text stringlengths 8 5.77M |
|---|
Upregulated expression of 14-3-3 proteins in astrocytes from human cerebrovascular ischemic lesions.
Several types of chaperone proteins, such as heat shock proteins, have been reported to be associated with brain ischemia. The purpose of this study was to investigate whether an abnormal expression of 14-3-3 proteins, a novel type of molecular chaperones, occurs in human gray and white matter ischemic lesions. We prepared formalin-fixed, paraffin-embedded sections from 33 autopsied brains, consisting of 7 normal controls, 4 cases with cerebral thrombosis, 5 cases with cerebral embolism, 8 cases with multiple lacunar infarctions, and 9 cases with Binswanger disease. Deparaffinized sections from all cases were immunostained with anti-14-3-3 antibodies using the avidin-biotin-peroxidase complex method, and some sections were also double-immunostained for 14-3-3 and glial markers. In the normal control brains, 14-3-3 immunoreactivity was mainly localized to the neuronal somata and processes. Strongly 14-3-3-immunopositive astrocytes were distributed in the infarct lesions and were particularly abundant in infarcts at the chronic stage. Intensely 14-3-3-immunolabeled astrocytes were also observed in the ischemic white matter lesions, and in the severely affected white matter lesions from patients with Binswanger disease, dense 14-3-3 immunoreactivity was found in clasmatodendritic astroglia as well as in reactive astrocytes. Our results suggest that 14-3-3 proteins may be induced mainly in astrocytes from human cerebrovascular ischemic lesions, and that the upregulated expression of 14-3-3 proteins in astrocytes may be involved in the formation of astrogliosis. |
William Cavendish (courtier)
Sir William Cavendish MP (c. 150525 October 1557) was an English politician, knight and courtier. Cavendish held public office and accumulated a considerable fortune, and became one of Thomas Cromwell's "visitors of the monasteries" during the dissolution of the monasteries. He was MP for Thirsk in 1547. In 1547 he married Bess of Hardwick, and the couple began the construction of Chatsworth House in 1552, a project which would not be completed until after his death. His second son William Cavendish (1552 - 1626) became the first Earl of Devonshire, purchasing his title from the impecunious King James I.
Early life
He was the younger son of Thomas Cavendish (1472–1524), who was a senior financial official, the "clerk of the pipe", in the Court of Exchequer, and his wife, Alice Smith of Padbrook Hall. He was the great-great-great-grandson of Sir John Cavendish from whom the Dukes of Devonshire and the Dukes of Newcastle inherited the family name of Cavendish.
Career
Cavendish became one of Thomas Cromwell's "visitors of the monasteries" when King Henry VIII annexed the property of the Catholic Church at the end of the 1530s, in the dissolution of the monasteries. This followed from his successful career as a financial expert holding public office in the Exchequer, which led to his wealth. He was accused of accumulating extra riches unfairly during the dissolution. After Cromwell's fall, he was sent to Ireland to survey and value lands which had fallen to the English during the Fitzgerald Rebellion.
He was connected to the Seymour brothers Edward and Thomas, and via them to the family of Jane Grey, but he also took care to send tokens of goodwill to The Lady Mary. He was appointed Treasurer of the Chamber from 1546 to 1553 but, after an audit, was accused of embezzling a significant amount of money. Only his death saved the family from disgrace.
During the reign of Mary I, a favourable biography of Thomas Cardinal Wolsey was first published, written from the perspective of one of his closest aides, the one who had taken King Henry news of Wolsey's death. Although for centuries Sir William was said to be its author, historians now attribute it to his older brother George Cavendish (1494–1562).
Family
William Cavendish had a total of 16 children by three different wives. His first wife was Margaret Bostock; they had five children, but only three daughters survived:
Catherine, who married Thomas Brooke, son of Lord Cobham
Mary (died after 1547)
Ann who married Sir Henry Boynton in 1561.
Margaret, died in 1540.
In 1542 he was married to Elizabeth Parker; she had three children, none of whom survived. She died after giving birth to a stillborn daughter in 1546.
In 1547 he married Bess of Hardwick. He sold his property in Suffolk and moved to Bess's native county of Derbyshire. He purchased the Chatsworth estate in 1549 and the couple began to build Chatsworth House in 1552.
In the ten years before he died, they had eight children, six of whom survived infancy:
Frances Cavendish, (1548-1632) married Henry Pierrepont.
Henry Cavendish, (1550-1616), eldest son, Knight of the Shire and MP for Derbyshire for over 20 years, eventually disinherited by his mother in favour of his younger brother William.
William Cavendish (1552 - 1626), the first Earl of Devonshire.
Charles Cavendish, (1553–1617) father of William Cavendish, 1st Duke of Newcastle
Elizabeth Cavendish, (1555-1582) later entered into a controversial marriage with Charles Stuart, 1st Earl of Lennox, by whom she was the mother of Arbella Stuart, claimant to the English throne.
Mary Cavendish, (1556-1632) married Gilbert Talbot, 7th Earl of Shrewsbury. Their daughter Alethea Talbot Howard is an ancestor of the 5th and later Dukes of Norfolk.
William is also an ancestor of the late Queen Elizabeth, the Queen Mother and through her the modern British Royal Family.
Notes
References
Pearson, John, The Serpent and the Stag, Holt, Rinehart and Winston, 1983.
Brodhurst, F. (1907). "Sir William Cavendish 1557." Derbyshire Archaeological Journal, 29, pp. 81–102. Google Books
Cavendish, Sir William (c.1505-57), of Northaw, Herts. and Chatsworth, Derbys." HOP.
Cox, J.C. (1881). The Chronicles of the Collegiate Church Or Free Chapel of All Saints, Derby, pp. 130. Bemrose & Sons. Google Books
"Duke of Devonshire," (1790). The Peerage of England, Scotland and ireland, I, pp. 51–52. London. Google Books
Lee, S. (1887). Cavendish, William (1505?-1557) (DNB00). WikiSource.org
Lewis, M. (n.d.). "Sir William Cavendish, Burgess of Thirsk, Treasurer of the Chamber of King Henry VIII #37832, b. circa 1505, d. 25 Oct 1557," citing Richardson; Cokayne; Burke. ORTNCA. Web.[30]
External links
William Cavendish at WikiTree Retrieved 7 August 2018
Category:1505 births
Category:1557 deaths
Category:16th-century English people
Category:English civil servants
Category:People of the Tudor period
William Cavendish
Category:English knights
Category:People associated with the Dissolution of the Monasteries
Category:English courtiers
Category:People from Derbyshire Dales (district) |
(CNN) Five people were injured Friday in a stabbing at a shopping mall in Manchester, northwest England, and a man is being detained under the UK's Mental Health Act, police said.
The incident took place at the Arndale Centre at around 11:15 a.m. local time (6:15 a.m. ET), where a man who was carrying a "large knife" began "lunging and attacking people," Assistant Chief Constable Russ Jackson of Greater Manchester Police said.
Jackson said while the injuries are "nasty," none of them are life-threatening.
He said police did not know the motivation behind the attack, adding that "it appears random, and it is brutal."
Following the attack, a man originally was arrested on suspicion, preparation and instigation of an act of terrorism. He is believed to have acted alone.
Read More |
The long-term goal of this proposal is to advance our knowledge by employing imaging techniques using a small animal positron emission tomograph (microPET Focus 120). This instrument has high resolution and high sensitivity and will therefore allow the study of biochemical mechanisms with greater detail in small animals than has been possible before. The Brain Imaging Center (BIC), Center for Functional Onco-Imaging (CFOI), Departments of Pharmacology, Anatomy and Neurobiology, Neurobiology and Behavior, Biological Chemistry, Medicine, Transdisciplinary Tobacco Use Research Center (TTURC), Radiopharmaceutical Laboratories all at University of California-Irvine (UCI) have been involved in using imaging methodology to study normal and abnormal physiological processess. Researchers at UCI have a long tradition of using PET in human studies of various conditions. A large number of researchers at the various centers and Departments in UCI are involved in studying rodent models. The acquisition of a microPET scanner will allow researchers in numerous projects to study in vivo brain function with a resolution of about 1.5 mm or less. For the first time, investigators at UCI will be able to accurately assess functional activity in small regions in the brain noninvasively. Imaging research at UCI is unique in terms of the close association of investigators in basic animal research with clinical research as exemplified in the various programs. Studies carried out on the animal models will greatly enhance our ability to understand and interpret human studies. The new microPET scanner will be housed in Irvine Hall, where the BIC and Center for CFOI are located and houses the human PET scanners, the MC-17 medical cyclotron, radiopharmaceutical laboratories, MR scanners, Optical Imaging Lab and rodent animal facility. The microPET scanner will be under the direction of Dr. Jogesh Mukherjee, and a team from five different departments (Radiology, Medicine, Pharmacology, Neurobiology and Behavior and Biological Chemistry) that will provide administrative, scientific, and technical expertise necessary for the effective operation and maximal utilization of the microPET will be in place. |
Françoise Bertin
Françoise Bertin (23 September 1925 – 26 October 2014) was a French actress.
She appeared in over 125 films since 1961. Among these were five films directed by Alain Resnais: Last Year at Marienbad, Muriel, The War Is Over, I Want to Go Home, and Same Old Song.
Born in Paris on 23 September 1925, she died in Galan, Hautes-Pyrénées, on 26 October 2014.
Theater
Filmography
References
External links
Category:1925 births
Category:2014 deaths
Category:Actresses from Paris
Category:Disease-related deaths in France
Category:French film actresses |
1951 FC Dinamo București season
The 1951 season was Dinamo Bucureşti's third season in Divizia A. For the first time, Dinamo fought for the championship, ending the season 2nd place, with 32 points, the same number as the champions CCA Bucureşti. The difference was only one goal between the two teams. Constantin Popescu ranked third in the top scorer with 11 goals scored.
On October 13, 1951 Dinamo Sports Park was inaugurated.
Results
Squad
Standard team: Iosif Fuleiter - Florian Ambru, Caius Novac - Constantin Marinescu, Gheorghe Băcuț, Valeriu Călinoiu (Viliam Florescu) - Iosif Szökő, Carol Bartha, Ion Suru, Nicolae Dumitru, Constantin Popescu (Alexandru Ene).
Transfers
Dinamo changes the squad a lot, especially because the second team, Dinamo Oraşul Stalin promoted. Seven players from Bucharest were transferred to Braşov. Titus Ozon, Nicolae Voinescu & Marin Apostol moved to Dinamo 2. Instead, Dinamo brought Ion Suru (Locomotiva Bucureşti), Iosif Szökő (Progresul ICO Oradea), Valeriu Călinoiu (Flacăra Bucureşti), Alexandru Ene (Metalul Bucureşti) and Iosif Fuleiter (Ştiinţa Cluj).
External links
www.labtof.ro
www.romaniansoccer.ro
1951
Category:Association football clubs 1951 season
Category:1951–52 in Romanian football
Category:1950–51 in Romanian football |
Q:
Migrating Java TreeMap code to Scala?
I am migrating my Java code base to pure Scala and I am stuck on this one piece of code. I have an implementation of an IntervalMap i.e. a data structures that let's you efficiently map ranges [from,to] to values where the set, delete and get operations are all O(log n) (slightly different from an IntervalTree or a SegmentTree).
This code uses Java's java.util.TreeMaps and while migrating to Scala, I ran into 2 big issues:
Scala has no mutable.TreeMap - I decided to go around it by using mutable.TreeSet (oddly Scala has mutable.TreeSet but no mutable.TreeMap) for storing the keys and storing the values in an auxiliary mutable.Map. This is an unpleasant hack but is there any better way?
Next problem is Scala's mutable.TreeSet has no equivalent of java.util.TreeSet's ceilingKey, floorEntry, pollFirst, pollLast which are all O(log n) operations in Java.
So, how can I best migrate my code to Scala? What are the best practices in these situations? I really do not want to write my own tree implementations. Is there a more idiomatic Scala way of writing IntervalMaps that I am not aware of? Or is there some reputable library out there? Or does Scala just plain suck here with its gimped TreeSet and non-existent TreeMaps. Ofcourse I can just use Java's TreeMap in Scala but that is ugly and I lose all the nice Scala collection features and I might as well use Java then.
Here is my current Java code: https://gist.github.com/pathikrit/5574521
A:
The answer is, unfortunately, to just use the Java TreeMap class.
Scala doesn't have its own copy of everything, and this is one of the most notable exceptions. One of the reasons it's Java-compatible is so that you don't have to re-invent every wheel.
The reason you still want to use Scala is that not every bit of code you write is about this TreeMap. Your IntervalMap can be a Scala IntervalMap; you just use the Java TreeMap internally to implement it. Or you could use the immutable version in Scala, which now performs reasonably well for an immutable version.
Perhaps in 2.11 or 2.12 there will be a mutable TreeMap; it requires someone to write it, test it, optimize it, etc., but I don't think there's a philosophical objection to having it.
A:
1) What's the problem with using an immutable TreeMap internally? It's more or less just as efficient as mutable tree map, does everything in O(log n).
2) In the Scala version, there is no ceilingKey and floorKey, but instead one has methods from and to that do essentially the same, but return a whole subtree instead of single entries.
Full 1:1 port of Java-code:
import scala.collection._
import scala.collection.immutable.TreeMap
case class Segment[T](start: Int, end: Int, value: T) {
def contains(x: Int) = (start <= x) && (x < end)
override def toString = "[%d,%d:%s]".format(start, end, value)
}
class IntervalMap[T] {
private var segments = new TreeMap[Int, Segment[T]]
private def add(s: Segment[T]): Unit = segments += (s.start -> s)
private def destroy(s: Segment[T]): Unit = segments -= s.start
def ceiling(x: Int): Option[Segment[T]] = {
val from = segments.from(x)
if (from.isEmpty) None
else Some(segments(from.firstKey))
}
def floor(x: Int): Option[Segment[T]] = {
val to = segments.to(x)
if (to.isEmpty) None
else Some(segments(to.lastKey))
}
def find(x: Int): Option[Segment[T]] = {
floor(x).filter(_ contains x).orElse(ceiling(x))
}
// This is replacement of `set`, used as myMap(s,e) = v
def update(x: Int, y: Int, value: T): Unit = {
require(x < y)
find(x) match {
case None => add(Segment[T](x, y, value))
case Some(s) => {
if (x < s.start) {
if (y <= s.start) {
add(Segment[T](x, y, value))
} else if (y < s.end) {
destroy(s)
add(Segment[T](x, y, value))
add(Segment[T](y, s.end, s.value))
} else {
destroy(s)
add(Segment[T](x, s.end, value))
this(s.end, y) = value
}
} else if (x < s.end) {
destroy(s)
add(Segment[T](s.start, x, s.value))
if (y < s.end) {
add(Segment[T](x, y, value))
add(Segment[T](y, s.end, s.value))
} else {
add(Segment[T](x, s.end, value))
this(s.end, y) = value
}
} else {
throw new IllegalStateException
}
}
}
}
def get(x: Int): Option[T] = {
for (seg <- floor(x); if (seg contains x)) yield seg.value
}
def apply(x: Int) = get(x).getOrElse{
throw new NoSuchElementException(
"No value set at index " + x
)
}
override def toString = segments.mkString("{", ",", "}")
}
// little demo
val m = new IntervalMap[String]
println(m)
m(10, 20) = "FOOOOOOOOO"
m(18, 30) = "_bar_bar_bar_"
m(5, 12) = "bazzz"
println(m)
for (x <- 1 to 42) printf("%3d -> %s\n",x,m.get(x))
Result:
{}
{5 -> [5,12:bazzz],12 -> [12,18:FOOOOOOOOO],18 -> [18,20:_bar_bar_bar_],20 -> [20,30:_bar_bar_bar_]}
1 -> None
2 -> None
3 -> None
4 -> None
5 -> Some(bazzz)
6 -> Some(bazzz)
7 -> Some(bazzz)
8 -> Some(bazzz)
9 -> Some(bazzz)
10 -> Some(bazzz)
11 -> Some(bazzz)
12 -> Some(FOOOOOOOOO)
13 -> Some(FOOOOOOOOO)
14 -> Some(FOOOOOOOOO)
15 -> Some(FOOOOOOOOO)
16 -> Some(FOOOOOOOOO)
17 -> Some(FOOOOOOOOO)
18 -> Some(_bar_bar_bar_)
19 -> Some(_bar_bar_bar_)
20 -> Some(_bar_bar_bar_)
21 -> Some(_bar_bar_bar_)
22 -> Some(_bar_bar_bar_)
23 -> Some(_bar_bar_bar_)
24 -> Some(_bar_bar_bar_)
25 -> Some(_bar_bar_bar_)
26 -> Some(_bar_bar_bar_)
27 -> Some(_bar_bar_bar_)
28 -> Some(_bar_bar_bar_)
29 -> Some(_bar_bar_bar_)
30 -> None
31 -> None
32 -> None
33 -> None
34 -> None
35 -> None
The Segment class should be set private[yourPackage], some documentation should be added.
A:
Scala 2.12 has mutable.TreeMap finally: https://github.com/scala/scala/pull/4504
|
A couple of years ago I showed a lady and her young daughter around a newly refurbished rental house.
Me: “So you would like to rent this property, then?”
Lady viewer: “Yes, very much, it suits our needs perfectly”.
Me: “Would it just be the two of you moving in?”
Lady viewer: “No. There’s also my husband, who is working away at the moment, and my son, who is at school”.
Me: “Sounds ideal! It is a three-bedroom house after all, so the four of you would fit in very nicely, I’m sure”.
Lady viewer: “Oh, and of course there’s our dog”.
Me: “Dog? Really? Oh dear. I wish you’d mentioned you have a dog when you made this appointment to view. The owners of this property are strictly against pets, particularly dogs, I’m afraid. Oh, what a shame”.
Lady viewer: “What have they got against dogs?”
Me: “I think you’ll find a lot of landlords are wary about allowing pets, for all sorts of reasons. They might be worried about the additional wear and tear on the property, or the risk of not being able to re-let the house once the tenancy finishes because the house has a doggy smell. Or they might even be allergic to dogs themselves. Whatever their reason, these landlords have said no to dogs. Sorry”
Lady viewer: “Well they’re bl**dy mad in that case. Bonkers! My dog is SO well-behaved. Good as gold. It’s this one (points at her daughter) who scribbles all over the walls in crayon and felt tip pens, not the dog!”<
Contact us
Follow us
About us
Family-run Estate Agents serving the whole of Bristol... and beyond. Residential sales, lettings & tenancy management and property auctions. We are the exclusive West Country agents for Network-E online auctions |
package com.googlecode.jrubyforandroid;
import android.content.Context;
import com.googlecode.android_scripting.AsyncTaskListener;
import com.googlecode.android_scripting.InterpreterUninstaller;
import com.googlecode.android_scripting.exception.Sl4aException;
import com.googlecode.android_scripting.interpreter.InterpreterDescriptor;
public class JRubyUninstaller extends InterpreterUninstaller {
public JRubyUninstaller(InterpreterDescriptor descriptor, Context context,
AsyncTaskListener<Boolean> listener) throws Sl4aException {
super(descriptor, context, listener);
}
@Override
protected boolean cleanup() {
return true;
}
}
|
Q:
How can I get the id and value of an item using Selenium?
I am trying to retrieve for each question i want to answer I want to know the ID and the value.
I have written the following code but I dont know how to finish it so that it gives me the ID and the value:
private IWebElement GetAnswerElement(int questionNumber, int answerNumber)
{
return BrowserFactory.Driver.FindElement(By.XPath(String.Format("//div[@id = 'client-assessment']/div/div/label", questionNumber, answerNumber)));
}
The code looks like this:
<div id="client-assessment" style="overflow: hidden;">
<div class="question">
<label class="question">
Here is my question1
</label>
<div class="radio">
<label>
<input id="xxx" name="xxx" onchange="UpdateAssessment()"
</div>
code continues with more questions
Hope someone can help me out.
A:
If you want to get the id and value attribute of the input element you can do the following.
private IWebElement GetAnswerElement()
{
var xpath = "//div[@id='client-assessment']/div/div/label/input";
return BrowserFactory.Driver.FindElement(By.XPath(xpath));
}
var element = GetAnswerElement()
var id = element.GetAttribute("id");
var value = element.GetAttribute("value");
Note that I've changed the xpath that it selects the input element.
If you directly want to use xpath to check for the two attributes you can do the following.
private IWebElement GetAnswerElement(string questionText, string answerText)
{
var xpath = String.Format(
"//div[@id='client-assessment']/div/div/label/input[@id='{0}'][@value='{1}']",
questionText,
answerText);
return BrowserFactory.Driver.FindElement(By.XPath(xpath));
}
var element = GetAnswerElement(
"Product_Contractor_ClientAssessment_Question06",
"Answer1");
Or if you only want to check for the number at the end of the string.
private IWebElement GetAnswerElement(int questionNumber, int answerNumber)
{
var xpath = String.Format(
"//div[@id='client-assessment']/div/div/label/input[ends-with(@id, '{0}')][ends-with(@value, '{1}')]",
questionNumber.ToString("00"),
answerNumber.ToString("0"));
return BrowserFactory.Driver.FindElement(By.XPath(xpath));
}
var element = GetAnswerElement(6, 1);
Note that I format the questionNumber value with 00. I do this to prevent the number 66 from beeing matched when 6 is given.
|
<?php
namespace Eduardokum\LaravelBoleto\Contracts\Boleto;
use Eduardokum\LaravelBoleto\Contracts\Pessoa as PessoaContract;
interface Boleto
{
const COD_BANCO_BB = '001';
const COD_BANCO_SANTANDER = '033';
const COD_BANCO_CEF = '104';
const COD_BANCO_BRADESCO = '237';
const COD_BANCO_ITAU = '341';
const COD_BANCO_HSBC = '399';
const COD_BANCO_SICREDI = '748';
const COD_BANCO_BANRISUL = '041';
const COD_BANCO_BANCOOB = '756';
const COD_BANCO_BNB = '004';
const STATUS_REGISTRO = 1;
const STATUS_ALTERACAO = 2;
const STATUS_BAIXA = 3;
const STATUS_ALTERACAO_DATA = 4;
const STATUS_CUSTOM = 99;
/**
* Render PDF.
*
* @param bool $print
*
* @return mixed
*/
public function renderPDF($print = false);
/**
* Render PDF.
*
* @return mixed
*/
public function renderHTML();
/**
* Return boleto as a Array.
*
* @return array
*/
public function toArray();
/**
* @return mixed
*/
public function getLinhaDigitavel();
/**
* @return mixed
*/
public function getCodigoBarras();
/**
* @return PessoaContract
*/
public function getBeneficiario();
/**
* @return mixed
*/
public function getLogoBase64();
/**
* @return mixed
*/
public function getLogo();
/**
* @return mixed
*/
public function getLogoBancoBase64();
/**
* @return mixed
*/
public function getLogoBanco();
/**
* @return mixed
*/
public function getCodigoBanco();
/**
* @return mixed
*/
public function getCodigoBancoComDv();
/**
* @return int
*/
public function getMoeda();
/**
* @return \Carbon\Carbon
*/
public function getDataVencimento();
/**
* @return \Carbon\Carbon
*/
public function getDataVencimentoApos();
/**
* @return \Carbon\Carbon
*/
public function getDataDesconto();
/**
* @return \Carbon\Carbon
*/
public function getDataProcessamento();
/**
* @return \Carbon\Carbon
*/
public function getDataDocumento();
/**
* @return mixed
*/
public function getValor();
/**
* @return mixed
*/
public function getDesconto();
/**
* @return mixed
*/
public function getMulta();
/**
* @return mixed
*/
public function getJuros();
/**
* @return mixed
*/
public function getMoraDia();
/**
* @return mixed
*/
public function getJurosApos();
/**
* @param int $default
*
* @return mixed
*/
public function getDiasProtesto($default = 0);
/**
* @param int $default
*
* @return mixed
*/
public function getDiasBaixaAutomatica($default = 0);
/**
* @return PessoaContract
*/
public function getSacadorAvalista();
/**
* @return PessoaContract
*/
public function getPagador();
/**
* @return mixed
*/
public function getDescricaoDemonstrativo();
/**
* @return mixed
*/
public function getInstrucoes();
/**
* @return mixed
*/
public function getLocalPagamento();
/**
* @return mixed
*/
public function getNumero();
/**
* @return mixed
*/
public function getNumeroDocumento();
/**
* @return mixed
*/
public function getNumeroControle();
/**
* @return mixed
*/
public function getAgenciaCodigoBeneficiario();
/**
* @return mixed
*/
public function getNossoNumero();
/**
* @return mixed
*/
public function getNossoNumeroBoleto();
/**
* @return mixed
*/
public function getEspecieDoc();
/**
* @param int $default
* @param int $tipo
*
* @return mixed
*/
public function getEspecieDocCodigo($default = 99, $tipo = 240);
/**
* @return mixed
*/
public function getAceite();
/**
* @return mixed
*/
public function getCarteira();
/**
* @return mixed
*/
public function getCarteiraNome();
/**
* @return mixed
*/
public function getUsoBanco();
/**
* @return mixed
*/
public function getStatus();
/**
* @return mixed
*/
public function alterarBoleto();
/**
* @return mixed
*/
public function baixarBoleto();
/**
* @return mixed
*/
public function alterarDataDeVencimento();
/**
* @param $instrucao
*
* @return mixed
*/
public function comandarInstrucao($instrucao);
/**
* @return mixed
*/
public function getComando();
/**
* Método onde qualquer boleto deve extender para gerar o código da posição de 20 a 44
*
* @param $campoLivre
*
* @return array
*/
static public function parseCampoLivre($campoLivre);
/**
* @return mixed
*/
public function getMostrarEnderecoFichaCompensacao();
}
|
چکیده انگلیسی
The aim of this paper is to present the new theory called “inductive game theory”. A paper, published by one of the present authors with A. Matsui, discussed some part of inductive game theory in a specific game. Here, we present a more entire picture of the theory moving from the individual raw experiences, through the inductive derivation of a view, to the implications for future behavior. Our developments generate an experiential foundation for game theory and for Nash equilibrium.
مقدمه انگلیسی
1.1. General motivations
In game theory and economics it is customary to assume, often implicitly and sometimes explicitly, that each player has well formed beliefs/knowledge of the game he plays. Various frameworks have been prepared for explicit analyses of this subject. However, the more basic question of where a personal understanding of the game comes from is left unexplored. In some situations such as parlour games, it might not be important to ask the source of a player’s understanding. The rules of parlour games are often described clearly in a rule book. However, in social and economic situations, which are main target areas for game theory, the rules of the game are not clearly specified anywhere. In those cases, players need some other sources for their beliefs/knowledge. One ultimate source for a player’s understanding is his individual experiences of playing the game. The purpose of this paper is to develop and to present a theory about the origin and emergence of individual beliefs/knowledge from the individual experiences of players with bounded cognitive abilities.
People often behave naturally and effectively without much conscious effort to understand the world in which they live. For example, we may work, socialize, exercise, eat, sleep, without consciously thinking about the structure of our social situation. Nevertheless, experiences of these activities may influence our understanding and thoughts about society. We regard these experiences as important sources for the formation of individual understanding of society.
Treating particular experiences as the ultimate source of general beliefs/knowledge is an inductive process. Induction is differentiated from deduction in the way that induction is a process of deriving a general statement from a finite number of observations, while deduction is a process of deriving conclusions with the same or less logical content with well-formed inference rules from given premises. Formation of beliefs/knowledge about social games from individual experiences is typically an inductive process. Thus, we will call our theory inductive game theory, as was done in Kaneko and Matsui (1999). In fact, economic theory has had a long tradition of using arguments about learning by experiences to explain how players come to know the structure of their economy. Even in introductory microeconomics textbooks, the scientific method of analysis is discussed: collecting data, formulating hypotheses, predicting, behaving, checking, and updating. Strictly speaking, these steps are applied to economics as a science, but also sometimes, less scientifically, to ordinary peoples’ activities.
Our theory formalizes some part of an inductive process of an individual decision maker. In particular, we describe how a player might use his experiences to form a hypothesis about the rules and structure of the game. In the starting point of our theory, a player has little a priori beliefs/knowledge about the structure of the particular game. Almost all beliefs/knowledge about the structure of the particular game are derived from his experiences and memories.
A player is assumed to follow some regular behavior, but he occasionally experiments by taking some trials in order to learn about the game he plays. It may be wondered how a player can act regularly or conduct experiments initially without any beliefs or knowledge. As mentioned above, many of our activities do not involve high brow analytical thoughts; we simply act. In our theory, some well defined default action is known to a player, and whenever he faces a situation he has not thought about, he chooses this action. Initially, the default action describes his regular behavior, which may interpreted as a norm in society. The experimental trials are not well developed experiments, but rather trials taken to see what happens. By taking these trials and observing resulting outcomes from them, a player will start to learn more about the other possibilities and the game overall.
The theory we propose has three main stages illustrated in Fig. 1: the (early) experimentation stage; the inductive derivation stage; and the analysis stage. This division is made for conceptual clarity and should not be confused with the rules of the dynamics. In the experimentation stage, a player accumulates experiences by choosing his regular behavior and occasionally some alternatives. This stage may take quite some time and involve many repetitions before a player moves on to the inductive stage. In the inductive derivation stage he constructs a view of the game based on the accumulated experiences. In the analysis stage, he uses his derived view to analyze and optimize his behavior. If a player successfully passes through these three stages, then he brings back his optimizing behavior to the objective situation in the form of a strategy and behaves accordingly.In this paper, we should stop at various points to discuss some details of each of the above stages. Since, however, our intention is to give an entire scenario, we will move on to each stage sacrificing a detailed study of such a point. After passing through all three stages, the player may start to experiment again with other behaviors and the experimentation stage starts again. Experimentation is no longer early since the player now has some beliefs about the game being played. Having his beliefs, a player may now potentially learn more from his experiments. Thus, the end of our entire scenario is connected to its start.
While we will take one player through all the stages in our theory, we emphasize that other players will experiment and move through the stages also at different times or even at the same time. The precise timing of this movement is not given rigorously. In Section 7.2 we give an example of how this process of moving through these stages might occur. We emphasize that experiments are still infrequent occurrences, and the regular behavior is crucial for a player to gain some information from his experiments. Indeed, if all players experiment too frequently, little would be learned.
We should distinguish our theory from some approaches in the extant game theory literature. First, we take up the type-space approach of Harsanyi (1967), which has been further developed by Mertens and Zamir (1985) and Brandenburger and Dekel (1993). In this approach, one starts with a set of parameter values describing the possible games and a description of each player’s “probabilistic” beliefs about those parameters. In contrast, we do not express beliefs/knowledge either by parameters or by probabilities on them. In our approach, players’ beliefs/knowledge are taken as structural expressions. Our main question is how a player derives such structural expressions from his accumulated experiences. In this sense, our approach is very different.
Our theory is also distinguished from the behavioral game theories that fall under the terms of evolution/learning/experiment (cf., Weibull, 1995, Fudenberg and Levine, 1993 and Kalai and Lehrer, 1993; and more generally, Camerer, 2003) and the case-based decision theory of Gilboa and Schmeidler (1995). The behavioral game theories are typically interested in adjustment/convergence of actions to some equilibrium. They do not address questions on how a player learns the rules/structure of the game. Behavioral game theorists focus on the “rules of behavior”, i.e., “strategies”. Case-based decision theory looks more similar to ours. This theory focuses on how a player uses his past experiences to predict the consequences of an action in similar games. Unlike our theory, it does not discuss the emergence of beliefs/knowledge on social structures.
Rather than the above mentioned literature, our theory is reminiscent of some philosophical tradition on induction. Both Bacon (1589) and Hume (1759) regard individual experience as the ultimate source of our understanding nature, rather than society. Our theory is closer to Bacon than Hume in that the target of understanding is a structure of nature in Bacon, while Hume focussed on similarity. In this sense, the case- based decision theory of Gilboa and Schmeidler (1995) is closer to Hume. Another point relevant to the philosophy literature is that in our theory, some falsities are inevitably involved in a view constructed by a player from experiences and each of them may be difficult to be removed. Thus, our discourse does not give a simple progressive view for induction. This is close to Kuhn’s (1964) discourse of scientific revolution (cf. also Harper and Schulte, 2005 for a concise survey of related works).
1.2. Treatments of memories and inductive processes
Here, we discuss our treatment of memory and induction in more detail. A player may, from time to time, construct a personal view to better understand the structure of some objective game. His view depends on his past interactions. The entire dynamics of a player’s interactions in various objective games is conceptually illustrated in the upper figure of Fig. 2. Here, each particular game is assumed to be described by a pair View the MathML source(Γ,m) of an n-person objective extensive game ΓΓ and objective memory functionsView the MathML sourcem=(m1,…,mn). Different superscripts here denote different objective games that a player might face, and the arrows represent the passing of time. This diagram expresses the fact that a player interacts in different games with different players and sometimes repeats the same games.We assume that a player focuses on a particular game situation such as View the MathML source(Γ1,m1), but he does not try to understand the entire dynamics depicted in the upper diagram of Fig. 2. The situation View the MathML source(Γ1,m1) occurs occasionally, and we assume that the player’ behavior depends only upon the situation and he notices its occurrence when it occurs. By these assumptions, the dynamics are effectively reduced into those of the lower diagram of Fig. 2. His target is the particular situation View the MathML source(Γ1,m1). In the remainder of the paper, we denote a particular situation View the MathML source(Γ1,m1) under our scrutiny by View the MathML source(Γo,mo), where the superscript “o” means “objective”. We use the superscript i to denote the inductively derived personal view View the MathML source(Γi,mi) of player i about the objective situation View the MathML source(Γo,mo).
The objective memory function View the MathML sourcemio of player i describes how the raw experiences of playing ΓoΓo are perceived in his mind. We refer to these memories as short-term memories and presume that they are based on his observations of information pieces and actions while he repeatedly plays ΓoΓo. The “information pieces” here correspond to what in game theory are typically called “information sets”, and they convey information to the player about the set of available actions at the current move and perhaps some other details about the current environment. Our use of the term “piece” rather than “set” is crucial for inductive game theory and it is elaborated on in Section 2.
An objective short-term memory View the MathML sourcemio(x) for player i at his node (move) x consists of sequences of pairs of information pieces and actions as depicted in Fig. 3. In this figure, a single short-term memory consists of three sequences and describes what, player i thinks, might have happened prior to the node x in the current play of ΓoΓo. In his mind, any of these sequences could have happened and the multiplicity may be due to forgetfulness. We will use the term memory thread for a single sequence, and memory yarn for the value (“set of memory threads”) of the memory function at a point of time.One role of each short-term memory value View the MathML sourcemio(x) is for player i to specify an action depending upon the value while playing ΓoΓo. The other role is the source for a l ong-term memory, which is used by player i to inductively derive a personal view View the MathML source(Γi,mi).
The objective record of short-term memories for player i in the past is a long sequence of memory yarns. A player cannot keep such an entire record; instead, he keeps short-term memories only for some length of periods. If some occur frequently enough, they change into long-term memories; otherwise, they disappear from his mind. These long-term memories remain in his mind as accumulated memories, and become the source for an inductive derivation of a view on the game. This process will be discussed in Section 3.
The induction process of player i starts with a memory kit, which consists of the set of accumulated threads and the set of accumulated yarns. The accumulated threads are used to inductively derive a subjective game ΓiΓi, and the yarns may be used to construct his subjective memory function View the MathML sourcemi. This inductive process of deriving a personal view is illustrated in Fig. 4.In this paper, we consider one specific procedure for the inductive process, which we call the initial-segment procedure. This procedure will be discussed in formally in Section 4.
1.3. The structure of the present paper
This paper is divided into three parts:
Part I: Background, and basic concepts of inductive game theory. Sections 1, 2 and 3. Section 1 is now describing the motivation, background, and a rough sketch of our new theory. We will attempt, in this paper, to give a basic scenario of our entire theory. The mathematical structure of our theory is based on extensive games. Section 2 gives the definition of an extensive game in two senses: strong and weak. This distinction will be used to separate the objective description of a game from a player’s subjective view, which is derived inductively from his experiences. Section 3 gives an informal theory of accumulating long-term memories, and a formal description of the long-term memories as a memory kit.
Part II: Inductive derivation of a personal view. Sections 4, 5 and 6. In Section 4, we define an inductively derived personal view. We do not describe the induction process entirely. Rather, we give conditions that determine whether on not a personal view might be inductively derived from a memory kit. Because we have so many potential views, we define a direct view in Section 5, which turns out to be a representative of all the views a player might inductively derive (Section 6).
Part III: Decision making using an inductively derived view. Section 7, 8 and 9. In this part, we consider each player’s use of his derived view for his decision making. We consider a specific memory kit which allows each player to formulate his decision problem as a 11-person game. Nevertheless, this situation serves as an experiential foundation of Nash equilibrium. This Nash equilibrium result, and more general issues of decision making, are discussed in Sections 7 and 8.
Before proceeding to the formal theory in Section 2, we mention a brief history of this paper and the present state of inductive game theory. The original version was submitted to this journal in January 2006. We are writing the final version now two and a half years later in July 2008. During this period, we have made several advancements in inductive game theory, which have resulted in other papers. The results of the present paper stand alone as crucial developments in inductive game theory. Nevertheless, the connection between the newer developments and this paper need some attention. Rather than to interrupt the flow of this paper, we have chosen to give summaries and comments on the newer developments in a postscript presented as Section 9.3.
نتیجه گیری انگلیسی
We have given a discourse of inductive game theory by confining ourselves to clear-cut cases. It would be, perhaps, appropriate to start this section with comments on our discourse. Then we will discuss some implications for extant game theory.
9.1. Comments on our discourse
We have made particular choices of assumptions and definitions for our discourse. One important methodological choice is to adopt extensive games in the strong and weak senses for objective and subjective descriptions. First, we will give some comments on this choice, and then, we will discuss the definition of an inductively derived view given in Section 4 based on the initial segment procedure.
As pointed out in Section 4, an extensive game contains observable and unobservable elements. The nodes with the successor relation are unobservable for the players and even for the outside observer, in which sense those are highly hypothetical. The components in a memory kit are all observables and actually observed. Thus, our definition of the inductive derivation of a personal view from a memory kit extends the observed observables by adding hypothetical elements. This may be interpreted as an “inductive” process of adding unobservable elements to observed data. However, this freedom of adding hypothetical elements leads us a proliferation of possible views. To prevent this proliferation, we need some criterion to choose a view from many possible ones. In this paper, we have used the concept of a g-morphism (game theoretical p-morphism) to choose a smallest one.
Conceptually speaking, the choice of a personal view is supposed to be done by a player, rather than us. While the definition of an inductive derivation allows many views, a player cannot construct a large one because of his bounded cognitive ability. Thus, the criteria of smallness and constructiveness are important from this point of view. The direct view defined in Section 5 has a constructive nature as well as being a smallest one for a given memory kit. In this sense, the direct view has a special status among those possible views.
Nevertheless, Definition 4.1 may admit no inductively derived views for a given memory kit, as characterized by Theorem 5.1. In fact, the initial segment procedure adopted in Definition 4.1 still gives a strong restriction on the addition of hypothetical elements. If we allow more freedom in using hypothetical elements in an inductive derivation, we could avoid the nonexistence result. For example, if we allow a player to add “nature nodes” to his personal view, we could even avoid the use of an extensive game in the weak sense. On the other hand, this creates vast arbitrariness in inductive derivations; and we expect serious difficulties in finding natural criteria to narrow down the use of “nature nodes”. Until we find natural criteria, we should refrain from the cheap use of “nature nodes”.
The above conclusion may sound negative to any extension of our definition of an inductive derivation, but we have different opinions. We could actually have a more general procedure to construct a personal view than the initial segment procedure. Since this paper is intended to provide an entire scenario, we have chosen the initial segment procedure as a clear-cut case. In separate papers, we will discuss less restrictive definitions. See Section 9.3.
Another comment should be given on the choice of extensive games. In fact, we can avoid the adoption of extensive games; instead, the present authors (Kaneko and Kline, in press-a) have developed a theory of information protocols, which avoids the use of nodes and describes game situations directly in terms of information pieces and actions together with a history–event relation. If we adopt this theory, then we could avoid a proliferation of personal views generated by the use of hypothetical nodes. In the theory of information protocols it may be easier to discuss extensions of inductive derivations. One reason for our adoption of extensive games here is their familiarity within our profession. The choice of extensive games makes the distinction between observables and unobservables explicit, which is another reason for our choice.
We expect gradual developments of inductive game theory to come about by deeper analysis and alternative approaches to the various stages mentioned in the diagram of Fig. 1. By such gradual developments, we may find natural criteria for steps such as the use of nature nodes, and some experimental tests of inductive game theory.
9.2. Some implications to extant game theory
It is a main implication of our discourse that a good individual view on society is difficult to construct from the experiential point of view: there are many places for a player to get stuck in his inductive process and analysis process. Nevertheless, we gave a characterization theorem of Nash equilibrium in Section 7. Here, we discuss some other implications to extant game theory and economics chiefly with respect to Nash equilibrium.
There are various interpretations of Nash equilibrium (cf. Kaneko, 2004, Act 4). Nash (1951) himself described his concept from the viewpoint of purely ex ante decision making, but in economic applications, it is typically more natural to interpret Nash equilibrium as a strategically stable stationary state in a recurrent situation. The characterization given in Section 7 is along this line of interpretations, including also ex ante decision making in a player’s constructed personal view.
To reach Nash equilibrium, which may not be the case, it takes a long time. Also, the process of trial and error may not allow all possible available actions. The Nash equilibrium reached should be regarded as a Nash equilibrium in the game with respect to the actually experienced domains. Thus, the characterization of Nash equilibrium in Section 7 should not merely be interpreted as a positive result. It means that the characterization would be obtained if all those processes go through well and if reservations about restrictions on trials are taken into account.
From the same point of view, the subgame perfect equilibrium of Selten (1975) involves even deeper difficulties from our experiential point of view, which was already pointed out in Kaneko and Matsui (1999). The reason is that subgame perfection requires higher order experimentations. When one player deviates from his regular behavior, other players in turn need, again, to make experimentations from regular behavior. This second or higher order experimentation is already problematic and violates some principles discussed in the informal theory in Section 3.2. In fact, a similar criticism is applied to Nash equilibrium, as already stated. Nash equilibrium itself is regarded as one limit notion, and subgame perfection is a higher limit one.
Taking the above criticism seriously, one important problem arises. The complexities, in a certain sense, of an inductively derived view as well as of experimentations are measured and restricted. In the epistemic logic context, Kaneko and Suzuki (2005) introduced the concept contentwise complexity, which measures “contentwise complexity” of a single instance of a game. This notion can be converted to our inductive game theory. Then, we will be able to give restrictions on individual views as well as experiments. In this manner, our inductive game theory will be developed in the direction of “bounded rationalities”.
We have restricted our attention to the purely experiential sources. In our society, usually, we have different sources of beliefs/knowledge such as from other people or through education. These suggest that a player may get more beliefs/knowledge on the social structure, but do not suggest that he can guess other people’s thinking, which has usually been assumed in the standard game theory (cf., Harsanyi, 1967 for incomplete information game and Kaneko, 2002 for the epistemic logic approach). At least, the assumption of common knowledge is far beyond experiences. If we restrict interpersonal thinking to very shallow levels, deductive game theory may have some connections to inductive game theory (cf. Kaneko and Suzuki, 2002 for such a direction of deductive game theory).
9.3. Postscript
By now, several new developments along the line of the scenario given in this paper have been made in Kaneko and Kline, 2007a, Kaneko and Kline, 2007b and Kaneko and Kline, 2008 and Akiyama et al. (in press). We use this postscript section to present some small summaries of those papers to help the reader catch up to the present state of inductive game theory.
The main concern of Kaneko and Kline (2007) is the size of an inductively derived view for a player with bounded cognitive abilities. If the objective situation is too large, a player may have difficulty: (1) analyzing it strategically; and (2) accumulating enough experiences to have a rich view. The premise of that paper is that the number of experiences and the size of a view must be small for it to be managed by a player. The concept of “marking” some parts and actions as important was introduced in that paper and shown to be successful in allowing a player to obtain a manageable, though potentially biased, view.
As already mentioned in Section 9.1, Kaneko and Kline (2007b) introduced a new construct called an “information protocol”, based on “actions” and “information pieces” as tangible elements for each player rather than hypothetical non-tangible concepts such as nodes. This approach gives a more direct and simpler description of a game situation from the perspective of a player. It has another merit to classify extensive games in a more clear-cut manner. With an appropriate choice of axioms, it fully characterizes an extensive game in the weak and strong senses. It also enables us to avoid g-morphisms, since we have no multiplicity in i.d.views caused by hypothetical nodes and branches. The theory of information protocols has been adopted in our more recent research including Kaneko and Kline (2008).
Kaneko and Kline (2008) took up that task of constructing i.d.views with more partiality in a players memory. Accordingly, the definition of an i.d.view had to be weakened to admit a view. By these generalizations, the induction becomes less deterministic and we meet some multiplicity of consistent views with a given set of memories. The interactions between a player’s i.d.view, his future behavior, and future views become the topics of this paper and also serve as potential sources for resolving the multiplicity problem.
Finally, Akiyama et al. (in press) took a computer simulation approach in order to look into the process of experiencing and memorizing experiences in a one-person problem called “Mike’s bike commuting”. That paper tries to clarify the informal theory of behavior and accumulation of memories discussed in Section 3.2 of this paper. The simulation approach is based on finite experiences and accumulations of memories. The use of “marking” introduced in Kaneko and Kline (2007a) was found to be crucial for obtaining a rich enough view.
These developments are, more or less, consistent with the scenario spelled out in this paper and give more details into each step in the basic scenario. We are presently continuing our research along those lines making progress into experiential foundations of beliefs/knowledge on other players’ thinking. |
Ever wanted to see a wrestling plumber? No, not a son of a plumber like “The American Dream” Dusty Rhodes, an actual plumber who wrestles in full plumber outfit! Neither did we!
Memphis Wrestling veteran “Dirty White Boy” Tony Anthony was chosen to portray that character but it wasn’t for long till he was basically reduced to being a jobber for the stars. What a surprise… Then when they finally got rid of the T.L. Hopper gimmick, they brought Tony back as Uncle Cletus, heel manager of the Godwinns, a character that almost made our list too, but ultimately didn’t.
13. Bastion Booger
Let’s get something straight, I absolutely love this gross & obnoxious character and was disappointed that Booger was only on WWF TV for a little more than 6 months, but does that make it any less of a crappy gimmick? Obviously not.
In fact it was sooooo bad, it was good again 😂
Bastion Booger was veteran Mike Shaw, better known as Norman The Lunatic in WCW, an asylum inmate managed by Teddy Long, who later became Trucker Nor, as if someone gave a lunatic a drivers license for Trucks. But hey, this is only a list of 25 so there’s not enough space to include those as well.
Bogger’s entrance theme song consisted of sounds of farts & burps and more often than not he was seen eating food on his way to the ring, which he ate in a very disgusting way. Enough said!
Most Old Schoolers remember the finish of the Halloween Havoc 1995 PPV, where The Dungeon of Doom attacked Hulk Hogan, who had just lost his WCW World Heavyweight Championship against The Giant (The Big Show).
You either saw it back in 1995 when it happened or on WCW VHS or later on when WWE used it several times in their highlight videos on Youtube, but those who haven’t, have certainly watched the PPV on the WWE Network by now.
When The Dungeon was already beating up The Hulkster, The Yeti came out, but – who could’ve exptected that? – looked more like a mummy than an actual Yeti.
The infamous double bear-hug by The Giant and The Yeti must have really hurt Hogan badly …
This crappy gimmick was portrayed by 7’1.5″ Ron Reis, who eventually became known as Raven’s Flock member Reese, but not before he turned the Yeti character into The Super Giant Ninja. |
Chromatographic retention-activity relationships for prediction of the toxicity pH-dependence of phenols.
An investigation of the use of the chromatographic retention (log k) as an in vitro approach for modeling the pH-dependence of the toxicity to Guppy of phenols is developed. A data set of 19 phenols with available experimental toxicity-pH data was used. The importance of the mechanism of toxic action (MOA) of phenols was studied. log k data at three pH values were used for the phenols classification and two groups or 'MODEs' were identified. For one 'MODE' a quantitative retention-activity relationship (QRAR) model was calculated. Finally, the model was used to assess the toxicity to Guppy of phenols at different pH values. The results of this investigation suggest that chromatographic retention data allows fish toxicity modeling, in the 5.5-8 pH range of interest. |
Q:
WebSphere MQ Transactional Log file system full
Transactional log file system(/var/mqm/log) become full and i am getting MQRC 2102 resource problem with Queue Manager while attempting client connection to this queue manager. What course of action we can do to resolve this?
LogPrimaryFiles=2
LogSecondaryFiles=8
LogFilePages=16384
LogType=CIRCULAR
LogBufferPages=0
LogPath=/var/mqm/log/QMGRA/
LogWriteIntegrity=TripleWrite
Is adding additional disk space to /var/mqm/log is the only solution?
I have few queues that were full,but queue storage file system were only 60% used.
Please give me some ideas on this.
A:
Log file pages are 4096 bytes each so a setting of LogFilePages=16384 results in log files extents of 64MB each. With a setting of LogPrimaryFiles=2 and LogSecondaryFiles=8 there can be up to 10 log files for a total of 640MB. If the file system that the circular logs resides on is less than this amount, it may fill up.
The optimum solution here is to increase the size of the log file disk allocation to something a little larger than the log file extents require. If that is not possible or you need a temporary fix then it is necessary to change the size of the log file requirement by reducing the number of extents and restarting the QMgr. Note that you can adjust the number of log extents but not the size of the extents. If it becomes necessary to change the LogFilePages=16384 parameter then it is necessary to rebuild the QMgr.
The number and size of of extents represents the total amount of data that can be under syncpoint at once but 640MB is generous in most cases. In terms of time, it also limits the longest possible duration of a unit of work on an active QMgr. This is because an outstanding transaction will be rolled back if it happens that the head pointer in the log file ever overtakes the tail pointer. For example, suppose a channel goes into retry. This holds a batch of messages under syncpoint and holds that log extent active. As applications and other channels perform their normal operations, additional transactions drive the head pointer forward. Eventually all extents will be used, and although there may be very few outstanding transactions the oldest one will be rolled back to free up that extent and advance the tail pointer forward. If the error log shows many transactions are rolled back to free log space then you really would need to allocate more space to the log file partition and bump the number of extents.
|
Q:
Linker Command failed while Archieving
I'm using a third-party framework which helps me to connect a device(Frameworks device). I'm getting
MySignalsConnectKit' was built without full bitcode. All frameworks
and dylibs for bitcode must be generated from Xcode Archive or Install
build for architecture armv7 clang: error: linker command failed with
exit code 1 (use -v to see invocation)
error while trying to achieving. I can successfully build. I searched it but still can't solve the problem. Thank you!
A:
Problem is probably because your third-party framework wasn't built with bitcode. If your application is archived with "Enable bitcode: YES" than all your frameworks must be built with bitcode also. Try to change it to NO, it may help. But then your archive will not contain bitcode. Better would be to get MySignalsConnectKit built with bitcode and use that build instead of one without bitcode.
|
World View & Market Commentary. Forest first; Trees second. Focused on Real & Knowable facts that filter through the "experts" fluff and media hyperbole. Where we've been, what the future may hold and developing a better way forward.
Nov. 7 (Bloomberg) -- The International Monetary Fund said traders are probably using the dollar to fund “carry trades” across the world and the currency may still be overvalued even after its slide this year.
“There are indications that the U.S. dollar is now serving as the funding currency for carry trades,” the IMF said in a report published today. “These trades may be contributing to upward pressure on the euro and some emerging economy currencies.” While the dollar “has moved closer to medium-run equilibrium,” it is still “on the strong side.”
With investors able to borrow at near-zero interest rates in the U.S., some economists are concerned that markets may become distorted as traders plough those funds into riskier assets. Nouriel Roubini, the economist who forecast the financial crisis in 2006, said Nov. 4 that investors are milking the “mother of all carry trades.”
The MSCI All-Countries World Index has gained about two- thirds since March and sugar has soared 90 percent this year. The dollar has dropped 13 percent against a basket of currencies from its major trading partners in the past seven months.
