text stringlengths 8 5.77M |
|---|
More Top-Flight Skins Quotes
One more week to wring every burgundy-and-gold click I can out of this team....Here are some of my favorite quotes of the past two days....
* "We got to the red zone and didn't make plays." -- Vinny Cerrato, on the unfortunately named Inside the Red Zone.
* "I'm becoming a Redskins fan because you have the guts to come on here and take the heat." -- Caller to Inside the Red Zone, on Cerrato's first Monday appearance in three weeks.
* "Bottom line is they did us a favor by not giving Westbrook the ball all day. Thank you." -- Cerrato, taunting Andy Reid on his show.
* "If I feel like I ain't been physical enough I try to get headbutts from my teammates. [Also] I do it myself, just try to get ready for contact. If that hurt, then I shouldn't play football." -- Fred Davis, explaining to me why he kept smashing his hands on his helmet while on the sidelines.
* "Last year, I met Mike Sellers. He surprised me at Redskins' Park by coming up from behind me and putting his hands around my neck and playfully choking me. I gave a pretty good jump. Now, I hadn't thought of this in a while, but redskinzfan420 mentioned in a Tailgate thread that he was choked by Big Mike too. So, I'm wondering how many of you are in the club? Have you been choked by Mike Sellers and if not, would you want to be?" -- Extreme Skins poster "Burgold," in perhaps the best message board thread of all time.
* "I'm from Wisconsin. Cold weather's nothing. The adrenaline keeps you warm." -- Casey Rabach, explaining why he refuses to wear sleeves under his jerseys or a coat on the sideline, even in weather like last night's. That's his arm, by the way. Jason Taylor had something similar on his mid-section, except probably four times bigger and twice as bloody.
* "You know, people listen to too many announcers, they don't believe their own lying eyes. They should watch the TV and figure it out for themselves and not listen to announcers." -- Greg Blache, commenting on comments about his defensive scheme.
* "The thing is for me it's not my start, it's how I finish. See, if I see somebody in front of me I'm gonna get him, and that's how I like to run, because I know I've got to go get him. I'll be damned if I'm gonna let me beat somebody in the 40." -- LaRon Landry, promising to beat Clinton Portis in a 40-yard dash re-match next summer.
* "Just kind of letting it do what it do. I figured if you're gonna be a warrior....You know, if you think about all the great warrior--Genghis Khan, Attila the Hun--I'm sure they didn't have nice haircuts. So I didn't want one neither." -- Marcus Washington, explaining his ever-expanding 'fro.
* "To me, the MVP of the game was our punter." -- Cerrato, repeatedly heaping great mounds of oversized praise on Ryan Plackemeier. |
import { Component } from '@angular/core';
import { ChartsService } from './charts.service';
@Component({
selector: 'app-echarts',
templateUrl: './echarts.component.html',
styleUrls: ['./echarts.component.scss'],
providers: [ChartsService]
})
export class EChartsComponent {
showloading: boolean = false;
BarOption;
LineOption;
PieOption;
AnimationBarOption;
constructor(private chartsService: ChartsService) {
this.BarOption = this.chartsService.getBarOption();
this.LineOption = this.chartsService.getLineOption();
this.PieOption = this.chartsService.getPieOption();
this.AnimationBarOption = this.chartsService.getAnimationBarOption();
}
}
|
President Obama will visit the Jersey Shore and speak at Convention Hall in Asbury Park on Tuesday during a visit to view the rebuilding and recovery efforts from Hurricane Sandy, the White House said tonight.
Obama, accompanied by Gov. Chris Christie, is expected to visit with families and business owners, according to the White House. The president's visit comes roughly 200 days after he toured the region with Christie in the days immediately after the hurricane.
After touring the area, Obama will deliver remarks at Convention Hall in Asbury Park, according to the White House statement. The event at Convention Hall is open to the public. Tickets are limited to one per person and will be distributed on a first-come, first-served basis beginning at 1 p.m. Sunday at the Grand Arcade at Convention Hall.
RELATED COVERAGE
• N.J. Politics Roundup: Obama set to visit; Christie, Oliver exchange words
• Buono on Obama's visit: 'I'm not disappointed' |
Freedom of expression and the internet article 19 Law in Internet: Pos or Cons for the Freedom of Expression?
ARTICLE 19
Law in Internet: Pos or Cons for the Freedom of Expression?
Background Paper
Warsaw
11 May, 2009
IntroductionDuring the past few decades the Internet has become an important part of many peoples lives; providing not only access to a wide range of information and services, but also allowing expression, the sharing of views, creating economic opportunities and producing civil and political mobilisation.
The content of the Internet is constantly widening, covering more and more aspects of social and political life, which in itself has a great democratising effect. The role of the Internet is especially valuable for people who live under authoritarian regimes. Due to its global character the Internet has the potential to expose citizens of authoritarian states, where other media is under the state control, to critical and dissenting views about their governments, helping them to develop a different worldview and, potentially, develop aspirations for democratic change.
Development of technology not only provides better and quicker access to information, but also allows for the creation of new alternative sources of information, through blogging and social networking websites. In some cases such self-publishing can be the only source of information; as was the case during the demonstrations of Buddhist monks in Burma in September 2007. In the situation, when the military regime completely isolated the country from the international scene, the shocking and powerful pictures that surfaced from Burma were mostly shot by local bloggers with cell phones. Thanks to the Internet, those pictures – the only information that was coming out of the country - quickly travelled around the globe and entered other media sources. The most recent example of the role of the Internet on political dynamics is the ‘Twitter revolution’ in Moldova which demonstrated how the Internet can help to share political views, as well as organise and mobilise civil or political action.
Meanwhile, the election campaign of President Obama demonstrated that the Internet also has an important role to play in the political lives of those countries that enjoy freedom of media. The victory of Barack Obama’s campaign is largely attributed to the mobilisation of his supporters through expert use of networks, fundraising and social networking. Indeed, many analysts compared the employment of the Internet by Obama’s campaign to the use of the then new television technologies by President Kennedy during his election campaign.
While the democratising potential of the Internet is obvious, one should be aware of some concerns that exist about the use of those new technologies, in particular their use for criminal means. While governments have a legitimate right and even obligation to punish and prevent cyber-crime, safeguards are necessary to ensure that governments do not abuse their power and that freedom of expression is not denied under the pretext of protecting society from online crime.
This paper will address some of these concerns by reviewing issues of: access to the Internet, increasing government control over and manipulations of Internet content, the use of technology for monitoring and surveillance, as well as examine the role that private players play in Internet regulation. All these issues will be viewed and discussed through the prism of the right to freedom of information.
AccessDespite the fact that in recent years many new countries have joined the international cyber community and the number of users within those countries continues to grow, there are still serious problems with access to the Internet. In many countries access to the Internet is reserved exclusively for the elite, while in others the prohibiting prices for access to the Internet turn the division between poor and rich into a division between the information-poor and the information- rich. This division applies to sectors of society within specific countries, as well as to the international system; for instance the division between countries.
Considering the important role that the internet has to play in overall social and political life, access to the Internet becomes an important public issue. While governments of many countries are trying to assist and promote access to the Internet, and the international community works to bridge the ‘digital divide’, there are also governments that are employing policies that actually limit Internet access. This comes in the form of, for example, a direct ban on access like in Cuba, or by requiring users or Internet service providers (ISPs) to obtain a license or to register. Such access restrictions may be formally imposed by the State or even informally by private parties, ISPs.
Under international human rights law, any restrictions on access to the Internet must be very carefully scrutinised. Outright restrictions on access to the internet, such as prohibiting the possession of a modem or other communications equipment, constitutes an overt violation of the right to freedom of expression. Burma represents one such example. According to the recent study by Reporters Without Borders1, there are no private service providers and only 2 state-controlled providers in the country. Going online in itself represents a dissident act and the country is one of the worst in terms of internet penetration. Only 0.1% of the population of Burma have access to the Internet2. The situation is identical in North Korea.
Licensing3 of individual Internet users or Internet Service Providers is likewise illegitimate and any registration requirements4 for users as well as for service or content providers are of very doubtful legitimacy. Any of these measures should only be employed if there is evidence that they are necessary for the protection of public order or for the protection of the rights of others. In the absence of such evidence, any state action in limiting or prohibiting access to the Internet constitute a violation of the right to freedom of expression and will have a seriously chilling effect on the right to disseminate information.
However, it is important to remember that the right to free expression goes further than simply prohibiting interference with the means of communication; it includes also a positive obligation on the state to make important means of communication available to the public at large. This includes not only lifting any regulations limiting access, but also working towards the elimination of other obstacles such as poor infrastructure, high costs of telecommunication, monopolies, the lack of training and education, and others.
Content regulationOne of the biggest strengths of the Internet – its variety of content – has simultaneously become a matter of some controversy. Governments in many countries have voiced great concern over the free availability on the Internet of pornography. The use of the Internet for criminal purposes has also been a cause for concern. It is undeniable that while providing more opportunities and enhancing communication and freedom of expression, the Internet is also increasingly used for criminal purposes, posing threats to other human rights. These are real and worrying concerns; the use of the Internet to promote paedophile activities, for example, constitutes a very real threat to the human rights of children and should legitimately be restricted.
However any content regulation must not fall below the standards set by international human rights law – a high standard – and must take into account the special nature of the Internet. In Europe, North America and Australia, there has been a considerable backlash against government attempts to regulate Internet content. Content restrictions are often seen as censorship and the US Supreme Court has struck down various legislative proposals to restrict the availability of ‘obscene’ or ‘indecent’ material for this reason. On the Internet there is no ‘scarcity of frequencies’ that would justify overarching regulation. With regard to obscene materials, because the Internet is not like a bookstore, where the top shelve can be designated for certain titles, or like television, where certain material can be broadcast only after 9pm in the evenings, this cannot be regulated as it can in those places. While from a theoretical perspective, the same laws apply – what is obscene off-line is also obscene on-line – they cannot be enforced in the same manner.
A further problem with nationally-imposed content regulation is that a situation is developing whereby various countries each attempt to enforce their national laws over the global Internet. Different national and sub-national legal regimes, often supported by international instruments, have content restrictions on publication (not to say, expression more generally) which may differ quite considerably. The consequence is that the publication of material in one jurisdiction, perfectly legal and non-actionable there, may well be subject to criminal or civil liability in other jurisdictions. This applies, among others, to content restrictions on hate speech, defamation, obscenity or pornography, or blasphemy or sedition.
Some governments are trying to deal with the situation by applying the rules for liability for the content of off-line publication, or ‘newspaper rule’, to Internet.5 According to this rule, a publisher is legally liable for content deemed illegal or otherwise actionable by a given jurisdiction as long as two conditions are met: (1) a copy of the newspaper actually reaches the jurisdiction and is read there; and (2) the publisher had reason to know that the newspaper would probably be read there – because, most prominently, the jurisdiction is in the distribution network of the newspaper. This liability rule, most crucially, imposes liability in every place in the newspaper’s distribution network where the newspaper is read, regardless of where it is produced or where the content was written.
Publication on the Internet is fundamentally different from publication by newspapers in ways directly relevant to the newspaper rule. Fundamentally unlike the typical newspaper, the Internet makes virtually every person with Internet access within the distribution network of any Internet publisher. Thus, application of the newspaper rule to Internet publications subjects an Internet publisher to liability in virtually every jurisdiction in the world. Yet, if the newspaper rule is also the rule for Internet publication, the Internet publisher would be “legitimately” liable for content which is legal and protected in his or her home jurisdiction (and which might also be protected by international law), as long as (1) it is prohibited in a jurisdiction which has Internet access and (2) someone actually downloads it there.
Applying the newspaper rule to Internet publications subjects Internet publishers to the content restrictions of virtually every country on earth, regardless of whether such content restrictions exist in the jurisdictions where such publishers live, and regardless of whether the foreign restrictions comply with the international freedom of expression standards. Application of the newspaper rule will subject persons living in regimes whose laws fully protect freedom of expression to the laws of regimes which regularly censor, deny access or otherwise abuses content-restrictive laws. Or crudely put, there is a perceived danger that the entire Internet might succumb to the standard of the least tolerant regulator. Enforcement of content regulation has led to questions of liability, particularly for Internet Service Providers (ISPs) who, in some countries, have been held liable for the content of Internet pages published by their customers.
Even in the absence of overarching regulation or sector-specific ‘Internet control laws’ the Internet does not operate in a legal vacuum. The laws of the land already apply to on-line content as they do to off-line material; something that is defamatory in newsprint can be just as defamatory on a web-page. However, in many cases it will not be appropriate to apply laws of general application to on-line content without consideration for the special nature of the medium, particularly with regard to the position of ISPs and the jurisdictional issues described, but also bearing in mind that certain parts of the web get much more traffic than others.
For all these reasons, some have hailed self-regulation as the preferred alternative. Initially, this focused on the development of blocking and filtering software to enable ‘parental control’. However, when this software began showing promise it was quickly co-opted by governments around the world. Counties like China have bolted it on to their national points of access to filter out the BBC, CNN and other ‘subversive’ sites. In other countries it is often installed as mandatory on terminals in public libraries. The former example is clearly illegitimate, but the latter is problematic also.
Given that many of the software packages filter on the side of caution, blocking, for example, websites discussing gay and lesbian issues alongside sites offering porn, this seriously restricts the right to access to information of those who rely on those terminals for access – often the poor. Other forms of self-regulation, including the operation of ‘hotlines’ for undesirable content and the development of a ‘global ratings mechanism’ have been criticised as representing government censorship in a corporate guise.
Monitoring, surveillance and content manipulationThe chilling effect of the restrictions on access and content of the Internet is particularly severe when, as is so often the case, these measures go hand-in-hand with extensive surveillance operations, which have serious effects on on-line speech and are driven by the political desire to suppress undesirable political speech.
Technological developments, while enabling better communication and advancing freedom of expression, in the hands of repressive governments, are turned into means for control and manipulations over the online content. These techniques clearly have a serious chilling effect on the freedom of expression. If an Internet user suspects that his or her on-line movements are monitored, he or she will exercise caution with regard to statements made or sites visited. Technology can provide some solace; anonymity and encryption tools are constantly developing and improving, and aim to protect users’ online rights of privacy and freedom of expression. However, their success in doing so has meant that governments have tried to restrict the use of such software.
States implement surveillance systems for different reasons. In countries such as Iran, China, Belarus and some countries of Central Asia, law enforcement agencies are alleged to engage in wide-scale monitoring activities to prevent individuals within their jurisdiction from discussing politically damaging issues. In countries such as the United States, UK or The Netherlands, monitoring takes place for law enforcement or national security-related purposes and interception warrants are granted only for these purposes. Since the events of 11 September, many countries have enacted new legislative powers in this field and it may be assumed that such activities are on the rise since then. The Council of Europe’s much-maligned Cyber-crime treaty can be seen as a related development, as can the ever-increasing data-retention demands on ISPs. In addition, several other countries started using the language of ‘fighting terror’ to justify the various measures they take to restrict freedom of expression – on-line as well as off-line.
Of course, it is legitimate that law enforcement agencies should have the appropriate tools to prevent, detect and prosecute on-line crime. However, the balance to be struck between the interests of privacy and free expression on the one hand, and the interests in preventing and detecting crime on the other, is a delicate one, as has been stressed time and time again by courts including the European Court of Human Rights. Legitimate concerns have been expressed that as currently framed, many surveillance laws leave executive agencies too much leeway while providing too little protection for human rights.
Workplace monitoring is on the up too, aided by the ease with which monitoring tools can be installed. If the organisation is networked, software can be installed centrally to track and monitor employees’ Internet movements. If the organisation is not networked, software can be installed on individual computers. The software can analyse an organisation’s entire email traffic phrase-by-phrase, drawing conclusions on whether an individual message is ‘legitimate company business’ or not, it can be instructed to search for particular words or phrases, and some software can even analyse communication patterns.6 Use of this software may be in addition to ‘regular’ filtering software as described above. Managers give a variety of reasons for installing the software, including to protect trade secrets, to prevent sexual harassment incidents, or to ensure that employees do not waste company time.
Another technique employed by some authoritarian governments is manipulation of internet content. This is a relatively new phenomenon which occurred with the increase of self-publishing on the Internet and the development of social networks and sites like YouTube, Facebook, MySpace and others. Governments are very aware of the potential that those sites have in terms of political networking and mobilisation; as has been demonstrated for example in Moldova and Ukraine7. Some of those governments, instead of directly prohibiting such interactions online, are employing more sophisticated measures – manipulation of online content. This is no different from how authoritarian regimes used media in the past to disseminate their propaganda and manipulate public opinion.
A growing body of evidence from China and Russia—the two states most active in posting Web content—shows the pattern continuing on the Internet. Chinese authorities are notorious for creating and operating the so–called Fifty Cent Party, a squad of pro–government online commentators who trawl the Web in search of interesting political discussions and leave anonymous comments on blogs and forums. Similarly, the Russian government often relies on private Internet companies, such as the prominent New Media Stars, which happily advance the government’s views online. New Media Stars recently produced a patriotic movie, War 08.08.08, successfully distributed online and touted on many Russian blogs, which blames the war in South Ossetia solely on Georgia.8 While the new digital public spheres may be getting more democratic, one should be aware of the fact that they are also heavily polluted by government operators.
