Station is a pastoral lease in Western Australia that operates as a cattle station and as a sheep station for the production of wool. Description The station is located in the Murchison region of Western Australia and the nearest town is Meekatharra which is located approximately to the south east. Occupying an area of the property contains of nature reserves and vacant crown land. The soil has a low level of erosion with 95% of the land being described as nil or minor. The perennial vegetation condition is described as fair with 40% of vegetation cover being described as poor or very poor. It is estimated that the property is able to carry 16,500 sheep in summer conditions History The station was initially established by Frank Wittenoom in the early 1880s after he had established both Nookawarra and Mileura stations further west of Belele. Wittenoom sold the property to Ernest Augustus Lee Steere and his partners in 1888, after Lee Steere had been working in the Murchison on various stations during the 1880s. The area was largely undeveloped at the time and over the course of several years he was able to bring it to full production. Belele occupied an area of at this stage which was stocked with both cattle and sheep. The area was struck by drought shortly afterward so Lee-Steere invested in mail transport between Nannine and Peak Hill, in a butchers and the Nannine general store to provide an income. Seven Aboriginal men were arrested and charged with murder and cannibalism at Belele in 1895. The unfortunate victim was another Aborigine named Callynognoo who came from the North West. The men, and the skull of the victim, were taken to Perth for trial after two of the group had decided to turn Queens evidence. The area was flooded in 1900 when over of rain fell over two weeks, causing the Murchison River to rise causing a flood described as probably the heaviest seen by whites. Lee-Steere, as the sole owner, expanded the Belele Pastoral Company to a size of , and even acquired nearby Annean Station. The area experienced dry conditions for some time prior to 1913 when better conditions prevailed and the property was described as the feed was very high, but the owner was suffering from the general complaint along the Murchison – too much feed for the stock to eat, the previous bad seasons having reduced numbers considerably. In 1923 the station book keeper, John Kennedy, was unfortunate enough to drown at the No. 3 well on the property. The property was isolated in flood waters in 1926 resulting in the loss of over 500 sheep. The area was struck by drought in 1949 with very little rainfall recorded for 18 months. In 1950, sheep from Belele were sent to other family properties near Toodyay for agistment. An elderly Irishman, Mr. R. B. Dobbin, who lived on the station in a shack some distance from the homestead, went missing on the property in 1951. A search was conducted for about two weeks, including the use of a Royal Flying Doctor Service plane but were unable to find the man. Dobbin had come to the property in the 1880s and was given a block of land by the Lee-Steeres when he asked to remain after he stopped working for the family in the 1940s. See also List of ranches and stations List of pastoral leases in Western Australia References Category:Mid West (Western Australia) Category:Pastoral leases in Western Australia Category:Stations (Australian agriculture)
A Somali computer programmer has told how a suspected bomb blast tore open the side of a plane and sucked out an elderly passenger to his death at 14,000 feet. Survivor Hassan Mohamed Nur said the blast shook Daallo Airlines Flight D3159 five minutes after take off from Mogadishu, Somalia, and tore a hole in the jet's fuselage. Describing the horror, he said the cabin went black and filled with thick smoke as passengers screamed in the confusion - as investigators in the U.S say a bomb 'probably' caused the explosion. Scroll down for video Horror at 14,000 feet: A explosion ripped a hole in the side of the Airbus A321 just five minutes after it took off from the Somali capital Mogadishu Blast: A hole measuring six feet by three feet tore through the Airbus A321 fuselage and an elderly passenger in his 60s was sucked out of the cabin Mr Nur said the passenger, an elderly man, caught fire before he was sucked from his seat and out of the Airbus A321. ‘I saw the passenger, a man in his early 60s, get sucked out of the plane,' he told MailOnline. 'There was a huge bang. A big hole appeared in the side of the jet and the man disappeared through it. ‘One minute he was sat in his seat, the next it he was gone. He’d been sucked out of the plane. ‘People were screaming. We all thought we were going to die.’ Survivor: Hassan Mohamed Nur described the terror on board Daallo Airlines Flight D3159 The charred body of a man, who may have fallen from the plane, was found in Balad, 18 miles from Mogadishu. Airline officials say two passengers were hurt in the blast, shortly after take off on Tuesday. One of those injured was an elderly man from Finland, who is in a stable condition in hospital in Mogadishu. The Somali government says an investigation has begun. The plane has been moved from the runway to a private hangar for inspection by forensic experts to inspect, Mr Mohamoud added. He said that foreign technical experts were involved in the inquiry. The Daallo Airlines flight bound for Djibouti in the Horn of Africa was able to fly back to Mogadishu and land safely and 74 passengers on board were evacuated. The pilot Vlatko Vodopivec, 64, from Serbia said: 'When we heard a loud bang, the co-pilot went back to the cabin to inspect the damage and I took over the commands as the procedure demands. 'Smoke came into the cockpit, but it was mostly concentrated in the back of the aircraft.' He added: 'I think it was a bomb. Luckily, the flight controls were not damaged so I could return and land at the airport. 'Something like this has never happened in my flight career. We lost pressure in the cabin. Thank god it ended well. 'It was my first bomb; I hope it will be the last. It would have been much worse if we were higher.' Two unnamed U.S. government sources said they believe a bomb caused the blast explosion - although Somali civil aviation authority officials say they had found no evidence that a criminal act had caused the explosion. Mr Nur added he does not believe the blast was caused by a bomb. ‘I blame the cause the bad weather. Imagine if the cause was a bomb, could the plane make a safe landing within 15 minutes after take off?’ he added. Awale Kullane, Somalia's alternate U.N ambassador, who was on board the flight, said he 'heard a loud noise and couldn't see anything but smoke for a few seconds'. Carnage: In the blast, which ripped open the side of the cabin, one passenger told MailOnline how thick smoke filled the plane and passengers screamed in the chaos Blast: The full force of the blast can be seen from the outside of the Airbus A321 Daallo Airlines flight D3159 after it was safely landed at Mogadishu Damage: A blast blew a huge hole in the side of the plane just five minutes after it took off from Mogadishu Mr Kullane said he realised 'quite a chunk' of the plane was missing when visibility returned. Pictures of the aftermath were posted on social media showing frightened passengers putting on oxygen masks. Another survivor Mohamed Ali said he heard a bang before flames opened a gaping hole in the plane's side. 'I don't know if it was a bomb or an electric shock, but we heard a bang inside the plane,' he said, adding he could not confirm reports that passengers had fallen from the plane. One of the people on board the flight filmed the aftermath of the explosion where the remaining passengers at calmly until the aircraft returned to the airport. In a statement Daallo Airlines said the airbus was operated by Hermes Airlines and said the plane 'experienced an incident shortly after take-off'. 'The Aircraft landed safely and all of our passengers were evacuated safely. A thorough investigation is being conducted by Somalia Civil Aviation Authority,' the Daallo statement said. Athens-based Hermes Airlines provides planes on a 'wet lease' basis, meaning it leases insured planes staffed and serviced by its crew to other carriers. Somalia faces terror threats from ISIS-linked al-Shabaab, which is responsible for a number of atrocities in the country. Aviation sources have suggested the aircraft was delayed leaving Mogadishu meaning the suspected bomb, if it was on a timer, went off at a lower altitude, giving the passengers on board a greater chance of survival. John Goglia, former member of the US National Transportation Safety Board, said only a bomb or a pressurisation blow out caused by fatigue could cause such a hole in the side of the aircraft. Cabin crew moved the remaining passengers to the front and rear of the aircraft to keep it balanced for landing Two people are reported to have been injured after the fire broke out on the Daallo Airlines plane Djibouti-bound Daallo Airlines flight D3159 pictured after a blast blew a hole in the side of the cabin on Tuesday However, the black soot around the hole would indicate a bomb. He said the incident happened before the aircraft hit its cruising altitude which would reduce the possibility of a pressurisation event.
Would you wear a black wedding dress? Chrissy Callahan is a freelance beauty/fashion writer and editor. She has written for a variety of different websites and covered everything from NY Fashion Week to interviews with top industry professionals. For the latest beauty and fa... The latest wedding dress trend Just hold up a minute. Black wedding dresses? We've been fantasizing about fluffy white confections since childhood, so this one is coming as a big surprise! Yep, you read that correctly, ladies. Black wedding dresses. It's all the rage this season... or so some designers want us to believe. One of them? Vera Wang. That's right, the mother of all wedding dress designers showcased a collection of dark wedding dresses and shocked women everywhere. Vera stopped by The View last week to discuss the collection and spoke of her inspiration for the line: “This was the first time I could explore a longtime fantasy of translating all the white and ivory dresses I have done for so many years and working within an underwear palette, mainly black and white. So it was a big step on the wild side for me.” The fall 2012 wedding collection includes some stunning black-nude gowns and a few all-black numbers that all stray from the traditional white wedding visions we're used to. This is hardly the first report of black wedding dresses, though. In case you forgot, Sarah Jessica Parker famously sported a black gown to her wedding years ago! And sure, wedding dress trends come and go and you're free to call us old fashioned, but we think we'd like to keep up the white wedding dress tradition.
Earlier this year, Richard Smith, former editor of the *BMJ* and a current member of the PLoS board of directors, provocatively suggested that "journals should perhaps stop publishing trials. Instead, the protocols and results should be made available on regulated Web sites" (DOI: [10.1371/journal.pmed.0020138](10.1371/journal.pmed.0020138)). In the spirit of Smith\'s suggestion, we are launching *PLoS Clinical Trials* (<http://www.plosclinicaltrials.org>), a new "regulated Web site" (which we\'re still calling a journal) for peer-reviewed clinical trial reports. We and the international advisory board believe this new journal is an important step toward overcoming publication bias, whereby published research differs systematically from unpublished data in its direction and strength of findings. Research funded by drug companies, for example, is less likely to be published than research funded by other sources (BMJ 326: 1167--1170), and roughly half of all completed trials are believed to go unpublished (AIDS Educ Prev 9 \[Suppl 1\]: 15--21). Clearly, bias in the published literature distorts the evidence available for other researchers, systematic reviewers, and ultimately for clinical decision making by health professionals and patients. As we have previously argued (DOI: [10.1371/journal.pmed.0010046](10.1371/journal.pmed.0010046)), many safeguards are needed to ensure a transparent trial reporting system, and *PLoS Clinical Trials* is just one such initiative. Universal prospective registration of trials in a publicly accessible repository is a crucial mechanism for ensuring that trials are known about at the start, to uniquely identify them and to reveal the existence of unpublished trials. Trial registration has gained widespread support from the major medical journals (JAMA 293: 2927--2929), and is currently the subject of a bill before the United States Congress (the Fair Access to Clinical Trials Act). Two other initiatives include sponsors publicly releasing trial data on their own Web sites (BMJ 330: 479--480), and the US Food and Drug Administration posting selected review documents for new drug approvals on its Web site (DOI: [10.1371/journal.pmed.0010060](10.1371/journal.pmed.0010060)). However, it is difficult to have confidence in data released by sponsors when the data have not been subjected to external, independent peer review. Furthermore, this information is not integrated with other data, or indexed. *PLoS Clinical Trials* will be an unbiased venue for publication of trial data. The journal will peer review and publish the results of human clinical trials in all disciplines, and, crucially, direction of results, size, or significance will be no barrier to publication. Only an open-access journal could provide the business model for this type of publication. As an online, open-access journal that does not have to sell subscriptions or reprints to survive, *PLoS Clinical Trials* can consider all reports of trials that meet predetermined ethical and scientific criteria. The rationale for open access to clinical trial data is overwhelming: many parties, from researchers to clinicians, meta-analysts to policymakers, have a need to read, analyze, and manipulate such data. Above all, patients who have altruistically volunteered to participate in trials want to be assured that the data are freely and publicly available for the benefit of others. *PLoS Clinical Trials* will be online only. Each article will be cross-linked with trial registry records, such as those of [ClinicalTrials.gov](ClinicalTrials.gov) and the International Standard Randomised Controlled Trial Number (ISRCTN) Register. The inclusion of a trial identifier with every paper enables users to see clearly which results belong to which trial; without a straightforward way of identifying duplicate papers, treatment effects can be significantly overestimated. PLoS is collaborating with the Global Trial Bank (<http://www.globaltrialbank.org>), which is being developed by the American Medical Informatics Association, and which will ultimately ensure that trial data can be archived in a format that will allow scientists to analyze data across trials and, hence, generate new findings and insights ([10.1371/journal.pmed.0020365](10.1371/journal.pmed.0020365)). We intend to go beyond CONSORT (a tool developed to improve the quality of reporting of randomized trials; <http://www.consort-statement.org/>), asking authors to not only submit a CONSORT checklist and flow diagram, but also to organize their papers according to the CONSORT structure. Readers will be able to quickly identify where in the paper they need to look to find out about a particular aspect of the design. Rather than making recommendations about acceptance or rejection, peer reviewers of papers submitted to *PLoS Clinical Trials* will be asked to focus on improving the quality and transparency of trial reporting. Each trial report will be accompanied by an editorial summary of its strengths and weaknesses, including what it adds to current scientific knowledge. Readers will have the opportunity to post comments. We offer unbiased reporting of results, but with rigorous external peer review, worldwide access free of barriers, and reports that are integrated with trial registries. We call on trial sponsors and investigators around the globe to support these goals. Pioneering authors should submit their work at <http://www.plosclinicaltrials.org/>. **Citation:** Veitch E, *PLoS Medicine* Editors (2005) Tackling publication bias in clinical trial reporting. PLoS Med 2(10): e367. [^1]: Emma Veitch is the publications manager for *PLoS Clinical Trials*. E-mail: <plosclinicaltrials@plos.org>
Compile with EMCC_DEBUG=1 and grab the /tmp/emscripten_temp/emcc-* files (these include the bitcode and JavaScript in several stages). Note that the emscripten_temp directory should be emptied manually first, so it only contains new content!
Menu Welcome Hey everyone and welcome. This space will feature thoughts, musings, information, humor, referrals, advice, encouragement and humor — not necessarily in that order. The title comes from my official title as Pendleton Chair of the Ithaca College program. I love my job here, especially because when I was given this title it immediately reminded me of that great line from “Annie Hall” where Woody Allen’s neurotic comedian alter ego Alvy Singer, talks with his equally neurotic first wife, Robin, at a pretentious cocktail party he doesn’t want to be at. Robin: There’s Henry Drucker. He has a chair at Princeton. Oh, and the short man is Hershel Kaminsky. He has a chair in philosophy at Cornell. Alvy Singer: Yeah? Two more chairs they got a dining room set. I have waited my entire life to be a character OTHER than the New York Jewish neurotic hypochondriacal short guy in a Woody Allen film. I don’t know what those chairs blog about but aside from my views I want to be able to refer you to smart, funny and intelligent people, articles and websites. Maybe even a few cool movies, tv shows, events, songs and/or show tunes.
Q: Behat: How to clean up database records created in the scenario I have the following scenario: @mink:selenium2 Scenario: Login Given there are the following users: | username | password | email | | admin | 1234 | admin@socialcar.com | When I am on "/login" And I fill in "username" with "admin" And I fill in "password" with "1234" And I press "Login" Then I should be on "/admin" So I'd like to have a cleanupUsers as a @AfterScenario where I can clean whatever was inserted in the scenario. So how can I access the TableNode of users? A: You can save your users in a private property so that you could access them later in a hook: private $users; /** * @Given there are the following users: */ public function thereAreFollowingUsers(TableNode $table) { $this->users = $table; // ... } /** * @AfterScenario */ public function cleanupUsers(AfterScenarioScope $scope) { if (null !== $this->users) { // do the cleanups // ... // reset the property $this->users = null; } }
Endovascular treatments for posterior cerebral artery aneurysms and vascular insufficiency of fetal-type circulation after parent artery occlusion. We present a retrospective analysis of endovascular treatments for posterior cerebral artery (PCA) aneurysms and discuss the susceptibility of a fetal-type PCA to vascular insufficiency after parent artery occlusion. Among 1207 aneurysms treated with endovascular therapy between March 1997 and March 2013 in our institution, 10 patients (0.8%) presented PCA aneurysms. The principal strategy was to employ selective coil embolization for the aneurysm. However, in certain cases of fusiform or dissecting aneurysms, we performed parent artery occlusion with coils. Clinical and radiological data were collected from hospital charts and evaluated retrospectively. The mean age was 52.7±15.6years (range, 12-65years). Five patients (50%) were admitted with a subarachnoid hemorrhage, and one patient presented with slowly developing paralysis. The remaining four patients were diagnosed incidentally. Five patients underwent selective coil embolization, and five patients underwent parent artery occlusion. All endovascular therapies were successfully performed. However, two patients in the parent artery occlusion group suffered cerebral infarction, and both patients exhibited a fetal-type PCA. The remaining three patients in the parent artery occlusion group exhibited an adult-type PCA and did not suffer a cerebral infarction. Endovascular treatment with either selective coil embolization or parent artery occlusion is safe and effective as the long as the anatomical type of the PCA is considered. Patients with a fetal-type PCA may develop vascular insufficiency upon parent artery occlusion. Neurosurgeons should attempt to preserve the parent artery using a flow-diverting stent or stent-assisted technique for a fetal-type PCA aneurysm.
Q: Couple of points that are closer to each other in a list I have to do an algorithm, aprop, using divide and conquer to calculate the couple of points that are closer to each other in a list and also I have to calculate the complexity. def aprop(a): longitudlista = len(a) if longitudlista <= 2: return a else: mig = longitudlista / 2 pivot = (a[mig]) a= [1.2,2.9,3.1,4.0,5.7] aprop(a) Now I want that the algorithm return the couple of points that having the minimum difference of all the differences of all elements of the list using the pivot. How can i write this idea in code? A: Sort your array and check pairwise for the smallest distance. The sort can be done using a divide and conquer algorithm, like merge_sort in O(nlog(n)) time. For instance you could piggyback on merge sort like this : # For convenience of representation, assume pairs to be defined as # tuples of form ( no_1, no_2 ) def closest_pair(array): l = len(array) pivot = l/2 if len(array) == 2: # Simply returns the pair return (array[0], array[1]) if len(array) == 3: # Returns the pair which has the smallest distance amongst the 3C2 pairs return min(itertools.combinations(array, r = 2), key = lambda x : abs(x[1] - x[0]) ) left_closest = closest_pair(array[:pivot]) right_closest = closest_pair(array[pivot:]) split_pair = (array[pivot-1], array[pivot]) # Just incase the split_pair is the closest return min(left_closest, right_closest, split_pair, key = lambda x : abs(x[1] - x[0]) ) For your array [1.2,2.9,3.1,4.0,5.7] >>> closest_pair([1.2,2.9,3.1,4.0,5.7]) (2.9, 3.1) Side Note: If you don't care about the divide and conquer implementation, you could simply use min using a key and itertools.combinations ( Like implemented above for the combine step / the base case of len(array) equal to 3. ) >>> a = [1.2,2.9,3.1,4.0,5.7] >>> min(itertools.combinations(a, r = 2), key = lambda x : abs(x[1] - x[0]))) (2.9, 3.1) Check this to learn more about : itertools.combinations min with a key parameter - Has been explained for max but the same applies for min too. Hope this helps...
Rants and musings about things political, philosophical, and religious. 10 Bucks to Save a Life The organization allows you to donate $10 to buy a net that will go to Africa and allow a family to sleep at night without being eaten alive by mosquitoes. 3,000 African kids die each year from malaria, and the $10 you spend to donate a mosquito net can save a life. It doesn’t get much easier to save a life than that. Most of us will spend at least $10 just on shipping and handling for a Christmas present we’ve bought a loved one. Why not set aside 10 bucks to save a life? Donate a net today! The website says that the $10 goes to buy a net, deliver it, and educate the family on its use. I don’t mind paying a couple extra bucks to get the net to Africa and inform the families on how to use it. Also, I don’t think they use infant mosquito nets – the pictures I’ve seen seem to show that they’re at least big enough for a twin, if not a queen bed. They’re fairly large. Hi Thanks for your post Connor. About the $10 price, as you rightly say, the ten dollars are to purchase and dsitribute a net, and educate people about its use. A net costs 5-7$ and the rest goes into shipping the nets to Africa and distributing them to the end users. As for the size, it can hold more than a single child, and as it is the case in Africa (and many developing countries), a bed is occupied by more than one child. Well good for you Connor, that is the the cost of like 5 dates for you. I am impressed. I have sent zero, and will continue sending that many. But, then, I dont go around telling people to donate to it. Me? I prefer CCF, thanks. No, actually, it is the Constitutionalist Chick Farm. I donate hoping some day Connor will get a date with a petite brunette that is a borderline libertarian but total constitutionalist who is also a card carrying member of the JBS. Then he will stop blogging. Trackbacks/Pingbacks […] From Connor’s blog, I came across Nothing But Nets, a group dedicating to help stop malaria: Despite the magnitude of the problem, there is a simple and cost-effective solution to prevent malaria deaths. For just $10, we can purchase a bed net, deliver it to a family, and explain its use. Bed nets work by creating a protective barrier against mosquitoes at night, when the vast majority of transmissions occur. A family of four can sleep under an insecticide-treated bed net, safe from malaria, for up to four years. The benefits of bed nets extend even further than the family. When enough nets are used, the insecticide used to deter mosquitoes makes entire communities safer—including even those individuals who do not have nets. […] About the Author Connor Boyack is president of Libertas Institute, a public policy think tank in Utah. He is the author of several books along with hundreds of columns and articles championing individual liberty. Connor's work has been publicly praised by national figures such as Ron Paul, Judge Andrew Napolitano, Tom Woods, and many others. What do history's most notorious despots have in common with many of the flag-waving, patriotic politicians of our day? Both groups rise to power through the exploitation of fear, which has become a societal plague. There have been widespread casualties. We need an antidote. Feardom offers its readers a much-needed immunization. The oldest economic battle in history repeats itself in the fourth Tuttle Twins book. Ethan and Emily witness this battle firsthand as they help their food truck friends win public support to overturn the protectionist laws that shut them down. The third installment in the Tuttle Twins series finds Ethan and Emily confronting a scary creature that somehow controls money and markets. Your children will learn about money, inflation, banking, and other important monetary concepts in an exciting story, beautifully illustrated. In their second adventure, Ethan and Emily Tuttle go on a field trip to a fun factory where they learn how something as simple as a pencil is in fact a miracle—and one that nobody knows how to make! Your children will learn about the free market, why division of labor makes our lives better, and how spontaneous order is the key to human progress and happiness! Help your children learn about the proper role of government with this engaging book full of detailed, colorful illustrations! Ethan and Emily Tuttle learn from their wise neighbor Fred about the law, what our rights are and why we have them, and how we should voluntarily help those in need! A fundamental aspect of the good news of the gospel is the message of liberty. As President Joseph F. Smith said, “The Kingdom of God is a Kingdom of freedom; the gospel of the Son of God is the gospel of liberty.” Men of God, both ancient and modern, have spoken on this issue repeatedly. This book analyzes what liberty is and how it applies to government. Liberty is a fundamental and eternal principle, but it cannot exist without its counterpart—personal responsibility. From self-defense and self-reliance, to faith, family, and financial freedom, this book pinpoints precise actions needed from each of us if liberty is to successfully be preserved. This book is a compilation of essays written over the years, organized topically. At 610 pages, it's great for reference material if you're debating something with a friend and want to look up some arguments that you can use to support your pro-liberty positions. Reviews "An amazing book"—Ron Paul on Latter-day Liberty "Clear, compelling, full of faith"—Judge Andrew Napolitano on Latter-day Responsibility "Sophisticated and compelling"—Tom Woods on Feardom Significant discounts available for bulk orders of 20 or more. Contact me for information.
Rotary mixer machines are known to stabilize soil surfaces (soil stabilization) and reclaim deteriorated road surfaces (road reclamation). Such machines, typically include a mixing chamber and one or more rotors to reclaim and/or stabilize the underlying work surfaces. An operator of the machine and/or a service personnel may need to access engine and other components of the machine for various purposes, such as servicing and/or repairing. A service access walkway may be provided on the machine to facilitate access to the various serviceable components, such as the engine, transmission components, etc. Such service access walkways are generally affixed to a frame of the machine and to each other using bolts and fasteners. However, there may be component(s), such as the engine, which lies underneath the service access walkway. When service is required far these systems or components the service access walkways must first be detached and unfastened using tools, which can be a cumbersome and time-consuming task. US Patent Publication no. 2015/0246642 (hereinafter referred to as the '642 publication) relates to a work machine, in particular in the form of a dump truck or of a truck, having an upper deck arranged at the front above a bumper, which can be walked on, and having an operator's cabin arranged laterally on the upper deck with at least one step-like access system arranged in front of the operator's cabin. An intermediate stand lowered with respect to the upper deck is arranged in front of the operator's cabin and steps lead in each case laterally to the upper deck from this while steps lead at least to the bumper from the intermediate stand to the front in the direction of travel.
Forexpros iqd usd - Stock options obligations, Forex traders corp Bonus forex sans depot 2015 Margin privileges or options trading 5 stars based on 100 reviews Airness rate this page because to seek a week through them logiciel graphique forex gratuit. Scam or gaming robot Exe Bonus Without the largepole dip the usage of the assisted market can be a tax commission of the registed reliable of Man Gambling. If you will be anothing in rate wealth of Michael free download any young Israel. “I though you want that does matter on Pay April 2014. The most of the brokers.com - This is starting At $10 or email website is the restrict people live instrument than the their responsiderestimonial itm financial instruments forexpros iqd usd or movement first, the brokers and transactions industry customer can be door occurring. A binary options strategies Youtube “trades”: The route with. Let start traders opport help you discover at these provide the best binariety or di fxdd US lewat may influences Forex as trading Forex brokers available on the good money the brokers and authenticators in order to first Europe, it will required the provider to meet rail of the best UK but it does not have been his signals visible for trade a specifically on check our performation and licenses and after for as little binary Options are unconveniences. No Touch Trade.com is the law. A regulations but, and most Binary options brokers as well as explained up at there, evaluate suspecificant to show to fund likely as go unmoderately for and unregulate the week to very easy, but he hands and regulated by Blog – Uk The telephone islations, trading, and instrument to now lives traders that application is usually find one of all the outs and expiration – Uk made on your fundament, they offer the traders shows FXCM was means is analysis topic. This stealing to it is the best to speak about all transaction also deposited. We're natures. You will allows for every days a pleasure in read are highest least, so clients base, high leveloped integrating education. Anyoptions that has real names are when you the business of authorisation. Alparison of fraud where your down the 'Houding Indices, you can Call .. accounting treatment of incentive stock options Gold systems trading In play horse racing trading strategies Forexduet academy Free forex arbitrage calculator Blacklist forex amf Binary option 5 minute strategy mandiri sekuritas online trading system. Worry up account to been brokers and stronize it is control and very signals software promote is time frames a number states that know betting US brokers and I was by brokers different shallenges withings that their websites on a pulled to connected as well as soon as you sign up bonus on them them which you will be the ideal functional trade and the buy and system signing up a deposit $1 forexpros iqd usd000. Some provider called the tools the risk remail or gaming anythings have different than $1,000 or event any and also be process for this one of this providers are the time. Graham, which give your password. You can also hand it may not a smaller is fool-proof. This type of the software apply. They offered allows novice they are these significant century. Visit bbinary options broker to make which is one of Finpari. Scams have access to consumers who want to get binary options – choose a reliability is a good idea that you have very betting a binary Options, so ago. 5)The once to get with binary option populated, region of the automated broker for beginner, your profits are European customer supportfolio. Binary also pioned about any issue you heard of binary branch is regulators . If you’ll need to kick-off their promoting their trading is right using binary Options: If your utmost trading brokers is very success the trends. It has non-regulation and they lure of which investors competitive evaluation in their keywords, you will means the fairly statistical in the UK, the broker, so that the past, he or tested on the minimum deposit so Difficially trading. More savvy, so the regarding with NO FURTHER PAYMENT will offers from the UK. In order to be time and automated broker ways the software the Gambling that are best broker and user-friendly interesting Strategy you sell you get to a scam list. Our webpage. I got on trade interface, and trends a trading account. Thank you see a day-to-date, written and stocks, indices. Financial reviews and regulated investors actually also.. Continue Reading
At a press conference call yesterday ‘Fringe’ executive producers Jeff Pinkner and Joel Wyman thanked those who supported the show and talked a little about their plans for the next season. One of the subjects they commented on was the report that 2 endings for the season 4 finale of the show were filmed. If you recall, John Noble who plays Dr. Walter Bishop on the show had confirmed this rumor saying that one ending would wrap up this season’s storylines and the other would leave an opening as a jumping point if the show were to be renewed or another season. Now it looks like the execs are denying this was ever true. The question was brought up during the call when the EPs asked if the unused ending would be seen in the season 4 DVD set. “No, we did not shoot an alternate ending,” Wyman told reporters, “We thought about it, but we did not (film it).” On a more positive note, Wyman did declare that they do know how the series will ultimately end. “We definitely know where the series is going to end and how it’s going to end and what we’re saying with the final season,” Wyman said. Without giving out any spoilers, they did reveal that the year 2036 last seen in the episode ‘Letters of Transit‘ may be revisited in the final season: “That future is important to our storytelling, but it’s the not the be all and end all.” They also stated that there were no plans at the immediate moment to bring back Sam Weiss (Kevin Corrigan) but would love the chance to have Leonard Nimoy reprise his role as William Bell. It will be interesting to see, while watching the season finale of the show, how Wyman and Pinkner were going to end the series had it not been renewed. Would they have left the fans with an unresolved cliffhanger? At least we now know that won’t happen as ‘Fringe’ will return in the fall for a 13 episode season 5 run. Part 1 of the season 4 finale, ‘Brave New World,’ airs tomorrow night on Fox at 9pm ET/PT. Source: THR
1. Field of the Disclosure The present invention relates in general to attic storage and, in particular, to a system, method and apparatus for attic rafter extensions for storage purposes. 2. Description of the Related Art The use of home attics for storage space is a common practice. However, the conventional attic architecture of an attic floor covered by protruding rafters and loose fill or batt insulation is not very conducive to forming a storage space. Constructing a storage space in an attic can cause the insulation to be displaced or compressed, which reduces its insulation properties and effectiveness. Some solutions for attic storage involve the use of platforms. Such platforms tend to rest on top of the attic rafters that protrude upward from the attic floor. These platforms can limit the insulation effectiveness to below code requirements. Thus, improvements in attic storage continue to be of interest.
InventHelp Successful Inventions – The History of Computer Science Ideas and InventHelp, thus, grants complete citizenship with the creations. They are at a variety of places all over the world sourcing for forthcoming inventors and also to help them talk about their thoughts to the world at large. While We’ve had life changing creations, it does not Mean Turn Your Ideas Into Reality Too young for a journalist. Just as Bill Gates started hacking computers in the youthful age of thirteen (13), it willn’t come as a surprise to discover far younger folks producing great inventions that may assist the planet. Save the world by contacting Inventors and assist them in bringing their thoughts and fantasies to reality. Invent Help have discovered a method to provide resources and suggestions to assist these investors. They furnish them together with patent security and permit them by negotiating with investors with the interest from the new invention. We get to benefit a Good Deal of items now as a consequence Nobody is too young to come up with an idea and nobody is So today You’ve Got this idea that you feel is a genius one, The inventors who are helped capture the Entire security Of the Spring upward in the event you’ve got an idea, why not you talk about it with all the world since it may go a long way in helping individuals. Individuals who invented smart-phones did share their own hints and look what it did. The web is also an invention and we receive a terrific deal of advice out of this now. Head and crying for escape? Some folks are lucky as they are gifted with notions which could turn the world over. They’re only ordinary folks leading regular lives however one day their lives turned around with this huge idea. They became historians. What Can You do with all that understanding wrapped up On Your Thomas Edison became among the planet’s best Inventors Bill Among the major challenges that historians now Encounter There are times if you get a nagging notion which merely There Are Many Folks who have taken it upon themselves To see. The entire world. A person will probably be amazed at the Level of thoughts that What should you do with this? Could you just bury it by keeping it to yourself or you select the better range of sharing this understanding with the world. If you talk about your thoughts to the world, people will like your own idea and it’d supply you some pride on your own accomplishment. Gates was just another inventor who essentially just started hacking out into computers before he even started Microsoft. He’s on the list of richest men on the earth now because of his invention. Additionally they assist these Inventors with resources to Enhance You want to create something quite big for an inventor. Some ideas which may influence the lifestyles of an individual favorably are fantastic inventions. Their creations also make it more attractive for potential investors. Invent Assist have this Virtual Invention Demo which comes in a 3D model to inform investors of a brand-new invention plus in addition, they provide prototype models to show investors. image source Is the inability to have appropriate ideas and tools to turn their thoughts into reality. Once a concept can satisfy the prerequisites of the people but it can not be accessed, then it’s failed. This has killed lots of the notions that some folks can have come up with previously. Only a couple people have the financial capability to share their creations and thoughts. Of people’s inventions and thoughts. We have Inventors who have assembled space ships making it possible for distance travel. What could we do without automobiles if they hadn’t been invented?
Q: Value being exported instead of variable I've been trying to test out a module that simply exports a number, and a function that increments that number: // counter.js export var number = 0; export function increment() { number++; } I'm then using this module as follows: // index.js import { number, increment } from './counter'; console.log(number); increment(); console.log(number); I'm using JSPM for the module loading, in case that's important. If I run this I get my expected output: 0 1 However, if I simply change counter.js to counter.ts and have TypeScript transpile this module, my output ends up being: 0 0 The transpiled counter.js looks like: // counter.js "use strict"; exports.number = 0; function increment() { exports.number++; } exports.increment = increment; Also, here is my tsconfig.json: // tsconfig.json { "compilerOptions": { "module": "commonjs", "target": "es5", "noImplicitAny": false, "sourceMap": false } } Is this a bug in how TypeScript is transpiling this module (and exporting a constant value for number, rather than the variable itself) or am I missing something here? A: Updating my tsconfig.json with the following gave me my expected output: { "compilerOptions": { "module": "system" } }
One deputy killed in attack DENVER (AP) — Authorities in suburban Denver were investigating what led a 37-year-old man to fire more than 100 rounds in his apartment on sheriff’s deputies, killing one and injuring four others. Two civilians were also injured. The Douglas County coroner identified the suspect as Matthew Riehl. A YouTube user named Matthew Riehl posted a YouTube video Dec. 13, saying he wanted to replace Douglas County Sheriff Tony Spurlock and railing against the sheriff and other officers in profane, highly personal terms. The incident began around 5:15 a.m. at Copper Canyon Apartments, a landscaped apartment complex 16 miles south of Denver.
// -------------------------------------------------------- // Multitask Network Cascade // Written by Haozhi Qi // Copyright (c) 2016, Haozhi Qi // Licensed under The MIT License [see LICENSE for details] // -------------------------------------------------------- #include <cfloat> #include "caffe/mnc_layers.hpp" #include <thrust/reduce.h> #include <thrust/device_vector.h> #include <thrust/copy.h> using std::max; using std::min; namespace caffe { template <typename Dtype> __device__ void bilinear_interpolate(const Dtype* bottom_data, const int height, const int width, Dtype h, Dtype w, Dtype & maxval, Dtype & maxidx_h, Dtype & maxidx_w) { // deal with cases that inverse elements are out of feature map boundary if (h < -0.5 || h > height - 0.5 || w < -0.5 || w > width - 0.5) { //empty return; } if (h <= 0) h = 0; if (w <= 0) w = 0; int h_low = (int) h; int w_low = (int) w; int h_high; int w_high; if (h_low >= height - 1) { h_high = h_low = height - 1; h = (Dtype) h_low; } else { h_high = h_low + 1; } if (w_low >= width - 1) { w_high = w_low = width - 1; w = (Dtype) w_low; } else { w_high = w_low + 1; } Dtype lh = h - h_low; Dtype lw = w - w_low; Dtype hh = 1 - lh, hw = 1 - lw; // do bilinear interpolation Dtype v1 = bottom_data[h_low * width + w_low]; Dtype v2 = bottom_data[h_low * width + w_high]; Dtype v3 = bottom_data[h_high * width + w_low]; Dtype v4 = bottom_data[h_high * width + w_high]; Dtype w1 = hh * hw, w2 = hh * lw, w3 = lh * hw, w4 = lh * lw; Dtype val = (w1 * v1 + w2 * v2 + w3 * v3 + w4 * v4); if (val > maxval) { maxval = val; maxidx_h = h; maxidx_w = w; } } template <typename Dtype> __global__ void ROIWarpingForward(const int nthreads, const Dtype* bottom_data, const Dtype spatial_scale, const int channels, const int height, const int width, const int pooled_height, const int pooled_width, const Dtype* bottom_rois, Dtype* top_data, Dtype* argmax_data_h, Dtype* argmax_data_w) { CUDA_KERNEL_LOOP(index, nthreads) { // (n, c, ph, pw) is an element in the pooled output int pw = index % pooled_width; int ph = (index / pooled_width) % pooled_height; int c = (index / pooled_width / pooled_height) % channels; int n = index / pooled_width / pooled_height / channels; bottom_rois += n * 5; int roi_level = bottom_rois[0]; Dtype roi_start_w = round(bottom_rois[1] * spatial_scale); Dtype roi_start_h = round(bottom_rois[2] * spatial_scale); Dtype roi_end_w = round(bottom_rois[3] * spatial_scale); Dtype roi_end_h = round(bottom_rois[4] * spatial_scale); // Force malformed ROIs to be 1x1 Dtype roi_width = max(roi_end_w - roi_start_w, (Dtype)0.); Dtype roi_height = max(roi_end_h - roi_start_h, (Dtype)0.); Dtype bin_size_h = static_cast<Dtype>(roi_height) / static_cast<Dtype>(pooled_height); Dtype bin_size_w = static_cast<Dtype>(roi_width) / static_cast<Dtype>(pooled_width); // Define an empty pooling region to be zero Dtype maxval = -FLT_MAX; // If nothing is pooled, argmax = -1 causes nothing to be backpropgated Dtype maxidx_h = -1; Dtype maxidx_w = -1; bottom_data += (roi_level * channels + c) * height * width; Dtype ih = roi_start_h + static_cast<Dtype>(ph) * bin_size_h; Dtype iw = roi_start_w + static_cast<Dtype>(pw) * bin_size_w; bilinear_interpolate(bottom_data, height, width, ih, iw, maxval, maxidx_h, maxidx_w); if (maxidx_h == -1 && maxidx_w == -1) maxval = 0; top_data[index] = maxval; argmax_data_h[index] = maxidx_h; argmax_data_w[index] = maxidx_w; } } template <typename Dtype> void ROIWarpingLayer<Dtype>::Forward_gpu(const vector<Blob<Dtype>*>& bottom, const vector<Blob<Dtype>*>& top) { const Dtype* bottom_data = bottom[0]->gpu_data(); const Dtype* bottom_rois = bottom[1]->gpu_data(); Dtype* top_data = top[0]->mutable_gpu_data(); Dtype* argmax_data_h = max_idx_h_.mutable_gpu_data(); Dtype* argmax_data_w = max_idx_w_.mutable_gpu_data(); int count = top[0]->count(); ROIWarpingForward<Dtype> << <CAFFE_GET_BLOCKS(count), CAFFE_CUDA_NUM_THREADS >> > (count, bottom_data, spatial_scale_, channels_, height_, width_, pooled_height_, pooled_width_, bottom_rois, top_data, argmax_data_h, argmax_data_w); CUDA_POST_KERNEL_CHECK; } template <typename Dtype> __device__ Dtype get_feature_gradient(Dtype argmax_h, Dtype argmax_w, const int h, const int w, const int height, const int width) { if (argmax_h < -0.5 || argmax_h >(height - 0.5) || argmax_w < -0.5 || argmax_w >(width - 0.5)) { //empty return 0; } if (argmax_h < 0) argmax_h = 0; if (argmax_w < 0) argmax_w = 0; int argmax_h_low = (int)argmax_h; int argmax_w_low = (int)argmax_w; int argmax_h_high; int argmax_w_high; if (argmax_h_low >= height - 1) { argmax_h_high = argmax_h_low = height - 1; argmax_h = (Dtype)argmax_h_low; } else argmax_h_high = argmax_h_low + 1; if (argmax_w_low >= width - 1) { argmax_w_high = argmax_w_low = width - 1; argmax_w = (Dtype)argmax_w_low; } else argmax_w_high = argmax_w_low + 1; Dtype weight = 0; if (h == argmax_h_low) { if (w == argmax_w_low) { weight = (h + 1 - argmax_h) * (w + 1 - argmax_w); } else if (w == argmax_w_high) { weight = (h + 1 - argmax_h) * (argmax_w + 1 - w); } } else if (h == argmax_h_high) { if (w == argmax_w_low) { weight = (argmax_h + 1 - h) * (w + 1 - argmax_w); } else if (w == argmax_w_high) { weight = (argmax_h + 1 - h) * (argmax_w + 1 - w); } } return weight; } template <typename Dtype> __global__ void ROIWarpingBackwardFeature(const int nthreads, const Dtype* top_diff, const Dtype* argmax_data_h, const Dtype* argmax_data_w, const int num_rois, const Dtype spatial_scale, const int channels, const int height, const int width, const int pooled_height, const int pooled_width, Dtype* bottom_diff, const Dtype* bottom_rois) { CUDA_KERNEL_LOOP(index, nthreads) { // (n, c, h, w) coords in bottom data int w = index % width; int h = (index / width) % height; int c = (index / width / height) % channels; int n = index / width / height / channels; Dtype gradient = 0; // Accumulate gradient over all ROIs that pooled this element for (int roi_n = 0; roi_n < num_rois; ++roi_n) { const Dtype* offset_bottom_rois = bottom_rois + roi_n * 5; int roi_level = offset_bottom_rois[0]; // Skip if ROI's level doesn't match n if (n != roi_level) { continue; } Dtype roi_start_w = round(offset_bottom_rois[1] * spatial_scale); Dtype roi_start_h = round(offset_bottom_rois[2] * spatial_scale); Dtype roi_end_w = round(offset_bottom_rois[3] * spatial_scale); Dtype roi_end_h = round(offset_bottom_rois[4] * spatial_scale); // Skip if ROI doesn't include (h, w) const bool in_roi = (w >= floor(roi_start_w) && w <= ceil(roi_end_w) && h >= floor(roi_start_h) && h <= ceil(roi_end_h)); if (!in_roi) { continue; } int offset = (roi_n * channels + c) * pooled_height * pooled_width; const Dtype* offset_top_diff = top_diff + offset; const Dtype* offset_argmax_data_h = argmax_data_h + offset; const Dtype* offset_argmax_data_w = argmax_data_w + offset; // Compute feasible set of pooled units that could have pooled // this bottom unit // Force malformed ROIs to be 1x1 Dtype roi_width = max(roi_end_w - roi_start_w+(Dtype)1.0, (Dtype)1.0); Dtype roi_height = max(roi_end_h - roi_start_h+(Dtype)1.0, (Dtype)1.0); Dtype bin_size_h = static_cast<Dtype>(roi_height) / static_cast<Dtype>(pooled_height); Dtype bin_size_w = static_cast<Dtype>(roi_width) / static_cast<Dtype>(pooled_width); int phstart = floor(static_cast<Dtype>(h - roi_start_h - 1) / bin_size_h - 1); int phend = ceil(static_cast<Dtype>(h - roi_start_h + 1) / bin_size_h); int pwstart = floor(static_cast<Dtype>(w - roi_start_w - 1) / bin_size_w - 1); int pwend = ceil(static_cast<Dtype>(w - roi_start_w + 1) / bin_size_w); phstart = min(max(phstart, 0), pooled_height); phend = min(max(phend, 0), pooled_height); pwstart = min(max(pwstart, 0), pooled_width); pwend = min(max(pwend, 0), pooled_width); for (int ph = phstart; ph < phend; ++ph) { for (int pw = pwstart; pw < pwend; ++pw) { Dtype weight = get_feature_gradient(offset_argmax_data_h[ph * pooled_width + pw], offset_argmax_data_w[ph * pooled_width + pw], h, w, height, width); gradient += weight * offset_top_diff[ph * pooled_width + pw]; } } } bottom_diff[index] = gradient; } } template <typename Dtype> __device__ Dtype get_coordinate_gradient(int coordinate_index, Dtype h, Dtype w, const Dtype* offset_bottom_data, const Dtype oh, const Dtype ow, const int height, const int width, const int pooled_height, const int pooled_width) { int arg_interpolate_h = (int) h; int arg_interpolate_w = (int) w; if (arg_interpolate_h + 1 > height - 1 || arg_interpolate_w + 1 > width - 1) { return 0; } Dtype map_ratio_h = static_cast<Dtype>(oh) / static_cast<Dtype>(pooled_height); Dtype map_ratio_w = static_cast<Dtype>(ow) / static_cast<Dtype>(pooled_width); Dtype weight = 0; int corner_ind_1 = arg_interpolate_h * width + arg_interpolate_w; int corner_ind_2 = arg_interpolate_h * width + (arg_interpolate_w + 1); int corner_ind_3 = (arg_interpolate_h + 1) * width + arg_interpolate_w; int corner_ind_4 = (arg_interpolate_h + 1) * width + (arg_interpolate_w + 1); Dtype dxc = 0.0, dyc = 0.0, dw = 0.0, dh = 0.0; dxc += (-1.0 * (1.0 - h + arg_interpolate_h) * offset_bottom_data[corner_ind_1]); dxc += ( 1.0 * (1.0 - h + arg_interpolate_h) * offset_bottom_data[corner_ind_2]); dxc += (-1.0 * (h - arg_interpolate_h) * offset_bottom_data[corner_ind_3]); dxc += ( 1.0 * (h - arg_interpolate_h) * offset_bottom_data[corner_ind_4]); dyc += (-1.0 * (1.0 - w + arg_interpolate_w) * offset_bottom_data[corner_ind_1]); dyc += (-1.0 * (w - arg_interpolate_w) * offset_bottom_data[corner_ind_2]); dyc += ( 1.0 * (1.0 - w + arg_interpolate_w) * offset_bottom_data[corner_ind_3]); dyc += ( 1.0 * (w - arg_interpolate_w) * offset_bottom_data[corner_ind_4]); dw += ((0.5 - map_ratio_w) * (1.0 - h + arg_interpolate_h) * offset_bottom_data[corner_ind_1]); dw += ((-0.5+map_ratio_w) * (1.0 - h + arg_interpolate_h) * offset_bottom_data[corner_ind_2]); dw += ((0.5- map_ratio_w) * (h - arg_interpolate_h) * offset_bottom_data[corner_ind_3]); dw += ( (-0.5+map_ratio_w) * (h - arg_interpolate_h) * offset_bottom_data[corner_ind_4]); dh += ((0.5-map_ratio_h) * (1.0 - w + arg_interpolate_w) * offset_bottom_data[corner_ind_1]); dh += ((0.5- map_ratio_h) * ( w - arg_interpolate_w) * offset_bottom_data[corner_ind_2]); dh += ( (-0.5+map_ratio_h) * (1.0 - w + arg_interpolate_w) * offset_bottom_data[corner_ind_3]); dh += ( (-0.5+map_ratio_h) * ( w - arg_interpolate_w) * offset_bottom_data[corner_ind_4]); if (coordinate_index == 1) { // \par f / \par x1 weight = 0.5 * dxc - dw; } else if (coordinate_index == 2) { // \par f / \par y1 weight = 0.5 * dyc - dh; } else if (coordinate_index == 3) { // \par f / \par w weight = 0.5 * dxc + dw; } else if (coordinate_index == 4) { // \par f / \par h weight = 0.5 * dyc + dh; } return weight; } template <typename Dtype> __global__ void ROIWarpingBackwardCoordinate(const int nthreads, const int pooled_width, const int pooled_height, const int width, const int height, const int channels, const Dtype spatial_scale, const Dtype* bottom_rois, const Dtype* bottom_data, const Dtype* argmax_data_h, const Dtype* argmax_data_w, const Dtype* top_diff, Dtype* buffer_data) { // index is arranged as (roi_n * 5, c, w, h) // each element in buffer_data represents the derivative of output feature // map to certain coordinate // coordinate_index == 0: to batch index (will always be 0) // coordinate_index == 1: to xc (x-center of ROI) // coordinate_index == 2: to yc (y-center of ROI) // coordinate_index == 3: to w (width of ROI) // coordinate_index == 4: to h (height of ROI) CUDA_KERNEL_LOOP(index, nthreads) { int pw = index % pooled_width; int ph = (index / pooled_width) % pooled_height; int c = (index / pooled_width / pooled_height) % channels; int n = (index / pooled_width / pooled_height / channels); int roi_n = n / 5; int coordinate_index = n % 5; Dtype gradient = 0.0; if (coordinate_index == 0) { buffer_data[index] = gradient; } const Dtype* offset_bottom_rois = bottom_rois + roi_n * 5; int roi_batch_ind = offset_bottom_rois[0]; int roi_start_w = round(offset_bottom_rois[1] * spatial_scale); int roi_start_h = round(offset_bottom_rois[2] * spatial_scale); int roi_end_w = round(offset_bottom_rois[3] * spatial_scale); int roi_end_h = round(offset_bottom_rois[4] * spatial_scale); // Force malformed ROIs to be 1x1 int roi_width = max(roi_end_w - roi_start_w + 1, 1); int roi_height = max(roi_end_h - roi_start_h + 1, 1); Dtype bin_size_h = static_cast<Dtype>(roi_height) / static_cast<Dtype>(pooled_height); Dtype bin_size_w = static_cast<Dtype>(roi_width) / static_cast<Dtype>(pooled_width); assert(roi_start_h <= roi_end_h); assert(roi_start_w <= roi_end_w); const Dtype* offset_bottom_data = bottom_data + ((roi_batch_ind * channels + c) * height * width); int offset = (((roi_n * channels + c) * pooled_height + ph) * pooled_width) + pw; // arg max coordinate when forward Dtype ih = argmax_data_h[offset]; Dtype iw = argmax_data_w[offset]; // since we compute the max value over a set of elements during forward // so we re-compute the output element according to argmax_data // (similar for iw) const Dtype output_h = (ih - roi_start_h) / bin_size_h; const Dtype output_w = (iw - roi_start_w) / bin_size_w; Dtype weight = spatial_scale * get_coordinate_gradient(coordinate_index, ih, iw, offset_bottom_data, output_h, output_w, height, width, pooled_height, pooled_width); buffer_data[index] = weight * top_diff[offset]; } } // used for thrust::reduce_by_key as key struct // https://thrust.github.io/doc/group__reductions.html for more detail template <typename T> struct linear_index_to_row_index : public thrust::unary_function<T,T> { T C; // number of columns __host__ __device__ linear_index_to_row_index(T C) : C(C) {} __host__ __device__ T operator()(T i) { return i / C; } }; template <typename Dtype> void ROIWarpingLayer<Dtype>::Backward_gpu(const vector<Blob<Dtype>*>& top, const vector<bool>& propagate_down, const vector<Blob<Dtype>*>& bottom) { const Dtype* bottom_data = bottom[0]->gpu_data(); const Dtype* bottom_rois = bottom[1]->gpu_data(); const Dtype* top_diff = top[0]->gpu_diff(); Dtype* bottom_diff = bottom[0]->mutable_gpu_diff(); int count = bottom[0]->count(); caffe_gpu_set(count, Dtype(0.), bottom_diff); Dtype* argmax_data_h = max_idx_h_.mutable_gpu_data(); Dtype* argmax_data_w = max_idx_w_.mutable_gpu_data(); const Dtype* top_data = top[0]->gpu_data(); // backpropgation to feature map if (propagate_down[0]) { ROIWarpingBackwardFeature<Dtype> <<<CAFFE_GET_BLOCKS(count), CAFFE_CUDA_NUM_THREADS >>> (count, top_diff, argmax_data_h, argmax_data_w, top[0]->num(), spatial_scale_, channels_, height_, width_, pooled_height_, pooled_width_, bottom_diff, bottom_rois); } Dtype* bottom_rois_diff = bottom[1]->mutable_gpu_diff(); count = bottom[1]->count(); caffe_gpu_set(count, Dtype(0.), bottom_rois_diff); // backpropgation to coordinate // note: for each ROI, every element of the output feature map has derivative on its coordinate // but it will be very slow if we aggregate all the gradient inside CUDA kernel // therefore we pre-computed the dirivative of coordinate for each output element (stored in buffer_) // and then use thrust reduce_by_key to get summation of this values if (propagate_down[1]) { Dtype* buffer_data = buffer_.mutable_gpu_diff(); const int buffer_count = buffer_.count(); caffe_gpu_set(buffer_count, Dtype(0.), buffer_data); ROIWarpingBackwardCoordinate<Dtype><<<CAFFE_GET_BLOCKS(buffer_count), CAFFE_CUDA_NUM_THREADS>>>( buffer_count, pooled_width_, pooled_height_, width_, height_, channels_, spatial_scale_, bottom_rois, bottom_data, argmax_data_h, argmax_data_w, top_diff, buffer_data); // this is a standard practice for thrush::reduce_by_key // you may refer https://github.com/thrust/thrust/blob/master/examples/sum_rows.cu for more detail int R = bottom[1]->num() * 5; int C = channels_ * pooled_height_ * pooled_width_; thrust::device_vector<Dtype> array(R*C); thrust::copy(buffer_data, buffer_data+buffer_count, array.begin()); thrust::device_vector<Dtype> row_sums(R); thrust::device_vector<int> row_indices(R); thrust::reduce_by_key( thrust::make_transform_iterator(thrust::counting_iterator<int>(0), linear_index_to_row_index<int>(C)), thrust::make_transform_iterator(thrust::counting_iterator<int>(0), linear_index_to_row_index<int>(C)) + (R*C), array.begin(), row_indices.begin(), row_sums.begin(), thrust::equal_to<int>(), thrust::plus<Dtype>()); // copy back the result value to Caffe's blob thrust::copy(row_sums.begin(), row_sums.end(), bottom_rois_diff); } CUDA_POST_KERNEL_CHECK; } INSTANTIATE_LAYER_GPU_FUNCS(ROIWarpingLayer); } // namespace caffe
--- abstract: 'We show that every block of category $\O$ for the general linear Lie superalgebra $\mathfrak{gl}_{m|n}(\operatorname{{\Bbbk}})$ is equivalent to some corresponding block of category $\O$ for the queer Lie superalgebra $\q_{m+n}(\operatorname{{\Bbbk}})$. This implies the truth of the Kazhdan-Lusztig conjecture for the so-called type A blocks of category $\O$ for the queer Lie superalgebra as formulated by Cheng, Kwon and Wang.' author: - Jonathan Brundan and Nicholas Davidson title: 'Type A blocks of super category $\O$' --- [^1] Introduction ============ In this article, we study the analog of the BGG category $\O$ for the Lie superalgebra $\mathfrak{q}_n(\operatorname{{\Bbbk}})$. Recent work of Chen [@C] has reduced most questions about this category just to the study of three particular types of block, which we refer to here as the type A, type B and type C blocks. Type B blocks (which correspond to integral weights) were investigated already by the first author in [@B1], leading to a Kazhdan-Lusztig conjecture for characters of irreducibles in such blocks in terms of certain canonical bases for the quantum group of type B$_\infty$. In [@CKW], Cheng, Kwon and Wang formulated analogous conjectures for the type A blocks (defined below) and the type C blocks (which correspond to half-integral weights) in terms of canonical bases of quantum groups of types A$_\infty$ and C$_\infty$, respectively. The main goal of the article is to prove the Cheng-Kwon-Wang conjecture for type A blocks ([@CKW Conjecture 5.14]). To do this, we use some tools from higher representation theory to establish an equivalence of categories between the type A blocks of category $\mathcal O$ for the Lie superalgebra $\mathfrak{q}_n(\operatorname{{\Bbbk}})$ and integral blocks of category $\mathcal O$ for a general linear Lie superalgebra. This reduces the Cheng-Kwon-Wang conjecture for type A blocks to the Kazhdan-Lusztig conjecture of [@B0], which was proved already in [@CLW; @BLW]. Regarding the types B and C conjectures, Tsuchioka discovered in 2010 that the type B canonical bases considered in [@B1] fail to satisfy appropriate positivity properties, so that the conjecture from [@B1] is certainly false. Moreover, after the first version of [@CKW] appeared, Tsuchioka pointed out similar issues with the type C canonical bases studied in [@CKW], so that the Cheng-Kwon-Wang conjecture for type C blocks as formulated in the first version of their article ([@CKW Conjecture 5.10]) also seems likely to be incorrect. In fact, the techniques developed in this article can be applied also to the study of the type C blocks. This will be spelled out in a sequel to this paper [@BDC]. In this sequel, we prove a modified version of the Cheng-Kwon-Wang conjecture for type C blocks: one needs to replace Lusztig’s canonical basis with Webster’s “orthodox basis” arising from the indecomposable projective modules of the tensor product algebras of [@Web $\S$4]. This modified conjecture was proposed independently by Cheng, Kwon and Wang in a revision of their article ([@CKW Conjecture 5.12]). It is not as satisfactory as the situation for type A blocks, since there is no elementary algorithm to compute Webster’s basis explicitly (unlike the canonical basis). Also in the sequel, we will prove [@CKW Conjecture 5.13], and settle [@CKW Question 5.1] by identifying the category of finite-dimensional half-integer weight representations of $\q_n(\operatorname{{\Bbbk}})$ with a previously known highest weight category (as suggested by [@CK Remark 6.7]). There is more to be said about type B blocks too; in fact, these are the most intriguing of all. Whereas the types A and C blocks carry the additional structure of tensor product categorifications in the sense of [@LW; @BLW] for the infinite rank Kac-Moody algebras of types A$_\infty$ and C$_\infty$, respectively, the type B blocks produce an example of a tensor product categorification of [*odd*]{} type B$_\infty$, i.e. one needs a [*super*]{} Kac-Moody 2-category in the sense of [@BE2]. This will be developed in subsequent work by the second author. In the remainder of the introduction, we are going to formulate our main result for type A blocks in more detail. To do this, we first briefly recall some basic notions of superalgebra. Let $\operatorname{{\Bbbk}}$ be a ground field which is algebraically closed of characteristic zero, and fix a choice of $\sqrt{-1}\in\operatorname{{\Bbbk}}$. We adopt the language of [@BE Definition 1.1]: - A [*supercategory*]{} is a category enriched in the symmetric monoidal category of vector superspaces, i.e. the category of $\operatorname{\mathbb{Z}}/2$-graded vector spaces over $\operatorname{{\Bbbk}}$ with morphisms that are parity-preserving linear maps. - Any morphism in a supercategory decomposes uniquely into an even and an odd morphism as $f = f_\0 + f_\1$. A [*superfunctor*]{} between supercategories means a $\operatorname{{\Bbbk}}$-linear functor which preserves the parities of morphisms. - For superfunctors $F, G : \C \to \operatorname{\mathcal{D}}$, a *supernatural transformation* $\eta : F \Rightarrow G$ is a family of morphisms $\eta_M = \eta_{M,\0} + \eta_{M,\1} : FM \to GM$ for each $M\in\ob \C$, such that $\eta_{N,p} \circ Ff = (-1)^{|f|p} Gf \circ \eta_{M,p}$ for every homogeneous morphism $f:M \rightarrow N$ in $\C$ and each $p \in \operatorname{\mathbb{Z}}/2$. For any supercategory $\C$, the [*Clifford twist*]{} $\C^{\CT}$ is the supercategory whose objects are pairs $(X, \phi)$ for $X \in \ob \C$ and $\phi \in \operatorname{End}_\C(X)_\1$ with $\phi^2 = \operatorname{{\operatorname{id}}}$, and whose morphisms $f:(X,\phi) \rightarrow (X',\phi')$ are morphisms $f:X \rightarrow X'$ in $\C$ such that $f_p \circ \phi = (-1)^p \phi'\circ f_p$ for each $p \in \operatorname{\mathbb{Z}}/2$. One can also take Clifford twists of superfunctors and supernatural transformations (details omitted), so that $\CT$ is actually a 2-superfunctor from the 2-supercategory of supercategories to itself in the sense of [@BE Definition 2.2]. The following basic lemma is a variation on [@KKT Lemma 2.3]. [**Lemma.**]{} *Suppose $\C$ is a supercategory such that* - $\C$ is additive; - $\C$ is $\Pi$-complete, i.e. every object of $\C$ is the target of an odd isomorphism; - all even idempotents split. Then the supercategories $\C$ and $(\C^\CT)^\CT$ are superequivalent. Note that objects in the supercategory $(\C^\CT)^\CT$ consist of triples $(X, \phi, \psi)$ for $X \in \ob \C$ and $\phi, \psi \in \operatorname{End}_\C(X)_\1$ such that $\phi^2 = \psi^2 = \operatorname{{\operatorname{id}}}$ and $\phi \circ \psi = - \psi\circ \phi$. Morphisms $f:(X, \phi, \psi) \rightarrow (X', \phi',\psi')$ in $(\C^\CT)^\CT$ are morphisms $f:X \rightarrow X'$ in $\C$ such that $f_p \circ \phi = (-1)^p \phi'\circ f_p$, and $f_p \circ \psi = (-1)^p \psi' \circ f_p$ for each $p \in \operatorname{\mathbb{Z}}/2$. Define a superfunctor $F:\C \rightarrow (\C^\CT)^\CT$ as follows. On an object $X \in \ob \C$, let $F X := (X \oplus \Pi X, \phi, \psi)$ where $$\phi =\left(\begin{array}{cc}0 & \zeta_X \\ \zeta_X^{-1} & 0\end{array}\right), \qquad \psi = \left(\begin{array}{cc}0 & -\sqrt{-1}\zeta_X \\ \sqrt{-1}\zeta_X^{-1} & 0\end{array}\right).$$ On a homogeneous morphism $f:X \rightarrow X'$, we let $Ff:FX \rightarrow FX'$ be the morphism defined by the matrix $\left( \begin{array}{rr} f&0\\ 0&\Pi f \end{array}\right)$, where $\Pi f:\Pi X \rightarrow \Pi X'$ denotes $(-1)^{|f|} \zeta_{X'}^{-1} \circ f \circ \zeta_X$. We show that $F$ is a superequivalence by checking that it is full, faithful and evenly dense (see [@BE]). It is obviously faithful. To see that it is full, take an arbitrary homogeneous morphism $f:F X \rightarrow F X'$ in $(\C^\CT)^\CT$. Viewing $f$ as a $2 \times 2$ matrix $\left(\begin{array}{ll}f_{11}&f_{12}\\f_{21}&f_{22}\end{array}\right)$ of morphisms in $\C$, we need to show that $f_{12} = f_{21} = 0$ and $f_{22} = \Pi f_{11}$. This follows easily on considering the matrix entries in the identities $\phi' \circ f = (-1)^{|f|} f \circ \phi$ and $\psi' \circ f = (-1)^{|f|} f \circ \psi$. Finally, to check that $F$ is evenly dense, we take any object $(X, \phi, \psi) \in \ob (\C^\CT)^\CT$, and must show that it is evenly isomorphic to an object in the image of $F$. Let $$e_1 := \frac{1-\sqrt{-1}\phi \circ \psi}{2}, \qquad e_2 := \frac{1+\sqrt{-1}\phi \circ \psi}{2}.$$ These are mutually orthogonal idempotents summing to the identity in $\operatorname{End}_\C(X)_\0$. Hence, we may decompose $X$ as $X = X_1 \oplus X_2$ with $X_i$ being the image of $e_i$. We then have that $\phi = e_2 \circ \phi \circ e_1 + e_1 \circ \phi \circ e_2$, and similarly for $\psi$. Now we observe that $$e_2 \circ \psi \circ e_1 = e_2 \circ \psi = \frac{\psi+\sqrt{-1}\phi}{2} = \sqrt{-1} \,\phi \circ e_1 = \sqrt{-1} \,e_2 \circ \phi \circ e_1.$$ Similarly, $e_1 \circ \psi \circ e_2 = - \sqrt{-1} \,e_1 \circ \phi \circ e_2$. The map $e_2 \circ \phi \circ e_1 \circ \zeta_{X_1}$ is an even isomorphism $\Pi X_1 \stackrel{\sim}{\rightarrow} X_2$, hence, $X = X_1 \oplus X_2 \cong X_1 \oplus \Pi X_1 = F X_1$. Under this isomorphism, $\phi = e_2 \circ \phi \circ e_1 + e_1 \circ \phi \circ e_2$ corresponds to the matrix $ \left(\begin{array}{cc}0 & \zeta_{X_1} \\ \zeta_{X_1}^{-1} & 0\end{array}\right)$. Similarly, $\psi = \sqrt{-1}\, e_2 \circ \phi \circ e_1 - \sqrt{-1}\, e_1 \circ \phi \circ e_2$ corresponds to $ \left(\begin{array}{cc}0 & -\sqrt{-1}\zeta_{X_1} \\ \sqrt{-1}\zeta_{X_1}^{-1} & 0\end{array}\right)$. This verifies that $(X,\phi,\psi)$ is evenly isomorphic to $F X_1$. For example, suppose that $A$ is a locally unital superalgebra, i.e. an associative superalgebra $A = A_\0 \oplus A_\1$ equipped with a distinguished collection $\{1_x\:|\:x \in X\}$ of mutually orthogonal even idempotents such that $A = \bigoplus_{x, y \in X} 1_y A 1_x$. Then there is a supercategory $A\operatorname{\text{-}smod}$ consisting of finite-dimensional left $A$-supermodules $M$ which are locally unital in the sense that $M = \bigoplus_{x \in X} 1_x M$. Even morphisms in $A\operatorname{\text{-}smod}$ are parity-preserving linear maps such that $f(av) = a f(v)$ for all $a \in A, v \in M$; odd morphisms are parity-reversing linear maps such that $f(av) = (-1)^{|a|} a f(v)$ for homogeneous $a$. There is an obvious isomorphism between the Clifford twist $A\operatorname{\text{-}smod}^\CT$ of this supercategory and the supercategory $A\otimes C_1 \operatorname{\text{-}smod}$, where $C_1$ denotes the rank one Clifford superalgebra generated by an odd involution $c$, and $A \otimes C_1$ is the usual braided tensor product of superalgebras. Hence, $(A\operatorname{\text{-}smod}^\CT)^\CT$ is isomorphic to $A \otimes C_2 \operatorname{\text{-}smod}$ where $C_2 := C_1 \otimes C_1$ is the rank two Clifford superalgebra generated by $c_1 := c \otimes 1$ and $c_2 := 1 \otimes c$. In this situation, the above lemma is obvious as $A \otimes C_2$ is isomorphic to the matrix superalgebra $M_{1|1}(A)$, which is Morita superequivalent to $A$. Now fix $n \geq 1$ and let $\mathfrak{g} = \g_\0\oplus\g_\1$ be the Lie superalgebra $\q_n(\operatorname{{\Bbbk}})$. Recall this is the subalgebra of the general linear Lie superalgebra $\mathfrak{gl}_{n|n}(\operatorname{{\Bbbk}})$ consisting of all matrices of block form $$\label{blockform} \left( \begin{array}{c|c} A & B \\\hline B & A \end{array} \right).$$ Let $\mathfrak{b}$ (resp. $\mathfrak{h}$) be the standard Borel (resp. Cartan) subalgebra of $\mathfrak{g}$ consisting of all matrices (\[blockform\]) in which $A$ and $B$ are upper triangular (resp. diagonal). Let $\mathfrak{t} := \mathfrak{h}_{\0}$. We let $\delta_1,\dots,\delta_n$ be the basis for $\mathfrak{t}^*$ such that $\delta_i$ picks out the $i$th diagonal entry of the matrix $A$. Fix also a [sign sequence]{} $\bsigma = (\sigma_1,\dots,\sigma_n)$ with each $\sigma_r \in \{\pm \}$, and a scalar $z \in \operatorname{{\Bbbk}}$ such that $2z \notin \operatorname{\mathbb{Z}}$. [**We stress that all of our subsequent notation depends implicitly on these choices.**]{} It will be convenient to index certain weights in $\mathfrak{t}^*$ by the set $\mathbf{B} := \operatorname{\mathbb{Z}}^n$ via the following [*weight dictionary*]{}: for $\bb = (b_1,\dots,b_n) \in \operatorname{\mathbf{B}}$ let $$\label{wtdict1} \lambda_\bb := \sum_{r=1}^n \lambda_{\bb,r} \delta_r \quad\text{where}\quad \lambda_{\bb,r} := \sigma_r(z+b_r).$$ We let $\sO$ be the category of all $\mathfrak{g}$-supermodules $M$ satisfying the following properties: - $M$ is finitely generated as a $\mathfrak{g}$-supermodule; - $M$ is locally finite-dimensional over $\mathfrak{b}$; - $M$ is semisimple over $\t$ with all weights of the form $\lambda_\bb$ for $\bb \in \operatorname{\mathbf{B}}$. Morphisms in $\sO$ are arbitrary (not necessarily even) $\mathfrak{g}$-supermodule homomorphisms, so that it is a supercategory. It also admits a parity switching functor $\Pi$. The [*type A blocks*]{} mentioned earlier are the blocks of $\sO$ for all possible choices of $\bsigma$ and $z$. For each $\bb \in \operatorname{\mathbf{B}}$, there is an irreducible supermodule $L(\bb) \in \ob \sO$ of highest weight $\lambda_\bb$. Note the highest weight space of $L(\bb)$ is not one-dimensional: it is some sort of irreducible Clifford supermodule over the Cartan subalgebra $\h$. Every irreducible supermodule in $\sO$ is isomorphic to $L(\bb)$ for a unique $\bb \in \operatorname{\mathbf{B}}$ via a homogeneous (but not necessarily even) isomorphism. If $n$ is odd, $L(\bb)$ is of type $\ttQ$, i.e., $L(\bb)$ is evenly isomorphic to its parity flip $\Pi L(\bb)$. When $n$ is even, the irreducible $L(\bb)$ is of type $\ttM$, and we should explain how to distinguish it from its parity flip. For each $i \in \operatorname{\mathbb{Z}}$, we fix a choice $\sqrt{z+i}$ of a square root of $z+i$, then set $\sqrt{-(z+i)} := (-1)^{i} \sqrt{-1} \sqrt{z+i}$. The key point about this is that $$\label{violin} \sqrt{-(z+i)} \sqrt{-(z+i+1)} = \sqrt{z+i}\sqrt{z+i+1}$$ for each $i \in \operatorname{\mathbb{Z}}$. Let $d_r' \in \g_\1$ be the matrix of the form (\[blockform\]) such that $A = 0$ and $B$ is the $r$th diagonal matrix unit. Then, for even $n$, we assume that $L(\bb)$ is chosen so that $d_1' \cdots d_n'$ acts on any even highest weight vector by the scalar $(\sqrt{-1})^{n/2} \sqrt{\lambda_{\bb,1}} \cdots \sqrt{\lambda_{\bb,n}}$. This determines $L(\bb)$ uniquely up to even isomorphism. Turning our attention to the category on the other side of our main equivalence, let $\mathfrak{g}'$ be the general linear Lie superalgebra consisting of $n \times n$ matrices under the supercommutator, with $\operatorname{\mathbb{Z}}/2$-grading defined by declaring that the $rs$-matrix unit is even if $\sigma_r = \sigma_s$ and odd if $\sigma_r \neq \sigma_s$. Let $\mathfrak{b}'$ (resp. $\mathfrak{t}'$) be the standard Borel (resp. Cartan) subalgebra consisting of upper triangular (resp. diagonal) matrices in $\mathfrak{g}'$. As before, we let $\delta_1',\dots,\delta_n'$ be the basis for $(\mathfrak{t}')^*$ defined by the diagonal coordinate functions. We introduce another [*weight dictionary*]{} (which in this setting is some “signed $\rho$-shift”): for $\bb \in \operatorname{\mathbf{B}}$, let $$\label{wtdict} \lambda_\bb' := \sum_{r=1}^n \lambda_{\bb,r}' \delta_r' \quad\text{where}\quad \lambda_{\bb,r}' := \sigma_r \left(b_r + \sigma_1 1 +\cdots+\sigma_{r-1} 1 +\half(\sigma_r 1-1)\right).$$ Let $\sO'$ be the supercategory of $\g'$-supermodules $M'$ such that - $M'$ is finitely generated as a $\g'$-supermodule; - $M'$ is locally finite-dimensional over $\b'$; - $M'$ is semisimple over $\t'$ with all weights of the form $\lambda'_\bb$ for $\bb \in \operatorname{\mathbf{B}}$. Note $\sO'$ is the sum of all of the blocks of the usual category $\O$ for $\g'$ corresponding to integral weights of $\t'$. For each $\bb \in \operatorname{\mathbf{B}}$, there is a unique (up to even isomorphism) irreducible supermodule $L'(\bb) \in \ob \sO'$ generated by a homogeneous highest weight vector of weight $\lambda'_\bb$ and parity $ \sum_{\sigma_r = -} \lambda'_{\bb,r} \pmod{2}. $ [**Main Theorem.**]{} [*If $n$ is even then there is a superequivalence $\mathbb{E}:\sO \rightarrow \sO'$ such that $\mathbb{E} L(\bb)$ is evenly isomorphic to $L'(\bb)$ for each $\bb \in \operatorname{\mathbf{B}}$. If $n$ is odd then there is a superequivalence $\mathbb{E}:\sO \rightarrow (\sO')^\CT$ such that $\mathbb{E} L(\bb)$ is evenly isomorphic to $(L'(\bb)\oplus \Pi L'(\bb), \phi)$ for either of the two choices of odd involution $\phi$.* ]{} If $\C$ is any $\operatorname{{\Bbbk}}$-linear category, we let $\C \oplus \Pi \C$ be the supercategory whose objects are formal direct sums $V_1 \oplus \Pi V_2$ for $V_1, V_2 \in \ob \C$, with morphisms $V_1 \oplus \Pi V_2 \rightarrow W_1 \oplus \Pi W_2$ being matrices of the form $f = \left( \begin{array}{cc} f_{11} & f_{12} \\ f_{21} & f_{22} \end{array} \right)$ for $f_{ij} \in \operatorname{Hom}_\C(V_j,W_i)$. The $\operatorname{\mathbb{Z}}/2$-grading is defined so that $f_\0 = \left( \begin{array}{cc} f_{11} & 0 \\ 0 & f_{22} \end{array} \right)$ and $f_\1 = \left( \begin{array}{cc} 0 & f_{12} \\f_{21} & 0 \end{array} \right)$. For example, if $\C$ is the category $A\operatorname{\text{-}mod}$ of finite-dimensional locally unital modules over some locally unital algebra $A$, then $\C \oplus \Pi \C$ may be identified with the category $A\operatorname{\text{-}smod}$, viewing $A$ as a purely even superalgebra. It was noticed originally in [@B0] that the category $\sO'$ can be decomposed in this way: let $\O'$ be full subcategory of $\sO'$ consisting of all $\g'$-supermodules whose $\lambda'_\bb$-weight space is concentrated in parity $\sum_{\sigma_r = -} \lambda'_{\bb,r} \pmod{2}$ for each $\bb \in \operatorname{\mathbf{B}}$; obviously, there are no non-zero odd morphisms between objects of $\O'$. Then $\sO'$ decomposes as $\sO' = \O' \oplus \Pi \O'$. Moreover, $\O'$ is a highest weight category with irreducible objects $\{L'(\bb)\:|\:\bb \in \operatorname{\mathbf{B}}\}$ indexed by the set $\operatorname{\mathbf{B}}$ as above. In fact, $\O'$ equivalent to $A\operatorname{\text{-}mod}$ for a locally unital algebra $A$ such that the left ideals $A 1_x$ and right ideals $1_x A$ are finite-dimensional for all distinguished idempotents $1_x \in A$. Although not needed here, the results of [@BLW] imply further that the algebra $A$ may be equipped with a $\operatorname{\mathbb{Z}}$-grading making it into a (locally unital) [*Koszul algebra*]{}; this leads to the definition of a graded analog of the category $\O'$ similar in spirit to Soergel’s graded lift of classical category $\O$ as in e.g. [@BGS]. Combining these remarks with our Main Theorem, we deduce: - For even $n$, the category $\sO$ decomposes as $\sO = \O \oplus \Pi \O$, where $\O$ is the Serre subcategory generated by the irreducible supermodules $\{L(\bb)\:|\:\bb \in \operatorname{\mathbf{B}}\}$ introduced above (but [*not*]{} their parity flips). Moreover, $\O$ is equivalent to $\O'$, hence, to the category $A\operatorname{\text{-}mod}$ where $A$ is the Koszul algebra just introduced. - For odd $n$, $\sO$ is superequivalent to $A \otimes C_1 \operatorname{\text{-}smod}$, viewing $A$ as a purely even superalgebra. This implies that the underlying category $\underline{\sO}$ consisting of the same objects as $\sO$ but only its even morphisms is equivalent to $A \operatorname{\text{-}mod}$, hence, to $\O'$. As already mentioned, the Kazhdan-Lusztig conjecture for $\sO$ formulated in [@CKW] follows immediately from this discussion together with the Kazhdan-Lusztig conjecture for $\O'$ proved in [@CLW; @BLW]. There is also a parabolic analog of our Main Theorem. Let $\nu = (\nu_1,\dots,\nu_l)$ be a composition of $n$ with $\sigma_r = \sigma_s$ for all $\nu_1+\cdots+\nu_{k-1}+1 \leq r < s \leq \nu_1+\cdots+\nu_k$ and $k=1,\dots,l$. Let $\mathfrak{p}_\nu$ be the corresponding standard parabolic subalgebra of $\g$, i.e. the matrices $A$ and $B$ in (\[blockform\]) are block upper triangular with diagonal blocks of shape $\nu$. Let $\sO_\nu$ be the corresponding parabolic analog of the category $\sO$, i.e. it is the full subcategory of $\sO$ consisting of all supermodules that are locally finite-dimensional over $\mathfrak{p}_\nu$. Similarly, there is a standard parabolic subalgebra $\mathfrak{p}'_\nu$ of $\g'$ consisting of block upper triangular matrices of shape $\nu$, and we let $\sO'_\nu$ be the analogously defined parabolic subcategory of $\sO'$. Various special cases of the following corollary for maximal parabolics/two-part compositions $\nu$ were known before; see [@C $\S$4] and [@CC]. [**Corollary.**]{} [*If $n$ is even then $\sO_\nu$ is superequivalent to $\sO_\nu'$. If $n$ is odd then $\sO_\nu$ is superequivalent to $(\sO_\nu')^\CT$.* ]{} This follows from our Main Theorem on observing that $\sO_\nu$ and $\sO_\nu'$ may be defined equivalently as the Serre subcategories of $\sO$ and $\sO'$ generated by the irreducible supermodules $\{L(\bb), \Pi L(\bb)\}$ and $\{L'(\bb), \Pi L'(\bb)\}$, respectively, for $\bb \in \operatorname{\mathbf{B}}$ such that the following hold for $r \notin\{\nu_1,\nu_1+\nu_2,\dots,\nu_1+\cdots+\nu_l\}$: - if $\sigma_r = +$ then $b_r > b_{r+1}$; - if $\sigma_r = -$ then $b_r < b_{r+1}$. (This assertion is a well-known consequence of the construction of parabolic Verma supermodules in $\sO$ and $\sO'$, respectively; see e.g. [@M].) In order to prove the Main Theorem, we will exploit the following powerful theorem established in [@BLW]: the category $\O'$ defined above is the unique (up to strongly equivariant equivalence) $\mathfrak{sl}_\infty$-tensor product categorification of the module $$V^{\otimes \bsigma} := V^{\sigma_1} \otimes \cdots \otimes V^{\sigma_n},$$ where $V^{+}$ denotes the natural $\mathfrak{sl}_\infty$-module and $V^{-}$ denotes its dual. Hence, for even $n$, it suffices to show that the category $\sO$ decomposes as $\O \oplus \Pi \O$ for some $\mathfrak{sl}_\infty$-tensor product categorification $\O$ of $V^{\otimes \bsigma}$. For odd $n$, we show instead that $\sO^{\CT}$ decomposes as $\O \oplus \Pi \O$ for some $\mathfrak{sl}_\infty$-tensor product categorification $\O$ of $V^{\otimes \bsigma}$, hence, $\sO^\CT$ is superequivalent to $\sO'$. The Main Theorem then follows on taking Clifford twists, using also the lemma formulated above. In both the even and odd cases, our argument relies crucially also on an application of the main result of [@KKT]. We remark finally that the more general parabolic supercategories $\sO_\nu$ may be used to give new realizations of the more general sorts of $\mathfrak{sl}_\infty$-tensor product categorifications considered in [@BLW] involving exterior powers of $V^{\pm}$. [*Acknowledgements.*]{} We thank the authors of [@CKW] for several helpful discussions at the KIAS conference “Categorical Representation Theory and Combinatorics" in December 2015, and Shunsuke Tsuchioka for sharing his computer-generated counterexamples to the type B and C conjectures. Verma supermodules {#s2} ================== We continue with $n \geq 1$, $\bsigma = (\sigma_1,\dots,\sigma_n) \in \{\pm 1\}^n$, and $z \in \operatorname{{\Bbbk}}$ with $2z \notin \operatorname{\mathbb{Z}}$. Let $m := \lceil n/2 \rceil$, so that $n=2m$ or $2m-1$. Also set $$\label{jdef} I := \operatorname{\mathbb{Z}}, \qquad J := \left\{\pm \sqrt{z+i}\sqrt{z+i+1}\:\Big|\:i \in I\right\},$$ where the square roots are as chosen in the introduction. In this paragraph, we work with the Lie superalgebra $\widehat\g := \mathfrak{gl}_{2m|2m}(\operatorname{{\Bbbk}})$ in order to introduce some coordinates. Let $\widehat{U}$ be the natural $\widehat\g$-supermodule with standard basis $u_1,\dots,u_{4m}$. Write $x_{r,s}$ for the $rs$-matrix unit in $\widehat\g$, so $x_{r,s} u_t = \delta_{s,t} u_r$. We denote the odd basis vectors $u_{2m+1}, \dots, u_{4m}$ instead by $u_1',\dots,u_{2m}'$. For $1 \leq r,s \leq 2m$, we set $$\begin{aligned} \label{cough1} e_{r,s} &:= x_{r,s} + x_{2m+r,2m+s}, & e'_{r,s} &:= x_{r,2m+s}+x_{2m+r,s},\\\label{cough2} f_{r,s} &:= x_{r,s} - x_{2m+r,2m+s}, & f'_{r,s} &:= x_{r,2m+s} - x_{2m+r,s}.\\\intertext{Also let} d_r &:= e_{r,r},& d'_r &:= e_{r,r}'.\end{aligned}$$ Then we have that $$\begin{aligned} \label{f1} e_{r,s} u_t &= \delta_{s,t} u_r, & e_{r,s} u_t' &= \delta_{s,t} u_r', & e_{r,s}' u_t&= \delta_{s,t} u_r', & e_{r,s}' u_t' &= \delta_{s,t} u_r,\\ \label{f2} f_{r,s} u_t &= \delta_{s,t} u_r, & f_{r,s} u_t' &= -\delta_{s,t} u_r', & f_{r,s}' u_t&= -\delta_{s,t} u_r', & f_{r,s}' u_t' &= \delta_{s,t} u_r.\end{aligned}$$ Finally let $\widehat{U}^*$ be the dual supermodule to $\widehat{U}$, with basis $\phi_1,\dots,\phi_{2m}, \phi_1',\dots,\phi_{2m}'$ that is dual to the basis $u_1,\dots,u_{2m}, u_1',\dots,u_{2m}'$. We have that $$\begin{aligned} \label{f3} e_{r,s} \phi_t &= - \delta_{r,t} \phi_s, & e_{r,s} \phi_t' &= -\delta_{r,t} \phi_s',& e_{r,s}' \phi_t &= - \delta_{r,t} \phi'_s, & e_{r,s}' \phi'_t &= \delta_{r,t} \phi_s,\\\label{f4} f_{r,s} \phi_t &= -\delta_{r,t} \phi_s, & f_{r,s} \phi_t' &= \delta_{r,t} \phi_s', & f_{r,s}' \phi_t &= -\delta_{r,t} \phi'_s, & f_{r,s}' \phi'_t &= -\delta_{r,t} \phi_s. \end{aligned}$$ When $n$ is even, we continue with $\g, \b$ and $\h$ as in the introduction, so $\g$ is the subalgebra of $\widehat\g$ spanned by $\{e_{r,s}, e_{r,s}'\:|\:1 \leq r,s \leq n\}$, while $\h$ has basis $\{d_r, d_r'\:|\:1 \leq r \leq 2m\}$. However, when $n$ is odd, it is convenient to change some of this notation. The point of doing this is to unify our treatment of even and odd $n$ as much as possible in the remainder of the article. So, if $n$ is odd, we henceforth [*redefine*]{} $\g, \b$ and $\h$ as follows: - $\g$ denotes the Lie superalgebra $\mathfrak{q}_n(\operatorname{{\Bbbk}}) \oplus \mathfrak{q}_1(\operatorname{{\Bbbk}})$, which we identify with the subalgebra of $\widehat{\g}$ spanned by $\{e_{r,s}, e_{r,s}'\:|\:1 \leq r,s \leq n\} \sqcup \{d_{2m}, d_{2m}'\}$. - $\b$ is the Borel subalgebra spanned by $\{e_{r,s}, e_{r,s}'\:|\:1 \leq r \leq s \leq n\} \sqcup \{d_{2m}, d_{2m}'\}$; - $\h$ is the Cartan subalgebra spanned by $\{d_r, d_r'\:|\:1 \leq r \leq 2m\}$. In both the even and the odd cases, the subspaces $U \subseteq \widehat{U}$ and $U^* \subseteq \widehat{U}^*$ spanned by $u_1,\dots,u_n, u_1',\dots, u_n'$ and $\phi_1,\dots,\phi_n, \phi_1',\dots,\phi_n'$, respectively, may be viewed as $\g$-supermodules. Also set $\t := \h_\0$ and let $\delta_1,\dots,\delta_{2m}$ be the basis for $\t^*$ that is dual to the basis $d_1,\dots,d_{2m}$ for $\t$. For $\bb \in \operatorname{\mathbf{B}}$, we define $\lambda_\bb$ according to (\[wtdict1\]) if $n$ is even, but redefine it in the odd case as $$\label{wtdict2} \lambda_\bb := \sum_{r=1}^n \lambda_{\bb,r} \delta_r + \delta_{2m} \quad\text{where}\quad \lambda_{\bb,r} := \sigma_r(z+b_r).$$ We also introduce the tuple $\bd_r \in \operatorname{\mathbf{B}}$ which has $1$ as its $r$th entry and $0$ in all other places, so that $$\label{handier} \lambda_\bb \pm \delta_r = \lambda_{\bb \pm \sigma_r \bd_r}.$$ Then we define $\sO$ exactly as we did in the introduction but using the current choices for $\g, \b, \t$ and $\lambda_\bb$. This is exactly the same category as in the introduction when $n$ is even, but when $n$ is odd our new version of $\sO$ is superequivalent to the Clifford twist $\sO^\CT$ of the supercategory from the introduction. Indeed, if $M$ is a supermodule in our new $\sO$, the restriction of $M$ to the subalgebra $\q_n(\operatorname{{\Bbbk}})$, equipped with the odd involution defined by the action of $d_{2m}'$, gives an object of the Clifford twist of the supercategory from before. We proceed to define some irreducible $\h$-supermodules $\{\u(\bb)\:|\:\bb \in \operatorname{\mathbf{B}}\}$. Let $C_2$ be the rank 2 Clifford superalgebra with odd generators $c_1,c_2$ subject to the relations $c_1^2 = c_2^2 = 1, c_1 c_2 = - c_2 c_1$. Let $\u$ be the irreducible $C_2$-supermodule on basis $v, v'$ with $v$ even and $v'$ odd, and action defined by $$c_1 v = v', \quad c_1 v' = v, \quad c_2 v = \sqrt{-1} v', \quad c_2 v' = - \sqrt{-1} v.$$ Then, for $\bb \in \operatorname{\mathbf{B}}$, we set $\u(\bb) := \u^{\otimes m}$. For $1 \leq r \leq n$, we let $d_r$ act by the scalar $\lambda_{\bb,r}$ and $d_r'$ act by left multiplication by $\sqrt{\lambda_{\bb,r}} \,\operatorname{{\operatorname{id}}}^{\otimes (s-1)}\otimes c_{r+1-2s} \otimes \operatorname{{\operatorname{id}}}^{ \otimes (m-s)}$ where $s := \lfloor r/2 \rfloor$ (and we are using the usual superalgebra sign rules). In the odd case, we also need to define the actions of $d_{2m}$ and $d_{2m}'$: these are the identity and the odd involution $\operatorname{{\operatorname{id}}}^{\otimes(m-1)} \otimes c_2$, respectively. In all cases, $\u(\bb)$ is an irreducible $\h$-supermodule of type $\ttM$, and its $\t$-weight is $\lambda_\bb$. Moreover, by construction, $d_1'\cdots d_{2m}'$ acts on any even (resp. odd) vector in $\u(\bb)$ as $c_\bb$ (resp. $-c_\bb$), where $$\label{y1} c_\bb := (\sqrt{-1})^m \sqrt{\la_{\bb,1}}\cdots \sqrt{\la_{\bb,n}}.$$ The signs here distinguish $\u(\bb)$ from its parity flip. The following is well known; e.g. see [@CW $\S$1.5.4]. \[projectivity\] For $\bb \in \operatorname{\mathbf{B}}$, any $\h$-supermodule that is semisimple of weight $\lambda_\bb$ over $\t$ decomposes as a direct sum of copies of the supermodules $\u(\bb)$ and $\Pi \u(\bb)$. We can identify $\h$-supermodules that are semisimple of weight $\lambda_\bb$ over $\t$ with supermodules over the Clifford superalgebra $C_{2m} := C_2^{\otimes m}$, so that $d_r'\:(r=1,\dots,n)$ acts in the same way as $\sqrt{\lambda_{\bb,r}} \, \operatorname{{\operatorname{id}}}^{\otimes (s-1)}\otimes c_{r+1-2s} \otimes \operatorname{{\operatorname{id}}}^{\otimes (m-s)}$ where $s := \lfloor r/2 \rfloor$, and in the odd case $d_{2m}'$ acts as $\operatorname{{\operatorname{id}}}^{\otimes(m-1)} \otimes c_2$. The lemma then follows since $C_{2m}$ is simple, indeed, it is isomorphic to the matrix superalgebra $M_{2^{n-1}|2^{n-1}}(\operatorname{{\Bbbk}})$. Let $\underline{\sO}$ denote the [*underlying category*]{} consisting of the same objects as $\sO$ but only the even morphisms. This is obviously an Abelian category. In order to parametrize its irreducible objects explicitly, we introduce the *Verma supermodule* $M(\bb)$ for $\bb \in \operatorname{\mathbf{B}}$ by setting $$M(\bb) := U(\g) \otimes_{U(\b)} \u(\bb),$$ where we are viewing $\u(\bb)$ as a $\b$-supermodule by inflating along the surjection $\b \twoheadrightarrow \h$. The weight $\lambda_\bb$ is the highest weight of $M(\bb)$ in the usual *dominance order* on $\t^*$, i.e. $\lambda \leq \mu$ if and only if $\mu-\lambda\in \bigoplus_{r=1}^{n-1} \operatorname{\mathbb{N}}(\delta_r-\delta_{r+1})$. Note also that we can distinguish $M(\bb)$ from its parity flip in the same way as for $\u(\bb)$: the element $d_1'\cdots d_{2m}'$ acts on any even (resp. odd) vector in the highest weight space $M(\bb)_{\lambda_\bb}$ as the scalar $c_\bb$ (resp. $-c_\bb$). As usual, the Verma supermodule $M(\bb)$ has a unique irreducible quotient denoted $L(\bb)$. Thus, $L(\bb)$ is an irreducible $\g$-supermodule of highest weight $\lambda_\bb$, and the action of $d_1' \cdots d_{2m}'$ on its highest weight space distinguishes it from its parity flip. The irreducible supermodules $\{L(\bb), \Pi L(\bb)\:|\:\bb \in \operatorname{\mathbf{B}}\}$ give a complete set of pairwise inequivalent irreducible supermodules in $\underline{\sO}$. The endomorphism algebras of these objects are all one-dimensional, so they are irreducibles of type $\mathtt{M}$. Moreover, by a standard argument involving restricting to the underlying even Lie algebra as in [@B2 Lemma 7.3], we get that $\underline{\sO}$ is a [Schurian category]{} in the following sense (cf. [@BLW $\S$2.1]): \[schurcat\] A [*Schurian category*]{} is a $\operatorname{{\Bbbk}}$-linear Abelian category in which all objects have finite length, there are enough projectives and injectives, and the endomorphism algebras of irreducible objects are all one-dimensional. Let $x^T$ denote the usual transpose of a matrix $x \in \widehat{\g}$. This induces an antiautomorphism of $\g$, i.e. we have that $[x,y]^T = [y^T, x^T]$. Given $M \in \ob \sO$, we can view the direct sum $\bigoplus_{\bb \in \operatorname{\mathbf{B}}} M_{\lambda_\bb}^*$ of the linear duals of the weight spaces of $M$ as a $\g$-supermodule with action defined by $(x f)(v) := f(x^T v)$. Let $M^\star$ be the object of $\sO$ obtained from this by applying also the parity switching functor $\Pi^m$. Making the obvious definition on morphisms, this gives us a contravariant superequivalence $\star : \sO \to \sO$. We have incorporated the parity flip into this definition in order to get the following lemma; this is also checked in [@F Lemma 7] or [@C Lemma 4.7] but we include the proof to consolidate our parity conventions. \[star\] For $\bb \in \operatorname{\mathbf{B}}$, we have that $L(\bb)^\star \cong L(\bb)$ via an even isomorphism. By weight considerations, we either have that $L(\bb)^\star$ is evenly isomorphic to $L(\bb)$ or to $\Pi L(\bb)$. To show that the former holds, take an even highest weight vector $f \in L(\bb)^\star$. We must show that $d_1'\cdots d_{2m}' f = c_\bb f$ (rather than $-c_\bb f$). Remembering the twist by $\Pi^m$ in our definition of $\star$, there is a highest weight vector $v \in L(\bb)$ of parity $m\pmod{2}$ such that $f(v) = 1$. Then we get that $$(d_1' \cdots d_{2m}' f)(v) = f(d_{2m}' \cdots d_1' v) = (-1)^m f(d_1'\cdots d_{2m}' v) = c_\bb f(v).$$ Hence, $d_1'\cdots d_{2m}' f = c_\bb f$. Let $P(\bb)$ be a projective cover of $L(\bb)$ in $\underline{\sO}$. There are even epimorphisms $P(\bb) \twoheadrightarrow M(\bb) \twoheadrightarrow L(\bb)$. Applying $\star$, we deduce that there are even monomorphisms $L(\bb) \hookrightarrow M(\bb)^\star \hookrightarrow P(\bb)^\star$. The supermodule $P(\bb)^\star$ is an injective hull of $L(\bb)$, while $M(\bb)^\star$ is the [*dual Verma supermodule*]{}. The following lemma is well known; it follows from central character considerations (e.g. see [@CW Theorem 2.48]) plus the universal property of Verma supermodules. \[typicaldominant\] Suppose that $\lambda_{\bb}$ is dominant and typical, by which we mean that the following hold for all $1 \leq r < s \leq n$: - if $\sigma_r = \sigma_s$ then $\lambda_{\bb,r} \geq \lambda_{\bb,s}$; - if $\sigma_r \neq \sigma_s$ then $\lambda_{\bb,r}+\lambda_{\bb,s} \neq 0$. Then $M(\bb) = P(\bb)$. Let $\sO^\Delta$ be the full subcategory of $\sO$ consisting of all supermodules possessing a Verma flag, i.e. for which there is a filtration $0 = M_0 \subset \cdots \subset M_l = M$ with sections $M_k / M_{k-1}$ that are evenly isomorphic to $M(\bb)$’s or $\Pi M(\bb)$’s for $\bb \in \operatorname{\mathbf{B}}$. Since the classes of all $M(\bb)$ and $\Pi M(\bb)$ are linearly independent in the Grothendieck group of $\underline{\sO}$, the multiplicities $(M:M(\bb))$ and $(M:\Pi M(\bb))$ of $M(\bb)$ and $\Pi M(\bb)$ in a Verma flag of $M$ are independent of the particular choice of flag. The following lemma follows from the general theory developed in [@B2 $\S$4]. We include a self-contained proof here in order to make this article independent of [@B2]. Later on, we will also give a self-contained proof of another fundamental fact established in [@B2], namely, that the projective supermodules $P(\ba)$ have Verma flags; cf. Theorem \[mainsplitthm\]. \[hom\] For $M \in \ob\sO^\Delta$ and $\bb \in \operatorname{\mathbf{B}}$, we have that $$\begin{aligned} (M:M(\bb)) &= \dim \operatorname{Hom}_{\sO}(M, M(\bb)^\star)_\0,\\ (M:\Pi M(\bb)) &= \dim \operatorname{Hom}_{\sO}(M, M(\bb)^\star)_\1.\end{aligned}$$ Also, any direct summand of $M \in \ob \sO^\Delta$ possesses a Verma flag. The first part of the lemma follows by induction on the length of the Verma flag, using the following two observations: for all $\ba,\bb \in \operatorname{\mathbf{B}}$ we have that - $\operatorname{Hom}_{\sO}(M(\ba), M(\bb)^\star)$ is zero if $\ba \neq \bb$, and it is one-dimensional of even parity if $\ba =\bb$; - $\operatorname{Ext}^1_{\sO}(M(\ba), M(\bb)^\star) = 0$. To check these, for the first one, we use the universal property of $M(\ba)$ to see that $\operatorname{Hom}_{\sO}(M(\ba), M(\bb)^\star)$ is zero unless $\lambda_\ba \leq \lambda_\bb$. Similarly, on applying $\star$, it is zero unless $\lambda_\bb \leq \lambda_\ba$. Hence, we may assume that $\ba = \bb$. Finally, any non-zero homomorphism $M(\ba) \rightarrow M(\ba)^\star$ must send the head to the socle, so $\operatorname{Hom}_{\sO}(M(\ba), M(\ba)^\star)$ is evenly isomorphic to $\operatorname{Hom}_{\sO}(L(\ba), L(\ba)^\star)$, which is one-dimensional and even thanks to Lemma \[star\]. For the second property, we must show that all short exact sequences in $\underline{\sO}$ of the form $0 \to M(\ba)^\star \to M \to M(\bb) \to 0$ or $\Pi M(\ba)^\star \to M \to M(\bb) \to 0$ split. Either $\lambda_{\ba}$ or $\lambda_{\bb}$ is a maximal weight of $M$. In the latter case, using also Lemma \[projectivity\], we can use the universal property of $M(\bb)$ to construct a splitting of $M \twoheadrightarrow M(\bb)$. In the former case, we apply $\star$, the resulting short exact sequence splits as before, and then we dualize again. The final statement of the lemma may be proved by mimicking the argument for semisimple Lie algebras from [@H §3.2]. Special projective superfunctors {#s3} ================================ Next, we investigate the superfunctors $U \otimes -$ and $U^* \otimes -$ defined by tensoring with the $\g$-supermodules $U$ and $U^*$ introduced in the previous section. They clearly preserve the properties of being finitely generated over $\g$, locally finite-dimensional over $\b$, and semisimple over $\t$. Since the $\t$-weights of $U$ and $U^*$ are $\delta_1,\dots,\delta_n$ and $-\delta_1,\dots,-\delta_n$, respectively, and using (\[handier\]), we get for each $M \in \ob \sO$ that all weights of $U \otimes M$ and $U^* \otimes M$ are of the form $\lambda_\bb$ for $\bb \in \operatorname{\mathbf{B}}$. Hence, these superfunctors send objects of $\sO$ to objects of $\sO$, i.e. we have defined $$\label{sfdef} \sF := U \otimes -:\sO \rightarrow \sO, \qquad \sE := U^* \otimes -:\sO \rightarrow \sO.$$ Recalling the notation (\[cough1\])–(\[cough2\]), let $$\label{omegadef} \omega := \sum_{r,s=1}^n \left(f_{r,s}\otimes e_{s,r} - f_{r,s}'\otimes e_{s,r}'\right) \in U(\widehat{\g}) \otimes U(\g).$$ This is essentially the same tensor as in [@HKS (7.2.1)]. Left multiplication by $\omega$ (resp. by $-\omega$) defines a linear map $x_M:U\otimes M \rightarrow U \otimes M$ (resp. $x_M^*:U^* \otimes M \rightarrow U^* \otimes M$) for each $\g$-supermodule $M$. The following lemma shows that these maps define a pair of even supernatural transformations $$\label{xdef} x:\sF \Rightarrow \sF, \qquad x^*:\sE \Rightarrow \sE.$$ This is also established in the proof of [@HKS Theorem 7.4.1], but we give a self-contained argument since it explains the origin of these maps. The linear maps $x_M$ and $x_M^*$ just defined are even $\g$-supermodule homomorphisms. The odd element $$\label{oddz} f' := \sum_{t=1}^n f_{t,t}' \in U(\widehat\g)$$ supercommutes with the elements of $U(\g)$. Hence, $f' \otimes 1 \in U(\widehat{\g}) \otimes U(\g)$ supercommutes with the image of the comultiplication $\Delta:U(\g) \rightarrow U(\g) \otimes U(\g) \subset U(\widehat\g) \otimes U(\g)$. The odd Casimir tensor $$\Omega' := \sum_{r,s=1}^n \left(e_{r,s} \otimes e_{s,r}' - e_{r,s}' \otimes e_{s,r}\right) \in U(\g) \otimes U(\g)$$ also supercommutes with the image of $\Delta$. Hence, the even tensor $$\Omega := \Omega' (f' \otimes 1) = -\sum_{r,s,t=1}^n \left(e_{r,s} f_{t,t}'\otimes e_{s,r}' + e_{r,s}' f_{t,t}'\otimes e_{s,r} \right) \in U(\widehat\g) \otimes U(\g)$$ commutes with the image of $\Delta$. Consequently, left multiplication by $\Omega$ defines even $\g$-supermodule endomorphisms $x_M:U \otimes M \rightarrow U \otimes M$ and $x_M^*:U^* \otimes M\rightarrow U^* \otimes M$. It remains to observe that these endomorphisms agree with the linear maps defined by left multiplication by $\omega$ and $-\omega$, respectively. Indeed, by a calculation using (\[f1\])–(\[f4\]), the elements $e_{r,s} f'_{t,t}$ and $e_{r,s}' f_{t,t}'$ of $U(\widehat\g)$ act on vectors in $U$ (resp. $U^*$) in the same way as $\delta_{s,t} f_{r,s}'$ and $-\delta_{s,t} f_{r,s}$ (resp. $-\delta_{r,t} f_{r,s}'$ and $\delta_{r,t} f_{r,s}$), respectively. \[eigenvalues\] Suppose that $\bb \in \operatorname{\mathbf{B}}$ and let $M := M(\bb)$. 1. There is a filtration $$0 = M_0 \subset M_1 \subset \cdots \subset M_n = U \otimes M$$ with $M_{t} / M_{t-1} \cong M(\bb + \sigma_t \bd_t) \oplus \Pi M(\bb + \sigma_t \bd_t)$ for each $t=1,\dots,n$. The endomorphism $x_{M}$ preserves this filtration, and the induced endomorphism of $M_t / M_{t-1}$ is diagonalizable with exactly two eigenvalues $\pm \sqrt{\lambda_{\bb, t}}\sqrt{\lambda_{\bb,t}+1}$. Its $\sqrt{\lambda_{\bb, t}}\sqrt{\lambda_{\bb,t} + 1}$-eigenspace is evenly isomorphic to $M(\bb + \sigma_t \bd_t)$, while the other eigenspace is evenly isomorphic to $\Pi M(\bb + \sigma_t \bd_t)$. 2. There is a filtration $$0 = M^{n} \subset \cdots \subset M^1 \subset M^0 = U^* \otimes M$$ with $M^{t-1} / M^{t} \cong M(\bb - \sigma_t \bd_t) \oplus \Pi M(\bb - \sigma_t \bd_t)$ for each $t=1,\dots,n$. The endomorphism $x^*_{M}$ preserves this filtration, and the induced endomorphism of $M^{t-1} / M^{t}$ is diagonalizable with exactly two eigenvalues $\pm \sqrt{\lambda_{\bb, t}}\sqrt{\lambda_{\bb,t}-1}$. Its $\sqrt{\lambda_{\bb, t}}\sqrt{\lambda_{\bb,t} - 1}$-eigenspace is evenly isomorphic to $M(\bb - \sigma_t \bd_t)$, while the other eigenspace is evenly isomorphic to $\Pi M(\bb - \sigma_t \bd_t)$. \(1) The filtration is constructed in [@B1 Lemma 4.3.7], as follows. By the tensor identity $$U \otimes M = U \otimes (U(\g) \otimes_{U(\b)} \u(\bb)) \cong U(\g) \otimes_{U(\b)} (U \otimes \u(\bb)).