The “carry trade” is not just in U.S. dollar arbitrage, it’s straight out central bankers funneling trillions of dollars to banks outside of the United States. It’s absolutely intentional. So why talk down the dollar? Could it be that they don’t want to see the dollar appreciate? Uh, huh, thought so.
Here’s a word to the world’s central bankers – You debt pushing whack jobs are not fooling anyone but yourselves! Your schemes are widely known and becoming more widely known by the day. You do not control the markets, you can only manipulate them for so long. Your fall will be cheered by the masses, get your bunkers ready, you’ll probably need them, and it will be your just reward for running with the Devil… |
total eye care with spf15
SPF eye cream conceals dark circles. Retexturize to help reduce the appearance of puffiness and fine lines with skin-smoothing alpha hydroxy acids and plant extracts. Optical light diffusers help diminish dark circles and a chemical-free sunscreen helps to shield against further damage.
Although there is no standard for establishing a gluten-free designation for topical skin care products, independent laboratory testing confirms that this formula surpasses the US FDA (Food and Drug Administration) ingestible standards and can therefore be considered gluten-free.
gluten-free
Formulated without animal-derived ingredients
vegan
Formulated without artificial fragrances and colors
no artificial fragrances and colors
Formulated without Parabens
paraben-free
Certified cruelty-free by Leaping Bunny and PETA
cruelty-free
benefits
Chemical-free SPF helps prevent further UV damage.
Helps reduce puffiness and fine lines.
Optical light diffusers help minimize dark circles.
how to use
After cleansing in the morning, gently pat around the entire eye area, blending inward from the outer corner.
Dermalogica is dedicated to maintaining the accuracy of the ingredient lists on this website. However, because ingredients are subject to change, we cannot guarantee that these lists are complete, up-to-date and/or error-free. For an accurate listing of ingredients in each product, please refer to your product packaging.
how it works
All Dermalogica products are made in the USA and are free of artificial fragrances, artificial colors, drying S.D. alcohol, and ingredients like Mineral Oil – all of which are known to exacerbate common skin concerns. With cutting-edge formulas and powerful ingredients, you can be assured you’re giving your skin what it needs to be healthy, and stay healthy, for a lifetime. Maximize your product results! Use Dermalogica products as prescribed by your Face Mapping® skin analysis, available only from a Dermalogica Professional Skin Therapist.
The best eye cream ever!
I have used Total Eye Care for more than 20 years and I will never stop. It does wonders for dark circles, puffiness, and protecting the eye area against sun damage and fine lines.
Loyal Dermalogica Fan
Portland, OR
2018-10-27
true
Good product
5
Use it every morning, before I go anywhere. It keeps my skin safe.
Alyssa
Israel
2018-10-02
true
bring it back!
4
the only eye treatment with SPF. light and protective. bring it back!
DermaQueen
New York, NY
2018-05-11
true
Have mix feeling
3
For some reason when it dries looks like it's crumbling, even when I add just a little pea size. I wear it alone.
Daniel
Boston, MA
2018-02-20
false
Highly Recommended
5
The shimmer...the coverage...I love it!
Marva
San Diego, CA
2017-10-29
true
Best
5
Best
Ela
Newyork
2017-10-06
true
Excellent
5
This eye cream is excellent! it makes applying under eye concealer much smoother and has really brightened my under eye
kprice
lancaster, pa
2017-04-25
true
Great product
5
Great product, doesn't burn my skin like other products from other companies do for spf's do. This is great. Would recommend this.
A friend
Seaside, California
2017-04-01
true
Favorite product in my regimen!
5
Total Eye Care really works. My pores clog so easily and I get those little white bumps under my eyes. I used this product for a week under my eyes and skipped the makeup. The bumps went away!
Stephanie
Camarillo, CA
2017-03-22
true
Fantastic!
5
Been using this for a week now and already my dark circles are starting to disappear - and that's with being very tired. Bought in a tester pack and will definitely be buying a full tube.
Zoë
Glasgow
2017-03-16
true
33
4.684
94.0
what's considered eye area? my eyeliner always runs on my lower lash line and I've been told this may be because i'm applying my eye cream incorrectly.
Thanks!
Amber
Amber
2018-10-04
Hello,
Thank you for your interest in Dermalogica. Please apply it to the under eye area, like in the eye socket and crows feet area.
Thanks
2018-10-05
Bernadette
Can I use this on my eye lids? What tone is it?
Ellen
2018-08-27
Hello,
Thank you for your interest in Dermalogica. Please do not use on eyelids. It is a rather light shade.
Thanks
2018-09-10
Bernadette
Is this product tinted for light, medium, or dark skin?
Pam
2018-07-09
Hello,
Thank you for your interest in Dermalogica. The tint is for light to medium skin.
Kind Regards,
Bernadette
2018-07-09
Bernadette
Can this product be used by all skin tones?
JRJ
2018-07-02
Hello,
Thank you for your interest in Dermalogica. Though it is tinted, it blends well into the skin. Fair, medium and medium deep skin tones can use it.
Kind Regards,
Bernadette
2018-08-03
Bernadette
Is this product safe to use for someone who has sensitive skin? And if not what product would you recommend instead?
Lola
2018-05-15
Hello,
Thank you for your interest in Dermalogica. Yes, for best results apply to the orbital bone only, and not to the eye line.
Kind Regards,
Bernadette
2018-05-16
I have been using this product for a while but I found out recently I was expecting. Can I continue to use this cream during the pregnancy?
MP
2017-12-30
Hello, yes this is safe to use.
2018-01-03
Is this safe during pregnancy
Marianne Ribeiro
2017-11-17
Hello Marianne,
Thank you for your interest in Dermalogica. This product does not contain retinol or Salicylic Acid. Therefore, it is safe to use during pregnancy.
Kind Regards,
Bernadette
2017-11-17
Hi can we still it at night if we want to?
Wen
2017-11-08
Hello,
Thank you for your interest in Dermalogica. You can use this in the morning and use Intensive Eye Repair at night.
Kind Regards,
Bernadette
2017-11-10
Hi must we apply an eye cream before applying Total eye care?
Yvonne
2017-11-08
Hi Yvonne,
Thank you for your interest in Dermalogica. This is your single eye cream step. You can use it alone.
Kind Regards,
Bernadette
2017-11-08
Is the non chemical sunscreen zinc oxide ?
Amy
2017-10-05
Hello Amy,
Thank you for your interest in Dermalogica. Yes. This contains a physical (not chemical) SPF. For your reference, the full ingredient list is at the bottom of the product page.
Kind Regards,
Bernadette |
Q:
How to use jq to output JSONL (one independent JSON object per line)
My request sounds trivial but I could not find a way to do it. I have as input an array of JSON objects:
[
{
"foo": 1,
"bar": 2
},
{
"foo": 3,
"bar": 4
},
(...)
]
and I want as output the JSONL version of the same, aka one object per line, not an array:
{ "foo": 1, "bar": 2 }
{ "foo": 3, "bar": 4 }
(...)
This is not the same as using --compact-output, as that would preserve the array and give me:
[ { "foo": 1, "bar": 2 }, { "foo": 3, "bar": 4 }, (...) ]
Thank you in advance.
A:
The answer to the original question is to use the filter .[] together with the -c command-line option:
$ jq -c '.[]'
|
A Fellow Traveler in God's Kingdom
A Chilly Baptism in a Country Church
I have been serving as pulpit supply at a very small church outside of Hodgenville, KY (attendance between 25-30) for the past few weeks. Yesterday, we had a baptism.
The church does have their own baptistery, which I was thankful for, but they do not have a working hot water heater. Instead, they attempted to heat the water Saturday afternoon and Sunday morning with an electric hot water heater stick. I’ve seen this done before, but never trusted the method. How is sticking a metal rod into a pool of water pumped full of electrical current a good idea?
The baptismal candidate was a lady named Jessica. She is a 30-something women, wife, mother of three, who had made a decision to follow Jesus this past summer.
As I was getting ready before the service, I stuck my finger into the water to test the temperature and was shocked to find it was freezing cold.
I asked the good ol’ boy Deacon, brother Danny, who had filled and “heated” the tank about the temperature and he said that he was giving it all he had. He sounded like Mr. Scott from Star Trek making excuses for the USS Enterprise. The hot water heater was not working and the heat stick wasn’t making a dent.
The verdict was simple: this baptism was going to be very, very, very cold.
When it was our time in the service, I slowly stepped down into the tank. The cold water nearly took my breath away. I was supposed to go down into the water while the church members were meeting and greeting. The water was so cold that I had to cut the fellowship time short, because I was going into hypothermia.
When I got everyone’s attention by rudely shouting, “Hey, let’s wrap it up,” everyone started to get the picture. I was freezing and the poor baptismal candidate hadn’t even got into the water yet.
When I invited Jessica to join me in the tank, my teeth started chattering together. I could sense my inner core pulling body heat from my extremities. You feel this tightening in your chest because your body is preparing to freeze to death. “Push through it,” “don’t stop” was racing through my mind.
I introduced Jessica and asked her two questions to confirm her public profession of faith and then turned to get ready to baptize her. I could see the fear in her eyes. She knew how cold this was going to be.
When she came up from the water, she audibly gasped for air. You could hear her all through the church. I can’t imagine how cold she was. And of course, we Baptist don’t believe in dipping or sprinkling, she had to get all wet, all dunked, all immersed.
As we both rushed out of the baptistery area, I could HEAR her shivering. You know that sound of repeated quaking and trembling. And she wasn’t alone. I was barely able to keep my teeth from crashing in to one another.
As I rushed into the men’s restroom to change, I knew it was over but I was still so cold. I didn’t get feeling back into my feet until nearly the end of the message. There might have been fire in my heart while I was preaching, but there were ice-blocks on my feet.
Poor Jessica, even now in dry clothes and back in the pews, she still had wet hair and was shivering the whole message.
At the end of the service, we invited her and her family to come up to the front to present her with a baptismal certificate and a new Bible. I also invited the church to come and pray for this family as Jessica grows in her new found faith. I thought the laying on of hands might warm her up a bit.
All in all, I will never forget this chilly baptism in a small country church in the middle of December. I felt like I had returned to the pioneer days with winter baptisms down in the local creek.
Post navigation
2 thoughts on “A Chilly Baptism in a Country Church”
Must of been the day for it…Dee had to do it TWICE at Main Street this past Sunday…both services. Imagine the anticipation of doing it over again on the same day. Love you brother and so pleased that God is continuing His powerful move through you. |
1. Field of the Invention
The present invention relates to a multi-point spot welding machine controller.
2. Description of the Prior Art
Spot welding machines are commonly used in mechanical manufacturing industry. Normally, two workpieces, such as two zinc-plated steel sheets, are connected by a spot welding procedure comprising the following steps: firstly, clamping the two workpieces by two electrodes; secondly, applying electrical power through the two electrodes resulting in a low voltage and high current to pass through two welding points of the two workpieces; thirdly, stopping applying electrical power to the electrodes yet retaining the two electrodes to clamp the two workpieces for a specific time period; fourthly, releasing the two electrodes from the two workpieces. For multi-point spot welding, a working person has to repeat the above procedure from one welding point to another welding point thus wasting time. Several multi-point spot welding machines are commercially available, yet while these machines provide synchronous welding to a number of welding points at the same time, they also consume a great deal of electricity in a short time period. These machines can not operate properly in a working site where the electricity supply is not great enough. Moreover, the great amount of electricity applied on the workpiece will cause high temperature thereon and damage the outer surface of the zinc-plated steel sheet thus resulting in zinc molecules forming a zinc film to cover the electrodes. In this situation the conductivity of the electrodes is decreased and lowers the welding effect of the welding machine. It is requisite to provide a multi-point spot welding controller to synchronously/asynchronously control a multi-point spot welding machine to connect two workpieces without resulting in the above problems. |
Background
==========
Transcription factors (TFs) control and mediate cellular responses to environmental stimuli through sequence-specific interactions with *cis*regulatory DNA elements within the promoters and enhancers of their target genes, thus directing the expression of those genes in a coordinated manner. Because of the importance of TFs and their DNA binding sites in targeting gene regulation, numerous studies have aimed to identify the DNA binding specificities and target genes of these regulatory factors. *Saccharomyces cerevisiae*is one of the most extensively studied eukaryotic organisms and has served as an important model in understanding eukaryotic transcriptional regulation and regulatory networks \[[@B1],[@B2]\]. Computational approaches, including phylogenetic footprinting \[[@B3],[@B4]\], sequence analysis of sets of functionally related genes \[[@B5]\], and analysis of co-expressed groups of genes \[[@B6]\], as well as experimental approaches, including *in vivo*chromatin immunoprecipitation (ChIP) followed by microarray readout (ChIP-chip) \[[@B7]\], protein binding microarrays (PBMs) \[[@B8]-[@B11]\], and *in vitro*mechanically induced trapping of molecular interactions (MITOMI) \[[@B12]\], have sought to determine and catalog the DNA binding specificities of *S. cerevisiae*TFs.
Recently, several studies \[[@B10]-[@B12]\] have examined at high resolution (that is, at the level of \'*k*-mer\' binding site \'words\') the *in vitro*DNA binding preferences of a large number of *S. cerevisiae*TFs. These studies used high-throughput *in vitro*techniques (PBM or MITOMI) to measure the DNA binding specificities of TFs for all possible 8-bp DNA sequences (8-mers), and used the resulting data to derive DNA binding site motifs. In addition to the comprehensive nature of the *in vitro*data reported in these studies (that is, covering all possible 8-mers), these data reflect the direct DNA binding preferences of the tested TFs; in contrast, ChIP data sometimes reflect indirect DNA binding of the immunoprecipitated TF by recruiting TFs \[[@B13]\]. The *in vitro*data reported in these studies are complementary to ChIP data, in that the *in vitro*data provide higher-resolution measurements of DNA binding preferences compared to ChIP (8 bp versus hundreds of base pairs, respectively) and they test the intrinsic DNA binding specificity of a TF in the absence of any protein co-factors or competitors (such as other TFs or nucleosomes).
There is substantial overlap among the sets of TFs tested in the *in vitro*studies. Badis *et al.*\[[@B10]\] and Zhu *et al.*\[[@B11]\] report PBM data for 112 and 89 TFs, respectively, with data for 64 TFs reported by both studies. Fordyce *et al.*\[[@B12]\] report MITOMI data for 28 TFs, 20 of which also have PBM data reported by either Badis *et al.*or Zhu *et al.*Despite the large overlap among these studies, a comprehensive comparison, evaluation and integration of these different data sets has been lacking. Where DNA binding site motifs have been reported in several studies, in most cases the motifs agree across the studies, but it is unclear which motif would be best to use, such as for prediction of putative TF binding sites.
Here, we analyzed the existing *in vitro*DNA binding specificity data from prior studies \[[@B10]-[@B12]\] and complemented those data with new PBM data for 27 DNA-binding proteins, with the goal of creating a single, curated resource of comprehensive DNA binding specificity data for *S. cerevisiae*TFs. We analyzed a total of 150 TFs, 90 of which have now been tested in at least two different studies. For each TF we report both its optimal DNA binding site motif that we selected from the four surveys (evaluated according to several criteria, including concordance with *in vivo*data) and the corresponding DNA binding specificity measurements for all 8-mer DNA sequences.
This curated collection allowed for an in-depth investigation of the DNA binding specificities within an important eukaryotic family of TFs (the basic leucine zippers, or bZIPs), resulting in novel findings of plasticity in TF-DNA recognition. We found that the newly characterized *VHT1*regulator (VHR) TFs (Vhr1 and Vhr2) recognize bZIP-like DNA motifs, while the bZIP TF Hac1 recognizes a motif highly similar to the canonical E-box motif of basic helix-loop-helix (bHLH) TFs. We also observed that 39 of the 150 yeast TFs in our curated list have distinct primary and secondary motifs, likely corresponding to different modes of binding DNA and potentially different regulatory functions. Thus, our results illustrate how one can take advantage of the comprehensive nature of the *in vitro*DNA binding specificity data in our curated collection to identify novel structural and gene regulatory features of TF-DNA interactions. These comprehensive data will allow for more accurate computational analysis of gene regulatory networks and directed experimental investigations of their predicted target genes and regulatory roles, as well as more in-depth structural studies of TF-DNA specificity determinants.
Results and discussion
======================
Curated collection of high-resolution *in vitro*DNA binding data for *S. cerevisiae*TFs
---------------------------------------------------------------------------------------
We compiled *in vitro*DNA binding specificity data from three prior large-scale studies \[[@B10]-[@B12]\] (Tables S1 and S2 in Additional file [1](#S1){ref-type="supplementary-material"}) and complemented them with newly generated universal PBM data for 27 TFs (see below), with the goal of generating the most up-to-date and comprehensive resource of *in vitro*DNA binding site motifs (Additional file [2](#S2){ref-type="supplementary-material"}) and corresponding high-resolution DNA binding data, represented here as measurements of DNA binding specificity for all possible 8-bp sequences (Additional file [3](#S3){ref-type="supplementary-material"}). Briefly, the relative binding preference for each 8-mer on universal PBMs is quantified by the PBM enrichment score (E-score) \[[@B14]\]. The E-score is a modified form of the Wilcoxon-Mann Whitney statistic and ranges from -0.5 (least favored sequence) to +0.5 (most favored sequence), with values above 0.35 corresponding, in general, to sequence-specific DNA binding of the tested TF \[[@B8]\]. We used the 8-mer data to compute DNA binding site motifs using the Seed-and-Wobble algorithm \[[@B8],[@B15]\]. For each TF we ranked all the 8-mers according to their E-scores and chose the highest scoring 8-mer as a seed to construct a primary motif. The PBM data were then analyzed to determine if there are spots of high signal intensity that do not score well by the primary motif; the 8-mer data were then analyzed to derive a secondary motif that does explain the residual binding to the DNA microarray probes. The set of 8-mers represented by a secondary motif can be of similar affinity as those of the primary motif, or can be of distinctly lower affinity \[[@B16]\]. We note that the E-scores we report for 8-mer seeds of secondary motifs are based on the initial ranking of all 8-mers and thus are directly comparable with the E-scores reported for primary motif 8-mers. Secondary motifs derived from PBM data are unlikely to be attributable to a motif-finding artifact, and TF binding to secondary motifs has been confirmed by electrophoretic mobility shift assay for six mouse TFs \[[@B16]\]. Supporting results from a recent PBM survey of 104 mouse TFs \[[@B16]\], we observed that 39 of the 150 yeast TFs in our curated list recognize distinct primary and secondary DNA motifs (discussed in detail in a separate section in the Results and discussion). We analyzed in detail one of these 39 TFs, Sko1, and found that both the primary and secondary motifs are utilized *in vivo*and that they are potentially associated with different regulatory functions of Sko1 (discussed in detail later in the Results and discussion).
Specifically, to complement the existing *in vitro*DNA binding data for *S. cerevisiae*TFs, we tested 155 proteins on universal PBMs \[[@B8]\]. Unlike previous studies, which focused on known and predicted TFs based on the presence of known sequence-specific DNA-binding domains (DBDs), our criteria for including candidate regulatory proteins were permissive and included many proteins without well-characterized DBDs and proteins for which we had low confidence in their being potential sequence-specific, double-stranded DNA binding proteins; thus, we did not expect many of these proteins to yield highly specific DNA binding sequences typical of TFs, but we tested them nevertheless in an attempt to obtain the most comprehensive TF DNA binding specificity collection possible. We also included proteins for which the existing *in vitro*data were of low quality or did not agree with previous literature (for example, Ste12, Ecm22). Of the 155 proteins attempted on universal PBMs, 27 resulted in sequence-specific DNA binding. In total, our collection encompasses 150 TFs, 90 of which have been examined in at least two different studies (Tables S3 in Additional file [1](#S1){ref-type="supplementary-material"} and Additional file [4](#S4){ref-type="supplementary-material"}). For each of these 90 TFs, we chose the highest quality motif based on the agreement between the motif and other *in vitro*binding data, the enrichment of the motif in ChIP-chip data \[[@B7]\], and the quality of the raw 8-mer data used to generate the motif (Additional file [1](#S1){ref-type="supplementary-material"}). The enrichment of a motif in a ChIP-chip data set was expressed as an area under the receiver operating characteristic (ROC) curve (AUC); an AUC of 1 corresponds to perfect enrichment, while an AUC of 0.5 corresponds to the enrichment of a random motif. The selected DNA binding site motifs for the 150 TFs (represented as position weight matrices (PWMs)) are available in Additional file [2](#S2){ref-type="supplementary-material"} with the source of each motif specified in Table S3 in Additional file [1](#S1){ref-type="supplementary-material"}.
For most TFs analyzed here, the motifs reported in different studies look very similar, but are not equally enriched in the ChIP-chip data. For example, the Cin5 motifs reported in this study, Badis *et al.*\[[@B10]\], and Fordyce *et al.*\[[@B12]\] are very similar (Figure [1](#F1){ref-type="fig"}a), but their AUC enrichment in the Cin5_YPD ChIP-chip data \[[@B7]\] is 0.89, 0.88, and 0.81, respectively; thus, we chose the Cin5 motif newly reported in this study. For other TFs, the motif reported in one study is a truncated version of the motif reported in a different study, as illustrated in Figure [1](#F1){ref-type="fig"}b for Cst6; in this case, we chose the DNA binding site motif reported in this study because it better matches TGACGTCA, the known site for the ATF/CREB family of bZIP TFs \[[@B17]\], of which Cst6 is a member. There are also a few TFs for which the motifs reported in different studies do not match, as shown in Figure [1](#F1){ref-type="fig"}c for Ecm22; in this case we turned to the existing literature and found that Ecm22 (and its close paralog Upc2) bind to the sterol regulatory element (SRE; TCGTATA) \[[@B18]\], which clearly matches the motif reported in this study, but not the motif reported by Badis *et al.*\[[@B10]\]. Overall, no single study clearly outperformed the other studies in terms of quality of the reported motifs (Additional file [4](#S4){ref-type="supplementary-material"}).
![**Selecting DNA binding site motifs for our curated collection**. **(a)**The *in vitro*motifs for TF Cin5 are very similar, but not equally enriched in the ChIP-chip data (see main text). **(b)**The Cst6 *in vitro*motif reported by Badis *et al.*\[[@B10]\] is a truncated version of the Cst6 motif reported in this study. The latter better matches TGACGTCA, the known site for the ATF/CREB family of bZIP TFs, of which Cst6 is a member. **(c)**For TF Ecm22 we selected the motif obtained in this study (which is different from the motif previously reported by Badis *et al.*\[[@B10]\]). The selected motif matches the sterol regulatory element TCGTATA, which had been reported to be bound by Ecm22 (and also its close paralog, Upc2). N/A, not available in Fordyce *et al.*\[[@B12]\].](gb-2011-12-12-r125-1){#F1}
We also compared the curated, *in vitro*DNA binding site motifs against motifs derived from the *in vivo*ChIP-chip data of Harbison *et al.*\[[@B7]\], which were available for 85 TFs (Table S5 in Additional file [1](#S1){ref-type="supplementary-material"} and Additional file [5](#S5){ref-type="supplementary-material"}). In most cases, the *in vivo*and *in vitro*motifs are in good agreement, and we did not find that the *in vivo*motif explains the ChIP-chip data either better or worse than the *in vitro*motifs (data not shown). We did find, however, 15 TFs for which the *in vivo*and *in vitro*motifs are different (Figure [2](#F2){ref-type="fig"}; Additional file [6](#S6){ref-type="supplementary-material"}), typically because the TF profiled by ChIP does not bind DNA directly (in which case the motif of the mediating factor is recovered from the ChIP data), or alternatively because a motif of a co-factor is also enriched in the sequences bound by ChIP (and is reported as the ChIP-derived motif) (Additional file [6](#S6){ref-type="supplementary-material"}). For example, our analysis supports a model whereby Fhl1 binds DNA indirectly through a mediating factor, Rap1 \[[@B19]\], since the Fhl1 motif is not significantly enriched in the ChIP data whereas the Rap1 motif is, and the two TFs belong to different structural classes and thus are not anticipated to have similar DNA binding site motifs. In Figure [2](#F2){ref-type="fig"} we show the *in vitro*and *in vivo*motifs for Sok2 and Sut1, members of the HTH APSES and Zn~2~Cys~6~families, respectively. The Sok2 and Sut1 *in vitro*motifs are in excellent agreement with the PBM-derived motifs for the highly similar TFs Phd1 and Sut2, respectively, but are significantly different from the motifs derived from ChIP-chip data \[[@B7],[@B20]\]. As shown in Figure [2](#F2){ref-type="fig"}, both the PBM-derived motifs and the ChIP-derived motifs of Sok2 and Sut1 are significantly enriched in the ChIP-chip data. In such cases we conclude that the PBM-derived motifs reflect the direct DNA binding specificities of the TFs, while the ChIP-derived motifs may represent the DNA binding specificities of co-regulatory TFs (often belonging to different DBD structural classes) that bind *in vivo*to many of the genomic regions bound by the TFs profiled by ChIP. In total, we noticed discrepancies between *in vitro*and *in vivo*TF binding data for 15 of the 150 TFs in our curated list. These cases are discussed in detail in Additional files [1](#S1){ref-type="supplementary-material"} and Additional file [6](#S6){ref-type="supplementary-material"} and later in the Results and discussion section we present a thorough re-analysis of the *in vivo*ChIP-chip data of Harbison *et al.*\[[@B7]\] using our curated collection of *in vitro*motifs.
![**Examples of TFs for which the *in vitro*and *in vivo*DNA binding site motifs are different**. For both the *in vitro*and *in vivo*motifs of the three TFs we show their enrichment in the corresponding ChIP-chip data set, measured by the AUC and the associated *P*-value. We also show the *in vitro*motifs (from our curated collection) that are most similar to the *in vitro*and *in vivo*motifs of the three TFs of interest (the red lines indicate which parts of the motifs are similar). We notice that in all three cases the *in vivo*motifs are similar to the DNA binding site motifs of TFs from a different structural class. This suggests that in each of the three cases the *in vivo*motif (derived from ChIP-chip data) does not belong to the TF profiled by ChIP, but either to a co-regulatory TF (which binds a common set of targets as the profiled factor), or to a mediating TF (which binds DNA directly and mediates the interaction between the TF profiled by ChIP and the DNA - in this case we hypothesize that the TF tested by ChIP binds DNA indirectly thought the mediating TF). Motif sources from this study and Zhu *et al.*\[[@B11]\], Badis *et al.*\[[@B10]\], and MacIsaac *et al.*\[[@B20]\].](gb-2011-12-12-r125-2){#F2}
Comprehensive PBM data reveal new insights into the DNA binding specificities of bZIP and VHR TFs
-------------------------------------------------------------------------------------------------
Comprehensive data on the DNA binding specificities of TFs, such as PBM data, can reveal insights into the differences in DNA sequence preferences among TFs within the same structural class \[[@B21]-[@B25]\]. Here, we studied in detail eight bZIP DNA-binding proteins: five Yap (yeast AP-1) proteins and three additional bZIP proteins (Cst6, Gcn4, and Sko1) for which high-resolution PBM data are available (this study and Zhu *et al.*\[[@B11]\]). In Figure [3](#F3){ref-type="fig"}a, next to each DNA binding specificity motif logo we show the E-score of the 8-bp seed sequence used to construct the PBM-derived motif \[[@B8]\]. E-scores above 0.45 generally indicate highly preferred binding sequences.
![**bZIP and VHR TFs**. **(a)**Phylogeny and PBM-derived motifs for the eight bZIP and two VHR proteins analyzed in this study. The evolutionary tree was built from a ClustalW2 \[[@B59]\] multiple sequence alignment of the DBDs of the ten proteins, as annotated in UniProt \[[@B60]\]. Green and magenta backgrounds correspond to TFs that bind primarily to overlapping or adjacent half-sites, respectively. TFs that bind Yap-like half-sites are shown in red. TFs that bind Gcn4-like half-sites are shown in blue. All motif logos were generated using EnoLOGOS \[[@B58]\], based on motifs generated from PBM data in this study and Zhu *et al.*\[[@B11]\] using the Seed-and-Wobble algorithm \[[@B8],[@B15]\]. The numbers next to the motif logos represent the E-scores of the 8-mer seeds used to construct the motifs \[[@B8]\]. For proteins that bind both overlapping and adjacent half-sites, the motif corresponding to the largest seed E-score (sometimes referred to as the primary motif) is shown in a black box. **(b)**ClustalW2 multiple sequence alignment of the basic regions of bZIP proteins against the DBDs of VHRs. The Vhr1 and Vhr2 regions shown are the ones that best align to the eight basic regions considered, and they correspond to the first putative VHR basic region (see (e)). The residues shown in red and blue are important for YAP-like versus Gcn4-like half-site specificity. The residues shown in green and magenta are important for overlapping versus adjacent half-site binding. **(c)**Recognition of Yap-like and Gcn4-like half-sites \[[@B30],[@B61]\]. **(d)**Heat map of the DNA-binding preferences of Yap1 (as a representative of the Yap subfamily), Cst6, Sko1, Gcn4, Vhr1, and Vhr2. The rows correspond to 8-mers with an E-score ≥0.35 for any of the six TFs; the columns correspond to the TFs. The E-score scale is shown at the bottom. Black boxes indicate the 8-mers that correspond to various motifs (shown on the right). **(e)**Alignment of the full DBDs of Vhr1 and Vhr2. Residues that fold into alpha-helices (according to PSIPRED \[[@B62]\]) are shown in bold. Black boxes show the two putative basic domains in VHR proteins. **(f)**Alignment of the second putative VHR basic region to basic regions of the eight bZIPs analyzed in this study.](gb-2011-12-12-r125-3){#F3}
The bZIP DBD consists of two functionally distinct subdomains: the basic region (which makes specific DNA contacts) and the leucine zipper region (which is involved in dimerization) \[[@B26]\]. Proteins of this class homo- and heterodimerize, and typically bind either overlapping or adjacent TGAC half-sites, based on which bZIPs are often categorized into two subclasses: AP-1 factors that prefer the TGA(C\|G)TCA motif and ATF/CREB factors that prefer TGACGTCA \[[@B17]\]. The *S. cerevisiae*genome encodes 14 bZIP factors, 8 of which belong to the fungal-specific Yap subfamily \[[@B27]\] and bind overlapping or adjacent T**T**AC half-sites instead of T**G**AC half-sites. Our results on the DNA binding specificities of bZIP proteins largely agree with what has been reported previously based on ChIP data: Yap3, Yap4 and Yap6 prefer adjacent TTAC half-sites, Yap1 and Yap2 prefer overlapping TTAC half-sites \[[@B28],[@B29]\], and Gcn4 prefers overlapping TGAC half-sites \[[@B30]\]. Also in agreement with previous reports \[[@B17]\], we find that AP-1 bZIPs (Yap1, Yap2, and Gcn4), which generally prefer overlapping half-sites, bind to adjacent half-sites with almost equal affinity: the E-scores of the 8-bp seeds for the primary and secondary DNA binding site motifs of Yap1, Yap2, and Gcn4 are very close or even identical (Figure [3](#F3){ref-type="fig"}a). Previous reports also suggest that ATF/CREB bZIPs, which generally prefer adjacent half-sites, bind poorly to overlapping half-sites \[[@B17]\]. However, our high-resolution PBM data indicate that while this is true for Cst6, Sko1, Yap4, and Yap6, the TF Yap3 can also bind overlapping TTAC half-sites with high specificity (the seed E-score for the secondary Yap3 motif is 0.493, close to that of the Yap3 primary motif seed: 0.497). This finding suggests that, despite the fact that some of the residues important for half-site spacing specificity have been identified (Figure [3](#F3){ref-type="fig"}b; Additional file [1](#S1){ref-type="supplementary-material"}), it is not yet fully understood how these proteins achieve their specificity. It is possible that specific combinations of residues (not necessarily DNA-contacting residues) determine the preference for binding to overlapping versus adjacent half-sites.
Since the Yap family of bZIP proteins was first characterized \[[@B27]\], the basic region residues Gln9, Gln14, Ala16, and Phe17 (Figure [3](#F3){ref-type="fig"}b) have been reported to provide specificity for Yap-like half-sites (TTAC). However, we noticed that Sko1, a typical bZIP protein that binds to adjacent TGAC half-sites \[[@B31]\], also has a phenylalanine at position 17 of the basic region. Our high-resolution PBM data allowed us to analyze in more detail the specificity of Sko1 for TGAC versus TTAC half-sites. As shown in Figure [4](#F4){ref-type="fig"}, Sko1 does indeed have a higher preference for TTAC half-sites than do the typical bZIP proteins Gcn4 and Cst6. This finding confirms the importance of residue Phe17 for conferring Yap-like versus Gcn4-like half-site preference.
{#F4}
In addition to bZIP proteins, we analyzed PBM data for Vhr1 and Yer064c, members of the fungal VHR (*VHT1*regulator) class of DNA-binding proteins, for which only a single DNA consensus sequence had been reported previously \[[@B32]\]. The Yer064c protein sequence and its DNA binding specificity are very similar to those of Vhr1 (Figure [3](#F3){ref-type="fig"}), so we henceforth refer to Yer064c as Vhr2. Our PBM data indicate that these VHR proteins bind Gcn4-like motifs despite the fact that their DBD is of a different structural class. As shown in the dendrogram in Figure [3](#F3){ref-type="fig"}a, the DBDs of Vhr1 and Vhr2 are closely related to each other, but not to DBDs of bZIP proteins. Furthermore, in an alignment of the Vhr1 and Vhr2 DBDs against the basic regions of bZIP proteins (Figure [3](#F3){ref-type="fig"}b), it is apparent that essential DNA-contacting residues in the basic region of bZIPs (for example, Asn10, Arg18; Figure [3](#F3){ref-type="fig"}c) are not found in the VHR domain.
In an attempt to identify the DNA-contacting region in the VHR domain, we analyzed the protein sequences of Vhr1 and Vhr2 and found that these proteins have two putative basic regions, which we denote as b1 and b2 (Figure [3](#F3){ref-type="fig"}e). The second basic region seems to align better to the basic regions of bZIP proteins (Figure [3](#F3){ref-type="fig"}b) than does the first basic region, and it is also more conserved across *Saccharomyces*species in the *sensu stricto*clade (Figure [3](#F3){ref-type="fig"}f; Figure S1 in Additional file [1](#S1){ref-type="supplementary-material"}). These observations suggest that the second basic region in the VHR domain is more likely to be the one that interacts with DNA. Identifying the exact DNA-contacting residues and key specificity determinants will require further experimentation, involving mutagenesis experiments and structural analyses. It would be interesting to see whether VHR proteins contact DNA in a way similar to bZIPs or if they utilize a completely different structural mode of protein-DNA recognition.
We also note that VHR proteins bind exclusively to overlapping TGAC half-sites, unlike AP-1 proteins (including Gcn4), which can bind both overlapping and adjacent half-sites (Figure [3](#F3){ref-type="fig"}a,d). We are not aware of any AP-1 protein that binds exclusively to overlapping half-sites. As shown in Figure S2 in Additional file [1](#S1){ref-type="supplementary-material"} all AP-1 proteins with PBM data in UniPROBE can also bind adjacent half-sites, unlike VHR proteins. All this evidence indicates that VHR is a distinct DBD structural class, despite the fact that there is significant overlap between the DNA sequences preferred by VHR and bZIP proteins.
Yeast Hac1 is a bZIP TF whose specificity is more similar to bHLHs than bZIPs
-----------------------------------------------------------------------------
In the above analysis of bZIP factors, we did not include Hac1, an essential TF involved in the unfolded protein response in *S. cerevisiae*\[[@B33]\], for which high-resolution PBM data are available (this study and Badis *et al.*\[[@B10]\]). According to key residues in its DBD (Figure [5](#F5){ref-type="fig"}a, residues marked in blue), Hac1 is a bZIP factor that should bind either overlapping or adjacent TGAC half-sites. However, its primary PBM-derived motif, obtained using the full-length protein in PBM experiments, is most similar to an E-box, which is characteristic of bHLH proteins such as Cbf1 (Figure [5](#F5){ref-type="fig"}b). We note that Hac1 does not have a secondary DNA binding site motif that resembles a bZIP motif. Furthermore, its E-box motif appears to be utilized by Hac1 *in vivo*: this motif is significantly enriched in the Harbison *et al.*\[[@B7]\] Hac1_YPD ChIP-chip dataset (AUC = 0.6906, *P*= 0.005), while typical bZIP motifs (TGAsTCA and TGACGTCA) are not significantly enriched (*P*\> 0.1) in that same ChIP-chip dataset.
{#F5}
Visual inspection of the Hac1 DBD revealed a portion that aligns well to the basic regions of bHLH proteins, especially those of the human myogenic factor MyoD1 and its *Caenorhabditis elegans*ortholog HLH-1. Hac1 shares many of the DNA-contacting residues \[[@B22]\] with the myogenic bHLHs (Figure [5](#F5){ref-type="fig"}a). However, unlike the myogenic factors, which prefer the hexamers CACCTG and CAGCTG \[[@B34]\], Hac1 strongly prefers CACGTG; thus, we compared the DNA binding specificity of Hac1 with that of the *S. cerevisiae*TF Cbf1, which also strongly prefers CACGTG.
Although the motifs of Hac1 and Cbf1 are very similar, the 8-mer PBM data reveal that there are significant differences in their DNA binding specificities. Whereas Cbf1 has a strong preference for G or T upstream of the CACGTG core motif, Hac1 prefers A or C (Figure [5](#F5){ref-type="fig"}c). Similarly, while both Hac1 and Cbf1 bind CACGT with high affinity, Cbf1 strongly prefers CACGT(G\|T) to CACGT(A\|C) (Figure [5](#F5){ref-type="fig"}d). These differences in specificity are supported by the PBM data from Badis *et al.*\[[@B10]\], which show the same trends (Figure S3 in Additional file [1](#S1){ref-type="supplementary-material"}). Thus, despite the fact that the Hac1 and Cbf1 motifs look very similar, there are substantial differences in the DNA binding preferences of these two proteins, which likely contribute to their *in vivo*specificities. Indeed, all sequences bound by Cbf1 in a ChIP-chip experiment performed on yeast grown in rich medium (Cbf1_YPD) \[[@B7]\] contain (T\|G)CACGT, while only 4 of the 16 sequences bound by Hac1 in this same condition (dataset Hac1_YPD) contain this motif, and 2 of these 4 sequences also contain the (A\|C)CACGT motif that is preferred by Hac1 (Figure [5](#F5){ref-type="fig"}c). In conclusion, Hac1 seems to be a hybrid between a bHLH and a bZIP protein. Its DBD strongly resembles the domains of bZIP proteins, although part of its basic region shows strong similarity with the basic regions of bHLHs (Figure [5](#F5){ref-type="fig"}a); the similarity to bHLH proteins likely explains why it can bind an E-box motif. However, the DNA binding specificity of Hac1, as analyzed here by PBM, is not that of a typical bHLH protein. In-depth structural investigations of Hac1 and its homologs in other organisms would reveal whether its DNA-contacting residues are indeed the same as in bHLH proteins and might provide insights into the evolutionary relationship between bZIP and bHLH domains.
*S. cerevisiae*TFs with two distinct DNA binding site motifs
------------------------------------------------------------
Prior surveys have not investigated whether *S. cerevisiae*TFs recognize primary and secondary DNA binding site motifs, as do numerous mouse TFs \[[@B16]\]. We found that 39 of the 150 TFs in our curated list recognize two distinct motifs (Figure [6](#F6){ref-type="fig"}a; Figures S4 and S8 in Additional file [1](#S1){ref-type="supplementary-material"}). For 5 of the 39 TFs (Leu3, Lys14, Tea1, Ylr287c, and Zap1), the two motifs correspond to a full motif versus a single half-site; while this might be an artifact of Seed-and-Wobble, the algorithm used to compute the motifs from PBM data, the fact that TFs can bind DNA both as homodimers and as monomers is supported by results reported in a recent survey of mouse TFs using PBMs \[[@B16]\] and a recent survey of human TFs using an *in vitro*selection approach \[[@B35]\]. We note that for two TFs that have ChIP-chip data available (Leu3 and Zap1) \[[@B7]\], the full motif was more enriched than the half-site, which is consistent with the model that these TFs bind DNA *in vivo*as homodimers, at least in the conditions tested thus far by ChIP.
{ref-type="supplementary-material"} for details.](gb-2011-12-12-r125-6){#F6}
The remaining 34 TFs with secondary DNA motifs can be grouped into three categories, analogous to categories noted previously for mouse TFs \[[@B16]\]. We found five variable spacer length TFs (Gcn4, Pdr3, Yap1, Yap2, and Yap3), for which the primary and secondary motifs contain similar half-sites separated by different spacer lengths. For some of these TFs (Yap1 and Gcn4) the secondary motifs were bound nearly as well as the primary motifs, as illustrated by the fact that the 8-mer seeds for the two motifs have similar or identical E-scores (Figure [3](#F3){ref-type="fig"}). We found 24 cases of position interdependence TFs (Figure [6](#F6){ref-type="fig"}a; Figure S4 in Additional file [1](#S1){ref-type="supplementary-material"}). For each of these 24 TFs, the primary and secondary motifs share a common portion that typically spans three to five (often adjacent) nucleotide positions, but that are otherwise different. For example, the primary and secondary Ecm22 motifs share the core TCGT(A\|T), but the primary motif ends in TA(A\|G) while the secondary motifs ends in CCT. In such cases the primary and secondary motifs cannot be combined into a single PWM because the PWM model assumes independence between nucleotide positions. This implies that in order to accurately represent the DNA binding specificity of these TFs using standard PWM models, one has to consider both the primary and secondary motifs. The secondary motifs of five TFs were not readily explainable by either variable spacer length or position interdependence. These TFs, classified as alternative recognition interfaces, might bind DNA either through alternative structural features \[[@B36]\] of the DBD or by adopting alternative conformations.
Given the high number of TFs with secondary DNA motifs, we asked whether both modes of binding DNA are used *in vivo*and whether the primary and secondary motifs of a TF are associated with different regulatory functions. We first attempted to use the ChIP-chip data from the large-scale study of Harbison *et al.*\[[@B7]\] to address these questions. However, of the 34 TFs classified as variable spacer length, position interdependence, or alternative recognition interfaces, 12 TFs are not represented in the ChIP-chip data and for another 11 TFs neither the primary nor the secondary motif is enriched in the ChIP-chip data. Of the remaining 11 TFs, 5 have fewer than 30 bound sequences in the ChIP-chip data (for this analysis of primary and secondary motifs, we required a minimum of 30 bound sequences), and 6 TFs were tested only in rich medium although they are known to function in different cellular conditions. Thus, the ChIP-chip data of Harbison *et al.*\[[@B7]\] cannot be used to address the question of whether the primary and secondary motifs may be associated with different biological functions of the same TF. This question needs to be addressed for each TF individually using high-quality, high-resolution *in vivo*DNA binding data collected under cellular conditions where the TF is known to be active. While generating or compiling such data is beyond the scope of this paper, for one of the TFs with a secondary motif, Sko1, suitable ChIP-chip data were readily available and we analyzed them in detail (see below).
Primary and secondary DNA binding site motifs for TF Sko1 are associated with different regulatory functions
------------------------------------------------------------------------------------------------------------
When the *SKO1*gene was first cloned \[[@B31]\], it was reported to encode a bZIP protein that binds to the ATF/CREB motif (TGACGTCA) but that can also bind a slightly different site (ATGACGTACT) in the promoter region of *SUC2*(a sucrose hydrolyzing enzyme), acting as a repressor of *SUC2*transcription \[[@B31]\]. These two sites are perfect matches for the secondary and primary Sko1 motifs - TGACGTCA and ATGACGTA - respectively.
Recently, Ni *et al.*\[[@B37]\] analyzed the temporal DNA binding of several TFs involved in osmotic stress response in *S. cerevisiae*, including Sko1, by ChIP-chip on high-density oligonucleotide arrays. The ChIP-chip experiments were performed after incubation of the yeast in high salt concentration for 0, 5, 15, 30, and 45 minutes; for each time point, Ni *et al.*reported the regions bound by Sko1 at a false discovery rate of 0.01. Each bound region located within 1 kb of a gene was assigned to that gene \[[@B37]\]. We scored the regions bound by Sko1 *in vivo*according to the primary and the secondary motifs using the GOMER model \[[@B38]\], which computes the probability that a DNA sequence is bound by a TF with a particular PWM. Figure [6b](#F6){ref-type="fig"} shows a scatter plot of these scores for the regions bound by Sko1 *in vivo*after salt treatment for 5 minutes; we obtained similar results for other time points (data not shown). There are high-scoring regions for both the primary and the secondary Sko1 motifs, which suggests that both motifs are utilized *in vivo*.
Next, for the bound regions that score highly according to the primary motif but low according to the secondary motif (marked in red in Figure [6](#F6){ref-type="fig"}b), we performed a Gene Ontology (GO) annotation term enrichment analysis of the bound genes using FuncAssociate2 \[[@B39]\] and found significant enrichment (*P*\< 0.005; Additional file [1](#S1){ref-type="supplementary-material"}) for the categories hexose metabolic process, polysaccharide catabolic process, monosaccharide metabolic process, and carbohydrate metabolic process (Figure [6](#F6){ref-type="fig"}c). Similarly, we analyzed the ChIP-bound regions that score highly according to the secondary motif but low according to the primary motif (marked in blue in Figure [6](#F6){ref-type="fig"}b) and found that different GO categories were significantly enriched, including peroxidase activity, cellular response to oxidative stress, response to oxidative stress, and antioxidant activity (Figure [6](#F6){ref-type="fig"}d), which indicates that the secondary Sko1 motif is associated primarily with genes involved in oxidative stress. In addition to its critical role during osmotic stress response \[[@B37]\], Sko1 has also been shown to regulate genes encoding enzymes implicated in protection from oxidative damage \[[@B40]\]; our analysis suggests that Sko1 performs this function through its secondary DNA binding site motif. We also find that the Sko1 secondary motif may be used to regulate heat response genes, which suggests a novel regulatory function for this TF.
Sko1 is not the only TF that utilizes both the primary and the secondary motifs *in vivo*. Evidence from small-scale studies shows that Gcn4, which binds primarily to TGACTCA sites upstream of amino acid biosynthetic genes \[[@B41]\], also binds with high affinity to the secondary motif TGACGTCA and activates transcription through this site *in vivo*\[[@B42]\]. We anticipate that future in-depth analyses of high-quality ChIP-chip data, similar to the analysis we performed for Sko1, will show that many of the secondary DNA binding site motifs of yeast TFs are used *in vivo*, and that they are associated with different regulatory functions of the TF.
Predicted functions of the newly characterized TFs Vhr1 and Vhr2
----------------------------------------------------------------
We used the PBM data in a sequence-based promoter analysis as described previously \[[@B11]\] to predict target genes and biological roles for the newly characterized proteins (Additional file [7](#S7){ref-type="supplementary-material"}). Briefly, this method scores genes according to the presence of PBM-derived DNA binding sequences in their promoter regions; although the presence of a binding site sequence does not guarantee *in vivo*TF binding and regulation of the downstream gene, this analysis provides computational predictions of TF regulatory targets and associated biological functions. This analysis allowed us to make initial function predictions for two newly characterized proteins, Vhr1 and Vhr2, with poorly annotated functions. The top 200 predicted target genes of Vhr1, scored according to the PBM 8-mer data (Additional files [1](#S1){ref-type="supplementary-material"} and [8](#S8){ref-type="supplementary-material"}), are significantly enriched \[[@B39]\] (P_adj ≤ 0.001) for the GO categories small molecule biosynthetic process, small molecule metabolic process, and cofactor binding (Additional file [7](#S7){ref-type="supplementary-material"}), consistent with its previously discovered role in regulating *VHT1*(Vitamin H transporter) and *BIO5*in a biotin-dependent manner \[[@B32]\]. Additional, novel roles for Vhr1 are predicted for cellular nitrogen compound biosynthetic process and the biosynthesis and metabolism of arginine, glutamine, serine, and other amino acids (Additional file [7](#S7){ref-type="supplementary-material"}). Because of its highly similar DNA binding specificity, Vhr2 is also predicted to function in most of these same biological processes.
Gene expression data from a large microarray compendium containing 352 datasets from 233 published studies \[[@B43]\] lend additional support for a role of Vhr1 in amino acid and nitrogen-related biological processes. Using the SPELL search engine \[[@B43]\], we find that gene expression microarray experiments involving leucine \[[@B44]\] and histidine limitation \[[@B45]\] are among those ranking highest for Vhr1 differential gene expression. Additionally, when considering the 50 genes most similarly expressed as Vhr1 across all datasets, the significantly enriched GO terms (*P*\< 0.05, Bonferroni-corrected Fisher\'s exact test \[[@B43]\]) include cellular amino acid biosynthetic process and cellular nitrogen compound biosynthetic process; similar enrichment is observed for Vhr2. These amino acid-related roles for Vhr2 are further supported by its known physical interaction with Ape2p \[[@B46]\], a leucine aminopeptidase involved in the cellular supply of leucine from external substrates as well as in general peptide metabolism \[[@B47],[@B48]\]. Finally, we used the CRACR algorithm \[[@B49]\] to survey approximately 1,700 gene expression microarray data sets to identify conditions in which Vhr1 or Vhr2 are predicted to regulate their target genes, and found that the putative target genes of these TFs are predicted to be significantly induced under amino acid starvation and nitrogen depletion conditions (Additional file [9](#S9){ref-type="supplementary-material"}).
Inference of direct versus indirect TF DNA binding in ChIP-chip data
--------------------------------------------------------------------
ChIP-chip and ChIP-Seq data, which reflect genome-wide, *in vivo*TF DNA binding, are powerful approaches for determining what genomic regions are occupied by a TF *in vivo*and thus what target genes they might regulate. Although such ChIP data are often used to derive TF DNA binding site motifs, the reported binding sites and motifs may reflect the DNA specificity of multiprotein complexes in addition to, or instead of, direct DNA binding of the profiled factor. We re-analyzed the *S. cerevisiae in vivo*ChIP-chip data of Harbison *et al.*\[[@B7]\] using the *in vitro*motifs for 150 TFs to determine whether the factors profiled by ChIP bind DNA directly or indirectly \[[@B13]\]. For each ChIP data set we computed the enrichment of the 150 primary motifs and the 39 secondary motifs in the ChIP-bound versus the ChIP-unbound sequences, as described previously \[[@B13]\] and in the initial section of the Results and discussion. We consider a motif significantly enriched in a ChIP data set if it has an AUC ≥ 0.65 and an associated *P* -value ≤0.005 (based on randomizations of the motif) \[[@B13]\].
For each ChIP-chip data set, if either the primary or the secondary motif of the profiled TF was significantly enriched, then we conclude that the factor binds DNA directly. This was the case for 71 of the 167 examined ChIP-chip data sets. For 22 additional data sets the profiled TF was enriched, but its enrichment was just below our stringent significance criteria. We analyzed these sets more closely and similarly conclude that direct DNA binding of the profiled TFs is the most likely explanation for these 22 data sets (Additional file [10](#S10){ref-type="supplementary-material"}). For 33 ChIP-chip data sets, the motif of the profiled TF was not significantly enriched and only the motifs of TFs with different DNA binding specificities were significantly enriched. The most likely explanation for these data sets is indirect DNA binding of the profiled factor through one of the TFs whose motifs are significantly enriched. Thus, of the 167 ChIP-chip data sets for which high-resolution *in vitro*data were available for the profiled TF, roughly half (93) can be readily explained by direct DNA binding, about 20% can be explained by indirect DNA binding, while the remaining 41 data sets were not explained by any of the *in vitro*motifs, either because the set of motifs is still incomplete, or because the analyzed ChIP-chip data were too noisy, or because the profiled TF might bind DNA directly or indirectly through association with a variety of different motifs, no one of which is responsible for a significant fraction of the regions occupied *in vivo*.