The role of private actorsThe role of private actors in restricting access to the Internet should also be taken into account. In many countries there are pressures on private ISPs not to host sites that contain undesirable content. While the prevention of serious crime online is an important goal, it is undesirable that ISPs act on behalf of the authorities or police as censors. Such involvement of private actors represents two major problems in regards to freedom of expression. First, ISPs are not judicially qualified to determine whether a certain website might contravene the law or whether an individual user might be likely to publish something that is considered to be illegal. When faced with a borderline case, they are likely to err on the side of caution and decide not to host the site. Second, there are no safeguards to ensure that ISPs do not abuse their powers and there is no system to call ISPs to account. This is problematic, particularly since the ISP’s actions will have an important impact on the right to freedom of expression of those who they decide to refuse access, as well as the right of others to receive information. Users whose access rights are restricted by a private party can hardly be said to receive a ‘fair trial’.
One of the examples of such involvement of private actors in the state censorship was demonstrated in China when Google, one of the world’s leading Internet search companies, launched a Chinese version of its service, www.google.cn, based in mainland China. While by locating its new service inside the mainland, Google hoped to speed up access for its users, in fact the effect was the exact opposite. In order to be allowed to do business in China, it bowed to government demands that it should filter out any search results that link to sites that the Chinese government disapproves of.
Google, one of few major gateways with excellent Internet search engine technology, could potentially play a major role in realising the right of every Chinese Internet user to access to information and freedom of expression. But by complying with the Chinese authorities’ censorship demands, is achieved the opposite: it became complicit in China’s official censorship regime and it also reneged on its own commitment to support freedom of expression and the right to access information9.
Similarly, Microsoft took down a blog that was critical of Chinese policies at the request of the Chinese authorities10 and Yahoo disclosed confidential account information of a Chinese journalist to the Chinese authorities, after he had provided details of a censorship order to the Asia Democracy Forum and the website Democracy News. As a result, this journalist was sentenced to ten years in prison for “providing state secrets to foreign entities”. More recently, after pro-Tibet demonstrations in March 2008, Yahoo! was pushed into posting portraits of four Tibetan demonstrators alongside an appeal for witnesses. Shortly afterwards, one of the demonstrators gave himself up and another was arrested. The same goes for the company Skype which, following an agreement with Chinese firm TOM, allows the authorities to intercept its communications.11The realisation of fundamental human rights on the Internet, such as the right to access information and the right to free speech, effectively rests in part with corporations such as Google, Microsoft and Yahoo!. They are the corporate intermediaries that are critical in making freedom of expression a reality. This is evident in the context of the Chinese authorities achieving what no one thought was possible – controlling access to information on the Internet. Such actions of private players have a potential of having a long-lasting regressive impact on their customers, which is why they have to consider their decision carefully and adopt a more meaningful stance to protect the interests of its users who would benefit most from its ethical corporate mandate.
In its statement on this issue, ARTICLE 19 reminded those corporations of the Joint Declaration of the United Nations, the Organisation for Security and Cooperation in Europe and the Organisation of American States12, in which they said:
Filtering systems which are not end-user controlled – whether imposed by a
government or commercial service provider – are a form of prior-censorship
control or restrict use of the Internet, contrary to the principles set out herein.
It is important to note that in 2008 Yahoo!, Google and Microsoft signed the Global Network Initiative13, publicly stating their respect for their customers’ right to freedom of expression worldwide. To what extend private companies will be able to resist the pressure from certain governments remains to be seen. But this public expression of the intention to do so is already an important step forward and means that it will no longer be easy for those governments to use private companies as censorship tools.
Conclusion – Position of ARTICLE 1914ARTICLE 19 believes that fulfilment of the right to freedom of expression should be the focus of the discourse on Internet regulation. As a global network for communication the Internet cannot function without full respect of the internationally agreed right to free expression. Freedom of expression is a key human right; important not only in its own regard but crucial also to the functioning of democracy and to the enforcement of other rights. Freedom of expression is also a necessary precondition for economic, social and democratic development. Nobel Price winning economist Amartya Sen remarked more than twenty years ago that no substantial famine has ever occurred in any independent and democratic country with a relatively free press15. This wisdom has since become internationally accepted.
ARTICLE 19 also believes that it should be globally acknowledged that freedom of expression and development cannot be achieved on the internet if the same rights are not also respected 'off-line'. In too many countries, people are still being killed, harassed, arrested, tried or detained for the peaceful and legitimate exercise of their right to freedom of expression. All too often excessive defamation and national security laws are abused to stifle independent voices; and almost every day, somewhere in the world an independent newspaper or radio station is shut down for being 'too critical'.
ARTICLE 19 stresses that the role of global businesses is crucial in the realisation of the right to free expression online. The Internet is a unique communications forum in many ways; one of them is that the technology used for communications is largely shaped and regulated by business16. The leading search engines in the world, such as Google and Yahoo!, play a powerful role in realising access to the world's information. They should strive to exercise this power responsibly and in the public interest. Internet businesses also hold sensitive private information on their users, which they should treat with extreme care and not provide to governments who are likely to use that information for censorship purposes. Equally important, software providers such as Microsoft and Cisco Systems provide the technical means to surf the net and determine the way in which people access information. This in turn determines most online content and shapes the Internet as we know it. If the Internet is to become a truly global and diverse forum for communications, these businesses will need to be persuaded to play a leading role in that process. Equally as important is that many of these same companies provide the software used by countries such as China and Saudi Arabia to censor the Internet and control its users. We question whether these roles are compatible and we welcome recent attempts to outlaw corporate involvement in such human rights abuses17.
Openness
The idea of the free flow of information is at the very heart of the right to freedom of expression. International law recognises this centrality and states that restrictions on open communication may be placed only through a legitimate and democratic process, and when absolutely necessary to protect a set of narrowly defined public interests. Restrictions must always be proportionate and States should always chose the least restrictive option available to them. This establishes a high threshold: to restrict a fundamental right is a serious matter and should be done only as a matter of last resort. These principles apply both to online communications and in the offline world: there is no justification for applying a stricter set of rules to online communications than applied to those offline18. Any legal, policy or regulatory framework for the Internet must therefore abide by these general principles.
Specifically with regard to Internet policy and regulation, a set of minimum principles was adopted by the special rapporteurs on freedom of expression of the United Nations, the Organisation of American States and the Organisation for Security and Cooperation in Europe and the Organisation. In a Joint Declaration, they stated:19
The Internet, at both the global and national levels, should be overseen only by bodies which are protected against government, political and commercial interference, just as freedom from such interference is already universally acknowledged in the area of the print and broadcast media. National regulation of Internet domain names should never be used as a means to control content.
No one should be required to register with or obtain permission from any public body to operate an Internet service provider, website, blog or other online information dissemination system, including Internet broadcasting. This does not apply to registration with a domain name authority for purely technical reasons or rules of general application which apply without distinction to any kind of commercial operation.
Filtering systems which are not end-user controlled - whether imposed by a government or commercial service provider - are a form of prior-censorship and cannot be justified. The distribution of filtering system products designed for end-users should be allowed only where these products provide clear information to end-users about how they work and their potential pitfalls in terms of over-inclusive filtering.
No one should be liable for content on the Internet of which they are not the author, unless they have either adopted that content as their own or refused to obey a court order to remove that content. Jurisdiction in legal cases relating to Internet content should be restricted to States in which the author is established or to which the content is specifically directed; jurisdiction should not be established simply because the content has been downloaded in a certain State.
Restrictions on Internet content, whether they apply to the dissemination or to the receipt of information, should only be imposed in strict conformity with the guarantee of freedom of expression, taking into account the special nature of the Internet.
Corporations which provide Internet searching, chat, publishing or other services should make an effort to ensure that they respect the rights of their clients to use the Internet without interference. While this may pose difficulties in relation to operations in certain countries, these corporations are encouraged to work together, with the support of other stakeholders, to resist official attempts to control or restrict use of the Internet, contrary to the principles set out herein.
We recommend that these principles are adopted as the guiding principles for any form of Internet regulation, whether at the national or at the international level.
Ensuring openness online is not a matter that can be left to States alone. Business has a key role to play in keeping the Internet open and accessible to all. They should be expected to do more than merely ensure wide accessibility and interoperability of their software and systems. Most Internet users depend on search engines to navigate their way around the net and find information. These search engines should fulfil that function transparently and in the public interest.
Attention should be devoted to threats to openness posed by developments in copyright law and policy. While copyright laws are necessary and, when appropriately drafted, can actually help freedom of expression, they should be limited to that which is necessary to stimulate creativity. Fair use should always be allowed. At a minimum, content developed by or with the (financial) support of public authorities should be open; and measures should be taken to allow the individual use of copyright material for legitimate educational purposes. Indigenous knowledge should also enjoy appropriate protection: openness must not lead to a one-way stream of knowledge and ideas from the South to the North.
Attention should be also paid to restrictions on the free flow of information that are imposed by Internet service providers. Service providers should not be called upon to be the arbiters on the legality of content uploaded by their users. They are not qualified to do so and, as commercial businesses, will tend to err on the side of caution and remove any material they believe might be offensive. Instead, service providers should be required to take down material only following a fair judicial process. Service providers should also be required to ensure that they treat all online material equally; no content should be given preferential treatment.
It is important to note that freedom of expression and openness cannot be achieved on the Internet if it is not also respected offline. It is clear from the official reports of such bodies as the UN Special Rapporteur on Freedom of Expression and from reports of non-governmental watchdogs that freedom of expression is under threat everywhere in the world. Threats range from the abuse of laws to protect against defamation or national security to actual physical violence and even murder. Therefore, real steps must be taken by governments and international actors to end threats and actual violence against people for the exercise of the freedom of expression; and repressive laws, for example on criminal libel or requiring the licensing of media, have to be abolished.
Access
As we already established in this paper, if the Internet is truly to become the primary means of mass communications, then access is crucial. At present, only a small minority of the world enjoys the kind of regular and reliable access to the Internet that is necessary for the net to fulfil its potential in aiding development.
While many of the problems experienced in terms of access are caused by poverty, illiteracy and a lack of infrastructure, and due attention must be paid to those matters, Internet access is often also impeded by regulatory problems. To improve access, it is therefore of the utmost importance that an appropriate regulatory framework is in place. At a minimum, this means that the conditions listed under the 'openness' theme are in place. As discussed above, the Internet cannot fulfil its potential under conditions of censorship.
The cost of international connectivity and the way in which the Internet is provided in many countries must also be a part of the discourse on access to the Internet. It is a fact that the cost of access per Mbps in the 'global South' is far higher than it is in the developed world. This is partly because infrastructure in the South is less well-developed; but the role played by cable and satellite companies is also important. Creative solutions to these problems should be found, including by ensuring the availability of multiple international paths of connectivity.
Diversity
ARTICLE 19 strongly believes that for the Internet to become a relevant global tool for communication and information sharing, it must become more diverse. There is no point in taking measures to improve access to the Internet if there is no relevant information to be found, and if people cannot communicate in their own language. The problems in this regard are not only linguistic, but also cultural, developmental and technical. The problems in relation to the over-reliance of the net's infrastructure on the Latin alphabet have been well-developed elsewhere and we support ongoing efforts to develop standards that will help create greater stability.
While we therefore encourage measures to increase diversity on the Internet, we warn against a heavily State-led form of content development. The promotion of diversity must necessarily go hand in hand with promoting access and openness. It is also important not to understand diversity 'merely' as cultural diversity: States must provide access and encourage the dissemination of all kinds of information and ideas, including political opposition and dissident voices. Under international law, a key positive element of the right to freedom of expression is the obligation on governments to create an environment in which a diverse, independent media can flourish, thereby satisfying the public's right to receive information from a variety of different sources.
Security
ARTICLE 19 agrees that the protection of privacy and security online is a necessary precondition for maintaining the integrity of the Internet as well as for the exercise of the right to freedom of expression. In order to exercise the right to freedom of expression, the right to respect for private life must be guaranteed, including the right to communicate anonymously and the right to use encryption tools. If an Internet user suspects that his or her online movements are monitored, he or she will exercise caution with regard to statements made or sites visited.
At the same time, there are significant tensions between State measures to promote security and the right to privacy freedom of expression. This is particularly so in the area of cybercrime and the fight against terrorism, and the various measures employed by States to monitor internet traffic and communications. ARTICLE 19 believes that the only legitimate way to address these tensions is through international human rights law. In certain circumstances, it may be necessary to monitor or intercept communications, for example for the prevention of serious crime, but guarantees are necessary in order to safeguard against abuse of these powers. International law has laid down some minimum standards that must be respected in this regard:
any surveillance measures must be stated in clear legislation, and be truly "necessary" in order to protect a legitimate public interest;20[19] and
legislation authorising surveillance must provide adequate guarantees against abuse, including a mechanism of judicial authorisation and democratic oversight.
Guarantees should safeguard against interference by private actors as well as State interference. For example, surveillance in the workplace can be as pervasive and detrimental to the exercise of freedom of expression as State surveillance.
The anonymity of communications should also be protected. Particularly in those countries where there is heavy State monitoring, anonymity tools can allow users to communicate with the outside world without fear of identification and reprisals. Any restrictions on the use of anonymity tools will impact on the right to freedom of expression. Courts around the world have recognised that anonymity is an important pre-condition for the exercise of the right to freedom of expression, as well as of other rights, and may be restricted only in narrow circumstances.
12 Available at http://www.article19.org/pdfs/standards/three-mandates-dec-2005.pdf.
13 http://www.globalnetworkinitiative.org/
14 This is based on the ARTICLE 19’s Position Paper on internet governance for development prepared for the inaugural session of the Internet Governance Forum, 2006. Available at http://www.article19.org/handbook/publications/internet-governance-paper.html
16Standards on the world-wide web, the part of the internet best-known to people, are developed by the World-wide Web Consortium (W3C), a vendor-neutral forum for the creation of web standards. Although a few of its members have are government entities, no State as such is a member of W3C. This sets it apart from broadcasting, for example, the technical side of which is regulated by international treaties
17 For example, the 'Global Online Freedom Act of 2006', introduced in the US House of Representatives, H.R.4780
18 See the Joint Declaration of the UN Special Rapporteur on Freedom of Opinion and Expression, the OAS Special Rapporteur on Freedom of Expression, and the OSCE Special Representative on Freedom of the Media issued in 2001.
19 Joint Declaration of 21 December 2005
20 See Article 17, ICCPR, and Article 8(2) of the European Convention on Human Rights and the jurisprudence developed under these provisions by national and international human rights courts. |
Alain de Botton, author of The Consolations of Philosophy and other bestsellers, has a new book out called Religion for Atheists. It encourages atheists to appreciate things religions do well--ranging from fostering community to orchestrating rites of passage--and make use of them, except without the belief-in-God part. I asked him how, exactly, the atheist’s equivalent of a bar mitzvah or a Catholic confirmation would work: |
Q:
What is "data scaling" regarding StandardScaler()?
I'm trying to figure out the purpose of StandardScaler() in sklearn.
The tutorial I am following says
"Remember that you also need to perform the scaling again because you had a lot of differences in some of the values for your red and white [wines]"
So I looked up the function in the sklearn docs.
"Standardize features by removing the mean and scaling to unit variance"
https://scikit-learn.org/stable/modules/generated/sklearn.preprocessing.StandardScaler.html
What good would removing the mean do?
What is scaling the data? Hard to google that.
# Scale the data with `StandardScaler`
X = StandardScaler().fit_transform(X)
A:
I will use k-Nearest Neighbor algorithm to explain why we must do scaling as a preprocessing step in most machine learning algorithms.
Let's say you are trying to predict if I transaction is fraudulent or not, that is, you have a classification problem and you only have two features: value of transaction and time of the day. Both variables have different magnitudes, while transactions can vary from 0 to 100000000 (It is just an example), and time of the day between 0 to 24 (let's use only hours).
So, while we are computing the nearest neighbor, using euclidean distance, we will do
distance_class = sqrt(
(new_value_transaction - old_value_transaction)**2) +
(new_time_of_day - old_time_of_day)**2)
)
Where old is the reference to our train data and new is related to a new transactions we want to predict the class.
So now you can see that transactions will have a huge impact, for example,
new_value_transaction = $100
new_time_of_day = 10
old_value_transaction = $150
new_time_of_day = 11
class_distance = sqrt(($50)**2) + (1)**2)
Now, you have no indication that transaction value is more important than time of the day, that is why we will scale our data.
Between the alternatives, we can have a lot of different, such as MinMaxScaler, StandardScaler, RobustScaler, etc. Each of them will treat the problem different. To be honest? Always try to use at least two of them to compare results.
You can read more about in the sklearn documentation: https://scikit-learn.org/stable/modules/preprocessing.html#preprocessing
I hope you got the feeling why we should use standardization techniques. Let me know if you have any further questions.
To complement, here is a visual explanation of what I explained above.
Credit: https://www.youtube.com/watch?v=d80UD99d4-M&list=PLpQWTe-45nxL3bhyAJMEs90KF_gZmuqtm&index=10
In the video they give a better explanation. Also, I highly recommend this course, the guys are amazing.
|
//
// NSString+YYAdd.m
// YYCategories <https://github.com/ibireme/YYCategories>
//
// Created by ibireme on 13/4/3.
// Copyright (c) 2015 ibireme.
//
// This source code is licensed under the MIT-style license found in the
// LICENSE file in the root directory of this source tree.