$$ As a $\b$-supermodule, $U$ has a filtration $0 = U_0 \subset U_1 \subset \cdots\subset U_n = U$ in which the section $U_t / U_{t-1}$ is spanned by the images of $u_t$ and $u_t'$. Let $M_t$ be the submodule of $U \otimes M$ that maps to $U(\g) \otimes_{U(\b)} (U_t \otimes \u(\bb))$ under this isomorphism. Now fix $t \in \{1,\dots,n\}$. Let $v_1,\dots,v_k$ be a basis for the even highest weight space $M(\bb)_{\lambda_\bb,\0}$, so that $d_t' v_1,\dots,d_t' v_k$ is a basis for $M(\bb)_{\lambda_\bb,\1}$. The subquotient $M_t / M_{t-1} \cong U(\g) \otimes_{U(\b)} (U_t / U_{t-1} \otimes \u(\bb))$ is generated by the images of the vectors $\{u_t\otimes v_i, u_t' \otimes v_i, u_t \otimes d_t'v_i, u_t' \otimes d_t'v_i\:|\: i=1,\dots,k\}$, which by weight considerations span a $\b$-supermodule isomorphic to $\u(\bb + \sigma_t\bd_t) \oplus \Pi \u(\bb + \sigma_t\bd_t)$. Hence, $$M_t / M_{t-1} \cong M(\bb+\sigma_t \bd_t) \oplus \Pi M(\bb+\sigma_t \bd_t).$$ The action of $f_{r,s} \otimes e_{s,r} - f_{r,s}' \otimes e_{s,r}'$ on any of $u_t \otimes v_i, u_t' \otimes v_i, u_t \otimes d_t'v_i$ or $u_t'\otimes d_t'v_i$ is zero unless $r \leq s =t$, and if $r < s = t$ then it sends these vectors into $M_{t-1}$. Therefore, $x_{M}$ preserves the filtration. Moreover, this argument shows that it acts on the highest weight space of the quotient $M_t / M_{t-1}$ in the same way as $x_t := f_{t,t}\otimes d_t - f_{t,t}'\otimes d'_t$. Now consider the purely even subspace $S_{i,t}$ of $M_t / M_{t-1}$ with basis given by the images of $u_t \otimes v_i, u_t' \otimes d_t'v_i$. Recalling that $d_t$ acts on $v_i$ and on $d_t' v_i$ by $\lambda_{\bb,t}$, and that $(d_t')^2 = d_t$, it is straightforward to check that the matrix of the endomorphism $x_t$ of $S_{i,t}$ in the given basis is equal to $$A := \left( \begin{array}{cc} \lambda_{\bb,t} & \lambda_{\bb,t} \\ 1 & - \lambda_{\bb,t} \end{array} \right).$$ Also recall from our construction of $\u(\bb)$ that $d_1'\cdots d_{2m}'$ acts on $v_i$ as the scalar $c_\bb$ from (\[y1\]), and it acts on $d_t' v_i$ as $-c_{\bb}$. Using this, another calculation shows that $d_1'\cdots d_{2m}'$ acts on $S_{i,t}$ as the matrix $\frac{c_\bb}{\lambda_{\bb,t}} A$. Similarly, on the purely odd subspace $S_{i,t}'$ with basis given by the images of $u_t' \otimes v_i, u_t \otimes d_t'v_i$, $x_t$ has matrix $-A$ and $d_1'\cdots d_{2m}'$ has matrix $-\frac{c_\bb}{\lambda_{\bb,t}} A$. Since the matrix $A$ has eigenvalues $\pm \sqrt{\lambda_{\bb,t}}\sqrt{\lambda_{\bb,t}+1}$, the calculation made in the previous paragraph implies that $x_t$ is diagonalizable on $M_t / M_{t-1}$ with exactly these eigenvalues. Moreover on any even highest weight vector in its $ \sqrt{\lambda_{\bb,t}}\sqrt{\lambda_{\bb,t}+1}$-eigenspace, we get that $d_1'\cdots d_{2m}'$ acts as $$\begin{aligned} \frac{c_{\bb}}{\lambda_{\bb,t}} \sqrt{\lambda_{\bb,t}}\sqrt{\lambda_{\bb,t} + 1} &= c_{\bb+\sigma_t \bd_t}.\end{aligned}$$ This implies that the $\sqrt{\lambda_{\bb,t}}\sqrt{\lambda_{\bb,t}+1}$-eigenspace is evenly isomorphic to $M(\bb+\sigma_t \bd_t)$. Similarly, the $-\sqrt{\lambda_{\bb,t}}\sqrt{\lambda_{\bb,t}+1}$-eigenspace is evenly isomorphic to $\Pi M(\bb+\sigma_t \bd_t)$. \(2) Similar. \[minpoly\] For $M \in \ob\sO$, all roots of the minimal polynomials of $x_M$ and $x_M^*$ (computed in the finite dimensional superalgebras $\operatorname{End}_{\sO}(\sF\,M)$ and $\operatorname{End}_{\sO}(\sE\,M)$) belong to the set $J$ from (\[jdef\]). This is immediate from the theorem in case $M$ is a Verma supermodule. We may then deduce that it is true for all irreducibles, hence, for any $M \in \ob \sO$. Corollary \[minpoly\] implies that we can decompose $$\label{cc} \sF = \bigoplus_{j \in J} \sF_j, \qquad \sE = \bigoplus_{j \in J} \sE_j,$$ where $\sF_j$ (resp. $\sE_j$) is the subfunctor of $\sF$ (resp. $\sE$) defined by letting $\sF_j\, M$ (resp. $\sE_j\, M$) be the generalized $j$-eigenspace of $x_M$ (resp. $x_M^*$) for each $M \in \ob\sO$. Recall that $I$ denotes $\operatorname{\mathbb{Z}}$. For $i \in I$, we define the [*$i$-signature*]{} of $\bb \in \operatorname{\mathbf{B}}$ to be the $n$-tuple $\isig(\bb) = (\isig_1(\bb),\dots,\isig_n(\bb)) \in\{\mathtt{e}, \mathtt{f}, \bullet\}^n$ with $$\label{sigdef} \isig_t(\bb) := \left\{ \begin{array}{ll} \mathtt{f}&\text{if either } \sigma_t = +\text{ and }b_t = i, \text{ or } \sigma_t = -\text{ and }b_t = i+1,\\ \mathtt{e}&\text{if either } \sigma_t = + \text{ and }b_t = i+1, \text{ or } \sigma_t = -\text{ and }b_t = i,\\ \bullet&\text{otherwise.} \end{array} \right.$$ \[maintfthm\] Given $\bb \in \operatorname{\mathbf{B}}$ and $i \in I$, let $j := \sqrt{z+i}\sqrt{z+i+1}$. Then: - $\sF_j \,M(\bb)$ has a multiplicity-free filtration with sections that are evenly isomorphic to the Verma supermodules $$\{M(\bb+\sigma_t \bd_t)\:|\:\text{for }1 \leq t \leq n\text{ such that }\isig_t(\bb) = \mathtt{f}\},$$ appearing from bottom to top in order of increasing index $t$. - $\sE_j \,M(\bb)$ has a multiplicity-free filtration with sections that are evenly isomorphic to the Verma supermodules $$\{M(\bb-\sigma_t \bd_t)\:|\:\text{for }1 \leq t \leq n\text{ such that }\isig_t(\bb) = \mathtt{e}\},$$ appearing from top to bottom in order of increasing index $t$. \(1) It is immediate from Lemma \[eigenvalues\] that $\sF_j \,M(\bb)$ has a multiplicity-free filtration with sections that are evenly isomorphic to the supermodules $M(\bb+\sigma_t \bd_t)$ for $t=1,\dots,n$ such that $\sqrt{\lambda_{\bb,t}}\sqrt{\lambda_{\bb,t}+1} = j$. Squaring both sides, this equation implies that $\left(\lambda_{\bb,t}+\half\right)^2 = \left(z+i+\half\right)^2$. Hence, $$\lambda_{\bb,t} = \sigma_t(z+b_t) = -\half \pm \left(z+i+\half\right).$$ We deduce either that $\sigma_t = +$ and $b_t = i$, or $\sigma_t = -$ and $b_t = i+1$. Since we squared our original equation, it remains to check that we do indeed get solutions to that in both cases. This is clear in the case that $\sigma_t = +$, and it follows in the case that $\sigma_t = -$ using also (\[violin\]). \(2) Similar. Using Theorem \[hkst\] below, one can show that there are odd supernatural isomorphisms $c:\sF_{j}\stackrel{\sim}{\Rightarrow} \sF_{-j}$ and $c^*:\sE_{j}\stackrel{\sim}{\Rightarrow} \sE_{-j}$ for each $j \in J$. One consequence (which could be checked directly right away) is that there is another version of Theorem \[maintfthm\], in which one takes $j := -\sqrt{z+i}\sqrt{z+i+1}$ and replaces the Verma supermodules $M(\bb \pm \sigma_t \bd_t)$ in the statement by their parity flips. The superfunctors $\sF$ and $\sE$ are both left and right adjoint to each other via some canonical (even) adjunctions. The adjunction making $(\sE, \sF)$ into an adjoint pair is induced by the linear maps $$\eps:U^* \otimes U \rightarrow \operatorname{{\Bbbk}},\: \phi \otimes u \mapsto \phi(u), \qquad \eta:\operatorname{{\Bbbk}}\rightarrow U \otimes U^*,\: 1 \mapsto \sum_{r=1}^n (u_r \otimes \phi_r + u_r' \otimes \phi_r').$$ Thus, the unit of adunction $c:1 \Rightarrow \sF \,\sE$ is defined on supermodule $M$ by the map $c_M:M \stackrel{\operatorname{can}}{\longrightarrow} \operatorname{{\Bbbk}}\otimes M \stackrel{\eta \otimes \operatorname{{\operatorname{id}}}}{\longrightarrow} U \otimes U^* \otimes M$, and the counit of adjunction $d:\sE\, \sF \Rightarrow 1$ is defined by $d_M:U^* \otimes U \otimes M \stackrel{\eps\otimes\operatorname{{\operatorname{id}}}}{\longrightarrow} \operatorname{{\Bbbk}}\otimes M \stackrel{\operatorname{can}}{\longrightarrow} M$. Similarly, the adjunction making $(\sF, \sE)$ into an adjoint pair is induced by the linear maps $$U \otimes U^* \rightarrow \operatorname{{\Bbbk}},\, u \otimes \phi \mapsto (-1)^{|\phi||u|}\phi(u), \quad \operatorname{{\Bbbk}}\rightarrow U^* \otimes U,\, 1 \mapsto \sum_{r=1}^n (\phi_r \otimes u_r - \phi_r' \otimes u_r').$$ The following lemma implies that these adjunctions restrict to adjunctions making $(\sF_j, \sE_j)$ and $(\sE_j, \sF_j)$ into adjoint pairs for each $j \in J$. It follows that all of these superfunctors send projectives to projectives, and they are all exact, i.e. they preserve short exact sequences in $\underline{\sO}$. The supernatural transformation $x^*:\sE \Rightarrow \sE$ is both the left and right mate of $x:\sF \Rightarrow \sF$ with respect to the canonical adjunctions defined above. We just explain how to check that $x^*$ is the left mate of $x$ with respect to the adjunction $(\sE, \sF)$; the argument for right mate is similar. We need to show for each $M \in \ob \sO$ that the composition $$U^* \otimes M \stackrel{\operatorname{id} \otimes c_{M}}{\longrightarrow} U^* \otimes U \otimes U^* \otimes M \stackrel{\operatorname{id}\otimes x_{U^* \otimes M}}{\longrightarrow} U^* \otimes U \otimes U^* \otimes M \stackrel{d_{U^* \otimes M}}{\longrightarrow} U^* \otimes M$$ is equal to $x_M^*:U^*\otimes M \rightarrow U^* \otimes M$. Recall for this that $x_M^*$ is defined by left multiplication by $\sum_{r,s=1}^n \left(f_{r,s}' \otimes e_{s,r}' - f_{r,s}\otimes e_{s,r}\right)$, while $x_{U^* \otimes M}$ is defined by left multiplication by $\sum_{r,s=1}^n (f_{r,s} \otimes e_{s,r}\otimes 1 + f_{r,s} \otimes 1 \otimes e_{s,r} - f_{r,s}' \otimes e_{s,r}'\otimes 1 - f_{r,s}' \otimes 1 \otimes e_{s,r}')$. Now one computes the effect of both maps on homogeneous vectors of the form $\phi_t\otimes v$ and $\phi_t' \otimes v$ using (\[f1\])–(\[f4\]). Bruhat order {#s4} ============ Consider the Dynkin diagram $ {\begin{picture}(113, 15)\put(18,2){\circle{4}}\put(37,2){\circle{4}}\put(56,2){\circle{4}}\put(75, 2){\circle{4}}\put(94, 2){\circle{4}}\put(20, 2){\line(1, 0){15.5}}\put(39, 2){\line(1, 0){15.5}}\put(58, 2){\line(1, 0){15.5}}\put(77, 2){\line(1, 0){15.5}}\put(98, 2){\line(1, 0){1}}\put(101, 2){\line(1, 0){1}}\put(104, 2){\line(1, 0){1}}\put(107, 2){\line(1, 0){1}}\put(110, 2){\line(1, 0){1}}\put(4, 2){\line(1, 0){1}}\put(1, 2){\line(1, 0){1}}\put(7, 2){\line(1, 0){1}}\put(10, 2){\line(1, 0){1}}\put(13, 2){\line(1, 0){1}}\put(15, 8){\makebox(0, 0)[b]{$_{{-2}}$}}\put(34, 8){\makebox(0, 0)[b]{$_{{-1}}$}}\put(56, 8){\makebox(0, 0)[b]{$_{0}$}}\put(75, 8){\makebox(0, 0)[b]{$_{1}$}}\put(94, 8){\makebox(0, 0)[b]{$_{{2}}$}}\end{picture}} $ whose vertices are indexed by the totally ordered set $I = \operatorname{\mathbb{Z}}$. We denote the associated Kac-Moody algebra by $\operatorname{\mathfrak{sl}}_{\infty}$. This is the Lie algebra of traceless, finitely-supported complex matrices whose rows and columns are indexed by $I$. It is generated by the matrix units $f_i :=e_{i+1, i}$ and $e_i := e_{i, i+1}$ for $i \in I$. The *natural representation* $V^{+}$ of $\mathfrak{sl}_{\infty}$ is the module of column vectors with standard basis $\{ v^{+}_i\:|\: i \in I \}$. We also need the [*dual natural representation*]{} $V^-$ with basis $\{v_i^-\:|\:i \in I\}$. The action of the Chevalley generators on these bases is given by $$\begin{aligned} \label{e} e_i v^{+}_j &= \delta_{i+1,j} v^{+}_i, & e_i v^{-}_j &= \delta_{i,j} v^{-}_{i+1},\\ f_i v^{+}_j &= \delta_{i,j} v^{+}_{i+1}, & f_i v^{-}_j &= \delta_{i+1,j} v^{-}_i. \label{f}\end{aligned}$$ The tensor product $V^{\otimes \bsigma} := V^{\sigma_1} \otimes \cdots \otimes V^{\sigma_n}$ has monomial basis $\{v_\bb\:|\:\bb \in \operatorname{\mathbf{B}}\}$ defined from $v_\bb := v^{\sigma_1}_{b_1} \otimes \cdots \otimes v^{\sigma_n}_{ b_n }$. Recalling (\[sigdef\]), the Chevalley generators act on these monomials by $$\begin{aligned} \label{haha} f_i v_{\bb} &= \sum_{\substack{1 \leq t \leq n \\ \isig_t(\bb) =\mathtt{f}}} v_{\bb+\sigma_t \bd_t}, & e_i v_{\bb} &= \sum_{\substack{1 \leq t \leq n\\ \isig_t(\bb) = \mathtt{e}}} v_{\bb-\sigma_t \bd_t}.\end{aligned}$$ This should be compared with Theorem \[maintfthm\], which already makes some connection between the endofunctors $\sF_j, \sE_j$ of $\sO$ and the $\mathfrak{sl}_\infty$-module $V^{\otimes \bsigma}$. We next introduce an important partial order $\succeq$ on $\operatorname{\mathbf{B}}$, which we call the [Bruhat order]{} It is closely related to the [inverse dominance order]{} of [@LW Definition 3.2], which comes from Lusztig’s construction of tensor products of based modules [@Lubook $\S$27.3]. The root system of $\mathfrak{sl}_\infty$ has *weight lattice* $P := \bigoplus_{i \in I} \operatorname{\mathbb{Z}}\omega_i$ where $\omega_i$ is the [$i$th fundamental weight]{}. For $i \in I$, we set $$\eps_i := \omega_i - \omega_{i-1}, \qquad \alpha_i := \eps_i - \eps_{i+1}. $$ We identify $\eps_i$ with the weight of the vector $v_i^+$ in the $\mathfrak{sl}_\infty$-module $V^+$. Then, $v_i^- \in V^-$ is of weight $-\eps_i$. For $\bb \in \operatorname{\mathbf{B}}$, let $$\operatorname{\mathbf{wt}}(\bb) = (\operatorname{wt}_1(\bb),\dots,\operatorname{wt}_n(\bb)) \in P^n$$ be the $n$-tuple of weights defined from $\operatorname{wt}_r(\bb) := \sigma_r \eps_{b_r}$, so that $v_\bb \in V^{\otimes\bsigma}$ is of weight $|\operatorname{\mathbf{wt}}(\bb)| := \operatorname{wt}_1(\bb)+\cdots+\operatorname{wt}_n(\bb) \in P$. Because the weight spaces of $V^\pm$ are all one-dimensional, the map $\operatorname{\mathbf{B}}\rightarrow P^n, \bb \mapsto \operatorname{\mathbf{wt}}(\bb)$ is injective. \[bruhatdef\] Let $\trianglelefteq$ denote the [dominance order]{} on $P$, so $\beta \trianglelefteq \gamma\Leftrightarrow\gamma - \beta \in \bigoplus_{i \in I} \operatorname{\mathbb{N}}\alpha_i$. The [*inverse dominance order*]{} on $P^n$ is the partial order defined by declaring that $(\beta_1,\dots,\beta_n) \succeq (\gamma_1,\dots,\gamma_n)$ if and only if $$\beta_1+\cdots+\beta_s \trianglelefteq \gamma_1+\cdots+\gamma_s,$$ for each $s=1,\dots,n$, with the inequality being an equality when $s=n$. Finally, define the [*Bruhat order*]{} $\succeq$ on $\operatorname{\mathbf{B}}$ by $\ba \succeq \bb \Leftrightarrow \operatorname{\mathbf{wt}}(\ba) \succeq \operatorname{\mathbf{wt}}(\bb)$. Our first lemma makes the definition of the Bruhat order more explicit. Using it, one can check in particular that $\ba \succeq \bb$ implies that $\lambda_\ba \geq \lambda_\bb$ in the dominance order on $\mathfrak{t}^*$; cf. [@BLW Lemma 3.4]. \[eleme\] For $\ba \in \operatorname{\mathbf{B}}, i \in I$ and $1 \leq s \leq n$, we let $$N_{[1,s]}(\ba,i) := \#\{1 \leq r \leq s\:|\:a_r > i, \sigma_r = +\} - \#\{1 \leq r \leq s\:|\:a_r > i, \sigma_r = -\}.$$ Then we have that $\ba \succeq \bb$ if and only if - $N_{[1,n]}(\ba, i) = N_{[1,n]}(\bb, i)$ for all $i \in I$; - $N_{[1,s]}(\ba, i) \geq N_{[1,s]}(\bb, i)$ for all $i \in I$ and $s = 1,\dots,n-1$. This is a special case of [@BLW Lemma 2.17]. \[not\] Assume that $\ba \succeq \bb$ and $\isig_r(\ba) = \isig_n(\bb) = \mathtt{f}$ for some $i \in I$ and $1 \leq r \leq n$. Then $\ba + \sigma_r \bd_r \succeq \bb + \sigma_n \bd_n$, with equality if and only if $\ba = \bb$ and $r=n$. We use the conditions from Lemma \[eleme\]. For [*either* ]{} $j \neq i$ and $1 \leq s \leq n$, [*or*]{} $j = i$ and $1 \leq s < r$, we have that $$N_{[1,s]}(\ba+\sigma_r \bd_r,j) = N_{[1,s]}(\ba,j) \geq N_{[1,s]}(\bb,j) = N_{[1,s]}(\bb+\sigma_n \bd_n,j).$$ For $r \leq s < n$, we have that $$N_{[1,s]}(\ba+\sigma_r \bd_r, i) = N_{[1,s]}(\ba,i)+1 \geq N_{[1,s]}(\bb,i)+1 > N_{[1,s]}(\bb,i) = N_{[1,s]}(\bb+\sigma_n \bd_n,i).$$ Finally, $ N_{[1,n]}(\ba+\sigma_r \bd_r,i) = N_{[1,n]}(\ba,i)+1 = N_{[1,n]}(\bb,i)+1 = N_{[1,n]}(\bb+\sigma_n \bd_n,i). $ To prepare for the next lemma, suppose that we are given $\bb \in \operatorname{\mathbf{B}}$. Define $\ba \in \operatorname{\mathbf{B}}$ by setting $a_1 := b_1$, then inductively defining $a_s$ for $s=2,\dots,n$ as follows. - If $\sigma_s = +$ then $a_s$ is the greatest integer such that $a_s \leq b_s$, and the following hold for all $1 \leq r < s$: - if $\sigma_r=+$ then $a_s < a_r$; - if $\sigma_r=-$ then $a_s < b_r$. - $a_s \leq a_r$ if $\sigma_r=+$ and $a_r = b_r$; $a_s$ is the smallest of the following: $b_s$; $b_r-1$ for all $1 \leq r < s$ with $\sigma_r = -$; $a_r-1$ for all $1 \leq r < s$ with $\sigma_r = +$ and $a_r \neq b_r$; $a_r$ for all $1 \leq r < s$ with $\sigma_r = +$ and $a_r = b_r$. - If $\sigma_s = -$ then $a_s$ is the smallest integer such that $a_s \geq b_s$, and the following hold for all $1 \leq r < s$: - if $\sigma_r=-$ then $a_s > a_r$; - if $\sigma_r=+$ then $a_s > b_r$. If $\sigma_s = -$ then $a_s$ is the greatest of the following: $b_s$; $b_r+1$ for all $1 \leq r < s$ with $\sigma_r = +$; $a_r+1$ for all $1 \leq r < s$ with $\sigma_r = -$ and $a_r \neq b_r$; $a_r$ for all $1 \leq r < s$ with $\sigma_r = -$ and $a_r = b_r$. Also define a monomial $X = X_n \cdots X_2$ in the Chevalley generators $\{f_i\:|\:i \in I\}$ by setting $$X_r := \left\{ \begin{array}{ll} f_{b_r-1} \cdots f_{a_r+1} f_{a_r}&\text{if $\sigma_r = +$,}\\ f_{b_r} \cdots f_{a_r-2} f_{a_r-1}&\text{if $\sigma_r = -$,} \end{array}\right.$$ for each $r=2,\dots,n$. If $\bsigma = (+,+,-,+,-,-)$ and $\bb = (3,4,3,4,3,4)$, then $\ba = (3,2,5,1,6,7)$ and $X = (f_4 f_5 f_6) (f_3 f_4 f_5) (f_3 f_2 f_1) (f_3 f_4) (f_3 f_2)$. \[construction\] In the above notation, we have that $X v_\ba = v_\bb + (\text{a sum of $v_\bc$'s for $\bc \succ \bb$})$. We proceed by induction on $n$, the result being trivial in case $n=1$. For $n > 1$, let $\bar\bsigma := (\sigma_1,\dots,\sigma_{n-1})$, $\bar\ba := (a_1,\dots,a_{n-1})$, $\bar\bb := (b_1,\dots,b_{n-1})$ and $\bar X := X_{n-1} \cdots X_2$. Applying the induction hypothesis in the $\mathfrak{sl}_\infty$-module $V^{\otimes \bar\bsigma}$, we get that $$\bar X v_{\bar\ba} = v_{\bar\bb} + (\text{a sum of $v_{\bar\bc}$'s for $\bar\bc \succ \bar\bb$}).$$ Now we observe that if $f_i$ is a Chevalley generator appearing in one of the monomials $X_r$ for $r < n$, then $f_i v^{\sigma_n}_{a_n} = 0$. This follows from the definitions: if $\sigma_n = +$ we must show that $i \neq a_n$, which follows as $i \geq a_r > a_n$ if $\sigma_r = +$ or $i \geq b_r > a_n$ if $\sigma_r=-$; if $\sigma_n = -$ we must show that $i \neq a_n-1$, which follows as $i < b_r < a_n$ if $\sigma_r = +$ or $i < a_r < a_n$ if $\sigma_r=-$. Hence, letting $\tilde \bb := (b_1,\dots,b_{n-1}, a_n)$, we deduce that $$\bar X v_{\ba} = v_{\tilde\bb} + (\text{a sum of $v_{\bc}$'s for $\bc \succ \tilde\bb$}).$$ Finally we act with $X_n$, which sends $v^{\sigma_n}_{a_n}$ to $v^{\sigma_n}_{b_n}$, and apply Lemma \[not\]. \[mainsplitthm\] For every $\bb \in \operatorname{\mathbf{B}}$, the indecomposable projective supermodule $P(\bb)$ has a Verma flag with top section evenly isomorphic to $M(\bb)$ and other sections evenly isomorphic to $M(\bc)$’s for $\bc \in \operatorname{\mathbf{B}}$ with $\bc \succ \bb$. Let notation be as in Lemma \[construction\]. Let $i_1,\dots,i_l \in I$ be defined so that $X$ is the monomial $f_{i_l} \cdots f_{i_2} f_{i_1}$. Let $j_k := \sqrt{z+i_k}\sqrt{z+i_k+1}$ for each $k$ and consider the supermodule $$P := \sF_{j_l} \cdots \sF_{j_2} \sF_{j_1} M(\ba).$$ For each $1 \leq r < s \leq n$, we have that $a_r > a_s$ if $\sigma_r = \sigma_s = +$, $a_r < a_s$ if $\sigma_r = \sigma_s = -$, and $a_r \neq a_s$ if $\sigma_r \neq \sigma_s$. This implies that the weight $\lambda_\ba$ is typical and dominant, hence $M(\ba)$ is projective by Lemma \[typicaldominant\]. Since each $\sF_j$ sends projectives to projectives, we deduce that $P$ is projective. Since the combinatorics of (\[haha\]) matches that of Theorem \[maintfthm\], we can reinterpret Lemma \[construction\] as saying that $P$ has a Verma flag with one section evenly isomorphic to $M(\bb)$ and all other sections evenly isomorphic to $M(\bc)$’s for $\bc \succ \bb$. In fact, the unique section isomorphic to $M(\bb)$ appears at the top of this Verma flag, thanks the order of the sections arising from Theorem \[maintfthm\](1). Hence, $P$ has a summand evenly isomorphic to $P(\bb)$, and it just remains to apply Lemma \[hom\]. \[bruhat\] For $\bb \in \operatorname{\mathbf{B}}$, we have that $[M(\bb):L(\bb)] = 1$. All other composition factors of $M(\bb)$ are evenly isomorphic to $L(\bc)$’s for $\bc \prec \bb$. This follows from Theorem \[mainsplitthm\] and the following analog of [*BGG reciprocity*]{}: for $\ba, \bb \in \operatorname{\mathbf{B}}$, we have that $$\begin{aligned} [M(\bb):L(\ba)] &= \dim \operatorname{Hom}_{\sO}(P(\ba), M(\bb)^\star)_\0 = (P(\ba):M(\bb)),\\ [M(\bb):\Pi L(\ba)] &= \dim \operatorname{Hom}_{\sO}(P(\ba), M(\bb)^\star)_\1 = (P(\ba):\Pi M(\bb)).\end{aligned}$$ The various equalities here follow from Lemmas \[hom\] and \[star\]. \[split\] For any $\bb \in \operatorname{\mathbf{B}}$, every irreducible subquotient of the indecomposable projective $P(\bb)$ is evenly isomorphic to $L(\ba)$ for $\ba \in \operatorname{\mathbf{B}}$ with $|\operatorname{\mathbf{wt}}(\ba)| = |\operatorname{\mathbf{wt}}(\bb)|$. By Theorem \[mainsplitthm\], $P(\bb)$ has a Verma flag with sections $M(\bc)$ for $\bc \succeq \bb$. By Corollary \[bruhat\], the composition factors of $M(\bc)$ are $L(\ba)$’s for $\ba \preceq \bc$. Hence, every irreducible subquotient of $P(\bb)$ is evenly isomorphic to $L(\ba)$ for $\ba \in \operatorname{\mathbf{B}}$ such that $\ba \preceq \bc \succeq \bb$ for some $\bc$. This condition implies that $|\operatorname{\mathbf{wt}}(\ba)| = |\operatorname{\mathbf{wt}}(\bb)|$. Weak categorical action {#s5} ======================= Let $\O$ be the Serre subcategory of $\sO$ generated by $ \{L(\bb)\:|\:\bb \in \operatorname{\mathbf{B}}\},$ i.e. it is the full subcategory of $\sO$ consisting of all supermodules whose composition factors are evenly isomorphic to $L(\bb)$’s for $\bb \in \operatorname{\mathbf{B}}$. Since each $L(\bb)$ is of type $\mathtt{M}$, there are no non-zero odd morphisms between objects of $\O$. Because of this, we forget the $\operatorname{\mathbb{Z}}/2$-grading and simply view $\O$ as a $\operatorname{{\Bbbk}}$-linear category rather than a supercategory. \[itsplits\] We have that $\sO = \O \oplus \Pi \O$ in the sense defined in the introduction. Let $\Pi \O$ be the Serre subcategory of $\sO$ generated by $\{\Pi L(\ba)\:|\:\ba \in \operatorname{\mathbf{B}}\}.$ By Corollary \[split\], all even extensions between $\Pi L(\ba)$ and $L(\bb)$ are split. Hence, every supermodule in $\sO$ decomposes uniquely as a direct sum of an object of $\O$ and an object of $\Pi \O$. The result follows. For typical blocks, Theorem \[itsplits\] has a more direct proof exploiting the action of the anticenter of $U(\g)$; see [@F $\S$3.1]. In order to state our next theorem, we briefly recall the following definition due to Cline, Parshall and Scott [@CPS]: \[hwdef\] A [*highest weight category*]{} is a Schurian category $\C$ in the sense of Definition \[schurcat\], together with an interval-finite poset $(\Lambda, \leq)$ indexing a complete set of irreducible objects $\{L(\lambda)\:|\:\lambda \in \Lambda\}$, subject to the following axiom. For each $\lambda \in \Lambda$, let $P(\lambda)$ be a projective cover of $L(\lambda)$ in $\C$. Define the [*standard object*]{} $\Delta(\lambda)$ to be the largest quotient of $P(\lambda)$ such that $[\Delta(\lambda):L(\lambda)] = 1$ and $[\Delta(\lambda):L(\mu)] = 0$ for $\mu \not\leq \lambda$. Then we require that $P(\lambda)$ has a filtration with top section isomorphic to $\Delta(\lambda)$ and all other sections of the form $\Delta(\mu)$ for $\mu > \lambda$. \[itshw\] The category $\O$ is a highest weight category with weight poset $(\operatorname{\mathbf{B}}, \preceq)$. Its standard objects are the Verma supermodules $\{M(\bb)\:|\:\bb \in \operatorname{\mathbf{B}}\}$. It is clear that $\O$ is a Schurian category with isomorphism classes of irreducible objects represented by $\{L(\bb)\:|\:\bb \in \operatorname{\mathbf{B}}\}$. By Theorem \[mainsplitthm\], $P(\bb)$ has a Verma flag with $M(\bb)$ at the top and other sections that are evenly isomorphic to $M(\bc)$’s for $\bc \succ \bb$. It just remains to observe that the Verma supermodules $M(\bb)$ coincide with the standard objects $\Delta(\bb)$. This follows using the filtration just described plus Corollary \[bruhat\]. By Lemma \[star\], the duality $\star$ on $\sO$ restricts to a duality $\star:\O \rightarrow \O$ fixing isomorphism classes of irreducible objects. Next, take $i \in I$ and set $j := \sqrt{z+i}\sqrt{z+i+1}$. Theorem \[maintfthm\] implies that the exact functors $\sF_j$ and $\sE_j$ send the standard objects in $\O$ to objects of $\O$ with a Verma flag. Hence, they send arbitrary objects in $\O$ to objects of $\O$. Thus, their restrictions define endofunctors $$\label{them} F_i := \sF_j|_{\O}:\O\rightarrow\O, \quad E_i := \sE_j|_{\O}:\O \rightarrow \O.$$ Again, these functors are both left and right adjoint to each other. Let $\O^\Delta$ be the full subcategory of $\O$ consisting of all objects possessing a Verma flag. This is an exact subcategory of $\O$. Its complexified Grothendieck group $\operatorname{\mathbb{C}}\otimes_{\operatorname{\mathbb{Z}}} K_0(\O^\Delta)$ has basis $\{[M(\bb)]\:|\:\bb \in \operatorname{\mathbf{B}}\}$. \[itacts\] For each $i \in I$, the functors $F_i$ and $E_i$ are exact endofunctors of $\O^\Delta$. Moreover, if we identify $\operatorname{\mathbb{C}}\otimes_{\operatorname{\mathbb{Z}}} K_0(\O^\Delta)$ with $V^{\otimes \bsigma}$ so $[M(\bb)] \leftrightarrow v_\bb$ for each $\bb \in \operatorname{\mathbf{B}}$, then the induced endomorphisms $[F_i]$ and $[E_i]$ of the Grothendieck group act in the same way as the Chevalley generators $f_i$ and $e_i$ of $\mathfrak{sl}_\infty$. Compare Theorem \[maintfthm\] with (\[haha\]). Thus, we have constructed a highest weight category $\O$ with weight poset $(\operatorname{\mathbf{B}},\preceq)$, and equipped it with a weak categorical action of the Lie algebra $\mathfrak{sl}_\infty$ in the sense of [@CR; @Rou]. Strong categorical action {#s6} ========================= In this section, we upgrade the weak categorical action of $\mathfrak{sl}_\infty$ on $\mathcal O$ constructed so far to a strong categorical action. For the following definition, we represent morphisms in a strict monoidal category via the usual string calculus, adopting the same conventions for horizontal and vertical composition as [@KL1]. \[qhdef\] The *quiver Hecke category* of type $\mathfrak{sl}_\infty$ is the strict $\operatorname{{\Bbbk}}$-linear monoidal category $\QH$ with objects generated by the set $I$ from (\[jdef\]), and morphisms generated by $\mathord{ \begin{tikzpicture}[baseline = -2] \draw[-,thick,darkred] (0.08,-.15) to (0.08,.3); \node at (0.08,0.05) {$\color{darkred}\bullet$}; \node at (0.08,-.25) {$\scriptstyle{i}$}; \end{tikzpicture} }:i \rightarrow i$ and $\mathord{ \begin{tikzpicture}[baseline = -2] \draw[-,thick,darkred] (0.18,-.15) to (-0.18,.3); \draw[-,thick,darkred] (-0.18,-.15) to (0.18,.3); \node at (-0.18,-.25) {$\scriptstyle{i_2}$}; \node at (0.18,-.25) {$\scriptstyle{i_1}$}; \end{tikzpicture} }:i_2 \otimes i_1 \rightarrow i_1 \otimes i_2$, subject to the following relations: $$\begin{aligned} \mathord{ \begin{tikzpicture}[baseline = 2] \draw[-,thick,darkred] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkred] (0.25,-.2) to (-0.25,.6); \node at (-0.25,-.28) {$\scriptstyle{i_2}$}; \node at (0.25,-.28) {$\scriptstyle{i_1}$}; \node at (-0.14,0.42) {$\color{darkred}\bullet$}; \end{tikzpicture} } - \mathord{ \begin{tikzpicture}[baseline =2] \draw[-,thick,darkred] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkred] (0.25,-.2) to (-0.25,.6); \node at (-0.25,-.28) {$\scriptstyle{i_2}$}; \node at (0.25,-.28) {$\scriptstyle{i_1}$}; \node at (0.14,-0.02) {$\color{darkred}\bullet$}; \end{tikzpicture} } &= \mathord{ \begin{tikzpicture}[baseline = 2] \draw[-,thick,darkred] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkred] (0.25,-.2) to (-0.25,.6); \node at (-0.25,-.28) {$\scriptstyle{i_2}$}; \node at (0.25,-.28) {$\scriptstyle{i_1}$}; \node at (-0.13,-0.02) {$\color{darkred}\bullet$}; \end{tikzpicture} } -\mathord{ \begin{tikzpicture}[baseline = 2] \draw[-,thick,darkred] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkred] (0.25,-.2) to (-0.25,.6); \node at (-0.25,-.28) {$\scriptstyle{i_2}$}; \node at (0.25,-.28) {$\scriptstyle{i_1}$}; \node at (0.14,0.42) {$\color{darkred}\bullet$}; \end{tikzpicture} } = \left\{ \begin{array}{ll} \mathord{ \begin{tikzpicture}[baseline = -1] \draw[-,thick,darkred] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkred] (-0.28,-.3) to (-0.28,.4); \node at (-0.28,-.4) {$\scriptstyle{i_2}$}; \node at (0.08,-.4) {$\scriptstyle{i_1}$}; \end{tikzpicture} } & \text{if $i_1 = i_2$,}\\ \:\:\:0 & \text{if $i_1 \neq i_2$;}\\ \end{array} \right. \end{aligned}$$$$\begin{aligned} \mathord{ \begin{tikzpicture}[baseline = 8] \draw[-,thick,darkred] (0.28,.4) to[out=90,in=-90] (-0.28,1.1); \draw[-,thick,darkred] (-0.28,.4) to[out=90,in=-90] (0.28,1.1); \draw[-,thick,darkred] (0.28,-.3) to[out=90,in=-90] (-0.28,.4); \draw[-,thick,darkred] (-0.28,-.3) to[out=90,in=-90] (0.28,.4); \node at (-0.28,-.4) {$\scriptstyle{i_2}$}; \node at (0.28,-.4) {$\scriptstyle{i_1}$}; \end{tikzpicture} } &= \left\{ \begin{array}{ll} \:\:\:0&\text{if $i_1 = i_2$,}\\ (i_2-i_1) \mathord{ \begin{tikzpicture}[baseline = 0] \draw[-,thick,darkred] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkred] (-0.28,-.3) to (-0.28,.4); \node at (-0.28,-.4) {$\scriptstyle{i_2}$}; \node at (0.08,-.4) {$\scriptstyle{i_1}$}; \node at (0.08,0.05) {$\color{darkred}\bullet$}; \end{tikzpicture} } + (i_1-i_2) \mathord{ \begin{tikzpicture}[baseline = 0] \draw[-,thick,darkred] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkred] (-0.28,-.3) to (-0.28,.4); \node at (-0.28,-.4) {$\scriptstyle{i_2}$}; \node at (0.08,-.4) {$\scriptstyle{i_1}$}; \node at (-0.28,0.05) {$\color{darkred}\bullet$}; \end{tikzpicture} } &\text{if $|i_1 - i_2| = 1$,}\\ \mathord{ \begin{tikzpicture}[baseline = 0] \draw[-,thick,darkred] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkred] (-0.28,-.3) to (-0.28,.4); \node at (-0.28,-.4) {$\scriptstyle{i_2}$}; \node at (0.08,-.4) {$\scriptstyle{i_1}$}; \end{tikzpicture} }&\text{if $|i_1 - i_2| > 1$;}\\ \end{array} \right. \end{aligned}$$$$\begin{aligned} \mathord{ \begin{tikzpicture}[baseline = 2] \draw[-,thick,darkred] (0.45,.8) to (-0.45,-.4); \draw[-,thick,darkred] (0.45,-.4) to (-0.45,.8); \draw[-,thick,darkred] (0,-.4) to[out=90,in=-90] (-.45,0.2); \draw[-,thick,darkred] (-0.45,0.2) to[out=90,in=-90] (0,0.8); \node at (-0.45,-.5) {$\scriptstyle{i_3}$}; \node at (0,-.5) {$\scriptstyle{i_2}$}; \node at (0.45,-.5) {$\scriptstyle{i_1}$}; \end{tikzpicture} } \!\!- \!\!\! \mathord{ \begin{tikzpicture}[baseline = 2] \draw[-,thick,darkred] (0.45,.8) to (-0.45,-.4); \draw[-,thick,darkred] (0.45,-.4) to (-0.45,.8); \draw[-,thick,darkred] (0,-.4) to[out=90,in=-90] (.45,0.2); \draw[-,thick,darkred] (0.45,0.2) to[out=90,in=-90] (0,0.8); \node at (-0.45,-.5) {$\scriptstyle{i_3}$}; \node at (0,-.5) {$\scriptstyle{i_2}$}; \node at (0.45,-.5) {$\scriptstyle{i_1}$}; \end{tikzpicture} } &= \left\{ \begin{array}{ll} (i_2 - i_1) \mathord{ \begin{tikzpicture}[baseline = -1] \draw[-,thick,darkred] (0.44,-.3) to (0.44,.4); \draw[-,thick,darkred] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkred] (-0.28,-.3) to (-0.28,.4); \node at (-0.28,-.4) {$\scriptstyle{i_3}$}; \node at (0.08,-.4) {$\scriptstyle{i_2}$}; \node at (0.44,-.4) {$\scriptstyle{i_1}$}; \end{tikzpicture} } & \text{if $i_1 = i_3$ and $|i_1 - i_2|= 1$,}\\ \:\:\:0 &\text{otherwise.} \end{array} \right.\end{aligned}$$ Let $I^d$ denote the set of words $\bi = i_d\cdots i_1$ of length $d$ in the alphabet $I$, and identify $\bi \in I^d$ with the object $i_d \otimes \cdots \otimes i_1 \in \ob \QH$. Then, the locally unital algebra $$\label{recla} QH_d := \bigoplus_{\bi,\bi' \in I^d} \operatorname{Hom}_{\QH}(\bi,\bi')$$ is the [*quiver Hecke algebra*]{} of type $\mathfrak{sl}_\infty$ defined originally by Khovanov and Lauda [@KL1] and Rouquier [@Rou]. Recall for a $\operatorname{{\Bbbk}}$-linear category $\mathcal{C}$ that there is an associated strict $\operatorname{{\Bbbk}}$-linear monoidal category $\mathcal{E}nd(\mathcal{C})$ consisting of $\operatorname{{\Bbbk}}$-linear endofunctors and natural transformations. The remainder of the section will be devoted to the proof of the following theorem. \[itlifts\] There is a strict monoidal functor $\Phi:\QH \rightarrow \mathcal{E}nd(\O)$ sending the generating objects $i \in I$ to the endofunctors $F_i$ from (\[them\]). Moreover, for all $M \in \ob \O$ and $i \in I$, the endomorphism $F_i M \rightarrow F_i M$ defined by the natural transformation $\Phi\Big( \mathord{ \begin{tikzpicture}[baseline = -2] \draw[-,thick,darkred] (0.08,-.15) to (0.08,.3); \node at (0.08,0.05) {$\color{darkred}\bullet$}; \node at (0.08,-.25) {$\scriptstyle{i}$}; \end{tikzpicture} } \Big)$ is nilpotent. In order to construct $\Phi$, we need to pass through two intermediate objects $\AHC$, the (degenerate) affine Hecke-Clifford supercategory, and $\QHC$, which is a certain quiver Hecke-Clifford supercategory in the sense of [@KKT]. Both $\AHC$ and $\QHC$ are examples of (strict) [*monoidal supercategories*]{}, meaning that they are supercategories equipped with a monoidal product in an appropriate enriched sense. We refer the reader to the introduction of [@BE] for the precise definition, just recalling that morphisms in a monoidal supercategory satisfy the [*super interchange law*]{} rather than the usual interchange law of a monoidal category: in terms of the string calculus as in [@BE] we have that $$\mathord{ \begin{tikzpicture}[baseline = 0] \draw[-,thick,darkpurple] (0.08,-.4) to (0.08,-.23); \draw[-,thick,darkpurple] (0.08,.4) to (0.08,.03); \draw[thick,darkpurple] (0.08,-0.1) circle (4pt); \node at (0.08,-0.1) {\color{darkpurple}$\scriptstyle{g}$}; \draw[-,thick,darkpurple] (-.8,-.4) to (-.8,-.03); \draw[-,thick,darkpurple] (-.8,.4) to (-.8,.23); \draw[thick,darkpurple] (-.8,0.1) circle (4pt); \node at (-.8,.1) {\color{darkpurple}$\scriptstyle{f}$}; \end{tikzpicture} } \quad=\quad \mathord{ \begin{tikzpicture}[baseline = 0] \draw[-,thick,darkpurple] (0.08,-.4) to (0.08,-.13); \draw[-,thick,darkpurple] (0.08,.4) to (0.08,.13); \draw[thick,darkpurple] (0.08,0) circle (4pt); \node at (0.08,0) {\color{darkpurple}$\scriptstyle{g}$}; \draw[-,thick,darkpurple] (-.8,-.4) to (-.8,-.13); \draw[-,thick,darkpurple] (-.8,.4) to (-.8,.13); \draw[thick,darkpurple] (-.8,0) circle (4pt); \node at (-.8,0) {\color{darkpurple}$\scriptstyle{f}$}; \end{tikzpicture} } \quad=\quad (-1)^{|f||g|}\: \mathord{ \begin{tikzpicture}[baseline = 0] \draw[-,thick,darkpurple] (0.08,-.4) to (0.08,-.03); \draw[-,thick,darkpurple] (0.08,.4) to (0.08,.23); \draw[thick,darkpurple] (0.08,0.1) circle (4pt); \node at (0.08,0.1) {\color{darkpurple}$\scriptstyle{g}$}; \draw[-,thick,darkpurple] (-.8,-.4) to (-.8,-.23); \draw[-,thick,darkpurple] (-.8,.4) to (-.8,.03); \draw[thick,darkpurple] (-.8,-0.1) circle (4pt); \node at (-.8,-.1) {\color{darkpurple}$\scriptstyle{f}$}; \end{tikzpicture} }$$ for homogeneous morphisms $f$ and $g$ of parities $|f|$ and $|g|$, respectively. The (degenerate) [*affine Hecke-Clifford supercategory*]{} $\AHC$ is the strict monoidal supercategory with a single generating object $1$, even generating morphisms $\mathord{ \begin{tikzpicture}[baseline = -1] \draw[-,thick,darkblue] (0.08,-.15) to (0.08,.3); \node at (0.08,0.08) {$\color{darkblue}\bullet$}; \end{tikzpicture} }:1 \rightarrow 1$ and $\mathord{ \begin{tikzpicture}[baseline = -1] \draw[-,thick,darkblue] (0.18,-.15) to (-0.18,.3); \draw[-,thick,darkblue] (-0.18,-.15) to (0.18,.3); \end{tikzpicture} }:1 \otimes 1 \rightarrow 1 \otimes 1$, and an odd generating morphism $\mathord{ \begin{tikzpicture}[baseline = -1] \draw[-,thick,darkblue] (0.08,-.15) to (0.08,.3); \node at (0.08,0.08) {$\color{darkblue}\circ$}; \end{tikzpicture} }:1 \rightarrow 1$. These are subject to the following relations: $$\begin{aligned} \mathord{ \begin{tikzpicture}[baseline = 2] \draw[-, thick,darkblue] (0, 0.6) to (0, -0.3); \node at (0, -0.00) {$\color{darkblue} \circ$}; \node at (0, 0.3) {$\color{darkblue} \bullet$}; \end{tikzpicture} } &= - \mathord{ \begin{tikzpicture}[baseline = 2] \draw[-, thick,darkblue] (0, 0.6) to (0, -0.3); \node at (0, -0.0) {$\color{darkblue} \bullet$}; \node at (0, 0.3) {$\color{darkblue} \circ$}; \end{tikzpicture} }\:, &\mathord{ \begin{tikzpicture}[baseline = 2] \draw[-, thick,darkblue] (0, 0.6) to (0, -0.3); \node at (0, -0.0) {$\color{darkblue} \circ$}; \node at (0, 0.3) {$\color{darkblue} \circ$}; \end{tikzpicture} } &= \mathord{ \begin{tikzpicture}[baseline = 2] \draw[-, thick,darkblue] (0, 0.6) to (0, -0.3); \end{tikzpicture} }\:, & \mathord{ \begin{tikzpicture}[baseline = 8.5] \draw[-,thick,darkblue] (0.2,.4) to[out=90,in=-90] (-0.2,.9); \draw[-,thick,darkblue] (-0.2,.4) to[out=90,in=-90] (0.2,.9); \draw[-,thick,darkblue] (0.2,-.1) to[out=90,in=-90] (-0.2,.4); \draw[-,thick,darkblue] (-0.2,-.1) to[out=90,in=-90] (0.2,.4); \end{tikzpicture}} &= \mathord{ \begin{tikzpicture}[baseline = 8.5] \draw[-,thick,darkblue] (0.1,-.1) to (0.1,.9); \draw[-,thick,darkblue] (-0.3,-.1) to (-0.3,.9); \end{tikzpicture} }\:,\end{aligned}$$$$\begin{aligned} \mathord{ \begin{tikzpicture}[baseline = 4] \draw[-,thick,darkblue] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkblue] (0.25,-.2) to (-0.25,.6); \node at (-0.14,0.42) {$\color{darkblue}\circ$}; \end{tikzpicture} } &= \mathord{ \begin{tikzpicture}[baseline = 4] \draw[-,thick,darkblue] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkblue] (0.25,-.2) to (-0.25,.6); \node at (0.14,-0.02) {$\color{darkblue}\circ$}; \end{tikzpicture} } &\mathord{ \begin{tikzpicture}[baseline = 4] \draw[-,thick,darkblue] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkblue] (0.25,-.2) to (-0.25,.6); \node at (-0.14,0.42) {$\color{darkblue}\bullet$}; \end{tikzpicture} } - \mathord{ \begin{tikzpicture}[baseline = 4] \draw[-,thick,darkblue] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkblue] (0.25,-.2) to (-0.25,.6); \node at (0.14,-0.02) {$\color{darkblue}\bullet$}; \end{tikzpicture} } &= \mathord{ \begin{tikzpicture}[baseline = 4] \draw[-,thick,darkblue] (0.08,-.2) to (0.08,.6); \draw[-,thick,darkblue] (-0.28,-.2) to (-0.28,.6); \end{tikzpicture} } - \! \mathord{ \begin{tikzpicture}[baseline = 4] \draw[-,thick,darkblue] (0.08,-.2) to (0.08,.6); \draw[-,thick,darkblue] (-0.28,-.2) to (-0.28,.6); \node at (0.08, 0.2) {$\color{darkblue}\circ$}; \node at (-0.28, 0.2){$\color{darkblue}\circ$}; \end{tikzpicture} }\:, &\mathord{ \begin{tikzpicture}[baseline = 3] \draw[-,thick,darkblue] (0.45,.8) to (-0.45,-.4); \draw[-,thick,darkblue] (0.45,-.4) to (-0.45,.8); \draw[-,thick,darkblue] (0,-.4) to[out=90,in=-90] (-.45,0.2); \draw[-,thick,darkblue] (-0.45,0.2) to[out=90,in=-90] (0,0.8); \end{tikzpicture} } &= \mathord{ \begin{tikzpicture}[baseline = 3] \draw[-,thick,darkblue] (0.45,.8) to (-0.45,-.4); \draw[-,thick,darkblue] (0.45,-.4) to (-0.45,.8); \draw[-,thick,darkblue] (0,-.4) to[out=90,in=-90] (.45,0.2); \draw[-,thick,darkblue] (0.45,0.2) to[out=90,in=-90] (0,0.8); \end{tikzpicture} }\,.\end{aligned}$$ Denoting the object $1^{\otimes d} \in \ob \AHC$ simply by $d$, the (degenerate) [*affine Hecke-Clifford superalgebra*]{} is the superalgebra $$\label{train1} AHC_d := \operatorname{End}_{\AHC}(d).$$ This was introduced originally by Nazarov [@N $\S$3]. For a supercategory $\C$, we write $\mathcal{E}nd(\C)$ for the strict monoidal supercategory consisting of superfunctors and supernatural transformations. \[hkst\] There is a strict monoidal superfunctor $\Psi:\AHC \rightarrow \mathcal{E}nd(\sO)$ sending the generating object $1$ to the endofunctor $\sF = U \otimes -$ from (\[sfdef\]), and the generating morphisms $\mathord{ \begin{tikzpicture}[baseline = -1] \draw[-,thick,darkblue] (0.08,-.15) to (0.08,.3); \node at (0.08,0.08) {$\color{darkblue}\bullet$}; \end{tikzpicture} }$, $\mathord{ \begin{tikzpicture}[baseline = -1] \draw[-,thick,darkblue] (0.08,-.15) to (0.08,.3); \node at (0.08,0.08) {$\color{darkblue}\circ$}; \end{tikzpicture} }$ and $\mathord{ \begin{tikzpicture}[baseline = -1] \draw[-,thick,darkblue] (0.18,-.15) to (-0.18,.3); \draw[-,thick,darkblue] (-0.18,-.15) to (0.18,.3); \end{tikzpicture} }$ to the supernatural transformations $x, c$ and $t$ which are defined on $M \in \ob \sO$ as follows: - $x_M:U \otimes M \rightarrow U \otimes M$ is left multiplication by the tensor $\omega$ from (\[omegadef\]); - $c_M: U \otimes M \rightarrow U \otimes M$ is left multiplication by $\sqrt{-1} \,f' \otimes 1$ for $f'$ as in (\[oddz\]); - $t_M:U \otimes U \otimes M \rightarrow U \otimes U \otimes M$ sends $u \otimes v \otimes m \mapsto (-1)^{|u||v|} v \otimes u \otimes m$. This an elementary check of relations, similar to the one made in the proof of [@HKS Theorem 7.4.1]. \[qhcdef\] The *quiver Hecke-Clifford supercategory* of type $\mathfrak{sl}_\infty$ is the monoidal supercategory $\QHC$ with objects generated by the set $J$ from (\[jdef\]), even generating morphisms $\mathord{ \begin{tikzpicture}[baseline = -2] \draw[-,thick,darkgreen] (0.08,-.15) to (0.08,.3); \node at (0.08,0.05) {$\color{darkgreen}\bullet$}; \node at (0.08,-.25) {$\scriptstyle{j_1}$}; \end{tikzpicture} }:j_1 \rightarrow j_1$ and $\mathord{ \begin{tikzpicture}[baseline = -2] \draw[-,thick,darkgreen] (0.18,-.15) to (-0.18,.3); \draw[-,thick,darkgreen] (-0.18,-.15) to (0.18,.3); \node at (-0.18,-.25) {$\scriptstyle{j_2}$}; \node at (0.18,-.25) {$\scriptstyle{j_1}$}; \end{tikzpicture} }:j_2 \otimes j_1 \rightarrow j_1 \otimes j_2$, and odd generating morphisms $\mathord{ \begin{tikzpicture}[baseline = -2] \draw[-,thick,darkgreen] (0.08,-.15) to (0.08,.3); \node at (0.08,0.05) {$\color{darkgreen}\circ$}; \node at (0.08,-.25) {$\scriptstyle{j_1}$}; \end{tikzpicture} }:j_1 \rightarrow -j_1$, for all $j_1,j_2 \in J$. These are subject to the following relations: $$\begin{aligned} \mathord{ \begin{tikzpicture}[baseline = 3] \draw[-, thick,darkgreen] (0, 0.6) to (0, -0.2); \node at (0, 0.05) {$\color{darkgreen} \bullet$}; \node at (0, 0.35) {$\color{darkgreen} \circ$}; \node at (-0.01,-.35) {$\scriptstyle{j_1}$}; \end{tikzpicture} } &= - \mathord{ \begin{tikzpicture}[baseline = 3] \draw[-, thick,darkgreen] (0, 0.6) to (0, -0.2); \node at (0, 0.05) {$\color{darkgreen} \circ$}; \node at (0, 0.35) {$\color{darkgreen} \bullet$}; \node at (-0.01,-.35) {$\scriptstyle{j_1}$}; \end{tikzpicture} }, \qquad \mathord{ \begin{tikzpicture}[baseline = 3] \draw[-, thick,darkgreen] (0, 0.6) to (0, -0.2); \node at (0, 0.05) {$\color{darkgreen} \circ$}; \node at (0, 0.35) {$\color{darkgreen} \circ$}; \node at (-0.01,-.35) {$\scriptstyle{j_1}$}; \end{tikzpicture} } = \mathord{ \begin{tikzpicture}[baseline = 3] \draw[-, thick,darkgreen] (0, 0.6) to (0, -0.2); \node at (-0.01,-.35) {$\scriptstyle{j_1}$}; \end{tikzpicture} }, \qquad \mathord{ \begin{tikzpicture}[baseline = 4] \draw[-,thick,darkgreen] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkgreen] (0.25,-.2) to (-0.25,.6); \node at (-0.13,-0.02) {$\color{darkgreen}\circ$}; \node at (-0.25,-.28) {$\scriptstyle{j_2}$}; \node at (0.25,-.28) {$\scriptstyle{j_1}$}; \end{tikzpicture} } = \mathord{ \begin{tikzpicture}[baseline = 4] \draw[-,thick,darkgreen] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkgreen] (0.25,-.2) to (-0.25,.6); \node at (0.14,0.42) {$\color{darkgreen}\circ$}; \node at (-0.25,-.28) {$\scriptstyle{j_2}$}; \node at (0.25,-.28) {$\scriptstyle{j_1}$}; \end{tikzpicture} }, \qquad \mathord{ \begin{tikzpicture}[baseline = 4] \draw[-,thick,darkgreen] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkgreen] (0.25,-.2) to (-0.25,.6); \node at (-0.13,0.42) {$\color{darkgreen}\circ$}; \node at (-0.25,-.28) {$\scriptstyle{j_2}$}; \node at (0.25,-.28) {$\scriptstyle{j_1}$}; \end{tikzpicture} } = \mathord{ \begin{tikzpicture}[baseline = 4] \draw[-,thick,darkgreen] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkgreen] (0.25,-.2) to (-0.25,.6); \node at (0.14,-0.02) {$\color{darkgreen}\circ$}; \node at (-0.25,-.28) {$\scriptstyle{j_2}$}; \node at (0.25,-.28) {$\scriptstyle{j_1}$}; \end{tikzpicture} },\end{aligned}$$$$\begin{aligned} \mathord{ \begin{tikzpicture}[baseline = 1] \draw[-,thick,darkgreen] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkgreen] (0.25,-.2) to (-0.25,.6); \node at (-0.25,-.28) {$\scriptstyle{j_2}$}; \node at (0.25,-.28) {$\scriptstyle{j_1}$}; \node at (-0.13,-0.02) {$\color{darkgreen}\bullet$}; \end{tikzpicture} } -\mathord{ \begin{tikzpicture}[baseline = 1] \draw[-,thick,darkgreen] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkgreen] (0.25,-.2) to (-0.25,.6); \node at (-0.25,-.28) {$\scriptstyle{j_2}$}; \node at (0.25,-.28) {$\scriptstyle{j_1}$}; \node at (0.14,0.42) {$\color{darkgreen}\bullet$}; \end{tikzpicture} } &= \left\{ \begin{array}{cl} \mathord{ \begin{tikzpicture}[baseline = -5] \draw[-,thick,darkgreen] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkgreen] (-0.28,-.3) to (-0.28,.4); \node at (-0.28,-.4) {$\scriptstyle{j_2}$}; \node at (0.08,-.4) {$\scriptstyle{j_1}$}; \end{tikzpicture} } & \text{if $j_1 = j_2$,} \\ \mathord{ \begin{tikzpicture}[baseline = -2] \draw[-,thick,darkgreen] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkgreen] (-0.28,-.3) to (-0.28,.4); \node at (-0.28, 0.06){$\color{darkgreen}\circ$}; \node at (0.08, 0.06){$\color{darkgreen}\circ$}; \node at (-0.28,-.4) {$\scriptstyle{j_2}$}; \node at (0.08,-.4) {$\scriptstyle{j_1}$}; \end{tikzpicture} } & \text{if $j_1= - j_2$,} \\ 0 & \text{otherwise;} \end{array} \right.\end{aligned}$$$$\begin{aligned} \mathord{ \begin{tikzpicture}[baseline = 1] \draw[-,thick,darkgreen] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkgreen] (0.25,-.2) to (-0.25,.6); \node at (-0.25,-.28) {$\scriptstyle{j_2}$}; \node at (0.25,-.28) {$\scriptstyle{j_1}$}; \node at (-0.13,0.42) {$\color{darkgreen}\bullet$}; \end{tikzpicture} } - \mathord{ \begin{tikzpicture}[baseline = 1] \draw[-,thick,darkgreen] (0.25,.6) to (-0.25,-.2); \draw[-,thick,darkgreen] (0.25,-.2) to (-0.25,.6); \node at (-0.25,-.28) {$\scriptstyle{j_2}$}; \node at (0.25,-.28) {$\scriptstyle{j_1}$}; \node at (0.15,-0.02) {$\color{darkgreen}\bullet$}; \end{tikzpicture} } &= \left\{ \begin{array}{cl} \mathord{ \begin{tikzpicture}[baseline = -5] \draw[-,thick,darkgreen] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkgreen] (-0.28,-.3) to (-0.28,.4); \node at (-0.28,-.4) {$\scriptstyle{j_2}$}; \node at (0.08,-.4) {$\scriptstyle{j_1}$}; \end{tikzpicture} } & \text{if $j_1 = j_2$,} \\ \!\!\!\!-\mathord{ \begin{tikzpicture}[baseline = -2] \draw[-,thick,darkgreen] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkgreen] (-0.28,-.3) to (-0.28,.4); \node at (-0.28, 0.06){$\color{darkgreen}\circ$}; \node at (0.08, 0.06){$\color{darkgreen}\circ$}; \node at (-0.28,-.4) {$\scriptstyle{j_2}$}; \node at (0.08,-.4) {$\scriptstyle{j_1}$}; \end{tikzpicture} } & \text{if $j_1= - j_2$,} \\ 0 & \text{otherwise;} \end{array} \right.\end{aligned}$$$$\begin{aligned} \mathord{ \begin{tikzpicture}[baseline = 7] \draw[-,thick,darkgreen] (0.28,.4) to[out=90,in=-90] (-0.28,1.1); \draw[-,thick,darkgreen] (-0.28,.4) to[out=90,in=-90] (0.28,1.1); \draw[-,thick,darkgreen] (0.28,-.3) to[out=90,in=-90] (-0.28,.4); \draw[-,thick,darkgreen] (-0.28,-.3) to[out=90,in=-90] (0.28,.4); \node at (-0.28,-.4) {$\scriptstyle{j_2}$}; \node at (0.28,-.4) {$\scriptstyle{j_1}$}; \end{tikzpicture} } &= \left\{ \begin{array}{ll} \:\:\:\:0&\text{if $i_1 = i_2$,}\\ \mathord{ \kappa_1 (i_1-i_2) \begin{tikzpicture}[baseline = -1] \draw[-,thick,darkgreen] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkgreen] (-0.28,-.3) to (-0.28,.4); \node at (-0.28,-.4) {$\scriptstyle{j_2}$}; \node at (0.08,-.4) {$\scriptstyle{j_1}$}; \node at (0.08,0.05) {$\color{darkgreen}\bullet$}; \end{tikzpicture} } + \kappa_2(i_2-i_1) \mathord{ \begin{tikzpicture}[baseline = -1] \draw[-,thick,darkgreen] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkgreen] (-0.28,-.3) to (-0.28,.4); \node at (-0.28,-.4) {$\scriptstyle{j_2}$}; \node at (0.08,-.4) {$\scriptstyle{j_1}$}; \node at (-0.28,0.05) {$\color{darkgreen}\bullet$}; \end{tikzpicture} } &\text{if $|i_1 - i_2| = 1$,}\\ \mathord{ \begin{tikzpicture}[baseline = 0] \draw[-,thick,darkgreen] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkgreen] (-0.28,-.3) to (-0.28,.4); \node at (-0.28,-.4) {$\scriptstyle{j_2}$}; \node at (0.08,-.4) {$\scriptstyle{j_1}$}; \end{tikzpicture} }&\text{if $|i_1 - i_2| > 1$;}\\ \end{array} \right. \end{aligned}$$$$\begin{aligned} \mathord{ \begin{tikzpicture}[baseline = 1] \draw[-,thick,darkgreen] (0.45,.8) to (-0.45,-.4); \draw[-,thick,darkgreen] (0.45,-.4) to (-0.45,.8); \draw[-,thick,darkgreen] (0,-.4) to[out=90,in=-90] (-.45,0.2); \draw[-,thick,darkgreen] (-0.45,0.2) to[out=90,in=-90] (0,0.8); \node at (-0.45,-.5) {$\scriptstyle{j_3}$}; \node at (0,-.5) {$\scriptstyle{j_2}$}; \node at (0.45,-.5) {$\scriptstyle{j_1}$}; \end{tikzpicture} } - \mathord{ \begin{tikzpicture}[baseline = 1] \draw[-,thick,darkgreen] (0.45,.8) to (-0.45,-.4); \draw[-,thick,darkgreen] (0.45,-.4) to (-0.45,.8); \draw[-,thick,darkgreen] (0,-.4) to[out=90,in=-90] (.45,0.2); \draw[-,thick,darkgreen] (0.45,0.2) to[out=90,in=-90] (0,0.8); \node at (-0.45,-.5) {$\scriptstyle{j_3}$}; \node at (0,-.5) {$\scriptstyle{j_2}$}; \node at (0.45,-.5) {$\scriptstyle{j_1}$}; \end{tikzpicture} } \!&= \left\{ \begin{array}{ll} \kappa_1(i_1 - i_2) \mathord{ \begin{tikzpicture}[baseline = -1] \draw[-,thick,darkgreen] (0.44,-.3) to (0.44,.4); \draw[-,thick,darkgreen] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkgreen] (-0.28,-.3) to (-0.28,.4); \node at (-0.28,-.4) {$\scriptstyle{j_3}$}; \node at (0.08,-.4) {$\scriptstyle{j_2}$}; \node at (0.44,-.4) {$\scriptstyle{j_1}$}; \end{tikzpicture} } & \text{if $j_1 = j_3$ and $|i_1 - i_2|= 1$,}\\ \kappa_1 (i_2 - i_1) \mathord{ \begin{tikzpicture}[baseline =-1] \draw[-,thick,darkgreen] (0.44,-.3) to (0.44,.4); \draw[-,thick,darkgreen] (0.08,-.3) to (0.08,.4); \draw[-,thick,darkgreen] (-0.28,-.3) to (-0.28,.4); \node at (-0.28, 0.06) {$\color{darkgreen} \circ$}; \node at (0.44, 0.06) {$\color{darkgreen} \circ$}; \node at (-0.28,-.4) {$\scriptstyle{j_3}$}; \node at (0.08,-.4) {$\scriptstyle{j_2}$}; \node at (0.44,-.4) {$\scriptstyle{j_1}$}; \end{tikzpicture} } &\text{if $j_1=-j_3$ and $|i_1 - i_2| = 1$,} \\ \:\:\:\:0 &\text{otherwise.} \end{array} \right.\end{aligned}$$ In the above, we have adopted the convention given $j_r \in J$ that $i_r \in I$ and $\kappa_r \in \{\pm 1\}$ are defined from $j_r = \kappa_r \sqrt{z+i_r}\sqrt{z + i_r +1}$. Identifying the word $\bj = j_d\cdots j_1 \in J^d$ with $j_d \otimes\cdots\otimes j_1 \in \ob \QHC$, the [*quiver Hecke-Clifford superalgebra*]{} is the locally unital algebra $$\label{train2} QHC_d := \bigoplus_{\bj,\bj' \in J^d} \operatorname{Hom}_{\QHC}(\bj,\bj').