Approaching a complete collection of TF DNA binding specificities in *S. cerevisiae*
------------------------------------------------------------------------------------
Because of our goal of identifying previously unknown TFs and our willingness to test even low-confidence predictions of potentially sequence-specific DNA binding proteins, our criteria for including candidate regulatory proteins in this study were permissive (that is, chromatin-associated proteins or proteins simply annotated as transcriptional regulatory protein) and thus included proteins that likely do not have sequence-specific DNA binding activity. Of the 92 proteins (out of 155 attempted) that did not belong to a well-characterized DBD family that we nevertheless assayed by PBM, only 2 (Msn1, Gcr1) resulted in sequence-specific DNA binding motifs. Several classes of proteins contain structural domains that have failed to yield sequence-specific DNA binding motifs in this study or any of the previous high resolution *in vitro*studies performed for *S. cerevisiae*or mouse proteins \[[@B10]-[@B12],[@B16]\]: bromodomain; c; FYVE; HhH-GPD; HHH; HTH_3; PHD; SAP; SIR2; SNF2_N; XPG_N; zf-CCCH; zf-CCHC; zf-DHHC; zf-MIZ; and zf-BED. Furthermore, both the CBFD_NFYB_HMF and Copper-fist domains have produced sequence-specific DNA binding motifs from *in vivo*ChIP-chip experiments \[[@B7],[@B20]\], but have failed to do so in any of the aforementioned *in vitro*studies, most likely due to the absence of protein partners or the necessary copper ion cofactor, respectively.
Of the 27 TFs whose DNA binding specificities were determined successfully by PBMs in this study, nine lacked prior high-resolution *in vitro*DNA binding data from universal PBM or MITOMI assays: Gcr1, Hmlalpha2, Mot3, Stp1, Sut1, Upc2, Vhr1, Vhr2, and Zap1 (Figure S5 in Additional file [1](#S1){ref-type="supplementary-material"} and Additional file [11](#S11){ref-type="supplementary-material"}). Vhr1 and Vhr2 are discussed in detail in an earlier section. Sut1, a member of the Zn~2~Cys~6~TF family, binds the motif AASTCCGA, which is in excellent agreement with the PBM-derived motif for the highly similar Zn~2~Cys~6~TF Sut2 \[[@B11]\], but differs significantly from a prior motif for Sut1 derived from *in vivo*ChIP-chip data \[[@B7],[@B20]\]. As discussed above, we conclude that the ChIP-derived motif represents the DNA binding specificity of a co-regulatory TF (the ChIP-derived Sut1 motif matches the motifs of the TFs Mig1, Mig2, and Mig3; Figure [2](#F2){ref-type="fig"}). For 13 of the 27 factors characterized in this study, PBM data have been reported previously by Badis *et al.*\[[@B10]\], and for 18 of the 27 factors MacIsaac *et al.*\[[@B20]\] reported DNA binding site motifs derived from ChIP-chip data \[[@B7]\]. However, when we computed the enrichment of our PBM-derived motifs and previously reported motifs in 17 ChIP-chip data sets where these factors were profiled \[[@B7]\], we found that in 13 of the 17 ChIP data sets the motif reported in this study was the most significantly enriched motif (Figure S5 in Additional file [1](#S1){ref-type="supplementary-material"}). Thus, the new PBM data reported in this study improve on and complement the existing high-resolution DNA binding specificity data, bringing us closer to the goal of obtaining a complete set of high-resolution DNA binding specificity data for all *S. cerevisiae*TFs.
Conclusions
===========
In this study, we present high-resolution *in vitro*DNA binding specificity data and motifs for 27 *S. cerevisiae*TFs, including some that contain a DBD for which no high-resolution motif had existed previously (for example, Vhr1 and Vhr2). These results contribute towards a complete set of high-resolution DNA binding specificity data for all TFs in this important model organism. In particular, our *in vitro*PBM analysis of *S. cerevisiae*TF DNA binding brings the set of known yeast TFs with high-resolution DNA binding specificity data to 150 (about 85%) out of a conservative total estimate of 176 TFs likely to have inherent sequence-specific, double-stranded DNA binding activity. With the addition of a more permissive set of 40 proteins (Additional file [12](#S12){ref-type="supplementary-material"}) that might exhibit DNA binding specificity (total of 216), this still brings us to at least 70% coverage of all *S. cerevisiae*TF DNA binding specificities. We note that these estimates may differ from previous studies because we refer strictly to TFs with intrinsic DNA binding specificity and do not include proteins that interact with DNA only indirectly.
In total, our curated collection contains high-resolution DNA binding data for approximately 85% of all known and likely sequence-specific DNA-binding proteins in *S. cerevisiae*. The remaining approximately 15% of sequence-specific *S. cerevisiae*DNA-binding proteins might require targeted investigation or specialized strategies in order to achieve complete coverage of high-resolution DNA binding specificity data for all *S. cerevisiae*TFs. We have identified 26 proteins that either are known TFs or have demonstrated lower resolution experimental data on their DNA binding specificity, or that contain a known sequence-specific DBD; we consider these proteins as the highest confidence candidates for future high-resolution *in vitro*PBM analysis (Additional file [12](#S12){ref-type="supplementary-material"}). Although most of these 26 proteins are from DBD classes with known sequence-specific DNA binding activity (bZIP, homeodomain, zinc cluster, copper-fist, bHLH), their previous failed attempts by *in vitro*methods may indicate that specific small-molecule cofactors and/or protein partners may be required for specific DNA binding \[[@B22]\]. Investigations of the effects of post-translational modifications on TFs might also reveal requirements for DNA binding specificity or conditions for modified DNA binding specificities.
Generation of a complete set of DNA binding specificity profiles for all *S. cerevisiae*TFs might also require experimental testing of proteins of even lower confidence, or to be identified by other criteria, for having potential sequence-specific DNA binding activity. Considering the set of all 222 proteins identified from previous TF candidate lists \[[@B7],[@B10],[@B11]\] and updated annotations in the *Saccharomyces*Genome Database \[[@B50]\], we identified 40 proteins (Additional file [12](#S12){ref-type="supplementary-material"}) either that contain putative nucleic acid binding domains (Myb; zf-C2H2) found in other proteins that exhibit sequence-specific DNA binding, or that are known to interact with DNA or to be involved in transcriptional regulation, but for which it is currently unknown if they bind DNA directly in a sequence-specific manner (we note that availability of a DNA binding site motif from ChIP-chip data cannot be considered evidence of direct DNA binding of the TF tested by ChIP, as some factors may bind DNA only indirectly as part of transcriptional regulatory complexes \[[@B13]\]). Several of these proteins belong to multisubunit complexes (for example, Hap2/3/4/5 complex) and may need to be examined for DNA binding specificity in the context of their protein partners \[[@B51]\]. We annotated a set of 156 proteins as unlikely (Additional file [12](#S12){ref-type="supplementary-material"}) to possess sequence-specific DNA binding activity since they either contain protein structural domains that have never successfully yielded a motif from this or prior large-scale *in vitro*surveys of TF DNA binding specificity, or interact with DNA indirectly, or lack prior literature evidence for direct sequence-specific DNA binding. Finally, in addition to traditional sequence-specific DNA binding site motifs, DNA structural motifs such as the recombination intermediates recognized by HU protein \[[@B52]\] or alterations in DNA helical twist angle patterns could be investigated.
Towards the goal of collating a complete set of *cis*-regulatory DNA sequences in *S. cerevisiae*, we performed a complementary analysis - that is, considering candidate regulatory elements not from a protein-centric viewpoint, but rather from the standpoint of putative *cis*-regulatory motifs. We collected 4,160 previously published *S. cerevisiae*DNA motifs (Additional file [13](#S13){ref-type="supplementary-material"}), including known TF binding site motifs and candidate regulatory motifs derived from ChIP and gene expression data (Additional file [1](#S1){ref-type="supplementary-material"}). Our goal was to identify \'orphan\' motifs, that is, those that do not match any known TF DNA binding site motifs. We identified 34 orphan motifs (Figure S6 in Additional file [1](#S1){ref-type="supplementary-material"}); comparisons to all TF DNA binding site motifs in the JASPAR, TRANSFAC, and UniPROBE databases \[[@B53]\] (Additional file [1](#S1){ref-type="supplementary-material"}) did not identify significant matches to known TF DNA binding site motifs containing DBDs not yet annotated as occurring in any *S. cerevisiae*genes. Some orphan motifs might correspond to novel TFs with DBDs not yet annotated in yeast, while others might represent weak matches to known TF binding site motifs for TFs that might be utilized only in specific cellular conditions, or in the presence of particular co-factors, or in the context of a limited number of *cis*regulatory regions. Alternatively, some of the orphan motifs may represent enriched DNA sequences without a transcriptional regulatory role, or may be artifactual motifs returned by various motif discovery algorithms. Directed experimentation will be required to distinguish among these different possible scenarios.
The high-resolution nature of the *in vitro*data that we compiled in this study allowed us to perform in-depth analyses of the DNA binding specificity of TFs, resulting in novel structural and gene regulatory insights, which would not have been possible using only the motifs reported in the literature from small-scale experiments that assay binding to only a subset of potential DNA binding sequences or from ChIP experiments. Our results suggest a number of structural studies that would be interesting to pursue to investigate distinct DNA binding specificities recognized either by an individual TF or different TF family members. For example, structural studies would aid in understanding how the bZIP protein Hac1 can bind E-boxes (typical of bHLH proteins) as well as the bZIP ATF/CREB motifs \[[@B54]\]. Similarly, structural studies of Upc2 would provide insights on how it (and its close paralog Ecm22) recognize the sterol response element (SRE; TCGTATA) \[[@B55]\], whereas most other members of the fungal-specific Zn~2~Cys~6~family recognize CG-rich binding sites primarily comprising CGG triplet half-sites separated by degenerate spacers of varying lengths \[[@B11]\]. It would also be interesting to determine how structurally distinct DBDs can recognize similar DNA sequences. Vhr1 and Vhr2 contain a relatively uncharacterized DBD for which no structural data are available from any species; it is not yet even known which amino acid residues in the Vhr1 DBD contact DNA. Our PBM data indicate many similarities in DNA binding specificity between the VHR class and members of the well-characterized bZIP family. Finally, the *in vivo*utilization of primary and secondary motifs for distinct biological functions by Sko1 suggests a novel gene regulatory mechanism, namely, the potential for different functions to be divided among distinct DNA binding sites in the genome for a particular TF. The extent of functionally distinct primary and secondary TF motifs would be interesting to investigate in higher eukaryotes in future studies.
In summary, this study expands our understanding of redundancy and divergence among TF family members from a structural standpoint and in terms of their regulatory functions. Moreover, this study brings us closer to, and outlines a set of priorities for, the complete characterization of TF-DNA interaction specificities in *S. cerevisiae*. The data presented here will be a valuable resource for further studies of transcriptional regulatory networks, and also for further investigations of protein-DNA recognition rules within different TF families. Such efforts in *S. cerevisiae*serve as a template for similar work aimed at cataloguing and completely characterizing TF DNA binding specificity in higher eukaryotic model organisms and in human. Ultimately, a complete compendium of human TF-DNA interaction specificity will involve cell- and tissue-specific, as well as disease-specific, interaction data that will provide invaluable details towards our understanding of development and disease.
Materials and methods
=====================
DNA binding specificity survey of *S. cerevisiae*TFs
----------------------------------------------------
Working towards the goal of obtaining high-resolution DNA binding specificities for essentially all *S. cerevisiae*TFs, we considered existing yeast TF clone collections as well as additional TFs that may have been missed or did not previously generate high-quality *in vitro*DNA binding specificity data. The proteins we examined in this study were largely derived from a collection consisting of both full-length ORF and DBD clones constructed in our prior, large-scale survey \[[@B11]\], plus a few additional clones either tested previously (Hap1, Stb4, Ylr278c) \[[@B10]\] or newly cloned by us (Ste12, Stb5, Vhr1). We selected 106 known or putative TFs that lacked high-resolution *in vitro*PBM data and 122 *S. cerevisiae*ORFs and DBDs for which we had lower confidence in their being potential sequence-specific, double-stranded DNA binding proteins; these proteins had only putative or hypothesized domains for binding double-stranded DNA, weak homology to DNA binding proteins, or literature references to potential DNA binding activity. Overall, from the combined set of 228 ORFs and DBDs, 155 were successfully cloned, expressed by *in vitro*transcription and translation (see below), and attempted on universal PBMs (Figure S7 in Additional file [1](#S1){ref-type="supplementary-material"}). Of these 155 proteins, we successfully obtained high-resolution DNA binding data for 27 TFs (Figure S5 in Additional file [1](#S1){ref-type="supplementary-material"} and Additional file [12](#S12){ref-type="supplementary-material"}). Of the 128 proteins that were unsuccessful, only 38 contained known sequence-specific DBDs (bZIP, bHLH, Homeobox, Myb, zf-C2H2, zf-GATA, Zn_clus; see Conclusions).
TF cloning and protein expression
---------------------------------
Full-length ORFs and/or DNA binding domains were either cloned into the Gateway pDEST15 (amino-terminal GST-tag) expression vector (Invitrogen, Carlsbad, CA, USA) by recombinational cloning from previously created pENTR clones \[[@B11]\] or were cloned by PCR amplification from genomic DNA and Gateway cloning into pDONR221 as described previously \[[@B56]\] (Additional file [14](#S14){ref-type="supplementary-material"}). All pDEST15 clones were end-sequence verified; the source clones from which these clones were derived were previously full-length sequence verified. Nineteen genes were from a previously published, non-Gateway clone collection \[[@B10]\]. All proteins were produced from purified plasmids by *in vitro*transcription and translation using the PURExpress^®^*In Vitro*Protein Synthesis Kit (New England Biolabs, Ipswich, MA, USA) according to the manufacturer\'s instructions. Glycerol was added to a final concentration of 38%, and proteins were stored at -20°C until further use. Western blots were performed for each protein to assess quality and to approximate protein concentration by visual inspection relative to a dilution series of a recombinant GST standard (Sigma-Aldrich, St. Louis, MO, USA), as described previously \[[@B11]\].
Protein binding microarray experiments and data analysis
--------------------------------------------------------
Custom-designed, universal \'all 10-mer\' microarrays were synthesized (AMADID \#015681, Agilent Technologies, Santa Clara, CA, USA) \[[@B21]\], converted to double-stranded DNA arrays by primer extension, and used in PBM experiments essentially as described previously \[[@B8],[@B15]\]. All newly reported PBM data in this study are from experiments performed either on a fresh slide or a slide that had been stripped exactly once \[[@B21]\]. Microarray scanning, quantification, and data normalization were performed using masliner (MicroArray LINEar Regression) software \[[@B57]\] and the Universal PBM Data Analysis Suite \[[@B15]\] as previously described \[[@B8],[@B15]\]. Determination of binding preferences for all 8-mers and derivation of associated DNA binding site PWMs were calculated using the Universal PBM Analysis Suite and the Seed-and-Wobble motif derivation algorithm \[[@B8],[@B15]\]. Acceptable quality of PBM data was assessed according to visual inspection of the Cy3 and Alexa488 scans of the microarrays, the seed 8-mer from Seed-and-Wobble having an E-score of at least 0.45 \[[@B21]\], and obtaining at least five 8-mers with E-scores ≥0.45 matching the derived motif. These filtration criteria are based on our extensive experience with PBM data sets in this and prior studies. Graphical sequence logos were generated from the obtained PWMs using enoLOGOS \[[@B58]\].
Compilation, processing, and annotation of TF DNA binding site motifs
---------------------------------------------------------------------
We compiled high-resolution TF DNA binding site motifs from four studies: 1) 27 PBM-derived motifs newly generated in this study; 2) 89 PBM-derived motifs from Zhu *et al.*\[[@B11]\]; 3) 110 PBM-derived motifs from Badis *et al.*\[[@B10]\]; and 4) 28 MITOMI-derived motifs from Fordyce *et al.*\[[@B12]\] (see Additional file [1](#S1){ref-type="supplementary-material"} for details). All 254 motifs were represented as PWMs. We trimmed all the motifs from both the 5\' and 3\' ends until two consecutive positions with information content ≥0.3 were reached. The motifs of TFs Cst6, Fkh1, Hcm1, Leu3, Rsc3, Ste12, Stp1, and Ydr520c were trimmed further after visual inspection. Next, we computed the AUC enrichment \[[@B13]\] of each motif in ChIP-chip data sets from the large-scale study of Harbison *et al.*\[[@B7]\]. We considered all ChIP-chip data sets with at least ten probes reported to be bound at *P*\< 0.001.
For the 90 TFs examined in at least two different large-scale studies, we compared the available *in vitro*DNA binding site motifs and chose the final motifs based on the quality of the *in vitro*data, the agreement between the *in vitro*motif and previously reported motifs for the same TF, and the enrichment of the motif in *in vivo*TF binding data \[[@B7]\] (see Additional file [1](#S1){ref-type="supplementary-material"} for details). The selected high-resolution DNA binding site motifs are available in Additional file [2](#S2){ref-type="supplementary-material"} and the source of each motif is specified in Additional file [5](#S5){ref-type="supplementary-material"}.
Secondary motifs were computed from the PBM data using the Seed-and-Wobble algorithm, as described previously \[[@B16]\]. Only secondary motifs for which the 8-mer seed had an E-score \> 0.48 (conservative threshold) were considered, to avoid selecting spurious secondary motifs. The selected 39 secondary motifs, trimmed as described above, are available in Additional file [2](#S2){ref-type="supplementary-material"}. For the comparison between *in vitro*and *in vivo*DNA binding site motifs, the *in vivo*motifs reported by MacIsaac *et al.*\[[@B20]\] were also trimmed, and their enrichment in the ChIP-chip data was computed as described previously \[[@B13]\].
ChIP-chip data analysis using PBM data
--------------------------------------
We analyzed ChIP-chip data from Harbison *et al.*\[[@B7]\] essentially as described previously \[[@B13]\]. We use the notation *TF_cond*to refer to the ChIP-chip experiment for transcription factor *TF*under environmental condition *cond*. We scored DNA sequences using a model similar to GOMER \[[@B38]\], but taking into account DNA accessibility, as described previously \[[@B13]\]. Briefly, we use the probability that a TF ***T***binds a DNA sequence ***X***to score every intergenic probe present on the microarrays used in the ChIP-chip experiments \[[@B7]\]. Using the sets of \'bound\' and \'unbound\' probes from each ChIP-chip experiment, and the probabilities that TF ***T***binds each of the probes, we compute the enrichment of the PBM-derived motif for TF ***T***in the ChIP-chip data by an AUC value. For each ChIP-chip experiment *TF_cond*we computed the AUC values of the 194 *in vitro*DNA binding motifs selected as describe above. We consider an AUC value significant if it is at least 0.65 and has an associated *P*-value ≤0.005 (that is, at most one of the 200 random motifs has an AUC value equal to or greater than the AUC value of the real motif).
Accession IDs
-------------
PBM 8-mer data reported in this paper for 27 TFs have been deposited in the NCBI Gene Expression Omnibus (GEO) database with Platform ID GPL6796 and Series ID GSE34306.
Abbreviations
=============
AUC: area under the receiver operating characteristic (ROC) curve; bHLH: basic helix-loop-helix; bZIP: basic leucine zipper; ChIP: chromatin immunoprecipitation; DBD: DNA-binding domain; E-score: enrichment score; GO: Gene Ontology; MITOMI: mechanically induced trapping of molecular interactions; ORF: open reading frame; PBM: protein binding microarray; PWM: position weight matrix; TF: transcription factor; VHR: *VHT1*regulator.
Authors\' contributions
=======================
RG conceived and performed analysis of PBM and ChIP-chip data, and structural analysis. KM performed cloning, protein expression, PBM experiments, and PBM data analysis. RPM developed software and together with KM performed analysis of functional category enrichment and gene expression data using PBM data. CZ performed cloning. AV performed protein expression and PBM experiments. MLB conceived of the study and supervised the research. KM, RG, and MLB wrote the manuscript. All authors read and approved of the manuscript.
Supplementary Material
======================
###### Additional file 1
**Detailed methods, additional figures, and additional tables**. Figure S1: ClustalW protein sequence alignment of Vhr1 and its homologs in *sensu stricto Saccharomyces*species. The alignment shows that the second putative basic region of Vhr1 is more conserved than the first basic region. Figure S2: unlike AP-1 bZIPs, Vhr1 and Vhr2 bind only to overlapping half-sites. **(a)**AP-1 bZIP transcription factors (Gcn4, Yap1, Jundm2, and the Fos-Jun heterodimer) and Vhr1 transcription factors (Vhr1 and Vhr2) bind to overlapping TGAC or TTAC half-sites. For each TF we sorted the 8-mers in decreasing order of their E-score, from 0.5 (highest affinity) to -0.5 (lowest affinity). The black lines show the 8-mers that contain TGACT (or TTACT for Yap1). **(b)**AP-1 factors (Gcn4, Yap1, Jundm2, and Fos-Jun) also bind to non-overlapping half-sites, while Vhr1 factors (Vhr1 and Vhr2) do not bind to non-overlapping half-sites. The black lines show the 8-mers that contain TGACGT (or TTACGT for Yap1). The PBM data were reported in Zhu *et al.*\[[@B11]\] (Gcn4, Yap1), Badis *et al.*\[[@B16]\] (Jundm2), Alibés *et al.*\[[@B76]\] (Jun-Fos), or this study (Vhr1 and Vhr2). Figure S3: comparison of the DNA binding specificities of Hac1 (both from this study and from Badis *et al.*\[[@B10]\]) against bHLH and bZIP TFs. **(a)**PBM-derived motifs for bZIP TF Hac1 match motifs of bHLH TFs better than motifs of bZIP TFs. **(b, c)**In-depth comparison of the DNA binding specificities of Hac1 and bHLH TF Cbf1. **(d)**In-depth comparison of the DNA binding specificities of Hac1 (this study) and two bZIP proteins that bind overlapping or adjacent TGAC half-sites: Gcn4 and Sko1, respectively. The scatter plots show the 8-mer E-scores. Figure S4: primary and secondary DNA binding site motifs derived from high-resolution *in vitro*PBM data. Figure S5: comparison of motif enrichment in ChIP-chip data for the 27 TF motifs reported in this study versus previously reported PBM-derived (Badis *et al.*\[[@B10]\]), ChIP-derived (MacIsaac *et al.*\[[@B20]\]), or MITOMI-derived (Fordyce *et al.*\[[@B12]\]) motifs for these 27 TFs (where available). Figure S6: *S. cerevisiae*orphan DNA binding site motifs. Figure S7: Schema of PBM experimental pipeline and results. A total of 228 ORFs/DBDs were considered in this study. Those lacking *in vitro*PBM data refers to initiation of this study in late 2008 after completion of our prior PBM survey (Zhu *et al.*\[[@B11]\]) and prior to publication of two more recent *in vitro*surveys (Badis *et al.*\[[@B10]\]; Fordyce *et al.*\[[@B12]\]). Table S1: TF DNA binding site motifs from the *in vitro*PBM data of Badis *et al.*\[[@B10]\]. Table S2: TF DNA binding site motifs from the *in vitro*MITOMI data of Fordyce *et al.*\[[@B12]\]. Table S3: TFs with curated high-resolution DNA binding site motifs derived from *in vitro*PBM data. The source of the selected motif (PWM) is indicated. Table S5: TFs with DNA binding site motifs reported by MacIsaac *et al.*\[[@B20]\] according to *in vivo*ChIP-chip data. TFs for which high-resolution *in vitro*motifs are also available are marked in boldface font. Table S8: TFs with secondary DNA binding site motifs identified from the curated set of high-resolution PBM data.
######
Click here for file
###### Additional file 2
**Data file S1**. Curated set of high-resolution DNA binding site motifs (PWMs) for 150 *S. cerevisiae*TFs. The file contains 150 primary motifs and 39 secondary motifs derived from PBM data.
######
Click here for file
###### Additional file 3
**Data file S2**. Curated high-resolution PBM data for 150 *S. cerevisiae*TFs, represented as E-scores for all ungapped 8-mers. These data correspond to the motifs provided in Additional file [2](#S2){ref-type="supplementary-material"} (that is, the E-scores in this data file and the PWMs in Additional file [2](#S2){ref-type="supplementary-material"} were generated from the same PBM experiments).
######
Click here for file
###### Additional file 4
**Table S4**. Comparison of high-resolution *in vitro*DNA binding site motifs for *S. cerevisiae*TFs.
######
Click here for file
###### Additional file 5
**Table S6**. Comparison of *in vivo*motifs (MacIsaac *et al.*\[[@B20]\]) and *in vitro*motifs (selected from this study, Zhu *et al.*\[[@B11]\], or Badis *et al.*\[[@B10]\]) for 150 *S. cerevisiae*TFs. TFs for which the *in vivo*and *in vitro*motifs are different are marked in red font.
######
Click here for file
###### Additional file 6
**Table S7**. Discrepancies between *in vivo*and *in vitro*motifs for *S. cerevisiae*TFs.
######
Click here for file
###### Additional file 7
**Table S9**. All over-represented functional categories of target genes for each TF examined in this study.
######
Click here for file
###### Additional file 8
**Data file S3**. Gapped and ungapped 8-mers with a PBM enrichment score of at least 0.35.
######
Click here for file
###### Additional file 9
**Table S10**. All significant specific conditions and condition categories from CRACR analysis for each TF examined in this study.
######
Click here for file
###### Additional file 10
**Table S11**. Predicted direct and indirect TF-DNA interactions.
######
Click here for file
###### Additional file 11
**Table S12**. DNA binding site motifs available for known or putative *S. cerevisiae*TFs.
######
Click here for file
###### Additional file 12
**Table S13**. Categorization of remaining *S. cerevisiae*potential sequence-specific DNA binding proteins. For each of the 222 yeast proteins below, we list: the systematic name (column A); standard name (column B); structural domain found within protein (column C); designation for sequence specific DNA binding ability, either Likely, Maybe or Unlikely (column D); description of protein from the *Saccharomyces*Genome Database, including additional literature references to experimental evidence for DNA binding consensus sequences, ChIP motifs or other relevant information (column E). Criteria used for categorizing likelihood of sequence-specific DNA binding for Likely category included having a well characterized sequence-specific DNA binding domain and/or experimental evidence for sequence-specific DNA binding involving direct contact with DNA molecule (as opposed to indirect binding mediated through another protein factor). The Maybe category included proteins that contain structural domains for which instances of sequence-specific DNA binding have been demonstrated in other proteins containing that domain. Additionally, literature evidence for DNA binding ability, though not determined if sequence specific, or directly contacting DNA, was also considered. Finally, the Unlikely category contains proteins with structural domains that have failed to produce sequence-specific DNA binding *in vitro*, or have ChiP motifs likely to be through indirect interactions with DNA, or completely lack literature evidence for sequence-specific DNA binding by direct contact with DNA.
######
Click here for file
###### Additional file 13
**Data file S4**. Collection of 4,160 previously published PWMs derived from *S. cerevisiae*TF-DNA binding and gene expression data.
######
Click here for file
###### Additional file 14
**Table S14**. List of the 27 *S. cerevisiae*TFs that successfully yielded PBM data in this study. For each TF the table shows: (A) SGD ID; (B) common gene symbol; (C) Pfam DBD class (if known); (D) clone type (full-length ORF or DBD alone); (E) the Gateway entry clone used; (F) nucleotide sequence of cloned insert; (G) amino acid sequence of cloned insert; (H) the expected molecular weight (kDa) for the GST fusion protein expressed; (I) estimated concentration of protein used on PBM experiment, based on Western blot visual examination. All proteins were expressed by *in vitro*transcription and translation.
######
Click here for file
Acknowledgements
================
We thank M Shah, C Hua, and S McMaster for technical assistance, T Siggers, A Aboukhalil and L Shokri for assistance with data analysis, S Gisselbrecht for helpful discussion, and T Siggers and L Barrera for critical reading of the manuscript. This work was supported by NIH/NHGRI grants \# R01 HG003420 (MLB) and \# R01 HG003985 (MLB). RG was funded in part by an American Heart Association postdoctoral fellowship \#10POST3650060.
|
Q:
How to Assign value to global variable and use it in other functions in jquery/javascript?
Declare global variables(jquery):
$.mynamespace = { myVar : "something" };
I will do some operations with xml, after that will assign some other value to myVar and call to function test() will again change the value of myVar. Then I want the value of var must be same as I changed in test() function.
$(document).ready(function(){
//Some XML oprations
$.get("students.xml",{},function(xml){
$.mynamespace.myVar="ewewewewewew";
test();
});
//value of $.mynamespace.myVar must be test
alert($.mynamespace.myVar);
});
function test(){
alert($.mynamespace.myVar );
$.mynamespace.myVar="test";
}
A:
Ajax stands as Asynchronous JavaScript and XML which means that the calls are Asynchronous. When AJAX is done the sucessful function is called. It can be called anytime. So when javascript reaches the code it just goes through and when ajax is ready success function is called.
There are 2 solutions.
You do something with variable when ajax request is done in sucessful function
You do something with variable after the ajax code but you need to use param async: false which makes Ajax NO ajax :) but some kind of SJAX.
|
Corporate governance an important factor in the overall credit rating process
Credit rating agencies continue to consider the quality of corporate governance an important factor in the overall credit rating process for banks.
“While strong governance may well promote timely repayment, particularly weak corporate governance can adversely impact its financial well-being. Ratings are thus unlikely to be enhanced by the existence of sound governance practices, but the absence off such practices could have a negative effect on ratings,” Fitch Ratings said.
The corporate governance standards are highest among the “new” private sector banks. These boards are reasonably broad-based, with independent directors that have wide-ranging experience and the various board committees such as compliance, audit, risk, compensation, are all reasonably vocal.
There are 28 state-owned banks operating in India, accounting for 79% of the total assets in the commercial banking system. Government ownership in these banks varies between 51% and 100%.
There has been an improvement in the practices of these banks with regards to disclosure - largely driven by these banks listing their equities on the domestic bourses, and the need to comply with disclosure and guidelines stipulated by the Stock Exchanges.
However, the board, which includes the executive Chairman and the “independent” directors, continue to be “nominated” by the Indian government.
Fitch Ratings has however, expressed concern on the corporate governance practices of family-controlled old generation private sector banks, which are often controlled by a few families, or communities, who may have non-bank interests. |
Q:
Using regex to 'clean up' the string
I need a clear text with only words, excluding all digits, extra spaces, dashes, commas, dots, brackets, etc. It is used for a word generation algorithm (taken from gamasutra). I suppose that regular expression can help here. How can I do this with help of String.split?
UPD:
Input: I have 1337 such a string with different stuff in it: commas, many spaces, digits - 2 3 4, dashes. How can I remove all stuff?
Output: I have such a string with different stuff in it commas many spaces digits dashes How can I remove all stuff
A:
In two steps you could do:
String s = "asd asd asd.asd, asd";
String clean = s.replaceAll("[\\d[^\\w\\s]]+", " ").replaceAll("(\\s{2,})", " ");
System.out.println(clean);
The first step removes all characters that are not a letter or a space and replaces them with a space. The second step removes multiple spaces by only one space.
Output:
asd asd asd asd asd
If all you need is an array containing the words, then this would be enough:
String[] words = s.trim().split("[\\W\\d]+");
|
Q:
Debugging crash in small object optimization for type erasure
I'm implementing a class that performs type erasure for small objects and have encountered a segmentation fault which I do not understand.
The following program:
#include <iostream>
#include <type_traits>
struct small_object
{
public:
template<class T>
small_object(const T& value)
{
new(&storage_) concrete<T>(value);
}
~small_object()
{
get_abstract().~abstract();
}
void print() const
{
// XXX crash here
get_abstract().print();
}
private:
struct abstract
{
virtual ~abstract(){}
virtual void print() const = 0;
};
template<class T>
struct concrete
{
concrete(const T& value) : value_(value) {}
void print() const
{
std::cout << value_ << std::endl;
}
T value_;
};
abstract& get_abstract()
{
return *reinterpret_cast<abstract*>(&storage_);
}
const abstract& get_abstract() const
{
return *reinterpret_cast<const abstract*>(&storage_);
}
typename std::aligned_storage<4 * sizeof(void*)> storage_;
};
int main()
{
small_object object(13);
// XXX i expect this line to print '13' to the terminal but it crashes
object.print();
return 0;
}
Crashes at the lines indicated by XXX.
I believe the issue is that the virtual call to .print() is not being dynamically dispatched correctly, but I don't understand why.
Can anyone tell what am I missing?
A:
You didn't derive concrete<T> from abstract, so no vtable is being created when you construct the object using placement new. Therefore, when you try to invoke the virtual function, it will fail; concrete<T> and abstract are actually completely unrelated types in this example.
I would recommend using the override keyword if you're using C++11 or newer to allow the compiler to generate an error in cases like this.
|
Lead in Cans: Still a Problem, Still Preventable
The discovery of several imported canned food items with extremely high lead levels during the past year has prompted the federal government to take emergency action to reduce the presence of the toxic heavy metal in foods exported to this country.
The lead problem is especially a concern among recent immigrants and others who traditionally depend on imported food products from Mexico, other Latin American countries and Asia.
"Children have been getting sick from drinking (canned) imported fruit nectars with elevated lead levels," says John Jones, FDA's strategic manager of pesticide and chemical contaminants. "This is an avoidable source of lead and it is of sufficient toxicological concern (to warrant immediate action)."
The U.S. Food and Drug Administration estimates 230 million pounds of imported food packaged in lead-soldered cans is sold in the United States each year. The figure represents as much as 10% of total food imports.
FDA, which conducted the laboratory analyses as part of routine monitoring of imported food, also announced this month that it will seek a ban on the use of lead-soldered cans as food containers. Domestic producers have voluntarily eliminated the use of lead seams in cans since November, 1991, an effort that began in 1982.
The maximum allowable lead levels just established for canned foods will be 80 parts per billion for fruit beverages such as juice and nectars. All other canned foods must have lead levels less than 250 ppb. The tougher standard for fruit beverages was established because FDA believes that infants and children are the primary consumers of these products.
The most severe case of lead contamination was discovered during a San Diego County screening program: an 18-month-old child was diagnosed with dangerously high blood lead levels. The child was regularly fed Jumex imported canned fruit nectar. FDA analysis of the brand found that the products contained between 255 ppb to 1,084 ppb of lead, the highest levels detected by the agency in the past three years of testing. The findings led to a nationwide recall of Jumex fruit beverages.
"(These levels are) high enough to cause permanent damage and disability to children consuming the product on a daily basis," states an FDA report.
Other import products found to have potentially hazardous lead levels include canned refried beans, jalapeno peppers and mandarin orange segments.
The FDA isn't the only agency investigating lead in canned food. A recent study by the Centers for Disease Control and Prevention states that elevated levels of lead in children's blood is a "major health risk" that is "totally preventable."
And then there's this warning from a 1991 report from the state's Department of Health Services, which discussed not only lead in food, but the threat from all possible sources: "Lead poisoning is the most significant environmental health problem for California children today." |
The Rise of the Atheists: 1 in 4 Millennials Don't Identify With Any Religion
For all the attention paid to religious zealots from America to the Middle East, there's another religious trend that should perk our ears up: More young people than ever don't identify with religion at all.
A major new Pew Research study, meant to track voting trends among generations, found that 26 percent of people ages 18-30 said they were unaffiliated with a religious tradition. That still leaves a lot of pious Millennials, but the percentage is the biggest number in history—and the biggest of any generation. An increasing number of young people are no longer banking on church to help our country through the recession, either. Forty-six percent of Millennials see religion as the "key to the nation's success," as opposed to 64 percent of Generation X, 69 percent of Boomers, and 78 percent of the Silent generation (ages 66-83).
This is a big deal, one that could fundamentally change who we elect and how we govern. There are periodic news stories about how many Americans think President Obama is a Muslim, and countless surveys about whether Mitt Romney's Mormon faith will get in the way of his chances to become president. But only about 40 percent of Americans can identify Romney's religion. Among the younger generation, the question may be whether we care about a candidate's faith at all.
I'm part of the 26 percent who isn't religious, and for me, how religious candidates are matters more than to what religion they subscribe. Do they use their faith to prop up bigoted views about gay marriage or reproductive rights? Will they use government funds to favor one religion over the other? The less religious they are, the more likely I am to vote for them. When the Christian right was squawking about Obama's less-than-showy commitment to Christianity, I was ticking it off as a plus, and I wasn't alone. As younger generations become progressively less devout, we may tilt back to a timeworn but often-ignored core American value: the separation between church and state.
The original headline was changed from "atheists" to "secularists" to include agnostics and people of faith who reject organized religion. |
<p>An evidence describes the source of an annotation, e.g. an experiment that has been published in the scientific literature, an orthologous protein, a record from another database, etc.</p>
<p><a href="/manual/evidences">More…</a></p>
Your basket is currently empty.
Vascular endothelial growth factor receptor 1
Gene
FLT1
Organism
Homo sapiens (Human)
Status
Reviewed-Annotation score: <p>Annotation score: 5 out of 5</p>
<p>The annotation score provides a heuristic measure of the annotation content of a UniProtKB entry or proteome.</p><p><a href='../manual/annotation_score' target='_top'>More...</a></p>Annotation score: 5 out of 5-Experimental evidence at protein leveli
<p>This indicates the type of evidence that supports the existence of the protein. Note that the ‘protein existence’ evidence does not give information on the accuracy or correctness of the sequence(s) displayed.</p><p><a href='../manual/protein_existence' target='_top'>More...</a></p>
Select a section on the left to see content.
Tyrosine-protein kinase that acts as a cell-surface receptor for VEGFA, VEGFB and PGF, and plays an essential role in the development of embryonic vasculature, the regulation of angiogenesis, cell survival, cell migration, macrophage function, chemotaxis, and cancer cell invasion. May play an essential role as a negative regulator of embryonic angiogenesis by inhibiting excessive proliferation of endothelial cells. Can promote endothelial cell proliferation, survival and angiogenesis in adulthood. Its function in promoting cell proliferation seems to be cell-type specific. Promotes PGF-mediated proliferation of endothelial cells, proliferation of some types of cancer cells, but does not promote proliferation of normal fibroblasts (in vitro). Has very high affinity for VEGFA and relatively low protein kinase activity; may function as a negative regulator of VEGFA signaling by limiting the amount of free VEGFA and preventing its binding to KDR. Likewise, isoforms lacking a transmembrane domain, such as isoform 2, isoform 3 and isoform 4, may function as decoy receptors for VEGFA. Modulates KDR signaling by forming heterodimers with KDR. Ligand binding leads to the activation of several signaling cascades. Activation of PLCG leads to the production of the cellular signaling molecules diacylglycerol and inositol 1,4,5-trisphosphate and the activation of protein kinase C. Mediates phosphorylation of PIK3R1, the regulatory subunit of phosphatidylinositol 3-kinase, leading to activation of phosphatidylinositol kinase and the downstream signaling pathway. Mediates activation of MAPK1/ERK2, MAPK3/ERK1 and the MAP kinase signaling pathway, as well as of the AKT1 signaling pathway. Phosphorylates SRC and YES1, and may also phosphorylate CBL. Isoform 1 phosphorylates PLCG. Promotes phosphorylation of AKT1 at 'Ser-473'. Promotes phosphorylation of PTK2/FAK1. Isoform 7 has a truncated kinase domain; it increases phosphorylation of SRC at 'Tyr-418' by unknown means and promotes tumor cell invasion.18 Publications
<p>Manually curated information for which there is published experimental evidence.</p>
<p><a href="/manual/evidences#ECO:0000269">More…</a></p> Manual assertion based on experiment ini
Cited for: FUNCTION IN PGF AND VEGFA SIGNALING; PHOSPHORYLATION OF AKT1; MAPK3/ERK1 AND MAP KINASES; CHEMOTAXIS AND ACTIVATION OF PHOSPHATIDYLINOSITOL 3-KINASE, AUTOPHOSPHORYLATION IN RESPONSE TO PGF AND VEGFA.
Cited for: FUNCTION AS DECOY RECEPTORS; REGULATION OF VEGFA SIGNALING AND REGULATION OF KDR ACTIVITY (ISOFORMS 2/3/4), ROLE IN PREECLAMPSIA.
<p>Describes the catalytic activity of an enzyme, i.e. the chemical reaction it catalyzes. This information usually correlates with the presence of an EC (Enzyme Commission) number in the ‘Names and taxonomy’ section.</p><p><a href='../manual/catalytic_activity' target='_top'>More...</a></p>Catalytic activityi
<p>Describes an enzyme regulatory mechanism and reports the components which regulate (by activation or inhibition) the reaction.</p><p><a href='../manual/enzyme_regulation' target='_top'>More...</a></p>Enzyme regulationi
Present in an inactive conformation in the absence of bound ligand. Binding of VEGFA, VEGFB or PGF leads to dimerization and activation by autophosphorylation on tyrosine residues.
Sites
Feature key
Position(s)
Length
Description
Graphical view
Feature identifier
Actions
<p>Describes interesting single amino acid sites on the sequence that are not defined in any other subsection. This subsection can be displayed in different sections (‘Function’, ‘PTM / Processing’, ‘Pathology and Biotech’) according to its content.</p><p><a href='../manual/site' target='_top'>More...</a></p>Sitei
<p>Describes the interaction between a single amino acid and another chemical entity. Priority is given to the annotation of physiological ligands.</p><p><a href='../manual/binding' target='_top'>More...</a></p>Binding sitei
Regions
Feature key
Position(s)
Length
Description
Graphical view
Feature identifier
Actions
<p>Describes a region in the protein which binds nucleotide phosphates. It always involves more than one amino acid and includes all residues involved in nucleotide-binding.</p><p><a href='../manual/np_bind' target='_top'>More...</a></p>Nucleotide bindingi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Traceable Author Statement</p>
<p>Used for information from review articles where the original experiments are traceable through that article and also for information from text books or dictionaries.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#tas">GO evidence code guide</a></p> Traceable author statementi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Inferred from Mutant Phenotype</p>
<p>Describes annotations that are concluded from looking at variations or changes in a gene product such as mutations or abnormal levels and includes techniques such as knockouts, overexpression, anti-sense experiments and use of specific protein inhibitors.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#imp">GO evidence code guide</a></p> Inferred from mutant phenotypei
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Inferred from Mutant Phenotype</p>
<p>Describes annotations that are concluded from looking at variations or changes in a gene product such as mutations or abnormal levels and includes techniques such as knockouts, overexpression, anti-sense experiments and use of specific protein inhibitors.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#imp">GO evidence code guide</a></p> Inferred from mutant phenotypei
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Traceable Author Statement</p>
<p>Used for information from review articles where the original experiments are traceable through that article and also for information from text books or dictionaries.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#tas">GO evidence code guide</a></p> Traceable author statementi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Inferred from Mutant Phenotype</p>
<p>Describes annotations that are concluded from looking at variations or changes in a gene product such as mutations or abnormal levels and includes techniques such as knockouts, overexpression, anti-sense experiments and use of specific protein inhibitors.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#imp">GO evidence code guide</a></p> Inferred from mutant phenotypei
<p>Inferred from Mutant Phenotype</p>
<p>Describes annotations that are concluded from looking at variations or changes in a gene product such as mutations or abnormal levels and includes techniques such as knockouts, overexpression, anti-sense experiments and use of specific protein inhibitors.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#imp">GO evidence code guide</a></p> Inferred from mutant phenotypei
<p>Inferred from Mutant Phenotype</p>
<p>Describes annotations that are concluded from looking at variations or changes in a gene product such as mutations or abnormal levels and includes techniques such as knockouts, overexpression, anti-sense experiments and use of specific protein inhibitors.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#imp">GO evidence code guide</a></p> Inferred from mutant phenotypei
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Traceable Author Statement</p>
<p>Used for information from review articles where the original experiments are traceable through that article and also for information from text books or dictionaries.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#tas">GO evidence code guide</a></p> Traceable author statementi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Provides information about the protein and gene name(s) and synonym(s) and about the organism that is the source of the protein sequence.</p><p><a href='../manual/names_and_taxonomy_section' target='_top'>More...</a></p>Names & Taxonomyi
<p>Provides an exhaustive list of all names of the protein, from commonly used to obsolete, to allow unambiguous identification of a protein.</p><p><a href='../manual/protein_names' target='_top'>More...</a></p>Protein namesi
<p>Indicates the name(s) of the gene(s) that code for the protein sequence(s) described in the entry. 4 distinct tokens exist: ‘Name’, ‘Synonyms’, ‘Ordered locus names’ and ‘ORF names’.</p><p><a href='../manual/gene_name' target='_top'>More...</a></p>Gene namesi
<p>Shows the unique identifier assigned by the <span class="caps">NCBI</span> to the source organism of the protein. This is known as the ‘taxonomic identifier’ or ‘taxid’.</p><p><a href='../manual/taxonomic_identifier' target='_top'>More...</a></p>Taxonomic identifieri
<p>Contains the taxonomic hierarchical classification lineage of the source organism. It lists the nodes as they appear top-down in the taxonomic tree, with the more general grouping listed first.</p><p><a href='../manual/taxonomic_lineage' target='_top'>More...</a></p>Taxonomic lineagei
<p>Is present for entries that are part of a <a href="/proteomes">proteome</a>, i.e. of a set of proteins thought to be expressed by organisms whose genomes have been completely sequenced.</p><p><a href='../manual/proteomes_manual' target='_top'>More...</a></p>Proteomesi
<p>Describes the extent of a membrane-spanning region of the protein. It denotes the presence of both alpha-helical transmembrane regions and the membrane spanning regions of beta-barrel transmembrane proteins.</p><p><a href='../manual/transmem' target='_top'>More...</a></p>Transmembranei
<p>Traceable Author Statement</p>
<p>Used for information from review articles where the original experiments are traceable through that article and also for information from text books or dictionaries.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#tas">GO evidence code guide</a></p> Traceable author statementi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>Inferred from Direct Assay</p>
<p>Used to indicate a direct assay for the function, process or component indicated by the GO term.</p>
<p>More information in the <a href="http://geneontology.org/page/guide-go-evidence-codes#ida">GO evidence code guide</a></p> Inferred from direct assayi
<p>UniProtKB Keywords constitute a <a target="_top" href="/keywords">controlled vocabulary</a> with a hierarchical structure. Keywords summarise the content of a UniProtKB entry and facilitate the search for proteins of interest.<p><a href='../help/keywords' target='_top'>More...</a></p>Keywords - Cellular componenti
<p>Provides information on the disease(s) and phenotype(s) associated with the deficiency of a protein.</p><p><a href='../manual/pathology_and_biotech_section' target='_top'>More...</a></p>Pathology & Biotechi
<p>Provides information on the disease(s) associated with genetic variations in a given protein. The information is extracted from the scientific literature and diseases that are also described in the <a href="http://www.ncbi.nlm.nih.gov/sites/entrez?db=omim"><span class="caps">OMIM</span></a> database are represented with a <a href="/diseases">controlled vocabulary</a> in the following way:</p><p><a href='../manual/involvement_in_disease' target='_top'>More...</a></p>Involvement in diseasei
Can contribute to cancer cell survival, proliferation, migration, and invasion, and tumor angiogenesis and metastasis. May contribute to cancer pathogenesis by promoting inflammatory responses and recruitment of tumor-infiltrating macrophages.
Abnormally high expression of soluble isoforms (isoform 2, isoform 3 or isoform 4) may be a cause of preeclampsia.
Mutagenesis
Feature key
Position(s)
Length
Description
Graphical view
Feature identifier
Actions
<p>Describes the effect of the experimental mutation of one or more amino acid(s) on the biological properties of the protein.</p><p><a href='../manual/mutagen' target='_top'>More...</a></p>Mutagenesisi
Cited for: INTERACTION WITH PSEN1 AND PTPRB, DEPHOSPHORYLATION BY PTPRB, MUTAGENESIS OF VAL-767, PROTEOLYTIC CLEAVAGE BY PSEN1 AT VAL-767.
<p>Describes the effect of the experimental mutation of one or more amino acid(s) on the biological properties of the protein.</p><p><a href='../manual/mutagen' target='_top'>More...</a></p>Mutagenesisi
Cited for: FUNCTION IN PHOSPHORYLATION OF PLCG AND ACTIVATION OF MAP KINASES, INTERACTION WITH PLCG, CATALYTIC ACTIVITY, MUTAGENESIS OF LYS-861 AND TYR-1169, PHOSPHORYLATION AT TYR-1169 AND TYR-1213.
<p>Describes the effect of the experimental mutation of one or more amino acid(s) on the biological properties of the protein.</p><p><a href='../manual/mutagen' target='_top'>More...</a></p>Mutagenesisi
<p>Describes the effect of the experimental mutation of one or more amino acid(s) on the biological properties of the protein.</p><p><a href='../manual/mutagen' target='_top'>More...</a></p>Mutagenesisi
<p>Describes the effect of the experimental mutation of one or more amino acid(s) on the biological properties of the protein.</p><p><a href='../manual/mutagen' target='_top'>More...</a></p>Mutagenesisi
Cited for: FUNCTION IN PHOSPHORYLATION OF PLCG AND ACTIVATION OF MAP KINASES, INTERACTION WITH PLCG, CATALYTIC ACTIVITY, MUTAGENESIS OF LYS-861 AND TYR-1169, PHOSPHORYLATION AT TYR-1169 AND TYR-1213.