//
#import "NSString+YYAdd.h"
#import "NSData+YYAdd.h"
#import "NSNumber+YYAdd.h"
#import "UIDevice+YYAdd.h"
#import "YYCategoriesMacro.h"
YYSYNTH_DUMMY_CLASS(NSString_YYAdd)
@implementation NSString (YYAdd)
- (NSString *)md2String {
return [[self dataUsingEncoding:NSUTF8StringEncoding] md2String];
}
- (NSString *)md4String {
return [[self dataUsingEncoding:NSUTF8StringEncoding] md4String];
}
- (NSString *)md5String {
return [[self dataUsingEncoding:NSUTF8StringEncoding] md5String];
}
- (NSString *)sha1String {
return [[self dataUsingEncoding:NSUTF8StringEncoding] sha1String];
}
- (NSString *)sha224String {
return [[self dataUsingEncoding:NSUTF8StringEncoding] sha224String];
}
- (NSString *)sha256String {
return [[self dataUsingEncoding:NSUTF8StringEncoding] sha256String];
}
- (NSString *)sha384String {
return [[self dataUsingEncoding:NSUTF8StringEncoding] sha384String];
}
- (NSString *)sha512String {
return [[self dataUsingEncoding:NSUTF8StringEncoding] sha512String];
}
- (NSString *)crc32String {
return [[self dataUsingEncoding:NSUTF8StringEncoding] crc32String];
}
- (NSString *)hmacMD5StringWithKey:(NSString *)key {
return [[self dataUsingEncoding:NSUTF8StringEncoding]
hmacMD5StringWithKey:key];
}
- (NSString *)hmacSHA1StringWithKey:(NSString *)key {
return [[self dataUsingEncoding:NSUTF8StringEncoding]
hmacSHA1StringWithKey:key];
}
- (NSString *)hmacSHA224StringWithKey:(NSString *)key {
return [[self dataUsingEncoding:NSUTF8StringEncoding]
hmacSHA224StringWithKey:key];
}
- (NSString *)hmacSHA256StringWithKey:(NSString *)key {
return [[self dataUsingEncoding:NSUTF8StringEncoding]
hmacSHA256StringWithKey:key];
}
- (NSString *)hmacSHA384StringWithKey:(NSString *)key {
return [[self dataUsingEncoding:NSUTF8StringEncoding]
hmacSHA384StringWithKey:key];
}
- (NSString *)hmacSHA512StringWithKey:(NSString *)key {
return [[self dataUsingEncoding:NSUTF8StringEncoding]
hmacSHA512StringWithKey:key];
}
- (NSString *)base64EncodedString {
return [[self dataUsingEncoding:NSUTF8StringEncoding] base64EncodedString];
}
+ (NSString *)stringWithBase64EncodedString:(NSString *)base64EncodedString {
NSData *data = [NSData dataWithBase64EncodedString:base64EncodedString];
return [[NSString alloc] initWithData:data encoding:NSUTF8StringEncoding];
}
- (NSString *)stringByURLEncode {
if ([self respondsToSelector:@selector(stringByAddingPercentEncodingWithAllowedCharacters:)]) {
/**
AFNetworking/AFURLRequestSerialization.m
Returns a percent-escaped string following RFC 3986 for a query string key or value.
RFC 3986 states that the following characters are "reserved" characters.
- General Delimiters: ":", "#", "[", "]", "@", "?", "/"
- Sub-Delimiters: "!", "$", "&", "'", "(", ")", "*", "+", ",", ";", "="
In RFC 3986 - Section 3.4, it states that the "?" and "/" characters should not be escaped to allow
query strings to include a URL. Therefore, all "reserved" characters with the exception of "?" and "/"
should be percent-escaped in the query string.
- parameter string: The string to be percent-escaped.
- returns: The percent-escaped string.
*/
static NSString * const kAFCharactersGeneralDelimitersToEncode = @":#[]@"; // does not include "?" or "/" due to RFC 3986 - Section 3.4
static NSString * const kAFCharactersSubDelimitersToEncode = @"!$&'()*+,;=";
NSMutableCharacterSet * allowedCharacterSet = [[NSCharacterSet URLQueryAllowedCharacterSet] mutableCopy];
[allowedCharacterSet removeCharactersInString:[kAFCharactersGeneralDelimitersToEncode stringByAppendingString:kAFCharactersSubDelimitersToEncode]];
static NSUInteger const batchSize = 50;
NSUInteger index = 0;
NSMutableString *escaped = @"".mutableCopy;
while (index < self.length) {
NSUInteger length = MIN(self.length - index, batchSize);
NSRange range = NSMakeRange(index, length);
// To avoid breaking up character sequences such as 👴🏻👮🏽
range = [self rangeOfComposedCharacterSequencesForRange:range];
NSString *substring = [self substringWithRange:range];
NSString *encoded = [substring stringByAddingPercentEncodingWithAllowedCharacters:allowedCharacterSet];
[escaped appendString:encoded];
index += range.length;
}
return escaped;
} else {
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wdeprecated-declarations"
CFStringEncoding cfEncoding = CFStringConvertNSStringEncodingToEncoding(NSUTF8StringEncoding);
NSString *encoded = (__bridge_transfer NSString *)
CFURLCreateStringByAddingPercentEscapes(
kCFAllocatorDefault,
(__bridge CFStringRef)self,
NULL,
CFSTR("!#$&'()*+,/:;=?@[]"),
cfEncoding);
return encoded;
#pragma clang diagnostic pop
}
}
- (NSString *)stringByURLDecode {
if ([self respondsToSelector:@selector(stringByRemovingPercentEncoding)]) {
return [self stringByRemovingPercentEncoding];
} else {
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wdeprecated-declarations"
CFStringEncoding en = CFStringConvertNSStringEncodingToEncoding(NSUTF8StringEncoding);
NSString *decoded = [self stringByReplacingOccurrencesOfString:@"+"
withString:@" "];
decoded = (__bridge_transfer NSString *)
CFURLCreateStringByReplacingPercentEscapesUsingEncoding(
NULL,
(__bridge CFStringRef)decoded,
CFSTR(""),
en);
return decoded;
#pragma clang diagnostic pop
}
}
- (NSString *)stringByEscapingHTML {
NSUInteger len = self.length;
if (!len) return self;
unichar *buf = malloc(sizeof(unichar) * len);
if (!buf) return self;
[self getCharacters:buf range:NSMakeRange(0, len)];
NSMutableString *result = [NSMutableString string];
for (int i = 0; i < len; i++) {
unichar c = buf[i];
NSString *esc = nil;
switch (c) {
case 34: esc = @"""; break;
case 38: esc = @"&"; break;
case 39: esc = @"'"; break;
case 60: esc = @"<"; break;
case 62: esc = @">"; break;
default: break;
}
if (esc) {
[result appendString:esc];
} else {
CFStringAppendCharacters((CFMutableStringRef)result, &c, 1);
}
}
free(buf);
return result;
}
- (CGSize)sizeForFont:(UIFont *)font size:(CGSize)size mode:(NSLineBreakMode)lineBreakMode {
CGSize result;
if (!font) font = [UIFont systemFontOfSize:12];
if ([self respondsToSelector:@selector(boundingRectWithSize:options:attributes:context:)]) {
NSMutableDictionary *attr = [NSMutableDictionary new];
attr[NSFontAttributeName] = font;
if (lineBreakMode != NSLineBreakByWordWrapping) {
NSMutableParagraphStyle *paragraphStyle = [NSMutableParagraphStyle new];
paragraphStyle.lineBreakMode = lineBreakMode;
attr[NSParagraphStyleAttributeName] = paragraphStyle;
}
CGRect rect = [self boundingRectWithSize:size
options:NSStringDrawingUsesLineFragmentOrigin | NSStringDrawingUsesFontLeading
attributes:attr context:nil];
result = rect.size;
} else {
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wdeprecated-declarations"
result = [self sizeWithFont:font constrainedToSize:size lineBreakMode:lineBreakMode];
#pragma clang diagnostic pop
}
return result;
}
- (CGFloat)widthForFont:(UIFont *)font {
CGSize size = [self sizeForFont:font size:CGSizeMake(HUGE, HUGE) mode:NSLineBreakByWordWrapping];
return size.width;
}
- (CGFloat)heightForFont:(UIFont *)font width:(CGFloat)width {
CGSize size = [self sizeForFont:font size:CGSizeMake(width, HUGE) mode:NSLineBreakByWordWrapping];
return size.height;
}
- (BOOL)matchesRegex:(NSString *)regex options:(NSRegularExpressionOptions)options {
NSRegularExpression *pattern = [NSRegularExpression regularExpressionWithPattern:regex options:options error:NULL];
if (!pattern) return NO;
return ([pattern numberOfMatchesInString:self options:0 range:NSMakeRange(0, self.length)] > 0);
}
- (void)enumerateRegexMatches:(NSString *)regex
options:(NSRegularExpressionOptions)options
usingBlock:(void (^)(NSString *match, NSRange matchRange, BOOL *stop))block {
if (regex.length == 0 || !block) return;
NSRegularExpression *pattern = [NSRegularExpression regularExpressionWithPattern:regex options:options error:nil];
if (!regex) return;
[pattern enumerateMatchesInString:self options:kNilOptions range:NSMakeRange(0, self.length) usingBlock:^(NSTextCheckingResult *result, NSMatchingFlags flags, BOOL *stop) {
block([self substringWithRange:result.range], result.range, stop);
}];
}
- (NSString *)stringByReplacingRegex:(NSString *)regex
options:(NSRegularExpressionOptions)options
withString:(NSString *)replacement; {
NSRegularExpression *pattern = [NSRegularExpression regularExpressionWithPattern:regex options:options error:nil];
if (!pattern) return self;
return [pattern stringByReplacingMatchesInString:self options:0 range:NSMakeRange(0, [self length]) withTemplate:replacement];
}
- (char)charValue {
return self.numberValue.charValue;
}
- (unsigned char) unsignedCharValue {
return self.numberValue.unsignedCharValue;
}
- (short) shortValue {
return self.numberValue.shortValue;
}
- (unsigned short) unsignedShortValue {
return self.numberValue.unsignedShortValue;
}
- (unsigned int) unsignedIntValue {
return self.numberValue.unsignedIntValue;
}
- (long) longValue {
return self.numberValue.longValue;
}
- (unsigned long) unsignedLongValue {
return self.numberValue.unsignedLongValue;
}
- (unsigned long long) unsignedLongLongValue {
return self.numberValue.unsignedLongLongValue;
}
- (NSUInteger) unsignedIntegerValue {
return self.numberValue.unsignedIntegerValue;
}
+ (NSString *)stringWithUUID {
CFUUIDRef uuid = CFUUIDCreate(NULL);
CFStringRef string = CFUUIDCreateString(NULL, uuid);
CFRelease(uuid);
return (__bridge_transfer NSString *)string;
}
+ (NSString *)stringWithUTF32Char:(UTF32Char)char32 {
char32 = NSSwapHostIntToLittle(char32);
return [[NSString alloc] initWithBytes:&char32 length:4 encoding:NSUTF32LittleEndianStringEncoding];
}
+ (NSString *)stringWithUTF32Chars:(const UTF32Char *)char32 length:(NSUInteger)length {
return [[NSString alloc] initWithBytes:(const void *)char32
length:length * 4
encoding:NSUTF32LittleEndianStringEncoding];
}
- (void)enumerateUTF32CharInRange:(NSRange)range usingBlock:(void (^)(UTF32Char char32, NSRange range, BOOL *stop))block {
NSString *str = self;
if (range.location != 0 || range.length != self.length) {
str = [self substringWithRange:range];
}
NSUInteger len = [str lengthOfBytesUsingEncoding:NSUTF32StringEncoding] / 4;
UTF32Char *char32 = (UTF32Char *)[str cStringUsingEncoding:NSUTF32LittleEndianStringEncoding];
if (len == 0 || char32 == NULL) return;
NSUInteger location = 0;
BOOL stop = NO;
NSRange subRange;
UTF32Char oneChar;
for (NSUInteger i = 0; i < len; i++) {
oneChar = char32[i];
subRange = NSMakeRange(location, oneChar > 0xFFFF ? 2 : 1);
block(oneChar, subRange, &stop);
if (stop) return;
location += subRange.length;
}
}
- (NSString *)stringByTrim {
NSCharacterSet *set = [NSCharacterSet whitespaceAndNewlineCharacterSet];
return [self stringByTrimmingCharactersInSet:set];
}
- (NSString *)stringByAppendingNameScale:(CGFloat)scale {
if (fabs(scale - 1) <= __FLT_EPSILON__ || self.length == 0 || [self hasSuffix:@"/"]) return self.copy;
return [self stringByAppendingFormat:@"@%@x", @(scale)];
}
- (NSString *)stringByAppendingPathScale:(CGFloat)scale {
if (fabs(scale - 1) <= __FLT_EPSILON__ || self.length == 0 || [self hasSuffix:@"/"]) return self.copy;
NSString *ext = self.pathExtension;
NSRange extRange = NSMakeRange(self.length - ext.length, 0);
if (ext.length > 0) extRange.location -= 1;
NSString *scaleStr = [NSString stringWithFormat:@"@%@x", @(scale)];
return [self stringByReplacingCharactersInRange:extRange withString:scaleStr];
}
- (CGFloat)pathScale {
if (self.length == 0 || [self hasSuffix:@"/"]) return 1;
NSString *name = self.stringByDeletingPathExtension;
__block CGFloat scale = 1;
[name enumerateRegexMatches:@"@[0-9]+\\.?[0-9]*x$" options:NSRegularExpressionAnchorsMatchLines usingBlock: ^(NSString *match, NSRange matchRange, BOOL *stop) {
scale = [match substringWithRange:NSMakeRange(1, match.length - 2)].doubleValue;
}];
return scale;
}
- (BOOL)isNotBlank {
NSCharacterSet *blank = [NSCharacterSet whitespaceAndNewlineCharacterSet];
for (NSInteger i = 0; i < self.length; ++i) {
unichar c = [self characterAtIndex:i];
if (![blank characterIsMember:c]) {
return YES;
}
}
return NO;
}
- (BOOL)containsString:(NSString *)string {
if (string == nil) return NO;
return [self rangeOfString:string].location != NSNotFound;
}
- (BOOL)containsCharacterSet:(NSCharacterSet *)set {
if (set == nil) return NO;
return [self rangeOfCharacterFromSet:set].location != NSNotFound;
}
- (NSNumber *)numberValue {
return [NSNumber numberWithString:self];
}
- (NSData *)dataValue {
return [self dataUsingEncoding:NSUTF8StringEncoding];
}
- (NSRange)rangeOfAll {
return NSMakeRange(0, self.length);
}
- (id)jsonValueDecoded {
return [[self dataValue] jsonValueDecoded];
}
+ (NSString *)stringNamed:(NSString *)name {
NSString *path = [[NSBundle mainBundle] pathForResource:name ofType:@""];
NSString *str = [NSString stringWithContentsOfFile:path encoding:NSUTF8StringEncoding error:NULL];
if (!str) {
path = [[NSBundle mainBundle] pathForResource:name ofType:@"txt"];
str = [NSString stringWithContentsOfFile:path encoding:NSUTF8StringEncoding error:NULL];
}
return str;
}
@end
|
Category Archives:Doors
Homeowners are becoming more discerning than ever before when it comes to the style of doors and windows they want. As a result, your showroom will often be the place where sales are potentially won or lost.
When it comes to taking everything that mother nature can throw at it – our recently enhanced LP400 316 Marine Grade Stainless Steel sleeved letter plate is best in class – proven against the new BS EN Air Permeability, Water Tightness and Wind Resistance tests.
You no longer need old style night latch and 5-lever mortice locks with multiple keys to achieve the heritage style look on your doors thanks to the launch of our enhanced Heritage Multipoint Locking Systems.
In fact, by using our Heritage Multipoint door locks you can not only get the look you are after, but combine that with the latest door lock technology to deliver vastly increased security and weather protection.
If you’ve ever had an issue with rusted and corroded locks and espag bolts then our revolutionary MACO TRICOAT range of door locks provide the perfect solution.
This fantastic range of door locks, window espagnolettes and Tilt & Turn systems have been specially developed to provide the ultimate in enhanced corrosion protection. Designed to be used in coastal locations, in areas of high pollution such as in large cities, in acidic timbers such as Accoya® and oak, and in buildings still undergoing construction phases with high dust or vapour content.
Living on an Island as we do presents some real issues and challenges when it comes to selecting the right door and window hardware – especially when you are looking at Multipoint Locking Systems.
Whilst you may think the issue of corrosion from salt may only really be an issue for buildings on the coast, According to new research from the Galvanizers Association(1) corrosion levels don’t really fall off until you are between 30 and 50 miles from the coast.
Whilst there has undoubtedly been a rising trend and popularity for contemporary doors and windows and in turn a more modern style of hardware, there remains a strong desire for classical hardware in the market.
And if you have customers who are looking for something more traditional the good news is that you can give them the best of both world’s - classical styling with cutting edge manufacturing quality and performance.
Our bestselling low profile aluminium thresholds for timber doors are so much more than an excellent weather barrier.
Providing a clean delineation between adjacent floor surfaces not only do they offer weatherproofing, our threshold plates provide an optimum-sealing surface against the bottom of your door.
Seals fitted to the base of doors are often problematic, causing excessive resistance over carpeted uneven floors, making the door difficult to open. Our hardwearing aluminium threshold cills effectively seal the door without the need for this, making it a more pleasant experience to open your door.
Designed to deliver quick and convenient access to a property without the need for a key, our new system allows homeowners to simply scan their fingerprint or use their mobile phone to open their front door. Security focused, our new Biometric Door Lock Kits use the very latest fingerprint recognition and mobile phone technology to provide a convenient, secure flexible door entry system.
Innovative technology features strongly in our new HS Portal SCV Lift & Slide system, which means we’ve been able to reduce your manufacturing time and deliver an enhanced life span with wider environmental benefits.