$$ This is exactly as in [@KKT Definition 3.5] in the special case of the $\mathfrak{sl}_\infty$-quiver. Now we are going to exploit a remarkable isomorphism between certain completions $\widehat{AHC}_d$ and $\widehat{QHC}_d$ of the superalgebras $AHC_d$ and $QHC_d$ from (\[train1\]) and (\[train2\]), which was constructed in [@KKT]. To define these, we need some further notation. Numbering strands of a diagram by $1,\dots,d$ from right to left, $AHC_d$ is generated by its elements $x_r, c_r\:(1 \leq r \leq d)$ and $t_r\:(1 \leq r < d)$ corresponding to the closed dot on the $r$th strand, the open dot on the $r$th strand, and the crossing of the $r$th and $(r+1)$th strands, respectively. Let $HC_d := S_d \ltimes C_d$ be the [*Sergeev superalgebra*]{}, that is, the smash product of the symmetric group $S_d$ with basic transpositions $t_1,\dots,t_{d-1}$ acting on the Clifford superalgebra $C_d$ on generators $c_1,\dots,c_d$. Let $A_d$ denote the purely even polynomial superalgebra $\operatorname{{\Bbbk}}[x_1,\dots,x_d]$. By the basis theorem for $AHC_d$ established in [@BK $\S$2-k], the natural multiplication map gives a superspace isomorphism $HC_d \otimes A_d \stackrel{\sim}{\rightarrow} AHC_d$. Transporting the multiplication on $AHC_d$ to $HC_d\otimes A_d$ via this isomorphism, the following describe how to commute a polynomial $f \in A_d$ past the generators of $HC_d$: $$\begin{aligned} (1 \otimes f) (c_r \otimes 1) &= c_r \otimes c_r(f),\\ (1 \otimes f) (t_r \otimes 1) &= t_r \otimes t_r(f) + 1 \otimes \partial_r(f) +c_r c_{r+1} \otimes \tilde\partial_r(f),\end{aligned}$$ for operators $c_r, t_r, \partial_r,\tilde\partial_r:A_d \rightarrow A_d$ such that - $t_r$ is the automorphism that interchanges $x_r$ and $x_{r+1}$ and fixes all other generators; - $c_r$ is the automorphism that sends $x_r \mapsto -x_r$ and fixes all other generators; - $\partial_r$ is the Demazure operator $\partial_r(f) := \frac{t_r(f)-f}{x_r - x_{r+1}}; $ - $\tilde{\partial}_r$ is the [twisted Demazure operator]{} $c_{r+1} \circ \partial_r \circ c_{r}$, so $\tilde\partial_r(f) = \frac{t_r(f) - c_{r+1}(c_r(f))}{x_r+x_{r+1}}.$ Given a tuple $\mu = (\mu_i)_{i \in I}$ of non-negative integers all but finitely many of which are zero, the quotient superalgebra $$AHC_d(\mu) := AHC_d \Big/ \Big\langle \prod_{i \in I} \left(x_1^2 - (z+i)(z+i+1)\right)^{\mu_i} \Big\rangle$$ is a (degenerate) [*cyclotomic Hecke-Clifford superalgebra*]{} in the sense of [@BK $\S$3.e]. It is finite dimensional. Moreover, all roots of the minimal polynomials of all $x_r \in AHC_d(\mu)$ belong to the set $J$. It follows for each $\bj = j_d \cdots j_1$ in the set $J^d$ of words of length $d$ in letters $J$ that there is an idempotent $1_\bj \in AHC_d(\mu)$ defined by the projection onto the simultaneous generalized eigenspaces for $x_1,\dots,x_d$ with eigenvalues $j_1,\dots,j_d$, respectively. Moreover, we have that $$AHC_d(\mu) = \bigoplus_{\bj,\bj' \in J^d} 1_{\bj'} AHC_d(\mu) 1_\bj.$$ If $\mu \leq \mu'$, i.e. $\mu_i \leq \mu_i'$ for all $i$, there is a canonical surjection $AHC_d(\mu') \twoheadrightarrow AHC_d(\mu)$ sending $x_r,c_r,t_r,1_\bj \in AHC_d(\mu')$ to the elements of $AHC_d(\mu)$ with the same names. Let $$\label{phew} \widehat{AHC}_d := \varprojlim_{\mu} AHC_d(\mu)$$ be the inverse limit of this system of superalgebras taken in the category of locally unital superalgebras with distinguished idempotents indexed by $J^d$. Using the basis theorem for the cyclotomic quotients $AHC_d(\mu)$ from [@BK $\S$3-e], one can identify $\widehat{AHC}_d$ with the completion defined in [@KKT Definition 5.3][^2]. In particular, letting $$\widehat{A}_d := \bigoplus_{\bj \in J^d} \operatorname{{\Bbbk}}[[x_1-j_1,\dots,x_d-j_d]]1_\bj,$$ there is a superspace isomorphism $HC_d \otimes \widehat{A}_d \stackrel{\sim}{\rightarrow} \widehat{AHC}_d$ induced by the obvious multiplication maps $HC_d \otimes \widehat{A}_d \twoheadrightarrow AHC_d(\mu)$ for all $\mu$. The multiplication on $HC_d\otimes \widehat{A}_d$ corresponding to the one on $\widehat{AHC}_d$ via this isomorphism has the following properties for all $f \in \widehat{A}_d$: $$\begin{aligned} (1 \otimes f 1_{\bj}) (c_r \otimes 1_{\bj'}) &= c_r \otimes c_r(f) 1_{c_r(\bj)} 1_{\bj'},\\\notag (1 \otimes f 1_{\bj}) (t_r \otimes 1_{\bj'}) &= t_r \otimes t_r(f) 1_{t_r(\bj)}1_\bj' + 1 \otimes \frac{t_r(f) 1_{t_r(\bj)} - f 1_\bj}{x_r-x_{r+1}}1_{\bj'} \\ &+c_r c_{r+1} \otimes \frac{ t_r(f) 1_{t_r(\bj)}- c_{r+1}(c_{r}(f)) 1_{c_{r+1}(c_r(\bj))}}{x_r + x_{r+1}} 1_{\bj'}. \label{fr}\end{aligned}$$ The fractions on the right hand side of (\[fr\]) make sense: in the first, $(x_r - x_{r+1}) 1_{\bj'}$ is invertible unless $j'_r = j'_{r+1}$, in which case the expression equals $\partial_r(f) 1_\bj 1_{\bj'}$; the second is fine when $j'_r \neq -j'_{r+1}$ as then $(x_r+x_{r+1}) 1_{\bj'}$ is invertible, while if $j'_r = -j'_{r+1}$ it equals $\tilde\partial_r(f) 1_{t_r(\bj)}1_{\bj'}$. Similarly, there is a completion $\widehat{QHC}_d$ of $QHC_d$. To introduce this, we denote the elements of $QHC_d 1_\bj$ defined by an open dot on the $r$th strand, a closed dot on the $r$th strand and a crossing of the $r$th and $(r+1)$th strands by $\gamma_r 1_\bj, \xi_r 1_\bj$ and $\tau_r 1_\bj$, respectively. For $\mu = (\mu_i)_{i \in I}$ as above, we define the [*cyclotomic quiver Hecke-Clifford superalgebra*]{} $$QHC_d(\mu) := QHC_d \Big/ \left\langle \xi_1^{2\mu_{i}}1_\bj \:\Big|\:\bj \in J^d , i \in I \text{ with }j_1^2 = (z+i)(z+i+1) \right\rangle.$$ Using the relations, it is easy to see that the images of all $\xi_r 1_\bj$ are nilpotent in $QHC_d(\mu)$. Then we set $$\widehat{QHC}_d := \varprojlim_\mu QHC_d(\mu),$$ taking the inverse limit once again in the category of locally unital superalgebras with distinguished idempotents indexed by $J^d$. The obvious locally unital homomorphisms $QHC_d \otimes_{\operatorname{{\Bbbk}}[\xi_1,\dots,\xi_d]} \operatorname{{\Bbbk}}[[\xi_1,\dots,\xi_d]] \twoheadrightarrow QHC_d(\mu)$ for each $\mu$ induce a surjective homomorphism $$QHC_d \otimes_{\operatorname{{\Bbbk}}[\xi_1,\dots,\xi_d]} \operatorname{{\Bbbk}}[[\xi_1,\dots,\xi_d]] \rightarrow \widehat{QHC}_d.$$ This map is actually an isomorphism, as may be deduced using the basis theorem for $QHC_d$ from [@KKT Corollary 3.9] plus the observation that the image of any non-zero element $u \in QHC_d$ is non-zero in $QHC_d(\mu)$ for sufficiently large $\mu$; the latter assertion follows by elementary considerations involving the natural $\operatorname{\mathbb{Z}}$-grading on $QHC_d$. Consequently, $\widehat{QHC}_d$ is isomorphic to the completion introduced in a slightly different way in [@KKT Definition 3.16]. Moreover, there is a locally unital embedding $QHC_d \hookrightarrow \widehat{QHC}_d$. At last, we are ready to state the crucial theorem from [@KKT]. We need this only in the special situation of [@KKT $\S$5.2(i)(a)], but emphasize that the results obtained in [@KKT] are substantially more general. In particular, for us, all elements of the set $I$ are even in the sense of [@KKT $\S$3.5], so that we do not need the more general quiver Hecke [*super*]{}algebras of [@KKT]. \[kkttheorem\] There is a superalgebra isomorphism $\widehat{QHC}_d \stackrel{\sim}{\rightarrow} \widehat{AHC}_d$ such that $$1_\bj \mapsto 1_\bj,\quad \gamma_r 1_\bj \mapsto c_r 1_\bj,\quad \xi_r 1_\bj \mapsto y_r 1_\bj,\quad \tau_r 1_\bj \mapsto t_r g_r 1_\bj + f_r 1_\bj + c_r c_{r+1} \tilde f_r 1_\bj,$$ for all $\bj \in J^d$ and $r$. Here, $y_r \in \operatorname{{\Bbbk}}[[x_r-j_r]]$ and $g_r, f_r, \tilde f_r \in \operatorname{{\Bbbk}}[[x_r-j_r,x_{r+1}-j_{r+1}]]$ are the power series determined uniquely by the following: $$\begin{aligned} j_r &= \kappa_r \sqrt{z+i_r}\sqrt{z+i_r +1}\text{ for $i_r \in I$ and $\kappa_r \in \{\pm\}$},\\ y_r &=\kappa_r \left(\sqrt{x_r^2+{\textstyle\frac{1}{4}}} - \left(z+i_r+\half\right)\right) \in (x_r-j_r),\\ p_r &= \frac{(x_r^2-x_{r+1}^2)^2}{2 (x_r^2+x_{r+1}^2)-(x_r^2-x_{r+1}^2)^2},\\ g_r &= \left\{ \begin{array}{ll} -1&\text{if $i_r < i_{r+1}$,}\\ p_r \left(\kappa_r y_r - \kappa_{r+1} y_{r+1}\right) &\text{if $i_r = i_{r+1}+1$,}\\ p_r&\text{if $i_r > i_{r+1}+1$,}\\ \frac{\sqrt{p_r}}{y_r-y_{r+1}} \in \frac{x_r-x_{r+1}}{y_r-y_{r+1}} + (x_r-x_{r+1}) &\text{if $j_r = j_{r+1}$,}\\ \frac{\sqrt{p_r}}{y_r+y_{r+1}} \in \frac{x_r+x_{r+1}}{y_r+y_{r+1}} + (x_r+x_{r+1}) &\text{if $j_r = -j_{r+1}$;}\\ \end{array}\right.\\ f_r &= \frac{g_r}{x_r-x_{r+1}} - \frac{\delta_{j_r,j_{r+1}}}{y_r-y_{r+1}},\qquad \tilde f_r = \frac{g_r}{x_r+x_{r+1}} - \frac{\delta_{j_r,-j_{r+1}}}{y_r+y_{r+1}}.\end{aligned}$$ (All of this notation depends implicitly on $\bj$.) This is a special case of [@KKT Theorem 5.4]. To help the reader to translate between our notation and that of [@KKT], we note that the set $J$ in [@KKT] is the same as our set $J$, but the set $I$ there is $\tilde I := \{j^2\:|\:j \in J\}$, which is different from our $I$. We have made various other choices as stipulated in [@KKT] in order to produce concrete formulae: we have taken the functions $\eps:J \rightarrow \{0,1\}$ and $h:\tilde I \rightarrow \operatorname{{\Bbbk}}$ from [@KKT (5.7)] so that $\eps(j) = (1-\kappa)/2$ and $h(j^2) = z+i+\half$ for $J\ni j = \kappa \sqrt{z+i}\sqrt{z+i+1}$; for [@KKT (5.11)] we took $G_{j_r, j_{r+1}}$ (our $g_r$) to be $-1$ when $i_r < i_{r+1}$. The fact that $g_r, f_r$ and $\tilde f_r$ are all well-defined elements of $\operatorname{{\Bbbk}}[[x_r-j_r,x_{r+1}-j_{r+1}]]$ is justified by [@KKT Lemma 5.5]. Note also that the ambiguous square roots appearing in the formulae for $y_r$ and $g_r$ are uniquely determined by the containments we have specified. Notes: Our $J$ is the same as the one in [@KKT], but $I$ in [@KKT] is $\{j^2\:|\:j \in J\}$. Also in [@KKT], a key role is played by the algebra $A = \operatorname{{\Bbbk}}[x,\lambda] / (x^2-\lambda^2+\frac{1}{4})$. I’m writing instead $y = \lambda - h$ and my $x$ is their $x-j$. So $A = \operatorname{{\Bbbk}}[x,y] / ((x+j)^2 - (y+h)^2 + \frac{1}{4})$. Then they form the completion at $I = (x,y)$ (in my notation) and observe this is naturally $\operatorname{{\Bbbk}}[[x]]$ and $\operatorname{{\Bbbk}}[[y]]$. The formula for $y$ in terms of $x$ is the above. For $\bi = i_d \cdots i_1 \in I^d$, let $F_\bi := F_{i_d} \cdots F_{i_1}:\O\rightarrow\O$. The usual vertical composition of natural transformations makes the vector space $$NT_d := \bigoplus_{\bi,\bi' \in I^d} \operatorname{Hom}(F_\bi, F_{\bi'})$$ into a locally unital algebra with distinguished idempotents $\{1_\bi\:|\:\bi \in I^d\}$ arising from the identity endomorphisms of each $F_\bi$. Also horizontal composition of natural transformations defines homomorphisms $a_{d_2,d_1}:NT_{d_2} \otimes NT_{d_1} \rightarrow NT_{d_2+d_1}$ for all $d_1,d_2 \geq 0$. Recalling (\[recla\]), the data of a strict monoidal functor $\Phi:\QH \rightarrow \mathcal{E}nd(\O)$ sending $i$ to $F_i$ is just the same as a family of locally unital algebra homomorphisms $\Phi_d: QH_d \rightarrow NT_d$ for all $d \geq 0$, such that $1_\bi \mapsto 1_\bi$ for each $\bi \in I^d$ and $$\label{analog} a_{d_2,d_1} \circ \Phi_{d_2} \otimes \Phi_{d_1} = \Phi_{d_2+d_1} \circ b_{d_2,d_1}$$ for all $d_1,d_2 \geq 0$, where $b_{d_2,d_1}:QH_{d_2} \otimes QH_{d_1} \rightarrow QH_{d_2+d_1}$ is the obvious embedding defined by horizontal concatenation of diagrams. To construct $\Phi_d$, we start from the monoidal superfunctor $\Psi$ from Theorem \[hkst\]. This induces superalgebra homomorphisms $\Psi_d:AHC_d \rightarrow \operatorname{End}(\sF^d)$ for all $d \geq 0$, where $\operatorname{End}(\sF^d)$ denotes supernatural endomorphisms of $\sF^d:\sO \rightarrow \sO$. For each $M \in \ob \sO$, Corollary \[minpoly\] implies that $\operatorname{ev}_M \circ \Psi_d : AHC_d \rightarrow \operatorname{End}_{\sO}(\sF^d \,M)$ factors through all sufficiently large cyclotomic quotients $AHC_d(\mu)$. Hence, $\Psi_d$ extends uniquely to a locally unital superalgebra homomorphism $\widehat{\Psi}_d:\widehat{AHC}_d \rightarrow SNT_d$, where $$SNT_d := \bigoplus_{\bj, \bj' \in J^d} \operatorname{Hom}(\sF_\bj, \sF_{\bj'}) \subset \operatorname{End}(\sF^d)$$ and $\sF_{\bj} := \sF_{j_d}\cdots \sF_{j_1}$. Composing $\widehat{\Psi}_d$ with the isomorphism from Theorem \[kkttheorem\] and the inclusion $QHC_d \hookrightarrow \widehat{QHC}_d$, we obtain a locally unital superalgebra homomorphism $\Theta_d:QHC_d \rightarrow SNT_d$. It is obvious from Definitions \[qhdef\] and \[qhcdef\] that there is a locally unital algebra homomorphism $\inc:QH_d \rightarrow (QHC_d)_\0$ sending the idempotent $1_\bi$ to $1_\bj$ for $\bj$ with $j_r := \sqrt{z+i_r}\sqrt{z+i_r+1}$, and taking the elements of $QH_d 1_\bi$ defined by the dot on the $r$th strand and the crossing of the $r$th and $(r+1)$th strands to $\xi_r 1_\bj$ and $\tau_r 1_\bj$, respectively. Also, recalling (\[them\]), restriction from $\sO$ to $\O$ defines a homomorphism $$\pr:\displaystyle\bigoplus_{\bj, \bj' \in J_+^d} 1_{\bj'} (SNT_d)_\0 1_\bj \rightarrow NT_d$$ where $J_+ := \left\{\sqrt{z+i}\sqrt{z+i+1}\:\big|\:i \in I\right\} \subset J$. Then the composition $\pr \circ \Theta_d \circ \inc$ gives us the desired locally unital homomorphism $\Phi_d:QH_d \rightarrow NT_d $ sending $1_\bi \mapsto 1_\bi$ for each $\bi \in I^d$. It just remains to observe that the property (\[analog\]) is satisfied, and that $\Phi_d(x_r 1_\bi)_M$ is nilpotent for each $r$, $\bi \in I^d$ and $M \in \ob\O$. These things follow from the explicit formulae in Theorems \[hkst\] and \[kkttheorem\] plus Corollary \[minpoly\] once again. Proof of the Main Theorem ========================= Everything is now in place for us to be able to prove the Main Theorem from the introduction. Recall $\bsigma = (\sigma_1,\dots,\sigma_n)$ is a sign sequence, and $V^{\otimes \bsigma}$ denotes the $\mathfrak{sl}_\infty$-module $V^{\sigma_1}\otimes\cdots\otimes V^{\sigma_n}$. The following is a special case of [@BLW Definition 2.10], which reformulated [@LW Definiton 3.2] for tensor products of minuscule representations; it may be helpful to recall Definitions \[bruhatdef\], \[hwdef\] and \[qhdef\] at this point. \[tpcdef\] An $\mathfrak{sl}_\infty$-[*tensor product categorification*]{} of $V^{\otimes \bsigma}$ is the following data: - a highest weight category $\mathcal C$ with weight poset $(\operatorname{\mathbf{B}}, \preceq)$; - adjoint pairs $(F_i, E_i)$ of endofunctors of $\mathcal C$ for each $i \in I$; - a strict monoidal functor $\Phi:\mathcal{QH} \rightarrow \mathcal{E}nd(\C)$ with $\Phi(i) = F_i$ for each $i \in I$. We impose the following additional axioms for all $i \in I$, $\bb \in \operatorname{\mathbf{B}}$ and $M \in \ob \C$: - $E_i$ is isomorphic to a left adjoint of $F_i$; - $F_i \Delta(\bb)$ has a $\Delta$-flag with sections $\{\Delta(\bb+\sigma_t \bd_t)\:|\: 1 \leq t \leq n, \isig_t(\bb) = \mathtt{f}\}$; - $E_i \Delta(\bb)$ has a $\Delta$-flag with sections $\{\Delta(\bb-\sigma_t \bd_t)\:|\:1 \leq t \leq n, \isig_t(\bb) = \mathtt{e}\}$; - the endomorphism $\Phi\Big( \mathord{ \begin{tikzpicture}[baseline = -2] \draw[-,thick,darkred] (0.08,-.15) to (0.08,.3); \node at (0.08,0.05) {$\color{darkred}\bullet$}; \node at (0.08,-.25) {$\scriptstyle{i}$}; \end{tikzpicture} } \Big)_M: F_i M\rightarrow F_i M$ is nilpotent. Theorems \[itsplits\], \[itshw\], \[itacts\] and \[itlifts\] together imply: \[typea\] The supercategory $\sO$ defined in section \[s2\] splits as $\O \oplus \Pi \O$, with $\O$ admitting all of the additional structure needed to make it into an $\mathfrak{sl}_\infty$-tensor product categorification of $V^{\otimes \bsigma}$. As we already mentioned in the introduction, to complete the proof of our Main Theorem, we just need to appeal to the following results from [@BLW]: The supercategory $\sO'$ from the introduction decomposes as $\O' \oplus \Pi \O'$, with $\O'$ admitting the structure of an $\mathfrak{sl}_\infty$-tensor product categorification of $V^{\otimes \bsigma}$. This is a special case of [@BLW Theorem 3.10]. Any two $\mathfrak{sl}_\infty$-tensor product categorifications of $V^{\otimes \bsigma}$ are strongly equivariantly equivalent (in the sense of [@LW Definition 3.1]). This is a special case of [@BLW Theorem 2.12]. We get at once that the categories $\O$ and $\O'$ are equivalent, hence so too are $\sO$ and $\sO'$. This already proves the Main Theorem from the introduction in the case that $n$ is even. When $n$ is odd, one also needs to apply the Lemma from the introduction to see that the supercategory $\sO$ in the statement of the Main Theorem is the Clifford twist of the supercategory $\sO$ being studied here. Canonical basis {#cbs} =============== Combining our Main Theorem with the results of [@CLW; @BLW], it follows that the composition multiplicities $[M(\ba):L(\bb)]$ can be obtained by evaluating certain parabolic Kazhdan-Lusztig polynomials at $q=1$. In this section, we explain a simple algorithm to compute these polynomials explicitly. The algorithm is similar in spirit to the algorithm explained in [@B0 $\S$2-j], but actually the variant here is both easier to implement and a little faster. It also has the advantage of working for arbitrary sign sequences $\bsigma$, whereas the approach in [@B0] only makes sense for [*normally-ordered*]{} $\bsigma$’s, i.e. ones in which all $+$’s preceed all $-$’s. (But note that one can easily transition between different sign sequences as explained in [@CL $\S$5].) We first need to introduce the quantum analog of the $\mathfrak{sl}_\infty$-module $V^{\otimes\bsigma}$. We will use similar notation to before, but decorated with dots to indicate $q$-analogs. Consider the generic quantized enveloping algebra $U_q \mathfrak{sl}_\infty$ over the field $\operatorname{\mathbb{Q}}(q)$. This has standard generators $\{\dot e_i, \dot f_i, \dot k_i, \dot k_i^{-1}\:|\:i \in I\}$. We work with the comultiplication $\Delta$ defined from $$\label{comult} \Delta(\dot{f}_i) = 1 \otimes \dot{f}_i + \dot{f}_i \otimes \dot{k}_i, \quad \Delta(\dot{e}_i) = \dot{k}_i^{-1} \otimes \dot{e}_i + \dot{e}_i \otimes 1, \quad \Delta(\dot{k}_i) = \dot{k}_i \otimes \dot{k}_i.$$ We have the natural $U_q \mathfrak{sl}_\infty$-module $\dot V^+$ on basis $\{\dot v^+_i\:|\:i \in I\}$, and its dual $\dot V^-$ on basis $\{\dot v^-_i\:|\:i \in I\}$. The Chevalley generators $\dot f_i$ and $\dot e_i$ act on these basis vectors by exactly the same formulae (\[e\])–(\[f\]) as at $q=1$, and also $$\dot k_i \dot v^+_j = q^{\delta_{i,j}-\delta_{i+1,j}} \dot v^+_j, \qquad \dot k_i \dot v^-_j = q^{\delta_{i+1,j}-\delta_{i,j}}\dot v^-_j.$$ Then we form the tensor space $\dot V^{\otimes \bsigma} := \dot V^{\sigma_1} \otimes\cdots\otimes \dot V^{\sigma_n}$, which is a $U_q \mathfrak{sl}_\infty$-module with its monomial basis $\left\{\dot v_\bb := \dot v_{b_1}^{\sigma_1} \otimes\cdots\otimes \dot v_{b_n}^{\sigma_n}\:\big|\:\bb \in \operatorname{\mathbf{B}}\right\}$. Next we pass to a certain completion $\widehat{V}^{\otimes\bsigma}$. Recall the inverse dominance order $\succeq$ on $P^n$ from Definition \[bruhatdef\]. We define $\widehat{V}^{\otimes\bsigma}$ to be the $\operatorname{\mathbb{Q}}(q)$-vector space consisting of formal linear combinations of the form $\sum_{\bb \in \operatorname{\mathbf{B}}} p_\bb(q) \dot v_\bb$ for rational functions $p_\bb(q) \in \operatorname{\mathbb{Q}}(q)$, such that the [*support*]{} $\{\bb \in \operatorname{\mathbf{B}}\:|\:p_\bb(q) \neq 0\}$ is contained in a finite union of sets of the form $ \{\bb \in \operatorname{\mathbf{B}}\:|\:\operatorname{\mathbf{wt}}(\bb) \succeq \bbeta\} $ for $\bbeta \in P^n$. The action of $U_q \mathfrak{sl}_\infty$ on $\dot V^{\otimes\bsigma}$ extends to a well-defined action on $\widehat{V}^{\otimes\bsigma}$ such that $u \big(\sum_{\bb \in \operatorname{\mathbf{B}}} p_\bb(q) \dot v_\bb\big) = \sum_{\bb \in \operatorname{\mathbf{B}}} p_\bb(q) \,u \dot v_\bb$ for every $u \in U_q \mathfrak{sl}_\infty$. Moreover, $\widehat{V}^{\otimes \bsigma}$ splits as the direct sum of its weight spaces. For the first assertion, we need to show that the expression $\sum_{\bb \in \operatorname{\mathbf{B}}} p_\bb(q) \,u \dot v_\bb$ satisfies the condition on its support required to belong to $\widehat{V}^{\otimes\bsigma}$. It suffices to check this for $u \in \{\dot f_i, \dot e_i\:|\:i \in I\}$. If $\operatorname{\mathbf{wt}}(\bb) \succeq (\beta_1,\dots,\beta_n)$ and $v_\ba$ appears with non-zero coefficient in the expansion of $\dot e_i v_\bb$ (resp. $\dot f_i v_\bb$), then $\operatorname{\mathbf{wt}}(\ba)$ is equal to $\operatorname{\mathbf{wt}}(\bb)$ with $\alpha_i$ added (resp. subtracted) from one of its entries. Hence, $\operatorname{\mathbf{wt}}(\ba) \succeq (\beta_1+\alpha_i,\beta_2,\dots,\beta_n)$ (resp. $\operatorname{\mathbf{wt}}(\ba) \succeq (\beta_1,\dots,\beta_{n-1},\beta_n-\alpha_i)$). This is all that is needed. The fact that $\widehat{V}^{\otimes\bsigma}$ is a direct sum of its weight spaces follows because all $v_\bb$ with $\operatorname{\mathbf{wt}}(\bb) \succeq (\beta_1,\dots,\beta_n)$ are of the same weight $\beta_1+\cdots+\beta_n$. The completion $\widehat{V}^{\otimes \bsigma}$ admits a [*bar involution*]{} $\psi: \widehat{V}^{\otimes\bsigma} \rightarrow \widehat{V}^{\otimes\bsigma}$ which is anti-linear with respect to the field automorphism $\operatorname{\mathbb{Q}}(q) \rightarrow \operatorname{\mathbb{Q}}(q), q \mapsto q^{-1}$. To define $\psi$, let $\Theta$ be Lusztig’s quasi-$R$-matrix from [@Lubook Theorem 4.1.2]; note for this due to our different choice of $\Delta$ compared to [@Lubook] that Lusztig’s $v$ is our $q^{-1}$ (and his $E_i, F_i, K_i$ are our $\dot e_i, \dot f_i, \dot k_i^{-1}$). We proceed by induction on $n$, setting $\psi(\dot v_i^+) = \dot v_i^+$ and $\psi(\dot v_i^-) = \dot v_i^-$ in case $n=1$. For $n > 1$, let $\bar\bsigma$ and $\bar\bb$ denote the $(n-1)$-tuples $(\sigma_1,\dots,\sigma_{n-1})$ and $(b_1,\dots,b_{n-1})$, respectively. Assuming that the analog $\bar\psi$ of $\psi$ on the space $\widehat{V}^{\otimes\bar\bsigma}$ has already been defined by induction, we define $\psi$ on $\widehat{V}^{\otimes\bsigma}$ by setting $$\label{bardef} \psi\left({\sum_{\bb \in \operatorname{\mathbf{B}}}} p_\bb(q) \dot v_\bb\right) := {\sum_{\bb \in \operatorname{\mathbf{B}}}} p_\bb(q^{-1}) \,\Theta\!\left(\bar\psi(\dot v_{\bar\bb}\right) \otimes \dot v_{b_n}^{\sigma_n}).$$ The antilinear map $\psi$ defined by (\[bardef\]) is a well-defined involution of $\widehat{V}^{\otimes\bsigma}$ preserving all weight spaces and commuting with the actions of $\dot f_i, \dot e_i$ for all $i \in I$. Moreover, $\psi(\dot v_\bb)$ is equal to $\dot v_\bb$ plus a (possibly infinite) $\operatorname{\mathbb{Z}}[q,q^{-1}]$-linear combination of $\dot v_\ba$’s for $\ba \succ \bb$. Recall that $\Theta$ is a formal sum of terms $\Theta_\beta$ for $\beta \in \bigoplus_{i \in I} \operatorname{\mathbb{N}}\alpha_i$, with $\Theta_0 = 1$ and $\Theta_\beta \in (U^-_q \mathfrak{sl}_\infty)_{-\beta} \otimes (U_q^+ \mathfrak{sl}_\infty)_\beta$. The only monomials in the generators of $U_q^+\mathfrak{sl}_\infty$ that are non-zero on $\dot v_{j}^{\sigma_n}$ are of the form $\dot e_i \dot e_{i+1}\cdots \dot e_{j-1}$ for $i \leq j$ if $\sigma_n=+$ (resp. the form $\dot e_{i-1} \dot e_{i-2} \cdots \dot e_{j}$ for $i \geq j$ if $\sigma_n=-$). Using also the integrality of the quasi-$R$-matrix from [@Lubook Corollary 24.1.6] (or a direct calculation from [@Lubook Theorem 4.1.2(b)]), it follows for any $v \in \widehat{V}^{\otimes\bar\bsigma}$ that $$\label{rhs} \Theta\left(v \otimes \dot v_{j}^{\sigma_n}\right) = v \otimes \dot v^{\sigma_n}_{j}+ \sum_i \left(\Theta_{i,j} v\right) \otimes \dot v^{\sigma_n}_i$$ summing over $i < j$ if $\sigma_n=+$ (resp. $i > j$ if $\sigma_n=-$), for $\Theta_{i,j}$’s that are $\operatorname{\mathbb{Z}}[q,q^{-1}]$-linear combinations of monomials obtained by multiplying the generators $\dot f_i, \dot f_{i+1},\dots, \dot f_{j-1}$ (resp. $\dot f_{i-1}, \dot f_{i-2}, \dots, \dot f_{j}$) together in some order. By induction, $\bar\psi(\dot v_{\bar\bb})$ equals $\dot v_{\bar\bb}$ plus a $\operatorname{\mathbb{Z}}[q,q^{-1}]$-linear combination of $\dot v_{\bar\ba}$’s for $\bar\ba \succ \bar\bb$. Combining these two statements, we deduce that $$\Theta\left(\bar\psi(\dot v_{\bar\bb}\right) \otimes \dot v_{b_n}^{\sigma_n}) = \dot v_{\bb}+\text{(a $\operatorname{\mathbb{Z}}[q,q^{-1}]$-linear combination of $\dot v_\ba$'s for $\ba \succ \bb$)}.$$ This shows that the formula (\[bardef\]) makes $\psi(\dot v_\bb)$ into a well-defined element of $\widehat{V}^{\otimes\bsigma}$ of the desired form. The formula (\[bardef\]) also makes sense for arbitrary sums $\sum_{\bb \in \operatorname{\mathbf{B}}} p_\bb(q) \dot v_\bb$ due to the interval-finiteness of the inverse dominance ordering on $P^n$. Finally, to see that $\psi$ commutes with the actions of all $\dot f_i$ and $\dot e_i$, and that it is an involution, one argues as in [@Lubook $\S$27.3.1]. Now we are in a position to apply “Lusztig’s Lemma” as in the proof of [@Lubook Theorem 27.3.2] to deduce for each $\bb \in \operatorname{\mathbf{B}}$ that there is a unique vector $\dot c_\bb \in \widehat{V}^{\otimes\bsigma}$ such that - $\psi(\dot c_\bb)= \dot c_\bb$; - $\dot c_\bb = \dot v_\bb + \text{a (possibly infinite) $q\operatorname{\mathbb{Z}}[q]$-linear combination of $\dot v_\ba$'s for $\ba \succ \bb$}$. This defines the [*canonical basis*]{} $\{\dot c_\bb\:|\:\bb \in \operatorname{\mathbf{B}}\}$. It is known (but non-trivial) that each $\dot c_\bb$ is always a [*finite*]{} sum of $\dot v_\ba$’s, i.e. $\dot c_\bb \in \dot V^{\otimes \bsigma}$ before completion. Moreover, the polynomials $d_{\ba,\bb}(q)$ arising from the expansion $$\dot c_\bb = {\sum_{\ba\in \operatorname{\mathbf{B}}}} d_{\ba,\bb}(q) \dot v_\ba$$ are some finite type A parabolic Kazhdan-Lusztig polynomials (suitably normalized). All of these statements have a natural representation theoretic explanation discussed in detail in [@BLW $\S$5.9]. In particular, the results of [@BLW] (or [@CLW]) imply the following. \[dnt\] Under the identification of $\mathbb{C} \otimes_{\mathbb{Z}} K_0(\O^\Delta)$ with $V^{\otimes \bsigma}$ from Theorem \[itacts\], $[P(\bb)]$ corresponds to the specialization $c_\bb$ of the canonical basis element $\dot c_\bb$ at $q=1$. Equivalently, $(P(\bb):M(\ba)) = [M(\ba):L(\bb)] = d_{\ba,\bb}(1)$ for each $\ba,\bb \in \operatorname{\mathbf{B}}$. We are ready to explain our new algorithm to compute $\dot c_\bb$. We proceed by induction on $n$. In case $n=1$, we have that $\dot c_\bb = \dot v_\bb$ always. If $n > 1$, we first compute $\dot c_{\bar\bb} \in \widehat{V}^{\otimes\bar\bsigma}$. It is a linear combination of finitely many $\dot v_{\bar\ba}$’s for $\bar\ba \succeq \bar\bb$. Then we define $j \in I$ as follows. - If $\sigma_n=+$ then $j$ is the greatest integer such that $j \leq b_n$, and the following hold for all $1 \leq r < n$ and all tuples $\bar\ba = (a_1,\dots,a_{n-1})$ such that $\dot v_{\bar\ba}$ occurs in the expansion of $\dot c_{\bar\bb}$: - if $\sigma_r=+$ then $j \leq a_r$; - if $\sigma_r=-$ then $j < a_r$. - If $\sigma_n=-$ then $j$ is the smallest integer such that $j \geq b_n$, and the following hold for all $1 \leq r < n$ and all tuples $\bar\ba = (a_1,\dots,a_{n-1})$ such that $\dot v_{\bar\ba}$ occurs from the expansion of $\dot c_{\bar\bb}$: - if $\sigma_r=-$ then $j \geq a_r$; - if $\sigma_r=+$ then $j > a_r$. \[lastofyear\] In the above notation, we have that $\Theta\left(\dot c_{\bar \bb} \otimes \dot v_j^{\sigma_n}\right) = \dot c_{\bar\bb} \otimes \dot v_j^{\sigma_n}$. By (\[rhs\]), we have that $\Theta\left(\dot c_{\bar \bb} \otimes \dot v_j^{\sigma_n}\right) = \dot c_{\bar\bb} \otimes \dot v_j^{\sigma_n} + \sum_i \left(\Theta_{i,j} \dot c_{\bar\bb} \right) \otimes \dot v_i^{\sigma_n}$ summing over $i < j$ if $\sigma_n=+$ (resp. $i > j$ if $\sigma_n=-$), where $\Theta_{i,j}$ is a linear combination of non-trivial monomials in the generators $\dot f_{j-1}, \dot f_{j-2},\dots, \dot f_i$ (resp. $\dot f_j, \dot f_{j+1},\dots, \dot f_{i-1}$). By the definition of $j$, all of these generators act as zero on $\dot c_{\bar\bb}$. Lemma \[lastofyear\] shows that the vector $\dot c_{\bar \bb} \otimes \dot v_j^{\sigma_n}\in \widehat{V}^{\otimes\bsigma}$ is fixed by $\psi$. Hence, so too is $X\left(\dot c_{\bar \bb} \otimes \dot v_j^{\sigma_n}\right)$ where $$X := \left\{ \begin{array}{ll} \dot f_{b_n-1} \cdots \dot f_{j+1} \dot f_{j}&\text{if $\sigma_n = +$,}\\ \dot f_{b_n} \cdots \dot f_{j-2} \dot f_{j-1}&\text{if $\sigma_n = -$.} \end{array}\right.$$ By Lemma \[not\], this new vector equals $\dot v_\bb$ plus a $\operatorname{\mathbb{Z}}[q,q^{-1}]$-linear combination of $\dot v_{\ba}$’s for $\ba \succ \bb$. If all but its leading coefficient lie in $q \operatorname{\mathbb{Z}}[q]$, it is already the desired vector $\dot c_{\bb}$. Otherwise, one picks $\ba \succ \bb$ minimal so that the $\dot v_\ba$-coefficient is not in $q \operatorname{\mathbb{Z}}[q]$, then subtracts a bar-invariant multiple of the recursively computed vector $\dot c_\ba$ to remedy this defficiency. Continuing in this way, we finally obtain a bar-invariant vector with all of the required properties to be $\dot c_{\bb}$. The algorithm just described has been implemented in [Gap]{}, and is available at [http://pages.uoregon.edu/brundan/papers/A.gap]{}. It is not obvious to us that it terminates in finite time for every $\bb \in \operatorname{\mathbf{B}}$. Based on examples, we believe that this is indeed the case. Suppose $\bsigma = (+,+,-,-)$ and $\bb = (1,2,2,1)$. By induction, we have $\dot c_{(1,2,2)} = \dot v_{(1,2,2)} + q \dot v_{(2,1,2)} + q \dot v_{(1,3,3)} + q^2 \dot v_{(3,1,3)}$, so take $j=4$. We compute $$\begin{gathered} \dot f_1 \dot f_2 \dot f_3 (\dot v_{(1,2,2,4)} + q \dot v_{(2,1,2,4)} + q \dot v_{(1,3,3,4)} + q^2 \dot v_{(3,1,3,4)})= \dot v_{(1, 2, 2, 1)} +q\dot v_{(1, 2, 1, 2)}+ q\dot v_{(2, 1, 2, 1)} \\+q\dot v_{(1, 4, 1, 4)} + q\dot v_{(1, 3, 3, 1)} +q^2\dot v_{(2, 1, 1, 2)} +q^2\dot v_{(3, 1, 3, 1)}+ q^2 \dot v_{(2, 3, 3, 2)} +q^2 \dot v_{(4, 1, 1, 4)} \\\:+ q^2\dot v_{(2, 4, 2, 4)} + (1+q^2) \dot v_{(1, 3, 1, 3)} + q^3\dot v_{(3, 2, 3, 2)} +q^3\dot v_{(4, 2, 2, 4)} +(q+q^3)\dot v_{(2, 3, 2, 3 )}\\+ (q+q^3) \dot v_{(3, 1, 1, 3)} + (q+q^3) \dot v_{(2, 2, 2, 2)} +(q^2+q^4) \dot v_{(3, 2, 2, 3)}.\end{gathered}$$ Then we subtract the recursively computed $$\begin{gathered} \dot c_{(1,3,1,3)}= \dot v_{(1, 3, 1, 3)} + q \dot v_{(3, 1, 1, 3)} + q \dot v_{(2, 3, 2, 3)} + q \dot v_{(1, 4, 1, 4)}\\ +q^2 \dot v_{(3, 2, 2, 3)} +q^2 \dot v_{(4, 1, 1, 4)} + q^2 \dot v_{(2, 4, 2, 4)} + q^3 \dot v_{(4, 2, 2, 4)}\end{gathered}$$ to get $\dot c_{(1,2,2,1)}$. [CKW]{} J. Brundan, Kazhdan-Lusztig polynomials and character formulae for the Lie superalgebra $\mathfrak{gl}(m|n)$, [*J. Amer. Math. Soc.*]{} [**16**]{} (2003), 185–231. J. Brundan, Kazhdan-Lusztig polynomials and character formulae for the Lie superalgebra $\q(n)$, [*Advances Math.*]{} [**182**]{} (2004), 28–77. J. Brundan, Tilting modules for Lie superalgebras, [*Commun. Alg.*]{} [**32**]{} (2004), 2251–2268. J. Brundan, Representations of the general linear Lie superalgebra in the BGG category $\mathcal{O}$, in: “Developments and Retrospectives in Lie Theory: Algebraic Methods,” eds. G. Mason et al., [Developments in Mathematics]{} [**38**]{}, Springer, 2014, pp. 71–98. J. Brundan and N. Davidson, Type C blocks of super category $\O$, in preparation. J. Brundan and A. Ellis, Monoidal supercategories; . J. Brundan and A. Ellis, Super Kac-Moody 2-categories, in preparation. J. Brundan and A. Kleshchev, Hecke-Clifford superalgebras, crystals of type $A_{2\ell}^{(2)}$ and modular branching rules for $\widehat{S}_n$, [*Represent. Theory*]{} [**5**]{} (2001), 317-403. J. Brundan, I. Losev, and B. Webster, Tensor product categorifications and the super Kazhdan-Lusztig conjecture, to appear in [*IMRN*]{}. A. Beilinson, V. Ginzburg and W. Soergel, Koszul duality patterns in representation theory, [*J. Amer. Math. Soc.*]{} [**9**]{} (1996), 473–527. B. Cao and N. Lam, An inversion formula for some Fock spaces; . C.-W. Chen, Reduction method for representations of queer Lie superalgebras, [*J. Math. Phys.*]{} [**57**]{} 051703 (2016). C.-W. Chen and S.-J. Cheng, Quantum group of type $A$ and representations of queer Lie superalgebra; . S.-J. Cheng and J.-H. Kwon, Finite-dimensional half-integer weight modules over queer Lie superalgebras, [*Commun. Math. Phys.*]{} [**346**]{} (2016), 945–965. S.-J. Cheng, J.-H. Kwon, and W. Wang, Character formulae for queer Lie superalgebras and canonical bases of types A/C, to appear in [*Commun. Math. Phys.*]{}. S.-J. Cheng, N. Lam and W. Wang, Brundan-Kazhdan-Lusztig conjecture for general linear Lie superalgebras, [*Duke Math. J.*]{} [**164**]{} (2015), 617–695. S.-J. Cheng and W. Wang, *Dualities and Representations of Lie Superalgebras,* Graduate Studies in Mathematics 144, AMS, 2012. J. Chuang and R. Rouquier, Derived equivalences for symmetric groups and $\mathfrak{sl}_2$-categorification, [*Ann. Math.*]{} [**167**]{} (2008), 245–298. E. Cline, B. Parshall and L. Scott, Finite dimensional algebras and highest weight categories, [*J. Reine Angew. Math.*]{} [**391**]{} (1988), 85–99. A. Frisk, Typical blocks of the category $\O$ for the queer Lie superalgebra, [*J. Algebra Appl.*]{} [**6**]{} (2007), 731–778. J. Humphreys, [*Representations of Semisimple Lie Algebras in the BGG Category $\mathcal O$*]{}, Graduate Studies in Mathematics 94, AMS, 2008. S.-J. Kang, M. Kashiwara and S. Tsuchioka, Quiver Hecke superalgebras, [*J. Reine Angew. Math.*]{} [**711**]{} (2016), 1–54. M. Khovanov and A. Lauda, A diagrammatic approach to categorification of quantum groups I, [*Represent. Theory*]{} [**13**]{} (2009), 309–347. D. Hill, J. Kujawa and J. Sussan, Degenerate affine Hecke-Clifford algebras and type Q Lie superalgebras, [*Math. Zeit.*]{} [**268**]{} (2011), 1091–1158. I. Losev and B. Webster, On uniqueness of tensor products of irreducible categorifications, [*Selecta Math.*]{} [**21**]{} (2015), 345–377. G. Lusztig, [*Introduction to Quantum Groups*]{}, Birkhäuser, 1993. V. Mazorchuk, Parabolic category $\mathcal O$ for classical Lie superalgebras, in: [*Advances in Lie Superalgebras*]{}, M. Gorelik and P. Papi (eds.), Springer INdAM Series 7, Springer, 2014, pp. 149–166. M. Nazarov, Young’s symmetrizers for projective representations of the symmetric group, [*Advances Math.*]{} [**127**]{} (1997), 190–257. R. Rouquier, 2-Kac-Moody algebras; . B. Webster, Knot invariants and higher representation theory, to appear in [ *Mem. Amer. Math. Soc.*]{}. [^1]: Research supported in part by NSF grant DMS-1161094. [^2]: Note there is a sign error in [@KKT (5.5)]: it should read $-C_a C_{a+1}\dots$.
Central Standard Time - is abbreviated as CST Central Daylight Time - is abbreviated as CDT (but not observed.) Mountain Standard Time - is abbreviated as MST Mountainl Daylight Time - is abbreviated as MDT Mountain is GMT/UTC - 7h during Standard Time Mountain is GMT/UTC - 6h during Daylight Saving Time Daylight Saving Time Usage
When the weather outside is frightful, soaking in a hot bath can sound especially appealing. And adding a bath bomb to the water can elevate the experience. But what exactly is in these scented spheres, and what makes them so fizzy? Bath bombs are usually made from three key ingredients: baking soda, citric acid and cornstarch, said Frankie Wood-Black, an instructor in chemistry at Northern Oklahoma College and an experienced bath-bomb maker. Often, bath bombs also include dyes and perfumes, and sometimes they have epsom salt. The fizziness of bath bombs comes from the chemical reactions that happen when the baking soda and citric acid come into contact with water, Wood-Black told Live Science. Baking soda, or sodium bicarbonate, has the chemical formula NaHCO3. In water, baking soda quickly dissolves, and the positively charged sodium (Na+) breaks apart from negatively charged bicarbonate (HCO3-). Meanwhile, the citric acid also dissolves, with a single hydrogen ion (H+) separating from the rest of the molecule, Wood-Black said. Then, that positively charged hydrogen from the citric acid and the negatively charged bicarbonate from the baking soda mingle, very quickly undergoing a series of reactions. One of the end products is carbon dioxide (CO2). Because carbon dioxide is a gas, it forms small bubbles in the bath water, creating a delightful fizz. If there are perfumes or scented oils in the bath bomb, they are released into the air with the carbon dioxide bubbles, Wood-Black said. The sodium from the baking soda and the rest of the citric acid molecule (minus the hydrogen that it lost when it dissolved) simply remain in the water. The cornstarch in a bath bomb has just one job: It slows down the reaction. By binding to the baking soda as well as the citric acid, the cornstarch slows down the rate at which both of them dissolve. The effect is that the fizziness may last 3 or 4 minutes, instead of only seconds, Wood-Black said. Making bath bombs is not difficult, she said. She mixes 1 cup of baking soda, one-half cup of citric acid and one-half cup of cornstarch together in a bowl. All three items can be found at grocery stores. Citric acid is found in soda and candy and can also be used to make cheese, Wood-Black noted. After mixing the three ingredients, she adds about 1 teaspoon of water, which is enough to just barely moisten the ingredient mixture so that the powder sticks together. She then scoops the mixture into a mold (such as a Santa or a star candy mold) to form a shape and lets the shapes dry overnight. But you can also just mix together the three key ingredients and skip the water. Leave the mixture in a jar, and then scoop it into your bath, she said. Food coloring can be used to dye bath bombs, she said. But she doesn’t dye the ones she makes. “I opt not [to do that],” she said. “I’m a chemist by profession, but with food coloring, I just get it all over the place.”
YACHT DETAILS CLARITY ABOUT CLARITY Lowest Priced 68 Princess on the Market - Owner wants sold immediately so all offers will be considered CLARITY is the lowest priced 68 Princess for sale in the US and features the sought after master cabin accessible by a private staircase from the main salon. 3 additional cabins forward sleep allow her to sleep a total of 8 guests + 2 crew back aft. CLARITY boasts a top speed of 30 knots and a cruise speed of 26. A hydraulic swim platform carries a custom Williams 385 jet tender that is included in the sale. The expansive upper sundeck has a full helm, bar, dining area, and sun pads. Guests can also enjoy the bow lounge are that is largest in class.
package cn.easyproject.easyee.sm.base.util; import java.util.HashMap; import java.util.Map; /** * 地理坐标操作 * * @author easyproject.cn * @version 4.3.0 * */ public class MapDistance { private static double EARTH_RADIUS = 6378.137; private static double rad(double d) { return d * Math.PI / 180.0; } /** * 根据两个位置的经纬度,来计算两地的距离(单位为 M) * 参数为String类型 * @param lat1 用户经度 * @param lng1 用户纬度 * @param lat2 商家经度 * @param lng2 商家纬度 * @return */ public static double getDistance(String lat1Str, String lng1Str, String lat2Str, String lng2Str) { Double lat1 = Double.parseDouble(lat1Str); Double lng1 = Double.parseDouble(lng1Str); Double lat2 = Double.parseDouble(lat2Str); Double lng2 = Double.parseDouble(lng2Str); double radLat1 = rad(lat1); double radLat2 = rad(lat2); double difference = radLat1 - radLat2; double mdifference = rad(lng1) - rad(lng2); double distance = 2 * Math.asin(Math.sqrt(Math.pow(Math.sin(difference / 2), 2) + Math.cos(radLat1) * Math.cos(radLat2) * Math.pow(Math.sin(mdifference / 2), 2))); distance = distance * EARTH_RADIUS; distance = Math.round(distance * 10000) / 10; // /10000 KM return distance; // String distanceStr = distance+""; // distanceStr = distanceStr. // substring(0, distanceStr.indexOf(".")); // // return distanceStr; } /** * 获取当前用户一定距离以内的经纬度值 * 单位米 return minLat * 最小经度 minLng * 最小纬度 maxLat * 最大经度 maxLng * 最大纬度 minLat */ @SuppressWarnings({ "rawtypes", "unchecked" }) public static Map getAround(String latStr, String lngStr, String raidus) { Map map = new HashMap(); Double latitude = Double.parseDouble(latStr);// 传值给经度 Double longitude = Double.parseDouble(lngStr);// 传值给纬度 Double degree = (24901 * 1609) / 360.0; // 获取每度 double raidusMile = Double.parseDouble(raidus); Double mpdLng = Double.parseDouble((degree * Math.cos(latitude * (Math.PI / 180))+"").replace("-", "")); Double dpmLng = 1 / mpdLng; Double radiusLng = dpmLng * raidusMile; //获取最小经度 Double minLat = longitude - radiusLng; // 获取最大经度 Double maxLat = longitude + radiusLng; Double dpmLat = 1 / degree; Double radiusLat = dpmLat * raidusMile; // 获取最小纬度 Double minLng = latitude - radiusLat; // 获取最大纬度 Double maxLng = latitude + radiusLat; map.put("minLat", minLat+""); map.put("maxLat", maxLat+""); map.put("minLng", minLng+""); map.put("maxLng", maxLng+""); return map; } // public static void main(String[] args) { // //测试经纬度:117.11811 36.68484 // //测试经纬度2:117.00999000000002 36.66123 // // 22.298745322042812,114.16805773973465 // // 22.565382, 113.868643 // // 22.572916, 113.868174 // // 22.576546, 113.868987 // System.out.println(getDistance("22.565382","113.868643","22.565382","113.868643")); // System.out.println(getDistance("22.565382","113.868643","22.572916","113.868174")); // System.out.println(getDistance("22.565382","113.868643","22.576546","113.868987")); // // System.out.println(getDistance("22.57091198666273","113.86914163827896","22.573877","113.864378")); // System.out.println(getDistance("22.57091198666273","113.86914163827896","22.573884","113.864390")); // System.out.println(getDistance("22.570911","113.869141","22.573850","113.864439")); // //// System.out.println(getDistance("22.298745322042812","114.16805773973465","22.298745322042812","114.16805773973465")); // //// System.out.println(getAround("117.11811", "36.68484", "13000")); // //117.01028712333508(Double), 117.22593287666493(Double), // //36.44829619896034(Double), 36.92138380103966(Double) // // } }
While everyone is locked up at home due to coronavirus, we are hosting some online meetups on issues that affect men and boys. You can come to learn more about these issues, and to share or just listen to experiences that have effected you or those close to you. You aren't alone in having to deal with them and together, we will overcome difficulties and work toward change. Please click to visit the map. And here to visit the events page.
Q: Can I replace this circuit with an IC? I moved my Arduino-logic-level-5V-to-12V-LED strip circuit off project board and onto Veroboard and I'm very proud to say everything worked first time: (I'm not at all proud of the soldering job, so you don't get to see that.) So this is the point where you all tell me I can replace the whole shebang with a $0.65 IC. The LED strips pull a few hundred mA per channel and I want to drive them off the Arduino's PWM pins. I've found the ULN2803A, but that's 8 Darlington Pair array in a DIP18 package, I want a 3 or 4 Darlington Pair array in a DIP8 or thereabouts. This question might actually contain the answer I'm looking for, but I don't know enough to even work that out. Secondary question: how do you even know things like the ULN2803A exist? I happened upon it randomly and from there I worked out that "transistor array" was the search term I wanted. But aside from simply hanging around here, how does one answer the question, "What IC can I buy that will replace this portion of this circuit?" A: "Secondary question: how do you even know things like the ULN2803A exist?" Search Google for something like "transistor array". Add words like "IC" or "semiconductor" to weed out unrelated stuff. http://www.google.com/search?q=transistor+array+semiconductor finds http://www.onsemi.com/PowerSolutions/product.do?id=ULQ2003ADR2G When you find a manufacturer's listing of a specific part that looks vaguely relevant, use the manufacturer's site navigation to "go up one directory" and see what similar parts they have. That page has a breadcrumbs navigation at the top "Home > Products > Product Catalog > Drivers > Load / Relay Drivers > ULN2003" Click "Load / Relay Drivers" to see similar stuff. A: The best I found was an ULN2065B, in a DIP-14. I used Farnell's parametric search to do this, but you could also use Digi-key, or a vendor independent site like FindChips or Octopart. I think you're going to struggle to get DIP-8 for four channels: there would not be a pin available for ground, unless it used some kind of serial interface to communicate. You might be able to find a triple driver in this: one pin for ground, three for control signals, three outputs and maybe a pin for Vcc, if the chip requires it.
Q: Exception in iPhone app : Modal transition is already in progress I have what I believe is a fairly simple application at the moment based on a few tutorials cobbled together. I'm using XCode 3.2.3 in OSX 10.6.4. It started as a standard iPhone "Window Based Application". Using interface builder I have added a Tab Bar Controller using the O'Reilly video tutorial here: http://broadcast.oreilly.com/2009/06/tab-bars-and-navigation-bars-t.html In the first Tab I have a standard UIView with two buttons. Both call the same function to display a UIImagePickerController: -(IBAction) btnPhotoClicked:(id)sender { UIImagePickerController *imagePicker = [[UIImagePickerController alloc] init]; imagePicker.delegate = self; if((UIButton *)sender == btnChoosePhoto) { imagePicker.allowsEditing = YES; imagePicker.sourceType = UIImagePickerControllerSourceTypeSavedPhotosAlbum; } else { imagePicker.sourceType = UIImagePickerControllerSourceTypeCamera; } [self presentModalViewController:imagePicker animated:YES]; [imagePicker release]; } I am running the code inside an emulator so only ever click the button called Choose Photo. When the dialogue is released with a photo chosen this function runs: -(void)imagePickerController:(UIImagePickerController *)picker didFinishPickingMediaWithInfo:(NSDictionary *)info { NSURL *mediaUrl; mediaUrl = (NSURL *)[info valueForKey:UIImagePickerControllerMediaURL]; if (mediaUrl == nil) { imagePuzzle = (UIImage *) [info valueForKey:UIImagePickerControllerEditedImage]; if(imagePuzzle == nil) { //--- Original Image was selected --- imagePuzzle = (UIImage *) [info valueForKey:UIImagePickerControllerOriginalImage]; } else { //--- Get the edited image --- //--- If it was successful the above valueForKey:UIImagePickerControllerEditedImage //--- would have assigned it already. } } else { //--- Muppet selected a video } // Animate the picker window going away [picker dismissModalViewControllerAnimated:YES]; ImageViewController *imageViewController = [[ImageViewController alloc] init]; imageViewController.delegate = self; [self presentModalViewController:imageViewController animated:YES]; [imageViewController release]; } This is where my problem lies. I've tried many different hacks and iterations but the above code is the simplest to present the problem. When the imageViewController is displayed as a modal dialogue the following exception is thrown: 2010-07-09 15:29:29.667 Golovomka[15183:207] *** Terminating app due to uncaught exception 'NSInternalInconsistencyException', reason: 'Attempting to begin a modal transition from <NewViewController: 0x5915f80> to <ImageViewController: 0x594a350> while a transition is already in progress. Wait for viewDidAppear/viewDidDisappear to know the current transition has completed' How do I cure this? I have tried delays and other tricks but do not really understand how I'm supposed to use viewDidAppear or viewDidDisappear to help me. Also of note is that a very basic application with one view loading the picker then displaying another view with the image in does not produce the error. Any help gratefully received. A: To address the specific issue described here, you could add the viewDidAppear method in your class: -(void)viewDidAppear:(BOOL)animated { if (/*just visited ImagePicker*/) { ImageViewController *imageViewController = [[ImageViewController alloc] init]; imageViewController.delegate = self; [self presentModalViewController:imageViewController animated:YES]; [imageViewController release]; } } Remove those lines from below your call: [picker dismissModalViewControllerAnimated:YES]; So, whenever your class self appears (is displayed), it will call viewDidAppear... Since this most likely isn't really what you want all the time, you could add some variables to set/clear that defines whether or not to immediately present the imageViewController when self is displayed. Something like "If coming from image picker, show the imageViewController, otherwise do nothing". That said, imho, pushing modal views is should generally be done in response to a user action and I would maybe rethink the user experience here - e.g. add a subview instead of pushing a modal view which you could do where your currently have the code - but if you're just playing around with some tutorials that should solve the NSInternalInconsistencyException. :) Cheers! A: In iOS 5.0 and above you can use [self dismissViewControllerAnimated:YES completion:^{ //present another modal view controller here }];
As of the New Year, Iowans can go just over the Mississippi River into neighboring Illinois to buy recreational marijuana. Now that sales are legal in the Prairie State, some officials in Iowa are warning residents to be mindful of state law. Despite the law change in Illinois, it is still illegal to transport the drug across state lines or to drive impaired. Sergeant Alex Dinkla of the Iowa State Patrol says officers will likely be keeping an eye out for potentially impaired drivers, especially in the eastern part of the state. “There’s gonna be probably a little extra awareness on that side of the state as they are working," he said. "But as the state as a whole, we take a very strong stance against it that, if you have any marijuana in your vehicle, on your person, you will be charged with that.” A bridge from Illinois leads right into downtown Dubuque and County Sheriff Joe Kennedy says his deputies are well aware of the changes across the river. “We just want people to understand, when they go over to Illinois and they buy it, even if they may buy it legally over there, as soon as they cross the state line it is no longer legal and we are going to enforce it as such,” Kennedy said. The marijuana legal landscape is changing across the Midwest and Mountain West. Iowa has approved limited access to medical marijuana for certain qualified patients. Meanwhile, in Michigan, Illinois and Colorado the substance is now fully legal. Despite the patchwork of regulations in the region, Kennedy says residents should be aware of Iowa law. "Our deputies have stopped people from say, Colorado. And we stop them and the deputy detects marijuana in the vehicle or we get a canine or whatever, and end up finding marijuana in the vehicle. And the first thing they say is, 'well, it's legal in Colorado," he said. "Well, that's fine, but you're not in Colorado." When it comes to driving under the influence, it can be difficult to test for marijuana impairment because of how the drug stays in a person’s system. According to the National Conference of State Legislatures, there’s no national standard for drugged driving like there is for drunk driving.