<p>Describes the effect of the experimental mutation of one or more amino acid(s) on the biological properties of the protein.</p><p><a href='../manual/mutagen' target='_top'>More...</a></p>Mutagenesisi
<p>Describes the effect of the experimental mutation of one or more amino acid(s) on the biological properties of the protein.</p><p><a href='../manual/mutagen' target='_top'>More...</a></p>Mutagenesisi
<p>Describes the effect of the experimental mutation of one or more amino acid(s) on the biological properties of the protein.</p><p><a href='../manual/mutagen' target='_top'>More...</a></p>Mutagenesisi
<p>Describes the effect of the experimental mutation of one or more amino acid(s) on the biological properties of the protein.</p><p><a href='../manual/mutagen' target='_top'>More...</a></p>Mutagenesisi
<p>Manually curated information which has been inferred by a curator based on his/her scientific knowledge or on the scientific content of an article.</p>
<p><a href="/manual/evidences#ECO:0000305">More…</a></p> Manual assertion inferred by curator fromi
<p>Describes post-translational modifications (PTMs). This subsection complements the information provided at the sequence level or describes modifications for which position-specific data is not yet available.</p><p><a href='../manual/post-translational_modification' target='_top'>More...</a></p>Post-translational modificationi
N-glycosylated.2 Publications
<p>Manually curated information for which there is published experimental evidence.</p>
<p><a href="/manual/evidences#ECO:0000269">More…</a></p> Manual assertion based on experiment ini
Autophosphorylated on tyrosine residues upon ligand binding. Autophosphorylation occurs in trans, i.e. one subunit of the dimeric receptor phosphorylates tyrosine residues on the other subunit. Phosphorylation at Tyr-1169 is important for interaction with PLCG. Phosphorylation at Tyr-1213 is important for interaction with PIK3R1, PTPN11, GRB2, and PLCG. Phosphorylation at Tyr-1333 is important for endocytosis and for interaction with CBL, NCK1 and CRK. Is probably dephosphorylated by PTPRB.5 Publications
<p>Manually curated information for which there is published experimental evidence.</p>
<p><a href="/manual/evidences#ECO:0000269">More…</a></p> Manual assertion based on experiment ini
PTM databases
<p>Provides information on the expression of a gene at the mRNA or protein level in cells or in tissues of multicellular organisms.</p><p><a href='../manual/expression_section' target='_top'>More...</a></p>Expressioni
<p>Provides information on the expression of a gene at the mRNA or protein level in cells or in tissues of multicellular organisms. By default, the information is derived from experiments at the mRNA level, unless specified ‘at the protein level’.</p><p><a href='../manual/tissue_specificity' target='_top'>More...</a></p>Tissue specificityi
Detected in normal lung, but also in placenta, liver, kidney, heart and brain tissues. Specifically expressed in most of the vascular endothelial cells, and also expressed in peripheral blood monocytes. Isoform 2 is strongly expressed in placenta. Isoform 3 is expressed in corneal epithelial cells (at protein level). Isoform 3 is expressed in vascular smooth muscle cells (VSMC).2 Publications
<p>Manually curated information for which there is published experimental evidence.</p>
<p><a href="/manual/evidences#ECO:0000269">More…</a></p> Manual assertion based on experiment ini
Up-regulated in coculture of VSMC/endothelial cell (EC) or by direct exposure to VEGF of VSMC monoculture. Up-regulated from the second trimester of pregnancy to the term and in the placenta of women with preeclampsia (PE). Up-regulated in monocytes exposed to bacterial lipopolysaccharide (LPS).2 Publications
<p>Manually curated information for which there is published experimental evidence.</p>
<p><a href="/manual/evidences#ECO:0000269">More…</a></p> Manual assertion based on experiment ini
Organism-specific databases
<p>Provides information on the quaternary structure of a protein and on interaction(s) with other proteins or protein complexes.</p><p><a href='../manual/interaction_section' target='_top'>More...</a></p>Interactioni
<p>Provides information about the protein quaternary structure and interaction(s) with other proteins or protein complexes (with the exception of physiological receptor-ligand interactions which are annotated in the ‘Function’ section).</p><p><a href='../manual/subunit_structure' target='_top'>More...</a></p>Subunit structurei
Interacts with VEGFA, VEGFB and PGF. Monomer in the absence of bound VEGFA, VEGFB or PGF. Homodimer in the presence of bound VEGFA, VEGFB and PGF. Can also form a heterodimer with KDR. Interacts (when tyrosine phosphorylated) with CBL, CRK, GRB2, NCK1, PIK3R1, PLCG, PSEN1 and PTPN11. Probably interacts also with PTPRB. Interacts with GNB2L1/RACK1. Identified in a complex with CBL and CD2AP.16 Publications
<p>Manually curated information for which there is published experimental evidence.</p>
<p><a href="/manual/evidences#ECO:0000269">More…</a></p> Manual assertion based on experiment ini
<p>Provides information about binary protein-protein interactions. The data presented in this section are a quality-filtered subset of binary interactions automatically derived from the <a href="http://www.ebi.ac.uk/intact/">IntAct database</a>. It is updated on a monthly basis. Each binary interaction is displayed on a separate line.</p><p><a href='../manual/binary_interactions' target='_top'>More...</a></p>Binary interactionsi
<p>Provides information on the tertiary structure of a protein.</p><p><a href='../manual/structure_section' target='_top'>More...</a></p>Structurei
Secondary structure
<p>Is used to indicate the positions of experimentally determined hydrogen-bonded turns within the protein sequence. These elements correspond to the <span class="caps">DSSP</span> secondary structure code ‘T’.</p><p><a href='../manual/turn' target='_top'>More...</a></p>Turni
<p>Is used to indicate the positions of experimentally determined hydrogen-bonded turns within the protein sequence. These elements correspond to the <span class="caps">DSSP</span> secondary structure code ‘T’.</p><p><a href='../manual/turn' target='_top'>More...</a></p>Turni
<p>Is used to indicate the positions of experimentally determined hydrogen-bonded turns within the protein sequence. These elements correspond to the <span class="caps">DSSP</span> secondary structure code ‘T’.</p><p><a href='../manual/turn' target='_top'>More...</a></p>Turni
<p>Is used to indicate the positions of experimentally determined hydrogen-bonded turns within the protein sequence. These elements correspond to the <span class="caps">DSSP</span> secondary structure code ‘T’.</p><p><a href='../manual/turn' target='_top'>More...</a></p>Turni
<p>Is used to indicate the positions of experimentally determined hydrogen-bonded turns within the protein sequence. These elements correspond to the <span class="caps">DSSP</span> secondary structure code ‘T’.</p><p><a href='../manual/turn' target='_top'>More...</a></p>Turni
<p>Is used to indicate the positions of experimentally determined hydrogen-bonded turns within the protein sequence. These elements correspond to the <span class="caps">DSSP</span> secondary structure code ‘T’.</p><p><a href='../manual/turn' target='_top'>More...</a></p>Turni
Miscellaneous databases
<p>Provides information on sequence similarities with other proteins and the domain(s) present in a protein.</p><p><a href='../manual/family_and_domains_section' target='_top'>More...</a></p>Family & Domainsi
Domains and Repeats
Feature key
Position(s)
Length
Description
Graphical view
Feature identifier
Actions
<p>Describes the position and type of a domain, which is defined as a specific combination of secondary structures organized into a characteristic three-dimensional structure or fold.</p><p><a href='../manual/domain' target='_top'>More...</a></p>Domaini
<p>Describes the position and type of a domain, which is defined as a specific combination of secondary structures organized into a characteristic three-dimensional structure or fold.</p><p><a href='../manual/domain' target='_top'>More...</a></p>Domaini
<p>Describes the position and type of a domain, which is defined as a specific combination of secondary structures organized into a characteristic three-dimensional structure or fold.</p><p><a href='../manual/domain' target='_top'>More...</a></p>Domaini
<p>Describes the position and type of a domain, which is defined as a specific combination of secondary structures organized into a characteristic three-dimensional structure or fold.</p><p><a href='../manual/domain' target='_top'>More...</a></p>Domaini
<p>Describes the position and type of a domain, which is defined as a specific combination of secondary structures organized into a characteristic three-dimensional structure or fold.</p><p><a href='../manual/domain' target='_top'>More...</a></p>Domaini
<p>Describes the position and type of a domain, which is defined as a specific combination of secondary structures organized into a characteristic three-dimensional structure or fold.</p><p><a href='../manual/domain' target='_top'>More...</a></p>Domaini
<p>Describes the position and type of a domain, which is defined as a specific combination of secondary structures organized into a characteristic three-dimensional structure or fold.</p><p><a href='../manual/domain' target='_top'>More...</a></p>Domaini
<p>Describes the position and type of a domain, which is defined as a specific combination of secondary structures organized into a characteristic three-dimensional structure or fold.</p><p><a href='../manual/domain' target='_top'>More...</a></p>Domaini
<p>Provides general information on the biological role of a domain. The term ‘domain’ is intended here in its wide acceptation, it may be a structural domain, a transmembrane region or a functional domain. Several domains are described in this subsection.</p><p><a href='../manual/domain_cc' target='_top'>More...</a></p>Domaini
The second and third Ig-like C2-type (immunoglobulin-like) domains are sufficient for VEGFA binding.2 Publications
<p>Manually curated information for which there is published experimental evidence.</p>
<p><a href="/manual/evidences#ECO:0000269">More…</a></p> Manual assertion based on experiment ini
<p>Displays by default the canonical protein sequence and upon request all isoforms described in the entry. It also includes information pertinent to the sequence(s), including length and molecular weight.</p><p><a href='../manual/sequences_section' target='_top'>More...</a></p>Sequences (8)i
<p>Indicates if the canonical sequence displayed by default in the entry is complete or not.</p><p><a href='../manual/sequence_status' target='_top'>More...</a></p>Sequence statusi: Complete.
<p>Indicates if the canonical sequence displayed by default in the entry is in its mature form or if it represents the precursor.</p><p><a href='../manual/sequence_processing' target='_top'>More...</a></p>Sequence processingi: The displayed sequence is further processed into a mature form.
This entry describes 8<p>Lists the alternative protein sequences (isoforms) that can be generated from the same gene by a single or by the combination of up to four biological events (alternative promoter usage, alternative splicing, alternative initiation and ribosomal frameshifting). Additionally, this section gives relevant information on each alternative protein isoform.</p><p><a href='../manual/alternative_products' target='_top'>More...</a></p> isoformsi produced by alternative splicing. Align
<p>The checksum is a form of redundancy check that is calculated
from the sequence. It is useful for tracking sequence updates.</p>
<p>It should be noted that while, in theory, two different sequences could
have the same checksum value, the likelihood that this would happen
is extremely low.</p>
<p>However UniProtKB may contain entries with identical sequences in case
of multiple genes (paralogs).</p>
<p>The checksum is computed as the sequence 64-bit Cyclic Redundancy Check value (CRC64)
using the generator polynomial: x<sup>64</sup> + x<sup>4</sup> + x<sup>3</sup> + x + 1.
The algorithm is described in the ISO 3309 standard.
</p>
<p class="publication">Press W.H., Flannery B.P., Teukolsky S.A. and Vetterling W.T.<br />
<strong>Cyclic redundancy and other checksums</strong><br />
<a href="http://www.nrbook.com/b/bookcpdf.php">Numerical recipes in C 2nd ed., pp896-902, Cambridge University Press (1993)</a>)</p>
Checksum:iFF3381EEFAF0787C
<p>The checksum is a form of redundancy check that is calculated
from the sequence. It is useful for tracking sequence updates.</p>
<p>It should be noted that while, in theory, two different sequences could
have the same checksum value, the likelihood that this would happen
is extremely low.</p>
<p>However UniProtKB may contain entries with identical sequences in case
of multiple genes (paralogs).</p>
<p>The checksum is computed as the sequence 64-bit Cyclic Redundancy Check value (CRC64)
using the generator polynomial: x<sup>64</sup> + x<sup>4</sup> + x<sup>3</sup> + x + 1.
The algorithm is described in the ISO 3309 standard.
</p>
<p class="publication">Press W.H., Flannery B.P., Teukolsky S.A. and Vetterling W.T.<br />
<strong>Cyclic redundancy and other checksums</strong><br />
<a href="http://www.nrbook.com/b/bookcpdf.php">Numerical recipes in C 2nd ed., pp896-902, Cambridge University Press (1993)</a>)</p>
Checksum:i3F73F4942469DA36
<p>The checksum is a form of redundancy check that is calculated
from the sequence. It is useful for tracking sequence updates.</p>
<p>It should be noted that while, in theory, two different sequences could
have the same checksum value, the likelihood that this would happen
is extremely low.</p>
<p>However UniProtKB may contain entries with identical sequences in case
of multiple genes (paralogs).</p>
<p>The checksum is computed as the sequence 64-bit Cyclic Redundancy Check value (CRC64)
using the generator polynomial: x<sup>64</sup> + x<sup>4</sup> + x<sup>3</sup> + x + 1.
The algorithm is described in the ISO 3309 standard.
</p>
<p class="publication">Press W.H., Flannery B.P., Teukolsky S.A. and Vetterling W.T.<br />
<strong>Cyclic redundancy and other checksums</strong><br />
<a href="http://www.nrbook.com/b/bookcpdf.php">Numerical recipes in C 2nd ed., pp896-902, Cambridge University Press (1993)</a>)</p>
Checksum:i67B7F8BC1D30CD9E
<p>The checksum is a form of redundancy check that is calculated
from the sequence. It is useful for tracking sequence updates.</p>
<p>It should be noted that while, in theory, two different sequences could
have the same checksum value, the likelihood that this would happen
is extremely low.</p>
<p>However UniProtKB may contain entries with identical sequences in case
of multiple genes (paralogs).</p>
<p>The checksum is computed as the sequence 64-bit Cyclic Redundancy Check value (CRC64)
using the generator polynomial: x<sup>64</sup> + x<sup>4</sup> + x<sup>3</sup> + x + 1.
The algorithm is described in the ISO 3309 standard.
</p>
<p class="publication">Press W.H., Flannery B.P., Teukolsky S.A. and Vetterling W.T.<br />
<strong>Cyclic redundancy and other checksums</strong><br />
<a href="http://www.nrbook.com/b/bookcpdf.php">Numerical recipes in C 2nd ed., pp896-902, Cambridge University Press (1993)</a>)</p>
Checksum:i50BCDAACB69B0EA2
<p>The checksum is a form of redundancy check that is calculated
from the sequence. It is useful for tracking sequence updates.</p>
<p>It should be noted that while, in theory, two different sequences could
have the same checksum value, the likelihood that this would happen
is extremely low.</p>
<p>However UniProtKB may contain entries with identical sequences in case
of multiple genes (paralogs).</p>
<p>The checksum is computed as the sequence 64-bit Cyclic Redundancy Check value (CRC64)
using the generator polynomial: x<sup>64</sup> + x<sup>4</sup> + x<sup>3</sup> + x + 1.
The algorithm is described in the ISO 3309 standard.
</p>
<p class="publication">Press W.H., Flannery B.P., Teukolsky S.A. and Vetterling W.T.<br />
<strong>Cyclic redundancy and other checksums</strong><br />
<a href="http://www.nrbook.com/b/bookcpdf.php">Numerical recipes in C 2nd ed., pp896-902, Cambridge University Press (1993)</a>)</p>
Checksum:i9150507FBDF43B24
<p>The checksum is a form of redundancy check that is calculated
from the sequence. It is useful for tracking sequence updates.</p>
<p>It should be noted that while, in theory, two different sequences could
have the same checksum value, the likelihood that this would happen
is extremely low.</p>
<p>However UniProtKB may contain entries with identical sequences in case
of multiple genes (paralogs).</p>
<p>The checksum is computed as the sequence 64-bit Cyclic Redundancy Check value (CRC64)
using the generator polynomial: x<sup>64</sup> + x<sup>4</sup> + x<sup>3</sup> + x + 1.
The algorithm is described in the ISO 3309 standard.
</p>
<p class="publication">Press W.H., Flannery B.P., Teukolsky S.A. and Vetterling W.T.<br />
<strong>Cyclic redundancy and other checksums</strong><br />
<a href="http://www.nrbook.com/b/bookcpdf.php">Numerical recipes in C 2nd ed., pp896-902, Cambridge University Press (1993)</a>)</p>
Checksum:i7D3D572623A1124E
<p>The checksum is a form of redundancy check that is calculated
from the sequence. It is useful for tracking sequence updates.</p>
<p>It should be noted that while, in theory, two different sequences could
have the same checksum value, the likelihood that this would happen
is extremely low.</p>
<p>However UniProtKB may contain entries with identical sequences in case
of multiple genes (paralogs).</p>
<p>The checksum is computed as the sequence 64-bit Cyclic Redundancy Check value (CRC64)
using the generator polynomial: x<sup>64</sup> + x<sup>4</sup> + x<sup>3</sup> + x + 1.
The algorithm is described in the ISO 3309 standard.
</p>
<p class="publication">Press W.H., Flannery B.P., Teukolsky S.A. and Vetterling W.T.<br />
<strong>Cyclic redundancy and other checksums</strong><br />
<a href="http://www.nrbook.com/b/bookcpdf.php">Numerical recipes in C 2nd ed., pp896-902, Cambridge University Press (1993)</a>)</p>
Checksum:iB7800AF7311BF0D6
<p>The checksum is a form of redundancy check that is calculated
from the sequence. It is useful for tracking sequence updates.</p>
<p>It should be noted that while, in theory, two different sequences could
have the same checksum value, the likelihood that this would happen
is extremely low.</p>
<p>However UniProtKB may contain entries with identical sequences in case
of multiple genes (paralogs).</p>
<p>The checksum is computed as the sequence 64-bit Cyclic Redundancy Check value (CRC64)
using the generator polynomial: x<sup>64</sup> + x<sup>4</sup> + x<sup>3</sup> + x + 1.
The algorithm is described in the ISO 3309 standard.
</p>
<p class="publication">Press W.H., Flannery B.P., Teukolsky S.A. and Vetterling W.T.<br />
<strong>Cyclic redundancy and other checksums</strong><br />
<a href="http://www.nrbook.com/b/bookcpdf.php">Numerical recipes in C 2nd ed., pp896-902, Cambridge University Press (1993)</a>)</p>
Checksum:i34E2B38DE128BA53
Experimental Info
Feature key
Position(s)
Length
Description
Graphical view
Feature identifier
Actions
<p>Reports difference(s) between the canonical sequence (displayed by default in the entry) and the different sequence submissions merged in the entry. These various submissions may originate from different sequencing projects, different types of experiments, or different biological samples. Sequence conflicts are usually of unknown origin.</p><p><a href='../manual/conflict' target='_top'>More...</a></p>Sequence conflicti
<p>Reports difference(s) between the canonical sequence (displayed by default in the entry) and the different sequence submissions merged in the entry. These various submissions may originate from different sequencing projects, different types of experiments, or different biological samples. Sequence conflicts are usually of unknown origin.</p><p><a href='../manual/conflict' target='_top'>More...</a></p>Sequence conflicti
<p>Reports difference(s) between the canonical sequence (displayed by default in the entry) and the different sequence submissions merged in the entry. These various submissions may originate from different sequencing projects, different types of experiments, or different biological samples. Sequence conflicts are usually of unknown origin.</p><p><a href='../manual/conflict' target='_top'>More...</a></p>Sequence conflicti
<p>Reports difference(s) between the canonical sequence (displayed by default in the entry) and the different sequence submissions merged in the entry. These various submissions may originate from different sequencing projects, different types of experiments, or different biological samples. Sequence conflicts are usually of unknown origin.</p><p><a href='../manual/conflict' target='_top'>More...</a></p>Sequence conflicti
Alternative sequence
Feature key
Position(s)
Length
Description
Graphical view
Feature identifier
Actions
<p>Describes the sequence of naturally occurring alternative protein isoform(s). The changes in the amino acid sequence may be due to alternative splicing, alternative promoter usage, alternative initiation, or ribosomal frameshifting. The information stored in this subsection is used to automatically construct alternative protein sequence(s) for display.</p><p><a href='../manual/var_seq' target='_top'>More...</a></p>Alternative sequencei
<p>Manually curated information that is based on statements in scientific articles for which there is no experimental support.</p>
<p><a href="/manual/evidences#ECO:0000303">More…</a></p> Manual assertion based on opinion ini
<p>Describes the sequence of naturally occurring alternative protein isoform(s). The changes in the amino acid sequence may be due to alternative splicing, alternative promoter usage, alternative initiation, or ribosomal frameshifting. The information stored in this subsection is used to automatically construct alternative protein sequence(s) for display.</p><p><a href='../manual/var_seq' target='_top'>More...</a></p>Alternative sequencei
<p>Manually curated information that is based on statements in scientific articles for which there is no experimental support.</p>
<p><a href="/manual/evidences#ECO:0000303">More…</a></p> Manual assertion based on opinion ini
<p>Describes the sequence of naturally occurring alternative protein isoform(s). The changes in the amino acid sequence may be due to alternative splicing, alternative promoter usage, alternative initiation, or ribosomal frameshifting. The information stored in this subsection is used to automatically construct alternative protein sequence(s) for display.</p><p><a href='../manual/var_seq' target='_top'>More...</a></p>Alternative sequencei
<p>Manually curated information that is based on statements in scientific articles for which there is no experimental support.</p>
<p><a href="/manual/evidences#ECO:0000303">More…</a></p> Manual assertion based on opinion ini
<p>Describes the sequence of naturally occurring alternative protein isoform(s). The changes in the amino acid sequence may be due to alternative splicing, alternative promoter usage, alternative initiation, or ribosomal frameshifting. The information stored in this subsection is used to automatically construct alternative protein sequence(s) for display.</p><p><a href='../manual/var_seq' target='_top'>More...</a></p>Alternative sequencei
<p>Manually curated information that is based on statements in scientific articles for which there is no experimental support.</p>
<p><a href="/manual/evidences#ECO:0000303">More…</a></p> Manual assertion based on opinion ini
<p>Describes the sequence of naturally occurring alternative protein isoform(s). The changes in the amino acid sequence may be due to alternative splicing, alternative promoter usage, alternative initiation, or ribosomal frameshifting. The information stored in this subsection is used to automatically construct alternative protein sequence(s) for display.</p><p><a href='../manual/var_seq' target='_top'>More...</a></p>Alternative sequencei
<p>Manually curated information that is based on statements in scientific articles for which there is no experimental support.</p>
<p><a href="/manual/evidences#ECO:0000303">More…</a></p> Manual assertion based on opinion ini
<p>Describes the sequence of naturally occurring alternative protein isoform(s). The changes in the amino acid sequence may be due to alternative splicing, alternative promoter usage, alternative initiation, or ribosomal frameshifting. The information stored in this subsection is used to automatically construct alternative protein sequence(s) for display.</p><p><a href='../manual/var_seq' target='_top'>More...</a></p>Alternative sequencei
<p>Manually curated information that is based on statements in scientific articles for which there is no experimental support.</p>
<p><a href="/manual/evidences#ECO:0000303">More…</a></p> Manual assertion based on opinion ini
<p>Describes the sequence of naturally occurring alternative protein isoform(s). The changes in the amino acid sequence may be due to alternative splicing, alternative promoter usage, alternative initiation, or ribosomal frameshifting. The information stored in this subsection is used to automatically construct alternative protein sequence(s) for display.</p><p><a href='../manual/var_seq' target='_top'>More...</a></p>Alternative sequencei
<p>Manually curated information that is based on statements in scientific articles for which there is no experimental support.</p>
<p><a href="/manual/evidences#ECO:0000303">More…</a></p> Manual assertion based on opinion ini
<p>Describes the sequence of naturally occurring alternative protein isoform(s). The changes in the amino acid sequence may be due to alternative splicing, alternative promoter usage, alternative initiation, or ribosomal frameshifting. The information stored in this subsection is used to automatically construct alternative protein sequence(s) for display.</p><p><a href='../manual/var_seq' target='_top'>More...</a></p>Alternative sequencei
<p>Manually curated information that is based on statements in scientific articles for which there is no experimental support.</p>
<p><a href="/manual/evidences#ECO:0000303">More…</a></p> Manual assertion based on opinion ini
<p>Describes the sequence of naturally occurring alternative protein isoform(s). The changes in the amino acid sequence may be due to alternative splicing, alternative promoter usage, alternative initiation, or ribosomal frameshifting. The information stored in this subsection is used to automatically construct alternative protein sequence(s) for display.</p><p><a href='../manual/var_seq' target='_top'>More...</a></p>Alternative sequencei
<p>Manually curated information that is based on statements in scientific articles for which there is no experimental support.</p>
<p><a href="/manual/evidences#ECO:0000303">More…</a></p> Manual assertion based on opinion ini
<p>Describes the sequence of naturally occurring alternative protein isoform(s). The changes in the amino acid sequence may be due to alternative splicing, alternative promoter usage, alternative initiation, or ribosomal frameshifting. The information stored in this subsection is used to automatically construct alternative protein sequence(s) for display.</p><p><a href='../manual/var_seq' target='_top'>More...</a></p>Alternative sequencei
<p>Manually curated information that is based on statements in scientific articles for which there is no experimental support.</p>
<p><a href="/manual/evidences#ECO:0000303">More…</a></p> Manual assertion based on opinion ini
"A new VEGFR1 receptor transcript coding for the extracellular domains of the protein followed by a C-terminal polyserine tail."Mezquita J., Mezquita B., Pau M., Mezquita C.Submitted (DEC-2007) to the EMBL/GenBank/DDBJ databases
<p>Describes the sequence of naturally occurring alternative protein isoform(s). The changes in the amino acid sequence may be due to alternative splicing, alternative promoter usage, alternative initiation, or ribosomal frameshifting. The information stored in this subsection is used to automatically construct alternative protein sequence(s) for display.</p><p><a href='../manual/var_seq' target='_top'>More...</a></p>Alternative sequencei
<p>Manually curated information that is based on statements in scientific articles for which there is no experimental support.</p>
<p><a href="/manual/evidences#ECO:0000303">More…</a></p> Manual assertion based on opinion ini
"A new VEGFR1 receptor transcript coding for the extracellular domains of the protein followed by a C-terminal polyserine tail."Mezquita J., Mezquita B., Pau M., Mezquita C.Submitted (DEC-2007) to the EMBL/GenBank/DDBJ databases
<p>Is used to point to information related to entries and found in data collections other than UniProtKB.</p><p><a href='../manual/cross_references_section' target='_top'>More...</a></p>Cross-referencesi
<p>Contains the literature citations that are the sources of data used to annotate the entry. Each reference is numbered and contains several subsections allowing a precise description of a given citation.</p><p><a href='../manual/publications_section' target='_top'>More...</a></p>Publicationsi
"A new VEGFR1 receptor transcript coding for the extracellular domains of the protein followed by a C-terminal polyserine tail."Mezquita J., Mezquita B., Pau M., Mezquita C.Submitted (DEC-2007) to the EMBL/GenBank/DDBJ databases
Cited for: FUNCTION IN PGF AND VEGFA SIGNALING; PHOSPHORYLATION OF AKT1; MAPK3/ERK1 AND MAP KINASES; CHEMOTAXIS AND ACTIVATION OF PHOSPHATIDYLINOSITOL 3-KINASE, AUTOPHOSPHORYLATION IN RESPONSE TO PGF AND VEGFA.
<p>Provides general information on the entry.</p><p><a href='../manual/entry_information_section' target='_top'>More...</a></p>Entry informationi
<p>Provides a mnemonic identifier for a UniProtKB entry, but it is not a stable identifier. Each reviewed entry is assigned a unique entry name upon integration into UniProtKB/Swiss-Prot.</p><p><a href='../manual/entry_name' target='_top'>More...</a></p>Entry namei
VGFR1_HUMAN
<p>Provides one or more accession number(s). These are stable identifiers and should be used to cite UniProtKB entries. Upon integration into UniProtKB, each entry is assigned a unique accession number, which is called ‘Primary (citable) accession number’.</p><p><a href='../manual/accession_numbers' target='_top'>More...</a></p>Accessioni
<p>Shows the date of integration of the entry into UniProtKB, the date of the last sequence update and the date of the last annotation modification (‘Last modified’). The version number for both the entry and the sequence are also displayed.</p><p><a href='../manual/entry_history' target='_top'>More...</a></p>Entry historyi
Integrated into UniProtKB/Swiss-Prot:
November 1, 1990
Last sequence update:
April 3, 2007
Last modified:
January 7, 2015
This is version 184 of the entry and version 2 of the sequence. [Complete history]
<p>Indicates whether the entry has been manually annotated and reviewed by UniProtKB curators or not, in other words, if the entry belongs to the Swiss-Prot section of UniProtKB (<strong>reviewed</strong>) or to the computer-annotated TrEMBL section (<strong>unreviewed</strong>).</p><p><a href='../manual/entry_status' target='_top'>More...</a></p>Entry statusi
Any medical or genetic information present in this entry is provided for research, educational and informational purposes only. It is not in any way intended to be used as a substitute for professional medical advice, diagnosis, treatment or care.
<p>Contains any relevant information that doesn’t fit in any other defined sections</p><p><a href='../manual/miscellaneous_section' target='_top'>More...</a></p>Miscellaneousi
<p>UniProtKB Keywords constitute a <a target="_top" href="/keywords">controlled vocabulary</a> with a hierarchical structure. Keywords summarise the content of a UniProtKB entry and facilitate the search for proteins of interest.<p><a href='../help/keywords' target='_top'>More...</a></p>Keywords - Technical termi |
Authentic Hunting.
Menu
Finding Perfect Singletrack in Iceland
Last fall, mountain bikers KC Deane and Geoff Gulevich took off to Iceland in search of pristine singletrack. In addition to the incredible trails, they found volcanic rock, sprawling vistas, and stunning greenery, and witnessed Iceland’s mythical beauty for themselves. Iceland Wilderness is a film from FastFokus. |
A failed city inspection from this year says the building's stone decoration is "deteriorated and perhaps might be loose" - a problem Decker says isn't fixed by just adding these metal mesh guards.
"It's a band-aid solution, as opposed to a permanent fix," Decker said.
He says the problem on the building's upper levels is the same as this loose stone around the base.
"It's exactly the same thing, but the problem is, you see where the stone fell off, if the stone falls off up there, it could cause a lot of damage," Decker said.
In May, just a block away, city inspectors failed the more than a century-old Marshall Fields Building, citing "severe structural cracks," "dangerous and hazardous pieces," and even problems with the building's "parapet walls," where the top of the exterior wall extends up above the flat roof. City inspectors found they're "leaning outward."
Families bring out of town guests to see the old Marshall Fields building, but many people who work downtown don't spend their time looking up.
"I am concerned, I normally don't think about it. They should block all this off and start to work on this immediately," said Charlotte Searles.
Macy's officials say they met with the building department last year and created a yearly upkeep plan, and that their building is now classified as "safe with repair and maintenance program" by the city.
The I-Team also uncovered pigeon spikes blowing in the wind at the Hotel St.Benedict Flats at Chicago and Wabash, a problem city inspectors found in failed inspections in both 2012 and 2013. The building's owner gave the I-Team invoices saying the problems had been corrected, and says they're now working on again reattaching the spikes. But the spikes are still hanging off the building, over the sidewalk.
"A lot of these landmark buildings are older structures and they really do require maintenance," said Ward Miller, of Preservation Chicago.
On the Far North Side, the landmark old Engine Company 59 Firehouse is vacant, abandoned, and overgrown. New owners plan to close on the building and start renovations at the end of the year.
Unity Hall on the South Side failed its inspection in 2010, and a red "X" shows it's still vacant and dangerous, so firefighters stay out. The building's owner tells the I-Team it's being turned into new apartments.
A failed inspection this June at the Fullerton State Bank noted cracks and masonry problems and told building owners to immediately remove these two metal abandoned signs, still hanging over the sidewalk. A building representative says the city hasn't approved permits to do the required removal and planned upkeep.
"How do you even know how heavy that is?" said Art Shalk, of Lakeview.
Conservationists say the city needs more money and a bigger staff to keep landmarks safe and in one piece.
"It could be like an emergency fund for certain buildings tied to certain issues, to keep the water out, and to keep the deterioration from happening at a quicker rate," Miller said.
Mayor Rahm Emanuel's office refused to provide anyone on camera to discuss this public safety concern.
In a written statement, city officials said they take the safety of all buildings very seriously, but it is the responsibility of the building owner to keep property in safe condition. |
Fantasy Advice: The Rockets recently traded Chase Budinger and the only real threat at small forward is Chandler Parsons. While Lamb is probably more of a shooting guard type player, if he can adjust quickly he should be able to carve out some nice minutes in a platoon with Parsons, much like Budinger did last season. He’s 6’5, but he’s got a 6’11 wingspan which should help him if the Rockets decide to give him some run at small forward in a small lineup. It’s really his only hope of getting solid minutes since the Rockets still have Kevin Martin full time at shooting guard.
Lamb is a great offensive threat with an excellent shot. He managed to hit 60% of his two point shots last season. He’s got a good three point shot too and he can stroke it from well outside the three point line, but he’s going to have to keep working on it to develop into elite status. He attempted 6.2 threes per game last season, but only hit them at a 33.6% rate. He’s a solid career free throw shooter at 80.5%.
As we get further down the list of the players drafted in 2012, it gets much more difficult to make early fantasy predictions. It does appear that Houston is going with youth, so anything is possible for Lamb this season. Keep an eye on summer league and training camp to get a feel for his role.
Fantasy Advice: Terrence Ross was a surprise pick by the Raptors at number eight, especially with Austin Rivers still on the board. I’m not sure what the Raptors see in Ross, but there must be something.
Ross has a good three point shot, launching 5.5 per game last season and hitting 37.1% of them. Whether or not he can consistently get to the basket remains to be seen. His defensive stats of .9 blocks and 1.4 steals per game are fairly impressive and point to a well rounded fantasy asset. He also showed good rebounding ability with 6.4 a game last season. He pretty much amounts to what most fantasy owners describe as a typical ‘three and D’ type player. He’ll play some tough defense and be asked to hit the occasional three pointer, which isn’t the type of player most fantasy owners are looking for.
He’s a pretty solid athlete at 6’7, 200 pounds with 3% body fat. He also put on a show with a 38 inch vertical.
Ross is going to be a fantasy wildcard in Toronto, so his final draft position will depend on training camp and how the Raptors handle the other small forward/shooting guard competitors on the roster during free agency. They still have DeMar DeRozan at SG and it’s going to be pretty difficult to start Ross over DeMar, so it could be tough to find many minutes initially for Ross.
Fantasy Advice: The Cavs were looking for a scorer to pair with Kyrie Irving in the backcourt and they most definitely wanted Bradley Beal, however Beal was long gone and Cleveland decided to take a gamble and go with Waiters over Harrison Barnes.
All I’ve seen from Cleveland fans is that ‘Waiters never started a game at Syracuse’. Whatever. The guy has a pretty broad skillset and can probably thrive in whatever role is chosen for him. He can drive to the basket or hit the three. He’s also pretty good with the ball in his hands as a playmaker and could easily end up in a Tyreke Evans type of role.
With Waiters, it’s difficult to guage his offensive contributions due to the fact that he only played 24.1 minutes per game, but if you convert his stats to a per/40 minute basis, the picture gets much clearer:
If you break some of the top offensive players of the draft down into a per/40 basis, Waiters can hold his own with the best of them. Cleveland probably isn’t going to do much this year and they have the luxury of putting Waiters into the starting lineup to build future chemistry with Irving. Combine this with the fact that the Cavs desperately need scoring and it looks like Waiters could possibly be a fantasy steal and may come at a cheaper draft price than Bradley Beal.
Fantasy Advice: Beal fell into the perfect draft scenario for his skill set. The Wizards have an opening day lineup of John Wall, Trevor Ariza, Emeka Okafor and Nene. All they are missing is a shooting guard with a dependable outside shot. Welcome to Washington Bradley Beal.
Beal took 5 three pointers a game at Florida and hit them at a 33.9% clip. He’s going to have to continue to work on his shot to add a few points to that percentage, but he’s got the right mechanics and mental ability to do so. If he can consistently hit the jumper, he’s going to play and open things up for John Wall. If his shot goes south to a level that is worse than Jordan Crawford’s, then he’s going to see the pine while Crawford plays. It’s pretty simple, the Wiz are asking just one thing out of him, hit the shot that opens the floor.
Another quality that hasn’t been talked about too much is Beal’s rebounding ability. He managed to grab 6.7 rebounds a game, which is pretty solid from the guard spot. If that skill translates to the NBA, he could be looking at Dwyane Wade type rebound figures from the shooting guard position.
Beal will be an attractive fantasy draft target for owners who need to bolster their three point category, while hopefully getting decent points, rebounds and steals.
Fantasy Advice: This is something that many people suspected while watching Wade struggle thoughout the playoffs. There aren’t any reports detailing the medical findings or upcoming surgery and it’s simply being described as a ‘cleanup’ procedure that will only require him to be on crutches for a couple of days. It doesn’t sound like it will be anything that should affect his 2012-2013 fantasy value. If anything, the extra rest that he’ll get from missing the Olympics will only help his performance next season. |
Q:
How to make a grid column scroll horizontally in metro apps?
I have a Grid column and I have a list view in it. I am populating it from a form which is found in a another column. The values entered in the form gets saved to a list. I want that list displayed in the list view. When the text entered in the form increases the remaining values gets disappeared. I want that column to scroll horizontally so the values don't get disappeared.
This is what I have tried so far..
<Grid Grid.Column="2" Margin="0,0,46,10" ScrollViewer.HorizontalScrollBarVisibility="Visible">
<ScrollViewer HorizontalScrollMode="Auto" HorizontalScrollBarVisibility="Auto" VerticalScrollMode="Disabled" VerticalScrollBarVisibility="Hidden" Margin="0,0,-60,10">
<ListView x:Name="lsvLessons" IsItemClickEnabled="True" ScrollViewer.VerticalScrollBarVisibility="Auto" ScrollViewer.VerticalScrollMode="Enabled" ScrollViewer.HorizontalScrollBarVisibility="Auto" BorderThickness="1" SelectionMode="Multiple" ItemsSource="{Binding Source={StaticResource cvsLessons}}" Margin="7,0,62,0">
<ListView.ItemsPanel>
<ItemsPanelTemplate>
<WrapGrid Orientation="Vertical" HorizontalChildrenAlignment="left"/>
</ItemsPanelTemplate>
</ListView.ItemsPanel>
<ListView.ItemContainerStyle>
<Style TargetType="ListViewItem">
<Setter Property="Padding" Value="0"/>
<Setter Property="Margin" Value="-12"/>
</Style>
</ListView.ItemContainerStyle>
<ListView.ItemTemplate>
<DataTemplate >
<StackPanel Orientation="Horizontal" Width="375" Height="20" Background="Transparent" HorizontalAlignment="Left">
<StackPanel Width="230" VerticalAlignment="Center" Margin="15,5,0,0">
<TextBlock Text="{Binding Name}" Foreground="white" FontSize="14" Margin="0,3,0,0" FontWeight="Normal" VerticalAlignment="Center" HorizontalAlignment="Left"/>
</StackPanel>
</StackPanel>
</DataTemplate>
</ListView.ItemTemplate>
</ListView>
</ScrollViewer>
</Grid>
Someone please help me do this.
Any kind of help is appreciated....
A:
Have you tried to do that w/o the ScrollViewer Control? and Enable the horizontal scroll mode?
Try this:
<Grid Grid.Column="2" Margin="0,0,46,10" ScrollViewer.HorizontalScrollBarVisibility="Visible">
<ListView x:Name="lsvLessons" IsItemClickEnabled="True" ScrollViewer.VerticalScrollBarVisibility="Auto" ScrollViewer.VerticalScrollMode="Enabled" ScrollViewer.HorizontalScrollBarVisibility="Auto" BorderThickness="1" SelectionMode="Multiple" ItemsSource="{Binding Source={StaticResource cvsLessons}}" Margin="7,0,62,0" ScrollViewer.HorizontalScrollMode="Enabled" >
<ListView.ItemsPanel>
<ItemsPanelTemplate>
<WrapGrid Orientation="Vertical" HorizontalChildrenAlignment="left"/>
</ItemsPanelTemplate>
</ListView.ItemsPanel>
<ListView.ItemContainerStyle>
<Style TargetType="ListViewItem">
<Setter Property="Padding" Value="0"/>
<Setter Property="Margin" Value="-12"/>
</Style>
</ListView.ItemContainerStyle>
<ListView.ItemTemplate>
<DataTemplate >
<StackPanel Orientation="Horizontal" Width="375" Height="20" Background="Transparent" HorizontalAlignment="Left">
<StackPanel Width="230" VerticalAlignment="Center" Margin="15,5,0,0">
<TextBlock Text="{Binding Name}" Foreground="white" FontSize="14" Margin="0,3,0,0" FontWeight="Normal" VerticalAlignment="Center" HorizontalAlignment="Left"/>
</StackPanel>
</StackPanel>
</DataTemplate>
</ListView.ItemTemplate>
</ListView>
</Grid>
Adding ScrollViewer.HorizontalScrollMode="Enabled" & Removing the ScrollViewer control ..
UPDATE:
You can achieve that without using columns.. here's my try:
<Grid x:Name="rootGrid">
<ScrollViewer HorizontalScrollMode="Enabled" >
<StackPanel Orientation="Horizontal" >
<Grid x:Name="form" >
<!-- your form here.. -->
</Grid>
<Grid x:Name="list" >
<!-- your listview here.. -->
</Grid>
</StackPanel>
</ScrollViewer>
</Grid>
Good luck :)
|
The beach at Brignogan Plages
Brignogan Plages
Brignogan Plages is a village on the coast of Brittany.It is about 22 miles from the port of Roscoff
where we stayed for a short break
When we visited Brignogan it was a dull day with several heavy showers.So we did not see the village at its best.However we managed a walk on the narrow beach. You could walk out further where the boats are tied up but it was a bit to muddy.It started to rain again so it was back to the car for a cup of coffee.You can park close to the sea wall and watch the tide come in there is plenty of parking spaces.
We drove into the centre of the village passed a nice looking church you can see it in the photo below.You can park on the car park behind a large hotel and restaurant complex which looked closed.We had a short walk round there were a few shops and a bar/restaurant.There was another shower so it was back to the car and time to move on.
The village of Brignogan Plages
The sea front
Colourful house overlooking the sea and the main road to the town centre
Boat moored in the estuary
Brignogan Plages and estuary
The local church
The view across the estuary
Hotel du Centre in Roscoff
The hotel overlooks the harbour at the front and a town centre street at the back
They serve a good continental breakfast in the restaurant.The
bedroom we had was a good size with a bathroom fresh towels were supplied everyday.
The room had a TV and free Wifi connection.
You could park to unload at the front of the hotel for 15 mins.There is a large public car park about 150 yards away which is free.We parked there and had no problems.You need to get a free parking ticket from the machine on the car park everyday.
We enjoyed our stay there and would go back again. The hotel is on 5 Rue Gambetta | Le Port, 29680 Roscoff |
Q:
Convert Java objects to JSON with specific fields
I want to create two different JSON documents and each contains 5 fields. I have a POJO class with 10 attributes. I want to form json1 with 5 attributes and json2 with 5 attributes using that POJO class. Is there any way to construct these objects?
A:
Consider writing two separate wrapper classes which each expose the fields you want for the two cases, and pass the pojo as a constructor arg.
So, one of them exposes one set of properties and might look like this:
public class JsonObject1 {
private MyPojo myPojo;
public JsonObject1(MyPojo myPojo) {
this.myPojo = myPojo;
}
public void getProperty1() {
return myPojo.getProperty1();
}
......
}
and the other is similar, but exposes the other subset of properties.
Alternatively, you could add two methods (possibly to your POJO, or possibly to a service class that is exposing the POJO) that each returns a Map (eg a HashMap) where you've copied across the specific properties you want for each view, and then convert those Maps to JSON. This is less "model-driven", but might be less work overall. Thanks to @fvu for this observation!
public Map<String, Object> getPojoAsMap1() {
Map<String, Object> m = new HashMap<>();
m.put("property1", pojo.getProperty1());
....
return m;
}
It's also possible that the two different JSON representations are trying to tell you that your POJO should be split up into two POJOs - sometimes things like this are hints about how your code could be improved. But it depends on the circumstances, and it might not apply in this case.
|
jackie-ocean-deactivated2018120 asked: I would love to see more comics with Jackie! What do you think?
Agree, that’s why Jackie will be here to stay in the Ship War AU.
(Bad news though, because of an unforeseen event, Ship War AU will be delayed until December.) |
Hotel Amenities
Hotel Amenities
In Hotel Belgrade features a sauna and a fitness center. The hotel offers a restaurant. A bar/lounge is on site where guests can unwind with a drink. High-speed wireless Internet access is complimentary.
This 4-star property offers access to a business center. 4 meeting rooms are available. This business-friendly hotel also offers tour/ticket assistance, multilingual staff, and a garden. For a surcharge, a roundtrip airport shuttle (available on request) is offered to guests. |
There are a variety of facilities that require certain of its visitors to be accompanied by another individual when leaving the facility. A good example of this type of facility is a daycare center, where the management of the day care center requires that a parent or other pre-approved adult picks up the child at the end of a day spent at the center. Other examples include certain schools, facilities for individuals with mental or physical disabilities, hospitals and other health care or medical facilities, senior centers, youth detention centers, etc. Some of these facilities may have implemented security processes designed to ensure that the individual arriving to pick up the dependent visitor to the facility is authorized to do so. However, even where the management of the facility is diligent in taking particular security precautions in releasing dependent visitors into the custody of other individuals, those precautions may still be circumvented by an unauthorized individual that lies to the management personnel, obtains necessary documentation through inappropriate means in order to pose as an authorized custodian, generates and presents false documentation, or otherwise employs tactics designed to subvert the security requirements put in place by the facility. There therefore remains a need for a security system that can be employed by such facilities that is able to positively determine that a particular individual is an authorized custodian for a dependent visitor prior to releasing the dependent visitor into such individual's custody. |
England struggle despite Pietersen ton on day three of the third Ashes test
Kevin Pietersen raises his bat after being dismissed for 113 runs by Mitchell Starc
England face another two days of hard graft if they are to retain the Ashes in Manchester this week despite Kevin Pietersen's 23rd Test century.
Pietersen has been largely absent with the bat so far this series but saved his best for an innings of 113 that was the backbone of England's 294 for seven at the close on day three of the third Investec Test at Emirates Old Trafford.
That still represented a deficit of 233 runs and, more importantly, 34 runs shy of a follow-on target that appears Australia's best hope of pressing for a victory they must achieve in order to keep alive their Ashes hopes.
Pietersen ensured they were made to toil manfully for the most part today in that pursuit - Australia managed just five wickets - as he hit his first Test century at this venue.
The right-hander was given a life on 65 when Australia failed to review an lbw call that would have been given out, before bringing up three figures with an uppercut over point that bounced once before finding the ropes.
But when the 33-year-old fell in the final hour lbw to Mitchell Starc (three for 75), England's lower order were still left with the important task of avoiding the follow-on.
With two days remaining in the match, Matt Prior (six) and Stuart Broad (nine) will begin tomorrow tasked primarily with passing that target after Australia posted 527 for seven declared in their first innings.
England had been in some discomfort before lunch at 110 for four, but Pietersen and Ian Bell (60) put on 115 in a timely partnership that took them into the final session. |
Emergency laparoscopic cholecystectomy in an unselected cohort: a safe and viable option in a specialist centre.
Patients presenting acutely with symptomatic gallstone-related disease have historically had their laparoscopic cholecystectomy (LC) deferred due to perceived increased operative risks in the acute setting, particularly conversion to open surgery. The aim of this study was to compare morbidity and mortality between unselected cohorts of patients undergoing elective and 'emergency' LC in a District General Hospital. All gallstone-related elective and emergency admissions under the care of two specialist laparoscopic surgeons during a two-year period were included. Patients admitted acutely with a diagnosis of biliary colic, acute cholecystitis or gallstone pancreatitis underwent 'emergency' LC during the same admission. Data were collected prospectively on patient demographics, inpatient stay, post-operative course and POSSUM scores. 423 patients underwent LC, of which 301 (71.1%) were elective and 122 (28.9%) were 'emergency' procedures. ASA grades and POSSUM physiologic scores were similar between the two groups. The overall morbidity rates were similar in the emergency and elective groups (13.1% vs. 7.3%, p = 0.088), and there was no significant difference in the rates of major complications including conversion to open surgery (0% vs. 0.3%, NS), bile leak or re-operation between the two groups. 30-day mortality rates were similar in the two groups (0.8% vs. 0%, NS). When performed by specialist laparoscopic surgeons, LC in the acute setting is safe with mortality and morbidity rates, including conversion to open surgery, comparable to elective LC. |
Vince Ellis | Detroit Free Press
Vince Ellis, Detroit Free Press
Wendell Cruz, USA TODAY Sports
NEW YORK — As the New York Knicks lead kept growing Saturday night, the Detroit Pistons’ reminders of previous road horrors were ever present.
Reminders like last season’s 13-28 road record, which tied for 10th worst in the Eastern Conference.
Another reminder like the 1-7 record over the last two seasons in road games against the league’s New York-area teams, a stretch where the Knicks and Brooklyn Nets weren’t exactly dominating.
But these Pistons took a step toward exorcising their Gotham demons.
A night after a nail-biting loss at Washington, the Pistons trailed by 21 points in the second quarter Saturday night before roaring back for a thrilling 111-107 victory over the Knicks (0-2) in their home opener.
View | 18 Photos
Detroit Pistons 111, New York Knicks 107
Tobias Harris scored a team high 31 points and his short jumper against Knicks star Kristaps Porzingis with 45.3 seconds left gave the Pistons (2-1) a 107-104 lead.
“All throughout last year, we weren’t a good team on the road,” Harris said in a happy Madison Square Garden visitors’ locker room.
“It’s been a big emphasis for us, being able to grind out games on the road and not give up. We were able to fight them off and a get a win tonight.”
Harris (13-for-24 from the field and 22 second-half points) and Reggie Jackson (16 points, seven assists) carried the Pistons offensively down the stretch with a heavy dose of duo exploiting Porzingis in pick-and-roll situations.
“They both were going well and we were trying to go at (Porzingis),” Van Gundy said. “(He) kills you at one end and for some reason they were playing him on Tobias, I don’t know why, but they were, so we went at that pick-and-roll.”
Jackson has been very good one season removed from last season’s version when he struggled with left knee tendinitis. The Pistons were fine when he was on the floor, as he finished at plus-14.
His three-point play on a short floater with 1:41 left gave the Pistons a 105-102 lead -- a lead they would never relinquish.
The unsung hero was Anthony Tolliver, who did not play the first two games.
Porzingis (game-high 33 points) was 7-for-10 in the first half. He was 3-for-10 in the second half, while being guarded mostly by Tolliver. He entered the game in the second quarter with the mission to cool off Porzingis. It was mission accomplished, and he added three triples.
Still, the Knicks had a chance to get closer when Porzingis got free moving toward the basket after the Harris bucket.
But Andre Drummond swatted the shot away and controlled the rebound to conclude a dominant 21-point, 13-rebound night.
Jackson (16 points, seven assists) was a perfect 4-for-4 at the line in the last 10 seconds to keep the Knicks winless at 0-2.
Perfect Andre: Drummond was perfect at the line, going 3-for-3.
One of the worst free-throw shooters in league history has made his first six free throws of the season with a completely revamped form.
He’s been so good, that Van Gundy is getting serious about considering letting him take a technical free throw.
The assistant coaches were urging just that after a defensive three-second call in the fourth quarter and Jackson wasn’t on the floor.
Van Gundy is to the point where he is daring opposing coaches to deploy the tactic of intentionally fouling Drummond.
“The sample’s small, but you can watch him shoot the free throws and it’s for real,” Van Gundy said. “I’m actually hoping someone grabs him. I’m dead serious. I probably got a little farther to go, but when we had the illegal defense and we didn’t have Reggie on the floor there, my assistants wanted Andre to shoot the free throw.
“I got to have a little more of a sample size probably to go to that point, but it was interesting because that’s truly what the assistants wanted to go with.” |
Q:
Как подменить url адрес без редиректа?
Мне на сайте нужно при переходе по /catalog/4-maslichnye_kultury/new/semena_ryzhika_ozimogo_sort_adamas.html, чтобы редиректило на /catalog/4-maslichnye_kultury/semena_ryzhika_ozimogo_sort_adamas.html . Но в url адрес должен оставаться прежний. Как такое осуществить? Пробовал вставлять в конец:
RewriteRule /catalog/4-maslichnye_kultury/new/semena_ryzhika_ozimogo_sort_adamas.html /catalog/4-maslichnye_kultury/new/semena_ryzhika_ozimogo_sort_adamas.html [L] # L
но это не помогает, вообще никакой реакции.
Вот сам htaccess:
AddDefaultCharset windows-1251
RewriteEngine on
Options +FollowSymlinks
RewriteBase /
RewriteCond %{REQUEST_URI} !/css/
RewriteCond %{REQUEST_URI} !/images/
RewriteCond %{REQUEST_URI} !/upload/
RewriteCond %{REQUEST_URI} !/js/
RewriteCond %{REQUEST_URI} !/mod/
RewriteCond %{REQUEST_URI} !/inc/
RewriteCond %{REQUEST_URI} !/admin
RewriteCond %{REQUEST_URI} !/min/
RewriteCond %{REQUEST_URI} !/fonts/
RewriteCond %{REQUEST_URI} !/404.html
RewriteCond %{REQUEST_URI} !/basket.php
RewriteCond %{REQUEST_URI} !/image.php
RewriteCond %{REQUEST_URI} !/robots.txt
RewriteCond %{REQUEST_URI} !/favicon.ico
RewriteRule ^(.*)$ index.php [L,QSA]
RewriteRule ^.htaccess$ - [F]
RewriteCond %{HTTP_USER_AGENT} ^EmailSiphon [OR]
RewriteCond %{HTTP_USER_AGENT} ^ExtractorPro
RewriteRule ^.*$ - [F]
ErrorDocument 404 /404.html
A:
Вам нужно заменить этот фрагмент на
RewriteCond %{REQUEST_URI} !/css/
RewriteCond %{REQUEST_URI} !/images/
RewriteCond %{REQUEST_URI} !/upload/
RewriteCond %{REQUEST_URI} !/js/
RewriteCond %{REQUEST_URI} !/mod/
RewriteCond %{REQUEST_URI} !/inc/
RewriteCond %{REQUEST_URI} !/admin
RewriteCond %{REQUEST_URI} !/min/
RewriteCond %{REQUEST_URI} !/fonts/
RewriteCond %{REQUEST_URI} !/404.html
RewriteCond %{REQUEST_URI} !/basket.php
RewriteCond %{REQUEST_URI} !/image.php
RewriteCond %{REQUEST_URI} !/robots.txt
RewriteCond %{REQUEST_URI} !/favicon.ico
на
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
чтобы правило обработки всех несуществующих в файловой системе адресов обрабатывалось index.php.