By listening to customers we’ve been able to design and create what we believe is the best Straight Sliding Wood Door System on the market today. Not only is the new HS Portal SCV Lift & Slide System quicker and easier to manufacture but it also has wider benefits.
Committed to developing new door and window hardware solutions, we’ve listened to feedback in the market concerning the issues being faced by customers with their current lift & slide timber door systems – and developed a new solution.
Addressing the needs of the market, our brand new HS Portal SCV Lift and Slide System is packed full of features and benefits for you and your customers.
The benefits of only using 316 Marine Grade quality stainless steel to manufacture its range of door and window hardware has been highlighted by blu™ after sailing through internationally recognised corrosion tests.
At Coastal we work with the World's leading manufacturers to put the best solutions at your fingertips. And when it comes to weatherseals - our work with Deventer will give your timber doors and windows both thermal and acoustic performance that is second to none.
Following customer complaints of leaking letter plates which flapped in the wind and provided no protection against intruders, our Technical team have designed the blu™ LP400 316 Stainless Steel Letter Plate.
With no need for any overheard structural support, the bottom rolling system for outward opening doors is ideal for orangeries, conservatories, new builds and extensions alike and comes with a wealth of benefits.
Here at Coastal providing our customers with a wide range of technical and practical support on a daily basis is part of life – we’re so much more than just a hardware supplier (even though we thrive at that also!)
One of the most common areas we’re asked to help on is the issue of door handing, lock sizes and which lock for which door system. So to help remove the pain and confusion around this, we’ve created a simple ‘Door Handing Diagram and Lock Chart’ along with some practical advice and guidance. You can download a ...
Our July special price promotions give you an unmissable opportunity to get your hands on a selection of our Multipoint Door Lock Kits and Handles. You won't want to miss these discounts!
Our multipoint door locks, supplied by Winkhaus, are Police Secured by Design approved and fully tested to PAS 24. Many of our handles are dual sprung and come with a Lifetime Guarantee. Offers end Monday 31st July so contact us today quoting the Promotional Code P1-0717 to secure your special prices.
ML3120 multi-point lock - increased security & weathersealing
Providing your customers with a high quality door system, featuring a wealth of user benefits has never been easier thanks to the ML3120 multi-point locking system from Coastal.
Combining security, convenience and performance in one system, the ML3120 automatic multi-point locking system has not only been tested to ‘Secure by Design’ Standards, but features wider benefits that include:
Reasons To Build Hollodeen Into Your Development Plans
It may not be a name you are familiar with but the highly innovative range of Hollodeen thresholds designed for standard, bi-fold and portal door systems, offer you a wide range of benefits way beyond the traditional materials being used currently. For not only are they durable, accessible (meeting Part M Regulations) and virtually indestructible, but they are also highly sustainable.
In fact, we think they come with so many benefits that once you try them, you’ll be sold on Hollodeen solutions.
So Why Hollodeen? Here’s 15 Good Reasons…
Why compare the performance of your weatherseal?
It's a fact that high quality weatherseal performance can make a big difference, providing excellent protection from all the elements – wind, water, smoke, fire and sound. And with our Tempo Weatherseal solutions from DEVENTER you can enjoy great results:
Click on the link below for more info on the benefits of our Tempo Weatherseal by DEVENTER:
It’s been 18 months since we first launched our Part Q initiative helping the door and window industry meet new Building Regulations and in that time have helped joinery firms across England meet the PAS24 standards.
Our Part Q initiative - has been designed to take the pressure away from joinery firms and has helped scores of them offer their customers a range of PAS24 compliant doors and windows without the huge time and financial burdens.
It’s not just us talking about the benefits of our Part Q initiative. Iain McIlwee of the British Woodworking Federation writes:
“ The team at Coastal Group are to be applauded for taking such a proactive approach to helping our small and medium sized joinery companies meet their Part Q responsibilities. Part Q created a unique challenge for the timber door and window manufacturing sector, but through prescriptive methods of compliance that the BWF has developed and companies such as Coastal rallying to provide cascadable test evidence, it has not been as disruptive as it could have been.”
Click on the link below for more info on how we can help you with Part Q:
Introducing Rolkär - the new name in bottom rolling bi-fold door systems. Available from stock for immediate delivery.
This innovative, bottom rolling, folding door system supports the weight of the doors along the base, removing the need for major structural building support. The result is a bi-fold door system that can be installed into virtually any space. By using advanced roller system technology directly underneath the door, Rolkär frees up design space creating a clean, minimalistic look which is barely visible when the doors are closed.
Designed to suit all tastes and needs from contemporary through to traditional, our range of high quality suited door and window handles will help your customers get the right look and feel for their property.
Our fully integrated range means no more spending time trying to find window handles that match their front door! What’s more we can even brand our suited range leaflet with your logo and details to make sure your customers enjoy a seamless service from you.
As the UK’s market leader in Marine Grade 316 hardware, blu™ understand the importance of offering a complete range of high performance solutions – products designed to complement each other perfectly.
Coastal stock a fantastic range of blu™ developed escutcheons, enabling you to create a beautiful finish both inside and out in conjunction with our range of stunning handles.
New to our escutcheon range is the KM056 – a simple, elegant square escutcheon finished in Satin stainless steel, designed to grace any external entrance door. It works brilliantly with our HAB4 Square section handle and the HAB7 offset square handle and adds to our range of round, oval, slim line and security escutcheons.
Manufactured with the same attention to detail and quality that goes into every one of the blu™ Marine Grade 316 stainless steel products, this escutcheon range will thrive even in the toughest, high corrosive, coastal locations.
It’s all too easy to get in a purchasing pattern when ordering window and door hardware, such as multipoint locks, and not see new and upgraded products that provide a range of enhanced features and benefits.
We noticed this recently with customers who have traditionally ordered our Multipoint Locks. Great products without a doubt. But not as good as our own innovative new 3 Star Euro Cylinder – the KABA pExtra Guard Cylinder.
The new cylinder provides a wealth of enhanced features including:
Patent protected key blanks to prevent illegal key copying
Meets Class 6 security standard EN1303
Compliance with PartQ building Regulations
Meets TS007, British Kitemark approved 3-Star Cylinder standards
Compliance Certificate available to show customer and building inspector
Use any lever handle of your choice and still comply
A fantastic new lock that protects homes from all common types of attack including drilling, picking, bumping, snapping and plug extraction.
We think you’ll our new KABA pExtra Guard Cylinder so much order one before June 30th and we will send you a bottle of red wine! Cheers.
Coastal Group, the leading external timber door and window hardware specialist, has enhanced its product portfolio, introducing a highly innovative, unbreakable and life-long Bi-fold threshold into its range, enabling the trade to say goodbye to the problems of rotting timber cills.
Manufactured in Germany from a high quality resin that is designed to look just like stone, the new Hollodeen® Bi-fold threshold provides a lifetime of durability, removing the need to buy, machine, finish timber and fit track.
Created from 90% recycled material, the Hollodeen® thresholds can be quickly and easily fitted by a single person, providing significantly increased lifespan and more efficient operation of bi-fold door sets.
Available in a range of colours – all designed to reflect stone finishes such as granite or marble – the resin used to create the new thresholds offer thermal advantages, the low heat conductivity prevents thermal bridges, reducing the linear heat losses that are unavoidable with other threshold options. It is sold in lengths from 2000mm to 6000mm in 250mm increments.
Recesses for shootbolts can be easily made on site where required, once installed the threshold is maintenance-free and never needs painting.
“We are absolutely delighted to add Hollodeen® to our product range, providing joinery manufacturers across the UK with a highly innovative threshold solution which overcomes all the traditional issues associated with bi-fold cills,” said Coastal Group Director Anthony Jenner. “Such is the durability of the resin, that the threshold lifespan is essentially unlimited as when it is exposed to moisture there is simply no risk of any rot. It’s also unbreakable, has a fire resistance of 30 minutes when used in conjunction with fire resistant doors and has exceptional thermal qualities,” added Anthony.
Coastal Group plans to make the Hollodeen® solutions available for standard door thresholds and sliding door systems.
At Coastal, we understand just how important our customers are to our business.
Core to this is listening to them and working with our manufacturing partners to proactively select and bring quality products and new solutions to the market wherever we can. With a constant focus on increasing longevity and added value to the external doors and windows market, backed up with a dedicated customer service that includes site, telephone and online support whenever it is needed, Coastal Specialist Ironmongery Ltd is setting the standard for quality. |
Earlier this month a group of Mexican reporters received Spanish-speaking media’s highest journalistic honor for an investigation that uncovered uncomfortable truths about Mexico’s university system. Long considered pillars of integrity in a country rife with corruption, investigative reporters revealed that some of those most respected universities were part of an organized money laundering system. About $400 million (U.S.) taxpayer dollars were syphoned into phantom businesses. Now, nearly half that money can’t be accounted for.
Castillo said there have been suspicions about Mexico’s university system since 2002. The nation’s auditor’s office reported a recurrent and systemic problem in 2010, through a series of open records requests, Castillo and her team were able to compare the auditor’s complaints against the state’s budgets.
“The system is made of cogs, each with a specific function,” She says. “The systemic aspect of it made it easy for all of the involved to funnel the money.”
Another thing that made it easy was that those involved operate with impunity. Often, when there is an investigation, the investigators are part of the system.
“When state colleges and universities are audited their impunity is guaranteed,” Castillo says. “There’s never any punishment.”
The public has responded with indignation over this case, but the problem is that the Mexican people are inundated with news about corruption cases. Castillo says there were protests but the lack of consequences for the bad actors meant nothing about the system changed.
“The way the government deals with these stories is that they ignore them,” she says. “They never address them. They don’t even give the illusion that they are working on a solution.”
Even though little has changed as a result of the work Castillo and her team have done she says it is still her responsibility to shed light on these issues.
“We fail if we stay quiet in the face of impunity simply because impunity goes unpunished,” she says. “The authority’s job is to bring justice. That’s not my job.”
The systemic corruption in Mexico’s government makes democratic change a very slow process. In spite of this, Castillo says many people are invested in changing the system.
“Perhaps, you don’t see it yet but I believe we are awakening the consciousness of people,” she says. “We may see the system changing with the upcoming presidential elections in Mexico.”
Written by Jeremy Steen.
The Talk of Texas
A weekly update of the top stories and statewide coverage right to your inbox |
Effective Use Of a Bluetooth Module
18May
Most engineers often face difficulty while dealing with the connectivity of their projects, however, a Bluetooth module can easily solve this problem. So, automation experts and IoT enthusiasts like to build their projects based around microcontrollers such as an Arduino or Raspberry Pi. Hence, these microcontrollers are unable to communicate with other devices unless we enable them with connectivity. So, this connectivity is often given to them through a Bluetooth module.
The Bluetooth modules are small in size. Hence, we can easily integrate it in our Arduino and other microcontroller projects. And as the name suggests, this module communicates with the devices around it by using the Bluetooth technology. So, it opens up a whole new range of possibilities from simple data transfer to the remote control.
1) GND
This pin basically serves to provide the ground for the circuit. So, providing a ground is an essential concept in electronics engineering and without this, no electronic gadget can truly function. Hence, this pin is a crucial part of a BLE module.
2) VCC
We use this pin for supplying power to the BLE module. So, this serves as the pivotal point which allows the Bluetooth module to draw in the required energy. Hence, VCC is by far the most important pin in any Bluetooth module.
3) RX
This pin primarily functions to receive any designated data from the specified network node or a certain nearby device. So, we use this pin to receive the desired instructions or information from other devices within a Bluetooth network or the very network itself. Hence, this pin establishes the basis for using the BLE module for IoT deployments.
4) TX
This pin allows the Bluetooth modules to send the designated data over to the network or close by devices. The designated data is often the one that is collected by the sensors that are attached to the microcontrollers. So, this pin truly unlocks the potential of a Bluetooth module. Whenever we want to place a Bluetooth module in a remote location for data gathering purposes, we rely on this pin to regularly send us the collected data and processed information.
This low power Bluetooth module features up to five 32-bit timers. So, these timers come with their own counter mode.
It has an NFC-A tag that significantly boosts the connectivity.
Electrical Features
This Bluetooth 4.0 module has a peak current of 5.3 mA in the TX pin.
This Bluetooth low energy module features a peak current of 5.4 mA in the RX pin.
The BLE module features its very own PPI.
These have 12-bit and 200 ksps ADC – 8 channels that are configurable. So, you can also program their gain.
It supplies voltage in the range of 3.6V to 1.7V
This module has an interface that has a single pin antenna.
3) MK10
Technical Specifications
It has a sensitivity of -95dBm in BLE mode.
It has a sensitivity of -103dBm over the long-range.
This Bluetooth 5.0 module features RSSI which has a resolution of 1dB.
It has a RAM of 256kB and a Flash of 1MB.
Its security is accelerated by HW.
It has multiple 128-bit co-processors which include AAR, ECB, CCM, and AES.
This BLE module features a USB2.0 controller.
It has around 48 I/O pins.
Its dimensions are 30.0×20.0x0.8mm.
It has an internal oscillator of 64MHz which allows for fast wake-up.
Electrical Features
The Tx pin has +8dBm of power.
It is compatible with nRF24L, nRF52, nRF24AP, and nRF24L series.
You can program its output from -20dB to +8dBm.
This offers a quite flexible power management system.
It supplies voltage in the range of 5,5V to 1.7V
For external components, it regulates the power supply from 3.3V to 1.8V.
The function of the Bluetooth Module
1) Inter-device connectivity
We primarily use a BLE module in our Arduino projects when we want our project to communicate with the devices around it. So, you can say that the primary purpose of a Bluetooth module is to instill connectivity in the microcontroller project. Hence, once our project is able to communicate with the devices around it, we can then proceed to further developments.
2) Data Collection and Transmission
One of the major reasons for deploying IoT projects is to collect data. Some examples are monitoring temperature, pressure, humidity, etc. So, once the sensors in our IoT project collect the data, we need them to send it to us. For this purpose, we use a BLE module which enables the microcontroller to effectively transmit the collected data.
3) Automation
One of the major reasons why we develop and deploy IoT projects through microcontrollers is that we are looking for automation. So, automation is the concept where routine tasks are performed automatically through the help of technology. For instance, sounding an alarm whenever there is a fire or emptying a gas container when the pressure is too high. Hence, automation is highly preferable in industrial IoT applications. However, we cannot achieve automation without leveraging the capabilities of a BLE module. Hence, a BLE module allows the microcontrollers to send instructions to relevant mechanical systems through the help of Bluetooth signals.
4) Remote Control
Controlling objects far away from us is known as a remote control. However, we can only achieve these with the help of a BLE module. Therefore, a BLE module makes it possible for us to send relevant commands to the distant electronic objects. Hence, this way we don’t have to put in much effort, and yet we are easily able to perform the same task from a distance.
Applications of Bluetooth Module
1) Robotics
The biggest application of a BLE module is in the field of robotics. Hence, we can control the movement and actions of a robot by using its Bluetooth capabilities. For this purpose, we use Arduino for building the robot and then integrate the Bluetooth module with it. So, we can then use a dedicated app to control the way the robot moves. Additionally, we can also control what the robot does as long as we are within the Bluetooth range.
2) Security
Every smart device is enabled with Bluetooth these days. And every device has a unique Bluetooth identifier. So, we can harness this capability for the purpose of security applications. For instance, we want to secure the entrance to a certain house. For this purpose, we will build a validator by using Arduino and a BLE module. So, we will then install it near the entrance gate. So, when a person tries to enter the house, the validator will scan the Bluetooth identifier of that person’s smartphone. Hence, if the identifier is recognized as an authorized person then he will be allowed to enter. However, if the identifier is unrecognized then the validator will alert the inhabitants of the house.
3) Asset Management and Tracking
Large warehouses and departmental stores often struggle with keeping track of their inventory. So, the major problems are that the size of the store is too large and manual labor is just not sufficient to search the whole store if an item goes missing. This is where a BLE module can come in handy. So, we can attach beacons with an important inventory. And a central Bluetooth module will establish secure communication with each beacon. So, we can use this link to triangulate the location of our inventory and easily find it if it is misplaced.
How to use a Bluetooth Module?
If you are acquainted with microcontrollers such as an Arduino then it is fairly simple. Therefore, the following is a step by step guide for using a Bluetooth module.
1) Connect the Bluetooth Module with Arduino
As we have discussed earlier, Bluetooth modules have four pins. So, you have to connect each of these pins to a respective component of the Arduino.
RX pin of the BLE module is connected with the RX pin of the Adriano
TX pin of the BLE module is connected with the TX pin of the Adriano
Connect a 5V battery to the VCC pin of the Bluetooth Module
GND pin of the BLE module is connected with the GND pin of the Adriano
2) Put the instructions in the form of a code
Arduino has its own language and IDE. So, any instructions that you want to give to the Bluetooth module, you must convert them in the form of an Arduino code.
3) Upload the instructions (Code) on the Arduino
Then you have to upload the code onto Arduino by using the dedicated USB port. So, now the Bluetooth module is active and ready to use.
4) Deployment of the Bluetooth Module
Now you can deploy the BLE module along with the Arduino to your chosen IoT application.
Wiring mode
Connecting with RJ25
The BLE Module often has a gray or blue ID. Hence, when we are using RJ25, we must connect the port with gray or blue ID on Makeblock Orion.
Connecting with Dupont wire
When we use the Dupont wire for establishing a connection between the Arduino board and the Bluetooth module then we have to connect the digital port 0 and 1 with the RX and TX pins.