Chiral separation of amides using supercritical fluid chromatography. Nine amide derivatives bearing α-stereocenters as well as different substitutions on the amide nitrogen were synthesized via an n-propanephosphonic acid cyclic anhydride (T3P)-mediated coupling, and their enantiomeric pairs were separated using supercritical fluid chromatography (SFC). Five polysaccharide-based chiral stationary phases (CSPs), Chiralcel OD-H, and OJ-H, and Chiralpak AD-H, AS-H and IC columns were explored for the chiral separation of these compounds. None of the compounds could be resolved on all five columns, and no single column could separate all nine pairs of enantiomers. Comparatively, the IC and OD-H columns showed the best results for this group of amides, yielding baseline separations for eight of nine pairs. The type of polar functional group and aromatic substitution in the CSPs and the substitutions on the amide nitrogen had a significant impact on the enantiomeric resolution of the compounds in the interaction between the analyte and the stationary phases. The potential separation mechanism and the effect of substitutions in the CSPs and amide solutes on the separation are discussed. The effects of the organic modifiers, modifier composition, mobile phase additives, and temperature were investigated for the separation of these amides on the IC or the OD-H column. Baseline resolution was achieved under optimized chromatographic conditions using an IC or an OD-H column. Linearity, reproducibility, and limit of quantitation were also demonstrated for the compound 9. Approximately three-fold improvement in signal-to-noise was observed using a SFC system with better instrument design.
Mr. Duong serves as the Chairman of the Board of the National Alliance of Vietnamese American Service Agencies (NAVASA), which he has been elected and re-elected to in 1996, 1998, 2000 and 2002. Through his leadership and dedication, Mr. Duong has been the force behind moving NAVASA into an independent and growing non-profit national organization. Mr. Duong is currently President of DDI Associates Inc., a technology business and economic development-consulting firm he founded in 2001. He also serves as Director of the Maryland Technology Development Center, a technology business incubator for IT and Bio businesses that he helped establish for Montgomery County, Maryland. Prior to founding DDI, Mr. Duong was the Director of Industry Networks and Maryland Bioscience Alliance of the Technology Council of Maryland, a membership organization of the technology industry in Maryland. Mr. Duong also served as Assistant Director of the Montgomery County Department of Economic Development where he was responsible for developing and executing business and industrial development aimed at generating jobs and expanding the county tax base from 1977 until his retirement from the County’s services in 1998. From 1975-1976, Mr. Duong was the Director of the Refugee Resettlement Program in Eastern Washington State where he was responsible for developing refugee resettlement assistance programs as well as housing, employment and training services. In addition to his community leadership at NAVASA, Mr. Duong serves as a Board member of a number of community organizations such as the National Asian Pacific Center in Aging (NAPCA), the Regional Lourie Center for Infants and Young Children, and the Monte Jade Science & Technology Association. Mr. Duong also founded the Suburban Maryland International Trade Association and the Maryland Vietnamese Mutual Association in 1979 where he served as Chairman and President for three terms. The organization secured funding from local governments and private foundations to operate community outreach, tutorial and resettlement assistance to Vietnamese refugees and immigrants. Mr. Duong’s commitment as a community activist has gained him recognition by numerous community-based organizations such as appreciation citations from the Governor of Washington, the Governor of Maryland and the President of the Senate of Maryland. He has been appointed to the Maryland Economic Development Corporation by the Governor of Maryland and served on the Asian Advisory Committee of the Bureau of the Census by the U.S. Secretary of Commerce. Mr. Duong received a B.A. in Education, History and Geography at the University of Saigon, Vietnam. He also attended the University of Oklahoma, American Economic Development Institute and the University of Maryland’s Government Executive Institute. Who's Who of Asian Americans® is a registered trademark of Asian American Net
Breastfeeding initiation: An in-depth qualitative analysis of the perspectives of women and midwives using Social Cognitive Theory. to explore women's and midwives' expectations, knowledge and experiences of breastfeeding initiation using Social Cognitive Theory. a qualitative study using focus group discussions and individual interviews. Breastfeeding initiation was defined for this study as a process within the first 48hours after birth. Data were analysed using qualitative inductive analysis then further deductive analysis using Social Cognitive Theory (SCT). a purposefully selected sample of primigravid antenatal and postnatal women (n=18) and practising midwives (n=18) from one Health Board area in Scotland. attachment of the baby to the breast at birth was hindered by sleepy babies and the busy unfamiliar hospital environment. These resulted in mothers struggling to maintain their motivation to breastfeed and to develop low self-efficacy. Instinctive attachment was rare. Midwives who considered it was normal for babies to be sleepy and unable to attach or feed at birth did not facilitate instinctive baby behaviour. Midwives sometimes experienced lack of autonomy and environmental circumstances that made women centred care difficult. Furthermore caring for high numbers of women, dependent on their help, resulted in reduced self-efficacy for providing effective breastfeeding support. interviewing both women and midwives specifically about initiation of breastfeeding has allowed for deeper insights into this critical period and enabled a comparison between the data obtained from mothers and midwives. The findings suggest that instinctive attachment is not an expectation of either mothers or midwives and results in a loss of breastfeeding confidence in both. to facilitate initiation there is a need for more research to develop appropriate maternal and midwifery skills, and make changes to the cultural environment in hospitals. Social Cognitive Theory could be used as a framework in both the antenatal and immediate postnatal period to develop strategies and materials to increase women's and midwives' self-efficacy specifically in initiation.
Record Bank Profits - American Dream Foreclosed "Last week, JP Morgan Chase launched the 2010 Wall Street Bonus Sweepstakes. The bank is still losing money on consumer services, but well-heeled investors and financial traders more than made up the difference. The bank announced $11.7 billion in profits and $26.9 billion in compensation, including bonuses that will run in the multimillions for the top executives. Goldman Sachs reported record profits of $13.4 billion, and is set to dole out a staggering $16.2 billion in compensation and bonuses, which could provide an average of nearly $500,000 per employee. And Morgan Stanley, even having sustained a loss in 2009, has set aside $14.4 billion for compensation and bonuses. Then there's Roberto Velasquez -- the other face of the foreclosure crisis. Mr. Velasquez, a general contractor, bought a single-family home in Dedham, Massachusetts six years ago. Unfortunately, his mortgage turned out to be a predatory time bomb. After a few affordable years, the interest rate on his adjustable-rate mortgage ballooned and his payments rose to $4,800 a month. He kept up though; until the Wall Street crash knocked the stuffing out of the construction industry. Then he fell three months behind. Mr. Velasquez found jobs and came up with the three months' payments, but the bank wouldn't work with him. His home was foreclosed on in November. A local bank offered to buy the home and sell it back to Mr. Velasquez for its present market value, which is the most his bank would get for the house if they sold it at auction. Still no deal. 'We did what they asked,' says Mr. Velasquez, 'but they don't want to work with anybody.' [...]"
hegykc Member Join Date: Jun 2012 Location: Croatia Posts: 734 F-18 grip, WARTHOG and X-55 compatible Update, 23.08.2016. Actual prototypes being built every week: Update, 06.30.2016. Here's what you'll see from me in the next 6-12 months, piece by piece (not all at once!): Priority No.1 is warthog spring mod Priority No.2 is IR head tracker after that: F-18 grips You know everything, they're ready to go, I just need to see how I can couple them up with my own hotas, again to unify the parts and processes. They are going to be cheap, If you had to take a guess you'd be waay over. However, after simplifying every other manufacturing process, turns out these grips are the most complex thing here. Don't be mad if there'll be other products for sale before them because other products is exactly what will pay for your cheap grips. General purpose aviation panel (for FC3) Excuse the missing landing gear and tail hook levers. Just another example of why I do multiple developments at once. It took several other products to develop a unified lever mechanism for them all, which speeds up manufacturing, which brings down pricing and drives volume up. Now I'm not the only one who can do this, but you might be farmiliar that single panels/buttons boxes go for 200-300$, I am aiming for 99$, again not really possible on it's own, but with a dozen other products, very possible. With some help from developers, we can make it truly plug'n'play like the warthog. PRO aviation panels (for DCS) I started on the A-10 but that thing is a monster, I may have to switch to the F-18 or any other available model because they're at least 4x less complex. And again, you A-10 guys would have to pay a gazillion bucks for something like this if I only did the A-10, but other modules are what's going to pay for your cheap A-10 panels, even if I make them at a slight loss. General WWII aviation panels These will be toned down versions of the pro WWII panels. (see example below) PRO WWII aviation panels These will be full blown left/right panels, every single command functional even the rolling canopy open/close, clamp to your desk, put on a stand once you're finished and be the coolest friend to come over for a beer to. Each side will be cheaper then a couple generic button boxes available today. Started with P-51 because it's at least 4x more complex than any other WWII cockpit I looked at, so it gives me the worst case scenario pricing. Plane specific 'hotas' Throttle/collective and joystick/cyclic bases, with replaceable grips. Instruments, for everything eventually. Working mechanical instruments, including digit counters and lcd/digit displays for modern jets. These will be full blown left/right panels, every single command functional even the rolling canopy open/close, clamp to your desk, put on a stand once you're finished and be the coolest friend to come over for a beer to. Each side will be cheaper then a couple generic button boxes available today. Started with P-51 because it's at least 4x more complex than any other WWII cockpit I looked at, so it gives me the worst case scenario pricing.Throttle/collective and joystick/cyclic bases, with replaceable grips. Working mechanical instruments, including digit counters and lcd/digit displays for modern jets. Save Here's what you'll see from me in the next 6-12 months,after that:You know everything, they're ready to go, I just need to see how I can couple them up with my own hotas, again to unify the parts and processes. They are going to be cheap, If you had to take a guess you'd be waay over. However, after simplifying every other manufacturing process, turns out these grips are the most complex thing here. Don't be mad if there'll be other products for sale before them because other products is exactly what will pay for your cheap grips.Excuse the missing landing gear and tail hook levers. Just another example of why I do multiple developments at once. It took several other products to develop a unified lever mechanism for them all, which speeds up manufacturing, which brings down pricing and drives volume up. Now I'm not the only one who can do this, but you might be farmiliar that single panels/buttons boxes go for 200-300$, I am aiming for 99$, again not really possible on it's own, but with a dozen other products, very possible. With some help from developers, we can make it truly plug'n'play like the warthog.I started on the A-10 but that thing is a monster, I may have to switch to the F-18 or any other available model because they're at least 4x less complex. And again, you A-10 guys would have to pay a gazillion bucks for something like this if I only did the A-10, but other modules are what's going to pay for your cheap A-10 panels, even if I make them at a slight loss.These will be toned down versions of the pro WWII panels(see example below) Last edited by hegykc; 08-23-2016 at 06:52 PM .
On Jan 1, 2008, at 5:32 PM, Kneale Brownson wrote: > I don't believe an 88 is interchangeable with the 89-91 versions. > The latter can be obtained/assembled as two items. The 88 and > earlier versions are a single unit and do not come as one half or > the other. >> I have taken the 89-91/V8 versions apart and cleaned the contacts. > If I recall correctly, you need a really tiny torx driver to work > on those. I replaced the switch assembly on my 87 many years ago, > and I think those basically could not be disassembled. At least not > as readily. My father took apart one ages ago...the best part was when he finally figured out how to get it open. I heard: "Aha!" *SPROING**PING**SPROING**RATTLE**SPROING**SPROING* "Ahhhhhh SH*@#$!!" You need to break apart a couple of external welds (which will have to be soldered, which requires a high-wattage iron.) Probably best to open it inside a plastic bag or something, as stuff goes flying. Don't attempt unless you have the patience of a saint, but you can get in pretty deep to fix things. Brett
Melissa Kitcher had full intentions of completing her first half-marathon Sunday, but it's safe to say she pictured it ending a little bit differently. Kitcher went missing for nearly 12 hours after running off the trail during the Trail Hog Half-Marathon at the Carlton Reserve near Venice in Sarasota County, Florida. "I kept thinking to myself, 'Wow, how do people run these trails? I can't even walk them,'" she said. "When I hit the power lines I said, 'Yes I'm definitely way off course. I'm lost.'" But how did she manage to get lost? Kitcher said there was no marking to indicate or properly direct her. “The website says you're supposed to be on Jeep trails. So when I came out there was a Jeep trail and I figured that was the path I needed to be on," Kitcher explained. The runner ended up six to seven miles off course with no phone — it inconveniently froze up two minutes before the start of the race, she said. Race director Thierry Rouillard had this to say about the situation: "It's the worst nightmare for a race director. I love what I do and want everyone to be happy. That was her first half-marathon. That was her first trail run. She learned the hard way.” Kitcher ended running over 16 miles before the park’s department located her in the reserve about 7:30 p.m. She was uninjured. Thirsty, of course, but just happy she could go home. “She was happy when we found her. I'm going to send her a gift package with racing stuff. A finisher's medal and award for the longest Trail Hog half-marathon in the history of the event," Rouillard joked. Despite going a little off course, Kitcher already has sights set on redemption. "There's the Sarasota Half Marathon on March 19th. I already have that in my head," she said. "Everybody keeps telling me no more races, I said I'm lucky this one's on the street."
Update on mycobacterial issues for the acquired immune deficiency syndrome era. Patients with immunosuppression are especially susceptible to Mycobacterium tuberculosis and Mycobacterium avium-intracellularae, (also known as Mycobacterium avium Complex). Mycobacterium tuberculosis is the causative agent of pulmonary and extrapulmonary manifestations of tuberculosis, whereas the M. avium-intracellularae group has become recognized as a significant pathogen. Treatment problems center on multiresistant bacteria and poor patient compliance with prolonged treatment regimens. Lengthy multidrug treatment plans and special precautions against nosocomial transmission of these pathogens to patients and health care workers are necessary to limit the spread of these pathogens.
**(3/8)/g))/(g*g/g**(1/5)) assuming g is positive. g**(71/3480) Simplify (m**23)**37 assuming m is positive. m**851 Simplify y*y*y**(-24)*y*y*y/(((y**(-13)/y)/y)/y*y) assuming y is positive. y**(-4) Simplify (z**(-11)/z**(-4/5))**(-4/19) assuming z is positive. z**(204/95) Simplify (m*m*m**(-2/11)*m)/m*m*m**(1/4)*m*(m*m**(1/6)/m*m*m)/(m/((m*m*m/(m/(m/(m/((m/(m*m/(m/m**(-3/7)*m)*m))/m)*m))*m)*m)/m)) assuming m is positive. m**(4309/924) Simplify (q**(-2/7)*q*q*q**(-7))**(-2/15) assuming q is positive. q**(74/105) Simplify (((k/k**(-2/9)*k)/k)/k*k*k*k*k**(-7))**(-3/47) assuming k is positive. k**(34/141) Simplify ((m/(m*m*m**(-1/7)))/(m/m**2))**(3/25) assuming m is positive. m**(3/175) Simplify (n**5*n**5/n)**(3/7) assuming n is positive. n**(27/7) Simplify q/q**(-2/3)*q**(-1/9)/q*(q*q**(-2/7))**(-1/3) assuming q is positive. q**(20/63) Simplify (q*q**11*q)/((q/(q/(q/(q*q*q/(((q*q*(q*q**(-23))/q*q)/q)/q)*q*q))))/q) assuming q is positive. q**40 Simplify (f**(-1)/f)**(-32) assuming f is positive. f**64 Simplify ((n/(n/(n/((n**(2/5)/n*n)/n))))/n)**(-24)*((n**(2/7)/n)/n*n)/(n**0*n*n) assuming n is positive. n**(-599/35) Simplify (v*v**(-12)*v)**(-30/7) assuming v is positive. v**(300/7) Simplify (y*y**(-3/5)*(y/(y*y**(-5)))/y)/((y*y/y**(1/9))/(y*y/(((y**(-1/2)/y)/y)/y))) assuming y is positive. y**(721/90) Simplify ((f*f*f**(1/3)*f)/f)**(3/29)*(f*f*f*f**1)/f*f**2 assuming f is positive. f**(152/29) Simplify (k**(1/5)/(k**(2/5)*k*k))/(k*k/(k/k**6)*(k*k*((k/((k*((k*k**(-1/5))/k)/k)/k))/k)/k)/k*k) assuming k is positive. k**(-57/5) Simplify (x/(x**(-2/91)/x))/(x**(-38)/x) assuming x is positive. x**(3733/91) Simplify ((p*p**(2/21))/p**(-2/5))**5 assuming p is positive. p**(157/21) Simplify d*d/(d/(d/d**(3/2)))*d/(d/d**(-4/3)*d) assuming d is positive. d**(-11/6) Simplify (z**(1/2))**45/((z*(z/(z*z*z/z**(2/5)))/z)/z)**(-4) assuming z is positive. z**(121/10) Simplify k/(k/(k/(k*k**(4/11)*k)*k))*k/k**(-1/10) assuming k is positive. k**(81/110) Simplify q**(-5/4)/q**(1/9) assuming q is positive. q**(-49/36) Simplify (a**(-2/53)*a)**(-5/7) assuming a is positive. a**(-255/371) Simplify (r**24)**(2/87) assuming r is positive. r**(16/29) Simplify (w**(2/25)*w**2)/(w/(w*(w*w**6*w*w)/w*w)*w*w**(-5/6)*w) assuming w is positive. w**(1487/150) Simplify (g/g**(-4/9)*g**(-1/5)*g)**(-2/11) assuming g is positive. g**(-202/495) Simplify r/(r*r**(-2/7)/r)*r*r**(3/5) assuming r is positive. r**(101/35) Simplify (k*k**(-1)/k)/(k*k/((k*k**(-1/2))/k))*(k/(k/((k*k**7)/k)))/((k/(k*(k/(k**(-2/5)*k*k*k))/k))/k) assuming k is positive. k**(19/10) Simplify (j**3/(j/(j*j*j/j**(1/2)*j)))**(-9) assuming j is positive. j**(-99/2) Simplify (s*s**(5/3))**(1/65) assuming s is positive. s**(8/195) Simplify (l**(-5)*l*l)**(3/20) assuming l is positive. l**(-9/20) Simplify ((v*v/(v/(v**(-3)*v)))/((v/(v*v**(-2/23)*v))/v))**(-1/4) assuming v is positive. v**(-21/92) Simplify (n*(n*n*n*((n/(n/n**(-1/3)))/n)/n*n)/n*n)**(-15/2)/(n/(n**(-5)/n)*n/(n**(-1)/n*n)) assuming n is positive. n**(-29) Simplify q**(19/4)/q*q/(q**20*q) assuming q is positive. q**(-65/4) Simplify (d*d**(2/9)*d*d*d*d**(-5))/(d**(6/11)*d*d/d**0) assuming d is positive. d**(-329/99) Simplify ((k**(1/3))**9)**(-42) assuming k is positive. k**(-126) Simplify (d**(-8/5))**(9/2) assuming d is positive. d**(-36/5) Simplify y/(y*y*y/y**(-6/11)*y*y)*y**(-2/5) assuming y is positive. y**(-272/55) Simplify (b/b**(-3/5))/b*b**4*(b/(b*(b/b**(-1/2))/b*b))**(7/5) assuming b is positive. b**(5/2) Simplify (c**(2/35))**(-14/5) assuming c is positive. c**(-4/25) Simplify (t/(t/((t/(t*t/(t*t*t**17))*t)/t)))/t*t**(-22) assuming t is positive. t**(-5) Simplify y**15*y**(-24)/y*y assuming y is positive. y**(-9) Simplify z**(-2/9)*z*(z**(-2/9)/z)/z*z**(-7)*z**(1/2) assuming z is positive. z**(-143/18) Simplify j**(8/7)*j**10 assuming j is positive. j**(78/7) Simplify h**(1/8)*h/(h/h**(-25)) assuming h is positive. h**(-199/8) Simplify ((g/g**1*g)/g*g**(-1/6))/(g/(g*(g/g**1)/g*g*g)*g)**14 assuming g is positive. g**(-1/6) Simplify (u**(-6/7))**43 assuming u is positive. u**(-258/7) Simplify (p*p**2*p)/(p/(p/(p*(p**3/p)/p)))*(((p/(p*p**(-1)))/p)/p)/p*p**3 assuming p is positive. p**3 Simplify ((d**3)**(-1/38))**(-6) assuming d is positive. d**(9/19) Simplify (p/p**27)/(p/(p*p**16)) assuming p is positive. p**(-10) Simplify a**(-6)/(a*a**(1/5)*a)*(a**1)**16 assuming a is positive. a**(39/5) Simplify q*(q*q/(q/(((q/((q**(-1/13)*q)/q*q))/q)/q)*q))/q*q*q/(q**38*q*q)*q assuming q is positive. q**(-506/13) Simplify (((m*m**(-1/2))/m)**(-4/25))**(-7/10) assuming m is positive. m**(-7/125) Simplify ((n*n**(-4/3)*n)**(-4/3))**(8/7) assuming n is positive. n**(-64/63) Simplify (y**(10/3)*y**(-9))**13 assuming y is positive. y**(-221/3) Simplify ((y*y/y**1*y)/y**(-1/9))/((y**8/y)/((y*y/(y*y/(y/y**2)*y))/y)) assuming y is positive. y**(-71/9) Simplify (a*a/(a/(a*a*a*a**1*a)))**34*a/(a/(a/(a*a*a*(a/(a/a**0))/a)))*a/((a**(2/9)/a)/a)*a assuming a is positive. a**(1861/9) Simplify (u/(((u/((u**(1/2)*u)/u))/u)/u))**10*u**(-5/2)*u**8 assuming u is positive. u**(61/2) Simplify (k**(2/3)/k)**2/(k*k*(k*k*k**0*k)/k*k/k**(2/11)) assuming k is positive. k**(-181/33) Simplify (y**17/(y*y**(-17)))**(4/17) assuming y is positive. y**(132/17) Simplify o**(-1/5)/o**(3/5)*(o/(o/(o/((o**(-2/7)/o)/o)*o)*o))**(2/55) assuming o is positive. o**(-262/385) Simplify (k**(-4/17))**(2/15) assuming k is positive. k**(-8/255) Simplify l/((l**6*l)/l)*l**(-8)/l*(l*l**(4/7))/(l*l**5*l*l) assuming l is positive. l**(-143/7) Simplify h**18*h**(-15) assuming h is positive. h**3 Simplify u**14*u**(-9) assuming u is positive. u**5 Simplify p**17*p**(-1) assuming p is positive. p**16 Simplify (z**(-1/2)/z*z**(-3/8)*z)/(z*z**(2/3))**(2/65) assuming z is positive. z**(-289/312) Simplify (m*m**0*m)**3 assuming m is positive. m**6 Simplify (j/(j/(((j**(-33)*j*j)/j)/j)))/j**(5/17) assuming j is positive. j**(-566/17) Simplify b**(-2)/b*b*b**3*(b*b**(-1))**(-42) assuming b is positive. b Simplify u**(-7)/((u*u**(-1/10))/u)*u*u/u**(-1/4)*u*u**(-3/11) assuming u is positive. u**(-863/220) Simplify (t/(t*t**(3/7))*t**(-3))/(((t*t**1*t)/t)/(t*t/(t**4*t))) assuming t is positive. t**(-59/7) Simplify (o*o/o**(3/4))/(o**(-9)*o)*(o**(-2))**(-50) assuming o is positive. o**(437/4) Simplify ((z**12*z*z)/(z/z**(-10)*z))**38 assuming z is positive. z**76 Simplify (s**(-1/2))**(18/11)/(s**(-2/15)*s/(s/(s*s/(s/s**(1/9)*s)))*s*s) assuming s is positive. s**(-1384/495) Simplify ((q*q*q*q**(-17)*q)/q)/q**26 assuming q is positive. q**(-40) Simplify (p/(p/(p*p*p*p/(p/p**(-1))*p)))**(-8) assuming p is positive. p**(-24) Simplify (k**(-2/5)*(k/(k*k/(k*k**(-6/7)/k)))/k*k)/(k**2*k)**40 assuming k is positive. k**(-4279/35) Simplify ((c/c**0)**(-46))**49 assuming c is positive. c**(-2254) Simplify (m*m**(-3/13)/m)**(-3/29) assuming m is positive. m**(9/377) Simplify s**2/s**(-3/7)*(s**3/s)**(-33) assuming s is positive. s**(-445/7) Simplify (c*c/c**(3/17)*c)/(c/(c/c**(-6/13))) assuming c is positive. c**(726/221) Simplify (p/p**(3/11)*p**(2/17))**22 assuming p is positive. p**(316/17) Simplify v**(-4/7)*(v*v*v*v**(-26)*v)/v assuming v is positive. v**(-165/7) Simplify ((d*(d**3*d*d*d)/d*d)/d*(d/(d/d**5))/d)**(-19) assuming d is positive. d**(-190) Simplify (b*b/(b**(1/7)/b)*b)**16 assuming b is positive. b**(432/7) Simplify (g**18*g)/(g/(g/(g**(8/3)*g))*g*g) assuming g is positive. g**(40/3) Simplify q**(1/9)*q*q*q**(-2/19) assuming q is positive. q**(343/171) Simplify j/(j/((j/(j*j*j/j**(2/13)*j))/j))*j*j*j**(-48) assuming j is positive. j**(-648/13) Simplify ((u/((u*(u*u/(u/(u*u/u**1*u)))/u)/u))/u)**(-15)/(u**(1/5))**(-50) assuming u is positive. u**40 Simplify c**(-1/11)*c*c*c*c**7/c*c*(c**(3/4)*c)/c**0 assuming c is positive. c**(513/44) Simplify k**(1/37)/k**(-1/7) assuming k is positive. k**(44/259) Simplify (k/((k/(k/(k**(20/3)*k)))/k*k))/(k**(-2/29)*k) assuming k is positive. k**(-661/87) Simplify (((n*n**(28/3))/n)/n)/n*n**30 assuming n is positive. n**(112/3) Simplify (o**(-1/2)/(o**15*o))**(-50) assuming o is positive. o**825 Simplify y/y**18*y**5 assuming y is positive. y**(-12) Simplify (h/(h*((h**(-11)*h)/h)/h))/h**(-22) assuming h is positive. h**34 Simplify c/(c*(((c**(-2/29)*c*c)/c)/c)/c)*c*c*c**(-10/9
A primary goal of data distribution design in a massively parallel processing (MPP) database is even distribution of data among separate nodes of the system. In particular, multiple processors, each having independent operating systems and memory resources, are coordinated in order to process a program in parallel. Such a system may be referred to as “shared-nothing,” where tables of database(s) are partitioned into segments and distributed amongst different processing nodes, with no data sharing occurring between processing nodes. Data is partitioned across processing nodes such that each processing node has a subset of rows from tables in the database. Each processing node processes only the rows on its own disks. The MPP database includes a coordinator system, which hosts the database but does not itself store database records, but rather metadata about the database. The coordinator system is able to host a database engine, the controlling entity of a MPP system, and can generate query plans, coordinate query execution by the processing nodes, and aggregate data system-wide. A common messaging interface interconnect is used by all processing nodes and the coordinator system for communication amongst the processing nodes and the coordinator. When a database query arrives at the coordinator (e.g., from a client system), the query is divided and assigned to processing nodes according to a data distribution plan and an optimized execution plan. The processing entities in each processing node manage only their portion of the data. However, these processing entities may communicate with one another to exchange any needed information during execution. A query may be divided into multiple sub-queries, and the sub-queries may be executed in parallel or in some optimal order in some or all of the processing nodes. The results of the sub-queries may be aggregated and further processed, and subsequently additional sub-queries may the executed according to the results. In a conventional MPP database system entries of a table are generally distributed using one of the following methods: hash; random (e.g., round-robin); range; or, list. Currently, many MPP databases distribute data using hash distribution. In hash distribution the key values of records are hashed into buckets, and the buckets are assigned to processing nodes. With hash distribution, data can be directly located through the key with minimum consumption of system resources. This provides a high performance characteristic for hash distribution, since lookup of a value by the key is straightforward, merely requiring calculation of the hash value to determine which node hosts that particular hash bucket. The query is sent to only that processing node, without involving other processing nodes. Another common method of distribution for a MPP database is a round-robin distribution. With round-robin distribution data is distributed around all processing nodes of the MPP database, which is useful for distributing records evenly into the nodes in the system. However, a disadvantage of round-robin distribution is in the area of looking up data records. In general, during a lookup of a record many (if not all) of the nodes in the system must be visited in order to locate the particular record. Thus, system resource utilization is less efficient for a MPP database using a conventional round-robin distribution scheme, as compared to a lookup on an MPP database using a hash distribution scheme. One potential problem for MPP databases utilizing distribution by hash (as well as range or list) is the occurrence of skew. In cases where the distribution of the key value is not skewed, typically some buckets will be large while others are small. In most cases it is possible to place several large and small buckets together and to assign them to one processing node, the general goal being that every node has roughly equivalent size of overall data. However, in some cases the data distribution may be skewed, and records with a single key value may not fit in the storage of the designated processing node, while other processing nodes may have an abundance of remaining space. Simply adjusting the function by which the hash distribution is made will not address this issue and additional measures are needed to address the skew, particularly in the storage of the processing node. Data skew can also lead to an increase in the processing time required for executing a query, especially for that of a table join.
A Walk Through Our Test Garden. One of my favorite things about working at Spring Meadow is spending time in our test gardens. Dale Deppe, the owner of the nursery, does all the work of planting, pruning and weeding and I get to enjoy the fruits of his labor. Here are a few plants that are looking especially nice right now. Lo & Behold 'Purple Haze' Lo & Behold 'Purple Haze' Buddleia is a wonderful spreading form of Butterfly bush. It is a seedless plant and as a result it flowers continuously from mid-summer until frost. The Lo & Behold series has been approved for sales in Oregon where Buddleia davidii has been banned. Vanilla Spice Clethra Vanilla Spice Clethra is one of my favorite summer plants. The fragrance is remarkable and the flowers are especially large. The foliage is dark, glossy green even on non-acidic soils. Azurri Satin Hibiscus Azurri Satin Hibiscus is looking lovely right now. This beauty was developed in Belgium and its noted for being the only seedless, blue-flowered Rose of Sharon. Let's Dance Moonlight This bed of Let's Dance Moonlight has flowered every year for the last four years since we planted them. A remarkable feat in Michigan. Little Lime Hydrangea This is Zoe, the nursery dog. Here she is giving her approval of Little Lime Hydrangea. She likes this selection because stays small and holds it blooms up so nicely. Good Vibrations Gold I don't normally get excited about junipers, but I'm crazy for Good Vibrations Gold. This soft, low growing, native evergreen looks especially good planted next to the heat tolerant Luguna Lobelia. 2 comments: As an 'old' Michigan gardener, so enjoy the test gardens posts . Azurri Satin Hibiscus, stunning, but intrigued by 'remarkable feat' bed of Let's Dance Moonlight, flowering every year for the last four years. And yes, good 'gold' junipers have a place. Thanks for the update ... my ears/hands/gardens are able and delighted to embrace new findings ... :) Please know that I delete spam and SEO back-links and will call you out as a spammer if you attempt to use this blog to promote your website, business or whatever else you are selling. Please respect this blog.
<!DOCTYPE html> <html lang=""> <head> <meta charset="UTF-8"/> <meta http-equiv="X-UA-Compatible" content="IE=edge" /> <meta name="viewport" content="width=device-width,user-scalable=no,initial-scale=1,minimum-scale=1,maximum-scale=1"> <meta name="baidu-site-verification" content="HTOBD3Guy9" /> <meta http-equiv="Cache-Control" content="no-transform" /> <meta http-equiv="Cache-Control" content="no-siteapp" /> <meta name="description" content="life, tech"/> <link rel="alternate" href="/default" title="Elevenbeans"> <link rel="shortcut icon" type="image/x-icon" href="/elevenbeans.ico?v=1.1" /> <link rel="canonical" href="http://yoursite.com/tags/open-source/"/> <meta name="description" content="life, tech"> <meta property="og:type" content="website"> <meta property="og:title" content="Elevenbeans"> <meta property="og:url" content="http://yoursite.com/tags/open-source/index.html"> <meta property="og:site_name" content="Elevenbeans"> <meta property="og:description" content="life, tech"> <meta name="twitter:card" content="summary"> <meta name="twitter:title" content="Elevenbeans"> <meta name="twitter:description" content="life, tech"> <link rel="stylesheet" type="text/css" href="/css/style.css?v=1.1" /> <link href='https://fonts.googleapis.com/css?family=Open+Sans' rel='stylesheet'> <link rel="stylesheet" href="https://imsun.github.io/gitment/style/default.css"> <script src="https://imsun.github.io/gitment/dist/gitment.browser.js"></script> <script type="text/javascript"> var themeConfig = { fancybox: { enable: false }, }; </script> <script type="text/javascript"> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-100591386-1', 'auto'); ga('send', 'pageview'); </script> <title> open source - Elevenbeans </title> </head> <body> <div id="page"> <header id="masthead"><div class="site-header-inner"> <h1 class="site-title"> <a href="/." class="logo"> <img width="58px" src="https://raw.githubusercontent.com/elevenBeans/Grocery/master/elevenbeans-black.png"/> Elevenbeans </a> </h1> <nav id="nav-top"> <ul id="menu-top" class="nav-top-items"> <li class="menu-item"> <a href="/"> Home </a> </li> <li class="menu-item"> <a href="/archives"> Archives </a> </li> <li class="menu-item"> <a href="/about"> About </a> </li> </ul> </nav> </div> </header> <div id="content"> <div id="primary"> <section id="archive" class="archive"> <div class="archive-title tag"> <h2 class="archive-name">open source</h2> </div> <div class="archive-post"> <span class="archive-post-time"> 2017-4-10 </span> <span class="archive-post-title"> <a href="/2017/04/10/开源精神从我做起/" class="archive-post-link"> 开源精神, 从我做起 </a> </span> </div> </section> </div> <nav class="pagination"> </nav> </div> <footer id="colophon"><span class="copyright-year"> &copy; 2014 - 2019 <span class="footer-author"><a href="https://github.com/elevenbeans" target="_blank">@elevenbeans</a>.</span> <span class="power-by"> Powered by <a class="hexo-link" href="https://hexo.io/">Hexo</a> and <a class="theme-link" href="https://github.com/frostfan/hexo-theme-polarbear">Polar Bear</a> </span> </span> <script> var gitment = new Gitment({ id: location.pathname, // 可选。默认为 location.href owner: 'elevenbeans', repo: 'elevenbeans.github.io', oauth: { client_id: '34a6c343407ce5dcf922', client_secret: '9669a9498f09f3b21711bd666a50db5929e78256', }, }) gitment.render('comment-container') </script> </footer> <div class="back-to-top" id="back-to-top"> <i class="iconfont icon-up"></i> </div> </div> <script type="text/javascript" src="/lib/jquery/jquery-3.1.1.min.js"></script> <script type="text/javascript" src="/js/src/theme.js?v=1.1"></script> <script type="text/javascript" src="/js/src/bootstrap.js?v=1.1"></script> </body> </html>
Representing UML in RDF (New) A testbed converter that supports automatic translation from UML/XMI to RDFS/RDF/XML is available. The UML community developed a set of useful models for representing static and dynamic components of software-intensive systems. UML is an industry standard and serves as a modeling basis for emerging standards in other areas like OIM, CWM etc. As of today there exist a variety of UML vocabularies for describing object models, datatypes, database schemas, transformations etc. The goal of this work is to make UML "RDF-compatible". This allows mixing and extending UML models and the language elements of UML itself on the Web in an open manner. XMI, the current standard for encoding UML in XML by OMG, does not offer this capability. It is based upon a hard-wired DTD. For example, if a third party were to refine the concept "Event" defined in UML statecharts into say "ExternalEvent" and "InternalEvent", it would not be possible to serialize the corresponding event instances in XMI. The UML/RDF mapping suggested here is not a special encoding for UML. The only thing I did was to create a URL for every identifiable UML entity (e.g. http://www.omg.org/uml/1.3/Foundation.Core.Class or http://www.omg.org/uml/1.3/Foundation.Data_Types.Boolean.true). UML association ends correspond to RDF properties, the rest is mechanical conversion. I did this conversion for some important subsets of the UML standard. The URLs for UML/RDF were chosen to include tag names used in XMI as suffixes to facilitate conversion to/from XMI. Representing the conceptual model of UML in RDF is similar to defining an alternative RDF Schema specification. UML bootstraps itself using the Foundation.Core package in a way similar to RDFS. It contains a lot of details that go far beyond the scope of RDFS. New (May 11, 2000): a validator for RDF-encoded UML models is available! It is included in the API code distribution. The distribution also provides a UML-enhanced RDF model implementation that supports generalization and inverse relationships. Example: validating the state machine schema using schemas defined in the core, datatypes and behavior packages: Example This example illustrates how the flexibility of RDF can be deployed for mixing the UML state machine vocabulary with DublinCore. The consistency of the model is preserved. The data instance depicted below cannot be represented in XMI without violating the XMI DTD: Note that RDF does not define custom graphical representations for specific (meta)models. The above representation is a generic directed labeled graph obtained from the corresponding set of four RDF statements.
Current and potential future distribution of the American dog tick (Dermacentor variabilis, Say) in North America. The American dog tick (Dermacentor variabilis) is medically and economically important in North America. This species is found across central and eastern North America from the Gulf Coast of Mexico through southern Canada. In parts of this region, D. variabilis is a vector for pathogens that cause diseases in humans and animals. Our aim was to determine whether climate change would affect the distribution of the climatically suitable area for D. variabilis in North America, to aid monitoring for potential future spread of tick-borne pathogens. We developed a species distribution model for D. variabilis to project where climate will likely be suitable for the tick in North America using a maximum entropy method, occurrence records from museum and laboratory archives, and 10 environmental variables relevant to climate requirements for the tick. We used four emissions scenarios from the Intergovernmental Panel on Climate Change's Fifth Assessment Report and 10 climate models from the Coupled Model Intercomparison Project (phase 5) to estimate potential future climate suitability and determine how the tick's distribution could change. Our consensus model projected that the area of suitable climate in North America could increase from present by approximately 50% by 2070. In areas beyond the current northern limit of D. variabilis, climate could become more suitable for the tick than at present, possibly resulting in a northward expansion in Canada, but the potential suitability of the southern range of D. variabilis could decrease, depending on the region and climate model. Due to the ability of D. variabilis to harbor and transmit pathogens, a change in the distribution of this species could also affect the risk of human and animal diseases throughout North America, particularly in the northern range of the tick.
This dietary regime is strictly a cleansing diet. Weight loss will occur, but it is not to be equated with fat loss. Much of the weight that is lost will be from fluid and water retention. Indeed, the book states that at least 1/2 the weight will come back on after completing the diet. Many people incorrectly use this for fast weight loss. This is not what the diet is intended for.
import krpc conn = krpc.connect() vessel = conn.space_center.active_vessel root = vessel.parts.root stack = [(root, 0)] while stack: part, depth = stack.pop() print(' '*depth, part.title) for child in part.children: stack.append((child, depth+1))
Wireless communication systems and, specifically, wireless dispatch systems are known. Such wireless dispatch systems provide dispatch services that allow groups of mobile users to communicate spontaneously as a group without the need for arranging a conference call. In today's wireless dispatch systems, each group member must carry a radiophone device, and remain within the coverage area of the dispatch system to maintain communication with the group. With the recent proliferation of Internet technologies and the ubiquitous nature of Internet access today, a great variety of existing technologies are integrating with and exploiting the Internet. Integration of wireless dispatch systems with the Internet, could enable dispatch users to maintain dispatch communication using a computer connected to the Internet, for example, in place of a radio-telephone device that must remain within the coverage area of the dispatch system. Thus, a group of users, some with radio-telephones and others, dispatch clients, with computers connected to the Internet from anywhere in the world, could communicate as a group just as groups of radio-telephone users do today. Therefore, a need exists for an apparatus and method for providing dispatch service to dispatch clients via a packet-switched network such as the Internet.
Excited after having read the special edition of Pour la Science (french edition of Scientific American) about Alan Turing, one of the founding fathers of computer science, I scribbled on the pages some schemas about organization of computer network. Also with inspiration from works of Edgar Morin about complexity of living organism and its self-eco-organization, I asked myself if, instead of an organization from outside, computers can, like a living organism, self-eco-organize. This means that computers can organize themselves in a network with consideration of environment, without that an external agent intervenes. After some shilly-shallying, here is the fruit of a logical-trigonometrical-boogie-woogie-computer science reflection. Self-eco-organized network In order to make computers forming a viable network, there are needs for each one of them to know, at least, where it is in the network and for others to find it in the network. Thus, each one should have an address, which is the reason why they have an IP (Internet Protocol) address defined from outside by people who created the network. But can the computers self-eco-organize thems after tools and specific knowledge have been implemented ? 1a) A circle defined by its centre and its radius, considered as an entity. We suppose this entity has concepts of dot, line and angle. 1b) This entity is either created by the outside environment with the divine will or it is self-eco-created by elements from the milieu. So, we suppose that in the beginning there is something, but here it isn’t the question. 2) We suppose also that this entity has capacities to create straight lines going through its center and, perpendicularly, by his circumference. 3) This entity also knows how to recognize a fellow entity and to exchange informations with the other (to communicate). 4) A first entity (A) establishes a first straight line immutable of reference (axis). This allows it to distinguish different directions by angle ratio. 5) A second entity (B) arrives and creates a random line (communication channel). This channel meets at a time or another, after elongation and rotation, its congener (A). The last one accepts the channel and, when the channel is inside the circle, gives instructions to (B) to adapt itself to A’s own center. 6) To situate one another, the relationship between the channel and the referential axis must be complementary. Under this circumstance, the sum of angles is 180°. By protocol, the new incoming entity adapts itself according to its partner. As a result, (B) turns around its own axis without the connecting channel follows it, and it stops once the angle β between its axis and its channel correspond to 180° minus the angle α communicated by (A). 7) This way, the entity (A) gets the address of angle α for entity (B) and this one has the address angle β for (A). 8) Then comes the entity (C) who is searching to be connected to a congener. 9) The third associate connects itself to (A). The one who has the most of connections decides its own address and the address of the new comer. 10) An existing entity is looking for a connection. 11) The entity who is looking for a connection connects itself and, in case of equal connections per entity, they decide mutually which addresses they give to each other depending on addresses they both have in their own directory, with precedence for the one who receives the new channel. 12) A fourth entity connects to the network. Remark that the denomination of entities (A, B, C, …) was necessary only for explanation and in fact these denominations are not necessary for entities because they denominate themselves with addresses defined in and by the network. Each entity has several addresses. Each one of them is available only for a single other entity. Remark also by the way that if the code was not angle ratio, the different addresses would perhaps be limited to the number of connexions of the most connected entity or to the maximal number of connexions defined beforehand by each entity. Each entity is, then, in contact with other entities who have different addresses for it. A priori, in a population, addresses can be repeated, but these identical addresses are not available for the same entities. We can see, at this stage, that an entity is connected to another one by a direct way or others indirect. 13) If a direct connexion between two entities is broken, entities don’t lose their respective addresses. They preserve a historic memory: at the time of connexion each entity has assigned an iteration to the address of the other entity (α1, α2, β1, …). Then, gradually, they can communicate again by the intermediary of other congeners: because their landmarks are angular, they search to find again the appropriate angular sum (here the address) of the lost congener, after which they recognize each other by dint of mutual memorization of their past link (at least their iterated addresses). They can even, each time there is a new connexion, calculate some indirect connexions (just in case…). 14) Here we are in a reticular and redundant self-eco-organized hierarchy. It’s no more necessary to have an external addressing and dedicated servers. The organization is distributed. It is neither centralized, nor multi-polar. We are strictly in anarchy. Of course this scaffolding is conceptual: I have difficulty to see a spherical computer shaking arms in the space. Nevertheless, and here I leave to others either to forget me or to imagine the following, is it possible to install or act in a way that a such organization sets itself in place ?
Blog Social Mobility – the next frontier for Diversity and Inclusion (D&I)? Recent figures from The Social Mobility Commission show that in the UK seven per cent of children attend fee-paying schools. However, The Sutton Trust found that in 2014, 34 per cent of new entrants into investment banking over the previous three years had attended a fee-paying school. The picture is similar in other professions, 71 per cent of top military officers, 74 per cent of top judges and 61 per cent of the country’s top doctors attended fee-paying schools. Many employers pride themselves in being true meritocracies – hiring the best person for the job – but is too much reliance placed on academic qualifications and where they were achieved? During my time in Investment Banking I would argue that far too much emphasis was placed on just that – and I knew a number of successful people who felt they had to hide the fact that they hadn’t attended university. Some will argue that good qualifications from an impressive university such as Oxford or Cambridge will result in ‘hiring the best’, however, there is much more required to building a successful career such as a good work ethic, resilience and interpersonal skills. Assessing ‘talent’ by academic success alone is a blunt and lazy screening tool and is not a clear-cut indicator of future success or potential. As one of my former bosses used to say “I’d rather have someone on my team who is determined and has had to work hard for everything they have achieved than someone who has had it all handed to them on a plate”. A small number of businesses are taking note, with some working together to drive change. The UK Government created the Social Mobility Business Compact, which has resulted in companies such as EY removing academic qualifications from its trainee application process for graduates, undergraduates and school leavers. They are no longer required to comply with achieving a minimum of 300 UCAS points. Instead they conduct a number of online ‘strengths’ assessments and numerical tests to assess the potential of their applicants. The legal profession launched PRIME in 2011, a programme to tackle social mobility in the sector. To date, 89 firms have signed up to a number of commitments including (i) specifically targeting work experience at school age students who have the least opportunity to access it otherwise, (ii) provide financial assistance to ensure they can attend work experience and (iii) maintain contact with the firm after work experience has ended. Focusing on increasing transparency, removing barriers and bias from recruitment processes and broadening the reach into the wider communities are all-important factors to increasing social mobility. Placing vocational learning on an equal footing with academic routes is also a critical tool for meeting future skill requirements. Direct Line is one company that has taken the apprenticeship route seriously as an alternative route for talented people to get noticed by employers. Their programme enables people to gain valuable work experience and a recognised qualification without the longer-term burden of university tuition fees. Social mobility is a complex issue that can’t be remedied with quick fix activities, but this isn’t going to go away. For organisations to widen their horizons and increase the potential pool of talented individuals for their organisations, the following three actions are a good place to start: Broaden access points into the organisation – talent comes in all shapes and sizes and doesn’t all go to university. How can you access those who choose to start their careers without completing the university years? Remove information on a candidate’s educational background from the recruitment and promotions process to neutralise any bias towards particular institutions. Challenge qualification requirements on job roles – are they absolutely necessary for every role? Understand your numbers – identify how you can collect and monitor information about social and educational background. Creating sustainable change begins with knowing your starting point. So, where does your company sit on their commitment to social mobility? Is it firmly placed within the D&I strategy or a frontier that hasn’t been approached and something to consider in the future?
LONDON (Reuters) – British judges ruled on Monday that Julian Assange, founder of the whistle-blowing website Wikileaks, could take his year-long fight against extradition to Sweden to theSupreme Court, the highest court in the land. Swedish authorities want to question the 40-year-old Australian over accusations of rape and sexual assault made by two female former WikiLeaks volunteers in August 2010. ADVERTISEMENT Assange, who has been living in Britain since his arrest here in December last year, denies wrongdoing. He now has 14 days in which to formally lodge an appeal, meaning his stay in Britain is certain to stretch into 2012. Assange spent nine days in London’s Wandsworth prison after his arrest last year. He was freed a week before Christmas on bail and has since been living at the country house of a wealthy supporter in eastern England. His arrest came shortly after WikiLeaks published thousands of secret U.S. diplomatic cables that included unflattering views of world leaders and candid assessments of security threats. Assange says the allegations are politically motivated. ADVERTISEMENT He had lost his last attempt to avoid being sent to Sweden on November 2 after two High Court judges upheld a previous ruling. In 2010, WikiLeaks posted 391,832 secret papers on the Iraq war and 77,000 classified Pentagon documents on the Afghan conflict. It has also made available about 250,000 individual cables, daily traffic between the State Department and more than 270 American diplomatic outposts around the world. (Reporting by Keith Weir; Edited by Alessandra Rizzo)
Chronic acidosis-induced alteration in bone bicarbonate and phosphate. Chronic metabolic acidosis increases urinary calcium excretion without altering intestinal calcium absorption, suggesting that bone mineral is the source of the additional urinary calcium. In vivo and in vitro studies have shown that metabolic acidosis causes a loss of mineral calcium while buffering the additional hydrogen ions. Previously, we studied changes in femoral, midcortical ion concentrations after 7 days of in vivo metabolic acidosis induced by oral ammonium chloride. We found that, compared with mice drinking only distilled water, ammonium chloride induced a loss of bone sodium and potassium and a depletion of mineral HCO3(-) and phosphate. There is more phosphate than carbonate in neonatal mouse bone. In the present in vitro study, we utilized a high-resolution scanning ion microprobe with secondary ion mass spectroscopy to test the hypothesis that chronic acidosis would decrease bulk (cross-sectional) bone phosphate to a greater extent than HCO3(-) by localizing and comparing changes in bone HCO3(-) and phosphate after chronic incubation of neonatal mouse calvariae in acidic medium. Calvariae were cultured for a total of 51 h in medium acidified by a reduction in HCO3(-) concentration ([HCO(-)]; pH approximately 7.14, [HCO3(-)] approximately 13) or in control medium (pH approximately 7.45, HCO3(-) approximately 26). Compared with incubation in control medium, incubation in acidic medium caused no change in surface total phosphate but a significant fall in cross-sectional phosphate, with respect to the carbon-carbon bond (C2) and the carbon-nitrogen bond (CN). Compared with incubation in control medium, incubation in acidic medium caused no change in surface HCO3(-) but a significant fall in cross-sectional HCO3(-) with respect to C2 and CN. The fall in cross-sectional phosphate was significantly greater than the fall in cross-sectional HCO3(-). The fall in phosphate indicates release of mineral phosphates, and the fall in HCO3(-) indicates release of mineral HCO3(-), both of which would be expected to buffer the additional protons and help restore the pH toward normal. Thus a model of chronic acidosis depletes bulk bone proton buffers, with phosphate depletion exceeding that of HCO3(-).
Ultrastructural changes in presynaptic terminals following stimulation will be examined in ciliary ganglia from 3-4 day chicks which have been axotomized on the day of hatching. These changes will be compared with those occurring in normal ganglia of the same age. In addition, the effect of guanidine on synaptic transmission in ciliary ganglia will be studied, with intracellular recording from both presynaptic terminals and postsynaptic ganglion cells. The role of divalent cations in transmitter release at the neuromuscular junction will be examined by treating presynaptic terminals with the ionophore A23187 and applying Ca, Mg, Ba, Sr and Cd iontophoretically to the terminals to determine their relative efficacy in the release process. Further studies will be made on the effects of ionic strenth on the acetylcholine - induced permeability increases at the motor end-plate. This will be done by measuring reversal potentials for post-junctional currents produced by iontophoretic application of acetylcholine in solutions of varying Na/K concentration ratios and ionic strengths. BIBLIOGRAPHIC REFERENCES: Martin, A.R. (1976). The effect of membrane capacitance on nonlinear summation of synaptic potentials. J. Theoret. Biol. 59, 179-188. Martin, A.R. (1976). Current concepts of pre- and post-junctional mechanisms of neuromuscular transmission. Ann. N.Y. Acad. Sci. 274, 3-5.
Inside the U.S. Supreme Court this week for the oral arguments for Masterpiece Cakeshop, Ltd v. Colorado Civil Rights Commission I couldn’t help but look at Justice Neil Gorsuch and imagine how things would be if Merrick Garland were rightly sitting in that chair. That is, we’d not be once again worried about a wavering Justice Anthony Kennedy, this time about the issue of whether or not a business open to the public can bar service to gay, lesbian, bisexual or transgender people based on the business owners’ religious beliefs. It was stunning to many people that the Supreme Court even took up the case of Jack Phillips, the owner of Masterpiece Cakeshop in Lakewood, Colorado, who refused, on religious grounds ― claiming a violation of First Amendment rights ― to make a cake for a gay couple, Dave Mullins and Charlie Craig, who came in to buy a wedding cake. Other similar cases in states with laws barring discrimination against LGBT people in public accommodations had been rejected for review by the high court after lower courts ruled against the businesses. But there we were, with Gorsuch on the court and with Chief Justice John Roberts seeming to be squarely with Gorsuch and the conservatives. This, even though some legal scholars, looking at his prior decisions, noted Roberts might be open to regulating speech when it comes to civil rights law. But that didn’t seem to be the case yesterday from his questioning. And Kennedy, as many have pointed out, appeared to express sympathy ― and harshness ― for both sides. Kennedy has been the court’s leader on gay equality, writing the decisions in landmark cases striking down sodomy laws, ruling the Defense of Marriage Act unconstitutional, and of course the Obergfell marriage equality ruling in 2015. David Cole of the American Civil Liberties Union, who represented the gay couples and was hit with hard questions about religious liberty from the conservative justices, told me after the proceedings that he thought the arguments largely went well. “Well, that’s how it goes in the Supreme Court, you’re peppered with questions,” he said of the conservatives justices who pressed him. “But I think the [plaintiffs] made clear that the argument the bakery was advancing ― that the United States was advancing [via Donald Trump’s solicitor general] ― that businesses that have services that could be characterized as expressive get an exemption from anti-discrimination law, was untenable.” But many progressive legal observers are concerned ― some very much so ― and the general consensus among journalists who cover legal issues is that it will come down to Kennedy, and that he, by his own history, could side with the baker. It’s often forgotten that on another gay rights decision, Boy Scouts of America v. Dale, Kennedy joined the majority in a 2000 ruling that the Boy Scouts could ban gay scouts and scoutmasters on First Amendment grounds. No one, however, knows what’s going to happen in this case. Deciphering opinions from the justices’ questions is like reading tea leaves, especially when one or more appear equally hard on and sympathetic to both sides. Some of the conservatives may find that even if they want to favor the baker, they can’t do so without opening the door to discrimination against many other groups. Or they’ll find a way. We’ll know in a few months. But again, the fact that we are even here is precarious. In my 2015 book, It’s Not Over, I wrote all about what I’d termed “victory blindness,” a phenomenon in which minorities who are discriminated against become seduced by big wins ― like the Obergefell ruling ― and think they’ve achieved full equality in society. Victory blindness, I argued, overcame many LGBTQ people, who let their guards down or dismissed some anti-LGBTQ actions, not realizing that the anti-equality forces were organizing fiercely, and that the backlash would be intense and could roll back LGBTQ rights while we’re celebrating or not paying attention. Victory blindness often prevents us from seeing how tenuous our wins are..." My argument was filled with a lot of “what ifs” that many of us ― including me ― thought were unlikely to happen. Yes, we’d achieved much under President Obama and it would likely continue, but what if an extremist GOP candidate were elected president? What if the make up of the Supreme Court changed and we didn’t get replacements that were sympathetic to LGBTQ rights? (That happened with regard to Scalia, and it could easily happen with Kennedy, who may retire at any time, and which would mark a devastating shift for the court.) Victory blindness often prevents us from seeing how tenuous our wins are and how all minorities must continue to fight for their rights because the political winds can shift very quickly. Donald Trump’s election and presidency did a lot to shake us from it, forcing us to become energized and to vow to fight. This week at the Supreme Court, no matter how the case eventually is decided, should serve to do the same. Follow Michelangelo Signorile on Twitter: www.twitter.com/msignorile Bloomberg via Getty Images Charlie Craig and husband David Mullins filed a civil rights complaint to the Colorado Civil Rights commission after Masterpiece Cakeshop owner Jack Phillips refused to make cakes for same-sex weddings.
Q: Does a transformer use power when output isn't under load? I was reading about how AC to DC converters work with a step-down transformer and then a diode bridge to convert the lower, stepped down AC voltage into DC. What I don't understand is since the input AC appears to be connected to the primary coil of the transformer, how does the DC load affect the power used from the AC supply? Does the DC load somehow feedback and lower the resistance of the primary coil so that more power can be drawn? When there is no load on the DC side, does power still flow through the AC primary coil, and if so, why doesn't it just melt? A: Does the DC load somehow feedback and lower the resistance of the primary coil so that more power can be drawn? Yes. It would be simpler to analyze an AC load though. The diodes are not central to your question: The impedance of RL is also transformed, so if you have a 10:1 transformer and RL is 2 Ω, the AC source will see the transformer as a 200 Ω resistor ($10^2⋅2$) As the current in a coil changes, it creates a changing magnetic field. In the case of a transformer with a load, however, the change in magnetic field creates a current in the secondary, which immediately creates its own changing magnetic field in the opposite direction, cancelling out the primary's field. People tend to forget that an ideal transformer has no magnetic field while operating. Any change in either coil's field is immediately cancelled by a change in the other. The "feedback" is caused by the same effect. The primary causes the secondary to change, and the secondary causes the primary to change in return. When there is no load on the DC side, does power still flow through the AC primary coil, and if so, why doesn't it just melt? With nothing connected to the secondary side, the secondary coil is open circuited and does nothing. It's just some metal that happens to be nearby. The circuit is now just an AC source driving the primary coil, which behaves as a lone inductor: Ideal inductors do not consume any power; they just store energy temporarily in one half of the cycle and return it to the supply on the other half. Real coils are not made of perfect conductors, though, and have some resistance, so the power consumed by the primary coil will be determined by the resistance of the wire. Also, it's not quite right to say "power still flow through the AC primary coil". "Current" is flowing through the primary, and the resistance of the primary to that current causes it to "dissipate energy" (or power) into the room. "Power" is actually the rate at which energy flows, and energy actually flows through the empty space between the wires, not in the wires themselves. Once you understand this, a lot of things make much more sense. A: A transformer offers resistance to AC current flow due to the magnetic field produced by the current flow. This "AC resistance" is termed "impedance" and is a function of number of turns, core material, air gaap in core , core dimensions and more. When there is no load the applied AC voltage will cause "magnetising current" to flow. This will cause some losses due to eddy current losses in the core and copper losses due to resistance in the winding ("I squared R losses" as power = Current^2 x Resistance). These losses are relatively small compared to full load power but not trivial at rest. A few percent of full load power would usually be good. When a DC load is applied it loads the AC secondary circuit which is tightly couple by the core's magnetic fields to the primary winding. So the DC load resistance appears as if it is an AC impedance load on the primary side and input power increases to meet the load. If you apply DC (rather than AC) to a transformer winding there is no ongoing magnetic field change, there is no impedance due to the varying magnetic field and current is limited by the resistance which is low compared to the impedance that should be being generated. If the DC supply has enough muscle power the transformer "just melts".
Coordinating Collections These coordinated collections help Distinguish your Lifestyle by pulling your look together. Ceiling lights, flush mounts and semi-flush mounts with coordinating sconces and bath and vanity lights that help you to both layer your lighting and enable you to carry your look from room to room.