Работающий .htaccess:
AddDefaultCharset windows-1251
RewriteEngine on
Options +FollowSymlinks
RewriteBase /
RewriteRule ^catalog/4-maslichnye_kultury/new/semena_ryzhika_ozimogo_sort_adamas.html /catalog/4-maslichnye_kultury/new/semena_ryzhika_ozimogo_sort_adamas.html [NC,L]
# Не учитываем существующие файлы и директории
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule ^(.*)$ index.php [L,QSA]
RewriteRule ^.htaccess$ - [F]
RewriteCond %{HTTP_USER_AGENT} ^EmailSiphon [OR]
RewriteCond %{HTTP_USER_AGENT} ^ExtractorPro
RewriteRule ^.*$ - [F]
ErrorDocument 404 /404.html
|
Mitt Romney turned attention to his foreign policy this week, with a largely substance-free and fact-challenged speech on Tuesday and a European tour that will eventually take him to Israel. While Romney gone to great lengths to avoid talking national security, it’s no secret that neither Romney nor his advisers appear capable of outlining a clear vision of a Romney administration’s foreign policy. What little specifics we do hear sound suspiciously like the Obama administration’s positions. So for those wondering what a Romney presidency might mean for U.S. troops and diplomats, there’s not much to go on.
But what’s troublesome about Romney on foreign policy is what’s cooking behind the scenes. Gen. Colin Powell recently complained that Romney’s foreign policy team is “quite far to the right.” Indeed, veterans of the Bush/Cheney administration “pepper” Romney’s foreign policy team and the so-called “Cheney-ites” are reportedly winning the presumptive GOP presidential nominee’s ear. Here’s an in depth look at some of the key advisers a President Romney will hear from on foreign policy and what we might come to expect in a Romney administration:
JOHN BOLTON
Before advising Romney, Amb. John Bolton served briefly as U.S. ambassador to the U.N. under a recess appointment — awkward from the start because of his lifelong disdain for anything multilateral. After leaving government and taking up a position at the American Enterprise Institute, he turned on the Bush administration for not being hawkish enough on Iran. It’s a note he’s been striking since as a Fox contributor, sometime presidential candidate, and frequent guest on right-wing conspiracy theorists’ radio shows. He cheers for negotiations with Iran to fail, a position that supports his “default setting” of wanting to bomb Iran for any old reason even though he has admitted it might not work. Ominously, Bolton even once suggested a nuclear attack against Iran. |
Q:
facebook application : get birthday
I would like to know how to get the date of birthday of the user of facebook.
Here is the code which deal with facebook api :
<?php require 'src/facebook.php';
define("FB_APP_ID","***");
define("FB_SECRET","***");
$facebook = new Facebook(array(
'appId' => FB_APP_ID,
'secret' => FB_SECRET,
'cookie' => true,
));
$currentUser = $facebook->getUser();
if($currentUser) {
try
{
$facebook_profile = $facebook->api('/me');
$friends_fields = $facebook->api('/me/friends');
}
catch (FacebookApiException $e)
{
print_r($e);
$user = null;
}
}
$loginUrl = $facebook->getLoginUrl(
array(
'scope' => 'user_birthday, birthday, date_birthday, email, offline_access, publish_stream'
)
);
$logoutUrl = $facebook->getLogoutUrl();
?>
I tried $facebook_profile['user_birthday'] and $facebook_profile['birthday']
But it does not work.
I don't know how to do ? Can you help me please ?
A:
The correct permission for birthday is user_birthday
Verify you have the permission
$permissions = $facebook->api('/me/permissions');
$permissions["data"][0]["user_birthday"];
Seeing that you have facebook_profile, you should just dump the contents of that response to see what you do have.
Also ensure the user did set his/her birthday...
|
(a) Field of the Invention
The present invention relates to a self-piercing rivet. More particularly, the present invention relates to a self-piercing rivet that can penetrate and join more than two joining objects.
(b) Description of the Related Art
Automotive industries pay attention to environmental problems, and apply aluminum alloy and plastic materials to a vehicle body so as to reduce weight of the vehicle body and to improve fuel consumption being one of solutions that solves the environmental problems.
For these purpose, joining methods for assembling the vehicle body have been researched and developed instead of conventional spot welding.
Recently, a self-piercing rivet using a self-piercing rivet system is increasingly used.
According to a conventional riveting technique, joining objects such as steel sheets are joined by forming a head portion after a riveting hole is bored and a rivet is inserted into the riveting hole. However, the rivet is press-fitted into the joining objects by hydraulic pressure or pneumatic pressure without forming the riveting hole according to self-piercing rivet technique. At this time, the rivet is deformed plastically and joins the joining objects.
A self-piercing rivet is used for joining metal sheets according to the self-piercing rivet technique, and the self-piercing rivet includes a head and a partially hollow cylindrical shank.
For example, a shank of the self-piercing rivet penetrates an upper sheet by a punch of a setting tool. At this time, the shank is supported by a die and is deformed outwardly. In addition, since the shank is press-fitted to a lower sheet in a state that the head portion is supported by the upper sheet, the upper sheet and the lower sheet are joined.
Since the shank of the conventional self-piercing rivet is formed as an annular piercing edge, a penetrated portion of the upper sheet is completely cut off by the annular edge when the shank penetrates the upper sheet and is press-fitted to the lower sheet.
Since the penetrated portion of the upper sheet cut off by the shank cannot form mechanical interlock of the upper and lower sheets and remains as a dead metal, joining strength of the upper and lower sheets may be deteriorated.
In addition, since the dead metal cannot join the upper and lower sheets with sufficient strength, the upper sheet rotates relatively with respect to the lower sheet.
Accordingly, various techniques for preventing rotation of the upper sheet are applied according to conventional arts. For example, a plurality of rivets is used for preventing the rotation of the upper sheet.
If the plurality of rivets is used, processes may be complicated, productivity may be deteriorated, and product cost may be increased due to increase of processes and components.
Since the shank of the rivet is formed as the annular piercing edge, the shank penetrates the upper sheet with an annular shape, and thereby increases joining load according to conventional arts.
The above information disclosed in this Background section is only for enhancement of understanding of the background of the invention and therefore it may contain information that does not form the prior art that is already known in this country to a person of ordinary skill in the art. |
An array of politicians spoke at the memorial service, held at Northwestern University School of Law Saturday afternoon.
AG Madigan on Netsch
Dawn Clark Netsch, an icon of state politics who made history in Illinois as the first woman nominated to run for governor, died peacefully in her sleep at 12:30 a.m. Tuesday from complications of ALS. She was 86. (Published Tuesday, March 5, 2013)
A letter from President Barack Obama was read at the service, admiring the inspiration Netsch offered to women.
“From graduating first in a law school class of no other women, to being the first female to hold statewide office in Illinois, Dawn refused to accept gender as an obstacle to success,” the letter said. “In Dawn’s memory, let us continue to build a nation where the doors of opportunity open wide for all willing to dream big.”
Many described Netsch as fearless, but with a great sense of humor.
Durbin recalled memories of Netsch as an original member of the group if Democrats in the General Assembly known as the “Crazy 8.” He remembered a particular meeting where another member, Kenneth Buzbee, told Netsch if she wanted to “run with the boys” she needed to “talk like one of the boys.”
“Dawn answered, ‘Listen Buzbee, I was one of the boys before you were one of the boys,” Durbin said.
Speakers remembered Netsch’s infamous commercial ad, where she was seen shooting pool tricks to represent her as a “straight shooter.” Many cited the commercial as what propelled Netsch into the political spotlight.
But the messages always returned to how Netsch paved the way for many women in politics and leadership.
“Each chapter in Dawn Clark Netsch’s life is a great story,” Durbin said. “Triumphs over sexism, cynicism. Triumphs over the mundane. But her legacy is found in the women of Illinois who have been inspired to public office because of Dawn Netsch. It takes a special brand of talent and determination to lead.” |
Poll evil
Poll evil is a traditional term for a painful condition in a horse or other equid, that starts as an inflamed bursa at the anterior end of the neck between vertebrae and the nuchal ligament, and swells until it presents as an acute swelling at the poll, on the top of the back of the animal's head. The swelling can increase until it ruptures and drains. It can be caused by infection from Actinomyces bovis or Brucella abortus organisms, but may also occur due to parasite infestation, skin trauma, or badly fitting horse tack. Because of modern efforts to reduce the incidence of brucellosis in livestock, horses are less exposed to the Brucella abortus organism, and hence most modern cases of poll evil arise from trauma linked to a horse striking its head against poorly designed or low-clearance structures, or to improper use of equipment, particularly leaving a halter on the horse around the clock.
The term has been in use since at least the 1750s. Before modern antibiotics were developed, the condition was very difficult to treat. In the 18th century, it was treated with remedies such as vinegar, wine, elder flower and even turpentine. Today, cases caught early can be cleaned with peroxide, ice packs and diluted dimethyl sulfoxide solution, with antibiotics used to prevent or slow infection. If the infection has set in and there is a discharge, antibiotic treatment along with hot packs and surgery under local anesthesia to remove infected and dead tissue is usually required.
Fistulous withers is a similar condition but on the animal's withers.
References
Category:Horse diseases |
top10
Things to do in Thailand
Traveling by yourself can be a blast! When you are on your own, you get do whatever you like and whenever you wish to do it. Here's our list of best things to do alone in Bangkok. Let us know if you also love it!
Withlocals experiences in Bangkok are
100% With locals
Who you see is who you get.The Withlocals host you book is thehost that welcomes you.
100% Private
All Withlocals experiencesare private, meaning exclusivelyfor you.
a 100% taste of the city
From city highlights to hidden gems.From food essentials to home dinners.Our hosts share it with you.
Try the Local Street Food
Local things to do in Bangkok 1
If you are looking for things to do in Bangkok alone then you won’t have to look for too long and you will be spoilt for choice. One thing that visitors to Bangkok often remark upon is the local food, and you could spend some of your time touring the food stalls sampling the meals that they sell.
As your guide for the evening, your host can advise on which stalls are the favourites among the locals so you know that you are getting a quality meal. Visiting the food stalls at night is also a great way to get to know your host better, and provides an interesting vista from which to view more of the city.
Top food eaxperiences in Bangkok
Discover the City in real local way
Local things to do in Bangkok 2
As a visitor to the city, the chances are that you won’t know the public transport system well, and that you won’t know of the more obscure attractions. Spend a day touring with a local, however, and you can borrow the knowledge of somebody who knows what to do and how to get there.
Your host will be more than happy to take you on a tour of the city and show you the things that you won’t find in the travel brochures. You can also get information on the city and its attractions as you travel through the city’s streets.
See tow the Monks Live
Local things to do in Bangkok 3
One of the more educational things to do in Bangkok alone can be to get an insight into how some of the city’s many Monks go about their daily lives. Each and every day, early in the morning, the Monks all over the country go on their alms rounds, collecting donations of food from the nation’s citizens on the streets.
Ask your host and they could arrange for you to get closer to the monks as they make their rounds, giving you a glimpse into a lifestyle that is very different from most others. With your host as your guide, you can also be confident of being guided correctly in regard to correct procedures and etiquette.
Top cultural things to do in Bangkok
Enjoy a homemade dinner
Local things to do in Bangkok 4
Being alone doesn’t mean that you have to be lonely, in fact it can give you even more opportunity to meet new and interesting people. One great way to meet new people is over a meal, even more so if the meal is a home-cooked dinner at your host’s house.
As a guest in your host’s home for the evening, you can get to learn a lot more about the city of Bangkok and the people that live there. It can also be a great way to pick up some cooking tips that you can use in the kitchen yourself.
Explore the Temples
Local things to do in Bangkok 5
One of the more popular things to do in Bangkok alone is to visit the city’s many temples, and doing so will help keep you very busy indeed. Grand temples are dotted throughout the city and many have other attractions nearby to keep you occupied on your day out.
Although the temples do look magnificent, they are also rich in history and culture and your host can help to teach you about the history and culture attached to them. With a local as your guide, you can get to learn more about the temples and Thai history and culture in general.
A customized trip with Piyaporn
We thoroughly enjoyed our day with Piyaporn and highly recommend to other travellers. Piyaporn was knowledgeable, helpful, and friendly. Her english is very good and she was very flexible especially as we were keen to try many different thai foods especially at the floating markets, which then became some sort of a mini food tour. We’re so grateful to Piyaporn for making it an awesome experience for my wife and I.
Experience a Different Way of Life
Local things to do in Bangkok 6
Most of us in the western world are accustomed to the 9-5 routine, but in many other parts of the world people live a very different kind of life. While in Bangkok you get an opportunity to really see how other people live, perhaps even giving you something to ponder on for many years into the future. Check out the Ultimate Local Floating Market & Boat Tour for some great immersion to Thai culture.
Ask your host about the river island of Koh Kret and they can take you to a place where people seem to live life as it was lived generations ago. Your host can also act as an interpreter if needed, so make sure to ask them to come along with you.
Spend the day exploring on Bicycle
Local things to do in Bangkok 7
Are you looking for things to do in Bangkok alone? Then why not try exploring the vast and wonderful city? Bangkok is such a huge city, with so much to see and do that getting to see everything can be very difficult, although getting around can be made a lot easier if you travel by bicycle.
Your host will know which routes you should take so that you get to make the most of the day and get to see as much as possible. As your guide for the day, your host can also teach you about the sights you are seeing, while also making sure that you get plenty of rest and refreshments along the way.
Learn to cook Authentic Thai Meals
Local things to do in Bangkok 8
If you enjoy cooking meals from scratch then it is useful to know as many recipes as possible so that there is plenty of variety in the meals that you make. With that in mind, why not take the opportunity to use your stay in Bangkok to add to your home-cooking menu?
With help from your host, you can take cooking courses so that you can impress your friends and families with authentic Thai meals whenever you like. With the guidance from a professional chef and from your host, you can learn to cook Thai meals just as they were intended.
Take in a Boxing Match
Local things to do in Bangkok 9
If you are looking for exciting things to do in Bangkok alone then there is plenty to choose from, although they don’t come much more exciting than a boxing match. Muay Thai is the national sport and is followed very enthusiastically, and matches are action packed and held in full stadiums with captivating atmospheres.
Your host will be able to let you know which of the arenas are more suited to your personal preferences so you get to take in the atmosphere in maximum comfort. You are also allowed to bet on the outcome of the matches at certain venues, and your host could provide you with some tips on who the winners might be.
Get Back to Nature by Exploring the Jungle
Local things to do in Bangkok 10
Thailand is a country that is well known for its natural beauty and even when in the capital city you are never too far away from nature. Just a short trip on the nation’s modern travel network and you could find yourself in a location that would have you thinking that you are far from civilisation.
Let your host know that you would like to get back to nature and they can recommend opportunities that allow you to do just that. Having a private guide can be very beneficial so make the most of an opportunity to use one when you can. |
Q:
"Disbalanced" vs. "unbalanced"
What are the differences in usage between disbalanced and unbalanced?
A:
Well, "disbalanced" apparently is not a currently used English word. It existed but it's not used anymore, since it doesn't appear in the OALD, nor in the NOAD. And when I was editing your question my browser signalled it as "wrong".
Unbalanced is used when you want to define something as not equally distributed, to define a person as mentally ill or disturbed or when someone is "giving too much or too little importance to one part or aspect of something". [OALD]
A:
The Oxford English Dictionary (OED) has an entry for disbalance, meaning to disturb the balance or equilibrium of, to put out of balance. Its derived adjective disbalanced is also included, with a citation from 1885. I'm not surprised that it's not to be found in Alenanno's sources, as it must be rare now, if not exactly obsolete.
Unbalanced is defined in the OED as not balanced or equably poised.
|
1. Field of the Invention
The present invention relates to a selective call system, particularly but not exclusively, to a message transmission system in which long data messages and/or telescript are (or is) transmitted.
2. Description of the Related Art
PCT Patent Specification W094/28685 discloses a paging system which is suitable for sending long data messages at higher rates than is currently normally used and which is an enhancement of, and compatible with, the CCIR Radiopaging Code No 1 alternatively known as the POCSAG paging code. This enhanced paging system, known by the Applicant as the Advanced Paging Operators Code (APOC), has provision for sending address code words and concatenated message code words in cycles having a duration of 6.8 secs. Each cycle comprises a plurality of batches, for example 3 batches of equal duration. Each batch comprises a synchronisation (sync) code word concatenated with n frames, each of which is constituted by m code words.
When transmitting long data messages it is often desired to obtain an indication that a data message has been received successfully and better still to obtain a reply of some sort, however simple. The transmission of acknowledgements to paging messages has been disclosed in the art. In U.S. patent application Ser. No. 08/430518 filed Apr. 27, 1995 it is disclosed to transmit responses, that is acknowledgements/simple replies, as spread spectrum signals. By several pagers having different spreading code sequences, they can all respond simultaneously and each response can be recovered at the base station or paging system controller by multiplying the received signal with each of the respective spreading code sequences. The above-mentioned U.S. patent application Ser. No. 08/430518 also discloses allocating 6 unique spreading code sequences to all the message pagers allocated to the same frame of a batch, with each code sequence having a different meaning, such as:
Code Sequence 1--secondary station in the area for purposes of registration only. PA0 Code Sequence 2--Received last message. PA0 Code Sequence 3--Read message(s). PA0 Code Sequence 4--Answer "Yes". PA0 Code Sequence 5--Answer "No". PA0 Code Sequence 6--Resend last message.
In operation when a system controller has sent a data message to a pager or secondary station, a microcontroller in the addressed secondary station will, if the message has been received and decoded successfully, multiply the reply pulse with, say, Code Sequence 2 and transmit the signal. As the system controller knows to which secondary station a data message has been sent, the protocol will allow a suitable time to elapse before transmitting a further message to that secondary station.
There are other cases where it is desired for a secondary station to send a signal, other than in response to a previous outgoing message, for example to register the presence of a pager in an area covered by a particular base station.
In a selective call system in which data messages are transmitted by a primary station to a secondary station which may roam relative to the primary station and which transmits responses as very low power spread spectrum signals, there is the near/far problem in which strong signals may suppress weak ones. This could mean that a signal which is received relatively weakly at a receiver associated with the system controller may be suppressed by a much stronger signal and in consequence is not detected. |
Q:
Export Survey Results to Excel option not in Action Menu
I have a survey and all the needed results. I need to export the results to excel, though in the process of setting up the survey I changed or removed the Overview.aspx page/view. Now when I add a webpart like the overview.aspx, everything is the same except when I go to the Action button “Export to Excel” is not an option. How do I get that option back? If I can’t get that option on a webpart back how can I get the results of the survey exported to excel?
A:
I had a similar problem where the export option was not visible in the action menu. As workaround, I found that if I accessed the survey from Site Settings ==> View All Site Content ==> My Survey then the export button is available.
A:
None of the above should be necessary. The "Action" options are dependent on the view used. Open the "Overview" view, click "Actions" and the export option magically appears.
There's no way anyone would know this so this is a good example of the bad design / UX that plagues Sharepoint.
|
Post navigation
Guild members must vote on pension merger
If the Guild pension plan is to be merged with the Company’s plan as proposed, it is an action that can only be taken by one group: the membership.
Section 14.C. of the contract, on page 32, states: “The Fund will be maintained in accordance with applicable law as a jointly administered trust fund…” This language remains in effect, and the Company made no proposal to alter it in our negotiations.
The only way that a merger can be approved is if it is negotiated with the union and a change to that language is ratified by the membership. You get to decide.
That was the legal advice provided by our counsel, Barbara Camens, after the meeting Wednesday. We are still awaiting a written proposal from the Company.
Ms. Camens made clear that the pension trustees would be in violation of the contract and the law if they voted to move the plan without a vote of the membership. Unfortunately, some of our trustees were poised to do just that. As a result, we made the heart-renching decision to remove two of them.
One of the two was told repeatedly that a vote of the membership should be done, and this person instead insisted this was an action that could be unilaterally taken by the trustees. That is not true and goes against the advice of our counsel, our contract language and the best interests of our membership.
Some have expressed the belief that this step was taken in order to prevent the merger from happening. This is not true. We are still awaiting the Company’s written proposal, we will review it with our attorneys and we will respond appropriately.
In the end, neither the Executive Board nor the trustees will make this decision. Only the membership has the authority to do it. It’s in your hands. |
Awards
App
If you're the sort of adrenaline junkie who can't stand the thought of being left out of anything, we've got good news -- if you drive a MINI and own an iPhone, that is. The latest update to the MINI Connected app has text-to-speech capability, meaning that it can read tweets and status updates as...Read More»
It's no secret that car shoppers are smitten with technology, and nothing is hotter right now than the mix of navigation and concierge services known generally as "telematics". GM has made a bundle with OnStar, and now State Farm has partnered with Hughes Telematics to grab its own slice of the pie...Read More»
Gas prices in the U.S. hit the $4 mark earlier this week, and Murphy USA is hoping to ease the burden on drivers by offering discounts on Foursquare. Judging from comments on Facebook and Twitter, though, we're not so sure that customers are pleased. The offer was announced yesterday on Murphy's...Read More»
Last fall, Land Rover partnered with a wide range of celebs to flaunt its new Range Rover Evoque. Aiming squarely for the high-end hipster demographic, Land Rover tapped influencers around the globe for its campaign, from Posh Spice to Juliette Lewis. As part of the promotion, the automaker also...Read More»
If you are an avid SocialCarNews reader, then you no doubt do your research before buying a new car. If you aren't already using our sister site TheCarConnection, now's the time--now that there's an updated mobile version live on the Web. Late last night the Apple mothership approved version 2.0 of...Read More»
If you own an Android smartphone -- as an increasing number of you do -- you might've linked your Google Maps account to Google Latitude. Doing so allows data-hungry types to track their check-ins and travel history, and to see at a glance how much time they've spent at home, at work, and...Read More»
If you're looking for car news, reviews and ratings, photos and videos, and dealer locators on the fly, there's just one place to go now--TheCarConnection, the mobile edition. Our rockstar developers skated right through Apple's notoriously finicky approval process in record time, which means you...Read More»
Aston Martin has been busy lately, showing off its new 2012 Virage and reminding us about the impending return of the Lagonda line at the Geneva Motor Show. Now, the company has scooted to another gathering in another Swiss city: the annual watch and jewelry show known as BaselWorld. There Aston...Read More»
Four U.S. Senators have come out swinging against smartphone apps that reveal DUI checkpoints, allowing potentially intoxicated motorists to find alternate ways to the next whiskey bar. The Senators sent letters to Apple, Google, and Research In Motion asking the companies to remove offending apps...Read More»
With unrest still bubbling in the oil-producing Middle East, it's time for a reminder on how to save money when filling up--on where and how to get the cheapest gas prices. These three iPhone apps let you report gas prices and share in the love from other drivers, so you'll spend less: GasBuddy...Read More»
Early last month, our colleagues at AllCarTech wrote about BMW's Future Lab and its ConnectedDrive telematics system (which reminds us a bit of GM's upgraded OnStar, with a bit of Pandora thrown in for fun). Now, the automaker has tweaked its Connected app for the iPhone to include social...Read More»
We've spilled a good bit of ink on Waze, the smartphone app that makes commuting more comfortable (and occasionally, entertaining). Using elements like crowdsourced mapping and real-world prizes, Waze has built a following of more than 2,000,000 users, but the company isn't resting on its laurels...Read More»
Ever wished your Chevrolet Cavalier sounded like a supercar? Of course you have, and now it can. Like everything else in the world, there's an app for that. Created by Black Frog Industries, the AutoTones app is an engine sound simulator for your iPhone. The app is easy enough to use: choose the...Read More»
Trapster is a free application for smartphones that helps share and find nearby speed traps. Today users are receiving an email informing them to change their logins as soon as possible due to a security breach. While details have not yet been released on how the breach occurred or how much data...Read More»
When folks think of Seattle, they tend to think of a green city -- one that's pedestrian- and bike-friendly, with lots of opportunities for exercise and outdoor activities. And Seattle is all those things, but it's also known for its traffic. In fact, last year, the city ranked as one of the worst...Read More»
It was bound to happen. Given the hundreds of thousands of apps available for iPhones, iPads, Androids, Blackberrys, and other mobile devices, it was only a matter of time before someone dedicated a TV series to reviewing them. And thus: The Mo Show. We admit, it's a terrible name. (If Mo Gaffney...Read More»
A couple of weeks ago, we told you that 2011 Ford Fiesta owners would be the first folks to get their hands on Ford's snazzy new SYNC AppLink. That seemed like a smart move, given the Fiesta's target market of young, wired urbanites. Now, Ford has announced that AppLink will next appear on...the...Read More»
This has been a banner year for social media. As 2010 draws to a close, we take a look back on some of the more memorable moments. Ford has revealed the new 2011 Explorer to the world via social media, while other car companies have just started venturing into the deep waters of viral marketing...Read More»
If you're a rally fan and you've got an iPhone, iPad, or iPod Touch, here's something you ought to download pronto: the 2011 Dakar Rally app from Volkswagen. It's a great way to keep up with the race from Buenos Aires, Argentina to Arica, Chile and back again -- and best of all, it's free. The...Read More» |
Q:
What's the difference between a centralized and a distributed sequence diagram?
I'm new to UML and I have crossed path with sequence diagram, and realized that there's 2 types: distributed and centralized. Can anyone explain me the differences?
A:
centralized control, with one participant doing most of the processing and the other participants there to supply data.
Example:
Distributed control, in which the processing is split among many participants, each one doing a little bit of the algorithm
Example:
Both styles have their strengths and weaknesses. Most people, particularly those new to objects, are more used to centralized control. In many ways, it’s simpler, as all the processing is in one place; with distributed control, in contrast, you have the sensation of chasing around the objects, trying to find the program.
Despite this, object bigots like strongly prefer distributed control. One of the main goals of good design is to localize the effects of change. Data and behavior that accesses that data often change together. So putting the data and the behavior that uses it together in one place is the first rule of object-oriented design.
Furthermore, by distributing control, you create more opportunities for using polymorphism rather than using conditional logic. If the algorithms for product pricing are different for different types of product, the distributed control mechanism allows us to use subclasses of product to handle these variations.
|
Rachmaninoff (vodka)
Rachmaninoff is a German produced vodka. The spirit is named after the Russian composer Sergei Rachmaninoff. It is a low-budget vodka sold by Lidl supermarket. The brand makes both 37.5% and 40% strength vodka, (with red and blue coloured labels, respectively) as well as a range of alcopops. The bottle's label suggests the use of Worcestershire sauce (Lea & Perrins being such a brand), to be used in the preparation of a Bloody Mary, using this brand of vodka.
Category:German brands
Category:German vodkas
Category:Sergei Rachmaninoff |
Workspaces deleted from a web browser should also be deleted locally
Workspaces deleted from a web browser should also be deleted locally
Problem: When deleting a workspace via a web browser, the WWGM does recognize that the workspace has been deleted when viewing the Workspaces tab on the homepage. However when browsing to the WLD on your machine, you'll find that the WWGM does not remove the local cache of un-encrypted CAD files. This eventually leads to a terrific amount of outdated files in your local cache - in my case, hundreds of MB's within a week.
Proposed solution: WWGM obviously knows when a workspace has been deleted. That's all it needs to know to process a deletion task in the background to remove these files / folders. So in theory it's a trivial update.
Note: This is currently being tracked by an SPR as a bug, as I believe this is not just an enhancement request but the way that it should work. This is SPR 2174774. |
Age- and gender-related changes in endothelin and catecholamine release, and in autonomic balance in response to head-up tilt.
1. There is an increase in circulating levels of vasoconstrictive hormones and an alteration in baroreceptor responsiveness with aging. The role of changes in endothelium-dependent and -independent vasoconstrictive hormones in relation to age and gender, with simultaneous assessment of autonomic balance in response to head-up tilt, has been incompletely studied. 2. Sixteen young [25 +/- 3 years (mean +/- SEM)] and 16 older normal volunteers (68 +/- 7 years) underwent a 30 min head-up tilt test at 60 degrees. Haemodynamics were measured every 5 min and blood samples for neurohormone measurement were drawn at baseline, 5, 10, 15 and 30 min into the test. Heart rate variability was analysed in 5 min segments at the baseline, and during the test. The younger subjects exhibited a greater increase in heart rate and diastolic blood pressure, despite lower absolute levels of noradrenaline (norepinephrine) and endothelin-1. Analysis of heart rate variability yielded a decrease in both high- and low-frequency bands in the aged; power at low-frequency decreased only in the young subjects. The age-related differences in blood pressure and noradrenaline levels were markedly attenuated in the female subjects. In addition, endothelin-1 levels and power spectral measurements at low frequency were the lowest in younger females throughout the tilt. 3. Despite attenuated cardiovascular response to tilt, both systemic adrenergic 'drive' and endothelin-1 levels increase in parallel with aging. Thus, endothelium-dependent and -independent vasoconstrictive hormone levels increase with age in the resting state and in response to neurohumoral stimulation in humans. |
Wednesday, November 14, 2012
TOP TEN reasons why the Scottish Legal Aid Budget is so high, and why Scotland’s 5 years old Justice Secretary should go back to being a High Street solicitor
True to the traditions of David Letterman's Late Show, which among other things revealed the UK's Prime Minister is so thick he did not know what the term Magna Carta translates to in English (just proves all that Eton tosh fails when its critical) here is Scottish Law Reporter's TOP TEN reasons why the controversial Scottish Legal Aid Budget is so high, currently standing at £160 MILLION a year.
Mr MacAskill and SNP MSPS are now backing huge cuts to legal aid. reported yesterday HERE and propose to force anyone charged with a criminal offence, guilty or not, to pay the Crown Office for the privilege of it! .. queue threats of some much needed industrial action in Scotland’s legal community ! (Tally-Ho, chaps – Ed)
No.8 Sole practising solicitor Niels Lockhart from Kilmarnock walked away with £700K of legal aid in three years while SLAB sat on it's fat a$$ and looked on, did nothing !
No.7 The Crown Office likes to charge as many people as they can with crimes they did not commit (to keep the prosecution statistics up, and justify their high salaries, bonuses)then drop the case at the final moment before someone catches on !
No.6 The cost of having Police fit up suspects and manufacture evidence to suit the crime has gone up more than the rate of inflation !
No.5 The Law Society of Scotland spends too much time on regulation when it should have been looking after the interests of its members and the justice system !
No.4 Fat cat judges & sheriffs on £200K a year, three houses, a farm and a poodle dressed in leather shorts need to justify their appearance fees in court !
No.3 The current Justice Secretary has been 5 years too long in the job !
No.2 The Scottish Legal Aid Board big wigs are too busy flying around the world on international airlines to learn how cheaply others do their legal aid budget !
and the No. 1 reason YOUR Scottish Legal Aid Budget is so high, is … : In the eyes of Scottish law, everyone is guilty until proven innocent !
In the eyes of Scottish law, everyone is guilty until proven innocent !=============================Yes clients and the public purse are cash trees. Fill in a few forms and the lawyers legal aid subsidy fills their bank accounts .
It is well known that Scottish crooked lawyers have been subsidising their lavish lifestyles, new executive cars every year, flash holidays three times a year and putting their kids through posh private school out of the gravy-train (free cash fund) that is called the Scottish Legal Aid Fund?
It has become very similar to the MP's expenses scandal.....remember at the time when they were caught with their fingers in the till they whined......well it is common knowledge that when you enter parliament you are told to claim for everything to bump up your salary....?
Well it is the same as for Scotland's crooked lawyers who have been bleeding the public fund dry like CASH VAMPIRES?
A far better way to cut the £160 + SLAB Funding in half is simple......CUT OUT THE SYSTEMATIC AND ENDEMIC FRAUD BEING COMMITTED!
And as if to rub salt deep into the public's slashed and open wounds, the crooked bunch threat to go on strike and say that they are doing so to stick up for the Scottish public?
Hollywood would not even accept this as a script as it is so HORRIBLY UNBELIEVABLE?
The problem seems to be the tripartite relationship between the Law Society of Scotland, the Crown Office & the SLAB where crooked Scottish lawyers have historically been allowed to fill their boots and steal from the Legal Aid Fund and where the SLAB facilitate this fraud by turning a blind eye and the Crown Office refuse to prosecute their colleague Scottish crooked lawyers?
The sooner a stop is put to this fraud the quicker the Legal Aid expense of £160 Million can be cut in half?
Let the crooked Scottish lawyers strike and make sure that none of them are ever allowed to return to the courts, so that the Public can be served by a new set of Scottish lawyers who have morals and who don't commit legal aid fraud with impunity? |
Inspiring Stories
Evangelist Billy Graham lived 99 years, wrote 30 books, met with 12 sitting American presidents and preached the gospel to millions. But when he is buried this Friday, March 2, in his hometown of Charlotte, North Carolina, he will be remembered not only as a world-changing hero of faith but as a humble preacher whose…
On Oct. 31, 1517, Martin Luther had no idea that he was about to become a world-changer. He wrote his 95 Theses simply to spark an intellectual debate among church scholars. What he did was ignite a movement, after which the church and the entire world would never be the same. It is this crucial…
Last week when I was preaching in the nation of Iceland, I befriended three young foreign students from Africa who were visiting our conference near Reykjavik. I noticed these guys were sitting in the back of the auditorium, so I invited them to sit with me up front. They later admitted to me that I…
The U.S. House of Representatives passed the No Taxpayer Funding for Abortion and Abortion Insurance Full Disclosure Act on Tuesday, essentially placing a permanent ban on taxpayer funding of abortions, as outlined in the Hyde Amendment. The matter now moves to the Senate for consideration. The Act had been introduced by Rep. Chris Smith, R-New…
For a young Muslim woman who grew up in a life of privilege in the Horn of Africa, enduring hardships in order to find Jesus Christ was a risk worth taking as she found new hope from the Christians who helped her and her sister on their journey of faith. According to Open Doors, Hawa…
Dr. Mae Jemison, the first African-American woman in space, is one of those rare individuals who excels at everything she does. Jemison was born in Decatur, Ala., in 1956. She was raised on the southside of Chicago. Her father, Charlie, was a maintenance worker, and her mother, Dorothy, was a schoolteacher. The youngest of three… |
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
/*
* Support we have two records [3, 4, 5, 6, 8, 9] and [0, 1, 2, 3, 5, 6, 7], we should return their similarity 0.3 by
* similarity-jaccard-prefix even the first token of the left side is removed so that it takes the form of
* [2, 3, 4, 5, 6, 7, 8, 9] with its actual length 9 as the first parameter of similarity-jaccard-prefix.
*/
use fuzzyjoin_basic;
set `import-private-functions` 'true';
let `left` = [3, 4, 5, 6, 8, 9],
`right` = [3, 5, 6, 7]
select value `similarity-jaccard-prefix`(6, `left`, 7, `right`, `right`[0], 0.3f); |
/**
* @author Chris Andrew <chris@hexus.io>
* @copyright 2016-2018 Chris Andrew
* @license MIT
*/
/**
* Defines the slope of a tile.
*
* @class Phaser.Plugin.ArcadeSlopes.TileSlope
* @constructor
* @param {integer} type - The type of the tile slope.
* @param {Phaser.Tile} tile - The tile this slope definition belongs to.
* @param {SAT.Polygon} polygon - The polygon representing the shape of the tile.
* @param {Phaser.Line} line - The line representing the slope of the tile.
* @param {object} edges - The flags for each edge of the tile.
* @param {SAT.Vector} axis - The preferred axis for separating physics bodies.
* @param {SAT.Vector[]} [ignormals] - An optional set of collision normals to ignore.
*/
Phaser.Plugin.ArcadeSlopes.TileSlope = function (type, tile, polygon, line, edges, axis, ignormals) {
/**
* The type of the tile slope.
*
* @property {integer} type
*/
this.type = type;
/**
* The tile this slope definition is for.
*
* @property {Phaser.Tile} tile
*/
this.tile = tile;
/**
* The polygon representing the shape of the tile.
*
* @property {SAT.Polygon} polygon
*/
this.polygon = polygon;
/**
* The line representing the slope of the tile.
*
* @property {Phaser.Tile} line
*/
this.line = line;
/**
* The flags for each edge of the tile: empty, solid or interesting?
*
* @property {object} edges
*/
this.edges = Phaser.Utils.mixin(edges || {}, {
top: Phaser.Plugin.ArcadeSlopes.TileSlope.SOLID,
bottom: Phaser.Plugin.ArcadeSlopes.TileSlope.SOLID,
left: Phaser.Plugin.ArcadeSlopes.TileSlope.SOLID,
right: Phaser.Plugin.ArcadeSlopes.TileSlope.SOLID
});
/**
* The preferred axis for separating physics bodies.
*
* @property {SAT.Vector} axis
*/
this.axis = axis || null;
/**
* An optional set of collision normals to ignore.
*
* @property {SAT.Vector[]} ignormals
*/
this.ignormals = ignormals || [];
/**
* The preferred solver to use for this slope.
*
* @property {string} solver
*/
this.solver = null;
/**
* The friction of this slope.
*
* @property {Phaser.Point} friction
*/
this.friction = new Phaser.Point();
};
/**
* Resolve a tile slope type constant from the given value.
*
* Returns any successfully parsed non-negative integers regardless of whether
* they are valid slope tile types. This method is really for strings.
*
* @method Phaser.Plugin.ArcadeSlopes.TileSlope#resolveType
* @param {string|integer} type - The value to resolve.
* @return {integer} - The resolved tile slope type constant.
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.resolveType = function (type) {
if (parseInt(type) >= 0) {
return type;
}
if (typeof type === 'string') {
type = type.toUpperCase();
}
if (Phaser.Plugin.ArcadeSlopes.TileSlope.hasOwnProperty(type)) {
return Phaser.Plugin.ArcadeSlopes.TileSlope[type];
}
console.warn('Unknown slope type \'' + type + '\'');
return Phaser.Plugin.ArcadeSlopes.TileSlope.UNKNOWN;
};
/**
* The slope of the tile.
*
* @name Phaser.Plugin.ArcadeSlopes.TileSlope#slope
* @property {number} slope
*/
Object.defineProperty(Phaser.Plugin.ArcadeSlopes.TileSlope.prototype, 'slope', {
get: function () {
if (!this.line) {
return 0;
}
return (this.line.start.y - this.line.end.y) / (this.line.start.x - this.line.end.x);
}
});
/**
* The name of the tile slope type.
*
* @name Phaser.Plugin.ArcadeSlopes.TileSlope#typeName
* @property {string} typeName
*/
Object.defineProperty(Phaser.Plugin.ArcadeSlopes.TileSlope.prototype, 'typeName', {
get: function () {
return Phaser.Plugin.ArcadeSlopes.TileSlope.resolveTypeName(this.type);
},
set: function (type) {
this.type = Phaser.Plugin.ArcadeSlopes.TileSlope.resolveType(type);
}
});
/**
* Resolve a tile slope type name from the given type constant.
*
* @static
* @method Phaser.Plugin.ArcadeSlopes.TileSlope#resolveTypeName
* @param {integer} type - The type constant.
* @return {integer} - The type name.
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.resolveTypeName = function (type) {
if (Phaser.Plugin.ArcadeSlopes.TileSlope.typeNames.hasOwnProperty(type)) {
return Phaser.Plugin.ArcadeSlopes.TileSlope.typeNames[type];
}
return Phaser.Plugin.ArcadeSlopes.TileSlope.typeNames[-1];
};
/**
* The map of tile slope types to their corresponding type names.
*
* @static
* @property {object} typeNames
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.typeNames = {
'-1': 'UNKNOWN',
0: 'FULL',
21: 'HALF_BOTTOM',
22: 'HALF_TOP',
23: 'HALF_LEFT',
24: 'HALF_RIGHT',
1: 'HALF_BOTTOM_LEFT',
2: 'HALF_BOTTOM_RIGHT',
3: 'HALF_TOP_LEFT',
4: 'HALF_TOP_RIGHT',
5: 'QUARTER_BOTTOM_LEFT_LOW',
6: 'QUARTER_BOTTOM_LEFT_HIGH',
7: 'QUARTER_BOTTOM_RIGHT_LOW',
8: 'QUARTER_BOTTOM_RIGHT_HIGH',
9: 'QUARTER_LEFT_BOTTOM_LOW',
10: 'QUARTER_LEFT_BOTTOM_HIGH',
11: 'QUARTER_RIGHT_BOTTOM_LOW',
12: 'QUARTER_RIGHT_BOTTOM_HIGH',
13: 'QUARTER_LEFT_TOP_LOW',
14: 'QUARTER_LEFT_TOP_HIGH',
15: 'QUARTER_RIGHT_TOP_LOW',
16: 'QUARTER_RIGHT_TOP_HIGH',
17: 'QUARTER_TOP_LEFT_LOW',
18: 'QUARTER_TOP_LEFT_HIGH',
19: 'QUARTER_TOP_RIGHT_LOW',
20: 'QUARTER_TOP_RIGHT_HIGH',
};
// TODO: Misleading constants here - they aren't tile slope types, they're edges
/**
* An empty tile edge.
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.EMPTY = 0;
/**
* A solid tile edge.
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.SOLID = 1;
/**
* An interesting tile edge.
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.INTERESTING = 2;
/**
* An undefined tile slope type.
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.UNKNOWN = -1;
/**
* A full square tile.
* .___
* | |
* |___|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.FULL = 0;
/**
* A half bottom tile.
* .
* ___
* |___|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.HALF_BOTTOM = 21;
/**
* A half top tile.
* .___
* |___|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.HALF_TOP = 22;
/**
* A half left tile.
* ._
* | |
* |_|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.HALF_LEFT = 23;
/**
* A half right tile.
* . _
* | |
* |_|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.HALF_RIGHT = 24;
/**
* A 45 degree bottom left slope.
*
* |\
* | \
* |__\
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.HALF_BOTTOM_LEFT = 1;
/**
* A 45 degree bottom right slope.
*
* /|
* / |
* /__|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.HALF_BOTTOM_RIGHT = 2;
/**
* A 45 degree top left slope.
* __
* | /
* | /
* |/
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.HALF_TOP_LEFT = 3;
/**
* A 45 degree top right slope.
* __
* \ |
* \ |
* \|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.HALF_TOP_RIGHT = 4;
/**
* |\
* | | |\
* |_| |_\ <--
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_BOTTOM_LEFT_LOW = 5;
/**
* |\
* | | |\
* -->|_| |_\
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_BOTTOM_LEFT_HIGH = 6;
/**
* /|
* /| | |
* -->/_| |_|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_BOTTOM_RIGHT_LOW = 7;
/**
* /|
* /| | |
* /_| |_|<--
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_BOTTOM_RIGHT_HIGH = 8;
/**
* |\
* |_\
* __
* | \ <--
* |___\
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_LEFT_BOTTOM_LOW = 9;
/**
* |\
* |_\ <--
* __
* | \
* |___\
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_LEFT_BOTTOM_HIGH = 10;
/**
* /|
* /_|
* __
* / | <--
* /___|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_RIGHT_BOTTOM_LOW = 11;
/**
* /|
* /_| <--
* __
* / |
* /___|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_RIGHT_BOTTOM_HIGH = 12;
/**
* ____
* | /
* |___/
* __
* | / <--
* |/
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_LEFT_TOP_LOW = 13;
/**
* ____
* | / <--
* |___/
* __
* | /
* |/
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_LEFT_TOP_HIGH = 14;
/**
* ____
* \ |
* \___|
* __
* \ | <--
* \|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_RIGHT_TOP_LOW = 15;
/**
* ____
* \ | <--
* \___|
* __
* \ |
* \|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_RIGHT_TOP_HIGH = 16;
/**
* __ __
* | | | / <--
* | | |/
* | /
* |/
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_TOP_LEFT_LOW = 17;
/**
* __ __
* | | | /
* --> | | |/
* | /
* |/
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_TOP_LEFT_HIGH = 18;
/**
* __ __
* \ | | |
* --> \| | |
* \ |
* \|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_TOP_RIGHT_LOW = 19;
/**
* __ __
* \ | | |
* \| | | <--
* \ |
* \|
*
* @constant
* @type {integer}
*/
Phaser.Plugin.ArcadeSlopes.TileSlope.QUARTER_TOP_RIGHT_HIGH = 20;
|
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.codehaus.groovy.ast.expr;
import org.codehaus.groovy.ast.ClassNode;
import org.codehaus.groovy.ast.GroovyCodeVisitor;
/**
* Represents a spread map expression *:m
* in the map expression [1, *:m, 2, "c":100]
* or in the method invoke expression func(1, *:m, 2, "c":100).
*
* @version $Revision$
*/
public class SpreadMapExpression extends Expression {
private Expression expression;
public SpreadMapExpression(Expression expression) {
this.expression = expression;
}
public Expression getExpression() {
return expression;
}
public void visit(GroovyCodeVisitor visitor) {
visitor.visitSpreadMapExpression(this);
}
public Expression transformExpression(ExpressionTransformer transformer) {
Expression ret = new SpreadMapExpression(transformer.transform(expression));
ret.setSourcePosition(this);
ret.copyNodeMetaData(this);
return ret;
}
public String getText() {
return "*:" + expression.getText();
}
public ClassNode getType() {
return expression.getType();
}
}
|
At long last, we get started on this series. Again, this is another casualty of “Kuro Lala” and “Shiro Lala”. Hopefully, though, now that we are started, we can put out a chapter every month or two. This is another series with CRAZY redraws, so I can’t guarantee monthly releases, but we’ll do our best. We are doing this series in conjunction with Heart Crusade. Heart Crusade will be helping out with some of horrendous redraws.And now onto the series: This first chapter was very compelling to me and I want to see more of this couple as soon as possible. I’ve already seen how this series end, which makes me want to get through it as quickly as possible. Unfortunately, I’m no time traveler and I can’t split into multiple duplicates of myself, so I’ll just have to be patient and let the team have the time to do what they do best.
This is the first series that I’ve felt the need to use “stiff language” while writing the English Adaptation. “Stiff language” is not my strength, so I admit there’s lots of room for improvement. Still it’s fun to stretch. Hopefully, as the series continues I will get better at more formal sounding language. Hahaha! I guess I should have read all that Jane Austen crap in high school (yep…skipped them and just wrote reports based on class notes. I was into Tom Clancy and the like at the time and those kind of books instantly put me to sleep.) That said, I want to thank Amrai and Blottyparchment for their excellent translation work.
Onto the links!
Please do not upload this to any of the manga aggregation websites. There is no need to since the files are readily available here, and in light of recent evens, it doesn’t help anyone to support criminal websites.
Links to “Ojousama no Untenshu”: (Zip) (PDF)
Next up will be the double release of “Magnolia” Chp 18 and “Lily” Chp 3. After that, we will begin releasing the new one-shots from our favorite mangaka! The first one will be from Bisco Hatori! |
Protein/Protein, DNA/DNA and DNA/Protein based vaccination strategies using truncated Omp2b against Brucella infection in BALB/c Mice.
The purpose of the present study was to evaluate the immunogenicity and protective efficacy of the truncated form of outer membrane protein 2b (TOmp2b) from Brucella abortus in BALB/c mice. Three immunization regimens Protein/Protein, DNA/DNA and DNA/Protein were used. Immunization of mice with all vaccine strategies elicited a strong specific IgG responses (IgG2a titers over IgG1) and provided T helper1 (Th1) oriented immune responses. Furthermore, Protein/Protein (Pro/Pro-) and DNA/Pro- vaccinated groups conferred protection levels against B. abortus challenge not significantly different from those induced by B. abortus RB51 vaccine stain. In conclusion, TOmp2b is potential to stimulate specific immune responses and to confer cross protection against B. melitensis and B. abortus infection. Therefore, TOmp2b could be introduced as a new subunit vaccine candidate against Brucella infection. |
United States Court of Appeals for the Federal Circuit
2007-3200
DORIS A. RICE,
Petitioner,
v.
MERIT SYSTEMS PROTECTION BOARD,
Respondent,
and
DEPARTMENT OF THE NAVY,
Intervenor.
Omar Vincent Melehy, Melehy & Associates, LLC, of Silver Spring, Maryland,
argued for petitioner. With him on the brief was Andrew J. Perlmutter.
Joyce G. Friedman, Attorney, Office of the General Counsel, Merit Systems
Protection Board, of Washington, DC, argued for respondent. With her on the brief were
B. Chad Bungard, General Counsel, and Rosa M. Koppel, Deputy General Counsel.
Joan M. Stentiford, Trial Attorney, Commercial Litigation Branch, Civil Division,
United States Department of Justice, of Washington, DC, argued for intervenor. With
her on the brief were Jeanne E. Davidson, Director, and Todd M. Hughes, Deputy
Director.
Appealed from: Merit Systems Protection Board
United States Court of Appeals for the Federal Circuit
2007-3200
DORIS A. RICE,
Petitioner,
v.
MERIT SYSTEMS PROTECTION BOARD,
Respondent,
and
DEPARTMENT OF THE NAVY,
Intervenor.
Petition for review of the Merit Systems Protection Board in DC-0752-07-0091-I-1.
__________________________
DECIDED: April 11, 2008
__________________________
Before BRYSON, GAJARSA, and LINN, Circuit Judges.
BRYSON, Circuit Judge.
Appellant Doris A. Rice appeals from a decision of the Merit Systems Protection
Board. The Board dismissed Ms. Rice’s appeal from the decision of the Office of Naval
Intelligence to remove her from the position of Information Technology Specialist. We
affirm the Board’s dismissal order.
I
In December 1981, Ms. Rice was appointed to a competitive service position in
the Naval Communications Unit, an agency within the Department of the Navy. As an
employee in the competitive service, she was entitled to appeal adverse actions against
her to the Board either after one year had passed or after she had completed any
applicable trial or probationary period. 5 U.S.C. § 7511(a)(1)(A). The Naval
Communications Unit does not perform intelligence activities.
In November 1985, Ms. Rice voluntarily accepted a new appointment to an
excepted service position with the Naval Intelligence Processing System, a predecessor
of the Office of Naval Intelligence. That agency (and its successor) performed
intelligence activities. In connection with the new appointment, Ms. Rice signed a
statement acknowledging that her acceptance of the new position meant that she was
voluntarily separating from the competitive service and that she was being appointed to
an excepted service position. The statement read as follows:
By accepting this position, the following information is understood:
(a) That I will be given an Excepted Appointment;
(b) That this position cannot be filled by Competitive Service; and
(c) That I will be taken out of the Competitive Service; and
(d) That I volunteer to be separated from the Competitive Service.
In the following years, Ms. Rice held a number of other positions with the Office
of Naval Intelligence and related intelligence components. In April 2005, however, the
Office of Naval Intelligence terminated her for allegedly adulterating a urinalysis sample.
She subsequently filed a discrimination complaint with the Navy’s equal employment
opportunity office, alleging that her removal was the result of discrimination based on
race and sex. The Navy rejected her claim of discrimination, referring to a decision by
2007-3200 2
the Equal Employment Opportunity Commission in which an administrative judge ruled
that the Navy had not discriminated against her. The notice of decision informed Ms.
Rice that she had appeal rights to the Merit Systems Protection Board or to a United
States District Court. The Navy subsequently notified Ms. Rice by letter that it had
erroneously advised her that she had appeal rights to the Board and that in fact her
appeal rights were limited to the Equal Employment Opportunity Commission or a
United States District Court. Before receiving that notice, Ms. Rice filed an appeal of
the removal action with the Board.
The Navy filed a motion to dismiss the Board appeal, contending that the Board
lacked jurisdiction to entertain the appeal because, under 5 U.S.C. § 7511(b)(8), Ms.
Rice was not entitled to appeal to the Board from an adverse action against her.
Section 7511(b)(8) states that sections 7511 through 7514 of title 5, which govern
adverse actions by agencies and authorize employees to take adverse action appeals
to the Board, do not apply to a non-preference-eligible employee (such as Ms. Rice)
whose position is within “an intelligence component of the Department of Defense.” The
administrative judge who was assigned to the case issued an order advising Ms. Rice
that she had the burden of proving that the Board had jurisdiction over her appeal and
ordering her to file evidence and argument to establish the Board’s jurisdiction.
In response, Ms. Rice argued that, as an excepted service employee who had
completed more that two years of continuous service in the same position, she was
entitled to appeal her removal to the Board under 5 U.S.C. § 7511(a)(1)(C). She argued
that section 7511(b)(8) did not exclude her from the Board’s jurisdiction because, under
the rationale of Czarkowski v. Merit Systems Protection Board, 390 F.3d 1347 (Fed. Cir.