Guide to programming
For feeding instructions into the Bluetooth module, we need to convert them into code by using the Arduino language. As we all know that every programming language has some dedicated libraries, hence, Arduino has its own special libraries. So, when you are using the BLE module then you should use the Makeblock-Library-master. So, we highly recommend that you should thoroughly test your code and how the Bluetooth module responds to it before actually deploying it. Arduino has an IDE of its own which has built-in debugging features. Hence, you can use those to optimize the performance of your code. |
Gestational exposure to tetrabutyltin blocks rat fetal Leydig cell development.
Tetrabutyltin is a stable organotin and may exhibit endocrine disrupting properties. Herein, we investigated effects of tetrabutyltin on the development of rat fetal Leydig cells, which support differentiation of the male reproductive tract in late gestation. Female pregnant Sprague Dawley rats were gavaged with tetrabutyltin (0, 100, 200, and 500 mg/kg) from gestational day (GD) 12 to GD 21. Tetrabutyltin dose-dependently decreased testicular testosterone levels (0.756 ± 0.208 and 0.813 ± 0.277 ng/testis at the 200 and 500 mg/kg doses, respectively) compared to control (1.692 ± 0.218 ng/testis) at GD 21. Furthermore, tetrabutyltin induced fetal Leydig cell aggregation, decreased fetal Leydig cell size and cytoplasmic size at the ≥100 mg/kg doses, and downregulated the expression levels of Scarb1, Cyp17a1, and Insl3 at doses ≥100 mg/kg and Star expression at 200 mg/kg. Taking together, the present results indicated that prenatal exposure of male rats to tetrabutyltin affected fetal Leydig cell development. |
Paracellular glucose transport plays a minor role in the unanesthetized dog.
Traditionally, intestinal glucose absorption was thought to occur through active, carrier-mediated transport. However, proponents of paracellular transport have argued that previous experiments neglected effects of solvent drag coming from high local concentrations of glucose at the brush-border membrane. The purpose of this study was to evaluate glucose absorption in the awake dog under conditions that would maximize any contribution of paracellular transport. Jejunal Thiry-Vella loops were constructed in six female mongrel dogs. After surgical recovery, isotonic buffers containing L-glucose as the probe for paracellular permeability were given over 2-h periods by constant infusion pump. At physiological concentrations of D-glucose (1-50 mM), the fractional absorption of L-glucose was only 4-7% of total glucose absorption. Infusion of supraphysiological concentrations (150 mM) of D-glucose, D-maltose, or D-mannitol yielded low-fractional absorptions of L-glucose (2-5%), so too did complex or nonabsorbable carbohydrates. In all experiments, there was significant fractional water absorption (5-19%), a prerequisite for solvent drag. Therefore, with even up to high concentrations of luminal carbohydrates in the presence of significant water absorption, the relative contribution of paracellular glucose absorption remained low. |
If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
Beast-Man buck, Keldor/PG boots, Tri-Klops armor, paint the whole thing pink and toss on a new head. Bam. For whatever reason, I've been thinking he'd make a very cool member of the Horde. Not sure how that idea popped into my head, but I'm running with it.
a lot of people keep saying tri-klops armor. personally, i really hope they do the character justice and try to approximate the outfit from the cartoon as much as possible- with maybe just a slight bit of extra detailing. this goes for his boots as well. let's do plundor right!
Add Stinkor forearms (assembled CORRECTLY) and that's how I envision him as well.
Originally Posted by Bri-Man
a lot of people keep saying tri-klops armor. personally, i really hope they do the character justice and try to approximate the outfit from the cartoon as much as possible- with maybe just a slight bit of extra detailing. this goes for his boots as well. let's do plundor right!
I think it's because Filmation took toy designs and simplified them (He-Man's belt and bracelets) and in some cases took two different characters with the same toy design and slightly differentiated them (Teela and Evil Lynn). On that basis, it is very reasonable to assume that had Plundor actually been made as a toy in the 80's he would have had Tri-Klop's armor.
Plus, recreating a Filmation design 100% in Classics makes the figure look a little plain. Take Eternos Palace King Randor for instance. Many people thought his belt looked too plain but it matched exactly what was in the cartoon. If he had the standard He-Man belt (Just belt. I'm not suggesting the furry undershorts) then he would have blended in with the other MOTUC figures much better.
"There's only one Master of the Universe and it's He-Man." - Stephen Colbert
"The heart has its reasons of which reason knows nothing." - Blaise Pascal
Not a fan of this Character. Never cared for thr easter egg robot knights. To me Plundor is a rip off of Skeletor in that one episode. I'm sure he will be made sind he is mostly a reuse of parts, but again I'm not a fan of this character.
Add Stinkor forearms (assembled CORRECTLY) and that's how I envision him as well.
I think it's because Filmation took toy designs and simplified them (He-Man's belt and bracelets) and in some cases took two different characters with the same toy design and slightly differentiated them (Teela and Evil Lynn). On that basis, it is very reasonable to assume that had Plundor actually been made as a toy in the 80's he would have had Tri-Klop's armor.
Plus, recreating a Filmation design 100% in Classics makes the figure look a little plain. Take Eternos Palace King Randor for instance. Many people thought his belt looked too plain but it matched exactly what was in the cartoon. If he had the standard He-Man belt (Just belt. I'm not suggesting the furry undershorts) then he would have blended in with the other MOTUC figures much better.
you make some good points. however, in terms of forearms, i think they should go with zodak. in fact, now that i'm looking at him i think his boots would work for plundor as well.
- - - Updated - - -
Originally Posted by mjw41
Not a fan of this Character. Never cared for thr easter egg robot knights. To me Plundor is a rip off of Skeletor in that one episode. I'm sure he will be made sind he is mostly a reuse of parts, but again I'm not a fan of this character.
if by "rip-off" you mean create a character that is very different, then, yeah i guess. if it's because he uses robot guards- well, robots were in high demand as fodder for he-man because they were the only enemies he was allowed to destroy. in any case, thanks for your support by bumping this thread.
You're right about Zodak, the gloves are a nearly perfect match. I think the Tri-Klops armor would be acceptable though. I want Plundor to be so amazing that even those that hate the character fall in love with the figure! We know it's possible.
Not a fan of this Character. Never cared for thr easter egg robot knights. To me Plundor is a rip off of Skeletor in that one episode. I'm sure he will be made sind he is mostly a reuse of parts, but again I'm not a fan of this character.
I love rip offs. The MOTU line is filled with them. Like Faker for instance. Faker is a rip off of He-Man with Skeletor armor.
Originally Posted by Bri-Man
however, in terms of forearms, i think they should go with zodak.
The only reason I suggested Stinkor's forearms is because they are sculpted with furry upper forearms to match the furry Beastman biceps whereas the Zodak gloves have smooth upper forearms which would clash with the furry biceps. I do agree that the Zodak gloves look better for the character than the Stinkor gloves. But my choice was based on the texture of the forearms. On a side note, I would have preferred Stinkor's forearms to have been sculpted with Zodak style gloves in the first place.
Originally Posted by He-Dad
I want Plundor to be so amazing that even those that hate the character fall in love with the figure! We know it's possible.
I hope for this as well.
Last edited by FAKER II; March 9, 2013 at 11:17am.
"There's only one Master of the Universe and it's He-Man." - Stephen Colbert
"The heart has its reasons of which reason knows nothing." - Blaise Pascal
The only reason I suggested Stinkor's forearms is because they are sculpted with furry upper forearms to match the furry Beastman biceps whereas the Zodak gloves have smooth upper forearms which would clash with the furry biceps. I do agree that the Zodak gloves look better for the character than the Stinkor gloves. But my choice was based on the texture of the forearms. On a side note, I would have preferred Stinkor's forearms to have been sculpted with Zodak style gloves in the first place.
I agree with you as well! Maybe they could swap the gloves and use the furry arms. That really would be Ideal.
You're right about Zodak, the gloves are a nearly perfect match. I think the Tri-Klops armor would be acceptable though. I want Plundor to be so amazing that even those that hate the character fall in love with the figure! We know it's possible.
completely agree, though not to the degree of turning the character into something he's not. i don't worry about that too much though. the 4H have been pretty good about finding a balance between re-using parts and staying true true to the characters roots- no matter what medium they got their start in.
- - - Updated - - -
Originally Posted by FAKER II
The only reason I suggested Stinkor's forearms is because they are sculpted with furry upper forearms to match the furry Beastman biceps whereas the Zodak gloves have smooth upper forearms which would clash with the furry biceps. I do agree that the Zodak gloves look better for the character than the Stinkor gloves. But my choice was based on the texture of the forearms. On a side note, I would have preferred Stinkor's forearms to have been sculpted with Zodak style gloves in the first place.
you're right, you're right...well, i won't mind either way...i have no doubts that he'll still rock when all is said and done.
-Should Plundor come with one of his eggbots just like Shokoti includes one of her darklings?
-Should he be in a pack with Gleedal?
Some thoughts:
-Plundor requires relatively little new tooling (could be done with essentially just a new head), so new tooling could be used for his eggbots.
-Gleedal requires relatively little new tooling too (new head and feet, and possibly new forearms and thighs), and her cat could be a repainted Cringer with just a new head, so new tooling could be used for the schminivits.
-Plundor+Eggbot would be similar to Orko+PrinceAdam, and Gleedal+cat+schminivit similar to Marlena+Glenn+Cringer, so a convention-exclusive (or some such) Plundor+Gleedal pack could include all 5 characters for something like $60 (the price of a "double" Ram Man-sized release).
I cant help to wonder what plundor and Gleadal would have looked like if ever they were done in 200X style? plunder and eggbot pack Gleadal and Schmidt pack. or just the two in a pack but i prefer them to be seperate as i display them by factions. I feel the could be great adds for the line.
Not a fan of Plundor. I understand that many fans want him and I wouldn't mind having him in MOTUC at some point. Still there are many other Filmation characters I hope we get before him (Scorpia, Lizard Man, Madame Razz, Strongarm, Granita, Sea Hawk, Huntara...)
With all these topics coming up about how much "everyone" dislikes Plundor and how Plundor is at best a D-list character, I'd like to go on record and say i'm not "everyone". I think Plundor's an awesome character I hope we are getting him soon. Thank you.
With all these topics coming up about how much "everyone" dislikes Plundor and how Plundor is at best a D-list character, I'd like to go on record and say i'm not "everyone". I think Plundor's an awesome character I hope we are getting him soon. Thank you.
Sadly not everyone understood Plundor but in the poll section I see only Nepthu dislikers...
Plundor is not a character I am really anxious to get. But, for those that want him, that's cool. There are characters I want that I know other people dislike. I'm sad that I probably won't get them though.
Well it is super rare that i show any support for any figure but Mermista.
I think only Octavia and now that we got her...
My #1 is Mermista.
If she were to be revealed at SDCC it would then be Plundor!
I think i love thus guy for the reasons why so many don't like him!
He is out of place he is strange and thats so great in such an odd...OMGosh i have an evil pink motuc rabbit figure!
MUST OWN!
I don't want him to be too freakish or evil looking. I think that completely changes his uniqueness!
His not being what he appears to be!
I LOVE that about him.
He-Man looks good.
Skelator looks evil.
She-Ra looks good.
Hordak looks evil.
Plundor looks like he should be good...that is UNIQUE in MOTU.
He breaks the mold!
- - - Updated - - -
Well it is super rare that i show any support for any figure but Mermista.
I think only Octavia and now that we got her...
My #1 is Mermista.
If she were to be revealed at SDCC it would then be Plundor!
I think i love thus guy for the reasons why so many don't like him!
He is out of place he is strange and thats so great in such an odd...OMGosh i have an evil pink motuc rabbit figure!
MUST OWN!
I don't want him to be too freakish or evil looking. I think that completely changes his uniqueness!
His not being what he appears to be!
I LOVE that about him.
He-Man looks good.
Skelator looks evil.
She-Ra looks good.
Hordak looks evil.
Plundor looks like he should be good...that is UNIQUE in MOTU.
He breaks the mold!
I used to hate this guy because he's such a cheesy, lazy design, but I've come to accept that we're probably going to get him based on recent rumours, and I have faith that the 4H can actually rescue him from utter lameness. I just hope the head doesn't wind up too goofy looking, without also straying too far from the Filmation look. |
Q:
How to retrieve the head of a html document using YQL?
I'm curious if this is possible at all since a "select * from html" query only returns the body of the document.
A:
Finally found the answer. (EDIT : thanks to Salathe on the YQL forums!)
select * from html where url="http://stackoverflow.com" and xpath='/html/head/title'
|
Q:
Botão não funciona quando o código é agregado ao AbstractTableModel
Criei um projeto teste para implementar em um projeto maior de uma tabela com um botão como um dos elementos da linha. Ela funciona perfeitamente, mas quando vou tentar agregar ao meu código o botão não executa a ação que foi programada. Ele está sendo feito com AbstractTableModel. Alguém tem uma ideia de onde pode estar o problema?
Projeto testável do que preciso fazer:
Tabela.java
public class Tabela extends JFrame{
public Tabela(){
super("Teste de Componentes na Coluna");
Object[][] data = {
{"1", "Azul", new Integer(2013), "21"},
{"2", "Roxo", new Integer(2013), "1"},
{"3", "Preto", new Integer(2013), "2"},
{"4", "Vermelho", new Integer(2013), "8"},
{"5", "Rosa", new Integer(2013), "70"},
{"6", "Verde", new Integer(2013), "10"}
};
String columnHeaders[] = {"Position", "Color", "Last Year Won", "Trophies"};
JTable table = new JTable(data,columnHeaders);
table.getColumnModel().getColumn(1).setCellRenderer(new ButtonRenderer());
table.getColumnModel().getColumn(1).setCellEditor(new ButtonEditor(new JTextField()));
JScrollPane pane = new JScrollPane(table);
getContentPane().add(pane);
setSize(450,100);
setDefaultCloseOperation(EXIT_ON_CLOSE);
}
/**
* @param args the command line arguments
*/
public static void main(String[] args) {
Tabela t = new Tabela();
t.setVisible(true);
}
class ButtonRenderer extends JButton implements TableCellRenderer{
public ButtonRenderer(){
setOpaque(true);
}
@Override
public Component getTableCellRendererComponent(JTable table, Object obj,
boolean selected, boolean focused, int row, int col) {
setText((obj == null) ? "":obj.toString());
return this;
}
}
class ButtonEditor extends DefaultCellEditor{
protected JButton btn;
private String lbl;
private Boolean clicked;
public ButtonEditor(JTextField txt){
super(txt);
btn = new JButton();
btn.setOpaque(true);
btn.addActionListener(new ActionListener(){
@Override
public void actionPerformed(ActionEvent e) {
fireEditingStopped();
}
});
}
public Component getTableCellEditorComponent(JTable table, Object obj, boolean selected, int row, int col){
lbl = (obj == null) ? "":obj.toString();
btn.setText(lbl);
clicked = true;
return btn;
}
public Object getCellEditorValue(){
if(clicked){
JOptionPane.showMessageDialog(btn, lbl + "Clicked");
}
clicked = false;
return new String(lbl);
}
public boolean stopCellEditing(){
clicked = false;
return super.stopCellEditing();
}
protected void fireEditingStopped(){
super.fireEditingStopped();
}
}
}
Projeto onde a tabela deve ser agregada:
PendenciaView.java
public class PendenciaView extends JPanel {
private JTextField txtId;
PendenciaTableModel tableModel = new PendenciaTableModel();
private final JTable table;
/**
* Create the panel.