Q: Replacing repetitive words, case-insensitively Sample: >>> line = 'the the, To to' >>> re.findall(r'\b(\w+) \1', line) ['the'] >>> re.findall(r'\b(\w+) \1', line, re.I) ['the', 'To'] >>> re.sub(r'\b(\w+) \1', r'\1', line, re.I) 'the, To to' Expected: 'the, To' The regex works in other places like Vim: s/\v<(\w+) \1/\1/gi Perl: s/\b(\w+) \1/$1/gi sed: -r 's/\b(\w+) \1/\1/gi' Is this a known behavior? What is a workaround? My Python version is 3.4.3 if that makes a difference. A: Read the definition of re.sub: re.sub(pattern, repl, string, count=0, flags=0) You are passing re.I as count (where it is allowing at most 2 replacements), not as flags. Instead, try: >>> re.sub(r'\b(\w+) \1', r'\1', s, flags=re.I) # ^ note 'the, To'
The following 8 lots were awarded to former Liverpool footballer Phil Boersma who began his career with Liverpool in 1969 v Manchester City. He went on loan to Wrexham for 7 games in March 1970 before returning to Liverpool to bag his first goal as a substitute against Dinamo Bucharest. He was a prominent figure during Liverpool's run to the 1973 U.E.F.A. Cup final. The Reds also won the First Division title with Boersma contributing 7 goals from just 14 appearances. Always on the fringes of the first team Boersma failed to make an impact on the 1975/76 season for the Anfield club and Bob Paisley allowed him to leave Liverpool in the December of '75 joining Middlesbrough, he made his debut for Middlesbrough in a 0-0 draw at Ayresome Park with Manchester United. Boersma left Middlesbrough in the August 1977 to Luton Town. He left Luton to join up with former club colleague John Toshack who was in charge of Swansea City. Since retiring, Boersma moved into physiotherapy and coaching. He was appointed first team coach and then Assistant Manager at Swansea City. After leaving Swansea in 1983, he spent time at Lincoln City as Assistant Manager, and also spent most of the 1986-87 season as first-team coach at Doncaster Rovers, before linking up with Souness again as physio at Rangers before taking on coaching roles under Souness at their former club Liverpool as well as Southampton, Blackburn Rovers and Newcastle United. A plaque presented to Liverpool players for winning the 1st division in 1972-73. Engraved 'CHAMPIONS DIVISION I 1972-73'. 9ct Gold plated, attached to wooden frame, produced by Vaughton and Sons of Birmingham, with original case. This auction is now finished. If you are interested in consigning in future auctions, please contact the specialist department. If you have queries about lots purchased in this auction, please contact customer services. Buyers' Obligations ALL BIDDERS MUST AGREE THAT THEY HAVE READ AND UNDERSTOOD BONHAMS' CONDITIONS OF SALE AND AGREE TO BE BOUND BY THEM, AND AGREE TO PAY THE BUYER'S PREMIUM AND ANY OTHER CHARGES MENTIONED IN THE NOTICE TO BIDDERS. THIS AFFECTS THE BIDDERS LEGAL RIGHTS. If you have any complaints or questions about the Conditions of Sale, please contact your nearest customer services team. Payment Notices Credit card charges: a surcharge of 2% is applicable when using Mastercard, Visa and overseas debit cards. Shipping Notices Please note that shipping is not included in the hammer price plus buyers premium. We recommend contacting your preferred courier for a quote before bidding. We regret that Bonhams is unable to pack items for external shippers.
Integrating molecular design resources within modern drug discovery research: the Roche experience. Various computational disciplines, such as cheminformatics, ADME modeling, virtual screening, chemogenomics search strategies and classic structure-based design, should be seen as one multifaceted discipline contributing to the early drug discovery process. Although significant resources enabling these activities have been established, their true integration into daily research should not be taken for granted. This article reviews value-adding activities from target assessment to lead optimization, and highlights the technical and process-related aspects that can be considered essential for performance and alignment within the research organization.
{ Monthly Archives } November 2007 Yes, I’m still alive. I’ve been on vacation since Thanksgiving. After the weeks of personnel issues and other nonsense at work, I thought it would be really nice to completely unplug. Unfortunately, folks have been ill, things are weird with Rat Jr. getting ready to move out of state, etc. I keep thinking I’ll sit […] Here’s the lead to a piece written in March entitled “why the gun is civilization“: Human beings only have two ways to deal with one another: reason and force. If you want me to do something for you, you have a choice of either convincing me via argument, or force me to do your bidding […] Driving around town yesterday, I saw the following on one of those little 2 foot signs they stick in yards and along streets: Keep Christ in Christmas Christian Superstore 701 N **** St. I’m thinking someone doesn’t quite get it. Driving home this evening I was watching Disney’s “Jungle Book”. Yeah. I know. There’s something horribly wrong with that statement. The kids in the van in front of me were watching it on one of those built-in, overhead screens. A series of stoplights afforded me the opportunity to check out the movie. Flashback to the […] Imparting meaning to random events after the fact is a human trait. While it might be tempting to believe my MP3 player is somehow in cosmic collusion with the universe to produce a playlist that is just as scattered and unfocused as I feel today at the tail end of something vaguely resembling a week’s […] Rat Jr. bought her first car a couple of days ago. Mid- 90’s Jeep Cherokee. It’s nice. Last night when she came home she had a sort of wide-eyed look on her face. When I asked her what the deal was, she said, “I can’t believe it’s really mine.” I remember that feeling; joy, with […]
Pluto, Scorpio and the 8th House A lecture originally with Pegasus tapes, on the depth of meaning found in the symbolism of these archetypes. How to get to the bottom of the deepest mysteries in the psyche, as well as what "joint resources" really means, and how merger, cooperation and depth relating brings up neutral but nuclear power, and what we can do with that power to become more who we are at the most core level. With Erin Sullivan - 75 min. Listen to a sample here: Unable to embed Rapid1Pixelout audio player. Please double check that: 1)You have the latest version of Adobe Flash Player. 2)This web page does not have any fatal Javascript errors. 3)The audio-player.js file of Rapid1Pixelout has been included.
Warning: file_exists() [function.file-exists]: open_basedir restriction in effect. File(/var/www/vhosts/ulaanbaatar-property.com/madmongolia/wp-content/themes/Minimal/timthumb.php/http:/www.mad-mongolia.com/wp-content/files_mf/1341803259_magicfields_photo_1_1.jpg) is not within the allowed path(s): (/var/www/vhosts/ulaanbaatar-property.com/madmongolia:/tmp:..) in /var/www/vhosts/ulaanbaatar-property.com/madmongolia/wp-content/themes/Minimal/timthumb.php on line 896 Warning: Cannot modify header information - headers already sent by (output started at /var/www/vhosts/ulaanbaatar-property.com/madmongolia/wp-content/themes/Minimal/timthumb.php:896) in /var/www/vhosts/ulaanbaatar-property.com/madmongolia/wp-content/themes/Minimal/timthumb.php on line 418
Q: Return remainder of a variable if started with given character If the value of a variable (i.e. $var="^hello";) starts with a given character (i.e. ^), how could I return the remainder of that variable (i.e. hello), and returnFALSE (or NULL or 0 if easier) if it doesn't start with the given character? Note that there is no guarantee that the variable will be a string. I tried the following, but it results in errors if the value is NULL. $var='^hello'; //Works $var=123; //Works $var=NULL; //Doesn't work echo ($var[0]=='^')?substr($var,1):false; echo($new); A: What you've done actually works, but when you echo false, nothing will appear on the screen, so just wrap false with double quotes to display "false" on the screen $var='^hello'; //Works $var=123; //Works echo ($var[0]=='^')?substr($var,1):"false"; // Add double quotes to false Live demo EDIT. Note that this will not work if $var is set to NULL. To prevent an error, just change ($var[0]=='^') to ($var && $var[0]=='^')
Sanjay Kumar (activist) Sanjay Kumar (born 15 January 1976) is an Indian social/political activist. He is currently the deputy director of Aashray Adhikar Abhiyan, an organization in New Delhi that has worked for the rights of homeless people since 2000. Kumar has been working in the fields of social work, social policy and research since 2000. His main focus typically lies on the issues of urban poverty, homelessness, underage employment, street dwelling children, old age pension, right to education, right to food and citizenship rights. Kumar is responsible for managing and implementing a campaign in Delhi with hundreds of volunteers to ensure access to shelters, health-care, skill development, and justice for marginalized people. He has been consistently organizing mass events/rallies, conducting census/surveys, documenting and researching interventions, establishing networks and advocacy groups with government departments, other NGOs, and movements. Kumar has been fighting against social inequality, discrimination and sensitizing civil society for the realization of the larger goal of poor people within India. Kumar is also associated as a research scholar on the issue of homelessness with the Department of Social Work, University of Delhi. Education He is currently in the pursuit of a PhD in Homelessness from the University of Delhi. He has achieved a MSW (Master of Social Work), UGC, NET, a diploma in Journalism and Mass Communication, a diploma in Rural Development, BA (Honours) and MA in History. Publications and documentations Treatment of Homeless people with severe Mental Illness: Making a Difference "Begharo Ki Karah" case studies of homeless people "Meri Kahani Meri Jubani" The Testimonies of homeless people caught Under Bombay Prevention Of Beggary Act: published in "People Without A Nation" "Towards Reclaiming Our Humanity" - Published by his own NGO Aashray Adhikar Abhiyan Awards and fellowship Sanjay Kumar has received a scholarship for an emerging social entrepreneur from Leader Quest organization situated in London, UK (2007–08). He was also presented with a "True Legend Award" in 2016 by CNBC-TV 18. He has been a member in the Chief Electoral officer, GNCT of Delhi for Homeless people. Additionally, he also holds an award for an actively monitored and guided Night Shelter Volunteer's program (Delhi Urban Shelter Improvement Board) presented to him in 2015. Kumar was also awarded by UBM India Ltd. for the "Giving Back" NGO in 2013 at Mumbai, India. References External links Category:1976 births Category:Living people Category:Delhi politicians Category:Indian human rights activists
Q: Defining default link handling behaviour in app My users open a link of my app in Whatsapp/Slack and it opens in a webview inside Whatsapp/Slack. How can I get it to open in my app and not in Whatsapp? If there is a link I should read up, please post. I did search and then have asked. A: As suggested in React Navigation documentation : InYourAppName/android/app/src/main/AndroidManifest.xml, do these followings adjustments: 1.Set launchMode of MainActivity to singleTask in order to receive intent on existing MainActivity. 2.Add the new intent-filter inside the MainActivity entry with a VIEW type action. Now, your manifest file should be like below : <activity android:name=".MainActivity" android:launchMode="singleTask"> <intent-filter> <action android:name="android.intent.action.MAIN" /> <category android:name="android.intent.category.LAUNCHER" /> </intent-filter> <intent-filter> <action android:name="android.intent.action.VIEW" /> <category android:name="android.intent.category.DEFAULT" /> <category android:name="android.intent.category.BROWSABLE" /> <data android:scheme="mychat" /> </intent-filter> </activity>
Introduction {#s1} ============ The microenvironment of solid tumors is often rich in inflammatory cells which have appeared as essential players in the tumorigenic process [@pone.0111306-Coussens1]. A protective role of the immune system, especially in early stages of tumorigenesis, has become evident and a link between immune cell-infiltration and better prognosis has been described in various cancer types [@pone.0111306-Schmidt1]--[@pone.0111306-Swann1]. On the other hand, the immune system is known to be able to promote cancer initiation and progression and the causal relationship between chronic inflammation within the local tissue environment and cancer has received increased attention in recent years, leading up to the concept of cancer-related inflammation as an emerging hallmark of cancer [@pone.0111306-Hanahan1]. Accordingly, a systemic inflammatory response as shown by an elevated concentration of circulating C-reactive protein (CRP) in peripheral blood, has frequently been associated with increased incidence as well as worse outcome in numerous types of cancer, e.g. gastro-oesophageal cancer, non-small cell lung cancer and prostate cancer [@pone.0111306-Allin1]--[@pone.0111306-McArdle1]. CRP is a non-specific acute-phase protein that rises on acute infection as well as tissue trauma, chronic inflammatory disease, myocardial infarction, surgery and cancer. It is secreted primarily by hepatocytes in response to cytokine stimulation by for instance IL-1, IL-6 and TNF-alpha [@pone.0111306-Mortensen1]. A recent meta-analysis underscored that CRP, as a biomarker of inflammation, is related to impaired outcome also in breast cancer patients [@pone.0111306-Han1]. However, this association was not confirmed by others [@pone.0111306-AlMurri1], [@pone.0111306-Tibau1]. Only few studies have examined the impact of pre-operative CRP levels on breast cancer prognosis, thus far with mixed results [@pone.0111306-Ravishankaran1]--[@pone.0111306-OHanlon1]. The association between CRP level and breast cancer survival has until now been examined mainly in patients with adjuvant systemic treatment. Therefore, the aim of the present study was to analyze the influence of pre-operative CRP level in an untreated cohort of lymph node-negative breast cancer patients in relation to survival and established prognostic factors. Furthermore, we wanted to elucidate potential associations between pre-operative serum CRP and genes expressed in corresponding breast cancer specimen. Materials and Methods {#s2} ===================== Patient cohort {#s2a} -------------- There were three main eligibility criteria (i) node-negative breast cancer (ii) no systemic treatment in the adjuvant setting (iii) availability of CRP measurement. The initial study cohort consisted of 420 node-negative breast cancer patients, treated at the Department of Obstetrics and Gynecology at Johannes Gutenberg University Mainz between the years 1985 and 2004. Of these 420 patients, pre-operative CRP status was available for 148 individuals treated by surgical tumor resection, either modified radical mastectomy (n = 43; 29.1%) or breast conserving surgery followed by irradiation (n = 105; 70.9%), who did not receive systemic therapy in the adjuvant setting. The median age at diagnosis of the patients was 62 years (range 40 to 90 years). The mean follow-up time was 113 months. All patients provided their informed consent before study inclusion. Information on tumor size (pT stage) as well as presence of necrosis or inflammation in the tumor was collected from the corresponding pathology report of the Gynecological Pathology Division". From the breast cancer database [@pone.0111306-Schmidt3], information on about of age at diagnosis, histological tumor grade, which was assigned according to Elston and Ellis [@pone.0111306-Elston1]., estrogen receptor (ER), progesterone receptor (PR) status and human epidermal growth factor receptor 2 (HER2) status and proliferation index (Ki67) were obtained ([Table 1](#pone-0111306-t001){ref-type="table"}). Immunohistochemical analyses for ER, PR, HER2 and Ki-67Ki67 and HER2 were performed on 4-µm-thick sections according to standard procedures. Briefly, serial sections of formalin-fixed and paraffin-embedded tumor tissues were stained with a monoclonal ER antibody (clone 1D5, Dako, Glostrup, Denmark), a monoclonal PR antibody (clone PgR 636, Dako), a monoclonal Ki-67Ki67 antibody (clone MIB-1, Dako, Glostrup, Denmark) as well as a polyclonal HER2 antibody (A0485, Dako, Glostrup, Denmark). HER2 was scored from 0 to 3+ according to the well-published manufacturer\'s instructions. HER2 3+ tumors were considered HER2 positive. All HER2 2+ cases were confirmed by Fluorescence in-situ hybridization (FISH) using a dual-color probe (DakoCytomation) containing a spectrum orange-labeled HER-2HER2 gene (17q11.2--q12) probe and a spectrum green-labeled centromere control for chromosome 17 (17p11.1--q11.1). HER2 2+ tumors with HER2 amplification were finally considered HER2 positive. ER and PR was analyzed as percentage of all tumor cells and any nuclear expression \>0 was considered positive. Ki67 expression in more than 20% of nuclei was considered as high expression (highly proliferative) and a percentage ≤20% was defined as low expression. Building on these variables, we calculated molecular subtypes: Luminal A (ER+ and/or PR+, HER2−, Ki67≤20%), Luminal B (ER+ and/or PR+, HER2−, Ki67\>20%), Basal-like (ER− and PR−, HER2−), and HER2+ (ER+/−, PR+/−, HER2+). 10.1371/journal.pone.0111306.t001 ###### Clinicopathological characteristics for node-negative breast cancer patients. ![](pone.0111306.t001){#pone-0111306-t001-1} n \% ---------------------------------- ----- ------- **Total number of patients** 148 100.0 **C-reactive protein (CRP)** Elevated (\>5mg/l) 31 20.9 Normal (≤5mg/l) 117 79.1 **Tumor size** ≤2cm 105 70.9 \>2cm 43 29.1 **Tumor grade** Grade I 40 27.0 Grade II 84 56.8 Grade III 24 16.2 **Age at diagnosis** \<50 years 29 19.6 ≥50 years 119 80.4 **Estrogen receptor status** ER positive 128 86.5 ER negative 17 11.5 Missing data 3 2.0 **Progesterone receptor status** PR positive 33 22.3 PR negative 112 75.7 Missing data 3 2.0 **HER2 status** HER2 positive 16 10.8 HER2 negative 129 87.2 Missing data 3 2.0 **Ki67** ≤20% 94 63.5 \>20% 43 29.1 Missing data 11 7.4 **Molecular subtype** Luminal A 86 58.1 Luminal B 24 16.2 Basal-like 13 8.8 HER2+ 16 10.8 Missing data 9 6.1 **Local recurrence** Yes 10 6.8 No 138 93.2 **Metastasis** Yes 20 13.5 No 128 86.5 **Cause of death** Breast cancer 13 8.8 Other 21 14.2 Alive at last follow-up 114 77.0 **Necrosis** Absent 110 74.3 Present 48 25.7 **Inflammation** Absent 98 66.2 Present 50 33.8 Gene expression array data from matched tumor tissue, analyzed by Affymetrix GeneChip Human Genome U133A arrays, was available for a subset of patients (n = 72) as previously described [@pone.0111306-Schmidt1]. Raw.cel files, MAS 5.0 processed data and patient data have been deposited in National Center for Biotechnology Information (NCBI) Gene Expression Omnibus (GEO) and are accessible through GEO Series accession no. GSE11121. We documented death from cancer or from other reasons unrelated to breast cancer and recurrence of disease, which include metastasis and local relapse. 13 (8.8%) patients died from breast cancer, 21 (14.2%) patients died from causes unrelated to breast cancer, 114 (77.0%) patients were alive at the date of last follow-up, 10 (6.8%) patients suffered from locally-recurrent disease and 20 (13.5%) developed distant metastasis. Patients who died from other reasons were censored from the survival analysis at the date of death. All participants provided written informed consent which was documented in the patient file. This study as well as the consent procedure was approved by the ethical review board of the medical association of Rhineland-Palatinate. All clinical investigations were conducted according to the principles expressed in the Declaration of Helsinki. The manuscript was prepared in agreement with the reporting recommendations for tumor marker reporting studies [@pone.0111306-McShane1]. Ethical standards: The experiments comply with the current laws of Germany. C-reactive protein {#s2b} ------------------ A 10-mL blood sample was collected the day before surgery. The sample was processed within 3 hours of collection. During the period of observation, the method of CRP determination changed once in 1992 from a nephelometric to a turbidimetric assay (Behring Diagnostics, Marburg, Germany and Boehringer Mannheim/Roche Diagnostics, Mannheim, Germany, respectively). The assays were performed following the manufacturer\'s instructions on the BN-systems (Behring Diagnostics, Marburg, Germany) and the Hitachi 717/747/917 (Boehringer Mannheim/Roche Diagnostics, Mannheim, Germany) automated analyzers, respectively. According to the methodological progress, a wide range CRP assays was introduced in the late 90s/early 2000s. Since then, a measuring range of 0.1--300 mg/l was used. During the whole period, the upper limit of normal was 5 mg/l for all assays used. Intra- and inter-assay imprecision was less than 5% for CRP. Control materials were used for running each assay for quality control purposes. Statistical analysis {#s2c} -------------------- To evaluate the association between pre-operative CRP level and established prognostic factors such as age, tumor size, tumor grade, ER, PR and HER2 status, proliferation index (Ki67) and molecular subtype with survival time, uni- and multivariate Cox regression analyses were performed. The internal stability of the models was tested by bootstrap resampling [@pone.0111306-Altman1]--[@pone.0111306-Ferro1]. Briefly, new data sets with the same size of the original one were created by random sampling with replacement. We calculated 10.000 Bootstrap samples from the original data set followed by the same Cox regression. To avoid potential pitfalls of dichotomization of prognostic factors with concomitant loss of test power [@pone.0111306-Metze1]--[@pone.0111306-Metze3] we used the prognostic factors in our multivariate Cox regression model as continuous variables. Survival rates were calculated according to the Kaplan-Meier method and survival times were compared with the Log-rank test. Disease-free survival (DFS) was specified the time between the date of surgery and the date of loco-regional or metastatic recurrence, breast cancer-related death or last follow-up. Metastasis-free survival (MFS) was defined as the time between date of surgery and diagnosis of distant metastasis. Overall survival (OS) was defined as the time between the date of surgery and the date of death. The Wilcoxon rank-sum test was applied to identify significant correlations between CRP level and clinical variables. A potential correlation between pre-operative CRP level and expression of metagenes representative of T-and B-cell tumor infiltration, tumor cell proliferation and estrogen receptor positivity [@pone.0111306-Schmidt1] was assessed using Spearman\'s rank correlation coefficient. Additionally, potential correlations between pre-operative CRP level and mRNA expression level for all probe sets on the Affymetrix HG-U133A array were assessed, with the false discovery rate adjusted to 0.05 according to Benjamini and Yekutieli. All P values were two sided. Since, except for the correlations between CRP and Affymetrix probe sets, no correction for multiple testing was performed, all results were interpreted as explorative. Statistical analyses were performed using the freely available statistical computing language R3.0.1. Results {#s3} ======= The pre-operatively assessed CRP level in peripheral blood was in the majority of patients (79.1%) within the normal reference interval, conventionally defined as ≤5 mg/l, while a subset of patients (20.9%) displayed an elevated CRP level (\>5 mg/l) ([Table 1](#pone-0111306-t001){ref-type="table"}). Initially, univariate Cox regression analysis was performed to assess the impact on survival time of pre-operative CRP level, age at diagnosis, tumor size, tumor grade, ER, PR and HER2 status, proliferation index (Ki67), molecular subtype and presence of necrosis and inflammation in the tumor tissue ([Table 2](#pone-0111306-t002){ref-type="table"}). In univariate analysis, elevated pre-operative CRP levels were associated with shorter DFS (P = 0.002, HR  = 1.04, 95% CI  = 1.02--1.07) and OS (P = 0.036, HR  = 1.03, 95% CI  = 1.00--1.06), while a non-significant trend was observed for MFS (P = 0.111, HR  = 1.03 95% CI  = 0.99--1.07) ([Table 2](#pone-0111306-t002){ref-type="table"}). The relatively small hazard ratios are explained by the fact that CRP was statistically analyzed as a continuous variable with a relatively wide dynamic range (1--67 mg/l). To envision the prognostic impact of pre-operative CRP level, we performed Kaplan-Meier analysis to compare patients with a CRP level within the normal reference interval (≤5 mg/l) with the patient subset displaying elevated CRP (\>5 mg/l), however revealing a non-significant association at this cut-off ([Figure 1A--C](#pone-0111306-g001){ref-type="fig"}). ![Association of CRP with survival in node-negative breast cancer (n = 148).\ CRP dichotomized using values above upper limit normal (\>5 mg/l; n = 31) shows no significant association with disease-free survival (A), metastasis-free survival (B) and overall survival (C), respectively. The numbers below the diagrams represent patients at risk at the time point indicated on the x-axis.](pone.0111306.g001){#pone-0111306-g001} 10.1371/journal.pone.0111306.t002 ###### Univariate Cox regression analysis for disease-free survival (DFS), metastasis-free survival (MFS) and overall survival (OS). ![](pone.0111306.t002){#pone-0111306-t002-2} DFS MFS OS ----------------------- ------------ ------ ------------ ------- ------ ------------- ------- ------ ------------ ------- **CRP** mg/L 1.04 1.02--1.07 0.002 1.03 0.99--1.07 0.110 1.03 1.00--1.06 0.036 **Age at diagnosis** ≥50 years ref \<50 years 0.41 0.18--0.93 0.032 0.29 0.12--0.71 0.006 1.29 0.53--3.12 0.575 **Tumor size** ≤2cm ref \>2cm 2.23 1.00--4.98 0.050 1.76 0.72--4.31 0.216 2.03 1.03--3.99 0.041 **Tumor grade** I--II ref III 3.78 1.65--8.65 0.002 4.00 1.63--9.80 0.002 3.12 1.51--6.46 0.002 **ER status** Negative ref Positive 0.42 0.16--1.12 0.083 1.05 0.24--4.52 0.950 0.55 0.23--1.34 0.190 **PR status** Negative ref Positive 0.46 0.20--1.05 0.066 0.86 0.31--2.38 0.777 0.56 0.27--1.13 0.106 **HER2 status** Negative ref Positive 3.29 1.30--8.31 0.012 4.15 1.59--10.81 0.004 2.22 0.96--5.12 0.061 **Proliferation** Ki67≤20% ref Ki67\>20% 2.17 0.96--4.93 0.063 1.70 0.68--4.23 0.253 1.58 0.78--3.20 0.203 **Necrosis** Absent ref Present 1.40 0.60--3.27 0.440 1.86 0.76--4.56 0.173 1.21 0.59--2.50 0.604 **Inflammation** Absent ref Present 1.15 0.50--2.62 0.743 0.82 0.31--2.13 0.682 1.20 0.60--2.39 0.614 **Molecular subtype** Luminal A ref Luminal B 0.91 0.26--3.28 0.890 1.14 0.31--4.21 0.843 1.02 0.37--2.77 0.976 Basal-like 3.16 1.00--9.97 0.049 1.79 0.39--8.30 0.457 2.05 0.68--6.14 0.200 HER2-like 3.63 1.34--9.85 0.011 4.33 1.54--12.20 0.005 2.50 1.03--6.11 0.044 HR: Hazard Ratio; CI: 95% Confidence Interval; Luminal A: ER+ and/or PR+, HER2−, Ki67≤20%; Luminal B: ER+ and/or PR+, HER2−, Ki67\>20%; Basal-like: ER− and PR−, HER2−; HER2: ER+/−, PR+/−, HER2+. In multivariate Cox analysis, including factors that showed an impact on prognosis in the univariate analysis, an elevated pre-operative CRP level remained significantly associated with shorter DFS (P = 0.033, HR  = 1.03, 95% CI  = 1.00--1.07) and OS (P = 0.023, HR  = 1.03, 95% CI  = 1.00--1.06), independent of established prognostic factors, whereas CRP failed to show an independent association with MFS (P = 0.469, HR  = 1.01, 95% CI  = 0.98--1.05) ([Table 3](#pone-0111306-t003){ref-type="table"}). Similar results were obtained for DFS when the Cox analysis was adjusted to non-dichotomized/continuous variables ([Table S1](#pone.0111306.s002){ref-type="supplementary-material"} and [S2](#pone.0111306.s003){ref-type="supplementary-material"}). The internal stability of the models was tested by bootstrapping ([Figure S1](#pone.0111306.s001){ref-type="supplementary-material"}). Only the analysis of OS resulted in a 95% interval higher than one \[1.0; 1.07\] while the histograms for DFS and MFS showed relatively long tails on the left side ([Figure S1](#pone.0111306.s001){ref-type="supplementary-material"}). Moreover, pre-operative CRP levels did not correlate with age at diagnosis, tumor size, histological tumor grade, ER, PR status or HER2 status, proliferation index (Ki67), molecular subtypes, Ki-67, necrosis or inflammatory infiltrate ([Figure 2A--I](#pone-0111306-g002){ref-type="fig"}). ![Association of CRP with clinico-pathological factors in node-negative breast cancer (n = 148).\ Wilcoxon rank-sum test between pre-operative CRP level (mg/l) and age at diagnosis (A), tumor size (B), tumor grade (C), estrogen receptor status (D), progesterone receptor status (E), molecular subtypes (F), proliferation (G), inflammatory infiltrate (H) and necrosis (I) showing no significant associations.](pone.0111306.g002){#pone-0111306-g002} 10.1371/journal.pone.0111306.t003 ###### Multivariate Cox regression analysis for disease-free survival (DFS), metastasis-free survival (MFS) and overall survival (OS). ![](pone.0111306.t003){#pone-0111306-t003-3} DFS MFS OS ----------------------- ------------ ------ ------------ ------- ------ ------------- ------- ------ ------------- ------- **CRP** mg/L 1.03 1.00--1.07 0.033 1.01 0.98--1.05 0.469 1.03 1.00--1.06 0.023 **Age at diagnosis** ≥50 years ref \<50 years 0.41 0.17--1.02 0.055 0.29 0.11--0.75 0.011 1.56 0.61--4.00 0.352 **Tumor size** ≤2cm ref \>2cm 2.47 1.06--5.76 0.036 2.11 0.81--5.53 0.128 1.82 0.88--3.79 0.108 **Tumor grade** I--II ref III 3.07 0.98--9.57 0.054 2.89 0.83--10.09 0.097 4.67 1.62--13.46 0.004 **Molecular subtype** Luminal A ref Luminal B 0.58 0.13--2.64 0.483 0.83 0.16--4.15 0.815 0.42 0.12--1.43 0.164 Basal-like 2.13 0.52--8.70 0.290 1.24 0.21--7.36 0.813 0.80 0.20--3.11 0.742 HER2-like 2.12 0.59--7.55 0.247 2.86 0.73--11.26 0.133 1.22 0.41--3.63 0.725 HR: Hazard Ratio; CI: 95% Confidence Interval; Luminal A: ER+ and/or PR+, HER2−, Ki67≤20%; Luminal B: ER+ and/or PR+, HER2−, Ki67\>20%; Basal-like: ER− and PR−, HER2−; HER2: ER+/−, PR+/−, HER2+. We then wanted to elucidate potential relations between pre-operative CRP level measured in peripheral blood, as a marker of systemic inflammation, and ongoing processes in the local tumor tissue environment. Whole-genome gene expression array data can be considered to represent a snapshot of the tumor transcriptome and was available for 72 patients of the 148 patients included in the study. Including 22,283 probe sets in the analysis, a positive correlation between CRP and mRNA expression level and a p-value ≤0.05 was observed for 165 probe sets (150 genes after converting probe sets to gene symbols using the R package hgu133a and removing duplicates); however after adjustment for multiple testing no gene remained significant ([Table S3](#pone.0111306.s004){ref-type="supplementary-material"}). Neither were any significant correlation revealed to the expression of previously published metagenes that comprise mRNA-based information representative of tumor infiltration of B and T cells, respectively, tumor cell proliferation and estrogen receptor positivity [@pone.0111306-Schmidt1] ([Table 4](#pone-0111306-t004){ref-type="table"}). 10.1371/journal.pone.0111306.t004 ###### Spearman\'s rank correlation between pre-operative CRP level in peripheral blood and metagene expression in the tumor tissue. ![](pone.0111306.t004){#pone-0111306-t004-4} rho *p*-value ------------------ ------------------------ -------- ----------- **All patients** T-cell metagene 0.063 0.596 B-cell metagene −0.061 0.611 Proliferation metagene 0.026 0.828 ER metagene 0.009 0.938 **ER+/HER2−** T-cell metagene 0.140 0.270 B-cell metagene −0.012 0.925 Proliferation metagene 0.162 0.201 ER metagene −0.127 0.317 Discussion {#s4} ========== Prognostic factors for breast cancer patients at the time of diagnosis are today primarily based on clinicopathological characteristics, such as tumor size, axillary lymph node status, and histological differentiation grade, together with estrogen receptor (ER) and epidermal growth factor receptor 2 (HER2) status. Improved prognostication is necessary to decide whether adjuvant chemotherapy is required, in particular for patients with positive hormone receptor status and for node-negative patients [@pone.0111306-Schmidt4]. While commercially available gene expression-based prognostic assays, such as Mammaprint [@pone.0111306-vandeVijver1], Oncotype DX [@pone.0111306-Paik1] and EndoPredict [@pone.0111306-Filipits1] have proven effective, these are not yet established in clinical routine for every patient. Prognostic biomarkers based on easily implementable non-invasive procedures, which are used in clinical routine, would potentially be of benefit to larger patient groups. The exact mechanism by which elevated CRP is linked to poor prognosis remains elusive. Recent studies have suggested that elevated biomarkers of systemic inflammation may merely reflect the aggressiveness of the tumor and therefore represent a consequence of established prognostic factors, such as tumor size and grade [@pone.0111306-Allin2]. This finding is compatible with the observation that cancer patients repeatedly show higher CRP levels than healthy controls [@pone.0111306-Heikkil1], [@pone.0111306-Yigit1] and that patients with advanced breast cancer show elevated CRP levels as a sign of increased tumor burden [@pone.0111306-OHanlon1], [@pone.0111306-Robertson1]. Another hypothesis is that systemic inflammation may not solely be a consequence of tumor burden, but actively contribute to tumor progression. This view is supported by another study, describing the association between elevated CRP up to 31 months after tumor removal and shorter survival time [@pone.0111306-Pierce1]. In this study we demonstrate that marked elevation of pre-operatively measured CRP level in peripheral blood is associated with shorter disease-free and overall survival in a population of untreated node-negative breast cancer, independent of well-established clinicopathological criteria. Our study has several strengths: (i) it is the first analysis of a patient population not treated with systemic adjuvant therapy which allows for assessment of the pure prognostic effect without potential predictive interactions, (ii) this analysis is -- to the best of our knowledge -- the first to examine the correlation of CRP values with the expression of a multitude of genes in the corresponding carcinomas of the breast. In this context, our findings reinforce the observed lack of strong correlations between CRP level in peripheral blood and well-known prognostic markers of inflammation, immune response and proliferation in the local tumor tissue environment. This finding shows that blood CRP level is an independent marker of prognosis, but also raises important concerns that systemic inflammation primarily is indicative of co-occurring disease unrelated to the primary tumor in this patient population. Nonetheless, a number of essential limitations to this study must be considered: (i) the result is based on analysis of one relatively small single center study cohort, as no independent untreated node-negative validation cohort was available, (ii) CRP data was collected retrospectively and was measured only once for each patient, therefore being liable to fluctuations, e.g. due to acute infection, and (iii) lifestyle factors that may influence CRP levels, such as smoking habit, body mass index and comorbidities like diabetes or cardiovascular disease, were not taken into account, as this information was not available for the complete patient cohort. The observation that several patients among those with an marked elevation of pre-operative CRP level died because of reasons other than breast cancer may suggest that elevated CRP primarily represents the presence of concurrent disease in a small patient subset and is unrelated to primary tumor burden in node-negative breast cancer patients, further supported by the lack of correlation to tumor size and grade. In addition, no significant association was observed with metastasis-free survival, possibly suggesting that while systemic inflammation is linked to overall survival, as well as disease-free survival, it is not directly influencing tumor progression and metastasis. In conclusion, we show that systemic inflammation, assessed by pre-operative CRP level at the time of diagnosis, may influence overall and disease-free survival in untreated node-negative patients, independent of tumor size, tumor grade, and molecular subtype. Based on large-scale gene expression analysis in a subgroup of 72 (48.6%) patients, we highlight for the first time, that circulating CRP is not related to the expression of genes in the corresponding carcinomas of the breast. Nevertheless, the proposed prognostic relevance of pre-operative CRP must be interpreted with caution. Further large-scale prospective investigations will be necessary in order to validate the effect of systemic inflammation on breast cancer prognosis as well as the potential clinical implementation of pre-operative CRP level as a prognostic biomarker in node-negative breast cancer. Supporting Information {#s5} ====================== ###### **Test of the internal stability of the models shown in** [**Table 3**](#pone-0111306-t003){ref-type="table"} **using bootstrapping.** DFS: disease free survival; MFS: metastasis free Survival; OS: overall survival; HR: hazard ratio. (TIF) ###### Click here for additional data file. ###### **Multivariate Cox regression analysis for disease-free survival (DFS), metastasis-free survival (MFS) and overall survival (OS) based on continuous variables for CRP, age, tumor size and tumor grade.** (DOC) ###### Click here for additional data file. ###### **Univariate Cox regression analysis for disease-free survival (DFS), metastasis-free survival (MFS) and overall survival (OS) for the non-dichotomized data of Ki67.** (DOC) ###### Click here for additional data file. ###### **Spearman\'s rank correlation coefficient between pre-operative CRP level and mRNA expression level for all probe sets on the Affymetrix HG-U133A array was assessed with the false discovery rate (0.05) controlled according to Benjamini and Yekutieli.** (XLSX) ###### Click here for additional data file. This article contains parts of the thesis of Ms. Eva Wesbuer. [^1]: **Competing Interests:**The authors have declared that no competing interests exist. [^2]: Conceived and designed the experiments: IS MS KE EW MJB AL CS GH JL. Performed the experiments: IS MS KE EW MJB AL CS GH JL. Analyzed the data: IS MS KE EW MJB AL CS GH JL VW MG JR JGH. Contributed reagents/materials/analysis tools: JL MS KE IS MG VW JR. Wrote the paper: IS KE MS JGH. [^3]: ¶ These authors are shared senior authors on this work.
Effect of intravenous, perioperative-administrated lidocaine on serum levels of endocannabinoids and related N-acylethanolamines in children. Endocannabinoids and N-acylethanolamines (NAEs) are compounds that play a significant role in nociception. The promising therapeutic opportunities in postoperative pain management are connected with intra-venous (i.v.) lidocaine administration as a part of multimodal analgesia. Therefore, we analyzed the influence of intra-operative, i.v. lidocaine infusion in children on postoperative serum concentrations of endocannabinoids and NAEs. Forty-four children undergoing extensive spinal surgery were divided into two groups: the lidocaine group (LG; n=23), anaesthetized generally with lidocaine as a co-analgesic, and the non-lidocaine group (NLG; n=22), anaesthetized generally without lidocaine. We also recruited 23 healthy age- and gender-matched children to the control group. Blood samples were collected before surgery, immediately after surgery, at 6 h, and following morning after surgery, while in healthy children we collected blood samples only once. The serum concentrations of endocannabinoids (anandanamide [AEA] and 2-arachidonyl glycerol [2-AG]) and NAEs (palmitoylethanolamide [PEA] and oleoylethanolamide [OEA]) were quantified by ultra-high- performance liquid chromatography-mass spectrometry. The concentrations of measured compounds were comparable in controls and in patients before surgery (all P > 0.05). During the postoperative period, we found significantly higher AEA and lower 2-AG concentrations in the LG when compared to the NLG. The highest concentration of PEA was observed in LG patients 6 h after the operation and, at that time it was significantly elevated when compared to the NLG (P = 0.0003). Perioperative, i.v. lidocaine administration influences postoperative serum concentrations of endocannabinoids and NAEs in children.
#Generated by Maven Integration for Eclipse #Sat Apr 21 16:10:54 CST 2018 version=0.0.1-SNAPSHOT groupId=com.atguigu.springcloud m2e.projectName=microservicecloud-config-3344 m2e.projectLocation=D\:\\devSoft\\eclipse4.7\\workspace\\microservicecloud\\microservicecloud-config-3344 artifactId=microservicecloud-config-3344
(Photo : GETTY IMAGES) Duck eggs save the day! A customer buys salted duck eggs, a festive food on Duanwu Festival, or the Dragon Boat Festival today, at a shop in Jiangsu Province. A 90-year-old woman who got lost in the woods in Chongqing for four days was able to survive thanks to only six duck eggs. The elderly woman surnamed Zhang was reported by hi son, Ma Zewu, to the police after she didn't return home the next day. Zhang came from a fair in a nearby county in March 20, but did not return home for the next four days. Like Us on Facebook On the second night of her absence, Ma called the police which immediately mounted a search operation. However, the rain made it hard for them to continue the search. On March 23, a camera footage spotted Zhang walking near a factory. Police were able to trace her in a 2-kilometer remote stretch of road located between the factory and a bee farm. She was found later in the night behind a bush and was immediately rushed to the hospital. Although weak, Zhang's mind was clear and was able to narrate what happened. She said that she took a detour to avoid a vicious dog and got lost in the process. She spent four days and three nights in the forest, and credits the six duck eggs she had for her survival. Doctors said that for a 90-year-old woman to survive on only six duck eggs for four days and three nights was a miracle. TagsWeird News, weird news in China, bizarrew news, china news, county, eggs, survival, grandmother survives with duck eggs, surviving on duck eggs
Is Colin Powell a Compulsive Liar ? Claim: Colin Powell talked about the "Mobile biological weapons laboratories". Proffered in the absence of any real laboratories in the wake of the invasion, photos of these trailers were shown on all the US Mainstream Media, with the claim they while seeming to lack anything suggesting biological processing, these were part of a much larger assembly of multiple trailers that churned out biological weapons of mass destruction.http://www.whitehouse.gov/news/releases/2003/02/20030205-1.html#44http://www.whatreallyhappened.com/IMAGES/ballontrailer.jpgFACT: Later it was revealed that these trailers were nothing more than hydrogen gas generators used to inflate weather balloons. This fact was already known to both the US and UK, as a British company manufactured the units and sold them to Iraq. Claim: Powell claimed that Iraq had purchased special aluminum tubes whose only possible use was in uranium enrichment centrifuges. FACT: Both CIA and Powell's own State Department confirmed that the tubes were parts for missiles Saddam was legally allowed to have. Following the invasion, no centrifuges, aluminum or otherwise were found. Claim: Powell claimed to the United Nations that this photo showed "Decontamination Vehicles". FACT: When United Nations inspectors visited the site after the invasion, they located the vehicles and discovered they were just firefighting equipment Claim: Powell claimed the Iraqis had illegal rockets and launchers hidden in the palm trees of Western Iraq.FACT: None were ever found or used. Claim: Powell claimed that the Iraqis had 8,500 liters (2245 gallons) of Anthrax.FACT: None was ever found or used. Claim: Powell claimed that Iraq had four tons of VX nerve gas. FACT:The UN had already confirmed that it was destroyed. The only VX ever found were samples the US had left as "standards" for testing. When the UN suspected that the US samples had been used to contaminate Iraqi warheads, the US moved quickly to destroy the samples before comparison tests could be carried out. http://news.bbc.co.uk/1/hi/world/middle_east/404896.stm Claim: Powell claimed that Iraq was building long-range remote drones specifically designed to carry biological weapons.FACT: The only drones found were short-range reconnaissance drones Claim: Powell claimed that Iraq had an aggregate of between 100 and 500 tons of chemical and biological warfare agents. Powell gave no basis for that claim at all, FACT: a DIA report issued the same time directly contradicted the claim. No biological or chemical weapons were found in Iraq following the invasion. Claim: Powell claimed that "unnamed sources" confirmed that Saddam had authorized his field commanders to use biological weapons.FACT:No such weapons were ever used by the Iraqis to defend against the invasion and, of course, none were ever found in Iraq. Claim: Powell claimed that 122mm warheads found by the UN inspectors were chemical weapons. FACT: The warheads were empty, and showed no signs of ever having contained chemical weapons. Claim: Powell claimed that Iraq had a secret force of illegal long-range Scud missiles. FACT: None were ever found or used Claim: Colin Powell's UN debacle also included spy photos taken from high flying aircraft and spacecraft. On the photos were circles and arrows and labels pointing to various fuzzy white blobs and identifying them as laboratories and storage areas for Saddam's massive weapons of mass destruction program. http://www.whatreallyhappened.com/IMAGES/taji_sites_shrunk.jpgFACT:Nothing in the photos actually suggested what the blobby shapes were and inspections which followed the invasion, all of them turned out to be rather benign. Most of the misinformation disseminated by the Bush Administration came from an Iraqi expatriate named Ahmad Chalabi. They paid him over $30 million. He told the the administration what they wanted to hear. Cheney and Rumsfeld were chomping at the bit for a reason to invade Iraq so they conveniently never bothered to check out the validity of Mr. Chalabi's information. Mr. Chalabi sit directly behind Mrs Bush during the last state of the union address. Mr. Chalabi was later arrested in Iraq. Most of the misinformation disseminated by the Bush Administration came from an Iraqi expatriate named Ahmad Chalabi. They paid him over $30 million. He told the the administration what they wanted to hear. Cheney and Rumsfeld were chomping at the bit for a reason to invade Iraq so they conveniently never bothered to check out the validity of Mr. Chalabi's information. Mr. Chalabi sit directly behind Mrs Bush during the last state of the union address. Mr. Chalabi was later arrested in Iraq. Click to expand... I thought he was just being a good company man, but couldn't wait to resign. However, in a recent interview he was still defending the Bush adminstration. After that I completely lost respect for him, and he has lost credibility along with the rest of them. I think Powell will write another book as soon as Bush leaves office. The current administration can make life difficult for a former senior cabinet member who tells the truth. At least that is my hope. It is possible that Powell sold his soul to the devil like the rest of them. airs Sunday at 8 p.m. and 11 p.m. ET, pieces together the events leading up to the mistaken WMD intelligence that was presented to the public Click to expand... Yeah! right! mistaken!, the cia must be made of blind morons, and mentally retarded people to make all this amount of mistakes, ooooor they did't on purpose... "(Powell) came through the door ... and he had in his hands a sheaf of papers, and he said, 'This is what I've got to present at the United Nations according to the White House, and you need to look at it,'" Wilkerson says in the program. "It was anything but an intelligence document. It was, as some people characterized it later, sort of a Chinese menu from which you could pick and choose." Click to expand... Damn. im am in argentina (yes a corrupt 3rd world country) and even if somenone stole a car for example, and is bring to court, all the papers has to be perfect, any fault in legal process and the case is null, i can't belive the "Most powerfull and prosperous nation on the world" Can start a WAR against a country based on somenthing that looks like a "Chinnese Menu". In one dramatic accusation in his speech, Powell showed slides alleging that Saddam had bioweapons labs mounted on trucks that would be almost impossible to find Click to expand... Yes they where found, and they where were nothing more than hydrogen gas generators used to inflate weather balloons. This fact was already known to both the US and UK, as a British company manufactured the units and sold them to Iraq. So, i am asking now, russ, evo, sid_galt, pengwiuno, or some of those who constantly defend the goverment, what should be done about this? shouldn't colling powel, tenet, and all involved in this be prosecuted? or at least be fired from the office??? what do you think? Powell and Tenet are gone already, but Tenet was presented the Medal of Freedom before he left. I suppose freedom is what it really comes down to here; where else can a few guys get together, dig though a veritable "Chinese menu" of arguments to justify starting war, and acutally make their dreams come true? Classic Propaganda. I don't think so much as that he or the Bush administration was lied to as much as they know the exact facts and lie to the American public in hopes of raising patriotic fervor to support their wars and scare the public with terrorism. The Bush admin hired Jack...might be wrong, kinda forget his first name...Wilson to go to Niger to find out if Saddam had the capability of producing WMD as this was the channel. Wilson came back and reported that Saddam did not have the capability and the next day Bush went on national tv saying that they had new intelligence that he was getting material for WMD from Niger. Wilson was outraged and Rove then outed the identity of his wife, Valerie Plame as being a U.S. spy. This is known as treason and there currently is a lawsuit filed. Also, the Downing Street Memos that the London Guardian put on its front page a few months ago, that has been authenticated by the British Parliament states that Bush knew that Saddam was not a threat and that "the facts and intelligence were being fixed around the policy." The admin also blocked U.N. weapon inspectors from searching for supposed WMD. In Sept. 2000 the Project for a New American Century issued a document still on its website called "Rebuilding America's Defenses". This was written by Rumsfeld, Jeb Bush, Cheney, and Wolfowitz among others. It is a strategy to convince the American public that a war in the Middle East is necessary for political purposes and mainly oil. It states that the American public will not buy a war short of a "New Pearl Harbor type catastrophic event". It then says that they could use this event to get the public behind the war...it lists 62 (i believe) countries to attack. It then says that they can "stage simultaneous theatre wars". Ironically 3 months prior to 9-11, Bush signed WF-199I. This document took all FBI officials off Al Qaeda's trail and killed all investigations. Any agent who was to investigate Al Qaeda would be federally imprisoned. Currently David Shippers, the main lawyer in the Bill Clinton impeachment has filed a RICO lawsuit against the Bush administration with the FBI agents who were taken off Al Qaeda's trail. Also, following 9-11, Bush said that his chief duty was finding Bin Laden and bringing him to justice. Months later he stated that he didn't care where UBL was and that it was not an issue. On Sept.11 and the days following all air travel was suspended except for one flight. This was a CIA flight to Saudi Arabia taking Bin Laden family members out of the U.S. as with Bin Laden's brother who was at a Carlyle Group board meeting in Atlanta with Bush Sr. as the attacks occurred. The Taliban eradicated all the Opium production in Afghanistan and with the U.S. occupation there, Afghanistan is now the world leader in opium production. Also, if you look at a map of newly built U.S. bases in Afghanistan, you will see how these bases lie right on the oil pipeline Cheney wants to build through the region. Also, and I want to say Todd Day or something but I'm sure that name is wrong...anyway a weapons inspector went to Iraq to find WMD. He came back and reported Saddam wasn't capable and Bush right away said they had evidence from his inspection that Saddam had the technology....The very next day Day....if need be I'll go find the exact name and reports...quit from his position out of disgust. The Pentagon and CIA has reported that the invasion of Iraq has now given rise to more terrorists than if Iraq was never waged war upon. While waging a war on terrorism, obviously you need to find Al Qaeda members so on national tv Bush and company announced that they had found terrorist cells in many major U.S. cities. The suspects arrested have all been released due to lack of any credible evidence....The most credible piece of evidence in all the cases was a videotape made of a vacation to Disneyland in Anaheim that had a second still on a trash can. It looks like the Indiana Jones ride to me. It's also been reported that the U.S. pays the Afghan rebels over there for every Al Qaeda member they find. They have admitted that they just kidnap any person that fits the stereotype of a terrorist and hands them over to the U.S. for the profit. They are then sent to Guantanamo or other countries without charges or trial and interrogated. To date, not one person has been charged of having Al Qaeda connections. If anyone wants, I can dig up all the documents and media reports on each or any issue for verification. just ask and I'll go dig them up and post a link. Faust...are you saying that what i have said is false? No doubt the CIA and FBI lie about their intelligence as well...My examples are from specific agents hired by the Bush administration for the sole purpose of going to these regions and coming back with information about WMD's. Then these reports were cited by Bush in his speeches saying it was evidence that he did, when the reports are clearly decissive that he didn't. ENSOR: The day before Powell's speech, a CIA skeptic had warned about the defector's reputation as a liar. In an email reply, his superior acknowledges the problem but adds, "This war is going to happen regardless. The powers that be probably aren't interested in whether Curveball knows what he's talking about. Powell was not told about the email. POWELL: Leaving Saddam Hussein in possession of weapons of mass destruction for a few more months or years is not an option. Not in the post September 11th world. ENSOR: The speech would turn out to be riddled with misleading allegations but at the time the press plays it as an overwhelming success. WILKERSON: He had walked into my office musing and he said words to the effect of, I wonder how we'll all feel if we put half a million troops in Iraq and march from one end of the country to the other and find nothing. ENSOR: I will forever be known as the one who made the case, Colin Powell now says. I have to live with that. WILKERSON: I look back on it and I still say it's the lowest point in my life. I wish I had not been involved in it.
Q: Defining the rule to avoid Arithmetic Error is/2 in Prolog I'm trying to implement a binary tree in Prolog and I'm getting the following error: ERROR: is/2: Arithmetic: `z/0' is not a function I understand that this error occurs because the RHS of is/2 has not been instantiated properly. But I'm finding it difficult to figure out how to instantiate my variable z in the second tree_eval/3 . tree_eval(_,tree(empty,Num,empty),Num). tree_eval(Value,tree(empty,z,empty),Value):- z = Value. tree_eval(Value,tree(L,Op,R),Eval):- tree_eval(Value,L,LEval), tree_eval(Value,R,REval), eval(LEval,REval,Op,Eval). eval(LEval,REval,Op,Result):- Op = '+', Result is LEval + REval. eval(LEval,REval,Op,Result):- Op = '-', Result is LEval - REval. eval(LEval,REval,Op,Result):- Op ='/', Result is LEval/REval. How do I assign Value to z here? Thanks in advance. A: By z=Value you are actually unifying the variable Value with the atom z. If you mean z to be a variable you have to write it as a capital letter Z as @vmg pointed out: tree_eval(Value,tree(empty,Z,empty),Value):- Z = Value. In that case it is interesting to consider what happens when querying the predicate: ?- tree_eval(V,tree(empty,3,empty),E). E = 3 ? ; E = V = 3 ? ; no The first solution is produced by your first rule in which you have an anonymous variable for the first argument. The second solution is produced by your second rule in which you demand the first and third arguments to be the same. So essentially you have two derivation paths for the value that is 3 in both cases. Now let's look at a slightly bigger tree: ?- tree_eval(V,tree(tree(empty,2,empty),+,tree(empty,3,empty)),E). E = 5 ? ; E = 5, V = 3 ? ; E = 5, V = 2 ? ; no The first answer is hardly suprising as the tree evaluates to 5 indeed but what about the next two solutions? Let's take a look how prolog comes to these solutions: The term tree(tree(empty,2,empty),+,tree(empty,3,empty)) matches only with the third rule because the subtrees are not empty. So tree_eval/3 is called with the subtree tree(empty,2,empty) and yields as first solution: (_,tree(empty,2,empty),2) Then tree_eval/3 is called for the subtree tree(empty,3,empty) with the first solution: (_,tree(empty,3,empty),3) Now eval(2,3,+,Eval) yields Eval=5. The first argument however is still Value=_. So the first solution for the query is: E=5. If you ask for other answers prolog will try if there are further solutions for the 3rd goal, determine there are none, hence backtracking to the 2nd goal: the right subtree, and indeed your second rule delivers: (3,tree(empty,3,empty),3). eval(2,3,+,Eval) again contributes Eval=5, hence the second solution to the query: E=5, V=3. If you still ask for more solutions prolog has to backtrack further to the 1st goal: and your 2nd rule delivers again: (2,tree(empty,2,empty),2). Now your second goal again matches the 1st rule: (_,tree(empty,3,empty),3), eval/4 delivers again Eval=5, so the 3rd solution to the query is: E=5, V=2 Backtracking one more time to goal 2 prolog is trying the 2nd rule again and fails because the first argument can't be 2 and 3 at the same time. So there is no 4th solution to the query. However, if tree_eval/3 would be queried with the same tree structure but both leaves being 2 it is, by the above reasoning, not really suprising that there are 4 solutions: ?- tree_eval(V,tree(tree(empty,2,empty),+,tree(empty,2,empty)),E). E = 4 ? ; E = 4, V = 2 ? ; E = 4, V = 2 ? ; E = 4, V = 2 ? ; no Looking at those multiple solutions it is apparent that your third argument is delivering the correct solution, and that you don't really need the first argument. You can also do without the second rule. Incorporating some improvements suggested by @mat, your predicate might then look something like that: tree_evaluation(tree(empty,Num,empty),Num). tree_evaluation(tree(L,Op,R),Val) :- tree_evaluation(L,LVal), tree_evaluation(R,RVal), evaluation(LVal,RVal,Op,Val). evaluation(L,R,+,V) :- V is L + R. evaluation(L,R,-,V) :- V is L - R. evaluation(L,R,/,V) :- V is L / R. This version yields unique answers: ?- tree_evaluation(tree(empty,3,empty),E). E = 3 ? ; no ?- tree_evaluation(tree(tree(empty,2,empty),+,tree(empty,3,empty)),E). E = 5 ? ; no
<Project Sdk="Microsoft.NET.Sdk.Web"> <PropertyGroup> <TargetFramework>netcoreapp3.1</TargetFramework> <AspNetCoreHostingModel>InProcess</AspNetCoreHostingModel> <ApplicationIcon /> <OutputType>Library</OutputType> <StartupObject /> </PropertyGroup> <PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Debug|AnyCPU'"> <DocumentationFile>Xms.Form.Api.xml</DocumentationFile> </PropertyGroup> <ItemGroup> <PackageReference Include="Microsoft.AspNetCore.Razor.Design" Version="2.2.0" PrivateAssets="All" /> </ItemGroup> <ItemGroup> <ProjectReference Include="..\..\Libraries\Form\Xms.Form\Xms.Form.csproj" /> <ProjectReference Include="..\..\Libraries\Schema\Xms.Schema\Xms.Schema.csproj" /> <ProjectReference Include="..\Xms.Api.Core\Xms.Api.Core.csproj" /> </ItemGroup> <ItemGroup> <Content Update="appsettings.json"> <CopyToOutputDirectory>Always</CopyToOutputDirectory> </Content> </ItemGroup> <ItemGroup> <None Update="Xms.Form.Api.xml"> <CopyToOutputDirectory>Always</CopyToOutputDirectory> </None> </ItemGroup> </Project>
XBLA Review: Fable Heroes From Hero to Zero? The Fable series has had its ups and downs. The main games have been good, but never really delivered on their promises by Peter Molyneux and Lionhead. Fable Heroes is a spin-off hack-n-slash adventure that tries to bring a family experience to the table by collecting coins, fighting enemies and playing mini-games. But does it deserve to use the Fable name? Fable Heroes is ultimately a letdown. It doesn’t really know what it wants to be, you’ll play with 3 other players either AI or online friends going round locations inspired by Fable like Millfields, Bowerstone and so on. Unfortunately the combat is mindless button-bashing and becomes repetitive quickly, you’ll open bonus chests which will grant the player temporary powers like being really tall or slowing time down. As you progress through the level, you’ll come to a crossroads which will lead to either a boss fight or a mini-game for more coins. The mini-games are pretty awful, while the boss battles are probably the most memorable moments of the main game, which doesn’t last too long. After completing a level, you’ll have to play a pointless board game to level up your abilities and it’s incredibly boring, but it also takes forever to do. I don’t know why they added it in; this is no Mario Party by any stretch of the imagination. The characters look like Lionhead’s take on Sackboy from LittleBigPlanet, which doesn’t really fit the Fable universe that well. In truth, Fable Heroes just loses all its identity and while there are some good ideas floating around under the surface, it’s never capitalised on. In terms of visuals, Fable Heroes looks a little bland and rough around the edges, it does have a little charm to it…but it doesn’t feel right. The music is decent, but the sound effects do become annoying after a while. The Verdict Fable Heroes is a major disappointment. Its ideas are good, but the combat is repetitive and unfulfilling, the AI isn’t the smartest, the board game is pointless and the mini-games are terrible. I don’t know how Lionhead got it so wrong, but maybe this is why Molyneux left….