2007-3200 3
2004), the Navy had failed to show that the Secretary of Defense had explicitly
designated the Office of Naval Intelligence as an intelligence component of the
Department of Defense. Additionally, Ms. Rice argued that under Clarke v. Department
of Defense, 102 M.S.P.R. 559 (2006), the Board retained jurisdiction over her removal
appeal because Office of Naval Intelligence had not given her “actual notice of the
potential loss of her appeal rights” when she accepted a “reassignment” to an excepted
service position from her previous position in the competitive service. Finally, Ms. Rice
contended that her appeal rights to the Board were preserved under the “grandfather”
clause of 10 U.S.C. § 1612(b)(1). That provision, she alleged, affords an employee
appeal rights if the employee’s transfer into an excepted service position in an
intelligence unit was immediately preceded by a position within the same agency that
was subject to Board appeal rights.
The administrative judge dismissed Ms. Rice’s appeal for lack of jurisdiction. The
administrative judge found that the Office of Naval Intelligence is an intelligence
component of the Department of Defense and that Czarkowski is inapposite because
that case involved 5 U.S.C. § 2302(a)(2)(C)(ii), a different statute with a different
standard than 5 U.S.C. § 7511(b)(8), the jurisdictional statute at issue in this case. The
administrative judge noted that section 2302(a)(2)(C)(ii) exempts employees from the
right to appeal to the Board in whistleblower cases if they work for an agency “the
principal function of which is the conduct of foreign intelligence or counterintelligence
activities . . . as determined by the President.” The administrative judge found that
section 7511(b)(8) requires no such explicit exemption by the President.
2007-3200 4
The administrative judge found Clarke distinguishable because Ms. Rice had
received express written notice that she was relinquishing her rights as a competitive
service employee to accept an excepted service position. The administrative judge also
rejected Ms. Rice’s argument that 10 U.S.C. § 1612(b)(1) preserved her Board appeal
rights because she did not previously work in a position with Board appeal rights that
was reestablished as an excepted service position under 10 U.S.C. § 1601. Concluding
that Ms. Rice had failed to satisfy her burden to show that the Board had jurisdiction in
the case, the administrative judge dismissed the appeal.
II
An individual who appeals to the Board under 5 U.S.C. § 7701 bears the burden
of proving that the Board has jurisdiction. See Monasteri v. Merit Sys. Prot. Bd., 232
F.3d 1376, 1378 (Fed. Cir. 2000); 5 C.F.R. § 1201.56(a)(2)(i). To satisfy that burden,
the appellant must first make a non-frivolous allegation of facts sufficient to establish
jurisdiction; if such a showing is made, the appellant is entitled to a hearing at which the
appellant bears the burden of showing Board jurisdiction by a preponderance of the
evidence. See Garcia v. Dep’t of Homeland Sec., 437 F.3d 1322, 1344 (Fed. Cir. 2006)
(en banc). The Board held, and we agree, that Ms. Rice failed to make a non-frivolous
allegation of facts sufficient to prove jurisdiction.
A
Ms. Rice argues that the Office of Naval Intelligence does not qualify as an
intelligence component of the Department of Defense under 5 U.S.C. § 7511(b)(8), and
that she was therefore not excluded from the definition of an “employee” for purposes of
adverse action appeals. The Board, however, correctly ruled that an order issued by
2007-3200 5
the Department of Defense, Directive 5240.1, establishes that the Office of Naval
Intelligence is an intelligence component of the Department of Defense within the
meaning of section 7511(b)(8).
As she did before the Board, Ms. Rice bases her argument on this court’s
decision in Czarkowski. She interprets Czarkowski to mean that in order for an agency
to qualify as an “intelligence component of the Department of Defense” within the
meaning of section 7511(b)(8), the document designating the agency as having that
status must specifically reference the two statutory provisions, 5 U.S.C. § 7511(b)(8)
and 10 U.S.C. § 1614(2), that render inapplicable the provisions of title 5 governing
adverse action appeals.
We decline to read Czarkowski so broadly. The statute at issue in Czarkowski
required the President or his delegate to decide that a particular agency had as its
“principal function” the “conduct of foreign intelligence or counterintelligence activities.”
Czarkowski, 390 F.3d at 1349, quoting 5 U.S.C. § 2302(a)(2)(C)(ii). This court rejected
the government’s argument that the Board could make that determination for the
President by reviewing documentary evidence suggesting that an agency has been
determined to have the principal function of conducting such activities. The court
pointed out that many agencies have some authority to conduct intelligence activities,
but that the statute “assigns to the President the task of identifying which agencies meet
the ‘principal function’ test.” Czarkowski, 390 F.3d at 1350. That determination, the
court added, “surely is a delicate call in some circumstances, and it certainly is a call
that Congress has left to the President or his delegate.” Id. The court then set forth its
ruling as follows:
2007-3200 6
The statutory language does not suggest that the Board can effectively
make a determination for the President by reviewing documentary
evidence that may suggest an agency has been determined to have the
principal function of conducting foreign intelligence or counterintelligence
activities. Documents that suggest to the Board that a Presidential
determination should or could have been made cannot stand as a proxy
for an actual Presidential determination that references the statute. The
burden is on the agency to show that the President, or his delegate, has
explicitly exempted an agency or unit thereof under section
2302(a)(2)(C)(ii).
Id.
Seizing on the reference in the portion of the Czarkowski opinion quoted above
to “an actual Presidential determination that references the statute,” Ms. Rice argues
that Department of Defense Directive 5240.1 was insufficient because it failed to cite 5
U.S.C. § 7511(b)(8) and 10 U.S.C. § 1614(2). However, nothing in section 7511(b)(8)
or section 1614(2) requires that the determination by the Secretary of Defense that an
agency is an intelligence component of the Department of Defense be accompanied by
a citation to the pertinent statutes or else be deemed insufficient. Section 7511(b)(8)
requires only that the employee’s position be within “an intelligence component of the
Department of Defense (as defined in section 1614 of title 10).” 5 U.S.C. § 7511(b)(8).
Section 1614 defines “intelligence component of the Department of Defense” to include
any “component of the Department of Defense that performs intelligence functions and
is designated by the Secretary of Defense as an intelligence component of the
Department of Defense.” 10 U.S.C. § 1614(2)(D). The determination that the Naval
Intelligence Service is an intelligence component of the Department of Defense was
made in haec verba in Department of Defense Directive 5420.1. In particular, Directive
5240.1 designates the Office of Naval Intelligence as one of the named Department of
2007-3200 7
Defense “Intelligence Components” and identifies it as a component of the Department
of Defense that “conduct[s] intelligence activities.” The Directive therefore explicitly
identifies the Office of Naval Intelligence as a designated intelligence component of the
Department of Defense that performs intelligence functions. Finally, Directive 5240.1
was issued by the Deputy Secretary of Defense, the lawful delegate of the Secretary of
Defense. That is all that is required by section 7511(b)(8) and section 1614(2).
It is true that the court in Czarkowski stated that “an actual Presidential
determination that references [section 2302(a)(2)(C)(ii)]” would suffice to satisfy the
statutory exemption, while “[d]ocuments that suggest to the Board that a Presidential
determination should or could have been made” would not. 390 F.3d at 1350. While
the court clearly indicated that a determination that included a statutory reference would
be sufficient, it did not hold that an express Presidential determination would be invalid
absent an explicit reference to section 2302. Because there was no Presidential
determination at all in Czarkowski, it was not necessary for the court to decide whether
a statutory reference is a sine qua non of such determination. At least in the context of
the determination referred to in section 7511(b)(8), which merely requires a statement
that the agency in question is an intelligence component of the Department of Defense,
we hold that such a statutory reference is not required. Just as in Czarkowski the
critical question was whether the President or his delegate “has explicitly exempted an
agency or unit thereof under section 2302(a)(2)(C)(ii),” 390 F.3d at 1350, the critical
question in this case is whether the Secretary of Defense or his delegate has
designated the agency as an intelligence component of the Department of Defense
under sections 7511(b)(8) and 1614(2). That determination was plainly made, and an
2007-3200 8
express reference to the pertinent statutes would add nothing of substance to that
determination. Accordingly, we hold that the Board properly ruled that Ms. Rice’s
position fell within 5 U.S.C. § 7511(b)(8) and that she was not an employee who would
be entitled under 5 U.S.C. § 7513(d) to appeal an adverse action to the Board. 1
B
Ms. Rice also contends that she was not given sufficient notice at the time she
accepted the appointment to the Naval Intelligence Command that she would no longer
have the right to appeal to the Board from any adverse action. She argues that the
notice that she was moving from a competitive service position to an excepted service
position and the form that she signed acknowledging that she was voluntarily separating
from the competitive service were not sufficient to advise her of the change in her Board
appeal rights because the notice she was given was not sufficient to give rise to a
“knowing and voluntary” waiver of those rights.
Ms. Rice first contends that in light of McCall v. United States Postal Service, 839
F.2d 664 (Fed. Cir. 1988), Reise v. Merit Systems Protection Board, 37 M.S.P.R. 364
(1998), and Ferby v. United States Postal Service, 26 M.S.P.R. 451 (1985), she cannot
be deemed to have waived her Board appeal rights unless she signed a written
statement indicating that she knowingly waived those rights. We reject that argument.
1
The administrative judge decided this case based on her conclusion that the
Office of Naval Intelligence is “an intelligence component of the Department of Defense
(as defined in section 1614 of title 10).” Neither the administrative judge nor the parties
have discussed whether the Office of Naval Intelligence would also qualify for inclusion
within section 7511(b)(8) as “an intelligence activity of a military department covered
under subchapter I of chapter 83 of title 10.” For that reason we do not rest our decision
on that ground.
2007-3200 9
The cases on which Ms. Rice relies all deal with waivers signed in the context of “last
chance” agreements. “Last chance” agreements are used to settle conflicts between
employees and agencies; the employee typically agrees to waive Board appeal rights in
exchange for favorable settlement terms allowing the employee a “last chance” to
perform according to the agency’s expectations. A “last chance” appeal waiver is very
different from a change in appeal rights that accompanies the voluntary acceptance of
an excepted service position. The former is a waiver of a right that attaches to the
employee’s ongoing position; the latter simply reflects a difference in the rights
associated with one position occupied by the employee and another to which the
employee has chosen to transfer. We decline to apply the same standard to the waiver
of an existing statutory right to appeal to the Board (as in a last chance agreement) and
to the waiver of Board appeal rights when an employee voluntarily accepts appointment
to a position that carries different statutory appeal rights (as in the case of a transfer to a
Defense Department intelligence agency).
Relying on a line of Board decisions that includes Clarke v. Department of
Defense, 102 M.S.P.R. 559 (2006); Park v. Department of Health and Human Services,
78 M.S.P.R. 527 (1998), and Exum v. Department of Veterans Affairs, 62 M.S.P.R. 344
(1994), Ms. Rice next argues that she could not lawfully be deprived of her right to
appeal to the Board unless she was explicitly notified that she was losing her Board
appeal rights when she accepted a position with the Naval Intelligence Command. She
contends that because there is no evidence that she was notified of the loss of appeal
rights, she retained her Board appeal rights from that time until her removal.
2007-3200 10
Before the administrative judge, Ms. Rice did not deny that she was informed of
the change in her Board appeal rights; she simply stated that she did not recall having
been so advised. Unsurprisingly, the agency was unable to introduce any evidence
regarding any oral statement that may have been made at the time of Ms. Rice’s
appointment to the excepted service in 1985 regarding her appeal rights; the agency’s
evidence was limited in this regard to the written statement that Ms. Rice signed
acknowledging that she was entering the excepted service and was being “taken out of
the Competitive Service,” and “volunteer[ed] to be separated from the Competitive
Service.” Based on that evidence, the administrative judge distinguished the cases on
which Ms. Rice relied on the ground that she “did receive notice that she was
relinquishing her rights as a competitive service employee to accept an excepted
service position.” Under those circumstances, the administrative judge held that she did
not retain a right to appeal from her removal during the 20 years after her transfer to the
excepted service.
Ms. Rice responds that the administrative judge’s opinion is contrary to the
Board’s decisions in cases such as Clarke, Park, and Exum. Ms. Rice is correct that
the Board cases on which she relies set forth a broad rule that, if applied in this case,
would appear to accord Board appeal rights to a person in Ms. Rice’s position, or at
least call for a jurisdictional hearing as to whether she was given appropriate notice of
the loss of her Board appeal rights that would result from her joining the excepted
service. In Park, for example, the Board stated the rule as follows:
An employee must receive notice from his employing agency regarding
the effect of a change in tenure before he can relinquish an agency
appointment with career tenure and adverse action appeal rights to accept
another appointment within the agency that lacks such tenure and appeal
2007-3200 11
rights. . . . An employee who has not knowingly consented to the loss of
career tenure and appeal rights in accepting another appointment with the
agency is thus deemed not to have “accepted” the new appointment and
to have retained the rights incident to the former appointment; the Board
therefore may exercise jurisdiction over an appeal of an adverse action
against that employee.
Park, 78 M.S.P.R. at 534; see also Clarke, 102 M.S.P.R. at 562-63; Edwards v. Dep’t of
Justice, 86 M.S.P.R. 404, 406 (2000). In the brief it filed as respondent in this case, the
Board distinguishes some of the cases in that line of decisions on the ground that Ms.
Rice was expressly advised that she was transferring from the competitive service to
the excepted service. For that reason, the Board contends that, unlike in Exum, the
Navy had no reason to believe that Ms. Rice was under a misapprehension about the
change in her appeal rights that resulted from her transfer to a new position, and unlike
in Kaiser v. Department of the Army, 75 M.S.P.R. 440 (1997), Ms. Rice was alerted to
the fact that her job status was being changed in an important respect.
What the Board in its brief seems to overlook in characterizing those cases
narrowly is that the Board’s own rule is quite broad. It requires that the employing
agency not merely advise the employee of the change in his job status, but that the
agency expressly advise the employee regarding the loss of tenure and Board appeal
rights that is attendant to that change. Moreover, under the Board’s rule, at least as
stated in the Edwards and Park cases, the agency’s duty to advise the employee of the
loss of Board appeal rights appears to apply without regard to whether there was
evidence that the agency knew or should have known that the employee was operating
under the misapprehension that the transfer to a new position would not result in the
employee’s loss of appeal rights.
2007-3200 12
The Board case that is closest to this one is Clarke. In that case an employee
transferred from a non-intelligence component within the Department of Defense to an
intelligence component and thereafter was involuntarily transferred to other positions
within the intelligence component. The effect of the transfers was that, when she was
removed from her position, she was statutorily ineligible to appeal the removal action to
the Board. Because she had not been advised of, and did not knowingly consent to, the
loss of her appeal rights, however, the Board held that she was “deemed to have
retained the rights incident to her former position.” 102 M.S.P.R. at 563. The Board
therefore held that, even though she fell within 5 U.S.C. § 7511(b)(8), the Board had
jurisdiction over her removal appeal.
The Board, qua litigant, makes two weak efforts to distinguish this case from the
decision in Clarke, issued by the Board qua adjudicative body. First, the Board in its
brief argues that because Ms. Clarke remained in the same position following her
transfer, “the Board found that Ms. Clarke’s appeal rights were impacted by 10 U.S.C.
§ 1612(b).” In fact, the Board in Clarke found that because Ms. Clarke changed
positions twice after joining the intelligence component, she did not have Board appeal
rights by virtue of section 1612(b); that is the reason the Board in Clarke invoked the
Park rule, which otherwise would have been unnecessary. Section 1612(b) therefore
does nothing to distinguish this case from Clarke. Second, the Board in its brief argues
that under the circumstances, Ms. Clarke “could not have been expected to know that
she was relinquishing her appeal rights,” while Ms. Rice was informed “of her change in
service status.” While that much is true, there is no evidence that Ms. Rice was
informed that one effect of her change in service status was that she would lose her
2007-3200 13
Board appeal rights. Merely informing Ms. Rice that she was moving from the
competitive service to the excepted service would not seem sufficient to satisfy the
Board’s standard, which requires that the employee “knowingly consent to the loss of
her appeal rights.” See Clarke, 102 M.S.P.R. at 563.
For those reasons, we do not believe the Board’s decisions cited above can be
persuasively distinguished on the grounds offered by the Board in its brief (and the
similar grounds offered by the Department of the Navy as intervenor). We need not
decide whether we would adopt the rule set forth in the cite line of Board cases,
however, because the Board’s jurisdictional ruling can be affirmed on a different ground,
as set forth below.
In 1985 Ms. Rice took a position in the excepted service. At that point, her status
as a non-preference-eligible employee in the excepted service meant that she did not
have Board appeal rights, because the Civil Service Due Process Amendments, Pub. L.
No. 101-376, 104 Stat. 461 (1990), which gave appeal rights to many such individuals in
the excepted service, had not yet been enacted. In 1990, when the Civil Service Due
Process Amendments statute was enacted, non-preference-eligibles in the excepted
service were given Board appeal rights under the provision that became 5 U.S.C.
§ 7511(a)(1)(C). However, another provision of the same Act, which became 5 U.S.C. §
7511(b)(8), had the effect of denying Board appeal rights to all non-preference-eligible
employees of “an intelligence activity of a military department covered under section
1590 of title 10.” Six years later, in the National Defense Authorization Act for Fiscal
Year 1997, Pub. L. No. 104-201, § 1634, 110 Stat. 2422, 2753 (1996), Congress again
amended section 7511(b)(8), this time adding the reference to “an intelligence
2007-3200 14
component of the Department of Defense (as defined in section 1614 of title 10),” the
language that the administrative judge relied on to hold that Ms. Rice was not entitled to
appeal her removal to the Board. Thus, as of 1996, it was not Ms. Rice’s status as an
excepted service employee that barred her from having Board appeal rights, but rather
her status as a non-preference-eligible employee of “an intelligence component of the
Department of Defense” under section 7511(b)(8). Even if Ms. Rice had enjoyed Board
appeal rights before 1990 or 1996, she would have lacked them afterwards because of
the operation of that statute.
There is no suggestion that the 1990 and 1996 amendments to section
7511(b)(8) cannot be given their intended effect as to Ms. Rice because she was not
told at the time of those amendments about the effect they would have on her Board
appeal rights. By 1996, it was clear that that section 7511(b)(8) denied Board appeal
rights to an employee in her position, and the statutory language is mandatory. See 5
U.S.C. § 7511(b)(8) (“This subchapter [sections 7511-7514 of title 5] does not apply to
an employee— . . . whose position is within . . . an intelligence component of the
Department of Defense”). Because Ms. Rice was working in an intelligence component
at the time Congress excluded non-preference-eligible employees of such components
from the Board’s adverse action jurisdiction, the statute foreclosed her—then and at the
time of her subsequent removal—from appealing to the Board.
In that setting, to “deem” an employee such as Ms. Rice not to have accepted the
appointment in the Naval Intelligence Command in 1985 and to have remained a non-
employee of that component until the time of her removal would base Board jurisdiction
on a fiction. That fiction, moreover, would fly in the face of Congress’s determination
2007-3200 15
that an employee such as Ms. Rice should not have the rights created by sections 7511
through 7514 of title 5, including the right to appeal removal actions to the Board under
section 7513(d).
Any failure in 1985 to give Ms. Rice explicit notice that non-preference-eligible
employees in the excepted service lack Board appeal rights is insignificant in light of the
amendments in 1990 and 1996 to section 7511(b)(8), which denied Board appeal rights
to all employees of Defense intelligence components except for preference eligibles.
Accordingly, without addressing whether notice of the loss of appeal rights might be
required in other settings, as the Board has ruled, we hold that the Board lacks
jurisdiction over Ms. Rice’s appeal regardless of any failure to alert her to the loss of
Board appeal rights when she first joined the excepted service.
AFFIRMED.
2007-3200 16
|
---
abstract: 'We analyzed 186 binary pulsars (BPSRs) in the magnetic field versus spin period (B-P) diagram, where their relations to the millisecond pulsars (MSPs) can be clearly shown. Generally, both BPSRs and MSPs are believed to be recycled and spun-up in binary accreting phases, and evolved below the spin-up line setting by the Eddington accretion rate ($\dot{M}{\bf \simeq}10^{18} g/s$). It is noticed that most BPSRs are distributed around the spin-up line with mass accretion rate $\dot{M}=10^{16} g/s$ and almost all MSP samples lie above the spin-up line with $\dot{M}\sim10^{15} g/s$. Thus, we calculate that a minimum accretion rate ($\dot{M}\sim 10^{15} g/s$) is required for the MSP formation, and physical reasons for this are proposed. In the B-P diagram, the positions of BPSRs and their relations to the binary parameters, such as the companion mass, orbital period and eccentricity, are illustrated and discussed. In addition, for the seven BPSRs located above the limit spin-up line, possible causes are suggested.'
author:
- 'Y. Y. Pan'
- 'N. Wang'
- 'C. M. Zhang'
title: Binary Pulsars in Magnetic Field versus Spin Period Diagram
---
c
PS. [P\_[spin]{} P\_[spin]{} ]{}
Introduction
============
The pulsars (PSRs) in the binary systems are always convenient for us to determine their parameters such as the mass, origin and evolution. The majority of the binary pulsars (BPSRs) are millisecond pulsars (MSPs) with the spin period less than 20 milliseconds [@sta04]. Based on the data from the ATNF Pulsar Catalogue in November 2012, it has been found 2008 PSRs including 221 MSPs (136 binary PSRs versus 85 isolated ones). The companions of 186 binary PSRs are white dwarfs (170), neutron stars (9), main sequence stars (4) and planets (3), respectively. Much progress has been achieved in understanding the formation and evolution of the binary pulsars (BPSRs) [@bha95; @sta04; @man04; @lor08; @tau12s; @tau12].
The distributions of the magnetic field ($B$) and spin period ($P$) are both almost bimodal with a dichotomy between the normal pulsars (PSRs) ($B\sim10^{11-13} G$, $P\sim 0.1 s - 10 s$) formed directly by the supernova explosions and MSPs ($B\sim10^{8-9} G$, $P\sim{1.4 ms-20 ms}$) that are recycled in the binary systems [@alp82; @rad82; @lor08; @kas10; @wang11]. In the binary systems, with the accreting matter of $\sim 0.1-0.2\ms$ from their companions, the neutron stars (NSs) can be spun-up to several milliseconds, while their magnetic fields decay to $\sim 10^{8-9} G$ [@bha91; @bha95; @heu95; @mel05; @zhang06; @wang11]. With the 3D simulations of magnetohydrodynamics (MHD), the magnetic field affected by the accretion flow is depicted clearly [@kul08]. When the accretion phase is finished, the radio emissions of the fast rotating NSs can be detected as MSPs [@alp82; @rad82; @tau12].
Evaporation of the companion star by the pulsar radiation explain explains why some MSPs are single [@klu88; @hes08]. This is more complicated in globular clusters: a companion can be disrupted by encounter with another star. Direct evidence supporting the MSP spin-up model has been found, for instance, the accreting X-ray MSP SAX J1808.4-3658 ($B\sim10^{8} G$, $P=2.49 ms$) discovered in the low mass X-ray binary system [@wij98], and the double pulsar PSR 0737-3039A/B (a MSP and a normal PSR in the binary system) [@bur03; @heu04; @lyn04].
BPSRs are the most accurate clocks in the unverse that can be exploited to form a MSP detect gravitational waves [@man04; @lor08; @hob10]. BPSRs are the most accurate clocks in the unverse In addition, the BPSRs are significant systems for testing general relativity effects, e.g., the gravitational-radiation-induced orbit shrinking, gravitational red-shift and Shapiro delay [@kra06], based on which the NS mass can be measured in double neutron star systems using the periastron advance and with the high precision [@zhang11]
This paper mainly focuses on the analysis of 186 BPSRs in the B-P diagram with the data from ATNF pulsar catalogue (Manchester et al. 2005).To understand the properties of these pulsars, we pay attention to their B-P positions relative to the spin-up lines, in relation to the companion mass, eccentricity and orbit period.
The structure of the paper is organized as follows: Sec.2 presents the detail study of the spin up lines under the different accretion rates. Here we also give the implications of the minimum accretion rate on the millisecond pulsar formation. In Sec.3, the distribution characteristics of BPSPs in the B-P diagram as a function of the binary parameters and the evolutionary scenario of binary pulsar are discussed. In Sec.4, we suggest the causes why seven BPSRs lie above the Eddington limited spin-up line. The discussions and conclusions are given in Sec.5.
Pulsars in B-P diagram and the evolutionary implications
========================================================
The Spin-up line
----------------
If a NS, which has a symmetry axis of the magnetic field aligned with the rotation axis, spins up to the Kepler orbital period at the magnetosphere radius, a spin-up line will be obtained. It is also called the equilibrium spin period line expressed the relationship between the magnetic field and the spin period [@gho77; @sha83; @bha91; @gho92; @bur02; @fra02; @cam07]. However, the magnetosphere radius depends on many factors, such as the structure of the accretion disk and mass transfer form, etc [@tau11; @tau12]. The equation of the spin-up line can be written as [@bha91]: \[P\] P\_[eq]{}=2.4 (ms) B\_9\^()\^[-]{}()\^[-]{}R\_6\^, where $P_{eq}$ is the “equilibrium” spin period, $B_9$ is the dipole magnetic field in units of $10^9G$, $\dot{M}$ is the accretion rate, $\dot{M}_{Edd}$ is the “Eddington-limit” accretion rate ($10^{18} g/s$), $R_6$ is the stellar radius in units of $10^6$cm and $M$ is the NS mass. The spin period ($P$) and the spin-down rate ($\dot{P}$) of a PSR can be combined to yield an estimate of the strength of the dipole magnetic field [@man77; @lyn06]: \[B\] B&=&()\^\
&=&3.210\^[19]{}([I10\^[45]{} g cm\^2]{})\^R\_6\^[-3]{}(P)\^, where $I$ is the moment of inertial and $R$ is the radius of the PSR. The moment of inertia is $I$ = $(2/5)MR^2$. To evaluate the influence on the divided magnetic field by the choice of NS mass and radius, we rewrite Eq.(\[B\]) in terms of M and R: $$\label{Bsim}
B=3.4\times10^{19}(\frac{M}{1.4M_{\odot}})^{\frac{1}{2}}R_6^{-2}(P\dot{P})^{\frac{1}{2}}.
$$ Eqs. (\[P\]-\[Bsim\]) show us that the NS mass ($M$), radius ($R$) and accretion rate ($\dot{M}$) influence on the position of the spin-up line in the B-P diagram, and both NS masses and radius have influences on the derived strength of the dipole magnetic field. Mostly one takes a standard pulsar parameter ($M=1.4M_{\odot}$, $R=10^6 cm$) in the three equations. However, some measured NS masses are larger or smaller than $1.4M_{\odot}$. In binary systems, a mean value of $M=1.46\pm0.30M_{\odot}$ has been derived for the 61 measured NS masses [@zhang11]. The NS radius has not yet been measured as accurate as its mass, and is usually estimated in the range $10 \sim 20 km$ by means of the models [@mil98; @mil02; @lat04; @hes06; @hae07; @zhang07].
The spin-up line equation Eq.(1) and magnetic field equation Eq.(3) show the relationships between the PSR magnetic field and NS radius as $B\propto R^{-3}$ and $B\propto R^{-2}$, respectively. If a NS radius changes from 10 km to 20 km, then the spin-up line will shift down by Log(8)=0.9, whereas the PSR position will shift down by Log(4)=0.6, in Log(B) axis of the B-P diagram. That is to say, the spin-up line will shift down $\sim0.3$ relative to the PSR position in the Log(B) axis of the B-P diagram.
Compared with the affection of the radius on the spin-up line and PSR position in B-P diagram, the variation of accretion rate will give much more influence on the spin-up line. From the observations, the accretion rates of the X-ray NSs span three orders of magnitudes, e.g., from $10^{15} g/s$ to $10^{18} g/s$ [@has89; @kli00; @lam05], and these variations will give rise to a considerately changes in the positions of the spin-up line in the B-P diagram, which are shown in Fig.\[6\] for accretion rates: $10^{15} g/s$, $10^{16} g/s$, $10^{17} g/s$ and $10^{18} g/s$.
![The magnetic-field versus spin-period diagram for 2008 PSRs (data from ATNF pulsar catalogue as at November 2012). 221 MSPs ($P<20 ms$) are shown, including the isolated ones (85) and those in the binary systems (136). The solid, dash, short dash and dash dot-dot lines stand for the spin-up lines with the different accretion rates $10^{18} g/s$, $10^{17} g/s$, $10^{16} g/s$ and $10^{15} g/s$, respectively, as shown in Eq. (1). The dash dot line is the death line by the theoretical model of deceasing the radio emission of pulsar (Bhattacharya & van den Heuvel 1991; Ruderman & Sutherland 1975). The isolated and BPSRs are labeled by dots and stars, respectively.[]{data-label="6"}](6.eps){width="7cm"}
The distribution of the isolated and binary PSRs are also shown in Fig.\[6\]. The majority of the MSPs are distributed around the spin-up line with $\mdot=10^{16} g/s$. It seems likely that most MSPs may be born at the positions near the spin-up line with $\mdot=10^{17} g/s$, which is the generally observed accretion rate for the X-ray NSs in the Low-Mass X-ray Binaries [@bra83; @has89; @kli00; @liu07]. This fact was also pointed out a decade ago by Lundgren et al. (1996) and Hansen and Phinney (1998).
Implications of the minimum accretion rate for MSP formation
------------------------------------------------------------
It is noticed that only three MSPs, J0514-4002A, J1801-3210 and J1518+4904, lie below the spin-up line with $\mdot=10^{15} g/s$. With the data from ATNF and Eq.(\[P\]), their positions correspond to the mean accretion rates $0.6\times 10^{15}g/s, 0.8\times 10^{15}g/s$ and $0.9\times 10^{15}g/s$, respectively. Possibly, their spin periods evolved to the present values due to the spin-down by of the electromagnetic emission. This suggest that there exists a critical minimum accretion rate $\mdot=10^{15} g/s$ for a MSP formation, and the arguments for this view are described in the following.
At first, the real ages of MSPs have not yet been satisfactorily determined, although their characteristic ages can be a little longer than the Hubble age [@cam94]. During the MSP spin-up evolution, the minimum amount of accreted mass required for a MSP to reach the spin period of several milliseconds is about $\Delta M_{cr} \sim 0.1 - 0.2 \ms $ [@wang11; @tau12], and the time of spin-up should be less than the Hubble time of about $t_{H} = 10^{10}$yrs of a MSP. Thus, a critical minimum mass accretion rate for the MSP formation can be estimated as:
\_[cr]{} = M\_[cr]{} / t\_[H]{} 10\^[15]{} g/s. If the accretion rate is much lower than this critical value, the NS will have no chance to accrete sufficient mass to be spun-up to a period of a few milliseconds during the evolution. Based on the above argument, a critical minimum accretion rate $\sim 10^{15} g/s$ is suggested as a necessary condition for the MSP formation.
Binary Pulsars in the B-P Diagram
=================================
The evolution of the binary parameters of BPSRs, such as the companion mass, eccentricity and orbital period, are topics of interest. However, the BPSRs in GC can not help us to understand their properties very well [@hes08; @tau12] since the stellar density of the cluster is much higher than that of the Galactic disk [**which increase the collision**]{} and capture of the stars. In this part, we ignore the 75 BPSRs in the GC, and study the distribution of 103 BPSRs in the Galaxy disk (GD) that have spin period $P$ and magnetic field $B$ in the B-P diagram.
$\begin{array}{c@{\hspace{0.1in}}c@{\hspace{0.1in}}c}
\multicolumn{1}{l}{\mbox{}} & \multicolumn{1}{l}{\mbox{}} &
\multicolumn{1}{l}{\mbox{}} \\
\includegraphics[width=5cm]{4.eps} &\includegraphics[width=5cm]{3.eps}
&\includegraphics[width=5cm]{5.eps}\\
\end{array}$
![Evolution tracks of binary pulsars in B-P diagram.[]{data-label="evolve"}](1.eps){width="7cm"}
BPSRs with the Different Parameter Conditions
---------------------------------------------
In Fig. \[emo\]a, we notice that the BPSRs with the small and inter-mediate companion mass, $M_c < 0.1M_{\odot}$ and $0.1M_{\odot}<M_c < 0.45M_{\odot}$ as defined by Stairs (2004) occupy about $12.6\%$ and $61.2\%$ in the total BPSRs, respectively. In Fig.\[emo\]b, the percentages of the BPSRs with the low eccentricity ($e<0.1$), mediate eccentricity ($0.1<e<0.5$) and high eccentricity ($e>0.5$) occupy $85.1\%$, $6.9\%$ and $8.0\%$ of the total, respectively, which indicates that the eccentricity of BPSR has deceased in the evolution process. In Fig.\[emo\]c, most of the BPSRs with the orbital period $P_{orb}<100 d$ share the spin period less than $\sim 100 ms$. Then those with long orbital period $P_{orb}>100 d$ are distributed from $\sim30ms$ to $\sim1s$.
Evolution Scenario of Pulsar in Binary System
---------------------------------------------
There are many cases for the evolutions of binary systems [@lip84; @tau11; @tau12]. The companion mass plays an important role in the evolution of binary system [@taa86; @shi89]. The star with a mass over about 8 solar masses experiences a supernova explosion firstly, leaving a NS with a high magnetic field of $\sim 10^{12-13}G$ and spin period of $>10$ milliseconds, like the Crab pulsar ($B\sim 10^{12}G$, $P\sim 30 ms$). Such a new born pulsar in the B-P diagram lies in the region A0 in Fig.\[evolve\], from where the pulsar starts to evolve to A1 on account of the electromagnetic emission with a more or less constant magnetic field within the time about $\sim 10^{7} yr$. The life time of NS spin-up will be inversely related to the mass of its companion, since heavier stars have shorter life spans, which can be an approximated by the formula of the main sequence age $T \sim 10^{10} (yr) (M/\ms)^{-2.5}$. With the accretion mass provided by the companion, the NS will be spun up. The evolution can be classified in the following three types [@shi89; @taa86].
\(1) High Mass X-ray Binary (HMXB) case: the companion mass is about 10-25$\ms$. The binary system will be the PSR+massive (PSR+NS) star if the system gets the accretion mass $\sim 0.0001\ms-0.001\ms$ ($\sim 0.01\ms$), while the evolution path might be A1-A2 (A1-A2-A3). The accretion evolution will stop at the spin-up line, where the stellar spin frequency equals the orbital Keplerian frequency at the edge of the magnetosphere.
\(2) Intermediate Mass X-ray Binary (IMXB) case: if the companion mass is in the range of 3-10$\ms$, the NS spin-up evolution will continue the procedure of HMXB case following up the route A1-A2-A3 or even to position A4 along the spin-up line. The NS will accrete about $\sim 0.001\ms-0.1\ms$ to form a NS+WD(heavier) systems, with the magnetic field $B\sim 10^{9-10} G$ and the spin period $P\sim 20-100ms$. (3) Low Mass X-ray Binary (LMXB) case: if the companion mass ranges at $\sim 0.8-3 \ms$, the NS will evolve to the position A4 with the magnetic field $B\sim10^{8-9} G$ and the spin period $P<20ms$, while the NS accretes $> \sim 0.1-0.2 \ms$ to form a MSP+WD(lighter) binary system [@zhang11].
From the above mentioned scenarios of BPSR evolutions, the companion mass and accretion rate might play important roles in the evolution of binary system [@wij97; @shi89; @taa86].
Binary pulsars above he spin-up line
====================================
{width="7cm"}
\[2\]
In the binary systems, generally, the PSRs will evolve below the spin-up line after accreting a sufficient amount of mass from their companions. However, seven BPSRs lie above the Eddington spin-up line ($\mdot=10^{18} g/s$) with the magnetic fields $>10^{11.5} G $, as shown in Fig.\[2\]. Their parameters are listed in Tab. 1. According to their companion masses, these seven BPSRs are divided them into two types: the ones with the massive stars ($M>4.0M_{\odot}$) and the others with the degenerate stars (NS or WD).
Type-I: BPSRs with Massive Companions
-------------------------------------
Type-I includes four binary pulsars. Three of them (No.1,3 and 4 in Fig.\[2\]) are with B or Be star companions [@kas94; @man01; @sta01; @sta03; @wang04]. PSR J1638-4725 (No.2 in Fig.\[2\]) has a massive star as its companion ($M_c>8.08M_{\odot}$) which is in the main sequence stage. Its radio emission disappears near the periastron because of the absorption and scattering by the dense stellar environment. During the radio-quiet phase, X-rays that are produced by the accretion matter onto the NS magnetosphere are likely to be detectable [@mcl04]. By considering the parameters of this pulsar, such as the strong magnetic field ($B\sim 1.93\times10^{12} G$), not long characteristic age ($\tau=2.53 Myr$), very long orbital period ($P_{orb}=1940.9 d$) and very high eccentricity ($e=0.955$), we think that it has little possibility to accrete the matter from its companion star, therefore it is inferred that this pulsar is a non-recycled BPSR, born at the position near A0.
The common characteristics of these four BPSRs are: they all have high eccentricities, long orbital periods, massive companions in the main sequence stage. In all cases the pulsars are new born ones with spin-down ones of less than a million years,; they are not (yet) accreting, and are in the “non-recycled” phase. These four BPSRs are on the way of evolution from A0 to A1 as shown in Fig.\[evolve\], where the first born PSRs are experiencing the spin-down with little accretion mass.
Type-II: BPSRs with Degenerate Star Companions
----------------------------------------------
J1906+0746 (No.5 in Fig.\[2\]) is a non-recycled PSR ($1.25M_{\odot}$) in a double neutron star system. Its companion is a recycled PSR with the mass of $1.37M_{\odot}$ [@lor08]. The short characteristic age of J1906+0746 ($\tau=113000 yr$) indicates that it is a recently formed young PSR after the core collapse, which should be the reason why its B-P position lies above the spin-up line ($10^{18} g/s$).
B1820-11 (No.6 in Fig.\[2\]) possesses a slightly massive WD ($M_c=0.78 M_{\odot}$) [@por99; @sta04] as its companion. From its parameters ($\tau=3.22 Myr$, $B=6.29\times
10^{11} G$ and $P=279.829 ms$), we suggest that it is a young recycled PSR. The evolution history of this PSR can be understood in this way: the initial magnetic field of NS can be as high as $B \sim 10^{13}
G$, and it evolves from the position A1 to A2 after accreting the companion mass about $\sim0.001 \ms$, while one to two magnitude orders of magnetic field has been deducted. Due to its high eccentricity and large orbital period, B1820-11 might not get enough accreting mass from its companion. In Eq.(\[P\]) it is assumed that the spinning axis is parallel to the magnetic axis, whereas in Eq.(\[Bsim\]) the perpendicular condition is assumed. Therefore the position of the spin-up line will be fuzzy because the angle of the spinning axis to the magnetic axis is unknown. The position of PSR B1820-11 might be below the spin-up line.
J1141-6545 (No.7 in Fig.\[2\]) is a PSR of mass 1.3 with an optical WD ($1.02\ms$) as its companion in the binary system [@ant11]. With the short orbital period ($P_{orbit}=0.1977 d$) and slightly low eccentricity ($e=0.1719$), it can be derived that this PSR acquired the accretion mass easily and followed up the recycled process. Its position upon the spin-up line can be explained by two possible reasons: the first one is the same reason as for B1820-11, and the second one is that the PSR may have experienced the accreting induced collapse (AIC) of a white dwarf (WD) [@heu95; @heu09].
It is noted that the spin-up line with Eddington rate in B-P diagram is also influenced by the spin-up torque and radiation pressure in disk, which has been studied by some researchers [@kul08; @gho92; @lam05].
No. Name $P/ms$ $P_{orb}/d$ e $M_C/M_{\odot}$ $\tau/yr$ $B/G $ type
----- ------------ --------- ------------- -------- ----------------- ----------- --------- ------ --
1 B1259-63 47.763 1236.724 0.8699 4.14 332000 3.34E11 NSMS
2 J1638-4725 763.933 1940.9 0.955 8.08 2.53E6 1.93E12 NSMS
3 J0045-7319 926.276 51.1695 0.8079 5.27 3.29E6 2.06E12 NSMS
4 J1740-3052 570.31 231.0297 0.5789 15.82 354000 3.86E12 NSMS
5 J1906+0746 144.072 0.166 0.0853 1.37 113000 1.73E12 DNS
6 B1820-11 279.829 357.762 0.7946 0.78 3.22E6 6.29E11 NSWD
7 J1141-6545 393.899 0.1977 0.1719 1.02 1.45E6 1.32E12 NSWD
Discussions and Conclusions
===========================
In this paper, we investigate the 186 BPSRs (136 MSPs) in the B-P diagram. The origin and evolution information of their progenitors can be inferred by analyzing their positions relative to the spin-up lines in the B-P diagram. The following results have been obtained:
\(1) The observations of X-ray NSs in binary systems show that $\mdot=10^{17} g/s$ is a conventionally detected mass accretion rate [@kli00; @liu07]. In the B-P diagram, most BPSRs are distributed around the spin-up line for $\mdot=10^{16} g/s$, which means that most BPSRs should be born at the positions near the spin-up line ($\mdot=10^{17} g/s$), from where the PSRs experience the spin-down time of $\sim10^{8-9} yr$ after the onset of the radio PSR emissions.
\(2) To form a MSP, the mass of about at least $\sim$ 0.1-0.2 should be accreted from the companion [@wang11; @zhang11]. Thus, within a Hubble time, the required minimum accretion rate is $\mdot=10^{15} g/s$. In other words, if the accretion rate is less than this critical value, a NS will accrete the mass less than 0.1 and may evolve to a recycled PSR with a slightly longer spin period than 20 ms. Furthermore, we stress that this critical minimum accretion rate is an averaged value in the whole binary accretion history.
\(3) It is noticed that the position of a pulsar and its spin-up line in the B-P diagram are slightly affected by the choices of the NS mass and radius, and the radius has more influence than the mass. However, unlike the measurements of the NS masses, the NS radius has not yet been satisfactorily determined from observations [@zhang07; @zhang11]. It is usually estimated to be in the range of 10-20 km, thus we cannot sure if the standard value of $R=10 km$ introduces a big error in defining the PSR position in the B-P diagram. (4) The classification of the BPSRs by the conditions of the companion mass, eccentricity and orbit period have given us a clear illustrations of their properties in B-P diagram. Most millisecond BPSRs with small companion masses ($<0.45\ms$) should be long lived, such as $10^{8-9} yr$, while $\sim0.1-0.2\ms$ is accreted during the accretion phase. In addition, the majority millisecond BPSRs share the small eccentricities $e<0.01$, which implies that their orbits were circularized during the recycle process. In fact, there have already been many researches on this, e.g. by Tauris & Sacinije (1999), Tauris, van den Heuvel & Savonije (2000), and Tauris, Langer & Kromer (2012). However, there is no clear and simple relation between the orbital period and BPSR evolution, which hints that the evolution of the orbital period may be complicated in the recycle process.
\(5) To interpret why the seven BPSRs lie above the limit spin-up line, we start with the binary histories of these sources. The first four BPSRs have the heavy star companions ($M_c > 4 \ms$) staying at the main sequence phases, and they are still spinning down via magnetic dipole radiation. The recycle processes of these systems have not yet started, so they still go on the evolutionary tracks of the first pulsar spin-down. The fifth BPSR lies in a double NS system (NS+NS). However, unlike the system PSR 1913+16 in which the recycled pulsar has been observed, the observed pulsar J1906+0746 should be the normal and the secondly formed pulsar. Namely, its companion should be a recycled NS that has not yet been observed as a pulsar. Thus this PSR is experiencing the spin-down by the electromagnetic radiation towards the death line. Both the sixth and seventh pulsars are similar, which have the degenerate white dwarfs (NS+WD) as companions. They might be the newly formed recycled pulsars with the Eddington rate, while either the particular accretion torque and disk structure or large NS radii may be responsible for their slightly passing through the spin-up line.
In summary, the study of BPSRs in B-P diagram has provided us the clues on their accreting evolution histories, which is a helpful tool in constructing a link between the radio MSPs and their progenitors, where the influences by their binary parameters can be properly investigated. The 186 binary pulsars from the 2008 pulsar sample have been analyzed, and more samples are required to present robust conclusions on the evolutions of binary pulsars. With the recent construction of the powerful radio telescope, five hundred meter aperture spherical telescope (FAST), more than 4,000 new pulsars are expected to be observed in this decade [@nan06; @smi09; @nan11], while there will be a big sample set of binary pulsars, e.g. about 500 ones, to show a clear trend of MSP evolution.
Acknowledgments {#acknowledgments .unnumbered}
===============
This work is supported by the National Basic Research Program of China (2012CB821800, 2009CB824800), the National Natural Science Foundation of China (NSFC 11173034), and CAS Knowledge Innovation Project (KJCX2-YW-T09). We are grateful for the critic comments and advices from van den Heuvel E. P. J., which greatly improves the quality of the paper.
Alpar M. A., Cheng A. F., Ruderman M. A. & Shaham, J., 1982, Nature, 300, 728
Antoniadis J., Bassa C. G., Wex N. et al., 2011, , 412, 580
Backer D. C., Kulkarni S. R., Heiles C. et al., 1982, Nature, 300, 615
Bhattacharya D. & Srinivasan G., 1995, in X-ray Binaries, eds. Lewin W. H. G., van Paradijs J. and van den Heuvel E. P. J., cambridge University , p.495
Bhattacharya D. & van den Heuvel E. P. J., 1991, Phys. Rep., 203, 1
Bradt H. V. D. & McClintock, J. E., 1983, ARAA, 21, 13
Burderi L., D’Antona F. & Burgay M. 2002, , 574, 325
Burgray M., D’Amico N., Possenti A. et al., 2003, Nature, 426, 531
Camenzind M., 2007, Compact Objects in Astrophysics, Springer Berlin Heidelberg Newyork
Camilo F., Thorsett S. E., Kulkarni S. R., 1994, , 421, L15
Frank J., King A. & Raine D., 2002, Accretion Power in Astrophysics, Cambridge, UK
Geppert U. & Wiebicke H. J., 1995, , 300,429
Ghosh P. & Lamb F. K., 1977, ApJ, 217, 578
Ghosh P. & Lamb F. K., 1992, in X-Ray Binaries and Recycled Pulsars, ed. E. P. J. van den Heuvel & S. A. Rappaport (Dorddrecht: Kluwer), 487
Haensel P., Potelin A. Y. & Yakovlev D. G., 2007, Neutron Stars, Spinger Science & Business Media, LLC.
Hansen M. S. & Phinney E. S., 1998, , 294,569
Hartman J. W., Portegies Zwart S. & Verbunt F., 1997, , 325, 1031
Hasinger G. & van der Klis M., 1989, AAP, 225, 79
Hessels J. W. T., Ransom S. M., Stairs I. H. et al., 2006, Science, 311, 190
Hessels J. W. T., 2008, AICP, 1068, 130
Hobbs G., Archibald A., Arzoumanian Z. et al., 2010, CQGra, 27, 4013
Kaspi V. M., 2010, PNAS, 107, 7147
Kaspi V. M. Johnston S., Bell J. F. et al., 1994, , 423, 43
Kluzniak W., Ruderman M., Shaham J. & Tavani M., 1988, Nature, 334, 225
Kramer M., 2006, Science, 314, 97
Kulkarni A. K. & Romanova M. M., 2008, , 386, 673
Kulkarni S.R., 1986, , 306, L85.
Lamb F. K. & Yu W., 2005, ASPC, 328, 299
Lattimer J. M. & Prakash M., 2004, Science, 304, 536
Lipunov V.M. & Postnov K.A., 1984, APSS,106, 103
Liu Q. Z., van Paradijs J. & van den Heuvel E. P. J., 2007, , 469, 807
Lorimer D. R. & Duncan R., 2008, LRR, 11, 8
Lundgren S. C., Cordes J. M., Foster R. S., et al., 1996, , 458, L33
Lyne A. G., Burgay M., Kramer M. et al., 2004, Science, 303, 1153.
Lyne A. G. & Smith F.G., 2006, Plusar Astronomy, Cambridge University Press, UK
Manchester R. N., Hobbs G. B., Teoh A. & Hobbs M., 2005, AJ, 129, 1993
Manchester R. N., 2004, Science, 304, 542
Manchester R. N. Lyne A. G., Camilo J. F. et al., 2001, , 328, 17
Manchester R.N. & Taylor J.H., 1977, Pulsars, Freeam W.H. and Company, U.S.
Mclaughlin M., 2004, Chandra proposal, 1862
Melatos A. & Payne D., 2005, , 623, 1044
Miller M., Lamb F. K. & Psaltis D., 1998, , 508, 791
Miller C., 2002, Nature, 420, 31
Nan R.D., 2006, ScChG, 49, 129
Nan R.D., Li D., Jin C.J. et al. 2011, IJMPD, 20, 989
Phinney E.S. & Kulkarni S.R., 1994, ARA&A, 32, 591
Phinney E.S. & Verbunt F., 1991, , 248, 21
Portegies Zwart S., van den Heuvel E. P. J., van Leeuwen J. & Nelemans, G., 2011, , 734, 55
Portegies Z., Simon F. & Yungelson Lev R., 1999, MNRAS, 309, 26
Radhakrishnan V. & Srinivasan G., 1982, CSci, 51, 1096
Ruderman M. A. & Sutherland P.G., 1975, , 196, 51
Shapiro S. L. & Teukolsky S. A., 1983, Black Holes, White Dwarfs and Neutron Stars. Wiley, New York
Shibazaki N., Murakami T., Shaham J. & Nomoto K., 1989, Nature, 342, 656
Smits R., Lorimer D. R., Kramer M. et al., 2009, , 505, 919
Stairs I. H., 2010, IAU Symposium, 261, 218
Stairs I. H., 2004, Science, 304, 23
Stairs I. H., Athanasiadis D., Kramer M. & Lyne A. G., 2003, ASPC, 302, 855
Stairs I. H., Manchester R. N. & Lyne A. G., 2001, , 325, 979
Taam R. E. & van den Heuvel E. P. J., 1986, , 305, 235
Tauris M. & Savonije J., 1999, , 350, 928
Tauris M., van den Heuvel E. P. J. & Savonije J., 2000, , 530, 93
Tauris M., Langer N. & Kramer M., 2011, , 416, 2130
Tauris M., 2012, Science, 335,561
Tauris M., Langer N. & Kramer M., 2012, , 425, 1601T
van den Heuvel E. P. J., 2012, private communication
van den Heuvel E. P. J., 2009, ASSL, 359, 125v
van den Heuvel E. P. J., 2004, Science, 303, 20
van den Heuvel E. P. J. & Bitzaraki O., 1995, , 297, L41
van der Klis M., 2000, ARA&A, 38, 717
van Leeuwen J., Cordes J. M., Lorimer D. R. et al., 2006, ChJAS, 6, 311
Wang J., Zhang C.M., Zhao Y.H. et al., 2011, , 526, 88
Wang N., Johnston S., Manchester R. N., 2004, , 351, 599
Wijnands R. & van der Klis M., 1998, Nature, 394, 344
Wijers R. A. M. J., 1997, , 287, 607
Zhang C. M., Wang J., Zhao Y. H. et al., 2011, , 527, 83
Zhang C.M., Yin H. X., Kojima Y. et al., 2007, , 374, 232
Zhang C. M. & Kojima Y., 2006, , 336, 137
Zwart P., Simon F., Yungelson & Lev R., 2011, ApJ, 309, 26
|
WASHINGTON — A high school teacher who was removed from her position as adviser to the student newspaper last May, has filed suit against the Stanwood School District, the superintendent and the school principal.Val Schroeder was removed from her duties teaching journalism and yearbook and from her position as adviser to the student newspaper at the beginning of the 1996-97 school year, according to Fern Valentine of the Washington Journalism Education Association.Schroeder claims in her suit that she lost her position as adviser to the Spartan Spectrum because of how administrators treated her after one of her students wrote a story in the paper about bestiality. The suit claims that Schroeder was removed from her position and reassigned in retaliation for allowing the article to be published.The school district’s superintendent, Raymond Reid, filed a written complaint with the state superintendent of public instruction in early 1996, reporting “certain misconducts.” He claims that Schroeder allowed the publication of an article whose subject matter was “inappropriate for high school-aged students.” The letter also directed the superintendent’s attention to school guidelines defining obscene material. The letter has not yet been addressed by the state superintendent, said Valentine.Although he would not comment on the specifics of Schroeder’s suit, Stanwood principal Gary Vegar said the case had “no merit.” He would not say whether the material in question was obscene, only that it was “inappropriate for high school-aged students.” “The real issue,” he said, “is whether or not students should be given total control over issues of taste.”Valentine disagreed.”They treated her completely unfairly” she said. Valentine added that when the superintendent called the story obscene, “they only quoted the part [in the school policy] about obscenity, and this clearly wasn’t obscene. But [administrators] ignored the part of the guidelines that say no prior restraint is allowed and that a teacher can’t be liable for what students write.” |
JL Bourg Basket
JL Bourg is a basketball club based in Bourg-en-Bresse, France that plays in the Pro A. Their home arena is Ekinox, which has a capacity of 3,548 people.