*/
public PendenciaView() {
setLayout(null);
setSize(794, 548);
JLabel lblListaDePendencias = new JLabel("Lista de Pend\u00EAncias:");
lblListaDePendencias.setBounds(10, 11, 120, 14);
add(lblListaDePendencias);
JLabel lblFiltrarPor = new JLabel("Filtrar por:");
lblFiltrarPor.setBounds(10, 464, 60, 14);
add(lblFiltrarPor);
JLabel lblCategoria = new JLabel("Categoria:");
lblCategoria.setBounds(89, 489, 60, 14);
add(lblCategoria);
JComboBox cmbCategoria = new JComboBox();
cmbCategoria.setBounds(160, 486, 150, 20);
cmbCategoria.addItem("Todas");
cmbCategoria.addItem("Pedido");
cmbCategoria.addItem("Produto");
cmbCategoria.addItem("Categoria");
cmbCategoria.addItem("Comprador");
add(cmbCategoria);
JLabel lblDataDeInicio = new JLabel("Data de In\u00EDcio:");
lblDataDeInicio.setBounds(327, 486, 90, 14);
add(lblDataDeInicio);
JDateChooser dcDataDeInicio = new JDateChooser();
dcDataDeInicio.setBounds(427, 486, 130, 20);
add(dcDataDeInicio);
dcDataDeInicio.setDateFormatString("dd/MM/yyyy");
JLabel lblDataDeFim = new JLabel("Data de Fim:");
lblDataDeFim.setBounds(567, 489, 77, 14);
add(lblDataDeFim);
JDateChooser dcDataDeFim = new JDateChooser();
dcDataDeFim.setBounds(654, 486, 130, 20);
add(dcDataDeFim);
dcDataDeFim.setDateFormatString("dd/MM/yyyy");
JLabel lblId = new JLabel("ID:");
lblId.setBounds(10, 489, 15, 14);
add(lblId);
txtId = new JTextField();
txtId.setBounds(28, 486, 51, 20);
add(txtId);
txtId.setColumns(10);
JButton btnFiltrar = new JButton("Filtrar");
btnFiltrar.setBounds(695, 514, 89, 23);
add(btnFiltrar);
JPanel panel = new JPanel();
panel.setBounds(10, 31, 774, 380);
add(panel);
panel.setLayout(null);
table = new JTable(tableModel);
table.setBounds(0, 0, 774, 380);
panel.add(table);
JScrollPane scrollPane = new JScrollPane(table);
scrollPane.setBounds(0, 0, 774, 380);
panel.add(scrollPane);
table.setAutoResizeMode(JTable.AUTO_RESIZE_ALL_COLUMNS);
JButton btnRemoverPendencias = new JButton("Remover Pend\u00EAncias");
btnRemoverPendencias.addActionListener(new ActionListener() {
public void actionPerformed(ActionEvent arg0) {
//Remove uma linha
if(table.getSelectedRow() != -1){
tableModel.removeRow(table.getSelectedRow());
}
}
});
btnRemoverPendencias.setBounds(10, 422, 157, 23);
add(btnRemoverPendencias);
//"Selecionar", "ID", "Pendência", "Data e Hora", "Descrição", "Detalhes"
table.getColumnModel().getColumn(0).setMaxWidth(70);
table.getColumnModel().getColumn(1).setMaxWidth(50);
table.getColumnModel().getColumn(2).setMaxWidth(180);
table.getColumnModel().getColumn(3).setMaxWidth(100);
table.getColumnModel().getColumn(4).setMaxWidth(300);
table.getColumnModel().getColumn(5).setMaxWidth(80);
PendenciaModel pm = new PendenciaModel();
pm.setSelecionado(true);
pm.setId(1);
pm.setPendencia("BlaBlaBla");
Date d = new Date();
pm.setDataHora(d);
pm.setDescricao("Erafoene vpanpvev np aevnrvpnaep");
pm.setDetalhes("Abrir");
tableModel.addRow(pm);
PendenciaModel pm2 = new PendenciaModel();
pm2.setSelecionado(true);
pm2.setId(2);
pm2.setPendencia("Vdioandd");
Date d2 = new Date();
pm2.setDataHora(d2);
pm2.setDescricao("abdcdgae aefin aefioanfe aiefn");
pm2.setDetalhes("Abrir");
tableModel.addRow(pm2);
Object[][] data = {
{true, 1, "Azul", new Date(), "Bçlasncaio evwiwwe wavejh", "Abrir"},
{true, 1, "Roxo", new Date(), "Bçlasncaio evwiwwe wavejh", "Abrir"},
{true, 1, "Verde", new Date(), "Bçlasncaio evwiwwe wavejh", "Abrir"},
{true, 1, "Rosa", new Date(), "Bçlasncaio evwiwwe wavejh", "Abrir"},
{true, 1, "Branco", new Date(), "Bçlasncaio evwiwwe wavejh", "Abrir"},
};
table.getColumnModel().getColumn(5).setCellRenderer(new ButtonRenderer());
table.getColumnModel().getColumn(5).setCellEditor(new ButtonEditor(new JTextField()));
}
class ButtonRenderer extends JButton implements TableCellRenderer{
public ButtonRenderer(){
setOpaque(true);
}
@Override
public Component getTableCellRendererComponent(JTable table, Object obj,
boolean selected, boolean focused, int row, int col) {
setText((obj == null) ? "":obj.toString());
return this;
}
}
class ButtonEditor extends DefaultCellEditor{
protected JButton btn;
private String lbl;
private Boolean clicked;
public ButtonEditor(JTextField txt){
super(txt);
btn = new JButton();
btn.setOpaque(true);
btn.addActionListener(new ActionListener(){
@Override
public void actionPerformed(ActionEvent e) {
fireEditingStopped();
}
});
}
public Component getTableCellEditorComponent(JTable table, Object obj, boolean selected, int row, int col){
lbl = (obj == null) ? "":obj.toString();
btn.setText(lbl);
clicked = true;
return btn;
}
public Object getCellEditorValue(){
if(clicked){
JOptionPane.showMessageDialog(btn, lbl + "Clicked");
}
clicked = false;
return new String(lbl);
}
public boolean stopCellEditing(){
clicked = false;
return super.stopCellEditing();
}
protected void fireEditingStopped(){
super.fireEditingStopped();
}
}
}
PendenciaTableModel.java
public class PendenciaTableModel extends AbstractTableModel {
private List<PendenciaModel> dados = new ArrayList<>();
private String[] colunas = {"Selecionar", "ID", "Pendência", "Data e Hora", "Descrição", "Detalhes"};
@Override
public String getColumnName(int column){
return colunas[column];
}
@Override
public int getColumnCount() {
return colunas.length;
}
@Override
public int getRowCount() {
return dados.size();
}
@Override
public Object getValueAt(int linha, int coluna) {
switch(coluna){
case 0:
return dados.get(linha).getSelecionado();
case 1:
return dados.get(linha).getId();
case 2:
return dados.get(linha).getPendencia();
case 3:
return dados.get(linha).getDataHora();
case 4:
return dados.get(linha).getDescricao();
case 5:
return dados.get(linha).getDetalhes();
}
return null;
}
public void addRow(PendenciaModel pm) {
this.dados.add(pm);
this.fireTableDataChanged();
}
public void removeRow(int linha){
this.dados.remove(linha);
this.fireTableRowsDeleted(linha, linha);
}
}
PendenciaModel.java
public class PendenciaModel {
private boolean selecionado;
private int id;
private String pendencia;
private Date dataHora;
private String descricao;
private String detalhes;
public boolean getSelecionado() {
return selecionado;
}
public void setSelecionado(boolean selecionado) {
this.selecionado = selecionado;
}
public int getId() {
return id;
}
public void setId(int id) {
this.id = id;
}
public String getPendencia() {
return pendencia;
}
public void setPendencia(String pendencia) {
this.pendencia = pendencia;
}
public Date getDataHora() {
return dataHora;
}
public void setDataHora(Date dataHora) {
this.dataHora = dataHora;
}
public String getDescricao() {
return descricao;
}
public void setDescricao(String descricao) {
this.descricao = descricao;
}
public String getDetalhes() {
return detalhes;
}
public void setDetalhes(String detalhes) {
this.detalhes = detalhes;
}
}
A:
Da forma que está fazendo, além de usar de forma incorreta o DefaultCellEditor, que espera um JTextField e você está usando um JButton, também terá dificuldades depois para recuperar o objeto da linha do botão.
Gostaria de propor uma solução mais robusta, que não precisa utilizar editores e nem renderes, criada pelo usuário camickr, onde a classe ButtonColumn adiciona um botão em cada coluna da tabela de forma automática, deixando pra você apenas a parte de definir a ação a ser tomada quando houver o clique.
Para configurar no seu código, basta copiar a classe do link pro seu projeto e instanciar conforme abaixo:
ButtonColumn buttonColumn = new ButtonColumn(table, action, columnIndex);
onde table é a sua tabela, action é a ação que o botão terá e columnIndex é o índice da coluna onde o botão será exibido.
Para fins demonstrativos, criei a action abaixo que exibe a linha que foi clicada:
Action mostrarDetalhes = new AbstractAction() {
@Override
public void actionPerformed(ActionEvent e) {
//recupera a tabela
JTable table = (JTable)e.getSource();
//recupera a linha onde houve o clique
int modelRow = Integer.valueOf(e.getActionCommand());
JOptionPane.showMessageDialog(null, "Linha " + modelRow + " foi clicada");
}
};
ButtonColumn buttonColumn = new ButtonColumn(table, mostrarDetalhes, 5);
O resultado deste exemplo implementado no seu codigo fica:
Apenas salientando o aviso do autor da classe, a coluna precisa ser editável, logo, também é necessário aplicar a dica da resposta do Carlos.
|
Greenhouse gas could be a huge untapped source of energy, generating '400 times as much power as the Hoover Dam'
Dutch scientists have come up with a new technique to unlock the power of waste carbon dioxide pumped out of current power plants
The Centre of Excellence for Sustainable Water Technology believes its method could produce 1,570 billion kilowatts of electricity annually
The technology is not ready yet but it is hoped it could be used instead of expanding current power plants to meet increasing demand for electricity
A new method for producing electricity from waste carbon dioxide emitted by power stations could be so efficient that it has the potential to create 400 times the amount of power that the Hoover Dam generates in a year, Dutch scientists have claimed.
Researchers from the Centre of Excellence for Sustainable Water Technology in the Netherlands believe they have come up with a new technique to unlock the power of waste carbon dioxide pumped out of current power plants.
Their system involves mixing water and other liquids with combustion gas comprising a high concentration of carbon dioxide that are pumped between two membranes to produce an electric current.
Splitting water with sunlight is described by the U.S. scientists as the Holy Grail of a sustainable hydrogen economy. Hydrogen could be used as a greener alternative to fuel road transport, in distributed heat and power generation, and for energy storage
Described in the American Chemical Society's journal Environmental Science & Technology Letters, the method uses waste gases from power stations and industrial smoke stacks as a raw material to generate electricity.
The scientists said that over 12 billion tonnes of carbon dioxide is created annually from coal, oil and natural gas power stations, while home and commercial heating systems generate another 11 billion tonnes of the greenhouse gas.
The team came up with a way to use the waste gas from power stations, industry and homes that they believe could produce a staggering 1,570 billion kilowatts of electricity annually.
The power equates to around 400 times the annual electrical output of the Hoover Dam, according to Bert Hamelers, a programme director at the centre.
He pointed out that the electricity produced would not add any extra carbon dioxide to the atmosphere.
The scientists have come up with a way to use the waste gas from power stations, industry and homes that they believe could produce a staggering 1,570 kilowatts of electricity annually. The power equates to around 400 times the annual electrical output of the Hoover Dam (pictured)
THE TECHNOLOGY IN NUMBERS
12 billion tonnes of carbon dioxide is created annually from coal, oil and natural gas power stations
11 billion tonnes of the greenhouse gas is generated by home and commercial heating systems
1,570 billion kilowatts of electricity per year is what the scientists predict their technique could produce using waste gas from power stations industry and homes, which is...
400 times the electrical output of the Hoover Dam located on the Colorado River between the US states of Arizona and Nevada
However, it will not remove carbon dioxide from the earth's atmosphere like carbon capture and storage techniques are intended to do.
Dr Hamelers told NBC News : 'You use the energy that is now wasted.
'You bring it in and get the extra energy out, but you cannot sequester it.'
Carbon capture and storage (CCS) is the process of collecting carbon dioxide from places like power plants and taking it to a storage site where it is buried in an underground geological formation, instead of entering the atmosphere.
CCS has the potential to curb the contribution of fossil fuel emissions to global warming but although the method has been commercially used, the long-term storage of carbon dioxide is still a relatively new concept.
There is also some way to go before the technology developed by the Dutch scientists can be used on a massive scale as it is currently a proof-of-concept technique.
To test their theory, Dr Hamelers and his team used a well-known experiment to create bubbles of the gas and air through a liquid, NBC News reported.
More development of the technology is necessary before it can be tested on a real power station (pictured). It is hoped that the method of generating extra energy could be used instead of expanding current power plants to meet increasing demand for electricity
Currently the process uses more energy than it produces but membrane-based processes that are proposed by the scientists to use in the 'real' technology use less energy.
Dr Hamelers said: ' The objective for us was to show that, yes, there is this source of energy and, yes, you can harvest it.'
Although he conceded that more development of the technology is necessary before it can be tested on a real power station.
|
CBS Sports' Jon Heyman reports in a tweet that the negotiations could take a little while to be complete:
https://twitter.com/JonHeymanCBS/status/300720242269749248
Hernandez has pitched 1,620 innings in his eight-year career, all of which has been spent with the Mariners. Hernandez has made the All-Star game three out of the last four seasons and won the AL Cy Young award in 2010. |
<div class="weui-mask" [ngClass]="{ 'weui-mask__in': _shown }" (click)="hide(true)"></div>
<div class="weui-dialog" [ngClass]="{
'weui-dialog__in': _shown,
'weui-skin_android': config.skin === 'android',
'weui-dialog__prompt': config.type === 'prompt'
}" #container>
<div class="weui-dialog__hd" *ngIf="config.title">
<strong class="weui-dialog__title">{{ config.title }}</strong>
</div>
<div class="weui-dialog__bd" *ngIf="config.content" [innerHTML]="config.content"></div>
<div class="weui-cells" *ngIf="config.type === 'prompt' && _shown">
<ng-container [ngSwitch]="config.input">
<div *ngSwitchCase="'textarea'" class="weui-cell" [ngClass]="{ 'weui-cell_warn': _prompError }">
<div class="weui-cell__bd">
<textarea class="weui-textarea" placeholder="{{ config.inputPlaceholder }}" [(ngModel)]="_promptData"
name="_promptData" (ngModelChange)="_chanage()" weui-textarea [weui-cn]="config.inputAttributes.cn"
[maxlength]="config.inputAttributes.maxlength"></textarea>
</div>
</div>
<div *ngSwitchCase="'select'" class="weui-cell weui-cell_select">
<div class="weui-cell__bd">
<select class="weui-select" [(ngModel)]="_promptData" name="_promptData" (ngModelChange)="_chanage()">
<option *ngFor="let i of config.inputOptions" [ngValue]="i">{{ i.text }}</option>
</select>
</div>
</div>
<div *ngSwitchCase="'radio'" class="weui-cells_radio">
<label class="weui-cell weui-check__label" *ngFor="let i of config.inputOptions">
<div class="weui-cell__bd">
<p>{{ i.text }}</p>
</div>
<div class="weui-cell__ft">
<input type="radio" (click)="_promptData = i" [checked]="i == _promptData" (change)="_chanage()"
class="weui-check" />
<span class="weui-icon-checked"></span>
</div>
</label>
</div>
<div *ngSwitchCase="'checkbox'" class="weui-cells_checkbox">
<label class="weui-cell weui-check__label" *ngFor="let i of config.inputOptions">
<div class="weui-cell__hd">
<input type="checkbox" class="weui-check" (change)="_chanage()" [weui-checklist]="_promptData"
[weui-value]="i" name="_promptData" />
<i class="weui-icon-checked"></i>
</div>
<div class="weui-cell__bd">
<p>{{ i.text }}</p>
</div>
</label>
</div>
<div *ngSwitchCase="'range'" class="weui-slider-box" [(ngModel)]="_promptData" name="_promptData" weui-slider
[weui-min]="config.inputAttributes.min" [weui-max]="config.inputAttributes.max"
[weui-step]="config.inputAttributes.step">
<div class="weui-slider">
<div class="weui-slider__inner">
<div class="weui-slider__track"></div>
<div class="weui-slider__handler"></div>
</div>
</div>
<div class="weui-slider-box__value">{{ _promptData }}</div>
</div>
<div *ngSwitchDefault class="weui-cell" [ngClass]="{ 'weui-cell_warn': _prompError }">
<div class="weui-cell__bd">
<input type="{{ config.input }}" class="weui-input" placeholder="{{ config.inputPlaceholder }}"
[(ngModel)]="_promptData" name="_promptData" [maxlength]="config.inputAttributes.maxlength"
(ngModelChange)="_chanage()" (keyup)="_keyup($event)" />
</div>
<div class="weui-cell__ft">
<i class="weui-icon-warn" *ngIf="_prompError"></i>
</div>
</div>
</ng-container>
</div>
<div class="weui-dialog__error" *ngIf="_prompError">{{ config.inputError }}</div>
<div class="weui-dialog__ft">
<a href="#" *ngFor="let item of config.btns" class="weui-dialog__btn weui-dialog__btn_{{ item.type }}"
(click)="_onSelect(item)">{{ item.text }}</a>
</div>
</div>
|
On Saturday, The State Department of Public Instruction announced the results for the TET 2019 (Teacher Eligibility Test). The TET was only cleared by 12 percent of 2.39 lakh candidates. The total number of candidates who took the TET 2019 was 2.39 lakh. 3 years ago, in 2016, 5.62 percent of candidates passed the TET.
The Teacher Eligibility Test was held in February 2018. The TET is a requirement for those people who want to teach in primary schools that are being run by the Indian Government.
If you are in the General Category, you are required to score at least 60 percent in the Teacher Eligibility Test. If you belong to the SC/ST and are disabled, you are required to score at least 55 percent in the Teacher Eligibility Test.
Candidates who took the Paper II have better scores than those candidates who took the Paper I Teacher Eligibility Test in 2019.
Candidates are required to pass the Paper I so that they can teach in Classes 1 to Classes 5, candidates are also required to pass the Paper II to teach in classes 6 to classes 8. |
Q:
Why ListView Click with Nested Layout not work?
Description : I'am using DrawerLayout to implement SlidingMenu.