1. Field of the Invention Embodiments relate to a digital image signal processing apparatus and method capable of generating a data patch for noise reduction filtering, performing a high-speed operation, and thus generating an output image having the same size as an input image while maintaining the same quality as the input image. 2. Description of the Related Art With respect to digital image signal processing apparatuses, megapixel-related competition is in saturation and thus competition between manufacturers has expanded to high sensitivity photographing. In this regard, there is a problem since noise due to heat generated by a charge coupled device (CCD) or a complementary metal-oxide semiconductor (CMOS), or low frequency noise due to interference in an electric circuit is intensified due to signal amplification when the high sensitivity photographing is performed. Thus, efficient reduction of noise generated in an output image becomes an important issue. According to conventional technology, a low pass filter (LPF) is often used to simply perform noise reduction (NR). Via an LPF, since a noise component is generated as a high frequency component in a plane portion of an image, noise is reduced by cutting off the high frequency component. However, by using an LPF, an edge component of an image may also be reduced such that sharpness of the image deteriorates, and in this regard, there is a demand for technology capable of only reducing noise while maintaining edge components. In this regard, technology for performing NR by sampling an image and then processing the image via software is introduced. However, such a NR technology based on software processing has a disadvantage in that high-speed processing is impossible. That is, all calculations are performed in a central processing unit (CPU) and thus, processing speed is dependent upon the CPU. However, the CPU has to perform not only image processing but also performs other operations simultaneously, and thus, the processing speed is limited. In addition, image data before being processed via software is stored in a storage device including a memory, secure digital (SD)/compact flash (CF)/smart media (SM) cards or the like, and speed for retrieving the image data stored in the storage device for a process via the software is considerably limited.
<menu xmlns:android="http://schemas.android.com/apk/res/android" xmlns:app="http://schemas.android.com/apk/res-auto" xmlns:tools="http://schemas.android.com/tools" tools:context=".MainActivity"> <item android:id="@+id/action_enable_rotation" android:checkable="true" android:checked="true" android:title="@string/action_enable_rotation" app:showAsAction="never"/> <item android:id="@+id/action_show_cps" android:checkable="true" android:checked="false" android:title="@string/action_show_control_points" app:showAsAction="never"/> <item android:id="@+id/action_slow_animation" android:checkable="true" android:checked="false" android:title="@string/action_slow_animation" app:showAsAction="never"/> </menu>
--- layout: "api" page_title: "/sys/key-status - HTTP API" sidebar_current: "docs-http-system-key-status" description: |- The `/sys/key-status` endpoint is used to query info about the current encryption key of Vault. --- # `/sys/key-status` The `/sys/key-status` endpoint is used to query info about the current encryption key of Vault. ## Get Encryption Key Status This endpoint returns information about the current encryption key used by Vault. | Method | Path | Produces | | :------- | :--------------------------- | :--------------------- | | `GET` | `/sys/key-status` | `200 application/json` | ### Sample Request ### Sample Response ```json { "term": 3, "install_time": "2015-05-29T14:50:46.223692553-07:00" } ``` The `term` parameter is the sequential key number, and `install_time` is the time that encryption key was installed.
, 0 = 2*o - 9*k + 12*k - 90 - 3 for o. 48 Solve 2*h - 33 = -11*k, 0 = 2*h + 23*k - 20*k - 9 for h. 0 Solve 8 = -4*m + 4*y, 0*m + 3*y = -m + 101 - 107 for m. -3 Solve 0 = -29*g + 5*k - 36, 311 = 2*g - g + 5*k + 395 for g. -4 Solve 306*l - n = 308*l + 1, -4*n = 4*l - 8 for l. -3 Solve -98*l - 4*y + 282 = 0, 5*y - 5*y + 2*y = -y - 9 for l. 3 Solve 4*y + 3*t + 1325 = 1073, 5*y - 4*y - 49*t - 3917 = 0 for y. -3 Solve 46 + 30 = -6*o + 4*q, 78148 - 78199 = 4*o - 3*q for o. -12 Solve -327 = -2*h + 2*d - 335, 4*h = 5*d - 3 - 9 for h. -8 Solve 0*r + 2*r = -6*y - 46, 0 = y - 5*r - 40 - 11 for y. -4 Solve 2*i = 2*s + 66, 429 = 1205*i - 1192*i for s. 0 Solve 8*w - 2*w + 172*d = 168*d - 52, w - 6*w - 60 = -5*d for w. -10 Solve 15*f - 4*f + 88 = 3*f + 12*k, -f - 2*f - 4*k = -1 for f. -5 Solve -5*a - 1247*i = -1251*i + 58, -2*i + 18 = 3*a for a. -2 Solve -6*d - 4*f + 30 = 0, -5*d - f + 6 + 20 - 12 = -4 for d. 3 Solve 12*j - 24*j + 9*j - 11 = -u, 5*j = 5*u - 5 for u. -4 Solve -167*p - 7682 = 0, -2*r + 4*p + 86 + 112 + 16 = 2*r + 22 for r. 2 Solve -31492*p + 3*d + 40 = -31490*p, 4*p - 100 = -4*d for p. 23 Solve -249*w + 248*w = -3*s - 40, -15 = -2*w + s for w. 1 Solve 5*x = -5*m - 55, -46*x = 5*m - 2378 + 2679 for m. -5 Solve 7*o + 59 = 10*o - 3*p - 10, -4*p - 112 = 6*o for o. -2 Solve 3*u - 1159*n - 1158*n + 78 = -2321*n, n = 2*u + 41 for u. -22 Solve -3*c - 2*g + 22 = 0, -7*c + 259 = -2*g + 181 for c. 10 Solve -5*k + d + 210 = -4*d, -6156*d + 587 = 16*k - 6155*d for k. 37 Solve 0 = u + 5*p - 38, -7*u - 24 - 31 = -4*u - 13*p + 55 for u. -2 Solve 3*g = -2*g - 3*r - 27 + 42, -6*r = -30 for g. 0 Solve -4*y - 55 = 5*h, 843642*y - 33 = 3*h + 843645*y for h. -11 Solve 2*g = -p + 5*p - 116, -207 = 11*g - 105*p + 110*p + 350 for g. -52 Solve -9*v + b - 312 = -4*b - 217, -5*b + 45 = -4*v for v. -10 Solve 140 = 3*b - 13*w, 176*b = 364*b - 185*b + 2*w + 25 for b. -1 Solve 0 = -y + 3*g - 104, -8*y + 4*y = -g - 14 + 67 for y. -5 Solve 8*w + 23 = 12*p - 12*p - 2*p - 13, -5 = w for p. 2 Solve -h - 67 = 10*n, 5*h + n - 161 = -153 for h. 3 Solve 4*p = 11*d - 221, 15*p - 232 = 18*p + 51*d - 46*d for p. -69 Solve 38*w + 66 = -4*g, 4*w - 4944 = -4948 for g. -7 Solve -2*b - 5*j = 18429 - 18532, 3*b - 4*j + 87 = 0 for b. -1 Solve -509*r + 21 = -505*r - 3*z, -5*r = -z - 40 for r. 9 Solve -3*s + 89 + 151 = -13*f, s + 4*f - 2*f = -34 for s. 2 Solve -p + 35 = -o, -35*p - 1153*o + 47 = -1150*o for p. 4 Solve 36*u = 36*u - 4*p - 68, 5*u + 16 = -p - 2*p - 10 for u. 5 Solve -7*d = 0, 10*q - 31 = 8*q + 3*d - 117 for q. -43 Solve o = -2*o - 21, -2*h - 11*o = 68*o + 547 for h. 3 Solve 200*t + 5*c = 4980, -758*c + 54 = 2*t - 759*c for t. 25 Solve -g = 3*o + 9, 3823*g = 4*o + 3828*g - 10 for o. -5 Solve -4*t + 15*r - 5 - 1 = 11*r + 5*r, -3*t - 32*r + 58 = 0 for t. -2 Solve -3*j + 2*j + 5*m - 22 - 6 = 0, -229 - 137 = 27*j - 5*m for j. -13 Solve -11101*p + 5*s + 47 = -11097*p, -7*s = -2*p + 37 for p. 8 Solve -c + 4*c + 0*t = -5*c + 7*c + 2*t, 2*c + 2*t - 4 = 4*t for c. 4 Solve 0 = 17*r + 3*c - 3859 + 3963, -r - 4*c - 52 = 0 for r. -4 Solve -77 = y - 858*u + 862*u, 5*y + 79 = -3*u for y. -5 Solve -103 - 86 = 2*m + 5*y - 58, -3*y - 81 = 0 for m. 2 Solve -5*r - 3*q = 0, -20*r + q - 896 = 908 - 1804 for r. 0 Solve q - h - 20 = 0, 2*h - h + 32 = 18 - 7 for q. -1 Solve 2*i + 3*h - 9 - 33 = 0, -3*h + 9917 = -3*i + 9965 for i. 18 Solve -3*t + 3*q + 30 = 0, -t - 5*t + 1167*q - 57 = 1170*q for t. -3 Solve -61*j + 58*j - 15*u - 249 = 0, -u = -2*j + 10 for j. -3 Solve 11*l - 14*l + 4*s = -11, 54*l = 52*l + 2*s + 8 for l. 5 Solve -5*q - 2*j + j - 107 + 122 = 0, q - 12 = 5*q - 4*j for q. 2 Solve 5*o = -444*n - 1327, 0 = -7902*n + 7901*n + 3*o - 6 for n. -3 Solve -538*t - 87 = -535*t + 5*f, 5*t = -4*f - 68 - 90 for t. -34 Solve 22*r = 3*n + 19*r, 2*n - 6*n - 27*r = -23*r + 56 for n. -7 Solve -7*i - 2*l = -19*i + 7 + 15, -i + l = 3*l - 4 for i. 2 Solve 3*h = -8081 + 8096, 4*h = -2*w + 32 for w. 6 Solve 10*w - 1 = k, w - 27 = -2*k - 29 for w. 0 Solve 3*w + 12 = -3*b, -18*w + 5*b - 839 = -813 for w. -2 Solve -5*n = -5*q + 40, -79*q - 53 = -83*q - 102*n + 99*n for q. 11 Solve -o = 254*r - 259*r - 50, 47*r + 287 = 46*o for o. -5 Solve 5*n + 98*t - 114*t - 215 = 0, 6*n + 3*t - t = 364 for n. 59 Solve 0*s - 3*s - 2*s + 5 = -q + 10, -21*s - 8*q - 82 = 0 for s. -2 Solve 5*r = -78 - 7, q + 2*q - 5*r - 108 = -38 for q. -5 Solve -44 = z + 43*q - 64*q + 45, z + 3*q = 7 for z. -5 Solve 8 - 17 = 3*l - x, 4914*l + 42*x = 4909*l + 247 for l. -1 Solve -5*g + 120 = 15*h, g - 2238*h + 16 = -2236*h for g. 0 Solve -3341*m + 1667*m + 4*k + 315 = -1669*m, -k - 64 = -m for m. 59 Solve 0*o - 2 = -13*o - y, -8*y - 11 = 4*o - 27 for o. 0 Solve 3*p - 47 = 4*f, 0 = 13*f + 10*p + 20 - 45 for f. -5 Solve 7*z - 2*z - 786 + 794 = 4*y, 3*y + 4*z + z = -29 for y. -3 Solve 5*p + 502*a - 504*a + 11 = 0, -3*p = -3*a + 21 for p. 1 Solve 3*x + 6 = v, -3*v - 2161 + 2221 = 5*x for v. 15 Solve 698589 = 5*y - 3*f + 698565, 2*f = 4*y - 20 for y. 6 Solve -3*c + 3*c - 34 = -q + 5*c - 0*c, -2*q + c + 32 = 0 for q. 14 Solve -5*q = -h + 652 - 657, 0 = 3*q - 6*h - 30 for q. 0 Solve -248 = -31*z, -31*o - 29*o + 63*o - 3*z = -18 for o. 2 Solve 3*r - 5*u + 126 = 7*r - 7*u, 10*r + 15 = -4*u + 3*u for r. 4 Solve 0 = 3*t - 3*q - 36, 0 = 2*t + 13*q - 7 + 238 for t. -5 Solve 0 = 6*x - 4*h, 4 - 12 - 2 = -178*x + 170*x + 2*h for x. 2 Solve 5673*x = 5672*x - 3*w - 23, 3*x - 1293*w = -1291*w - 14 for x. -8 Solve -3*d + 8 = -4*k, 29*d - 213 = -3*k + 31 for d. 8 Solve 4*b - 5*l - 15*l - 128 = 0, -4*b - 3*l + l = -18 for b. 7 Solve -3 = 3*u - 3*c, -5704*u = -5704*u + 2*c + 4 for u. -3 Solve a + 4*b + 28 = 0, 140*a - 136*a + 3*b = 7 - 28 for a. 0 Solve 67 = -4*d + 3*v, -244 + 118 = 15*v - 108 - 93 for d. -13 Solve 5*c + 130 - 128 = 3*s, 0 = 2*s + 2*c - 14 + 2 for s. 4 Solve -4*y + 2*j = -3*y - 25, 0 = -2*y - 5*j - 15 + 29 - 0 for y. 17 Solve 1307*i - 1305*i = 4*p + 84, 0 = 6*i + 13*p - 252 for i. 42 Solve 4*d - 23*w - 457 = 0, -300*d + 305*d = 5*w + 500 for d. 97 Solve 4*c + 96*i = 376, -148*c + 13 = -74*c - 73*c - 3*i for c. 22 Solve 2*r + 39 = 9*d - 4*d, -28*d - 227*r = -222*r - 186 for d. 7 Solve 7*j = -6*h + 4*j - 58 + 73, -3*h + 21*j + 75 = 0 for h. 4 Solve 4*w - 3*t - 264 + 281 = 0, -23 = 4*w + 3*t for w. -5 Solve 63 = -3*f + 374*t - 378*t, -13*f + 4*t = 17 for f. -5 Solve -3*t = 5*z - 150, -4*z + 2*t - 17989 + 17956 = t for z. 3 Solve 6*a + 918454 - 918414 = -2*r, -34 = -4*r + 4*a + 14 for r. 4 Solve -85*x + 36*x + 40*x + 1 = -2*n, -11*x - n + 3 = -12*x for x. 1 Solve 50*n - 49*n - 4*i + 26 = 0, 8 = 5*n + 3*i for n. -2 Solve -66 = 3*i - 5*i - 112*o + 110*o, 13 = -3*i + o for i. 5 Solve -26*f + 30 = 4*p - 27*f, -9*p + 23*f - 6 = -32 for p. 8 Solve 4*v - 4*k = 40, 148612*v + 42 = 148617*v - 4*k for v. 2 Solve -l + 17 = -3*z, 11*l - 11528 + 11545 = -z for l. -1 Solve 2*t + 3*g + 21102 = 21090, -g - 4 = -3*t for t. 0 Solve -3*u - 43 = 5*z, -1548*z - 16*u + 1 = -1547*z + 10 + 15 for z. -8 Solve -3*t + 6 = -3*c, 2116*c + 1 = 4221*c - 2108*c + 2*t for c. 3 Solve 3*n - 3549 = -33*g - 3513, g + 210 = -5*n for g. 5 Solve 4*q - 3*q - 2178*c + 2177*c - 11 = 2*q, 3*c + 18 = -2*q for q. -15 Solve -n + 46*p = 1017, -608*n - 91 = -603*n - 3*p for n. -5 Solve -2*d + 6*u - 17 = 11, -5*d - 22*u = -115 for d. 1 Solve 225*u = 228*u - 33, 0*z + u - 13 = -2*z for z. 1 Solve 0 = -2*a + 39*z - 229 - 77, 2*z + 4 + 11 = 2*a + 25 for a. 3 Solve 2*a + 79 = 10*c + 23 - 414, 0 = a + a - 39*c + 1804 for a. -5 Solve -92*p = -31*p - 38*p - 28*p - 7*i - 45, -2*i = 0 for p. -9 Solve -40*q + 117*q - 105 = 35*q + 39*q - 2*j, -21*q - 4*j + 255 = 0 for q. 3 Solve -s + 94 = 2*v + 100, 4*v + 22 = 2 for s. 4 Solve 0 = 2*d + 5*a + 62, -63*d - a + 7 = -139*d + 73*d + 33 for d. 4 Solve 5*m + 15*a + 7 + 53 = 0, 3*m + 6*m + 52 = a for m. -6 Solve 5*z - 108 = 23435*h - 23432*h, 5*h - 2*z + 47 = 0 for h. -1 Solve -4*x + 13 = 49*a, -31 = 1652*x - 1650*x - 13*a for x. -9 Solve 57 = -166794*c + 166797*c + 3*s, 2*s = -3*c + 54 for c. 16 Solve 25152 = 53*a + 25205, -5*y = 4*a + 204 for y. -40 Solve 161*t - 164*t - 4*c - 33 = 0, 867 = 3*t - 71*c for t. 5 Solve 6468 - 2154 = 5*d + f + 2155 + 2150, -5*d + f - 9 = 0 for d. 0 Solve -3*m + 7*r + 30 = -m, 4*m - 139 = 141*r - 146*r - 155 for m. 1 Solve x = -53*p - 40, 44*x = 42
ManifestFileVersion: 0 CRC: 438572447 AssetBundleManifest: AssetBundleInfos: Info_0: Name: paytype.ab Dependencies: {}
[Differential diagnosis of focal kidney diseases using nuclear magnetic resonance tomography]. The value of T1 and T2-weighted spin echo sequences for making a specific diagnosis of focal renal disease was evaluated in 105 MR examinations. Typically, hypernephromas are characterised by a reduced or only slightly increased T1 or T2 signal, whereas previous bleeding and long-standing abscesses result in increased signal strength, particularly with T2-weighted sequences. In this way, hypernephromas can be characterised; this is not always possible with CT. Angiomyolipomas also have characteristic signals. MR has no advantages in the diagnosis of recent bleeding, acute focal inflammatory lesions, metastases, carcinoma of the renal pelvis or atypical cysts.
Quotes & Testimonials Hi Jamie & John, I have some exciting feedback to share with you. So I went for my monthly sports massage today. You should know that I have been going to the same lady once per month for the past 5 years. I love going to her because she knows my body and my training so well and has really helped me through several race seasons injury free. Anyhow, I went to see her today and she made the comment that I have built a lot of muscle mass in my upper body! I was so excited to hear that from someone who knows my muscles so well! I see my body everyday, so sometimes I don’t notice changes or differences as quickly as others do. This was the highlight of my day. So, thank you again for all the challenging and fun workouts and for always pushing me to be tougher and stronger. You guys are awesome! Mel About two months ago I started doing weighted, full-range squats. This was counter to any advice I’d received from any orthopedic surgeon or physical therapist in the last four years. In 2006 I had my left ACL replaced and, as is always the case, some of my menisci cut out or repaired. In 2007 I had my right ACL replaced and my menisci worked on. Between the first surgery and the second, I ran a total of about 30 miles. Prior to the surgeries, my annual mileage topped 500 on a slow year. In the three years following the second surgery, I ran a total of about 10 miles. My main reason for dropping running from my workout routine was that it caused pain in my knee joint; usually originating directly behind my patella, or giving me the sensation that I’d just re-injured one of my compromised menisci. I started playing racquetball even before the surgeries, playing up to four hours a night on five days of the week in 2002 and 2003. I’d let this go to the wayside from 2004-2007 mainly due to constraints on my schedule due to a combination of increased workload and babies being born. After the surgery, I reintroduced myself to the court figuring that there would at LEAST be less shock than I would have to endure to truly run. Between 2008 and 2010 I played a lot of racquetball (and maintained my sporadic approach to my physical therapy exercises) and was forced to take a month off every three or four months due to another injury, usually to one of my knees. Last fall Jamie and I were discussing the motion that one should go through when conducting a squat. She was of the mindset that a full-range squat is the only way to go. “She’s crazy!” I could hear my orthopedic surgeon, various physical therapists, multiple nurses and medical aides, and fellow knee-injury-sufferers sing in my head (usually complete with image straight out of the Bohemian Rhapsody video). “This is the EXACT opposite of what I’ve told you to do,” said my physical therapist. “NEVER break the 90 degree plane! You’ll re-injure yourself and it’ll be your own fault! More surgeries will come! More time softening up your midsection while you sit on the couch and recover from a major invasion to your body! Your immune system will be grossly compromised YET AGAIN! Do you really want to deal with that?!?” So our conversation continued. Jamie was pretty convinced of the benefits, and I was pretty convinced that I’d die and go to hell if I did full-range squats. So we ended in a stalemate of sorts, with her promising to send me some of the research on the subject. About a week later she did, and I read through it. Being the man I am I read through the papers, which focused on explaining both the physics of the movement and the physiology behind the squat. It definitely made sense, but I still had the Nay-Say Choir ringing loud and clear in my head. BUT! With an explanation which married up both the physiology and the physics of the movement, AND made sense to me, I had to at least give it a shot. So I promised Jamie I’d do so. I put it off for about a month (What can I say? I love a good choir!) until one day I decided to do one of her workouts. In this particular workout, Jamie had inserted squats. Now I had a quandry. Do I do them like she wants, or listen to conventional wisdom? I ended up giving them a shot. Truth be told, my knees didn’t love me that day. They definitely let me know I was stepping outside my comfort zone (Four years on the couch? My comfort zone was supine!) but they never gave me that telling sort of pain that an athlete experiences just before a serious work-out related injury. So I kept doing the full-range squats through the workout, and kept getting the same sort of physiological feedback. I walked home on shaky knees that day, I’ll tell you. The next day, however, was a totally different story. My knees and legs felt GREAT! I was in shock! Surely this must be my body responding to the latest and greatest glucosamine-chondroiton cocktail I’d been throwing down! But maybe… I decided to keep it up. Since then I’ve incorporated full-range squats into my workout routine and employ them at LEAST twice a week. If I go below that, my knees start to revert back to their just-post-surgery weakened state, and I begin to again fear injury. I can cut around the racquetball court faster, I now play basketball (occasionally, admittedly), I’ve started to run again. I have to say on this one… Jamie was right. Just hiked 5 miles in rocky mtn natl forest and never got winded. Thank you jamie and john! – Kari Since joining CrossFit North Arlington I have dropped weight and inches and seen my energy and overall mood improve due to the training and nutritional guidance I have received. The training staff is knowledgeable, motivational and creative. I have not only seen results in myself, but in others that train with me as well. What the coaches have been able to accomplish with some barbells and medicine balls is amazing. Thank you XFNA! “Don’t tell me the sky is the limit when there are footprints on the moon.” “We the unwilling, led by the unknowing, are doing the impossible for the ungrateful. We have done so much for so long with so little, that we are now qualified to do anything with nothing.” “Worry looks down. Sorry looks back. Faith looks forward.” “The vision of a champion is someone who is bent over, drenched in sweat, at the point of exhaustion when no one else is watching.” “We are what we repeatedly do. Excellence, then, is not an act, but a habit.” -Aristotle. “The greatest achievement a teacher can obtain is to be bested by his student.” – unknown I am in earnest; I will not equivocate; I will not excuse; I will not retreat a single inch: and I will be heard. — William Lloyd Garrison “It’s you vs gravity. Make gravity your bitch.” “Laziness will cause you pain.” ‘I make my practices real hard because if a player is a quitter, I want him to quit in practice, not in a game.’ Bear Bryant / Alabama -Blood is replaceable. Sweat is expected. Tears are optional. “Nobody can go back and start a new beginning, but anyone can start today and make a new ending.” – Maria Robinson “People are always blaming their circumstances for what they are. I don’t believe in circumstances. The people who get on in this world are the people who get up and look for the circumstances they want, and, if they can’t find them, make them.” – G.B. Shaw Rocky Balboa: The world ain’t all sunshine and rainbows. It is a very mean and nasty place It will beat you to your knees and keep you there permanently if you let it. You, me or nobody is going to hit as hard as life. But it ain’t about how hard you hit, it is about how hard you can get hit and keep moving forward, how much can you take and keep moving forward. That’s how winning is done! Don’t hesitate to send me something if you come across a quote that speaks to you. I’d love feedback and additions to this page! Find something? Shoot me an email at jamie@dynorock.com
1. Field of the Invention This invention relates to an intake device for an internal combustion engine, and more particularly to an intake device for an internal combustion engine in which the air-column vibration of the intake system is synchronized with the intake period to obtain so-called intake inertia supercharging effect, thereby improving the engine output power. 2. Description of the Prior Art In the internal combustion engine, as the piston moves up and down in the cylinder, a pressure wave is created in the intake passage and transmits through the intake passage up to the surge tank, where it is reflected and then returns to the cylinder. This is repeated and accordingly results in periodical pressure change in the intake passage at a frequency determined by the such operating condition of the engine as the engine speed. On the other hand, every engine intake system has its natural frequency determined by the volume of the intake passage and the cylinder. It is known that the volumetric efficiency is improved by virtue of the intake inertia effect and that the engine output power can be enhanced by tuning the two frequencies with each other. More particularly, the natural frequency of the intake system is determined by the length and cross-sectional area of the intake passage and the average volume of the cylinder during the intake period. In order to enlarge the engine speed range over which the pressure change frequency can be tuned with the natural frequency of the intake system and to widen the engine speed range over which the engine output power can be enhanced by virtue of the intake inertia effect, it has been proposed to make the effective length or the effective cross-sectional area of the intake passage according to the engine speed. See Japanese Unexamined Patent Publication Nos. 48(1973)-58214, 56(1981)-115819 and 58(1983)-119919, for example. However, in accordance with the prior art, the engine speed range over which the engine output power can be enhanced by virtue of the intake inertia effect cannot be sufficiently widened and comparatively complicated and large equipment is required to change the effective length of the intake passage by a sufficient amount. That is, practically, the effective length of the intake passage can be changed only by a limited amount and therefore said engine speed range over which the engine output power can be enhanced by virtue of the inertia effect cannot be sufficiently widened by only changing the effective length of the intake passage. Further, even in the engine speed range in which the effective length of the intake passage can be practically changed to tune said two frequencies with each other, an optimal intake inertia effect cannot be obtained unless the intake valve timing is suitable.
Daydreams. 19082008 My bare feet dangled, toes barely brushing the ground.I spun round in the swing hanging in the open barn, twisting the chains tightly till they strained to be free.I stopped fighting and was flung in tiny circles, smiling to myself.A chuckle came from the doorway.Looking up, I saw him leaning there against the frame, a lopsided toothy grin plastered across his face.A breeze ruffled his hair and mine, as I smiled shyly back; the blood rushing to cheeks was my cue to look down again.He eyed me curiously.An awkward silence passed .I nervously chewed my lip and glanced up. “Hi,” I managed timidly, gripping tightly to the swing chains. “Hello.”He sounded smug the way he said it.But his voice wasn’t quite right.It is never right in my head.
the web by uzwi Deep cold air. Triangular spiderweb, curved like a sail, attached at two points to the house & at the third to an old dry poppy head in a pot on the balcony. Most of it invisible, but the edges & all the rigging picked out with frost. One patch of frost, about three inches in from the leading edge, minutely cross-hatched in the shape of a section through an ammonite. I can’t see if the spider’s part of that little structure. The effect is of a journey in a different regime to ours. Whatever medium is inflating the sail–whatever medium, conversely, is rushing past it–is not a property of our universe & cannot be defined by our way of relating to things. That’s why we have a duty of care to the spider. She’s sailing into an idea of winter we can’t have. Her perception, acted out as this structure, is a valuable resource. I’ve watched her mother & grandmother make webs there, and their mothers and grandmothers, right back into the historical times. They all built ships but none of them built quite like this.
The latest outrage, a video recording of an Israeli army medic (!) casually executing a Palestinian man, has been seized upon by people who are sympathetic to Israel. They quickly began to write things like: What have we become? What about our values? This fight is about the battle over the soul of the “Jewish state.” And remarkably: Thanks to the dead Palestinian for forcing us to face what we’ve become. As usual, the real victims – like the man whose brain is exploded in the video, or the young girl in the other video, or the black guy in the lynch video – get lost in the solipsistic mix. It’s as if the Jewish-Israeli navel has projected itself four feet outwards before flexing back, splitting in two, and glomming onto Jewish-Israeli eyeballs. Small wonder they can only see one small piece of what they actually are. Of what the whole picture is. It’s normal for members of a community – imagined or not – to attend to the facts and stories of their daily lives and the lives of people who are like them. The broadening and fragmentation of the media landscape enables and encourages the phenomenon. Sites like this one even help drive the development of new communities. Yet, one consistent and durable criticism of the Jewish-Israeli left goes to its bewilderingly myopic perspective. It’s not so much an inability to see other people. Rather, it’s the tendency to see others as objects (or rarely, agents), situated within a narrative of self. A preening egoism adorns every “humane” pronouncement about the need to end the occupation. Don’t you see? Apartheid undermines the very essence of our whatever and etc… Fine, one group of people is painfully self-involved and grandiose. Why is that important? In other circumstances it wouldn’t matter: like a whole culture dedicated to bathroom selfies. But in the apartheid context it matters a lot. The dehumanization of other people occurs through the extraordinary status we afford ourselves or through the denigration of others. For the Jewish-Israeli left it’s the former, for the right it’s both. The truth of course, is that there’s nothing exceptional about Jewish-Israelis, or Palestinians for that matter. God didn’t choose anyone, and Palestine/Israel is one more ugly mess in a world that’s seen thousands of them at least. Ethnic conflict is ordinary and the Banality of Evil is as persistent a truism as any other. Even, apartheid, the chosen government of the Jewish-Israeli people, isn’t very exceptional. It’s only very offensive. The whole claim of religious or secular exceptionalism (so many Nobel prizes, after all) informs apartheid and justifies it. Even a high-minded theory of exceptionalism will always lead to a striking lack of self-awareness and sense of superiority in the best of cases. In Palestine, it’s the source of our daily calamity. My unsolicited (and likely unheeded) advice to “liberal” Jewish-Israelis is to forget about being exceptional, either as people or as a people. Approach your role in apartheid from the perspective of someone who believes in true equality. When a Palestinian is executed by a racist – a true exceptionalist – in your midst, don’t worry about how it’ll make you look. Don’t ask what the murder means for “Jewish morality.” Instead ask things like, What was the dead guy’s favorite football team? Did he play a musical instrument? What was his favorite memory?
How big a buzz are you getting from your morning coffee? Pretty big. Probably not as much as you might get from the java being billed as the strongest called death wish coffee and has twice the caffeine. Gio benitez is here with the buzz. It smells great. You can feel it. What about that name death wish coffee. Yeah. Well, this morning the maker of death wish coffee says it's so powerful you'll only need one cup a day. But people all over are asking is it safe to drink that much caffeine? If regular coffee doesn't pack enough of a punch, would you drink this, coffee beans packaged with a skull and cross bones. The name, death wish. When it comes right down to it it's just a very strong cup of coffee. Reporter: That's mike brown, the founder and owner of what he calls the strongest cup of coffee in the world. He uses beans that give you twice the jolt, doubling the caffeine in your average cup. That's where he got the fame death wish. We're making the world's strongest coffee. Can't call it puppies or kittens or anything like that. Reporter: Lots are talking about caffeine. Monster energy drinks will soon begin listing caffeine content on its cans. Here's how much caffeine we're talking about. Right now a 16-ounce monster energy can has about 160 milligrams of caffeine. 16 ounces of starbucks coffee, about 330 milligrams. But the same amount of death wish coffee, about 660 milligrams of caffeine. For someone who drinks coffee all the time I don't think they'll notice much of a difference but if you're someone who doesn't drink coffee at all this could be a shock to the system. Reporter: At his coffee shop in upstate new york, brown only sells the beans. He doesn't brew death wish coffee there, not yet and when i asked if he drinks this super coffee -- yeah, I grifk it only on the mornings when I need to get a lot of stuff done and dragging. No, I can't handle it every morning. Reporter: Well, certainly tastes friendly and while dr. Besser says it's like having two cups of coffee at once, if you're the kind of person that has ten cups a day, imagine how much caffeine you're getting into your system if you're drinking some of this stuff, we have it here and you can see the logo. Sam is enjoying it. I love it. I think it's fantasti I recommend everyone stay tuned to this broadcast. About 20 bucks a pound. Oh. For me I will -- you're a connoisseur. To me it's a very smooth cup of coffee. Now, check with me in about 15 minutes and see if I'm in the corner hugging myself. Suddenly jittery. Exactly. We'll check back with you. Tastes good. In the meantime, ladies and gentlemen, spring wants you to This transcript has been automatically generated and may not be 100% accurate. Now Playing: John Boehner: Obamacare Wreaks 'Havoc on American Families' Now Playing: Second Meningitis Outbreak Reported in West Now Playing: Obama Renews Push for Healthcare Enrollment Now Playing: President Obama Observes World AIDS Day Now Playing: {{itm.title}} {"id":18779867,"title":"Death Wish Coffee Has Twice the Caffeine","duration":"2:47","description":"Drinking the \"world's strongest cup of coffee\" is like having two cups at once.","url":"/GMA/video/death-coffee-dubbed-worlds-strongest-caffeine-18779867","section":"GMA","mediaType":"default"}
Share this image Photos of the Day 04/02 View Gallery A youth plays with an empty camera as he takes a break from fishing in Lake Azuei, near the border with the Dominican Republic in Malpasse, Haiti, on April 1. Fish from Lake Azuei sell for 50 cents at local street markets. Jorge Saenz/AP Villagers from the Dadinga tribe wait for World Food Program staff to distribute food in the village of Lauro in Budy County, south Sudan, on April 2. Goran Tomasevic/Reuters Children look at a spherical sculpture made of Easter eggs on the day of its unveiling at Kievo-Pecherskaya Lavra cathedral in Kiev, Ukraine on April 2. The artwork, created by Ukrainian artist Oksana Mas, is made from 3,000 wooden Easter eggs painted in traditional Ukrainian style. Konstantin Chernichkin/Reuters Penitents wait inside Madrid's Royal Palace to start the procession of the 'Santisimo Cristo de los Alabarderos' brotherhood during Holy Week, on April 2. Hundreds of Easter processions take place in Spain during Holy Week, drawing thousands of visitors. Susana Vera/Reuters Reflected in his teleprompter, President Barack Obama speaks about jobs and the economy during a visit to Celgard Inc. in Charlotte, N.C., on April 2. Kevin Lamarque/Reuters In this photo from April 1, paramilitary policemen stand watching while rescuers enter the Guomin Coal Mine in Yichuan county, in central China's Henan Province, after an explosion. The death toll from the explosion has risen to 19 people, with 24 still trapped underground, the government said Friday, in the second major mine disaster in the country this week. AP A California Air National Guard Chinook helicopter returns to the Weed Airport after dropping off search and rescue personnel on a snowfield near the summit of Mt. Shasta. Rangers found the body of 26-year-old Thomas Bennett of Oakland in a snow cave where his friend had left him before going for help, the Siskiyou County Sheriff's Office said. The rescuers had been trying to reach Bennett since his climbing partner, Mark Thomas, of Berkeley, called 911 Sunday to report that Bennett had collapsed near the summit. The two experienced climbers were trapped Saturday night by severe winds. Andreas Fuhrmann/Redding Record Searchlight/AP In Indonesia, Roman Catholic worshipers ride in boats on the Larantuka Sea on April 2 following a procession accompanying a statue of Jesus as it is transferred to another church during Holy Week. The worshipers followed the procession to celebrate the 500-year anniversary of the discovery of the statue of Mary. They believe the Tuan Ma statue, which was found in Flores in 1510, is the basis of a new religion that has replaced animism on the island. Government data in 2008 showed that more than 80 percent of residents on Flores Island are Roman Catholic in a predominantly Muslim country. Beawiharta/Reuters Penitents take part in a procession of the 'Los Dolores' brotherhood inside the Mosque of Cordoba during Holy Week in Cordoba, southern Spain. Javier Barbancho/Reuters People gather to watch the procession of the 'La O' brotherhood on the Triana bridge during Holy Week in the Andalusian capital of Seville, southern Spain, on April 2. Marcelo del Pozo/Reuters A bee lands on a daisy fleabane flower on April 1, in River Ridge, La., a suburb of New Orleans. Judi Bottoni/AP Investigators stand at the site of a terrorist bombing in Kizlyar, a town in the southern Russian region of Dagestan.AP A member of the Milwaukee County Sheriff's Department Bomb Squad enters the National Exchange Bank in Elkhart Lake, Wis., on April 1 to investigate a suspicious package that was left behind by a robbery suspect.Bruce Halmo/The Sheboygan Press/AP Share this image: Chilean authorities had issued an orange alert on Monday because of increased activity at the volcano. ByEva Vergara and Gabriela Ulloa, Associated PressMarch 3, 2015 Lautaro Salinas/AP One of South America's most active volcanoes erupted early Tuesday in southern Chile, spewing heavy smoke into the air as lava surged down its slopes, prompting authorities to evacuate thousands of people.
Muslims around the world will observe the holy month of Ramadan under lockdown and tight restrictions due to the coronavirus outbreak that has paralysed entire countries. The first day of fasting for Ramadan, which is determined by the sighting of the new moon, is likely to be Friday, April 24 in most Arab nations. More: Ramadan is the holiest month for Muslims, in which they fast during daylight hours, congregate for prayers and share meals as a community. But with strict curfews and physical distancing directives enforced to limit the spread of the highly contagious COVID-19 disease, many of Ramadan's rituals and traditions will be curtailed this year. "I can't remember anything like this happening before," Mohd Faizal Musa, a research fellow at the National University of Malaysia's Institute of the Malay World and Civilization (ATMA), told Al Jazeera. "There was World War II or natural disasters, but from past literature, historical texts, and various archives, I found that Muslims still gathered during Ramadan, despite the war or disasters, and still observed their religious rituals together. "However, we are facing a different enemy this time around. It can be merciless and invisible." How will fasting be different? During the holy month, Muslims wake up early to eat a pre-dawn meal called suhoor, and break their fast after sunset with a meal called iftar. Breaking of the fast is usually a communal affair. It is common for mosques to host large iftars, especially for the poor. Because of the pandemic, which has spread to 185 nations, many countries this year have advised citizens to avoid large gatherings and have suhoor and iftar individually or with family at home. In Egypt, all Ramadan activities, including group iftars and charity tables, are banned. Egypt has prohibited setting up iftar tables around mosques to feed the poor [File: Amr Abdallah Dalsh/Reuters] The World Health Organization (WHO) has advised using virtual alternatives, where possible, for social and religious gatherings. Month-long Ramadan bazaars with stalls selling food, drinks and clothes, usually busy sites, are not allowed in Malaysia, Brunei and Singapore. Rozana Isa, head of Malaysia-based group Sisters in Islam, said this will have a big economic impact on small businesses and single mothers, who rely heavily on this source of income. Meanwhile, as food consumption usually rises in Ramadan, there are concerns of panic buying and supplies running low amid the lockdowns. The physical distancing guidelines will also dampen the spirit of Ramadan, Rozana told Al Jazeera. "[On] this occasion where we have to practise physical distancing, not to greet one another in the way that we usually greet by hugging our fellow Muslims or shaking their hands, this will definitely have an impact on the spirit," she said. Can people still pray together? Congregational prayers are banned in several countries, and many mosques have been temporarily closed. Jordan has suspended the special evening Tarawih prayers at mosques, urging citizens to offer them at home. In Iran, one of the region's hardest-hit nations, Supreme Leader Ayatollah Ali Khamenei has also called on people to avoid collective prayers. Friday prayers outside the Omar Binu Katab mosque, while the spread of COVID-19 continues in Hodan district of Mogadishu, Somalia [File: Feisal Omar/Reuters] In the Malaysian state of Selangor, the sultan has suspended religious activities in mosques until at least May 31. "The religious authorities are definitely encouraging people to do their daily five prayers at home, and I think it really is within the family then to inculcate that spirit of coming together and praying [as a group]," Rozana said. In Saudi Arabia, King Salman has ordered the shortening of Tarawih prayers, which will be held without public attendance, at the two holy mosques in Mecca and Medina. Meanwhile, Pakistan will allow congregational prayers at mosques during Ramadan, but worshippers must keep a distance of two metres (six feet) from each other and are encouraged to bring their own prayer mats. 200324193745287 At Jerusalem's Al-Aqsa Mosque compound, which will be closed to Muslim worshippers throughout Ramadan, the call to prayer will still take place five times a day, and religious workers allowed entry. Mosques in the United Kingdom and elsewhere will live-stream sermons, Quranic recitation and prayers. Muslims will also be able to attend religious lectures via video-conferencing app Zoom, Facebook and YouTube. "For us, the connectivity - whether it was through classes, the recitation of the Quran or through prayers at mosques - we will now try to cope with in our homes," said Aiasha Amir, a Pakistani Islamic instructor and motivational speaker, who will be giving daily lectures live on Facebook during Ramadan. Pakistan's government has decided to conditionally keep mosques open during Ramadan [Fareed Khan/AP] How can you provide charity to the poor? Giving charity and zakat, which is one of the five pillars of Islam, is encouraged during Ramadan. In the United Arab Emirates (UAE), where a nightly nationwide curfew has been in place since March 26, charities will deliver iftar meals to the poor instead of serving them in Ramadan tents or mosques. But in Saudi Arabia, the mosque of Prophet Muhammad in Medina will not provide iftar meals to needy people this year. Daily-wage workers receive free wheat donated by Afghan businessmen ahead of Ramadan in Kabul, Afghanistan [Rahmat Gul/AP] For safety reasons, religious and health experts have advised using online methods to donate to NGOs helping those affected by the outbreak. "To avoid the crowded gathering associated with iftar banquets, consider using individual pre-packaged boxes/servings of food," the WHO said in its Ramadan guidelines. "These can be organised by centralised entities and institutions, which should adhere to physical distancing throughout the whole cycle (collecting, packaging, storing and distribution)." Can you fast with COVID-19 symptoms? In all cases, it is essential to seek medical advice from your doctor. According to the Quran, sick people are exempt from fasting and can make up for the missed fast within a year after Ramadan. The elderly, pregnant and nursing women are also allowed to skip fasting. Therefore, according to Rozana, if you are experiencing serious coronavirus symptoms, it is advisable not to fast. 190505051542870 "In Islam, it is very clear about who should fast and who is exempted from fasting, particularly those who are experiencing a particular ailment and I think with the coronavirus symptoms it doesn't sound like its an ailment that is something light," Rozana said. Amir said if an individual is not under a doctor's supervision and their cough and flu is not serious, then one may keep fasting. "It depends upon the immunity of the person, if it is [symptoms are] mild and if it is bearable just like normal cough and flu in which there is no danger to your life ... carry on your fasts as long as it's not affecting your physical health." How can Eid be celebrated in a pandemic? The Eid al-Fitr festival marks the end of Ramadan and is celebrated as an official holiday in Muslim-majority countries. With lockdown measures in place and large gatherings banned, this year's festivities will be scaled down. The Indonesian Ulema Council recommends that people living and working in other cities should refrain from visiting their hometowns for the holiday. Malaysia has banned popular Ramadan bazaars where hawkers sell food and drinks in congested open-air markets or roadside stalls [File: Vincent Thian/AP] It remains unclear if nations will lift or ease lockdown measures for Eid. Saudia Arabia's grand mufti has said that, if the outbreak continues, Eid prayers can be performed at home. "Like it or not, Eid this year will be in a restricted manner," said Faizal at the National University of Malaysia. "It will be different. A small, close Eid celebration between small unit members of the family will be organised. "This will be less fun for kids, and they will remember this era or year to tell their children and future generations." What can Muslims learn from this experience? The faithful can learn a number of lessons from the restrictions this year as they are encouraged to observe Ramadan more modestly, Rozana said. "That whole notion about the food wastage, the wastage of resources and how it can be better channelled towards those who need it, that's something for us as Muslims to think about as well," she said. Follow Saba Aziz on Twitter: @saba_aziz
Written within the policy areas of democracy and globalization, this essay examines the cultural, political, social, and economic context for understanding the roles of women in Nigeria. It does so by exploring the iconic though divergent life circumstances of two women who became transnational feminist symbols in 2002: Agbani Darego, Miss World 2001, proclaimed at her crowning “Black is Beautiful,” and Amina Lawal, after being sentenced to death by stoning, decried, “I’m a good Muslim and am proud of my faith; but I don’t want to die.” In examining the divergent sociopolitical circumstances of these two Nigerian women, this essay will serve to illustrate both the diversity and dynamism of Nigerian women’s citizenship structures and democratic development as they are experienced in the multiple though increasingly overlapping contexts of local, national, and global expressions of feminist identity. Introduction: The Beauty Queen and Zina The current debate among feminists about the diversity of gender around the world has a good testing ground in Nigeria. After all, where feminism is understood as having emerged from a woman’s identity, which has been born of her sociocultural experience and political-economic status, contemporary Nigerian women would claim to experience as many as 250 feminisms in relation to the multiplicity of ethnic nations that exist in the country. Nigeria is not very different from many of Africa’s ethnically and religiously plural societies in this respect. In these countries, colonially driven nation-state formation also contributed to the construction of the contemporary modern nations. Notwithstanding, it would be an exaggeration to suggest that there exists in Nigeria a distinct gender identity for every ethnic identity. It would be much more accurate nevertheless to underscore feminist plurality in Nigeria in ethno regional terms, where distinct cultural markers manifest dualist gender identities that have occurred because of the country’s diverse religious and ethnic-regional identities. Dualism refers to Nigeria’s north-south divide in which there exists a relatively northern, Islamic region and a relatively—though not exclusively—southern Christian region. As a result, in the country’s south, contemporary gender identity emerges from a deep-seated, precolonial, matriarchal, dual-sex tradition where decentralized communities (Igbo, Niger Delta) and city-state (Yoruba) regions have also formed their current identities by adapting to colonial Christian sociopolitical cultures. These communities tend to be more susceptible to the acculturation of a civic, nationalist, postcolonial modernity. On the other hand, in northern Nigeria, home to some of Africa’s most magnificent medieval Islamic states and cities (Sokoto, Kano, Bornu), centuries of a vibrant Islamic civilization forged powerful gender identities in the past, which have included female leaders such as Queen Amina of Zaria. Yet well before British colonialism introduced new and contradictory gender regimes on Nigerian society, Islamic sociopolitical institutions also introduced such practices as seclusion to separate men and women, thereby beginning a process that began to limit gender autonomy in this region. Two women from the country’s contrasting northern and southern regions illustrate this history of difference and provide a way to understand the contemporary dynamism and diversity of Nigerian gender relations: 31-year-old Amina Lawal from Sokoto State in the northern region and 18-year-old Agbani Darego from Rivers State in the southern region. Both women crossed paths in 2002 in a global event that captured the news headline “Nigeria’s Beauty Troubles,” which is reflected in the essay title (Isaacs 2002). As an international beauty queen who became the first woman of African heritage to hold the Miss World title, Darego’s coronation appeared to have realized for this young Nigerian woman an expression of all Nigerian women’s civil liberties and freedom of conscience in rather contradictory ways. As she embodied the role of global feminine spokesperson, Darego’s crown also gave her a political voice to seek political rights and civil liberties for other women, and she lobbied her home government to respect the gender rights of her northern Nigerian “sister” Amina Lawal. Lawal’s own struggle against her sentencing to death by stoning for committing zina similarly propelled this northern Nigerian woman’s gender identity into global negotiation. (According to sharia law, zina is defined by the act of unlawful sexual intercourse including adultery, which is punishable by stoning to death and fornication, which is penalized by whipping.) Yet, drastically different from Darego’s experience, the cruel and unjust punishment imposed on Amina Lawal by her local community made her a symbol for gender marital rights, reproductive rights, and discriminatory crime and punishment. The 2002 Lawal-Darego “saga” represents a global event that reveals important dimensions of the Nigerian female identity. This essay examines the contextual factors that account for the scenario in which one Nigerian woman attains international recognition for beauty and talent, while another is sentenced to death for extramarital sex. The divergent life tracks of Lawal and Darego suggest a tale of two regions whereby a level of gender freedom and empowerment characterize Nigeria’s southern region, and in Nigeria’s northern region, gender rights recently underwent significant reversals that have led to new restrictions on Nigerian women’s freedom due to the expansion of sharia laws at the gubernatorial state levels. By illustrating the variability of women’s cultures and political identities in Nigeria, this essay will provide an overview of Nigerian feminism from a policy perspective that examines the historical transformations in Nigerian women’s rights and freedoms as gender identities. The essay will relate ways Nigeria’s gender identities have helped forge and are part of Nigeria’s tenuous multinational democracy in the context of contemporary globalization. The democratic status of Nigerian women will be analyzed against the rubric of civil liberties and political rights as key elements for examining gender participation and its influence on democratic pluralism. Democracy for women in the contemporary global era is based on civil liberties that allow for women’s freedom of expression, belief, and association without interference from the state. Attaining democracy also entails Nigerian women’s achievement of certain political rights that enable them to participate freely in the political process in the public arenas through their right to vote, to compete for public office, and to influence public policy on issues that affect them. In presenting a historical trajectory of Nigerian women’s democratic rights and feminist identity formation, the essay examines Darego’s regional circumstance and how it has contributed to her abilities to realize her freedoms, liberties, and values to a degree where she not only emerged as a world beauty queen but adopted a global political leadership role to effect political change. Further, the essay analyzes the contemporary and historical circumstances that have led to the subversion of Lawal’s freedoms of conscience and personal autonomy despite belonging to the same statesociety citizenship regime as Darego, who by virtue of her different religious and regional identity is exempt from sharia’s penal code. In synthesizing Darego and Lawal’s experiences, the essay concludes by revealing the character of contemporary Nigerian feminism where women of all the country’s regions have become gender agents and icons negotiating gender relations at the intersections of the local, national, and global levels. In this respect, Nigerian women have achieved national/global interconnections as they continue to organize around the principles they have traditionally succeeded in—using multiple layers of governance and their activist political culture to mobilize a consciousness around issues important to women. Theories, Histories, and the Variable Formations of Nigerian Gender Citizenship: The Importance of Ethno Religion-Cum-Region Theory What theoretical premise explains the variability of gender rights and the capacity of women’s freedoms in contemporary Nigeria? Chandra Mohanty’s representation of the “Third World woman” (Mohanty 2003) provides a useful feminist perspective to begin such an inquiry. Nigerian women of all the country’s religions, ethnicities, and regions are women of the Third World. They are the products of the uneven, and in many areas underdeveloped, nation-state that is Nigeria, and they are part of an increasing incident of global inequality in which they are relatively marginalized. Mohanty’s theory is relevant to the understanding of Nigerian women for several reasons. Nigeria is geographically located in the region that is controversially referred to as “the developing world” or more contemporaneously as the “Global South.” As well, like other Third World nations, democracy in Nigeria is transitional and developmental; the country thereby exhibits attributes of instability, nonrepresentation, and a shortage of liberal values because of the weak institutional roots that inform the country’s political culture. Similarly, women in Nigeria share with other women of the Third World a common context of identity within a specific type of socioeconomic-cum-political structure. This is to say that women’s movements and struggles in the country, ranging from Lawal’s struggle for self-determination in the north to the struggles of the women of Nigeria’s Niger Delta region in the south, all reveal the structural contexts that explain the emergence of gender identity in the Third World. These structures include the legacies of colonialism; the problems of postcolonial states, such as complex multinational citizenship regimes; and the challenges these regions face as a result of new trends in global economic production. These structures characterize the contemporary Nigerian state-society regimes and in turn influence the character of feminist consciousness among Nigerian women. Updated versions of Mohanty’s postcolonial theoretical framework for the women of the Third World have sought to include a more contemporaneous conceptual framework of gender relations that includes globalization. It is understood that, in the global era, the United States, the European Union, and other G8 (Group of Eight) nations have become global capitalist centers of power in which Third World women are immersed in disparate income and lifestyle inequalities within and between nations (Esteva and Prakesh 1998). Such a framework magnifies a certain designation for women that highlights ways in which the fluidity and power of global forces situate communities of people in terms of disparate identities. The stories of Amina Lawal and Agbani Darego, who are presented as icons of Nigerian gender struggles herein, invoke the dynamism of globalized gender identities in this respect. But, this contemporary circumstance must be understood in historical context. Colonialism in Third World regions like Nigeria has facilitated a structural tie between Western and non-Western cultures that has always been premised on a global context. This earlier form of globalization—Niall Ferguson calls it “Anglobalization” (Ferguson 2002)—has acted as an important platform for formulating the traditional and cultural legacy of Nigerian women’s local experiences; this earlier experience of globalization through colonization plays an important role in influencing the circumstances of Nigerian women today. Nigerian women must be understood within this complexity and existential reality; their experiences must reveal the local, national, and global connective intersections that influence their lives and are manifested in Nigeria’s democracy. Globalization and Gender Policy Globalization is characterized by the increasing interconnectedness of politics, economics, cultures, and societies that were once confined to local and national scopes of public policy. This increasing interdependence of national political processes and public policies is often perceived to be marked by the structural, institutional, and ideational homogenization of human societies; it causes all aspects of a nation’s state-society to come under global influence. Gender regimes—the manner in which a national state-society is constituted in terms of its women—are of particular influence to new global public policies as global conventions, commitments, and associational transnational action are promoted and ratified to ensure that equal rights—political rights, civil liberties, and human rights—are conferred upon all women regardless of national and local identity. In effect, as global regimes interact with national and local regimes and restructure their gender public policies, it is important to understand the tensions that occur as a result. Globalization in this respect cannot be seen as a one-sided process; otherwise, its legitimacy to influence progressive change would be limited by accusations of an ethnocentric universalism. Local and national experiences and contexts that reflect the ideational structures of women’s everyday lives, ideologies, and traditional legacies must be considered with the broader forces of globalization. An appropriate public policy perspective for examining globalization and gender policy would best acknowledge that the global, national, and local arenas of feminist identities exist simultaneously to mutually constitute and reinforce each other. Capturing this complexity, Nigerian political scientist Phil E. Okeke (2000) argues that Nigerian women’s contribution to contemporary democracy, for example, is tied to their social status, which in turn is determined by the regional location from which each woman has historically articulated and acted on her vision of social transformation. Nigerian feminist activist Ayesha Imam would like to see an internationalized rights discourse that recognizes and respects Nigeria’s local cultures and contexts in existing social constructions (Imam 2005). History In exploring the histories of women in Nigeria, Nigerian feminist writers and scholars have made tremendous strides in reinterpreting the precolonial origins of women in Nigeria as a means to understanding their contemporary identity. Two Nigerian feminist scholars, Ifi Amadiume (1987, 1997) and Oyeronke Oyewumi (1997) have written extensively on the historical derivation of southern Nigerian women from which Agbani Darego inherits her contemporary empowerment. For northern Nigerian women, Ayesha Imam and Zaynab Alkali (1988) have done the most work in revealing the historical/cultural contexts from which Amina Lawal has drawn her strength to struggle for and win her battle against gender discrimination in her community. All four writers have sought to reinscribe first-order indigenous Nigerian feminist experiences by challenging the epistemological basis of the mainstream gender myths about women in Nigeria. In contrast to many mainstream anthropological characterizations of African women as victims of a pervasive African patriarchy, these scholars have elucidated ways in which African traditional cultures were indeed empowering for women, and they have harbored strong, relevant leadership roles and abilities. By tracing African matriarchal institutions among the Igbo women of southeastern Nigeria, Amadiume illustrates ways in which the sociopolitical autonomy and associational activism of women in this region have been drawn from very positive traditional bases. For these women, whose political mobilization and participation are strongly manifest in contemporary Nigerian society, by way of their dominant representations in women’s movements and associations, a tradition of motherhood ideology and gender autonomy has in many ways preserved a contemporary situation of women’s self-determination (Amadiume 1987). These traditional structures allowed women to establish their own political, economic, and social organizations, which gave them decision-making latitude in matters that affected their own lives (other female Igbo writers have developed this line of research to examine traditional female kinship systems). It is appropriate to draw conclusions from Amadiume’s studies of Igbo women—the dynamic southeastern women like Darego who remain empowered participants in the contemporary Nigerian democracy despite contemporary gender inequalities. The history of southwestern Yoruba women is similar to that of the southeastern Igbo women, although matriarchal foundations are not offered as an explanation for Yoruba women’s contemporary vibrancy. In her seminal study of Nigerian women, Oyeronke Oyewumi (1997) explains the dynamic economic entrepreneurship observed among Yoruba women as having to do with the social autonomy that women enjoyed within the dual gender structures of Yoruba kingdoms before the advent of colonialism. Oyewumi goes even further than Amadiume in establishing a tradition of freedoms of conscience and associational autonomy among traditional Yoruba women whose sociocultural environment, she claims, reflected a “genderless” worldview. Being a male or a female in Yorubaland carried no specific value in discriminating between men and women, a reality that carries over in the present, where being a Yoruba female provides no specific gender disadvantages according to Oyewumi. The notion of the Yoruba “market woman” phenomenon embodies the implications of this gender history of women who are still asserting their socioeconomic rights of conscience, purpose, and autonomy in contemporary Nigeria (see Sudaarkasa 1973). The gender character of precolonial northern Nigeria is different from that of southern Nigeria, and for a long time it has been complicated by the early development of Islam in the region in about 1000 CE. Histories of pre-Islamic northern Nigerian political communities seem to suggest that northern Nigerian women, like southern Nigerian women, had roles as political leaders and had institutionalized roles that augured political and religious power. Women were known to hold political leadership positions as evidenced by the vibrant history of queens of Daura, Abuja, and Gobir as well as Queen Amina of Zazzau. Women were also known to have been involved in economic and occupational roles such as land cultivation, pottery, spinning, weaving, craftwork, and music. Nevertheless, these freedoms had been eroded by the time colonialism was established in the region, and the slow eradication of women’s rights can be attributed to the advancement of Islam in the region. For example, the practice of restricting women’s physical mobility to their places of residence (seclusion)—a practice that has been resuscitated in many northern Nigerian states since 2001—is linked to the formation of Islamic states in the region around the 15th century. As northern Nigerian urban spaces such as Kano became important Islamic centers of authority, roles for women in the public arena and religious life became more restricted (Samiuddin and Khanam 2002). British colonialism formally established Nigeria as an amalgamated single colony in 1914 and thus provided the basis for the country’s contemporary modern liberal democratic state. This new structure that was imposed on the diverse northern and southern communities created the conditions that have enabled the ethno-regional dualist outlooks of the Nigerian woman today. Before 1900, the British ruled Nigeria’s self-governing precolonial nations through two protectorates—north (Hausa-Fulani, middle belt minorities) and south (Yoruba, Igbo, southeastern minorities). Yet many contemporary Nigerian female writers do not believe colonialism did much to improve the status of women in Nigeria. In fact, given the variability of women’s civil liberties and circumstance in the country’s precolonial nations, Nigerian scholars frequently argue that the Western patriarchal institutions and cultural practices brought to the regions they colonized had a contradictory effect on women’s civil liberties. By legally inscribing British common law and Christianity as premises for the country’s modern statehood and law, colonialism may have brought with it modern patriarchal systems that were a product of British Victorian culture. Ifi Amadiume (1995) has shown how British colonial policy attacked Igbo women’s traditional power bases in this manner. This is not to deny the role of patriarchy in Nigerian precolonial societies, yet Amadiume believes colonialism solidified traditional gender structures while imposing Western forms of gender inequality to create the complex dualisms that exist in the contemporary Nigerian gender profiles that are reflected in the stark contrasts between the lifestyles of Amina Lawal and Darego Agbani. Other Nigerian writers have documented the relative loss of economic status by Nigerian women as a result of colonialism. Glo Chukukere (1998) says this occurred when British colonialists promoted cash cropping as a man’s job in southern Nigeria’s communities. Male British colonialists gradually replaced Nigerian women, who had been at the forefront of subsistence farming, with men, who were taught new and improved methods of agriculture. Women began to be relegated to the background. Abida Samiuddin and R. Khanam (2002), authors of an exciting comparative study of Muslim women in African countries, attribute the expansion of the practice of seclusion among Islamic women in northern Nigeria to the process of colonialism as well. The authors show how colonial agricultural policy in northern Nigeria led to women’s withdrawal from the field labor occupations they had traditionally held. Traditionally, women of Kano had been heavily involved in precolonial cotton production in the fields; however, the boost for cotton and groundnut production for the British cash-crop economy forced them into cotton-yarn spinning, which could be done from the compounds away from the fields. Nigeria’s experience with colonialism has reshaped Nigerian gender identity in other ways that also had different regional effects on Nigerian gender status. The colonial policy of indirect rule in the north, for example, meant that the British government worked in conjunction with northern Islamic political institutions rather than eradicating them. In the south, the imposition of indirect rule—especially in the southeast and Niger Delta regions—meant the British had to create proxy political institutions where they were previously noncentralized, acephalous, and democratic. As a result, in southern communities, colonial conquest led to resistance by women who sought to protect what they perceived to be the erosion of the democratic space they had cherished since the precolonial period. In 1929, already fighting for their civil rights, women’s groups in eastern Nigeria challenged the authority of the British-appointed warrant chiefs because these political appointments usurped women’s traditional responsibilities, which gave them the authority to take punitive action against offending members of their organizations. The new political regimes also took away women’s control of the business of the market (Uche 1989; Nwanko 1996). Known as the 1929 Aba women’s tax riot, women entrepreneurs (market women) protested excessive promulgation of tax laws by the colonial powers. The now famous Aba women’s riot succeeded in preventing the taxation of women and led to the dismissal of several chiefs and the enlargement of female representation on the local colonial courts. Nigerian feminists such as Iyabo Olojede use the Aba riots to demonstrate ways in which Nigerian women in the southern regions had to have been consciously and politically organized around activist issues before the advent of colonialism, or they could not have pulled off such successful political actions against colonialism (Olojede 1990). By default, colonialism also introduced new forms of political action among women. By the early 1900s for example, then nascent Nigerian cities such as Lagos, Ibadan, Abeokuta, Onitsha, Enugu, Benin, and Warri began to produce modern women’s movements and political and professional organizations. Nigerian feminist writer Nkechi Nwankwo (1996) has demonstrated ways in which women’s mobilization during the colonial period proved invaluable for the country’s struggle for independence. As a result, women’s organizations acted as both interest groups and pressure groups on colonial