In 2014, JL Bourg adopted its new home arena Ekinox which replaced the Salle des Sports. This year the team also promoted to the Pro A after it won the Pro B Playoffs. They relegated back after the 2014–15 season.
Season by season
Honours
Pro B
Champions (1): 2016–17
Leaders Cup
Runners-up (1): 2006
Pro B Leaders Cup
Champions (1): 2016
Players
Current roster
Individual awards
Pro A Most Valuable Player
Zachery Peacock – 2018
Logos
References
General
LNB Profile
Bourg-en-Bresse |
Samaritana Blog
Our calling to care for and empower women is bigger than ourselves. We seek to pursue that work in community with the greater body of Christ.
Thank you for being a part of our journey!
Sharing and multiplication
"Sharing what each one of us are gifted with allows for the multiplication of blessings in the lives of people around us in our homes and communities."
In a recent Friday fellowship in Samaritana, I led the weekly devotion using the story of the feeding of the five thousand. I started by asking the group if they thought it was possible for all of us to have a taste of a small packet of Magic Flakes that contained four pieces of salted crackers. As the packet was passed around, each person carefully snapped off a small piece until the last tiny bit and a few crumbs landed in my hand. I could see the delight in each one’s eyes for having been able to successfully share and stretch the few crackers among the 25 of us in the room. We may not have been able to have as much as the crowd ate in the Gospel story, but like them we tasted in that moment the wonder and fullness of what sharing can do. Someone even said how delicious the small piece of cracker she ate was! After the exercise, we interacted together around how we all have something to offer to one another, no matter how small or insignificant it may seem. Sharing what each one of us are gifted with allows for the multiplication of blessings in the lives of people around us in our homes and communities.
It is in the spirit of sharing that Kaakbay Coalition of Aftercare Practitioners was formed. Last January we launched the coalition in a conference attended by 83 participants representing 24 organizations. Kaakbay is a Pilipino word for putting one’s arm around another’s shoulders. Envisioning ourselves as journeying together towards fullness of life, Kaakbay is a faith-based coalition working collaboratively towards seeing survivors of sexual exploitation becoming whole, restored and reintegrated into society by enhancing aftercare services, sharing resources, and building capacities. For instance, some of us are referring women to one another depending on the particular needs of each woman, and resources of each group. Samaritana has also shared livelihood opportunities to other groups, and assisted one partner group in its outreach activities for a few months. Kaakbay’s coordinating council, comprised of 11 members from 6 organizations, is bursting with enthusiasm and commitment as we meet and brainstorm together on how we can enrich the spirit of sharing with other kindred-hearted organizations beyond Metro-Manila to the rest of the country.
In feeding the five thousand, Jesus did not do it alone but he engaged everyone to look for food, distribute it, and gather what was left. Moved by compassion upon seeing the crowd, he tossed the question to the disciples on where and how to feed them. After some hesitation, they found food available...five loaves and two fish that came from a small boy who probably brought this for himself and his companions. Within Samaritana, we also believe that the women are best empowered when they themselves are involved in planning and implementing activities. One of the exciting things happening is that the women’s self-help cooperative is finally taking off with a steady pace of growth and is harnessing various capabilities of the members like responsible leadership, economic empowerment, and communal caring. Starting from a consumer’s cooperative they are now venturing into giving out small loans to members.
Another area we are trying to address more intentionally has to do with the men who are either married to or are living with the women who are part of Samaritana’s training program. Aside from inviting them to occasions like Christmas and Valentine parties, Jonathan along with a few male volunteers are spending time with them through home visits and weekly informal gatherings at the community garden of Samaritana. Our prayer is that they, too, become empowered in good ways such as actively participating in providing for the financial and physical needs of their families, becoming good fathers to their children, and knowing God personally in their lives to depend on him for the healing and restoration of their families.
Next year will be an important year for Samaritana as we celebrate its 25th year anniversary. We are thinking of having quarterly events throughout 2017 like a reunion for the women we have helped through the years, a coordinated outreach activity together with members of the coalition, an anniversary thanksgiving dinner with different stakeholders, and launching two books that Jonathan and I are beginning to write in collaboration with OMF Literature. If you are interested to be part of the anniversary celebration by co-sponsoring any of these events, do let us know. We will give you further details as plans take more shape.
Add a comment
Email again:
Name
E-mail
Comment
For more information, please call us at (632) 938-1617 or (632) 431-5771, or email info@samaritana.org.
You can also contact us at our mailing address:
QCCPO Box 1642, Diliman, Quezon City, Philippines 1156. |
Product Description
Over the years, both customer needs and technology have changed. The Swiss Army Knife has evolved by responding to these needs, while remaining an essential tool our clients can rely on. That's our story. But it's not what turned the Victorinox Knife into an icon. It's about the stories our customers experienced in which our products played a vital role: stories about memorable moments of adventure and expeditions on earth, in the sky, and in space. Dramatic stories in which our products contributed to solutions and saved lives. Even stories of prominent encounters where our knives opened doors, helping to create ties between politicians, opinion leaders and nations. In all of these stories it becomes clear that thanks to the talent of our employees we have been able to develop products that excel in their functionality, quality and design - making them true companions for life. We invite you to discover the world of Victorinox and are proud to be a companion for your life. Thank you for your interest and trust in Victorinox.
Amazon.com
Elegant and refined, the superbly crafted Victorinox Swiss Army cigar knife cuts your cigar to your preference every time. The knife features three laser-sharpened circular punches of different gauges. Simply choose the size you wish, press the cigar to the punch, and rotate the tool. Within seconds, you'll slice a nice round incision that allows for a great draw. The Swiss Army cigar knife is stylishly cased in a sleek white housing with the familiar Victorinox logo on the side. And like other Swiss Army knives, the cigar knife includes a few other mini-tools, including a knife blade, mini-scissors, and a nail file with a nail cleaner.
As with all Victorinox items, the cigar knife is made to exacting standards, with dozens of steps going into its construction. Victorinox attends to every detail, from selecting the finest materials to performing the final inspection. In addition, each individual tool has been hardened in a different way to stand up to its designated use. The cigar knife measures 3 inches long and carries a lifetime warranty.
Cigar Knife Tools
Blade
Nail file with nail cleaner
Scissors
Cigar cutter
About Victorinox
In 1884, Swiss cutler Karl Elsener set up shop in Ibach-Schwyz, installing a waterwheel in Tobelbach Brook to run his grinding and polishing machines. Thus began what would become the international brand name Victorinox, a combination of Victoria, for Elsener's mother, and "inox," or stainless steel. Today, Victorinox produces watches, luggage, clothing, and, famously, Swiss Army Knives. The original product dates to 1897, when Elsener patented the Swiss Officer's and Sports Knife he supplied to the Swiss Army. Following World War II, American servicemen and women shopping in PX stores shortened the name to Swiss Army Knife, which lives on in English-speaking countries around the world and has become a metaphor for versatility. |
Jacquelynn Hundley has been missing from the Kenova area of Wayne County since the morning of Thursday, August 3rd, 2016.
Her friends call her Jackie. Jackie is 17 years old and attends Spring Valley High School.
Jackie is approximately 5 feet 2 inches tall and weighs approximately 220 pounds with dark brown hair and brown eyes.
She has family in Lincoln County, WV, as well as also in Kentucky and Ohio.
If you see Jackie, or know where she is located, please call the West Virginia State Police Wayne Detachment, 304-272-5131, or 911. |
Echocardiograph pulmonary venous flow patterns in congenital heart defects with increased pulmonary flow.
To describe pulmonary venous flow patterns using transthoracic echocardiograms on children suffering from different congenital heart defects with increased pulmonary flow. Prospective study and consecutive selection of children suffering from congenital heart defects with increased pulmonary flow. The transthoracic, apical view, Doppler echocardiogram was used, positioning the sample-volume at the lower pulmonary vein, 4mm from its junction with the left atrium. The data analyzed included: dominant systolic or diastolic pulmonary venous flow and atrial contraction waveform characteristics, designated as "A" for absent and "R" for reversed. The study included twenty-nine patients with a mean age of 29.9 +/- 58.9 months, suffering from the following congenital heart conditions: interatrial and interventricular communication defects, patent ductus arteriosus, atrioventricular septal defects, total transposition of the great arteries and truncus arteriosus. All the patients presented a continuous pattern of high velocity pulmonary venous flow. Nine patients presented a dominant systolic waveform (31%), eighteen presented a dominant diastolic wave form (62%) and 2 patients had systolic and diastolic wave forms of equal amplitude (7%). Six patients (21%) presented a R atrial contraction waveform and 23 (79%) presented an A atrial contraction waveform. Congenital heart diseases with increased pulmonary flow present a continuous pattern of high velocity pulmonary venous flow with alterations mainly in the atrial contraction reversal pattern. |
« previous post | next post »
Sometimes I think that Philip K. Dick is passing the time in purgatory by ghostwriting news stories like this one — "Atlantic City's Revel Casino reimagined as elite school", Reuters 9/22/2014:
A Florida developer who made a $90 million offer for Atlantic City's shuttered Revel Casino wants to use the site to help end world hunger, cancer, and resolve other pressing issues like nuclear waste storage.
Glenn Straub's plan is ambitious as it is high-minded. First, he would add a second tower to the 57-story structure, completing the original vision of the casino-hotel's developers. The businessman, who owns the Palm Beach Polo Golf and Country Club, would then convert the complex into a university where the best and brightest young minds from across the world could work on the big issues of the day.
But this is Language Log, not Eccentric Developer Log, so read on to get to the linguistic point:
"We want people who will cure the world of its hiccups," said Straub in an interview, his ideas for Atlantic City spilling out in his rapid-fire manner.
Revel, which cost $2.4 billion to build and opened just two years ago, closed September 2 after failing to draw bids at a bankruptcy auction.
Sure, the globe's largest corporations may eventually lure away some of his students, he conceded, but "we'll make them donate 2 percent of their incomes for their lifetimes," to help fund the project. He did not elaborate or say how the university would be financed otherwise.
His ideal student would be "free, white and over 21," he said, using a politically incorrect way to describe someone with no financial obligations.
Actually, I believe that the phrase "free, white, and twenty one" means something more like "free and responsible for his or her own choices". The OED glosses it as "that is an independent adult who can engage in any activity not prohibited by law; that is a free agent". A discussion here translates it as "I can do what I want and no one can stop me", and finds it in an 1856 novel, where a young women uses it as an ironic cry of mock liberation:
35 years ago, my own introduction to this obnoxious expression came from a woman — call her X — who used it in a rather more serious sense.
A young Japanese researcher — call him Y — had come to the U.S. for a year, to visit the lab where I worked at the time. Since the lab was located in a rural/suburban area, he needed a car, and X, who worked in the same place, had one to sell. It made a kind of grinding noise, which worried him, but X explained that American cars are often like that, so Y went ahead and bought it, for a price on the high side of the blue-book value.
After a couple of days, the vehicle ground to a complete halt, and when Y had it towed to a local garage, the mechanic explained that the transmission was totally shot, and would need to be replaced, for a cost greater than the value of the car.
Y was mortified, since among other things he had no more money. So I went to talk to X, whom I knew. She was quite up front about the situation, explaining that she had not offered any sort of guarantee of the vehicle's condition, and that Y was, in her words, "free, white, and twenty one".
I mentioned Y's inadequate information about used-car transactions in the U.S., his naive trust that a co-worker would not cheat him, etc., and for my pains I got a lecture about libertarian politics and a recommendation to read Ayn Rand on the virtue of selfishness.
Update — some other coverage of the hypothetical Revel re-make…
Francis Hilario, "Revel bidder wants to build a university 'for geniuses' on property", Philadelphia Business Journal:
Glenn Straub, who made a cash bid for the $2.4 billion casino under his legal entity Polo North Country Club Inc., said he's planning on building a tower more than 30 stories tall at the Revel property that will host to “some of the smartest people in the world," according to the Press of Atlantic City.
“The university’s going to go in,” Straub told the paper. “It’s going to be for geniuses.”
He also talked of a high-speed ferry and railway systems — including an "underground passageway" — that's in line with an earlier interview with USA Today, where Straub said he hoped to rebuild Atlantic City's image, which includes adding high-speed rail links with New York City and Philadelphia.
Nothing yet about the spaceport.
The university plan apparently emerged within the last week — "Revel bidder: Distress is his business", Philadelphia Inquirer 9/13/2014:
Straub was circumspect about what he would do with the Revel property if his bid turns out to be the winner in an auction scheduled for Sept. 24, subject to court approval at a hearing Monday.
"We're going to be doing six, seven more things there. If it makes money, that's good. Pat us on the back. If it doesn't make money, then we close her down just like Miami Arena and we blow it up," Straub said.
The Press of Atlantic City ran a poll — "Maverick real estate developer and polo enthusiast Glenn Straub envisions a think tank at the former Revel Casino-Hotel to address global problems. Is a tower of geniuses a good idea?"
Steve Larson at Legal US Poker Sites has all the angles covered — "Glenn Straub Plans to Build a University Campus Adjacent to Revel Casino & Hotel":
Glenn Straub, who placed a $90 million bid in bankruptcy court on Revel Casino, said he plans to place an educational center on the land next to the old casino site. Straub is the head of a Florida property development group which previously said it makes communities better.
When news first got out that Glenn Straub had placed a bid on the Revel Casino, he was a bit canny about the nature of his business project. He hinted that the Revel Hotel and Casino would not be used for gambling, but would not say exactly what his group’s plans were. Early speculation was Straub would build a railway hub that would link to New York City and Philadelphia.
He told NJ.com on Friday that he planned to build a 35-story tower next to Revel’s hotel that would house a university. He did not mention a name for that university, or the main focus of its curriculum. What he did say about his plans are grandiose.
Alex Napoliello of NJ Advance Media paraphrased Glenn Straub saying that he wants to create “a community of the world’s brightest people”. These people would work on global issues. The example of a global issue Straub listed was nuclear waste disposal.
I'm pretty sure that this is all part of an unpublished Philip K. Dick novel.
Permalink |
I don’t remember when I watched Sofia Coppola’s 2003 film “Lost in Translation” for the first time or for that matter why it’s taken me this long to write a review about it. I remember there was some hot air about it and the accolades, the airy script and unconventional wit, or maybe I just had so much more on my plate I didn’t have room for another character driven slice of life pie – but I probably could have used some verisimilitude, don’t we all? I could blame it on the rush to catch up to the decades worth of films I’ve watched over my lifetime, or say the line about how there’s only so many hours in the day, that I got from a calendar when I was ten, back when banks gave them away instead of foreclosure notices. I could say I’ve been meaning to review it and have notes on the subject but mostly I want to thank a friend of mine who had quite a different reaction to the film, thus inspiring me to take a look, and I felt compelled to start remembering and see why I watch it so often just to get away.
It must have been frightening for Sofia that first time, her debut the Virgin Suicides in 1999, except that she slammed it over the fence, a home run, clearly living beyond the shadow of her famous father’s directors chair. For number two it was the same love affair with minutiae, the layers of characters both imagined and actor, story less about plot mechanics and more living truthfully through imaginary circumstances. I’m not compelled to challenge my friend’s opinion or yours if you disliked it, I think there are some incredible aspects whether you loved it or hated it, but I do want to point out the importance of difference in Sofia’s films and how much the weight of air matters sometimes most of all. It is helpful to embrace the fact that LIT pretty much goes against the very covenants of what all films set out to do or at least erect some similar scaffolding to move us along – that is to instill a sense of knowing what to expect and what kind of adventure and characters are involved. LIT is about the timeless void of slowing down, coming to a stand still in a world moving a thousand miles an hour around you. It’s not an easy proposition to go against the stream of fashion, but the journey scatters us in possibility if we try. Perhaps that is why there’s such a divide between the exhilarated and the bored dry.
If Lost In Translation fails the many it is for the very reason that it ultimately succeeds for the few, speaking to the deepest unspoken desires about our constant war with loneliness in all the rooms full of people of our lives. It is in this quiet place that Sofia engages us with the sharp elbows and indifferent faces we find there in our own lives, that she touches ever so gently on the fleetingness of this here and now falling down existence to be content with the simple pleasures of being ourselves. It is because Sofia knows the depths of an isolated heart cut off from the world and desperate to enjoy silence with someone and the burden of celebrity that she captures so well the most unsettling love story she could imagine, one she’s lived and is living, about two people passing forever for a little while. The proximity of enjoyment is slight, I admit that, but just being in the same place is enough to be truly happy with stillness. In a world of thousand mile an hour deception and machine gun fire, superficiality sold to the highest bidder and commoditized reality television celebritydom, it’s not so much wonder that many miss the nearly indecipherable merits of matters of the heart without all the stuff we’ve come to rely on in our relationships with movies. Lost In Translation takes an unconventional path to unburdening our reliance on filler, offering us a leaner, more refined story of two people who have no business finding one another but do in the least likely of places and once there they have no idea what to make of it but know enough to enjoy it while it lasts.
Lost in Translation is as much about experiences had as imagined, like the ones you spend a lifetime pretending, the trips to far away places and backyard roller coaster rides, the famous faces and personal goals of self improvements, finding the one and only soul mate, learning how to disconnect and unplug over dinner. It is about people, places and things getting in the way of spending time with someone who really understands you and is happy with running through a crowd to catch a bus when you really don’t have to be anywhere. It is about never having those awkward silences or when you do it’s because you’re sharing a joke no one else in the elevator gets or the fact that you like something for the exact reason everyone else finds foolish or offensive or just so unimportant in the grand scheme of the universe of things. Lost in Translation is about the airy stuff of seconds and people aging backwards or not at all, people caught up in one another so completely as to find complete and lasting happiness in the smallest of places and forget they’re heading to different tomorrows. The conversions made are how we change one thing for another, things for other things, and in seeing two people who don’t have any reason to connect so profoundly in their seconds together, we realize the translation is a lot like our expectations when all we really have to do is remember how to get lost together.
Like this:
LikeLoading...
Related
About rorydean
Rory Dean is a multi-medium artist, writer and new media strategist with a background as a creative consultant and technology liaison in the San Francisco Bay Area. His broad experiences and specialties include print-to-web publicity, promotions and design marketing using traditional and social media networks. As a motion pictures and television professional, his short films, productions and commercials have screened to domestic and international audiences. His connections to a diverse client base include artists, entertainers, corporations, non-profits and everyday people..
Dean is co-owner and founder of Dissave Pictures, a boutique production company focusing on audio, video, photography and multi-media designs. Dean's personal and professional background includes dreaming and avid notebook journaling, creative and copy writing, promotions and marketing, audio/video production, photography, videography, editing, web design and new media. He’s also a fan of collaboration and knows when to turn the reigns over, offer feedback, lead the team and step aside. His portfolio includes print, online, film, video, photography, graphic design and promotions. He’ll show you. He has a book and everything.
"When not juggling various online worlds, I do a pretty good mime – but that’s another story."
Nick from http://www.cinekatz.com here. Doing some scout work for the LAMB. We’re wanting to make an email newsletter for community features as well as a list we’re making similar to Sight & Sound’s best movies of all time list. Just need an email! Email me at npowe131 at gmail.com |
Antibacterial activity of vegetables and juices.
We evaluated the antibacterial activities of various fruit and vegetable extracts on common potential pathogens including antibiotic-resistant strains. Standardized bacterial inocula were added to serial dilutions of sterile vegetable and fruit extracts in broth, with final bacterial concentrations of 10(4-5) cells/mL. After overnight incubation at 35 degrees C, antibacterial activity was measured by minimum inhibitory and minimum bactericidal dilutions (for raw juices) or concentrations (for tea). Among the vegetable and fruit extracts tested, all green vegetables showed no antibacterial activity on Staphylococcus epidermidis and Klebsiella pneumoniae. All purple and red vegetable and fruit juices had antibacterial activities in dilutions ranging from 1:2 to 1:16. Garlic juice had significant activity, with bactericidal action in dilutions ranging up to 1:128 of the original juice. Tea also had significant activity, with bactericidal action in concentrations ranging up to 1.6 mg/mL, against a spectrum of pathogens including resistant strains such as methicillin- and ciprofloxacin-resistant staphylococci, vancomycin-resistant enterococci, and ciprofloxacin-resistant Pseudomonas aeruginosa. Tea and garlic have the potential for exploration of broader applications as antibacterial agents. |
class LeadingOnly {
constructor() {
/* 1.1 Leading */ super();
}
}
class TrailingOnly {
constructor() {
super /* 2.1 Trailing */
();
}
}
class LeadingAndTrailing {
constructor() {
/* 3.1 Leading */ super /* 3.2 Trailing */
();
}
}
|
Judge makes Pasco land grab’ injunction permanent
When he ruled Pasco County’s right-of-way ordinance was unconstitutional, U.S. District Judge Steven Merryday said it “cannot stand.”
Merryday made it official this week, issuing a permanent injunction order that prohibits the county from continuing to enforce the ordinance it used for seven years to demand free road right-of-way in exchange for development and zoning rights.
Merryday called it an “illegal land grab” and said the ordinance violated property owners’ due process rights guaranteed by the Constitution.
Chief Assistant County Attorney David Goldstein said the injunction relates to sections of the ordinance that require right-of-way dedications and the waiver process. “The court did not invalidate the other transportation corridor requirements, such as the setback requirements,” he wrote in an email to a reporter.
Pasco County filed a notice Tuesday that it will appeal the ruling and the injunction to the Atlanta-based 11th U.S. Circuit Court of Appeals. Goldstein said the county also would file a motion to stay the injunction pending the appeal.
“We do not intend to enforce the enjoined sections of the code while the injunction is in effect,” he wrote.
If the county loses the appeal, it could face hundreds of claims — or a class action lawsuit — from property owners and developers who were required to donate land to the county or Florida Department of Transportation as a condition for a rezoning or building permit.
“This is important because the county staff was continuing to enforce the ordinance even after the judge found it unconstitutional,” said Mike Kass, an attorney and partner in Hillcrest Preserve.
Kass and his business-partner, George Karpay, sued the county when officials approved their site plan for a shopping center, but only on the condition they donate 140 feet of right-of-way for the widening of State Road 52. Karpay died in April, a few days before Merryday issued his ruling.
Kass said Merryday’s rulings invalidate the condition on Hillcrest’s site plan.
“We now have the ground back by the judge,” Kass said. “The more they fight they’re just increasing their potential liability.” |
MELBOURNE (Reuters) - After spending a decade and billions of dollars developing Australia’s vast gas reserves, U.S. energy giant Chevron Corp and local firm Woodside Petroleum are at odds over the pace and timing of the next leg of expansion.
The Pluto LNG onshore gas plant is seen in this undated hanodut photo. Woodside/Handout via REUTERS
Shipments of liquefied natural gas (LNG) have become one of Australia’s biggest exports and a key source of revenue for many energy majors, so any hurdles in the sector’s development could strike a substantial blow.
The issue comes down to how quickly to build a shared infrastructure system that would include a major trunk pipeline for transporting gas from mammoth new offshore fields owned by various companies in northwest Australia.
Woodside WPL.AX wants to take the lead in such a project, pushing to build soon so it can go ahead with its $11 billion Scarborough development, the only new gas field in the region that is primed for a final investment decision by 2020.
But Chevron CVX.N would prefer to spend more time planning and building such a system, which it says could be led by it or other companies.
“I don’t think there are any showstoppers in changing ... to a more shared infrastructure model,” Chevron’s Asia Pacific exploration and production president, Stephen Green, said in a group interview.
“It’s just getting the alignment of all the different parties that want to participate in that value chain and coming up with the structure that satisfies each party’s needs.”
Firms with stakes in the region's gas fields, including Royal Dutch Shell RDSa.L, BP BP.L and BHP Billiton BHP.AXBLT.L, will need to decide which option to pursue within the next 18 months to ensure untapped reserves are available ahead of a supply shortfall that some industry analysts see emerging from around 2022.
Putting pressure on his peers, Woodside Chief Executive Peter Coleman said last month that any rival would need to negotiate with him by September to get their gas into an infrastructure system led by Woodside.
“They really need to get to us in the third quarter and be very serious about what they’re doing, because that window will close,” he said at an investor briefing.
Chevron has not put a cost estimate on its infrastructure plan, saying it depends on how big any trunkline is and how many fields it connects to. Woodside has not given an exact estimate of costs for a shared project that it would lead.
“Talk of collaboration is good rhetoric, but there are an awful lot of moving parts,” said Wood Mackenzie analyst Saul Kavonic.
BHP and BP declined to comment. Shell declined to comment except to reiterate that its Australian head, Zoe Yujnovich, has called for “greater cooperation between ventures to reduce waste and duplication”.
Chevron and Woodside are key in Australia’s LNG sector as they operate the four LNG plants in Western Australia, and between them have a total of more than 60 trillion cubic feet (Tcf) of undeveloped gas resources in the region’s offshore Carnarvon and Browse basins.
To view a map on Gas fields around Woodside's Pluto, Scarborough fields, click: reut.rs/2Jtq3iA
BURNT BY COSTS
Until now, all 10 of Australia’s LNG developments have been built as megaprojects, with the owners constructing pipelines and LNG plants dedicated to their own fields. Critics say that has wasted huge amounts of money as infrastructure has been duplicated, helping push total development costs to an eye-watering $200 billion.
Burnt by a cost of $54 billion in developing its huge Gorgon project off Australia’s northwest coast, Chevron wants to change strategy.
“It’s our view that that’s not the most cost efficient ... way to see resources developed across a large, prolific basin like the Carnarvon,” said Chevron’s Green.
Cost control is key in a competitive industry in which Australia and Qatar vie for position as the world’s biggest producers and in which major new output is seen coming online in places such as the United States, Canada, East Africa and Southeast Asia.
After years of sky-high LNG prices prior to 2014, when Asian spot cargoes sold for $20 per million British thermal units (mmBtu), prices are languishing at half of that.
And the fate of the biggest undeveloped gas resource off Western Australia, the Browse project, where Woodside is operator, will likely remain in limbo until a common infrastructure is built.
But both Coleman and Green expect each other’s companies to come around eventually.
“I absolutely am confident we’ll work things out,” Green said, noting that Chevron and Woodside have long been partners in energy projects.
And the possibility of Chevron or Woodside buying out additional stakes in the region’s gas fields and LNG projects could help align interests better to speed up a resolution.
“M&A can play a key role in helping to create alignment across the joint ventures,” said Wood Mackenzie’s Kavonic. |
For external use only. When using this product: do not spray directly onto face. Keep out of eyes. Rinse with water to remove. Use only as directed. Do not puncture or incinerate. Contents under pressure. Do not store at temperature above 120°F. Stop use and ask doctor if rash or irritation develops and lasts. Keep out of reach of children. If swallowed get medical help or contact a Poison Control Center right away. Flammable. Do not spray near heat, flame, or while smoking. Avoid long term storage above 40°C (104°F). Sun Alert: Limiting sun exposure, wearing protective clothing and using sunscreens may reduce the risks of skin aging, skin cancer and other harmful effects of the sun. May stain some fabrics. Sun protection measures: Spending time in the sun increases your risk of skin cancer and early skin aging. To decrease this risk, regularly use a sunscreen with a Broad Spectrum SPF value of 15 or higher and other sun protection measures including: limit time in the sun, especially from 10 a.m. -2 p.m. and wear long-sleeved shirts, pants, hats and sunglasses. Children under 6 months: Ask a doctor. For use on skin only. |
In the leadup to the Detroit Lions preseason, we are breaking down the current and future statuses of the roster by position. Today we continue with the Lions’ cornerbacks.
Previously: Quarterbacks, wide receivers, running backs, offensive tackles, offensive guards, centers, defensive ends, defensive tackles, linebackers
(The final year of each player’s contract is listed in parentheses.)
Starters: Darius Slay (2020), Nevin Lawson (2017), DJ Hayden (2017)
Backups: Teez Tabor (2020)
On the bubble: Jamal Agnew (2020), Johnson Bademosi (2017), Adairius Barnes (2017), Quandre Diggs (2018)
Long shot: Josh Thornton (2019)
Overview
Darius Slay will be the team’s No. 1 cornerback. Nevin Lawson will almost certainly start as the team’s No. 2. Teez Tabor will make the final roster. As far as guarantees among the Lions cornerbacks, those are the only three you can really make.
The other six cornerbacks on the roster are all still fighting for their jobs.
DJ Hayden entered camp as the presumed starting nickel corner, but only because of the hefty contract the Lions gave him. Of his one-year, $3.75 million contract, $2.25 million is guaranteed. He has the second-highest cap hit among all Lions cornerbacks, so it would seem like his job is safe.
However, not only has Hayden yet to prove his worth as a nickel cornerback in the NFL, but Detroit already has a player who has. Quandre Diggs took a step back in 2016, but he had an impressive rookie season the year prior. Diggs is an extremely cheap option that already has a clear knowledge of the Lions defense.
For the rest of the cornerback depth chart, it’s all about what they can offer outside of the defense. Johnson Bademosi has been a special teams ace, especially as a gunner. Rookie Jamal Agnew has already impressed in the first week of training camp and adds value as a kick/punt return option.
Adairius Barnes and Josh Thornton probably face the biggest uphill climb to the final roster. Barnes surprised many by making the team last year, but with more competition and no major signs of improvement, it’s hard to see how he beats the odds again.
Need going forward?
Even though four of the Lions’ nine cornerbacks have contracts that will expire at the end of the season, Detroit finds themselves in a pretty good spot. Even if Diggs and Hayden don’t work out in the slot this year, they can move on with Agnew next year. If Detroit decides Nevin Lawson should no longer be their starter, there’s Teez Tabor waiting in the wings.
Detroit will have to face some tough decisions on the roster both this year and next, but it looks like the future of the position is both bright and stable. |
Q:
Data Adapter in Ado.net
An attempt to attach an auto-named database for file C:\Users\vinod\Documents\Visual Studio 2013\WebSites\App_Data\aspnetdb.mdf failed. A database with the same name exists, or specified file cannot be opened, or it is located on UNC share.
Description: An unhandled exception occurred during the execution of the current web request. Please review the stack trace for more information about the error and where it originated in the code.
A:
from the exception message I guess that you are using LocalDb ... so you could just start Microsoft management studio and enter "(localdb)\v11.0" as server name ... then expand the "databases" node and remove everything that sounds like "aspnetdb.mdf" ...
|
SALT LAKE CITY -- A new video is making the rounds on the internet, purportedly showing a Utah teenager vaping an essential oil.
“Vaping is a very different thing than just having a diffuser in a room,” said Dr. Michael Moss, the Medical Director for the Utah Poison Control Center.
Dr. Moss says at this point, there is not enough research to know if vaping essential oils is helpful or harmful.
“Who knows what we are going to see because it’s untested and unproven,” said Dr. Moss.
Utah is home to two of the world’s biggest essential oil companies, doTERRA and Young Living.
In 2015, doTERRA claims to have topped a billion dollars in annual sales. In response to Fox 13’s questions about vaping its products DoTERRA sent the following statement:
“doTERRA is a health and wellness company focused on the life-enhancing benefits of essential oils and does not promote or provide products for the purpose of vaping. At this time, we have not researched how using an essential oil could affect e-cigarettes or those who choose to use them to vape. doTERRA always recommends using essential oils as directed on each label."
“We just don’t know what’s going to happen when you have a big dose of that and inhale it into your lungs,” said Dr. Moss.
If you have concerns after vaping an essential oil or any other product, you can call the Utah Poison Help line at 1-800-222-1222. It is free and the phone lines are staffed 24 hours a day. |
How China Will Change Your Business
China's miracle economy can come at you in a lot of ways, from all directions.
Mention an interest in China to your old friend who owns an industrial toolmaking shop and he confides that his factory, which was started by his father and has bought a comfortable suburban life for three generations of his family as well as good wages to hundreds of workers, "is getting killed by the people over there."
Stop at the auto supply store for windshield-wiper fluid. Half the store is now a showroom for small Chinese motor scooters, some of which look like half-Harleys, others like Ducatis. Most cost less than $300.
Decide at last to plunge into digital photography. Photo magazines all rave about a small new camera from Nikon, an engineering wonder that can shoot fast, captures dimly lit scenes, and costs half the price of similar machines a year ago. Nikon is one of Japan's marquee brands, but when you bring the camera home from the store you spot the words in small print on the product itself: "Made in China."
Wake up in Santa Barbara, Calif., one morning to a sky that looks as though it is painted a shiny white. The morning's newspaper reports that the sunlight is playing tricks on something known as the Asian Brown Cloud, a mass of dust that has drifted over the Pacific from China. The cloud contains particles of loose earth from deforested land mixed with arsenic and other industrial pollutants from the country's factories.
Powered by the world's most rapidly changing large economy, China is an ever increasing presence and influence in our lives, connected to us by the world's shipping lanes, financial markets, telecommunications, and above all, by the globalization of appetites. China sews more clothes and stitches more shoes and assembles more toys than any other nation. It has become the world's largest maker of consumer electronics, pumping out more TVs, DVD players, and cell phones than any other country. And more recently, it has ascended the economic development ladder higher still, moving quickly and expertly into biotech and computer manufacturing. It is building cars (there are more than 120 automakers in China), making parts for Boeing 757s, and exploring space with its own domestically built rockets.
Americans tend to focus on the huge inequality in trade between the two countries. It is a worry Americans help to create by buying ever more from China's humming factories. In 2004, the Chinese sold the United States $160 billion more in goods than they bought. Contrary to common wisdom, however, the trade deficit with China does not mean that Americans are spending down the national wealth at a faster pace than ever before. So far, most of China's gains with American buyers have come at the expense of the other countries that once lured American dollars, especially other Asian economies. Americans -- and the world -- get more stuff in the bargain.
Ever since China started on the capitalist road, opinions about its prospects have figuratively, and literally, been all over the map. The present mood is a combustible mix of euphoria, fear, admiration, and cynicism. On those emotions ride great tides of capital, the strategic plans of businesses great and small, and the gravest political calculations in the world's capitals and city halls.
Yet few working Americans have a full awareness of China's rise. How could they? Nothing like this has ever happened before, and it's occurring on the other side of the globe. Yet Americans -- particularly anyone involved in running a business -- need to know what is happening today in China and to understand how China's fate has become inextricably bound with our own. Conceding China's rise does not mean conceding to China. But it does require acknowledging some important truths:
1. China's economy is much larger than the official numbers show. In 2003, China's official GDP was $1.4 trillion. By that measure, it was the seventh-largest economy in the world. As with nearly all economic statistics from China, however, that measure is suspect. One reason the real number may be much higher is that, in competition for development funds, local Chinese authorities have considerable incentive to underreport their growth rates to the nation's central planners. Another reason is that the government measures only China's legal economy. Its underground economy, made up of both unsavory businesses and more mundane ones that lack a government stamp (and tax bill), is enormous but uncountable.
Economists also note that China's official GDP underplays the true size of its economy because China uses the massive power of its foreign currency reserves to keep the world price of the yuan marching in lockstep with the dollar. If the dollar had not dropped against the euro and other world currencies over the past few years, China's ranking would be a notch or two higher. Critics of China's currency policies, including American domestic manufacturers such as steel mills, casters, plastics molders, and machine-tool makers, argue that China artificially depresses the value of its currency against the dollar by as much as 40%.
A dollar spent in China buys almost five times more goods and services than a dollar spent in a typical American city like Indianapolis. Taking purchasing-power parity into account, the U.S. Central Intelligence Agency estimates that China's economy looks more like one with a GDP of $6.6 trillion. Put another way, it makes more sense to think of China's economy as closer to two-thirds the size of the U.S. economy than to one-seventh.
2. The growth of China's economy has no equal in modern history. China's economy has grown so fast that it has taken on the mythic qualities of one of Mao's showcase farms. Since China set about reforming its economy a generation ago, its GDP has expanded at an annual rate of 9.5%. Countries in the early stages of economic reform often come up fast, but not like China. The country is closing in on a 30-year run during which its economy has doubled nearly three times. Neither Japan's nor South Korea's postwar boom comes anywhere close. Nicholas Lardy, an economist at the Institute for International Economics, notes that China grew mightily even during the worldwide economic doldrums of 2001-02.
China is so committed to economic growth that the Chinese often talk as though they can will it to happen. It is a necessary optimism that pervades official Chinese communication. Orville Schell, the author of Virtual Tibet and the dean of the school of journalism at the University of California, Berkeley, draws a parallel between the unity of focus the Chinese demonstrated for anticapitalism and their focus now on capitalism. Schell argues that in both instances there is a willingness to suspend logic and see only bright tomorrows. Both lead to excess. In its capitalist present, China has been willing to overlook the dark side of modernization, seeing economic progress as the solution to all the country's challenges. Even so, every time the worst is predicted for China's economy, it seems to grow faster, create stronger industries, import more, and export more.
3. China is winning the global competition for investment capital. One reason China's economy is growing so fast is that the world keeps feeding it capital. According to Japan's Research Institute of Economy, Trade and Industry, one-third of China's industrial production was put in place by the half-trillion dollars of foreign money that has flowed into the country since 1978. In 2003, foreigners invested more in building businesses in China than they spent anywhere else in the world. The U.S. used to attract the most foreign money, but in 2003 China took a strong lead, pulling in $53 billion to the U.S.'s $40 billion.
With money comes knowledge. The catalytic role of foreigners in the country is still growing quickly; every day China receives a river of European, Asian, and American experts in manufacturing, banking, computing, advertising, and engineering. In 2003, the exports and imports by foreign companies operating in China rose by over 40%. More than half of China's trade is now controlled by foreign firms. Many of these import goods into the country that they then manufacture into exports. Foreign companies have pumped up China's trade volume enough to make it the third-largest trading country in the world, behind the U.S. and Germany and now ahead of Japan.
4. China can be a bully. China can spend, it can hire and dictate wages, it can throw old-line competitors out of work. In just a three-year period from 2000 to late 2003, for example, China's exports to the U.S. of wooden bedroom furniture climbed from $360 million to nearly $1.2 billion. During that time, the work force at America's wooden-furniture factories dropped by 35,000, or one of every three workers in the trade. China now makes 40% of all furniture sold in the U.S., and that number is sure to climb.
5. China's economy is an entrepreneurial economy. China's industrial competitors, including the U.S., often misapprehend the source of China's productive strength. They fear that another centrally governed, well-planned assault on strategic industries is being plotted in Beijing. The world has already seen how effective the Japanese, Koreans, and Taiwanese can be when they focus on sectors they mean to conquer. Even Chinese government planners like to talk as though they are aping the centrally coordinated, government-financed assaults on strategic global industries that their Asian neighbors have pulled off over the past 40 years. However, in looking at how Chinese businesses really take shape -- locally and opportunistically -- Kellee Tsai, a political scientist at Johns Hopkins University and a former analyst at Morgan Stanley, argues that nothing could be further from the truth. For a world fretting over Chinese economic competition, the entities to fear are not government planners but enterprises that spring on the scene lean and mean, planned and financed by investors who want to make money quickly.
An emblem of the Zhejiang province in China is Hong Dongyang, an entrepreneur whose story is now well-known throughout the country. Hong was once a schoolteacher. She began making socks in the 1970s on a home sewing machine. At first Hong sold them along the roads near her home. She opened a stand and christened her embryonic enterprise Zhejiang Stocking Company. Hong's sock company was predictably copied en masse by others. Today, the province is the Chinese sock capital, with more than 8,000 companies spinning out eight billion pairs a year, one-third of the world's supply. In 2001, the Chinese makers produced 1% of the socks on U.S. feet. In just two years, sock imports from China to the U.S. jumped two-hundred-fold and now make up 7% of the U.S. market. James J. Jochum, assistant secretary for export administration at the U.S. Department of Commerce, has noted that the Chinese manufacturers cut their prices by more than half in 2003 and helped drive one in four U.S. sock makers out of business.
6. The most daunting thing about China is not its ability to make cheap consumer goods. The American economy won't crater just because the Chinese can produce sofas and socks for less than we can. The Japanese, for their part, have lost the television business. The Italians are losing the fine-silk business. Consumer goods trade on the surface of the world's economy and their movement is easy for the public to watch. The far bigger shift, just now picking up steam, is occurring among the products that manufacturers and marketers trade with each other: the infinite number and variety of components that make up everything else that is made, whether it is the hundreds of parts in a washing machine or computer or the hundreds of thousands of parts in an airplane.
The next question is whether any commercial technology is beyond an imminent challenge from China.
Given how quickly China is climbing the industrial ladder, perhaps the next question is whether any commercial technology is beyond an imminent challenge from China. Gal Dymant, an American Israeli venture capitalist in Beijing, believes the answer is that few will be. One of the companies Dymant works with, a database publisher named Asia Direct, produces an annual China Hi-Tech Directory. Tracking the directory's updates year to year gives Dymant an informal measure of the shifts in Chinese industry.
The first thing one notices about the directories, he says, is how much thicker they grow every year, particularly in industries where there have been large foreign investments. In 2003, Asia Direct's volume grew considerably fatter in the sections devoted to China's domestic mobile-phone manufacturers and suppliers, broadband communications, and in companies establishing themselves in cities outside of China's eastern powerhouses. The manufacture and sale of integrated chips is also soaring, along with healthy gains in China's software and information-services markets. Then again, every section in the directory has grown, including biotechnology, semiconductors, and Internet development, areas in which Chinese firms have newly established themselves, many now in partnership with the world's leading technology-driven companies.
For his part, Dymant is putting together an investor group to build a Chinese version of one of the world's most advanced and costly medical devices, the magnetic resonance imaging (MRI) machine. "The talent is here to build anything," Dymant says. "We think we can develop MRIs for about 60% of the price they are built for in the U.S."
7. China is closing the research and development gap -- fast. The ability of American industry to stay ahead of its international competition rests on the national gifts and resources that the U.S. devotes to innovation. The research gap between the U.S. and China remains vast. In December, Washington authorized $3.7 billion to finance nanotechnology research, a sum the Chinese government cannot easily match within a scientific infrastructure that would itself take many more billions (and years) to build.
Yet when it comes to more mainstream applied industrial development and innovation, the separation among Chinese, American, and other multinational firms is beginning to narrow. Last year, China spent $60 billion on research and development. The only countries that spent more were the U.S. and Japan, which spent $282 billion and $104 billion, respectively. But again, China forces you to do the math: China's engineers and scientists usually make between one-sixth and one-tenth what Americans do, which means that the wide gaps in financing do not necessarily result in equally wide gaps in manpower or results. The U.S. spent nearly five times what China did but had less than two times as many researchers (1.3 million to 743,000). China's universities and vocational schools will produce 325,000 engineers this year -- five times as many as the U.S.
For now, the emphasis in Chinese labs is weighted overwhelmingly toward the "D' side -- meaning training for technical employees and managers. Nevertheless, foreign companies are moving quickly to integrate their China-based labs into their global research operations. Motorola alone has 19 research labs in China that develop technology for both the local and global markets. Several of the company's most innovative recent phones were developed there for the Chinese market.
8. China now sets the global benchmark for prices. Big news can be found in little places. In its November 2003 circular, a dryly written four-page publication, the Chicago Federal Reserve Bank noted complaints from American makers of automotive parts that "automakers had been asking suppliers for the 'China price' on their purchases." The bank's analysts observed that U.S. suppliers had also been asked by their big customers to move their factories to China or to find subcontractors there.
Over much of the business world, the term China price has since become interchangeable with lowest price possible. The China price is part of the new conventional wisdom that companies can move nearly any kind of work to China and find huge savings. It holds that any job transferred there will be done cheaper, and possibly better.
It is plainly understood that asking suppliers to lower prices is merely another way of telling them they ought to be prepared to meet the best price out of China, even if they are making their products in Japan or Germany. General Motors, which buys more than $80 billion worth of parts a year, now has a clause in its supply contracts that gives its supplier 30 days to meet the best price the company can find worldwide or risk immediate termination.
In fact, in the U.S. between 1998 and 2004, prices fell in nearly every product category in which China was the top exporter. "The manufactured goods that have dropped in price the most are those made by China," says W. Michael Cox, chief economist for the Federal Reserve Bank of Dallas, citing figures assembled by the bank for its 2003 annual report, published in 2004. Personal computers, the most outstanding example, fell by 28%, televisions by nearly 12%, cameras and toys by around 8%, while other electronics, clothing of all sorts, shoes, and tableware also dropped in price.
9. China's growth is making raw materials more expensive. Even as China puts pressure on U.S. manufacturers to lower prices, it's squeezing them from a different direction. Its voracious demand for raw materials has caused prices to spike. Copper prices jumped 37% last year, aluminum and zinc both rose about 25%, and oil was up 33%. In 2003, according to the calculations of Stephen Roach, chief economist at Morgan Stanley, the Chinese bought 7% of the world's oil, a quarter of all aluminum and steel, nearly a third of the world's iron ore and coal, and 40% of the world's cement. The trend is for bigger amounts yet to come.
The squeeze is leaving U.S. manufacturers with no alternative but to become more productive. Better machines, software, and advanced management techniques, for instance, now mean that U.S. companies on average produce far more per worker than they did a quarter of a century ago when manufacturing employment was high. From 1977 to 2002, productivity throughout the U.S. economy grew by half, but in manufacturing it more than doubled. Surprisingly, despite losing huge numbers of workers, U.S. manufacturers actually finished 2003 making more stuff than they did in 2001. Output was up, if only by half a percent.
10. No company has embraced China's potential more vigorously than Wal-Mart. And no company has been a bigger catalyst in pushing manufacturers to China. Estimates of how much of Wal-Mart's merchandise comes from abroad today range from 50% to 85%. Chinese factories are, by far, the most important and fastest-growing sources for the company. In 2003, Wal-Mart purchased $15 billion worth of goods from Chinese suppliers. A whopping portion of between 10% and 13% of everything China has sent to the U.S. winds up on Wal-Mart's shelves. Writing in The Washington Post, Peter Goodman and Phillip Pan reported in February 2004 that "more than 80% of the 6,000 factories in Wal-Mart's worldwide database of suppliers are in China." The company has 560 people on the ground in the country to negotiate and make purchases.
Wal-Mart is often demonized for its part in shipping U.S. manufacturing jobs overseas. It is difficult, however, to separate the role of Wal-Mart's thousands of suppliers in the migration of manufacturing out of the U.S. from the larger global trends realigning how and where the world makes things. If Wal-Mart has a unique part in the trend, it is in how expertly the company has managed that trend and, in so doing, accelerated it. China's low-cost manufacturing machine feeds Wal-Mart's critical mass by allowing companies to build assembly lines that are so huge that they achieve ever-greater economies of scale and drive prices downward all the more.
Wal-Mart's Chinese suppliers can achieve startling, market-shaking price cuts. By selling portable DVD players with seven-inch LCD screens from China for less than $160, for instance, Wal-Mart recently helped cut the price of these trendy devices in half. Even with superlow prices, Chinese factories can sell in such giant quantities that they willingly oblige. To get ready for its big Thanksgiving sale in 2002, Wal-Mart picked Sichuan Changhong Electric, one of the world's largest makers of televisions, to supply sets under the Apex Digital brand. Changhong makes 15 million TVs a year, most of them for export. Eight of 10 shipped overseas go to the U.S. In 2002, its sets at Wal-Mart sold for far less than comparable models from other makers, sometimes undercutting the competition by $100 or more. The models the company delivered for the sale helped the event net $1.4 billion.
In late December, state-owned Changhong reported nearly half a billion dollars in losses, purportedly linked to unpaid bills owed by Apex. The scandal, though mired in murky details, nevertheless highlights both the ability of China's big firms to sustain losses and keep running and their willingness to satisfy American retailers' demands for ever-lower prices.
11. There are hidden costs associated with doing business in China. Companies that engage with China must expect pressure to transfer their technology and thus create their own competition in the country. The Chinese use the carrot of their vast market to extract concessions from foreign firms that will help build China's industrial might. It is a policy worthy of grudging admiration. When viewed from the Chinese side, it has a long record of success.
Motorola virtually invented China's mobile-phone market. Its corporate archives show that the company knew that eventually the transfer of technology to China would sow formidable rivals. Nevertheless, Motorola decided its best strategy was to get into China early and to bring its best technology. The proof today is in the size and efficacy of the country's mobile communications network: Calls get through to phones in high-rises, subway cars, and distant hamlets -- connections that would stymie mobile phones in the U.S.
What no one at Motorola anticipated was how crowded the Chinese market would become. Nokia and Motorola now battle for market share in the Chinese handset business. German, Korean, and Taiwanese makers figure strongly. And all these foreign brands are now facing intense competition from indigenous Chinese phone makers. More than 40% of the Chinese domestic handset market now belongs to local companies such as Ningbo Bird, Nanjing Panda Electronics, Haier, and TCL Mobile. The domestic makers have become so strong that when Siemens found its mobile handset business in China wanting, it joined with Ningbo Bird to gain both low-cost manufacturing and a developed distribution channel. Yet Motorola can't exit the Chinese market. If it did, says Jim Gradoville, Motorola's vice president of Asia Pacific government relations, the Chinese companies that emerged would be the leanest and most aggressive in the world, and a company like his would have no idea what hit it. So Motorola stays. Already the largest foreign investor in China's electronics industry, Motorola plans to triple its stake there to more than $10 billion by 2006.
12. Piracy is a problem. Foreign companies have little defense against even outright theft of their technology in China. China's failure to police intellectual property, in effect, creates a massive global subsidy worth hundreds of billions of dollars to its businesses and people. By investing in the country's manufacturing infrastructure, by providing the expertise, machines, and software China needs to produce world-class products, the world is also helping assemble the biggest, most sophisticated, and most successful "illegal" manufacturing complex in the world.
Seen another way, China's loose intellectual property rules turn the tables on the Western colonial powers and the Japanese who throughout the nineteenth and early twentieth centuries violated China's land and people. As China grows into a great power, the wealth transferred into the country by expropriating intellectual property will propel it forward.
13. China's heavy buying of U.S. debt has lowered the cost of money in the U.S. In the first half of 2004, China's total foreign exchange reserves topped $460 billion. In size, that puts China's cumulative dollar account at roughly equal to a third of its gross domestic product. If China simply spent its dollars, it would flood the world market with American currency and drive the dollar down. But China, no fool, is not interested in pushing the dollar down. So instead of selling its dollars, it lends them back to the U.S.
China keeps tight wraps on the value, composition, and trading of its portfolio, but Wall Street commonly assumes that the country owns a large amount of high-grade U.S. corporate bonds, intertwining its national fortunes with America's blue chips (many of them the same corporations reaping fortunes in China itself).
China also has almost certainly built a large stake in the market for bonds issued by Fannie Mae and Freddie Mac, the companies that buy home mortgages from banks and thrift institutions and resell them as bundled securities. This means that billions of dollars' worth of investments belonging to the Chinese are plowed indirectly into the American real estate market, and that an ever-increasing share of Americans' mortgage payments pour into the coffers of the government of China.
As long as China is an aggressive lender, Americans -- whether borrowing for their own private purchases or acting in the roles of taxpayers -- can borrow money at lower rates than they would otherwise have to pay. Much of the recent boom in real estate prices in America, especially in the East and West Coast markets, is attributable to these low rates.