Problem : When LinearLayout (id = bottom_layout) is added to activity_main.xml the setOnItemClickListener doesn't work.
activity_main.xml
<android.support.v4.widget.DrawerLayout
xmlns:android="http://schemas.android.com/apk/res/android"
android:id="@+id/drawer_layout"
android:layout_width="match_parent"
android:layout_height="match_parent">
<LinearLayout
android:layout_width="fill_parent"
android:layout_height="fill_parent"
android:weightSum="2"
android:orientation="vertical"
>
<LinearLayout
android:id="@+id/main_activity_linear_layout"
android:layout_width="fill_parent"
android:layout_height="fill_parent"
android:layout_weight="1"
>
<FrameLayout
android:id="@+id/frame_container_slider"
android:layout_width="fill_parent"
android:layout_height="fill_parent"
android:layout_weight="1"
/>
</LinearLayout>
<!-- Framelayout to display Fragments -->
<FrameLayout
android:id="@+id/frame_container"
android:layout_width="fill_parent"
android:layout_height="fill_parent"
android:layout_weight="1"
android:paddingBottom="50dp"
/>
</LinearLayout>
<!-- Listview to display slider menu -->
<ListView
android:id="@+id/list_slidermenu"
android:layout_width="240dp"
android:layout_height="match_parent"
android:layout_gravity="start"
android:choiceMode="singleChoice"
android:divider="@android:color/darker_gray"
android:dividerHeight="1dp"
android:paddingBottom="10dp"
android:listSelector="@drawable/list_selector"
android:background="@color/list_background"/>
<!-- bunch of components here -->
<LinearLayout
android:id="@+id/bottom_layout"
android:layout_width="fill_parent"
android:layout_height="fill_parent"
android:layout_below="@+id/spinner"
android:layout_marginTop="5px"
android:gravity="center_horizontal|bottom"
android:paddingTop="2px" >
<include
android:id="@+id/bottom_bar"
layout="@layout/bottom_bar"
android:visibility="visible"
/>
<include
android:id="@+id/bottom_bar_rechercher"
layout="@layout/bottom_bar_rechercher"
android:visibility="gone"
/>
</LinearLayout>
</android.support.v4.widget.DrawerLayout>
MainActivity.java
private ListView mDrawerList;
..
mDrawerList.setOnItemClickListener(new SlideMenuClickListener());
..
/*
* Slide menu item click listener
*/
private class SlideMenuClickListener implements
ListView.OnItemClickListener {
@Override
public void onItemClick(AdapterView<?> parent, View view, int position,
long id) {
// display view for selected nav drawer item
displayView(position);
if(position==0){
visibleSlider();
}
}
}
A:
Remove your LinearLayout (id = bottom_layout) out of DrawerLayout like this :
<RelativeLayout
xmlns:android="http://schemas.android.com/apk/res/android"
android:layout_width="match_parent"
android:layout_height="match_parent"
android:orientation="vertical"
>
<android.support.v4.widget.DrawerLayout
android:id="@+id/drawer_layout"
android:layout_width="match_parent"
android:layout_height="match_parent">
<LinearLayout
android:layout_width="fill_parent"
android:layout_height="fill_parent"
android:weightSum="2"
android:orientation="vertical"
>
<LinearLayout
android:id="@+id/main_activity_linear_layout"
android:layout_width="fill_parent"
android:layout_height="fill_parent"
android:layout_weight="1"
>
<FrameLayout
android:id="@+id/frame_container_slider"
android:layout_width="fill_parent"
android:layout_height="fill_parent"
android:layout_weight="1"
/>
</LinearLayout>
<!-- Framelayout to display Fragments -->
<FrameLayout
android:id="@+id/frame_container"
android:layout_width="fill_parent"
android:layout_height="fill_parent"
android:layout_weight="1"
android:paddingBottom="50dp"
/>
</LinearLayout>
<!-- Listview to display slider menu -->
<ListView
android:id="@+id/list_slidermenu"
android:layout_width="240dp"
android:layout_height="match_parent"
android:layout_gravity="start"
android:choiceMode="singleChoice"
android:divider="@android:color/darker_gray"
android:dividerHeight="1dp"
android:paddingBottom="10dp"
android:listSelector="@drawable/list_selector"
android:background="@color/list_background"/>
<!-- bunch of components here -->
</android.support.v4.widget.DrawerLayout>
<LinearLayout
android:layout_width="fill_parent"
android:layout_height="fill_parent"
android:layout_below="@+id/spinner"
android:layout_marginTop="5px"
android:gravity="center_horizontal|bottom"
android:paddingTop="2px" >
<include
android:id="@+id/bottom_bar"
layout="@layout/bottom_bar"
android:visibility="visible"
/>
<include
android:id="@+id/bottom_bar_rechercher"
layout="@layout/bottom_bar_rechercher"
android:visibility="gone"
/>
</LinearLayout>
</RelativeLayout>
|
Q:
Animate Height - Else Not Working
Just the first "else" not working. topColor div will expand from original 15 high to 150 high when scrolling down, but not shrink back to 15 high when I scroll near the top.
$(document).ready(function () {
$(window).scroll(function () {
if ($(this).scrollTop() > 20) {
$('#topColor').animate({
height: "150px"
});
} else {
$('#topColor').animate({
height: "15px"
});
}
if ($(this).scrollTop() > 300) {
$("#fixedMenuBar").fadeIn('slow', 'linear');
} else {
$("#fixedMenuBar").fadeOut('fast', 'linear');
}
});
});
A:
You should not use else in scroll responsed animations, use else if instead for being more specific and animate will create conflict because scroll value will change always and jQuery can not infinite repeat same animation.
But if you insist on animate try this:
var scrollVal = $(this).scrollTop();
if ( scrollVal < 20 )
if ( $("#fixedMenuBar").is(':visible') ) {
$("#fixedMenuBar").fadeOut('fast', 'linear');
}
if ( parseInt($('#topColor').css('height')) != 150 ) {
$('#topColor').animate({ height: "150px" });
}
}else if ( scrollVal >= 20 && scrollVal < 300 ) {
if ( $("#fixedMenuBar").is(':visible') ) {
$("#fixedMenuBar").fadeOut('fast', 'linear');
}
if ( parseInt($('#topColor').css('height')) != 15 ) {
$('#topColor').animate({ height: "15px" });
}
}else if ( scrollVal >= 300 ) {
if ( !$("#fixedMenuBar").is(':visible') )
$("#fixedMenuBar").fadeIn('slow', 'linear');
}
This answer also should help you: Setting CSS value limits of the window scrolling animation
|
Joan Solà i Cortassa
Joan Solà Cortassa (Bell-lloc d'Urgell, 10 January 1940 — Barcelona, 27 October 2010) was a Catalan linguist and philologist. He was professor of Catalan language and literature at the University of Barcelona from 1984 onwards, and vice president of the Institut d'Estudis Catalans (IEC) from 2009.
Biography
He graduated in Classical Philology in 1965 at University of Barcelona and he got his PhD in Catalan Philology in 1970 at that same university. In 1977 he graduated with a master's degree in Linguistics at the University of Reading in England.
He was a professor at various institutions of higher learning (such as the Universitat Autònoma de Barcelona) starting in 1965, and from 1984 onwards he was chair of Catalan language and literature at the Universitat de Barcelona. He was also a member of the Internacional Association of Catalan Language and Literature. He co-directed, with Jordi Mir, the creation of the Obres completes de Pompeu Fabra, as well as directing the project for the Gramàtica del català contemporani, and at the time of his death was contributing to the new normative grammar for the Institut d’Estudis Catalans, where he had been a member since 1999. He published a number of studies and almost a thousand newspaper articles, most of which were about subjects related to syntax or the history of the Catalan language.
He died on 27 October 2010 in Barcelona at 70 years of age, and lied in repose at the historic Paranimf auditorium of the University of Barcelona the day after. In May 2011 his posthumous book L’última lliçó (The last lesson) was published, consisting of his public interventions during 2009, the year in which he received all of his major honors.
His family donated Solà's private library to the CRAI Biblioteca de Lletres de la Universitat de Barcelona and his personal archive to the Biblioteca de Catalunya.
Linguistic ideology
As a linguist he argued that we must separate what is internal to a language from what is external (what is established by the grammar is different from the actual use of that structure or sentence). He also was in favor of integrating the great dialects into the normative grammar. In particular, he defended that the Catalan normative grammar must be compositional (i.e. all dialects must be included so as that speakers identify with the standard language). He was in favor of relying on the native speakers’ intuition and therefore defended that people shouldn't be afraid of using a particular dialect across the Catalan territories. Solà also stated that a normative grammar must be, first, a descriptive grammar, taking into account all the information that has been gathered of a language.
Awards
Among the awards which he was given were the Premi a la Investigació Lingüística (Award for Linguistic Investigation) from the Fundació Enciclopèdia Catalan (1991), and the Premi de Recerca Crítica Serra d’Or (the Serra d’Or Award for Critical Research for his work Història de la lingüística catalana, 1775-1900: repertori crític (“History of Catalan Linguistics, 1775-1900: A Critical Repertory”, 1999, written together with Pere Marcet), the Sanchis Guarner Award from the Fundació Jaume I for the Gramàtica del català contemporani (“Grammar of Contemporary Catalan”, 2002, a project he led along with Maria-Rosa Lloret, Joan Mascaró, and Manuel Pérez-Saldanya), or the Narcís Monturiol Medal for scientific and technological merit for his research into the Catalan language, both synchronic and diachronic, as well as for his work in the dissemination of that knowledge for the general public.
In 2005 he received the Creu de Sant Jordi. In 2009 he was granted an honorary doctorate by the University of Lleida, and received the Premi d’Honor de les Lletres Catalanes, an award conferred by the association Òmnium Cultural in recognition of civic trajectory and prestige of published works. In 2010 he was honored for his lifelong dedication to the defense of the Catalan language and culture at the Premis Joan Coromines, given by the Coordinadora d’Associacions per la Llengua catalana.
In 2010 the book Joan Solà. 10 textos d’homenatge (“Joan Solà: 10 Texts in Homage”) was published, edited by of the department of Catalan Philology at the Universitat de Barcelona, in which many of his collaborators contributed pieces on his life and works.
Main works
Tots els llibres de la biblioteca Joan Solà a Universitat de Barcelona.(-∞ a.J - +∞ d.J)
Estudis de sintaxi catalana(1972-1973)
A l'entorn de la llengua(1977)
Del català incorrecte al català correcte(1977)
"Ser" i "estar" en el català d'avui(1981)
Sintaxi generativa catalana(1986), with Sebastià Bonet
Qüestions controvertides de sintaxi catalana(1987)
L'obra de Pompeu Fabra(1987)
Bibliografia lingüística catalana del segle XIX(1989), amb Pere Marcet
Lingüística i normativa(1990)
La llengua, una convenció dialèctica(1993)
Sintaxi normativa: estat de la qüestió(1994)
Història de la lingüística catalana, 1775-1900(1998), with Pere Marcet
Parlem-ne(1999)
Gramàtica del català contemporani(2002), edited with Maria-Rosa Lloret, Joan Mascaró and Manuel Pérez-Saldanya
Ensenyar la llengua(2003)
Pompeu Fabra: vida i obra(2007), with Jordi Ginebra
Plantem cara. Defensa de la llengua, defensa de la terra(2009)
L'última lliçó(2011)
Literature about Solà
"Qui és Joan Solà?", in Festes de setembre 1988. Bell-lloc d'Urgell, 1988, p. 2.
BRANCHADELL, Albert: "La gramática de Solà", La Vanguardia, June 26, 2002, p. 5-6.
PLA NUALART, Albert: "Doctor 'Laboris Causa'", Avui, May 10, 2009, p. 49.
RIERA, Carles: "Joan Solà, lingüista", Serra d'Or, núm. 517, 2003, p. 23-24.
SÀNCHEZ, Àngel: "Joan Solà", El Periódico, July 8 d 2002.
NOGUÉ, Neus ... [et al.] ed. Joan Solà: 10 textos d'homenatge. Barcelona: Empúries, 2010.
OLIVA, Salvador (ed.). Joan Solà, in memoriam. Girona: University of Girona, 2012.
ADALIL SESPLUGUES, Xavier. "Bibliografia sobre Joan Solà". Bachelor's thesis. UOC, 2014.
MARÍ I MAYANS, Isidor, "Joan Solà i Cortassa (1940-2010)" in Estudis Romànics34 (2012), p. 751-755.
References
Category:1940 births
Category:2010 deaths
Category:Catalan academics
Category:Spanish philologists |
#define PICOBENCH_DEBUG
#define PICOBENCH_IMPLEMENT_WITH_MAIN
#include "picobench/picobench.hpp"
#include <vector>
#include <deque>
#include <cstdlib>
void rand_vector(picobench::state& s)
{
std::vector<int> v;
for (auto _ : s)
{
v.push_back(rand());
}
}
PICOBENCH(rand_vector);
void rand_vector_reserve(picobench::state& s)
{
std::vector<int> v;
v.reserve(s.iterations());
for (auto _ : s)
{
v.push_back(rand());
}
}
PICOBENCH(rand_vector_reserve);
void rand_deque(picobench::state& s)
{
std::deque<int> v;
for (auto _ : s)
{
v.push_back(rand());
}
}
PICOBENCH(rand_deque);
|
Q:
What's the best way to parallelize calls in JSP?
My understanding of JSP is that each line in the java code is run step by step (in sequence). E.g. if I have a code below, doSomething("apple") will be executed first until it returns a value, then doSomething("orange") will be executed next until it returns a value, then finally doSomething("pear") will be executed until it returns a value and the whole page is displayed.
<table border="1">
<thead>
<tr>
<th>Test</th>
</tr>
</thead>
<tbody>
<tr>
<td>Column A</td>
<td><%=javaBean.doSomething("apple")%></td>
</tr>
<tr>
<td>Column B</td>
<td><%=javaBean.doSomething("orange")%></td>
</tr>
<tr>
<td>Column C</td>
<td><%=javaBean.doSomething("pear")%></td>
</tr>
</tbody>
</table>
What is the best way to make these calls parallel e.g. run doSomething("apple") & doSomething("orange") & doSomething("pear") concurrently? Thank you.
A:
JSP creates dynamic html. So you are essentially placing the result of your business logic from javaBean to your html table. As it is you can not make it concurrent as you need the result of each method to be placed in the row.
You should restructure your code so as to calculate everything you need (perhaps using concurrency) and then retrieve the results to place them in the row.
A:
You shouldn't do this in JSP, it's designed to render in a single thread. If the page is too slow, the usual method these days is to have a fast loading page with three placeholders. Then load the slow parts with AJAX. These can make concurrent calls back to the server to load the rest.
|
Q:
Bypass Required Lookup Filter Criteria through apex
Is it possible to bypass a required look up filter criteria through apex? For example for a certain scenario it will not throw the filter criteria but it's still there. Been searching the internet regarding this one, but can't seem to get a clear answer.
For example
My Filter criteria is like this.
(Distributor: Account Record TypeEQUALSPartner) AND
(Distributor: Account IDNOT EQUAL TOOpportunity: Primary Partner ID) AND
(Distributor: Partner TypeEQUALSDistributor)
Now there is a scenario where in it's allright to have the Distributor : Parner type = null or blank. and it's only applicable for that scenario so addin the null value in the filter criteria is a no no.
If it's not possible to by pass using apex code. Can you give me any idea or workaround regarding this one?
My Code somewhat look like this.
Protected List<Opportunity> allOpportunites;
public void createRenewalOpps(){
//add renewalOpps Values
allOpportunities.addAll(renewalOpps.values)
}
public void ManageOpportunities(){
//the filter look up criteria is in the Opportunity object
//error will be thrown in the DML call since in my data the distributor :
//partner type is blank
upsert allOpportunities; //Error will be thrown
}
A:
The most basic solution is to add a "bypass validation" checkbox to your record that no users have access to, which your code can can set to true when the validation rule should be bypassed. Your filter then becomes
Distributor: Bypass Filter OR
(
(Distributor: Account Record TypeEQUALSPartner) AND
(Distributor: Account IDNOT EQUAL TOOpportunity: Primary Partner ID) AND
(Distributor: Partner TypeEQUALSDistributor)
)
|
The new Milwaukee Bucks arena being constructed downtown is part of the city’s building boom. Photo by Edgar Mendez.
Milwaukee is in a position to create a “world-class downtown,” which could generate much-needed income to support public works, safety and health, and additional quality-of-life benefits to surrounding neighborhoods. However, for that to happen, city, state and county officials must work together to make long-needed improvements to their antiquated revenue-generating system, according to a new Public Policy Forum report.
“A key question is whether a structure that was imposed on Milwaukee by state government more than a century ago — and that makes no distinction for the city’s unique economic attributes — is adequately meeting the city’s financial needs and the expectations of its residents, businesses and visitors,” said Forum President Rob Henken.
The report, “On The Money?,” is a follow-up to an earlier PPF report that identified problems with the current revenue system. The new report, as Urban Milwaukee reported on Tuesday, looked at 38 peer cities and found Milwaukee is the only city that relies almost entirely on two revenue streams — state funding and property taxes. Other cities all levy other taxes and on average get 29 percent of their revenue from a local sales tax, which the City of Milwaukee lacks.
The problem for Milwaukee has gotten worse, the study found, because state aid has plummeted since the mid-1990s, with annual aid dropping by $151 million in real dollars since then. Yet Wisconsin tax laws prohibit municipalities from diversifying their revenue streams through the use of local taxes like a sales or income tax, which might help Milwaukee weather the drop in state aid.
Unless additional revenue sources are found, local homeowners will likely see an increase in property taxes in the future, according to a recent Public Policy Forum report. Photo by Edgar Mendez.
With a substantial need for more police and other local services, as well as an increased number of retirees with city pensions, said Henken, Milwaukee residents are likely to see increases in property taxes unless other funding sources are found.
The city’s hands are tied on the issue of its revenue structure and will likely remain so, according to Alderman Bob Bauman, who represents Downtown on the Common Council.
“I don’t think the ball will even be put into play,” Bauman said. “Hell will freeze over before the state legislature will give us a general sales or dedicated tax.”
Among the possibilities for revenue growth identified in the report is the creation of a mechanism for nonresidents who are “engaged in business, employment, tourism, or entertainment,” in the city to pay taxes on the services they use while in the city.
“We need to figure out a way to tax people who come into the city and utilize the services but go home to spend their money and pay taxes there,” Crowley said.