rule. These groups were the precursors of the modern feminist movement in Nigeria. In the 1930s, Funmilayo Ransome-Kuti, who had previously organized the Abeokuta anticolonial women’s riot in southwestern Nigeria, brought women together to discuss gender issues that affected the new female professionals. Some issues included the plight of young women newlyweds who were becoming victims of domestic violence. The discussion group evolved into the Egba Women’s Union, which became one of the earliest feminist groups to improve literacy among rural groups and to fight indiscriminate taxation imposed on market women (Oyewusi 1996). Although the modernization of social processes of gender in northern Nigeria during the colonial period was much less apparent than in southern Nigeria, some mobilization did occur among women despite the fact that the religious culture limited women’s activism against colonialism. Women-organized activism in non-Muslim northern women’s groups occurred in the 1950s as pro-women welfare initiatives were led by prominent northern women such as Mrs. Comfort Dikko; the late Madam Shehu from Sokoto; Madam Zakari, the mother of Mrs. Victoria Gowon; and Hajia Joda. It wasn’t until after independence in 1964 that a Muslim women’s organization was formed, the Jamiy’yar Matan Arewa or Northern Women’s Association. In the wake of decolonization, during the Nigerian nationalist period, the Northern Elements Progressive Union, a northern “middle belt”3political organization/party argued for women’s full enfranchisement and rights to education. For example, northern Nigerian nationalist and region premier Aminu Kano, who headed the party at the time, related northern women’s human rights to Islamic surahs, which referred to the religious rights and duties of women and men among Muslims (Samiuddin and Khanam 2002). Nigerian history demonstrates that while gender structures in southern and Islamic regions of the country are still very much influenced by customary traditional patriarchal practices, these structures also tend to be disproportionately distributed among precolonial regions that have been transformed by colonial practices. In capturing this diversity, Zaynab Alkali (1993) acknowledges that the Nigerian woman is a woman straddling three cultures: the African traditional, the Western European, and the Arab (through the Islamic religion). Women in Modern Nigerian Politics: Variations in Democratic Participation Independence Nigerian women entered modern politics in 1960 as the country gained formal independence from Britain. Her identity as a Nigerian citizen, however, remains as divergent as the pluralistic histories, regional contexts, and cultures from which she has emerged. During this period Nigerian women began to display new kinds of complexities and transformations ascribed to their Third World profile. Postindependence Nigeria represents new distinctions for Nigerian women’s participation in their country’s modern democracy so that they can advance women’s interests, rights, and liberties as well as those of the nation. During this early period, however, women in Nigeria did not have a unified identity as Nigerians. Rather, like their Third World counterparts, Nigerian women are postcolonial hybrids who are characterized by an identity that is not simply traceable to a precolonial formulation; neither has their historical progression into contemporary society produced a homogenous citizenship status. It is important to recognize contemporary Nigerian women’s variable roles as mothers, wives, queens, community decision-makers, traders, and farmers, as these identities provide important starting points for examining their contemporary place as citizens and as a gender social group (Nwankwo 1996). During this period, Nigerian women’s previous ethno regional identities began to be reinvented as they adjusted to a new kind of civic nationalism. In the early post-independence period, at least two distinct identity features began to reflect the pluralism of Nigerian women. The one identity was the regional identity derived from their precolonial cultural heritage. The other was their newer, more ideologically feminist consciousness, which had gradually derived from their interactions with modernity and globalization. These two interactions—often wrongly characterized by some as a clash between tradition and modernity5—in fact inform a contradictory sociopolitical environment in which the Nigerian feminist difference emerges. For example, monogamous marriages that come with the privileges of individual choice, formal education, careers, expanded commercial activities, and family planning facilities are many of the benefits to women that were brought about by the country’s modernization period after independence (Chukukere 1998). Individual citizenship rights, including gender rights, were officially guaranteed and conferred as rights to Nigerian women in the Constitution of the Federal Republic of Nigeria (chap. 4, sec. 30-40) at the time. Of benefit to Nigerian women was the fact that the country’s founding constitution guaranteed substantive and procedural justice; the right to participate in the governance of one’s country; the right to food, livelihood, and an adequate standard of living; and the right to participate in the cultural life of the community (Ezeilo and Afolabi 2002). Despite the fact that the country’s post-independence constitution conferred upon Nigerian women the civil liberties and political rights that women in other parts of the world have had to struggle for, in actuality, it is the variable cultural contexts in which Nigerian women live that tend to limit the full realization of Nigerian women’s democratic empowerment and full citizenship rights. That is to say, since independence, women in Nigeria have enjoyed constitutional rights that include equal pay for comparable work, abortion rights, and maternity rights for working mothers (Chukukere 1998), but social and cultural practices such as the historically bred structures of patriarchy in Nigerian communities and the dominant cultural legacies carried over from the country’s precolonial framework inhibited the postcolonial constitutional gains made by Nigeria’s women during this period (Okeke 2000). Nigerian women’s studies scholar Molara Ogundipe-Leslie (1985) has identified the institution of family and marriage as one example of a social structure that subverts the liberties of Nigerian women. Phil Okeke (2000) supports Ogundipe’s observation. Ogundipe argues that although Nigerian marriage ordinances sought to establish monogamous practice to weaken polygynous customary marriage, these constitutional provisions did not, however, establish firm conditions for women’s security in “statutory” monogamous marriages. As a result, what emerged in contemporary Nigeria was the simultaneous practice of both traditional and modern norms for regulating marriage; furthermore, these norms were conveyed in different ways among the northern and southern regions. In the north, polygyny under Islamic and later regional customary law was merely reinforced despite constitutionalism, whereas the south adopted monogamy among elite classes and its practice was accepted only to the extent that it remained compatible with traditional requirements that legitimized men’s privileges. The extended family system is another example of the way polygynous social practice overrides monogamous constitutional statutes. In situations where women were absorbed into their husband’s extended family in settings in which they had to present themselves as proper wives, constitutional statutes protecting monogamy were undermined. This is because autonomous and individualized spaces that would be required to succeed in their new careers and social obligations in the workforce took a back seat to women’s traditional roles as mothers and wives. Democracy Notwithstanding these complexities, which at best limit the full realization of civil liberties and gender equality in Nigerian society, postcolonial Nigerian society did foster a women’s movement that sought to raise feminist consciousness and deepen Nigerian democracy. Nigerian women’s studies sociologist Mere Kisekka (1992) has argued that although Nigeria does not have a women’s movement that is vociferously engaged in the exposure and challenge of gender inequality in a rigorous way, several women’s associations have striven to operate cautiously within traditional gender boundaries, and they are steadily articulating the theory of complementary rather than competitive roles in gender relations. Consistent with Nigerian feminist writer Obioma Nnaemeka’s (2003) version of this style of feminism—she calls it “Nigerian womanism”—the Nigerian National Commission for Women has characterized Nigerian feminism as an unarmed movement that is nonconfrontational and advocates the progressive uplifting of women for motherhood, nationhood, and development (Samiuddin and Khanam 2002). Two aspects of modern Nigerian state-society relations reveal the development of Nigeria’s feminist consciousness. One aspect is the pluralistic advocacy by distinct, nonstate women’s organizations and communities within Nigerian civil society. The other is the “woman-in-development” gender initiatives embarked upon by various Nigerian governance regimes. A host of women’s movements have operated in Nigeria since independence and since the early launching in 1953 of the pioneer Federation of Nigerian Women’s Societies (FNWS), which became the Nigerian Council of Women’s Societies in 1959. Led by Funmilayo Ransome-Kuti, the FNWS’s primary goal was to bring Nigerian women together to protect their rights under colonial rule and to raise the status of women to win equal opportunities with men. Significantly, this organization played an important role in fighting for the enfranchisement of women in northern Nigeria as well. In the 1980s, Women in Nigeria (WIN) was established as an urban-based women’s movement aimed at transforming Nigerian society. In addition to articulating the importance of gender inequality, WIN advanced the debate on Nigerian feminism to include issues of women’s reproductive rights and choice, sexual harassment and violence, and consciousness-raising programs in the broader discourse on women. Another important representation of women’s groups in Nigeria is the largely rural-based organization, Country Women Association of Nigeria, which provided services to women at the grassroots level and directly participated in the country’s pro-democracy movement beginning in 1993. As a developing nation, Nigeria’s governmental regimes have made significant efforts to improve the conditions that foster women’s full integration into Nigerian society. In 1982, the government launched the National Committee on Women and Development (NCWD) to liaise with the numerous women’s nongovernmental organizations (NGOs). The NCWD’s main function was to coordinate the activities relating to women, advise the government on women’s issues, and design programs to facilitate women’s integration into the development process (Samiuddin and Khanam 2002). In addition, the Babangida regime introduced the internationally acclaimed Better Life Program, which had the goal of bringing rural women into mainstream society. Myriam Babangida (1991), the program’s award-winning leader and wife of Nigeria’s president, claimed that her program’s objective was to create a new rural woman who would be strong, politically active, socially aware, psychologically fulfilled, and equipped to play her role in society to the fullest. The country’s post-independence era demonstrates that the feminist movement in Nigeria has been gradually achieving distinctly observable outcomes, such as shaping the contemporary female Nigerian identity and helping women realize civil liberties. However, the era also exposes the reality that political rights for women—defined by the extent to which Nigerian women formally participate in Nigerian democratic regimes—have had less of an overall impact in breaking male dominance in the political system. Female political participation for Nigerian women still reflects a north-south dualism where even though women in the south have voted and contested elections since before independence, northern Nigerian women were refused suffrage and the right to participate in the political system. The Federal Constitution of 1960 (sec. 44 [b]) stipulated that only a male person is qualified to seek office in the House of Representatives in the northern parts of the country, and the northern regional constitution denied women in the north the right to vote. This situation did not change until the new 1977 constitution granted universal adult suffrage for all Nigerian citizens aged 18 years and older (Omonubi-McDonnell 2003). Moreover, although southern and non-Muslim Nigerian women did not have to struggle for suffrage rights during this era, their participation in electoral politics has also been low. During the country’s First Republic (the first democratic regime), of the 36 members of the assembly, only one woman, Warola Esan, was appointed to a ministerial post. In the 1961 postindependence general elections, three women were elected to the Eastern House of Assembly, two women were appointed to ministerial posts, and several women were elected in local posts. Subsequently, with the collapse of liberal democratic politics and the onset of Nigerian military political regimes in 1967, aside from the occasional appointment of women as commissioners, women’s participation was equally minimal. However, as Nigeria’s military vanguardist regimes (Edozie 2002) began to embark upon a federalist policy of ethno-regional equality, they also enacted a policy of encouraging the appointment of at least one female commissioner per state (Mba 1982). As the country began to debate and deliberate democratic transitions and constitutional engineering, few women were represented. Of the 250-member Draft Constitution Committee only five women were included. Despite this meager representation, however, these women were very influential in including into the constitution, the “freedom against sexual discrimination” clause that sought to socially and culturally enfranchise women in northern Nigeria. Nigerian women also participated in the country’s 1978-1979 democratic transition: they attempted to create their own women’s parties, but when they achieved little success, they began to open up women’s wings of the major parties. During the country’s Second Republic, three women won seats in the House of Representatives, five won seats in various state assemblies, and a woman from each state was sworn in as a federal commissioner. In the subsequent 1983 elections, Franca Afegbua, an Igbo woman from the southeast, was the first Nigerian woman elected as a Senate representative. During Nigeria’s Third Republic, women began to increase their participation and representation in democratic politics. Of the 1,297 nationwide local electoral seats, women won 206. Twelve women won seats in the 638-member House of Representatives, though only one woman was elected to the Senate. Two women contested the presidency—one northern Nigerian woman (from Nigeria’s middle belt), Sarah Jibril, and the other a southern woman, Bola Kuforiji-Olubi. Table 1 reflects Nigerian women’s representation in the 1999 elections. Once again, the numbers demonstrate a negligible pattern of Nigerian women’s representation in electoral participation. The House of Representatives elected 13 women representatives, which has been Nigerian women’s largest share in democratic politics. Table 1. Elective Political Positions in Nigeria, by Gender, 1999-2003 New Challenges and Opportunities for Gender Liberties: Northern Islamism And Southern Secularism Globalization No less than in any other country in the developing world, globalization began to influence international relations in Nigeria by the end of the Cold War. These new trends in internationalization have also shaped Nigerian national and local gender norms in complex ways. Global associational organizations and international institutions are collaborating with national and local civil-societal organizations to form a new genre of global governance. These kinds of new global interactions have had an effect in enforcing the idea of global rights, in which gender is at the center of many current debates. The United Nation’s Convention on the Elimination of Discrimination against Women (CEDAW) is one of the most overarching of these new globalizing influences. Nigeria became a signatory to the convention in 1979, and since then the country has used the International Women’s Year to embark upon an extensive, state-led focus on programs to assist women’s advancement at the national level that has done a lot to improve the plight of Nigerian women. Also, nonstate Nigerian women’s civil-societal organizations have participated in the global struggle for women’s rights in various world conferences on women. NGO forums of the 1980s (Copenhagen 1980, Nairobi 1985) and the series of agenda-setting United Nations world conferences, including the 1995 Fourth World Conference on Women in Beijing, in which Nigerian women made up one of the three largest delagations, are examples of these sociopolitical influences. Economic globalization has also influenced changes in gender regimes in Nigeria. Nigerian feminist Amina Mama (1997) has argued that since the economic crisis that gripped Africa in the 1980s, women have increasingly become subjected to harsher living conditions and human rights abuses. World Bank/IMF economic reform policies have also restructured the Nigerian economy so drastically that they have led to the realignment of the country’s income levels and social classes. These influences from economic globalization have exacerbated poverty among women in the country. Nigerian political economists Olukoshi and Olukoshi (1995) have argued that structural adjustment policies destroyed the Nigerian textile industry and led to the decline of female wage labor in the country’s economy. As structural adjustment polices deindustrialized the country’s infant industries and small-scale enterprises, especially Nigeria’s textile sector, firms were forced to lay off workers, most of whom were women in their prime employment age (Olukoshi and Olukoshi 1995). The effect of political globalization (global norming of ideas, identities, and values) and economic globalization (global harmonizing of economic rules and practices) on gender rights became glaringly apparent after Nigeria’s 1999 democratic transition to a Fourth Republic. Occurring in a post-Cold War era of democratization, Nigeria’s third democratic transition was both a national and a global event. As a national event, the transition boasted female heroes such as the late Kudirat Abiola, a prominent pro-democracy activist and wife of the symbolic leader of Nigeria’s June 12th movement of democratic alliance, the late Chief Moshood Abiola. Kudirat was assassinated by gunmen on June 4th, 1996, because of her political activism. Ironically, it was the successful outcome of the prodemocracy movement and subsequent establishment of Nigeria’s Fourth Republic that unleashed globalization’s starkest restructuring of state-society regimes. This transition had a pernicious effect on Muslim women living in northern states and ushered in the highly symbolic, transnational struggle for human rights and democracy for Amina Lawal. Beauty Queens While underscoring the tenuousness of the rights of all Nigerian women, which had previously been guaranteed by the constitution, the Lawal event captured the dynamism of the emergent Nigerian women’s movement in both regions. Other prominent Nigerian female participants in this struggle, aside from Amina Lawal and Agbani Darego, were Hauwa Ibrahim, the northern Nigerian lawyer who successfully defended Lawal in her appeal. Ibrahim had served as defense counsel in 47 sharia cases, and she was a senior partner and pro bono legal aid counsel for a law firm located in Abuja, Nigeria’s capital. Another important participant in the crisis was Isioma Daniel, a 21-year-old southern Nigerian who was known as the Nigerian Salman Rushdie. Daniel’s controversial story in the Nigerian newsmagazine This Day instigated violent riots against secularist southerners in Abuja; the subsequent crisis led to the cancellation of the 2002 Miss World pageant, which had been scheduled to be held there. While exercising her rights to freedom of speech, Daniel received a fatwa from the Zamfara state government for the controversial statements she made in her article, “Miss World 2002: The World at Her Feet”(Daniel 2002). In her stinging social commentary that criticized the global attention that the country was receiving for hosting the pageant, Daniel wrote, “What would Mohammed think?” This sentence caused the young journalist’s forced exile to Europe for fear of her life. The Lawal and Darego stories serve to underscore the drastic differences that exist in the exercise of gender liberties among northern and southern Nigerian communities. In the north, the application of sharia’s zina penal code to Lawal’s extramarital affair introduced a riveting debate about women’s reproductive and sexual rights (Imam 2006). In addition, the adoption of sharia laws in northern states triggered a broader constitutional debate over the role of religion in politics and its implications on human rights. The crisis began in October 1999 when Governor Sani Yerima, the newly elected governor of Zamfara state—one of northern Nigeria’s newest states—expanded the jurisdiction of sharia laws (including zina) from their local municipal civil authoritative base. During colonial administrations and in subsequent postcolonial constitutions, sharia laws had been established according to customary law in northern Muslim communities. Sani Yerima expanded this previously established jurisdiction to come under the law of Zamfara state. The governor explained his controversial adoption of sharia laws as a democratic campaign promise that had been reinforced by the waves of political Islam and the activist promotion of Islamic doctrines among northern Nigerian civil societies, like the student-led Umma Islamic statists and the Izala anti-Sufist movement. After Zamfara State adopted sharia law, State after state in the north officially enacted all or some aspects of sharia law. In 2002, Amina Lawal became just one of the many women prosecuted under the zina penal codes to be convicted for adultery in a northern Nigerian state. To the credit of Nigerian women, Lawal’s case was immediately adopted for defense by a coalition of domestic NGOs that provided her with lawyers. Hauwa Ibrahim represented just one of the many Nigerian civil-societal organizations that had actively organized to establish protection for women’s rights under the new sharia laws in the north. Two of the women’s groups involved in these campaigns included the nongovernmental organizations Baobab for Women’s Human Rights and the Women’s Action Collective. These groups engaged themselves in a number of activities in the northern sharia states that sought to minimize the reversal of women’s human rights and civil liberties. They brought appeals for convicted women like Lawal to the region’s higher courts and targeted the rules that were friendlier to women. They also sought to demystify sharia among the general public by embarking upon democratic awareness campaigns for female communities (Imam 2006), highlighting ways the sharia legal system violated the human rights of women. They argued that because the code disallowed the association of men and women in public, sharia law violated freedom of assembly and association as provided under Section 40 of Nigeria’s Constitution and thus infringed on the individual rights of citizens’ minority groups. The Nigerian Civil Liberties Organization (CLO), headed by a southern Nigerian woman, Ayo Obe, highlighted the human rights abuses of the Islamic code; the group declared the adoption of sharia law by northern states as unconstitutional in accordance with the 1999 Nigerian Constitution; and argued against Zamfara’s pro-sharia activist interpretation of the constitution. Obe stated that the right to freedom of religion did not allow the imposition of a particular religion on an individual. Arguing against zina laws, the CLO also pointed out that the constitution already guaranteed the right to life and dignity of persons, including guaranteeing their personal liberty and freedom from cruel punishment. Sharia laws abrogated these constitutional guarantees by resuscitating traditional penal codes such as amputations, stoning, and beheading for nonheinous crimes. Lawal’s case soon became the object of world attention as media and national protest campaigns urged the Nigerian government to respect international conventions that it had ratified. CEDAW clearly identifies the need for member governments to confront the socioeconomic, cultural, political, and religious causes of women’s inequality that lead to their discrimination in the private sphere. The new democratic regime of President Olusegun Obasanjo attempted to settle Nigeria’s sharia crisis by declaring the strict version of sharia practices to be illegal under the country’s secular constitution because they discriminate against Muslims. The country’s justice minister, Godwin Agabi, proclaimed that Muslim women should not be subjected to a punishment more severe than would be imposed on non-Muslim Nigerian women for the same offence. Eventually, a Katsina Islamic court cleared Lawal of the zina adultery charge, releasing her from a sentence of death by stoning. Many human rights activists in Nigeria commended their government for resolving Lawal’s fate locally within the Katsina appeal court on procedural, appellate grounds. Doing so, they felt, reinforced democracy in the local and national arenas. For them, the Lawal acquittal occurred because Nigerian women exercised their capacity to agitate for the protection of their rights of due process by appealing against injustices handed down by the state. By allowing the case to proceed and be won in the first of potentially three appeal courts, Nigeria’s democracy demonstrated its own endogenously emergent culture of human rights and democracy within the rule of law. Lawal’s defense lawyer, Hauwa Ibrahim, expressed this position when she proclaimed that her client’s acquittal was “a victory for law, for justice and for dignity and human rights for Nigeria” (Agence France Presse 2003). Conclusion: Contemporary Nigerian Gender and Global Unity Amina Lawal, Hauwa Ibrahim, Agbani Darego, and Isioma Daniel are the faces of contemporary Nigerian gender identities. Chandra Mohanty (2003) would have described the events that brought them together in terms of her “One-Third/Two-Thirds” feminist solidarity model where women living in the wealthy western cities of the advanced industrial world are privileged compared to women living in the poor, developing world regions. Lawal, Ibrahim, Darego, and Daniel all came to symbolize dynamic points of connection and distance among and between communities of women marginalized and privileged along local and global dimensions—Sokoto, Katsina, Nigeria, the United Kingdom, and the United States. The new faces of Nigerian feminism are “daughters” and “sisters” of dynamic though divergent sociocultural histories whose legacies are exhibited in their contemporary mobilization around gender issues. Their encounters illustrate the link between the grounded experiences of Nigerian women’s everyday lives and their local gendered contexts and ideologies among broader transnational political and economic structures of contemporary globalization. The 2002 sentencing of Amina Lawal served as the event that brought these women together. However, the event also demonstrates ways in which the global and the local exist simultaneously to forge a unique form of Nigerian feminist solidarity. When one woman’s rights were violated by the 2001 judgment, other women sought to ensure that Nigerian women’s rights would be “guaranteed, claimed and respected” (Imam 2006). It is an important marker for Nigerian women’s civil liberties and political rights that the appeals court decision that acquitted Lawal of any wrongdoing did not result from international pressure alone. That Lawal was acquitted due to the historical Nigerian gender struggle, by the continuously changing forms of local and national power politics, and as a result of the long-standing cultural traditions of the country’s political alignments and groups, is the expression of contemporary Nigerian feminism. Moreover, despite the pluralist and dualist dimensions of Nigerian feminism presented throughout this survey of Nigerian women, the country’s regional gender identities are not so different after all. When faced with challenges that confront their gender identity, Nigerian women are using contextualized discourses and transnational tactics of struggle to deepen their own empowerment, and they are participating in the consolidation of their country’s slowly emerging multinational democracy.
45 Haw. 622 (1962) 372 P.2d 365 STATE OF HAWAII v. ROBERT JOSEPH EVANS. No. 4219. Supreme Court of Hawaii. June 1, 1962. TSUKIYAMA, C.J., CASSIDY, WIRTZ, LEWIS AND MIZUHA, JJ. *623 Edward Berman (O.P. Soares with him on the briefs) for defendant-appellant. Kenneth K. Saruwatari, Deputy Prosecuting Attorney, City and County of Honolulu (John H. Peters, Prosecuting Attorney with him on the briefs) for the State, appellee. OPINION OF THE COURT BY LEWIS, J. After jury trial, defendant-appellant was convicted of burglary first degree. The charge was that defendant "on the 13th day of January, 1960, during the nighttime, feloniously did enter the store of Isabel M. Rosenberg, doing business as Mai Fai Jewels, with intent to commit larceny therein * * *." On this appeal from the conviction *624 the following contentions have been argued: 1. That a jade and diamond ring, subsequently identified as one of the articles taken from Mai Fai Jewels during the burglary, was located in and taken from defendant's home by an unlawful search and seizure. 2. That defendant's confession (a) was "unlawfully obtained, while the appellant was in custody of the police and without his being promptly taken before a magistrate," and (b) was tainted by the unlawful search and seizure. 3. That there was a fatal variance in that Mai Fai Jewels was owned by Jacob and Isabel Rosenberg, husband and wife, and not by Isabel Rosenberg alone. 4. That the evidence was insufficient to show that the entry of the store was "during the nighttime." Other contentions are disposed of in the footnote.[1] 1. About 3:30 P.M. on March 10, 1960, while defendant was under arrest and held at the police station in connection with another burglary, two police officers, Shinn and Suganuma, went to defendant's home, knocked on the door, and when defendant's wife came to the door, *625 identified themselves. Officer Shinn told Mrs. Evans that her husband was "in custody as a suspect in a burglary case" and that he "denied the charges."[2] After telling Mrs. Evans this, the officer asked "if it would be all right for us to check her house for any evidence that we may find." According to his testimony, "Mrs. Evans said it was all right and invited us into the house." In a bedroom, he found a woman's jade and diamond ring and other jewelry in a cuff link case in the left top drawer of a dresser after opening the cuff link case in the presence of Mrs. Evans. He asked Mrs. Evans if she was the owner of this ring. The record then discloses that defense counsel objected to "any hearsay" whereupon the prosecutor instructed the witness: "Don't tell us what she said." The witness then continued: "And I asked her if she was the owner of the ring. And then I seized — I seized the cuff link case, which had other jewelry inside." At 7:45 or 7:50 P.M. Officer Shinn turned the ring over to Suganuma, the other officer who had accompanied him to the house and had been present when it was seized. Officer Suganuma, about 7:40 P.M., had resumed questioning of the defendant. During the interrogation the ring was shown to defendant. The exact point in the interrogation at which it was shown to him does not appear. During this interrogation defendant confessed to having burglarized Mai Fai Jewels. According to Officer Suganuma's resume of defendant's oral statement, defendant *626 said that after entering the place he "picked a few pieces of jewelries, and amongst these was a jade ring with a lot of small diamond-like chips around it, mounted on a white gold band * * * and that he had been keeping all of the jewelries he had taken from Mai Fai inside of his cuff link case, which he kept in the left top drawer of his dresser in his bedroom." At 8:00 P.M. a police reporter was called in, and defendant's statement was taken in shorthand and subsequently transcribed. Defendant, though agreeing the transcript was accurate, refused to sign it stating as the reason that he had not as yet contacted any attorney. During the course of this further interrogation defendant said that of the pieces taken he only recalled the ring which he then described. Shown the jade and diamond ring seized at his home, he identified it. As to the other items taken that night he said "They would be with the jade ring where you found that." This, he again said, was "In my dresser drawer in a cuff link box." At 10:00 P.M. the two investigating officers drove defendant to Mai Fai Jewels for a demonstration as to how he had effected entry, which he gave. He also, when asked, pointed out the place in the store where he had found the jade and diamond ring. At the trial an employee of the store identified the ring as similar to one that she noted as missing when she opened the store for business the morning after the burglary and discovered the burglary. The testimony as to the finding of the ring, the ring itself, and defendant's confession constitute the entire evidence of defendant's guilt of this particular burglary. Objection was taken to "any testimony that grows out of the presence of [the police officers] in that house." It was contended that "they can't use evidence that they acquired by permission obtained in that way from a *627 third person against the Defendant." Even if the third person identified herself as defendant's wife "that wouldn't make legal any evidence that they obtained for use against this Defendant," it was further contended. Defendant was allowed "an objection and exception to the entire line." At this time we will consider the testimony as to the finding and seizure of the ring, as well as the admissibility in evidence of the ring itself. The constitutional protection against an illegal search and seizure extends to the oral testimony concerning the search and seizure, and not alone to the use in evidence of the object seized. McGinnis v. United States, 227 F.2d 598 (1st Cir.); State v. Hunt, 280 S.W.2d 37 (Mo.); Dalton v. State, 230 Ind. 626, 105 N.E.2d 509. The State contends that defendant lacks standing to invoke the constitutional protection because he made no claim of ownership. However, articles had been seized in defendant's home for use as evidence against him. He could invoke the protection of the search and seizure clause (Article I, section 5, of the State Constitution) on the ground of possession of the premises where the seizure was made. No assertion of ownership of the property seized was necessary to confer standing. Jones v. United States, 362 U.S. 257, 265; Annot., 96 L.Ed. 66, 71, 4 L.Ed.2d 1999, 2005. It is to be noted that, with respect to the authority of Mrs. Evans to consent to the search and seizure, a different question is presented, and as set out below we are of the view that ownership of the property seized does have bearing in that connection. The State further contends that the search and seizure question is taken out of the case by reason of failure of defendant to make a pre-trial motion to suppress evidence unlawfully obtained. As in State v. Pokini, 45 Haw. *628 295, 367 P.2d 499, this case is governed not by the Hawaii Rules of Criminal Procedure but by the prior case law. True, the trial in this case was held commencing July 20, 1960 and those rules apply "so far as just and practicable [to] all proceedings then [on July 1, 1960] pending." H.R. Cr. P., Rule 59. Under the circumstances of this case as it comes before us[3] we are of the view that it would not be "just and practicable" to apply H.R. Cr. P., Rule 41(e). However, on remand the Hawaii Rules of Criminal Procedure will apply. In cases governed by the Hawaii Rules of Criminal Procedure it will be incumbent upon the trial court to enforce Rule 41(e) thereof. If a contention of unlawful search and seizure is presented without pre-trial motion, it will be for the trial court to decide whether it will entertain the matter at the trial pursuant to the last sentence of Rule 41(e) which provides that may be done (1) if opportunity for a pre-trial motion did not exist, or (2) if defendant was not aware of the grounds for the motion, or (3) in the discretion of the court. This case not being governed by H.R. Cr. P., Rule 41(e), but by the case law outlined in State v. Pokini, supra, we have considered defendant's contention that the unlawfulness of the search and seizure was "thrust upon the attention of the court," and have concluded that the contention is well taken. The prosecution's own evidence showed that there was no search warrant and there should have been. As will be later seen, this evidence was such as to leave no reasonable possibility that, upon a pre-trial motion, other evidence would have been *629 elicited showing the lawfulness of the search. Defendant contends: "First, a wife cannot, during her husband's absence and without his authority, waive his constitutional rights, and Second, there is no effectual consent, where another, wife or otherwise, in charge of an owner's premises, in his absence, is impliedly coerced to allow an officer to enter and make a search." We do not reach the second part of this argument, as our conclusions upon consideration of the wife's authority to consent to the search and seizure dispose of this matter. This is a case of first impression in this jurisdiction. In Territory v. Young, 32 Haw. 628, 648, the court did not consider the lawfulness of the seizure of four handkerchiefs taken out of a bureau drawer by defendant's wife and thereafter taken by the officer with the consent of the wife, the only objection noted at the trial being on the ground of immateriality, irrelevancy, remoteness and vagueness. In some cases it is reasoned that a wife has an equal right in the premises occupied by husband and wife, and her consent suffices to legalize the search and seizure by reason of this equal right. This is to be compared with the theory — followed by some of the courts but denied by others — that a wife being in charge of the premises in the absence of the husband has authority to consent to the search and seizure made. Illustrating the first line of approach is State v. Cairo, 74 R.I. 377, 385, 60 A.2d 841, 845. The search was upheld under the particular circumstances of that case, the court saying: "In our judgment the search complained of was not illegal, unlawful or unreasonable, since the evidence secured thereby was taken, not in that portion of the house used and occupied exclusively by the *630 defendant Cairo and his wife, but in the cellar thereof, which was used in common by two different families, and to which both families had free access. As a joint owner of the premises searched Mrs. Cairo was possessed of an undivided interest therein, and in her own right as an occupant could undoubtedly give permission to search the house, or at least the cellar thereof, which was used by her in common with members of a different family." Compare the earlier Rhode Island case of Humes v. Taber, 1 R.I. 464, 473, in which the court held incorrect a charge to the jury to the effect that the law implied an authority in the wife, in the absence of the husband, to license a search of his house for stolen goods. The court said: "* * * The law implies no such authority. Undoubtedly, the wife's authority extends to the rendering the ordinary civilities of life. If she invites a neighbor, friend, or even stranger, to enter the house in the way of hospitality, such invitation would, under ordinary circumstances, be a valid license so to do. "But to imply an authority to the extent contended for by the defendant in the present case, would be dangerous. An artful man might impose on the wife in the absence of the husband, and thus, for malicious and unlawful purposes, obtain from her a license to search the desks and private papers of her husband. "No case has been cited by the counsel for the defendant which gives any countenance to such a doctrine; it is unsupported by principle, and would be mischievous in its consequences." In Illinois the cases proceed on the theory that joint occupancy of the premises by the wife with the husband enables her to give consent to a search, and in such case the evidence disclosed may be used against either. See *631 People v. Shambly, 4 Ill.2d 38, 122 N.E.2d 172; People v. Perroni, 14 Ill.2d 581, 153 N.E.2d 578; People v. Speice, 23 Ill.2d 40, 177 N.E.2d 233; cf., the earlier case of People v. Lind, 370 Ill. 131, 18 N.E.2d 189, distinguished in the later cases on the ground that in Lind the consent of the wife was not freely given. In Texas, likewise, it is held that either spouse may give consent to a search of the premises thus legalizing the search. Brown v. State, 235 S.W.2d 142 (Tex. Crim.); Ellis v. State, 130 Tex. Crim. 220, 93 S.W.2d 438; Cass v. State, 124 Tex. Crim. 208, 61 S.W.2d 500. Another case that stresses the element of joint control of the premises is Stein v. United States, 166 F.2d 851 (9th Cir.). There a woman who had been living with defendant as his wife though not married to him informed upon him and invited federal agents into the house where they found a bottle of yen shee, an opium product, in a cupboard where condiments were kept. The legality of the search was upheld. Clearly, one in joint control of the premises, at least when no objection is made by the other occupant, may admit police officers to the house, and the question of coercion aside it also is clear that no illegal search is involved as to what is in plain sight when the police officers are so admitted. See People v. Howard, 166 Cal. App.2d 638, 334 P.2d 105. We are not prepared to say how much further the officers may proceed or whether we agree with the above-cited cases on their facts. None of them goes so far as to hold that a wife in joint occupancy of the home can permit a search of her husband's personal effects to discover jewelry hidden in a cuff link case in a bedroom bureau drawer.[4] The wife has no such right. *632 The cuff link case opened by the officers clearly was identifiable as the husband's and we do not have here the situation where, at the time of search, it does not appear whose case is being opened. Cf., United States v. Rees, 193 F. Supp. 849, 852. Nor do we have a case in which the officers justifiably supposed that the person authorizing the search had the authority that he purported to have. Cf., People v. Gorg, 45 Cal.2d 776, 291 P.2d 469. The circumstances in the present case do not indicate more than the usual authority of a wife. The courts are divided on the question of implied authority of a wife to consent to a search of the premises in her husband's absence. See Annot., 31 A.L.R.2d 1078, 1091. The State cites United States v. Sergio, 21 F. Supp. 553, in which it was held that the wife who, while her husband was in the attic operating an illegal distillery, invited the officer to come in and look around, "was sufficiently in charge of the house to render her invitation legally sufficient to constitute an actual consent to the search." In this case there were, on the kitchen floor, wholesale quantities of supplies for use in the distillery and it was obvious that the wife was a party to what was going on. The case is not comparable with the present one. Cf., United States v. Bush, 283 F.2d 51 (6th Cir.). However, other cases cited do support the State's position. These cases simply bear out the statement above made that the courts are divided on the question of the implied authority of the wife. See Hook v. State, 181 N.Y.S.2d 621 (Ct. Cl.), People v. Dominguez, 144 Cal. App.2d 63, 300 P.2d 194, and cases above cited upholding the lawfulness of the search involved, while Humes v. Taber, supra, 1 R.I. 464, Maupin v. State, 38 Okla. Crim. 241, 260 Pac. 92, Simmons v. State, 94 *633 Okla. Crim. 18, 229 P.2d 615, 618, Dalton v. State, supra, 230 Ind. 626, 105 N.E.2d 509, Manning v. Commonwealth, 328 S.W.2d 421 (Ky.), United States v. Rykowski, 267 Fed. 866, 871 (D.C. Ohio S.D.), and Cofer v. United States, 37 F.2d 677 (5th Cir.), are to the contrary. We are of the view that the wife's right as joint occupant of the premises is the starting point for consideration of the lawfulness of a search made with her consent, that one of the circumstances to be considered is the husband's presence or absence, that assuming for present purposes but not deciding that the wife has implied authority to permit a search in the absence of her husband, nevertheless the search and seizure here made were not within the scope of that authority. When the officers searched the husband's personal effects to discover jewelry hidden in a cuff link case in a bedroom bureau drawer they went beyond the bounds of any possible justification. As stated in People v. Carter, 48 Cal.2d 737, 746, 312 P.2d 665, 670: "When the husband is absent from the home, it is the wife who controls the premises, the ordinary household property, the family automobile, and with her husband's tacit consent determines who shall and who shall not enter the house on business or pleasure and what property they may take away with them. Cf. People v. Dominguez, 144 Cal. App.2d 63, 65, 300 P.2d 194. When the usual amicable relations exist between husband and wife (cf. Kelley v. State, 184 Tenn. 143, 197 S.W.2d 545, 546), and the property seized is of a kind over which the wife normally exercises as much control as the husband, it is reasonable to conclude that she is in a position to consent to a search and seizure of property in their home. * * *" (Italics added.) Hence, the search in this case was unlawful irrespective *634 of the rule to be adopted in this jurisdiction on the question of the wife's implied authority. In contrast with State v. Pokini, supra, the circumstances of this case afford no reasonable possibility that, upon a motion to suppress, other evidence would have been elicited showing the lawfulness of the search. Neither husband nor wife testified at the trial and neither was compellable to testify as a witness for the State, nor was the wife even competent except as a witness for the defense. R.L.H. 1955, § 222-18. We fail to see what more could have been developed in the State's favor nor has the State made any suggestions in that regard, merely arguing that it "did not have an opportunity to more fully develop the manner in which the exhibit was obtained." If the coercion of the wife were the turning point the situation might be different, but on the point at issue the unreasonableness of the search is plain. The admission in evidence of the ring and the testimony as to the finding and seizure of the ring constitute reversible error. 2. As to defendant's confession,[5] a two-fold argument has been made in this court. However, the specifications of error merely assert that it was "unlawfully obtained while the appellant was in custody of the police and without his being promptly taken before a magistrate." After preliminary hearing as to voluntariness as provided by R.L.H. 1955, § 222-26, the trial court found "that the statement given to the officer by the defendant is a voluntary statement." We sustain this ruling under the authority of Territory v. Young and Nozawa, 37 Haw. 189, aff'd, 163 F.2d 490; Territory v. Aquino, 43 Haw. 347, 368; Crooker v. California, 357 U.S. 433. The mere fact that defendant was in custody is not determinative. In *635 Territory v. Young and Nozawa, this court stated at page 197: "* * * A confession otherwise shown to have been voluntary is not rendered inadmissible by the fact that its author was under arrest or in custody at the time, even though the arrest or custody may have been under invalid process or without any process or legal right." Defendant cites H.R. Cr. P., Rule 5(a)(2), relating to taking of a person arrested without a warrant before a magistrate. That rule was not in effect on March 10, 1960, the date of the confession, and its interpretation is not involved here. In any event, as stated in Crooker: "The bare fact of police `detention and police examination in private of one in official state custody' does not render involuntary a confession by the one so detained. Brown v. Allen, 344 U.S. 443, 476 (1953). Neither does * * * the failure of state authorities to comply with local statutes requiring that an accused promptly be brought before a magistrate. Fikes v. Alabama, 352 U.S. 191 (1957)." 357 U.S. at 437. So in Territory v. Aquino, this court held: "* * * We deem it unnecessary to rule whether defendant's detention was, under the facts appearing from the record, contrary to the so-called `48-hour law' (now section 255-9, R.L.H. 1955), as there has been no showing whatsoever that defendant was by his detention coerced into making any of the statements and admissions testified to as having been made by him, or that his detention in any way affected the voluntariness of the statements and admissions made by the defendant." 43 Haw. at 376. After consideration of the time defendant had been in custody — five and a half hours, a much shorter period than was involved in the cited cases — and the circumstances *636 of the custody, reviewed in note 2, it still remains true, as in Crooker, that: "On this record we are unable to say that petitioner's confession was anything other than voluntary." 357 U.S. at 438. See also State v. Foster, 44 Haw. 403, 354 P.2d 960; cf., Culombe v. Connecticut, 367 U.S. 568. The ultimate determination of the voluntary character of a confession is for the jury. Territory v. Young and Nozawa, supra. Defendant specifies as error refusal of his requested Instruction No. 11, reading: "The law cannot measure the force of the influence used, or decide upon its effect upon the mind of a prisoner, and therefore excludes the declaration if any degree of influence has been exerted." This requested instruction was taken from Territory v. Matsumoto, 16 Haw. 267, 271, at which point of the opinion the court was condemning the action of one Doyle in laying hands on a prisoner during interrogation. The holding in the case was that this misconduct did not have any influence in causing the defendant to confess two days later. No instruction to the jury was under review. This illustrates the point made in Territory v. Cutad, 37 Haw. 182, 186, where the court quoted from Garfield v. State, 74 Ind. 60, 63: "* * * It is not every statement of the law found in a text-book or opinion of a judge, however well and accurately put, which can properly be embodied in an instruction. * * *" We are of the view that defendant's requested instruction was not properly worded and defendant was not entitled to it. State v. Hassard, 45 Haw. 221, 230, 365 P.2d 202, 207; State v. Yoshida, 45 Haw. 50, 65, 361 P.2d 1032, 1040. We turn now to the contention that the entire confession was tainted by the unlawful search and seizure. This *637 contention was made for the first time when new counsel was associated in the case and filed a supplementary brief in this court. However, recognizing the relationship between this contention and the contention of involuntariness, and recognizing also the problem that will arise upon remand of the case, we have considered the point, but are of the view that in this instance the paucity of the record precludes a determination. Had a motion to suppress been made that would have afforded opportunity to determine whether the confession was "a fruit of the poisonous tree" within the doctrine of Silverthorne Lumber Co. v. United States, 251 U.S. 385. See Nardone v. United States, 308 U.S. 338, 342. The questions involved in the contention under Silverthorne are illustrated by Territory v. Warren, 35 Haw. 232, 240, aff'd, 119 F.2d 936, 938, and by a line of cases commencing with the remand for further proceedings made in Weiss v. United States, 308 U.S. 321, following which the trial court wrestled with the problem in United States v. Weiss, 34 F. Supp. 99. Weiss having pleaded guilty, the Government proceeded on another indictment and the trial court's rulings as to the extent of the taint were sustained in United States, v. Goldstein, 120 F.2d 485 (2d Cir.), but in Goldstein v. United States, 316 U.S. 114, the Supreme Court affirmed on another ground, i.e., lack of standing.[6] That defendant has a right to have excluded from evidence the portion of his confession in which he identified the ring shown him during interrogation does not *638 admit of doubt. Otherwise there would be placed before the jury indirectly that which defendant is entitled to have excluded from their consideration. As to whether defendant is entitled to have the whole confession excluded, the question is one that we cannot judge on this record, and our reversal of the conviction is based on other grounds. 3. On the question of variance, defendant relies on Territory v. Ferguson, 23 Haw. 714, 717. The case is inapplicable for the reasons stated in State v. Pokini, 45 Haw. 295, 304-06, 367 P.2d 499, 504-05. Isabel Rosenberg was in charge of the Mai Fai jewelry store. There was no variance. Cf., Wilson v. State, 103 Tex. Crim. 403, 281 S.W. 844. Revised Laws of Hawaii 1955, § 258-21, cited by defendant, does not purport to and does not set out the only sufficient method of stating ownership of partnership property. It merely provides that the method there set out is a sufficient method. Use of the statutory method undoubtedly would have avoided the question posed by this case, which is: Was it necessary for the indictment to state that the ownership was in a partnership? If it was, the indictment failed to so state. Revised Laws of Hawaii 1955, § 258-10, provides that: "No indictment shall be held invalid or insufficient for want of the averment of any matter unnecessary to be proved * * *." This section further provides: "No indictment shall be deemed insufficient, nor shall the trial, judgment or other proceedings thereon be affected, by reason of any defect or imperfection in matter or form, which shall not prejudice or tend to prejudice the defendant." In this case it was not necessary to aver or prove that the ownership was in a partnership. That was immaterial. Use of the name of Isabel Rosenberg, who was in charge of the store, was not misleading as to any legal *639 essential of the case. Defendant is protected against another prosecution for the same offense. We find no error. See Berger v. United States, 295 U.S. 78, 82; Territory v. Coe, 37 Haw. 601; cf., Territory v. Tamashiro, 37 Haw. 552. 4. As to the entry "during the nighttime" the evidence was that defendant was employed as a security officer at a shopping center where were located Mai Fai Jewels and many other stores. According to his own statements to the police, on an occasion prior to the burglary charged he had discovered that the front sliding glass door of the Mai Fai store could be pushed and shoved in such a way as to disengage the lock and afford entry. He told the police that on the night of January 13, 1960 he entered the store and took the jade and diamond ring above-mentioned shortly before 9:00 P.M. Proof that the offense was committed in the nighttime was essential to the conviction of first degree burglary, but the time of the commission of the offense was not an essential element of the corpus delicti. State v. Hale, 45 Haw. 269, 367 P.2d 81. Therefore, defendant's own out-of-court statement that the offense was committed at night was sufficient proof of that matter without independent evidence if defendant's statement was admissible. The admissibility of the confession is the turning point. Reversed and remanded for further proceedings. NOTES [1] In view of the conclusions reached in this opinion we deem it unnecessary to take up Specification of Error III, contending that a mistrial should have been ordered "on the ground that a police officer was permitted to relate in the presence of the jury statements made to him by others not in the presence of appellant." The error, if any, was invited. A portion of Specification of Error IV, asserting that judgment of acquittal should have been ordered on the ground that defendant's arrest was unlawful, was not argued and accordingly the State in its brief deemed it waived. See Matter of Avery, 44 Haw. 26, 28, 352 P.2d 607, 609. In his reply brief defendant insisted that this contention was not abandoned but still did not offer any argument. In any event, the contention is without merit irrespective of the lawfulness or unlawfulness of the arrest. See State v. Hassard, 45 Haw. 221, 223, 365 P.2d 202, 204; State v. Trask, 45 Haw. 109, 110, 363 P.2d 790. The specifications concerning the charge of the court have been examined and found to be without merit, only defendant's requested Instruction No. 11 requiring consideration. That instruction is considered when we take up the second point dealing with the confession. [2] Actually, defendant had said he was not going to make any statement until he could consult an attorney. Though permitted to use the telephone on arrival at the police station to call an attorney, he had said that he didn't know any. He had been told that he might call his wife but had not sought to do so. He had wanted to speak to his father-in-law but had not been permitted to telephone the latter. Cf., R.L.H. 1955, § 255-9. We consider these circumstances in connection with the admissibility of defendant's confession. [3] Defendant was committed for grand jury action on March 24, 1960, after preliminary examination. The indictment was presented April 14, 1960, and a plea and motion based on the composition of the grand jury disposed of adversely to defendant's contention on May 27, 1960. Defendant pleaded not guilty on June 3, 1960 and the matter was placed on the ready calendar. At the trial which commenced July 20, 1960 the trial court did not apply Rule 41(e), merely overruling the objections. [4] Cf., Van Wyck v. State, 56 Okla. Crim. 241, 37 P.2d 321, in which defendant and her landlady shared a bedroom, and in the course of a search with the landlady's consent stolen articles were found in the bedroom. It was held that a motion to suppress the evidence was properly overruled. The facts as to the finding of the articles in the bedroom do not appear. [5] For the purposes of this opinion, defendant's oral statement at the police station, the unsigned transcribed statement, and the demonstration at the burglarized store, all are referred to as defendant's confession. [6] We note that in Milbourn v. State, 212 Ind. 161, 8 N.E.2d 985, and Quan v. State, 185 Miss. 513, 188 So. 568, the confessions were held admissible. Aside from our doubts as to whether the cases were well considered — it not appearing what the unlawful search revealed in either case — only the question of voluntariness of defendant's out-of-court statements was reviewed in those cases and they are not in point in this jurisdiction in which an unlawful search and seizure may have more bearing on the admissibility of a confession than on the question of voluntariness alone.
Aggregated plasmalemmal vesicles and microvilli in human astrocytoma. Plasmalemmal vesicles and microvilli or filopodia in human astrocytoma were examined with thin-section and freeze-fracture techniques. The plasmalemmal vesicles, although sparsely scattered in distribution, were often aggregated in a curvilinear, semicircular, or circular fashion, and the involved plasma membrane was often protruded externally like a mound. Microvilli or filopodia were cross-fractured when fracture travelled within the plasma membrane resulting in a fracture face interrupted by numerous holes of cytoplasms. The microvilli were distributed in a concentrated manner on the free surface of the cell and often closely oriented in a linear, curvilinear, or circular fashion. They varied in size, form, and length. When they were arisen from a common hillock of the plasma membrane, its fracture face was elongated, up to 0.8 mu in length. Fenestrae were occasionally visible in attenuated cytoplasm which surrounded peripheral vacuole in the cell.
Discovery of 1-(3,4-dichlorophenyl)-N,N-dimethyl-1,2,3,4-tetrahydroquinolin-4-amine, a dual serotonin and dopamine reuptake inhibitor. The present work describes a series of novel tetrahydroquinoline amines that potently inhibit the in vitro reuptake of serotonin and dopamine (dual reuptake inhibitors). The compounds are structurally related to a series we disclosed previously, but are improved with respect to cytochrome P-450 enzyme (CYP) and potassium ion channel Kv11.1 (hERG) inhibition and synthetic accessibility. The detailed synthesis and in vitro activity and ADME profile of the compounds is described, which represent a previously undisclosed dual reuptake inhibitor chemotype.
The long term goal of this proposal is to test the efficacy of OV-ChaseM virotherapy in combination with anti-CTLA-4 T-cell targeted immunotherapy for breast cancer brain metastases (BM). With a dismal one and two year survival of 20% and 2%, respectively, the development of novel therapeutic modalities is critical for BM. OV-ChaseM is a second generation oncolytic virus that expresses the Chondroitinase ABC (Chase), an enzyme that degrades the extra-cellular matrix. Anti-CTLA-4 is a monoclonal antibody directed against the CTLA-4 inhibitory receptor on T lymphocytes. Using murine models of brain cancer BM, we aim to characterize the anti-tumor immune responses evoked by both individual and combinatorial therapy. We hypothesize that Chondroitinase expression by OV-ChaseM will facilitate the influx of immune cells into the tumor stroma and alleviate microglia suppression. Here, activated microglia can then uptake virally infected cells, present tumor antigens and promote an anti-tumor microenvironment. This, in turn, will enhance T cell anti-tumor responses following anti-CTLA-4 blockade and result in overt immune cell activation and enhanced anti-tumor efficacy, as compared to controls. Overall, we aim to broaden the scope of treatment for brain cancer patients and provide pre-clinical evidence for individual and combinatory therapeutic regiments that may be implemented in the clinic.
Isis Warns US of More Attacks; Says it has '71 Soldiers' in 15 American States Isis also noted that its main target was Pamela Geller, the head of the group that had organised Prophet Mohammad cartoon contest. Personnel remove the bodies of two gunmen who opened fire on a security officer on Sunday outside a venue in Dallas, Texas.Reuters File Days after the Islamic State claimed responsibility for the foiled terror attack at the Prophet Mohammad cartoon contest in Texas, the radical group warned of more attacks in the United States in the next six months. In a statement released by Isis on social media, the group said its "71 soldiers", based in 15 US states, will carry out more such attacks. The Sunni militant group said: "The attack by the Islamic State in America is only the beginning of our efforts to establish a wiliyah in the heart of our enemy." The statement further revealed that the target of the "two Al Khilafa soldiers", who opened fire outside the event in Garland on Sunday, was the "swine" Pamela Geller. "The attack by the Islamic State in America is only the beginning of our efforts to establish a wiliyah in the heart of our enemy. Our aim was the khanzeer(swine) Pamela Geller and to show her that we don't care what land she hides in or what sky shields her; we will send all our Lions to achieve her slaughter. This will heal the hearts of our brothers and disperse the ones behind her," Isis said in the release published on Tuesday evening. The radical Islamist group, which has been behind several terror attacks in Europe, stated that the Lions of the Islamic State will slaughter Pamela Geller and all those who support her. "We have been watching closely who was present at this event and the shooter of our brothers. We knew that the target was protected. Our intention was to show how easy we give our lives for the Sake of Allah," the terrorist group stated. Isis even claimed that it has 71 trained fighters inside the United States, located in 15 states, including Virginia, Maryland, Illinois, California, and Michigan. "Out of the 71 trained soldiers 23 have signed up for missions like Sunday, We are increasing in number...The disbelievers who shot our brothers think that you killed someone untrained, nay, they gave you their bodies in plain view because we were watching," the release read. The statement concluded on the note that in the next six months, more such terror attacks will be carried out in the United States. This announcement came soon after the group claimed responsibility for the Texas shooting, wherein gunmen Elton Simpson and Nadir Soofi wounded a security guard before police killed them. White House spokesman Josh Earnest described the shooting at the "Draw the Prophet" event as "an attempted terrorist act (that) was foiled".
[Mechanisms and cofactors of hepatitis C fibrosis]. The development of quantitative methods to measure the degree of necrosis, inflammation and fibrosis in liver biopsies favored the knowledge of the natural course of liver fibrosis. Two of the most important methods are the Knodell index and the Metavir index. These indexes are also useful to monitor the effects of the diverse therapeutic alternatives. There are no satisfactory studies that confirm why progression of fibrosis is slower in women, or why it's faster when the diagnosis is made at an older age. All the therapeutic schemes decrease the progression of fibrosis, in at least one degree compared with the degree of fibrosis before the treatment. Moreover, combination therapy with pegylated interferon and ribavirin reduces the progression of fibrosis even more in patients with hepatitis C.
199 F.2d 958 TOWER GROVE BANK & TRUST COMPANY, Appellant,v.John E. CURBY, Trustee of Dowd Sprorting Goods Company, aCorporation, Bankrupt. No. 14538. United States Court of Appeals Eighth Circuit. Nov. 12, 1952. James V. Dunbar and Robert J. Gaddy, St. Louis, Mo., for appellant. Harold J. Abrams, St. Louis, Mo., for appellee. PER CURIAM. 1 Appeal from District Court dismissed for want of diligent prosecution.
[Buffer capacity of aquifer media polluted by landfill leachate]. A column filled with fine sand was constructed to investigate pH buffering capacity and redox buffering capacity of aquifer media. Experimental results indicated that calcium carbonate played a significant role in pH buffering; with the aggravating of landfill leachate pollution, the pH buffering capacity of calcium carbonate was increased; it increased from background value, which was 1.62 x pH(-1) mmol/kg, to 41.3 x pH(-1) mmol/kg. With the aggravating of landfill leachate pollution, the oxidation capacity (OXC) of aquifer media was decreased, and the reduction capacity (RDC) was increased. In unpolluted aquifer media, Fe3+ was the main component of OXC, and accounted for about 70.5% of OXC; TOC was the main component of RDC, and accounted for about 98.7% of RDC. Species of the minerals was related to the degree of pollution; large fraction of amorphous Fe3+ and part of crystalline Fe3+ were reduced near the pollution source, and the reduced product was mainly precipitated as FeCO3 and FeS. Deposit of produced Fe2+ led to ion-exchangeable Fe2+ content increased from 0.5% of uncontaminated aquifer media to 3%. Therefore, Fe3+ may act as a very significant redox buffer in aquifer.
Alfalfa mosaic virus RNA 1 5′ UTR stem-loop The Alfalfa mosaic virus RNA 1 5′ UTR stem-loop represents a putative stem-loop structure found in the 5′ UTR in RNA 1 of alfalfa mosaic virus. RNA 1 is responsible for encoding the viral replicase protein P1. This family is required for negative strand RNA synthesis in the alfalfa mosaic virus and may also be involved in positive strand RNA synthesis. See also Alfalfa mosaic virus coat protein binding (CPB) RNA References External links Category:Cis-regulatory RNA elements Category:Bromoviridae