14. Americans and Chinese have become reliant on each other's most controversial habits. The Chinese need a low-priced currency to keep their export machine going and create jobs. But maintaining the yuan's low price also means that Chinese consumers are stuck with a currency that would otherwise buy more for them on the world market. China's diligent savers suffer too since their bank deposits are tied up in accounts that earn low government-mandated rates of return, as the government, in effect, siphons off money from savers to maintain its currency peg.
The people of China are indirectly subsidizing the insatiable shopping of Americans.
Relatedly, China's vast export earnings earn less than they ought to when they are invested in U.S. debt securities that offer modest yields, when investments in the Chinese economy can return 10 times as much (albeit on riskier terms). Seen from that view, the people of China, who earn on average just one-fortieth what Americans do, are indirectly subsidizing the insatiable shopping of Americans, who acquire ever more goods at the same time that Chinese consumers are hampered from buying goods from abroad.
The obverse of this peculiar relationship is that China lends America all the money it needs to spend itself silly. The cycle of codependency, which former U.S Treasury Secretary Lawrence Summers labels a "balance of financial terror," isn't sustainable. The U.S. cannot take on ever-bigger debt and amass huge trade deficits indefinitely. In the worst scenario, the U.S.'s willingness to fritter away its national wealth to finance private consumption and unproductive government spending would extract a permanent price on the economy, sending the U.S. in a downward spiral that would be hard to escape.
Thus do the routes to prosperity chosen by China and the U.S. put both countries at risk. Without the U.S. to buy Chinese goods, China cannot sustain its growth; without China to lend money to the U.S., Americans cannot spend. Without the twin engines of the U.S. and China stoking the fortunes of other nations, the rest of the world might also sputter.
How can the U.S., perhaps with its traditional allies, adjust to a competitive challenger that has strengths unlike any other that America has faced? Are the transfers of talent, technology, and capital part of an inevitable dynamic? Or does the U.S., or any other country, have the power to shape a future in which everyone prospers?
Americans looking for answers and action must also find a way to move America's leadership to see China's rise as every bit as worthy of national attention as the rumblings in more obvious political hot spots. While all eyes turn to the so-called clash of civilizations between Islam and the West, China will have the more profound impact on the world in the long run. And yet, despite occasional misgivings offered in factory towns and tariffs slapped on imports at the height of campaign season, American leaders tend to view China's rise as the fulfillment of a free marketer's dream, where global investors will shepherd the country into wealth, democracy, and peaceful interdependence with the rest of the free world.
It is a lovely theory, and it may ultimately be true. There is, however, no evidence upon which to base such a prediction. Which exactly of the world's large, highly nationalistic, dictatorial, Communist-capitalist countries offers a historical analogue? Answer: There is no such country.
This article was adapted from Ted C. Fishman's book, CHINA, INC., published by Scribner, an imprint of Simon & Schuster. |
Relationship between goblet cell density and tear function tests.
The objective of this study was to find a relationship between goblet cell density (GCD) and other diagnostic tests of dry eye in a group of normal healthy Chinese subjects. The capability of using GCD as a tear function test was assessed. A total of 42 optometry students with no contact lens wear history were recruited. Subjects were required to fill in a dry eye questionnaire. The non-invasive tear break-up time (NITBUT) of each subject was measured, followed by phenol red thread test (PRTT) and tear break-up time (TBUT) tests. Conjunctival epithelial cells from the inferior nasal bulbar conjunctiva were harvested by the impression cytology technique. The specimens collected were labelled and stained with PAS (Periodic Acid Schiff)-haematoxylin. The goblet cells and the conjunctival epithelial cells were counted under a light microscope of 100x magnification. Spearman's rho (rho) correlation test was used to analyse the relationship between GCD and the other tear function tests. With a probability level of 0.0051 (corrected for a cumulative familywise error rate of p = 0.05), GCD was found to have no correlation with NITBUT (rho = -0.193, p = 0.222), McMonnies Dry Eye Scores (MCDES) (rho = -0.052, p = 0.742), PRTT (rho = - 0.188, p = 0.234) and TBUT (rho = 0.246, p = 0.117). There was no correlation between GCD and MCDES, NITBUT, PRTT and TBUT. The GCD alone is not a useful diagnostic test for tear film instability in normal eyes although it is a good indicator in the diagnosis of ocular surface diseases. |
Q:
Failed to load resource: net::ERR_INSECURE_RESPONSE
IS there a way to trick the server so I don't get this error:
Content was blocked because it was not signed by a valid security certificate.
I'm pulling an iframe of an html website into another website but I keep getting the console (chrome) error in the title of this question and in internet explorer it says:
Content was blocked because it was not signed by a valid security certificate.
A:
Your resource probably use a self-signed SSL certificate over HTTPS protocol.
Chromium, so Google Chrome block by default this kind of resource considered unsecure.
You can bypass this this way :
Assuming your frame's URL is https://www.domain.com, open a new tab in chrome and go to https://www.domain.com.
Chrome will ask you to accept the SSL certificate. Accept it.
Then, if you reload your page with your frame, you could see that now it works
The problem as you can guess, is that each visitor of your website has to do this task to access your frame.
You can notice that chrome will block your URL for each navigation session, while chrome can memorise for ever that you trust this domain.
If your frame can be accessed by HTTP rather than HTTPS, I suggest you to use it, so this problem will be solved.
A:
Sometimes Google Chrome throws this error, even if it should not.
I experienced it when Chrome had a new version, and it needed to be restarted.
After restarting the same page worked without any errors.
The error in the console was:
net::ERR_INSECURE_RESPONSE
A:
I still experienced the problem described above on an Asus T100 Windows 10 test device for both (up to date) Edge and Chrome browser.
Solution was in the date/time settings of the device; somehow the date was not set correctly (date in the past). Restoring this by setting the correct date (and restarting the browsers) solved the issue for me. I hope I save someone a headache debugging this problem.
|
This Is How Donald Trump Actually Got Rich
President Donald J. Trump, the controversial real estate mogul who was elected as the 45th president of the United States, has boasted widely about having a net worth of more than $10 billion. Forbes lists President Trump's 2018 net worth at $3.1 billion. That makes him the 259th-richest person in the country. While Trump dropped eleven spots on Forbes' ranking as compared to the previous year and slid 138 spots since he announced his presidential bid in 2015, he is nevertheless one of the wealthiest U.S. presidents.
The Trump Family Fortune
Trump's father, Frederick Christ "Fred" Trump, made a sizable fortune by building and selling housing for American soldiers and their families in World War II. It was at his father's real estate company that Trump got his start in business. In 1971, he took control of his father's apartment rental company, Elizabeth Trump & Son Co., and later on, he renamed it The Trump Organization. Trump stuck mostly with real estate investments during this period, particularly condo associations, huge apartment buildings and Federal Housing Administration (FHA)-backed housing, all in the New York metropolitan area.
Trump hit a milestone in 1980 when he teamed up with the Holiday Inn, Corp., (then parent company of Harrah's casino resorts) to develop a $250 million hotel and casino complex in Atlantic City, named Harrah's at Trump Plaza.
Eventually, Trump would buy out his partners and rename the property Trump Plaza Hotel and Casino. Following the successful launch of Trump Plaza, Trump purchased a second property in Atlantic City from Hilton Hotels for a sum of $320 million. After the hotel chain had failed to obtain a gaming license, in classic Trump fashion he renamed this latest purchase Trump Castle.
Trump's Setbacks
Back in New York, Trump purchased the Plaza Hotel in 1988 for over $400 million and spent an additional $50 million renovating and redecorating under his wife, Ivana Trump’s, direction. While it seemed nothing could stop Trump’s meteoric rise in the 1980s, even the most ambitious real estate tycoons are at the mercy of city bylaws. When Trump purchased an apartment building and an adjacent hotel in Manhattan, Trump’s plans for a large condominium tower on the site were curtailed by the city’s rent control programs. In 1985, when Trump unveiled his plans for an $88 million complex on the West Side of Manhattan, dubbed 'Television City,' community opposition, and a lengthy approval process ended Trump’s vision for the project.
However, these two failures pale in comparison to the setbacks that would soon befall the Trump organization. In 1990, when the booming real estate market of the 1980s began to decline, many of Trump’s highly leveraged investments began to weigh heavily on the company’s balance sheets.
Trump Faces Bankruptcy
Ultimately, in the early 1990s, Trump’s winning streak ground to a halt. The national economy started to slow down, and New York's economy stalled, causing Trump’s income streams to dwindle. Soon, he found it difficult to make the interest payments on the debt he'd accrued to finance his different businesses. Trump's annual loan payments were $300 million. The Trump Organization and its subsidiaries owed $9 billion and Trump's personal debt totaled $975 million.
To avoid having to file for bankruptcy, Trump met with four of his major lenders: Citibank (C), Bankers Trust, Chase Manhattan Bank and Manufacturers Hanover Trust Co. (now owned by JPMorgan Chase Bank, National Association). The banks were concerned that if they foreclosed on his properties they, too, would lose tremendous amounts of money. In the end, Trump convinced the banks to loan him an additional $65 million, which he'd use to keep his businesses afloat. The banks also agreed to defer, for five years, the interest and principal payments on Trump's outstanding loans. Some of Trump's debts were paid down with funds from the sale of his assets, which included an airline company (Trump Shuttle) and a yacht (which was sold to Saudi billionaire Prince Al-Waleed bin Talal). Trump also sold his controlling stake in the Plaza Hotel and turned his Florida beach house, Mar-a-Largo, into a resort.
The Trump Organization famously revealed it was $5 billion in the hole in 1990, with as much as $1 billion guaranteed by Donald Trump personally. The business survived thanks to a combination bailout/deferment by more than 70 banks. Many point to the 1988 purchase of the Taj Mahal Casino as a major catalyst for the Trump debt cycle. There is some truth in this, particularly after Trump unsuccessfully tried to finance the construction of its sister casinos in 1989 through mostly junk bonds.
The bailout package allowed him to take out second and third mortgages on most of his properties. Leverage became a common theme for Trump, who notoriously dealt with bankruptcy four times. Trump used the extra rope from his lenders to shore up debt, build up his rents and purchase other enterprises, including more casinos.
The early 1990s were tumultuous for the Trump Organization and Donald's business prospects. In 1991 and 1992, two of Trump’s Atlantic City casinos (the Trump Taj Mahal and the Trump Plaza Hotel) filed for Chapter 11 bankruptcy, which allowed them to restructure their debt. As a result of the onerous debt, in 1991, Trump was forced to cede 50% of ownership in the Taj Mahal to his bondholders in exchange for lower interest payments and extra deferments. Shortly after, Trump combined his three Atlantic City casinos, forming a single company, called Trump Entertainment Resorts.
1995 and the Trump Turnaround
Fortunes began to change in 1995. That year, Trump established Trump Hotels and Casino Resorts, Inc. and took the company public, eventually selling 13.25 million shares at $32.50 a share in 1996 for a tidy capital gain of $290 million over his original ownership stake.
Also, in the mid-1990s one of Trump's initial investments, the Grand Hyatt building that opened in 1980, became wildly successful. Trump quickly sold his stake back to Hyatt for a reported $140 million.
Later in 1995, Trump purchased the old Bank of Manhattan Trust building located at 40 Wall Street. This building would go on to become one of his most famous properties. Trump claims he bought the building for just $1 million, though this is likely an exaggeration. The building was available at a discount however after another deal with former Filipino President Ferdinand Marcos fell through, and the owners of the building became desperate. The net value of this building, best-known as the Trump Building, is now worth $530 million according to Forbes.
Trump’s Inheritance
Fred Trump died in 1999 with an estimated net wealth between $250 million and $300 million according to a New York Times article at the time of death. While the specific amount Trump inherited from his father has not been revealed, a January 2016 article from the New York Times shows that Trump's will divided $20 million after taxes among his living children including Donald. Further, in 2003, it was reported that Donald and his siblings sold a portion of their father’s real estate holdings for around half a billion dollars. In addition to this inheritance, Trump’s father helped the mogul financially throughout his lifetime by giving him loans and access to trust funds, and establishing a wealth of real estate and political connections for his son.
An October 2018 report in the New York Times alleges that Trump engaged in dubious practices that helped his parents evade taxes and enriched him in the process.
"The Apprentice" Makes Hundreds of Millions
Trump got his start on TV as a wrestling character on the World Wrestling Entertainment’s "Wrestlemania" in the 1980s and never looked back, eventually starring in a reality TV show about his business called, "The Apprentice." Trump’s name recognition skyrocketed after "The Apprentice" aired in 2004. In each season, more than a dozen contestants vied for a six-figure paying managerial position at one of Trump's many companies. A press statement issued by the Trump presidential campaign states that during the ten-year history of ‘The Apprentice’ and its spin-off series ‘The Celebrity Apprentice,’ Trump made a total of $214 million. (See also: 7 "Apprentice" Hosts From Around the World.)
The Trump Brand: A Bestseller
If you want to understand Trump the billionaire you have to look past Trump the real estate investor. You have to think of Trump as a brand name, just like Coca-Cola Co. or Nike Inc.
Many of the properties that bear the Trump name aren't actually owned by the mogul. The Trump Organization has been known to partner with developers in licensing deals. In such an arrangement, a developer pays Trump a licensing fee; in exchange, they're given permission to brand their building with the Trump name and logo. Trump benefits by receiving a regular stream of royalties, while the developer can increase the rates she charges because the Trump name signifies high quality and luxury. According to Trump, his real estate licensing deals, intellectual property, brands and branded development are worth more than $3.3 billion; however, Forbes pegs this number at around $253 million.
In addition to real estate, Trump has lent his name to a diverse list of products ranging from mattresses and apparel to fragrances and furniture. These licensing deals contribute to Trump's annual income. In 2014 alone, Trump brought in $3.25 million via consumer products licensing according to Forbes. Trump has found another way to monetize his outspoken nature—by charging speaking fees for conferences and other functions. Between May 2014 to March 2015, he spoke at several engagements and charged as much as $450,000 for each presentation. Overall speaking engagements contributed $1.75 million to Trump's income during that period alone.
'The Art of the Deal' and Trump's Books
While Trump gained prominence and notoriety in the 80s through his business deals and colorful television appearances, he skyrocketed to a new level of fame when he released his first book. The Art of the Deal was released in November 1987. It spent 51 weeks on the bestseller list and has sold around one million copies thus far according to most reports.
Now, The Art of the Deal is making headlines again in 2016, following a controversial interview in The New Yorker with the book’s co-author Tony Schwartz. Schwartz claims he wrote “every word,” of the popular book. “Donald Trump made a few red marks when I handed him the manuscript, but that was it,” he said in an interview with ABC’s "Good Morning America.'"
Schwartz, who observed Trump almost daily for 18 months when penning The Art of the Deal describes Trump as a dangerous sociopath whose successes were mythicized in The Art of the Deal. Schwartz says he now regrets writing the book:“I feel a deep sense of remorse that I contributed to presenting Trump in a way that brought him wider attention and made him more appealing than he is,” Schwartz told The New Yorker. In response to Schwartz’s ‘Good Morning America’ interview and New Yorker article, Trump’s camp has issued Schwartz a cease-and-desist letter and has asked Schwartz to send a check to Trump for the royalties generated from The Art of the Deal, plus his advance.
The president's disclosure revealed that The Art of the Deal generated royalties of $50,000 to $100,000 in 2015. A disclosure also reported income between $1 million and $5 million for his November 2015 book, Crippled America: How to Make America Great Again. Trump's 2015 personal financial disclosure revealed that the billionaire received book royalties amounting anywhere from $85,000 to $215,000 in 2014.
Trump’s Real Estate Fortune Today
Though the Trump empire spans many industries, real estate development and acquisitions have always been its core business. Trump's real estate income is derived from many different types of property. The Trump Organization, for example, owns hundreds of residential units and office spaces that create regular rental income. According to Forbes, The Trump Hotel Collection and real estate licensing brought in $128 million in 2014.
The Bottom Line
Donald J. Trump has launched an empire, based largely on his name. Taking on large loans, Trump constructed many luxury hotels, apartments, and casinos, which have become iconic monuments to the excess and exuberance of the 1980s. However, Trump’s businesses have faced four bankruptcies throughout the years. The most recent one was in 2009 when Trump Entertainment Resorts was ravaged by the 2008 recession. Though he has faced near financial ruin and multiple business bankruptcies, Trump's branded products and real estate licenses remain popular and have helped to land him on the Forbes 400 for several decades.
Compare Popular Online Brokers
Provider
Name
Description
×
The offers that appear in this table are from partnerships from which Investopedia receives compensation. |
Q:
Vim Configuration for expl3
I've started with programming in expl3 and vim doesn't realise that underscores are now part of LaTeX identifiers.
I'd be much obliged if somebody could explain how to best configure vim so it has the "usual" word boundaries, including underscores, and also does syntax highlighting of words properly.
I know it should be possible to find this information in the vim documentation, but I prefer a quick-and-dirty solution.
A:
Quick and dirty solution
:syn match texStatement "\\[a-zA-Z_:]\+"
or add @
:syn match texStatement "\\[a-zA-Z_:@]\+"
It isn't enough, but looks much better.
But better
Modify $VIM/syntax/tex.vim, search b:tex_stylish, and modify all expressions about it.
|
Q:
two datetime picker same value disable
I have two datetime picker as follows
$("#from_date").datetimepicker({
format: 'MM/DD/YYYY'
});
$("#to_date").datetimepicker({
format: 'MM/DD/YYYY',
maxDate: new Date()
});
As you see its "from date" and "two date".
I want a condition that the "from date" and "to date" should not be same also the "to date" should not be less than "from date".
It should not allow me to select "to date" as same as selected "from date" or lower than "from date".
Kindly guide me in achieving this please.
A:
it likes :
$("#from_date").datetimepicker({
format: 'MM/DD/YYYY',
maxDate: new Date()
});
$("#to_date").datetimepicker({
format: 'MM/DD/YYYY',
maxDate: new Date()
});
and :
$("#from_date").on("dp.change", function (e) {
$('#to_date').data("DateTimePicker").minDate(e.date);
});
$("#to_date").on("dp.change", function (e) {
var max_date = e.date ? e.date : new Date();
$('#from_date').data("DateTimePicker").maxDate(e.date);
});
|
THE Kangaroos sucked up a devastating loss against Fremantle and quickly got back to work.
ELIZA SEWELL spent a week inside North Melbourne’s inner sanctum, with Brad Scott and the Roos players giving her an all-access pass as they prepared to take on Port Adelaide.
BACKED IN: NORTH CHAIRMAN SAYS SCOTT GOING NOWHERE
MYSTERY LINK: BRAD SCOTT WON’T BE COACHING BRISBANE
media_camera Todd Goldstein reacts after missing a goal against Fremantle with just seconds to go on Sunday.
LLOYD: I WAS WRONG ON HODGE
SUPERCOACH FORM: WHO SHOULD BE YOUR CAPTAIN?
■SUNDAY, 4.07PM, ETIHAD STADIUM
Brad Scott walks into a dead quiet meeting room at the back of the Kangaroos’ dressing rooms.
Twenty-two players sit on the terraced steps in front of him
“What did I say to you Goldy?” Scott begins
“I created the opportunity,” Goldstein responds.
It’s a positive start to what you think might have been an explosive meeting. After all, the pain of a four-point loss is still raw, especially for Goldstein who has missed an easy set shot in the final seconds.
Scott’s message is mistakes happen. What he can’t fathom is how for the whole opening term his players seemed to forget the systems they have been training.
You can sense it in his voice. He’s calm but when he talks about the simple things like where players should set up, you can tell he’s exasperated. How many times does he have to go over it?
media_camera It was another devastating loss for North Melbourne, again, by less than a kick against Fremantle.
“It shouldn’t take at half time for a bit of wall punching and a spray,” Scott says.
But that’s now the past and the future is already racing towards North Melbourne.
“I want everyone absolutely engaged (this week),’’ Scott stresses, syllables strung out.
“Stick together. This season is all about next week. Learn from it, grow from it, get better.
“Shinboners united. Shinboners united. Go to work this week, make sure we nail every set-up.”
It’s solemn in the rooms. Ben Brown says he is thinking about what he could have changed in the last couple of minutes.
“There was one where I ran into Taz when he was about to mark it, you just think about those small things,” the forward says.
Brown is in the red on the weight-loss sheet. He checks in pre-match at 101.3kg and ends the game at 98kg. He will have to drink five litres of fluid in 6.2 hours to rehydrate.
Now they circle the main dressing room, followed by leg and side raises to lengthen the muscles.
The ice baths await. Set at between 10 and 12 degrees, this 10-minute process is about pressure.
“Pressure stops bleeding, flushes the waste,” conditioning boss Jona Segal says.
There are gourmet pizzas and BBQ ribs. Brown’s coeliac so he skips the pizza and eats a few gluten free protein bars.
Once the players leave the rooms they’re done for the day.
Tomorrow there are three recovery groups — “triage” at the club where injured blokes or those who wake sore present as well as a session at the beach and another at a pool. With the six-day break the key is to get everyone moving again.
media_camera Jack Ziebell does his individual player review with assistant coach Jarred Moore as Ryan Clarke looks on Pic: Michael Klein
■TUESDAY, 8.30AM ARDEN ST
Jack Ziebell takes his place at stoppage coach Jarred Moore’s computer. It’s edits time.
First up, a missed tackle. “That’s a good start,” Ziebell says.
“You remember this one?” Moore says.
It’s a boundary throw in at half forward with nine minutes to go in the second term. In a halved ruck contest, the ball falls over the back into no man’s land. An unmarked Nat Fyfe gets to the drop a millisecond before Trent Dumont. Fyfe spins powerfully out of the Dumont tackle and releases Tommy Sheridan who kicks long into the outstretched hands of Darcy Tucker screaming towards the Fremantle goal.
“What are you thinking?” Moore asks “Just, (Brad) Hill?”
“I questioned after this, we needed a cover and I wasn’t sure if that was coming from a mid or a forward at this point in time,” Ziebell says.
“It was never going to be a forward,” Moore explains.
“I was thinking should I have been where I was or should I have been cover? I look back at that and err on the side of caution and say go and stand back shoulder, and not let him have that and Frog (Dumont) can stay where he is.
“There wasn’t that communication. I didn’t know Frog was target. It was just an inside/outside balance thing with Hill on the outside. But we can’t leave Fyfe that side of a stoppage. If I had my time over again, I’d go and stand on his back shoulder and just stay cover and come forward at Hilly if it gets out there.”
media_camera Herald Sun reporter Eliza Sewell listens in on Jack Ziebell’s individual player review.
Scott’s frustration at his team getting the simple things wrong is shared by Ziebell.
“You lose a game by four points on the weekend and we cough up three or four goals from our mistakes because we didn’t stand in the right position or set up in the right spot,” Ziebell says.
“What have we lost four or five games this year by under a goal? People who don’t think little things matter in footy, they matter massively.
“We go through structure meetings all the time and blokes roll their eyes saying ‘I know this, I know it’. But obviously you don’t because you don’t get it right on the weekend still.”
With four camera angles “we don’t miss anything,” Moore says after the review.
It takes six hours the day after the game for Moore to cut his players’ edits. He says the key to giving feedback is knowing your players.
“Some you have to cuddle a bit,” Moore says.
“Luke McDonald’s one you can whack. He’s got a thick skin.”
media_camera Brad Scott chairs the team meeting after the loss to Freo. Picture: Michael Klein
10AM TEAM MEETING
The players are waiting outside for the cue to enter the theatrette. Once the door’s shut, it’s shut, so no one’s late.
They sit in the same seat every week, Ziebell between Sam Gibson and Lachie Hansen.
“Mine hasn’t changed in eight years,” Ziebell explains.
He’s not sure why. It’s just the way it is.
There’s a magnet for each player as they enter the room. If you think you’ve played in the spirit of a Shinboner, you place your magnet on the board.
Performance analyst manager Jason Lappin takes charge and highlights play on the big screen.
Scott takes over as vision is shown of Ziebell hugging and offering encouragement to a devastated Goldstein straight after the siren.
“It’s a great example of leadership. ‘We’re all hurting but I can think about how someone else is feeling’,” Scott says.
A Shinboner is declared after every match. This round it’s McDonald. They show his courageous mark where he goes back with the flight of the ball. They show him breaking tackles on the other side of the ground.
Scott rolls the first clip. It’s the stoppage Ziebell has seen earlier that results in the Tucker goal.
“In a tight game, how do we allow this to happen?” Scott asks.
Nathan Hrovat speaks to the vision.
“I’m rounding up Sheridan here, I’m just not close enough to impact when Fyfe gets the handball away,” Hrovat says.
“He’s your responsibility and we’ve got to cover the corridor every single time,” forward coach Leigh Tudor says.
Dumont acknowledges his missed tackle. Scott Thompson says he’s playing too skinny in defence. Ziebell chimes in. He should have been on Fyfe’s shoulder.
“This is such a cheap easy goal when we’ve worked so hard to set everything up … because we can’t execute what we want because we can’t get our structure right,” Scott says.
There are plays where the structures are perfect and work and Scott highlights these.
media_camera Stats don’t lie in the Monday review meeting. Picture: Michael Klein
Tackling is a hot topic after the first quarter on Sunday. The Kangaroos had 40 missed tackles and “15 stepped, tried to tackle”. A ratio of time in possession to tackles clearly shows the players when they tackle more, they have the ball more.
“What are we trying to do when we come forward to tackle, what’s the terminology?” Scott asks and a chorus responds.
Scott boils down the message.
“Cut them in half. We do not coach ‘come forward, and maybe if they try to handball intercept it’.
“Come forward, inside shoulder, split that bloke in half.”
Scott leads the chat but transition coach Josh Drummond, Moore and Tudor all jump in from the stalls. Players do too. No blame is laid.
11AM TRAINING
It’s more recovery than training. It’s clear why clubs talk about the challenges of six-day breaks all the time. There’s a stack to cram in before the team flies to Adelaide on Friday. Light running is followed by skills.
The players are chatty and upbeat. There’s no time to dwell on Sunday’s loss and with a bumper list of requirements, the routine structure of the player’s day means they have to move on.
Nearing the end of the session the players line up for goalkicking practice in what appears to be the spot Todd Goldstein had missed from in the dying seconds on Sunday. It is. You can’t get away with anything at a footy club.
media_camera Todd Goldstein takes shots in front of a rowdy group of teammates from the spot he missed to give North the win against Fremantle — He missed three in a row. Picture: Michael Klein
“I’ve known for two days I was having that shot,” Goldstein says.
“That’s footy clubs. If it happened longer than five minutes ago, you can joke about it.”
Goldstein misses his first three attempts.
“There’s no bigger pressure than out here in front of 40 of your teammates, them all crowding around you yelling at you, they know how to put you off,” Goldstein says.
He’s the last to leave the track. He has about 20 set-shots with Tudor out there with him. It’s Goldy’s choice.
“Given the disappointment on the weekend, I wanted to make sure I got enough shots up today.
“I wanted to kick six straight from that spot and until I kicked six in a row I wasn’t going to leave.”
12.30PM LUNCH
Chef Gail Miller is ex-military and knows how to cook for a crowd.
Footy boss Cam Joyce says the players always say she must be the first re-signed every year.
She cooks up eggs and bacon for breakfast. That’s 80kg of bacon and about 1000 eggs a week. There’s baked beans and mushrooms as well as plenty of avocados (five trays a week). Lunch today is seven-hour slow cooked lamb, salmon and chicken thighs with taco seasoning plus a roast pumpkin and chickpea salad.
There’s a snack and salad bar with nuts and seeds, Gail’s muesli bars and other healthy things. In the fridge is milk and yoghurt. A couple of players make up a big glass of chocolate Quick.
media_camera Scott Thompson gets some eggs for breakfast from club chef Gail Miller. Pic: Michael Klein
The lamb and chicken are delicious. I’m not sure how Gail does it without using butter or oil. Someone has stolen all of the pumpkin from the salad, but “that always happens” injured defender Ed Vickers-Willis explains.
“They love bolognaise, they love taco chicken,” Gail says.
“We have chicken strips when they win … because they’ve got crumbs on them, starchy carbs — that’s only for a treat.”
2PM FOOTBALL PERFORMANCE STRATEGY
Performance analyst Olivia Mills goes first with her statistical report on what happened at the weekend and where the club sits in key statistics. There’s a VFL review, medical report, general football business and “oppo” analysis.
One player hasn’t been reaching top end speed during training. There’s a comment he appears to be loping or over striding. Speed school might be an option.
A young player lost his way on Sunday and Scott stresses the structures must be drilled into him again. Walk throughs on a map spread out on the basketball courts will be done later in the week.
Chocolate and M&Ms sustain the room, which fills and empties and fills again as the business is done.
Brayden Preuss has hurt his back in the VFL. Scott is extremely disappointed. He tells the medical team to get him right so they can bring the young ruckman into the senior side with confidence.
media_camera Senior coach Brad Scott heads up a total football department meeting after the Fremantle game. Picture: Michael Klein
It’s a relaxed atmosphere. Coaches and analysts jump in and out.
This meeting is also the first match committee. Cam Joyce puts 22 magnets on the board next to each Port Adelaide opponent. And the fun begins.
Dumont, later dropped, is in trouble after a quiet game against the Dockers. They’re not ruthless about players, just matter of fact. Some coaches feel more passionate about a certain position or player than others. They’ve all watched the same games, but have different views on who fits and where.
They’ve loving the work of Luke McDonald on the wing.
Scott listens intently. He lets his colleagues lead the conversation. He seeks the views of others, but you sense at the end of the day he’ll make the call he thinks is right.
It’s not heated or aggressive discussion. It’s the conversation supporters all around the country have across the dinner table or at the pub. We just haven’t watched hours and hours of vision.
Scott is the voice of reason when others make brash statements about players and the team.
“Let’s not talk around in circles; food for thought,” Scott says as he declares the meeting over at 6pm.
media_camera Luke McDonald kicks during a light training run. Picture: Michael Klein
■WEDNESDAY 10AM
It’s the players’ day off and Luke McDonald celebrates his Shinboner award with a cruisy breakfast at his usual stomping ground, Cafe Trutrack in Leveson St. The place is a second home to McDonald and his housemates Daw, Taylor Garner and Ben Jacobs. He even has a smoothie named after him.
Poached eggs, avocado, bacon and a hash brown and, of course, a Luke smoothie is the usual.
“We’re always there,” McDonald said.
‘Even after training, we have tea club there. A few of us drink tea — I’m a peppermint man.”
There’s no footy talk today.
“We don’t even have Foxtel at our house, there’s no footy whatsoever ” McDonald says.
“Which is pretty different for me. I only moved out of home last year and Dad (Donald) obviously works at the footy club so we spoke about footy. It’s been heaps better, not being consumed by it all.”
He visits the club for a massage and an ice bath. The afternoon is spent shooting hoops at home and playing PlayStation. He’s on uni holidays so it’s pretty chilled. They go to the Leveson pub for dinner and to watch the Origin.
■THURSDAY 9.30AM WEIGHTS AND SCREENINGS
Those body building sessions you imagine, where blokes stand around cheering as Scotty Thompson lifts a massive bench press? Not happening this week. That’s saved mostly for the pre-season or maybe younger guys who are continuing to build. In season it’s about regeneration and maintenance.
Programs are individualised with players rotating through activities including bench press, curls, chin ups. The beats are hip hop; I recognise Kanye.
Daw does very little, not that you can tell. They almost have to keep him away from the weights room.
“Majak has got a very different program, “ strength coach Scott Dickinson says.
“Maj is a fast responder. We strip all the volume right out of his program we only give him what he absolutely needs and not more. It is such an aerobic game. If you’re carrying around 4kg of extra muscle it’s still extra weight that you have to carry for that game. These guys are so finely tuned they would notice the difference between one or 2kg in terms of output in games.”
media_camera Small forwards work through the weekends game against Fremantle with assistant coach Leigh Tudor and Brent Harvey. Pic: Michael Klein
11.15AM OPPOSITION MEETING
Players and coaches are back in the theatrette as opposition analyst Julian Davis talks through the Port Adelaide list.
He mentions Dan Houston and Sam Powell-Pepper, guys the North players might not have seen much of.
They’re in good spirits.
The clips start. Scott leads the commentary.
There’s a new drill to ram home the pressure Scott wants on match day, training players to stay in a contest. He wants high intensity.
“Let’s go out and train it well and then go over to Port Adelaide on a mission to get the job done,” Scott says. |
Q:
order rows in a table if column value exists in another table
I am currently working on a "search engine" for my website but I am stuck at something.
This is my current query:
SELECT * FROM posts WHERE title like '$query%' ORDER BY `title` DESC LIMIT 10
There are over 10k rows in the table posts.
I also have another table: subscribed. Table subscribed is made of 2 columns, post_id and post_title.
When a user searches, I would like to show him 10 posts(related to user search keywords), first the posts he has subscribed(so that are in the subscribed table) and then the others. If he has subscribed to more than 10 posts, then 10 subscribed posts should display. If he has subscribed to less than 10(for example 5), then those 5 subscribed posts should display and 5 others not-subscribed related to his search keywords.
I am looking forward to your answers,
Thank you
A:
First off it's unclear why your data is denormalized by having post_title in subscribed table).
Now, assuming that the query would rely on the title column in the posts table only, you can leverage UNION ALL to achieve the desired result:
(
SELECT 1 subscribed, p.*
FROM posts p JOIN subscribed s
ON p.id = s.post_id
WHERE p.title LIKE 'keyword%'
ORDER BY title DESC
LIMIT 10
)
UNION ALL
(
SELECT 0 subscribed, p.*
FROM posts p LEFT JOIN subscribed s
ON p.id = s.post_id
WHERE s.post_id IS NULL
AND p.title LIKE 'keyword%'
ORDER BY title DESC
LIMIT 10
)
LIMIT 10
Here is a SQLFiddle demo
|
Q:
Why can I set [enumerability and] writability of unconfigurable property descriptors?
https://developer.mozilla.org/en/JavaScript/Reference/Global_Objects/Object/defineProperty states:
configurable:
True if and only if the type of this property descriptor may be changed and if the property may be deleted from the corresponding object. Defaults to false.
So, I have a
var x = Object.defineProperty({}, "a", {
value:true,
writable:true,
enumerable:true,
configurable:false
});
Now I can play with x.a = false, for(i in x) etc. But even though the descriptor is should be unconfigurable, I can do
Object.defineProperty(x, "a", {writable:true}); // others defaulting to false
Object.defineProperty(x, "a", {}); // everything to false
Object.freeze(x); // does the same to the descriptors
The other way round, setting them to true again, or trying to define an accessor descriptor, raises errors now. To be exact: Object.defineProperty: invalid modification of non-configurable property.
Why can I "downgrade" descriptors though they say they were non-configurable?
A:
First, even when configurable is false, writable can be changed from true to false. This is the only attribute change allowed when configurable is false. This transition was allowed because some built-in properties including (most notably) the length property of arrays (including Array.prototype) are specified to be writable: true, configurable: false. This is a legacy of previous ECMAScript editions. If configurable: false prevented changing writable from true to false then it would be impossible to freeze arrays.
Object.defineProperty doesn't work quite like you're assuming. In particular, how it processes the property descriptor works differently depending upon whether or not the property already exists. If a property does not exist, the descriptor is supposed to provide a definition of all attributes so any missing attributes in the descriptor are assigned default values before the descriptor is used to create the property. However, for an already existing property the descriptor is taken as a set of delta changes from the current attribute settings of the property. Attributes that are not listed in the descriptor are not changed. Also, a attribute that has the same value in the delta descriptor as the current property attribute value is also consider no change. So the following are all legal:
Object.defineProperty(x, "a", {writable:false}); // can always change writable to false.
//others attributes, not changed
Object.defineProperty(x, "a", {}); // no attributes, so nothing changes
Object.freeze(x); // same as Object.defineProperty(x, "a", {writable:false});
Object.defineProperty(x, "a", {enumerable:true, configurable: false}); //no change,
|
Recent Comments
Archives
[Reading 06] Government Over-Surveillance
Technology companies absolutely should not purposely weaken encryption or implement back doors in their products for the purposes of government surveillance! Not only would this betray the trust of the customers using the technology, but it could also open a window for foreign hackers to steal massive amounts of private data and use it against citizens. These companies have a service that is being used by people who expect for their info to remain within that service. They aren’t using a site in order for their info to be available whenever the government asks for it.
I believe that companies like Apple are ethically responsible for protecting the privacy of their users. But at the same time also ethically responsible for preventing violence or harmful activities that their platform may enable. Facebook seemed to have a good balance with their emergency requests when someone is in imminent danger of serious injury or death. They could extend this to include a legitimate terrorism concern. The balance could be facilitated by a security liaison of sorts that works with the FBI reviewing requests for legitimacy in terror concerns. This way customer privacy concerns are being met, yet the national security is still being tended to using all the tools possible.
This process would require a great deal of collaboration between major tech companies and the government. Most likely limiting the number of unlawful requests for private information from the FBI because they know they’ll have to go through a liaison that will restrict their ability or obtain the information they’re requesting. Unlike pre-technology age security, where law enforcement had to receive a warrant to search a physical location, the obtainment of electronic information has become a free for all in the FBI without the knowledge of a judge or the person with whom they are obtaining the information from. This is a vast overstepping of privacy and justice. American’s have always had the right to face their accuser, and this is in gross violation of that right.
It is very comforting knowing the FBI is actively doing its job of stopping criminals and terrorism, but I believe its cutting legal corners where they cannot be cut. We give up some of our freedom in order to be protected, but the government surveillance programs are then taking more and more of our freedoms many times without us even knowing it. It would be perfectly reasonable for a technology company to see a misuse of their platform and report it to law enforcement. The citizen has chosen to use this company to accomplish some illegal end, and can reasonably expect the company to take notice and report them. Furthermore, they should have the freedom to tell the customer that they have committed a violation of the platform and have reported it to law enforcement. This way the customer is able to face its accser. But if the company does not see any wrongdoing, and the government is requesting to just spy on this person due to some unknown or unjustifiable reason, then the company should be well within their rights to refuse. |
Q:
Functional equation $ f(x+yf(x^2))=f(x)+xf(xy) $
I have trouble solving the following functional equation: $f:\mathbb{R}\to\mathbb{R}$ such that $f(x+yf(x^2))=f(x)+xf(xy)$.
I think $f(x)=x$ is the unique solution, especially, $f(x+y)=f(x)+f(y)$. But how do we show that?
A:
You can show that the only continuous solutions to the functional equation
$$ f \Big( x + y f \big( x ^ 2 \big) \Big) = f ( x ) + x f ( x y ) \tag 0 \label 0 $$
are the constant zero function and the identity function. It's easy to see that these two are solutions. To show that they are the only ones, first let $ y = 0 $ in \eqref{0} to get $ f ( 0 ) = 0 $. Now, assuming $ f ( 1 ) \ne 1 $, you can let $ x = 1 $ and $ y = \frac 1 { 1 - f ( 1 ) } $ in \eqref{0} which leads to $ f ( 1 ) = 0 $. Thus, we must either have $ f ( 1 ) = 0 $ or $ f ( 1 ) = 1 $. In the case that $ f ( 1 ) = 0 $, you can let $ x = 1 $ in \eqref{0} and conclude that $ f $ is the constant zero function. From now on, we assume that $ f ( 1 ) = 1 $. Letting $ x = 1 $ in \eqref{0}, you get $ f ( y + 1 ) = f ( y ) + 1 $. Substituting $ y - 1 $ for $ y $ in this equation, we get $ f ( y - 1 ) = f ( y ) - 1 $. Using the last two equations, we inductively get
$$ f ( x + n ) = f ( x ) + n \tag 1 \label 1 $$
for each integer $ n $. In particular, this shows that $ f ( n ) = n $ for any integer $ n $. Thus, if for some integer $ n $ we let $ x = n $ in \eqref{0}, we'll have
$ f \big( n ^ 2 y \big) = n f ( n y ) $. Letting $ y = \frac m { n ^ 2 } $, where $ m $ and $ n $ are integers with $ n \ne 0 $, we get
$$ f \Big( \frac m n \Big) = \frac m n \text . \tag 2 \label 2 $$
Since the set of rational numbers is dense in the set of real numbers, if $ f $ is continuous, then by \eqref{2} we can show that $ f $ is the identity function.
A:
The beginning steps are the same as in the answer of @MohsenShahriari, which I repeat for sake of completeness.
Our equation is $$f(x + yf(x^2)) = f(x) + xf(xy).\tag 0$$
Setting $y = 0$ in $(0)$, we get $xf(0) = 0$. Setting again $x = 1$ gives us $f(0) = 0$.
Setting $x = 1$ in $(0)$, we get $$f(1 + yf(1)) = f(1) + f(y).\tag 1$$
If $f(1) \neq 1$, then we may set $y = \frac{1}{1 - f(1)}$ in $(1)$ and get $f(1) = 0$. Then $(1)$ implies that $f(y) = 0$ for all $y\in \Bbb R$, which is one solution to the equation.
Now assume that $f(1) = 1$. Then $(1)$ becomes $$f(1 + y) = 1 + f(y).\tag 2$$
Using induction with $(2)$ gives $$f(n + y) = n + f(y), \forall n\in \Bbb Z_{> 0}.\tag 3$$
Setting $y = y - n$ in $(3)$, we get $f(-n + y) = -n + f(y), \forall n \in \Bbb Z_{> 0}$. Combined with $(3)$, we have $$f(n + y) = n + f(y), \forall n\in \Bbb Z.\tag 4$$
Setting $y = 0$ in $(4)$, we get $f(n) = n, \forall n \in \Bbb Z$.
For integer $n \neq 0$, setting $x = n$ and $y = \frac y n$ in $(0)$ gives $n + f(ny) = n + nf(y)$, hence we get $f(ny) = nf(y)$. In particular, for every rational number $q = \frac u v$ with $u, v \in \Bbb Z$, setting $y = q$ and $n = v$ gives $f(q) = q$.
Setting $x = -x$ in $(0)$, we get $$f(-x + y f(x^2)) = f(-x) - xf(-xy) = -f(x) + xf(xy).\tag 5$$
Taking difference of $(0)$ and $(5)$, we get $$f(x + yf(x^2)) - f(-x + yf(x^2)) = 2f(x).\tag 6$$
Now for any $t\neq 0$, we have $f(t^2)\neq 0$, otherwise setting $x = t$ and $y = \frac 1 t$ in $(0)$ would give $f(1) = 0$, contradicting our hypothesis.
Therefore, if $x\neq 0$, then we may set $y = \frac{x + y}{f(x^2)}$ in $(6)$ and get $f(2x + y) - f(y) = 2f(x) = f(2x)$. Setting again $x = \frac x 2$, we get $$f(x + y) = f(x) + f(y).\tag 7$$
Using $(7)$, we may rewrite $(0)$ and get $$f(yf(x^2)) = xf(xy).\tag 8$$
Setting $y = x$ in $(8)$, we get $f(xf(x^2)) = xf(x^2)$.
Setting $y = f(x^2)$ in $(8)$, we get $f(f(x^2)^2) = xf(xf(x^2)) = x^2f(x^2)$. Since $x^2$ can be any non-negative real number, we have $$f(f(x)^2) = xf(x), \forall x \geq 0. \tag 9$$
Setting $x = -x$ in $(9)$, we get $f(f(x)^2) = xf(x), \forall x \leq 0$. Combined with $(9)$, we get $f(f(x)^2) = xf(x), \forall x$.
Setting $x = f(x)$ in $(8)$, we get $f(yf(f(x)^2)) = f(x)f(f(x)y)$, hence $f(xyf(x)) = f(x)f(yf(x))$. When $f(x) \neq 0$, setting again $y = \frac y {f(x)}$ gives $f(xy) = f(x)f(y)$.
When $f(x) = 0$, we note that $f(x + 1) = f(x) + f(1) = 1 \neq 0$, hence we have $f((x + 1)y) = f(x + 1) f(y)$, which again leads to $f(xy) = f(x)f(y)$. Therefore we have $f(xy) = f(x)f(y)$ for all $x, y$.
It follows that $f$ is an increasing function. In fact, for any $x \geq 0$, we have $f(x) = f(\sqrt x)^2 \geq 0$. Hence whenever $x \geq y$, we have $f(x) - f(y) = f(x - y) \geq 0$.
Since we already know $f(q) = q$ for any rational number $q$, this implies $f(x) = x$ for any real number $x$.
Otherwise, assume there is $x$ such that $f(x) \neq x$. Replacing $x$ with $-x$ if necessary, we may assume that $f(x) > x$. Then there is a rational number $q$ such that $f(x) > q > x$. But since $f$ is increasing, $q > x$ implies $q = f(q) > f(x)$, contradiction.
|
package frogermcs.io.flatbuffs.model.json;
import android.os.Parcel;
import android.os.Parcelable;
import java.util.ArrayList;
import java.util.List;
/**
* Created by Miroslaw Stanek on 08.08.15.
*/
public class ReposListJson implements Parcelable {
public ArrayList<RepoJson> repos;
@Override
public boolean equals(Object o) {
if (this == o) return true;
if (o == null || getClass() != o.getClass()) return false;
ReposListJson reposList = (ReposListJson) o;
return !(repos != null ? !repos.equals(reposList.repos) : reposList.repos != null);
}
@Override
public int hashCode() {
return repos != null ? repos.hashCode() : 0;
}
@Override
public String toString() {
return "ReposList{" +
"repos=" + repos +
'}';
}
@Override
public int describeContents() {
return 0;
}
@Override
public void writeToParcel(Parcel dest, int flags) {
dest.writeTypedList(repos);
}
public ReposListJson() {
}
protected ReposListJson(Parcel in) {
this.repos = in.createTypedArrayList(RepoJson.CREATOR);
}
public static final Creator<ReposListJson> CREATOR = new Creator<ReposListJson>() {
public ReposListJson createFromParcel(Parcel source) {
return new ReposListJson(source);
}
public ReposListJson[] newArray(int size) {
return new ReposListJson[size];
}
};
}
|
In general, blowers are used in air cleaners, fans, and the like, and used industrially in air conditioner systems, various types of air intake and exhaust systems, and the like. Blowers can be classified as axial flow blowers, centrifugal blowers, or mixed flow blowers, depending on the characteristics of flow passing through the impellers thereof.
Among the above-mentioned blowers, centrifugal blowers allow the flow of air to occur, such that intake flow is generated in a direction of an axis of rotation thereof and exhaust flow is generated in a direction perpendicular to the axis of rotation, and is applied to common household air cleaners.
The centrifugal blower has a single-side intake method, in which intake flow is generated from one side of the axis of rotation, and a dual-side intake method, in which intake flow is generated from both sides of the axis of rotation.
Generally, such a centrifugal blower includes a centrifugal fan having a plurality of wings disposed in a circumferential direction thereof, and a scroll casing configured to surround the centrifugal fan while having an outlet guiding, to one side of the scroll casing, air discharged in the circumferential direction of the centrifugal fan.
However, a centrifugal blower, according to the related art, has a problem in that noise by air friction is generated and air volume is reduced, due to the imbalance of flow discharged from the outlet of the scroll casing.
In particular, the end of the outlet of the scroll casing is expanded, allowing for an increase in an opening area thereof, in order to diffuse air, and due to an expansion effect, the imbalance of exhaust flow is significantly generated. |
Choquequirao Puquio
Choquequirao Puquio (possibly from Quechua chuqi metal, every kind of precious metal / gold (<Aymara), k'iraw crip, cot, pukyu spring, well) is an archaeological site in Peru. It is situated in the Cusco Region, Cusco Province, San Sebastián District, north of San Sebastián.
See also
Inkilltambo
References
Category:Archaeological sites in Peru
Category:Archaeological sites in Cusco Region |
Q:
Inner Product Notation Question
While doing homework for a professor with notation completely different from my last semester professor's notation, I've become stuck trying to interpret what this means:
$$
v \rightarrow \langle-,v\rangle_V
$$
where $\langle,\rangle_V$ is an inner product on a finite-dimensional real vector space, $V$. The entire question is to show that the above identifies $V$ with $V^*$.
Any help is appreciated!
A:
This denotes a map $T:V\to V^*$, mapping $v\in V$ to $f_v\in V^*$, where $f_v:V\to \mathbb{R}$ is defined by
$$f_v(x)=\langle x,v\rangle_V $$
for $x\in V$. The question is then to show that $T$ is an isomorphism.
|
India bets on mobiles in battle on maternal, child deaths
NEW DELHI (Reuters) - India is betting on cheap mobile phones to cut some of the world’s highest rates of maternal and child deaths, as it rolls out a campaign of voice messages delivering health advice to pregnant women and mothers.
Amid a scarcity of doctors and public hospitals, India is relying on its mobile telephone network, the second largest in the world with 950 million connections, to reach places where health workers rarely go.
“It’s a huge priority for us,” health ministry official Manoj Jhalani told Reuters, adding that the service, advising on vaccinations and vitamin supplements, will launch in eight of the country’s Hindi-speaking states by Aug. 15.
“These are the most cost-effective health interventions,” said Jhalani, the supervisor of the project, named ‘Kilkari,’ or “Baby’s Gurgle”, which will tailor its recorded messages to individual stages of pregnancy or the age of a newborn.
Poor sanitary conditions and stark poverty prevail in many villages in India, which recorded 50,000 maternal deaths in 2013, when 1.3 million children died before turning five.
Preventable hazards such as pneumonia, or poor nutrition, cause most deaths of mothers and babies. Many women give birth at home without access to clean water and toilets, while public medical clinics remain dilapidated and overcrowded.
Over the last 18 months, almost 100,000 rural families have signed up for the voice message project, first piloted by the government of the impoverished, but resource-rich, eastern state of Bihar.
With India’s health services starved for funds, the mobile phone messages are a cheaper way to spread basic tips on health.
Payment delays have led to months of disruption in the traditional system of home visits by health workers to encourage pregnant women to take medicine and follow safety measures. (Read this exclusive here)
The new project, backed by the Bill and Melinda Gates Foundation and the charity arm of British broadcaster BBC, will make use of a national database to track pregnant women.
Another service, Mobile Academy, will also use recorded messages to help train India’s millions of health workers.
Health experts welcome the initiatives, but warn such mobile phone campaigns will not be enough to cut mortality rates unless India ramps up health services, particularly in rural areas.
“This (mobile services) will have a very marginal effect,” said Dileep Mavalankar, director of the Indian Institute of Public Health in the western state of Gujarat, adding that the health system needed to be strengthened in remote areas. |
Q:
How can I get the joblist in jenkins after I execute the jobdsl
How can I get the job list in jenkins after I execute the jobdsl ?
Jenkin JobDSL is nice to manage the jenkins jobs. When you execute the jobDSL, jenkins can help to generate the jobs are expected. Even more, if the job is created, you can choose to skip or overwrite.
Now I want to trigger the build directly after it is new generated.
See sample console output from jenkins build.
Processing DSL script demoJob.groovy
Added items:
GeneratedJob{name='simpliest-job-ever'}
Existing items:
GeneratedJob{name=’existing-job'}
How can I get the jobname simpliest-job-ever in jenkins? And in this case, I don't want to build existing-job
Scan the console log could be choice, but it is not elegant enough.
A:
You can trigger a build from the DSL script using the queue method (docs).
job('simpliest-job-ever') {
// ...
}
queue('simpliest-job-ever')
|
Q:
The use of Vice from the phrase vice versa
Can vice be used in a sentence in the following way.
"I would recommend using this product, vice, the other one."
A:
No.
There is a preposition vice, more common in the 18th and 19th century. It is similar to the prefix vice represented in titles like vice president and vice principal, and means (Merriam-Webster):
: in the place of / "I will preside, vice the absent chairman"
Here's another example from the Oxford English Dictionary:
1886 C. E. Pascoe London of To-day (ed. 3) xi. 111 It was..soon afterwards reorganized, with Mr. Randegger, vice Mr. Leslie, as conductor.
In both forms, the preposition is preceded by a comma and takes a (usually personal) object.
So you could technically say "I will use this product, vice the other one" to mean you'll use this product instead of the other one. However, the preposition has dropped out of use in the 20th century except in military contexts, so there's a high risk of being misunderstood.
Furthermore, vice does not serve as an abbreviation of the adverb vice versa. In your version of the sentence, vice versa does not make sense as a synonym for "conversely."
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.