Julia Taylor, president of the Greater Milwaukee Committee (GMC), said there needs to be a way for commuters to share the costs the city is bearing by providing services to them, so that local taxpayers aren’t overburdened.
“It’s worthwhile to look at usage fees to recapture the costs for other people that visit or work in Milwaukee,” Taylor said.
The GMC commissioned the report as part of its MKE United effort. The city’s revenue framework has limited its progress, said Taylor, especially for low-income communities that don’t draw enough investment to grow their property tax base.
“Areas that don’t have a lot of private sector investment can’t use tax incremental financing or other developmental landscape tools that help neighborhoods be successful,” Taylor said.
The state’s restrictions on municipal taxes have severely hindered Milwaukee’s ability to take advantage of its many assets, Crowley said. “There are legislators around the state who feel the need to try and stop dollars from going to the city of Milwaukee, even though it’s the economic engine for the state,” he added. The city of Milwaukee contributed more than $1.37 billion in state taxes with a return of only $227 million in shared revenue payments in 2015, said Mayor Tom Barrett during his “state of the city” address in March.
Crowley cautioned that any new taxes in Milwaukee should not be directed at nor disproportionately impact low-income residents. Still, if nothing is done, he said, property taxes will end up being raised, which means rent will go up and Milwaukee residents will suffer because of it.
The report outlined several scenarios in which the city could provide property tax relief as well as raise income for services. It could create new local taxes such as income taxes or specialized taxes on hotels, entertainment, downtown restaurants and alcohol. Though the report did not recommend which options would best suit Milwaukee, discussion between state and local leaders needs to occur now, warned Henken.
“We have had this very nonproductive argument for decades between city and state leaders about state aid. Therein lies the attractiveness of having some type of sales tax in the revenue mix of a major city like Milwaukee. Every other city of its size or larger makes use of some type of sales tax,” Henken said.
State Rep. Evan Goyke said the biggest challenge is convincing state legislators outside of the city that they too will benefit from taxes created in Milwaukee.
“It’s a local solution that solves a statewide problem. The more empowered Milwaukee is to generate and spend revenue and solve local issues, the less the state has to pay in a number of local areas,” Goyke said.
The downtown building boom provides an ideal moment in time to capture and take advantage of the city’s growth, he added. The problem with coming to a consensus, he acknowledged, is the city’s image problem across the state, and the fact that many smaller cities are struggling as well. Goyke said the solution is to build a coalition of rural and urban communities to change Milwaukee’s economic structure.
“We need to free up Milwaukee so that Eau Claire, La Crosse and Green Bay could see a benefit as well,” Goyke said.
The report should be the beginning of a long discussion, said Taylor, who agreed that any solution would need to work for the entire state and local counties. Still, she said, “facts are facts.”
“The system is breaking down and we need to create a more balanced approach to local taxation. It’s time to sit down and have that discussion.”
17 thoughts on “New City Tax Needed, Officials Say”
Not one comment in the article about reducing expenditures (past or present). No comments in the article about where/how the money is currently allocated.
We moved from the country to the city; bought a fixer upper on the East Side. Our new house value is 60% of what we sold and our new property taxes are 50% greater. We love being close to everything, but the roads are worse and crime is higher. We patronize local businesses.
If the city population is growing, shouldn’t that mean more property tax revenue?
If the city population is not growing, what is being done to reduce expenditures?
Milwaukee is a great town. Please don’t make it more expensive to live here.
Jim…. I think the point is to take some pressure off the property taxes by diversifying the tax base. I think the city does a pretty good job of managing city services and operations under the circumstances. This is backed up by a report a few years ago that indicated Milwaukee spends less per capita than peer cities within the Great Lakes and Ohio Valley.
Currently, all income taxes, all sales taxes, a portion of the property tax and assorted fees all going to the State. The question should be, “what is the State doing with all that money?”
@Jim – Milwaukee ranks so high on that list because it is forced by the state to rely overwhelmingly on property taxes, unlike most other large and mid-size cities in the country. If the city was permitted to levy gas, income, sales, or other taxes, it is almost certain that the property tax rate would be lower, particularly given that many other taxes would be paid, in part, by nonresidents (visitors, commuters, etc).
I do share your concern about the regressive nature of some taxes (sales in particular, less so income and gas, for instance).
From the article “The report outlined several scenarios in which the city could provide property tax relief as well as raise income for services.”
By using things such as a sales tax, the city could collect taxes from non-residents and non-property owners that come in to the city and use it’s services. This could be anyone from suburban commuters to out of state business travelers and tourists. This would obviously take some of the burden off property owners. More tourism dollars are spent in MKE County than anywhere else in the state, this would allow the city to keep more of it in the city, instead of being shipped out-state.
Increasing tax revenue by rising taxes in the city is a stupid and short sighted idea. Think of ways to better use the money you have. Increasing development will increase tax revenue. Going to see Bucks games increases parking revenue, dining and restaurant revenue etc, which in turn increases tax revenue. Kicking up taxes on hotels etc only means you are making it more expensive for hotels and other businesses to locate to Milwaukee which hurts EVERYBODY!!! You want more businesses not fewer. Haven’t you politicians named in the article learned anything from our neighbors to the South? We are already a high tax area and bringing in more businesses should help to lower that if politicians do a better job using the current revenue as well as future revenues.
BG…. per capita spending in Milwaukee is already relatively low. That’s a pretty good measure of efficient spending. A sales tax captures revenues from people using the city and takes some of the pressure off residents. We have to pay for infrastructure, police, garbage… etc. of those coming here to work or visit. Balancing the tax code encourages development and might keep people from moving to other cities and counties.
Jim, I believe that, on a per capita basis, Madison collects more than twice as much property tax as Milwaukee, both in city tax and school tax.
In 2013, Milwaukee city property tax levy was $245 million ($411/resident), while Madison (with less than half as many people) levied $198 million ($834/resident). Milwaukee’s school levy was $308 million ($516/resident), while Madison collected $254 million ($1,066/resident).
The problem is that Milwaukee’s full assessed value is $26 billion (or about $44k/resident) while Madison’s numbers are $22 billion (or about $92k/resident). This assessed value difference means that Milwaukee has much higher property tax rates.
Seems simple to me. People that want to live east of the Milwaukee RiversShould pay more for that experience. Every one that does not live on the east side or downtown complains they have to much economic activity. You want to live near a trolley pay up.
Tom D
I think I follow…. Are you basically saying the aggregate property value in Madison is higher, therefore the assessment is lower? Doing a simple spot check on SF houses in the $200-400k range (in the urban areas of both cities) certainly indicates they are paying lower property taxes.
If I am following, the answer is for Milwaukee to increase home values. How would new revenue streams do that?
Tom T. – it would be interesting to see what percentage of revenue generated by a sales tax would come from city residents vs other. It certainly feels like city residents would contribute the largest share.
Jim – in your example of 4500 rooms at 66% occupancy = 2970 rooms/night. At an average nightly rate of $200/day, that works out to $594k/day. With a 10% hotel room tax, it would generate $59.4k/day. You would need to x365 days to get an annual revenue #. That would come to 365 days x $59.4k/day = $21.7 million. Not as much of a drop in the bucket if our property tax levy $245 million. Granted a 10% increase in hotel rates would decrease demand, but a more palatable % could provide a way to help at least hold down property tax increases.
How about a local tax on alcohol/bars? People already drink too much in Milwaukee and Wisconsin in general – the city might as well make a profit off of it. Maybe taxing it would encourage people to not drink AS MUCH and reduce drunk driving, which would reduce fatal accidents associated with it. Sounds like a win-win to me.
Jeff – DOH! Stupid math mistake on my part. Thank you. I had typed up my reply to point out the fact that a hotel tax might sound good, but would likely not be effective. You have proven me wrong. Yes, higher room costs will affect demand, but I would be interested in looking at data to try and find that tax amount “sweet spot”.
I think it is very hard to tax “only those not paying in now”. Hotel taxes are about the only way to do it that I can think of. I think the majority case of a “resident” paying those taxes would be when a local company is paying for the hotel room of a business visitor. Rental car taxes could work, but MKE is a county endeavor. Even the sales tax example offered by Tom T struck me like this: I, as a local, agree to spend an additional 65 cents for every 35 cents you give me. Not a good enough ROI IMO.
I still believe we have more of a spending problem than a revenue problem. I also think it can’t be fixed overnight because many promises (pensions, healthcare, bonds) have been made that should not be reneged upon. The best I think one could hope for is to slowly wind down those costs thru attrition and efficiency. |
<?xml version="1.0" encoding="UTF-8"?>
<project xmlns="http://maven.apache.org/POM/4.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd ">
<modelVersion>4.0.0</modelVersion>
<groupId>org.apereo.cas</groupId>
<artifactId>cas-services-management-overlay</artifactId>
<packaging>war</packaging>
<version>1.0</version>
<build>
<plugins>
<plugin>
<groupId>com.rimerosolutions.maven.plugins</groupId>
<artifactId>wrapper-maven-plugin</artifactId>
<version>0.0.4</version>
<configuration>
<verifyDownload>true</verifyDownload>
<checksumAlgorithm>MD5</checksumAlgorithm>
</configuration>
</plugin>
<plugin>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-maven-plugin</artifactId>
<version>${springboot.version}</version>
<configuration>
<mainClass>${mainClassName}</mainClass>
<addResources>true</addResources>
<executable>${isExecutable}</executable>
<layout>WAR</layout>
</configuration>
<executions>
<execution>
<goals>
<goal>repackage</goal>
</goals>
</execution>
</executions>
</plugin>
<plugin>
<groupId>org.apache.maven.plugins</groupId>
<artifactId>maven-war-plugin</artifactId>
<version>2.6</version>
<configuration>
<warName>cas-management</warName>
<failOnMissingWebXml>false</failOnMissingWebXml>
<recompressZippedFiles>false</recompressZippedFiles>
<archive>
<compress>false</compress>
<manifestFile>${manifestFileToUse}</manifestFile>
</archive>
<overlays>
<overlay>
<groupId>org.apereo.cas</groupId>
<artifactId>cas-management-webapp</artifactId>
</overlay>
</overlays>
</configuration>
</plugin>
<plugin>
<groupId>org.apache.maven.plugins</groupId>
<artifactId>maven-compiler-plugin</artifactId>
<version>3.3</version>
</plugin>
</plugins>
<finalName>cas-management</finalName>
</build>
<dependencies>
<dependency>
<groupId>org.apereo.cas</groupId>
<artifactId>cas-management-webapp</artifactId>
<version>${cas.version}</version>
<type>war</type>
</dependency>
<dependency>
<groupId>org.apereo.cas</groupId>
<artifactId>cas-server-support-jdbc-drivers</artifactId>
<version>${cas.version}</version>
</dependency>
<dependency>
<groupId>mysql</groupId>
<artifactId>mysql-connector-java</artifactId>
<version>5.1.36</version>
</dependency>
<dependency>
<groupId>org.apereo.cas</groupId>
<artifactId>cas-server-support-jpa-service-registry</artifactId>
<version>${cas.version}</version>
</dependency>
</dependencies>
<properties>
<cas.version>5.3.1</cas.version>
<springboot.version>1.5.14.RELEASE</springboot.version>
<mainClassName>org.springframework.boot.loader.WarLauncher</mainClassName>
<isExecutable>false</isExecutable>
<manifestFileToUse>${project.build.directory}/war/work/org.apereo.cas/cas-management-webapp/META-INF/MANIFEST.MF</manifestFileToUse>
<maven.compiler.source>1.8</maven.compiler.source>
<maven.compiler.target>1.8</maven.compiler.target>
<project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
</properties>
<repositories>
<repository>
<id>sonatype-releases</id>
<url>http://oss.sonatype.org/content/repositories/releases/</url>
<snapshots>
<enabled>false</enabled>
</snapshots>
<releases>
<enabled>true</enabled>
</releases>
</repository>
<repository>
<id>sonatype-snapshots</id>
<url>https://oss.sonatype.org/content/repositories/snapshots/</url>
<snapshots>
<enabled>true</enabled>
</snapshots>
<releases>
<enabled>false</enabled>
</releases>
</repository>
<repository>
<id>shibboleth-releases</id>
<url>https://build.shibboleth.net/nexus/content/repositories/releases</url>
</repository>
</repositories>
<profiles>
<profile>
<activation>
<activeByDefault>true</activeByDefault>
</activation>
<id>exec</id>
<properties>
<mainClassName>org.apereo.cas.mgmt.web.CasManagementWebApplication</mainClassName>
<isExecutable>true</isExecutable>
<manifestFileToUse></manifestFileToUse>
</properties>
<build>
<plugins>
<plugin>
<groupId>com.soebes.maven.plugins</groupId>
<artifactId>echo-maven-plugin</artifactId>
<version>0.3.0</version>
<executions>
<execution>
<phase>prepare-package</phase>
<goals>
<goal>echo</goal>
</goals>
</execution>
</executions>
<configuration>
<echos>
<echo>Executable profile to make the generated CAS management application executable.</echo></echos>
</configuration>
</plugin>
</plugins>
</build>
</profile>
<profile>
<activation>
<activeByDefault>false</activeByDefault>
</activation>
<id>pgp</id>
<build>
<plugins>
<plugin>
<groupId>com.github.s4u.plugins</groupId>
<artifactId>pgpverify-maven-plugin</artifactId>
<version>1.1.0</version>
<executions>
<execution>
<goals>
<goal>check</goal>
</goals>
</execution>
</executions>
<configuration>
<pgpKeyServer>hkp://pool.sks-keyservers.net</pgpKeyServer>
<pgpKeysCachePath>${settings.localRepository}/pgpkeys-cache</pgpKeysCachePath>
<scope>test</scope>
<verifyPomFiles>true</verifyPomFiles>
<failNoSignature>false</failNoSignature>
</configuration>
</plugin>
</plugins>
</build>
</profile>
</profiles>
</project> |
42 Cal.App.3d 491 (1974)
116 Cal. Rptr. 896
JOHN M. CERDA, Petitioner,
v.
THE SUPERIOR COURT OF SANTA CLARA COUNTY, Respondent; THE PEOPLE, Real Party in Interest.
Docket No. 34274.
Court of Appeals of California, First District, Division One.
October 15, 1974.
*492 COUNSEL
James L. McIntosh, under appointment by the Court of Appeal, for Petitioner.
Evelle J. Younger, Attorney General, Jack R. Winkler, Chief Assistant Attorney General, Edward P. O'Brien, Assistant Attorney General, Gloria F. DeHart and Ina L. Gyemant, Deputy Attorneys General, for Respondent and for Real Party in Interest.
OPINION
MOLINARI, P.J.
Petitioner seeks a writ of mandate ordering respondent superior court to file his notice of appeal from its order denying him credit for the time he was detained in the county jail pursuant to a parole hold while awaiting trial on pending criminal charges. Since the relief sought is properly the subject of relief by way of habeas corpus we have treated the petition as one for habeas corpus and have issued an order to show cause why the relief prayed for should not be granted.
(1) On November 17, 1970, petitioner was arrested upon criminal charges while on parole. A parole hold was placed on him and he remained confined in the county jail until February 19, 1971, when he was sentenced to the state prison for conviction of second degree burglary and possession of drugs. Petitioner asserts he is entitled to credit of 103 days on this sentence for his confinement prior to said sentence.
*493 Penal Code section 2900.5,[1] enacted in 1971 and effective as of March 4, 1972, provides, in pertinent part, as follows: "(a) In all felony convictions ... when the defendant has been in custody in any city, county, or city and county jail, all days of custody of the defendant from the date of arrest to the date on which the serving of the sentence imposed commences ... shall be credited upon his sentence ... (b) For the purposes of this section, credit shall be given only where the custody to be credited is attributable to charges arising from the same criminal act or acts for which the defendant has been convicted...."
In In re Kapperman (1974) 11 Cal.3d 542, 549 [114 Cal. Rptr. 97, 522 P.2d 657], it was held that "section 2900.5 must be applied to all felony convictions, and not only to those in which presentence detention occurred as a result of indigency and ability to post bail." Kapperman also holds that section 2900.5 is fully retroactive notwithstanding the contrary provision of its subdivision (c).[2] (At p. 550.)
The presentence custody in the instant case is "attributable to charges arising from the same criminal act or acts" for which he was sentenced on February 19, 1971. It is undisputed that the parole hold was placed on petitioner solely because of the new charges. That hold was placed on him the same day he was arrested on said charges. The effect of such a parole hold was to preclude petitioner from obtaining his release on bail on the new charges. (In re Law, 10 Cal.3d 21, 26 [109 Cal. Rptr. 573, 513 P.2d 621].) Section 2900.5 is therefore operative as to petitioner.
The People contend that section 2900.5 does not apply to petitioner because it would lead to the unwarranted result giving him a double credit for the time he was incarcerated in the county jail. They argue that the custody in the instant case was attributable to or legally caused by the prior felony conviction and the parole hold, and that, since petitioner will receive credit on the term fixed for the prior felony conviction for which he had been paroled, it was not the legislative intent that he also receive a credit towards the sentence imposed on the new charges, i.e., the criminal charges for the acts of which he was sentenced on February 19, 1971. Reliance is placed by the People on Aguilera v. California Dept. of Corrections (1966) 247 Cal. App.2d 150 [55 Cal. Rptr. 292].
In Aguilera the Adult Authority had ordered a cancellation of the parolee's parole and ordered him returned to prison. He was arrested and *494 held in custody in the county jail under the authority's order and charges of misdemeanor traffic offenses. The appellate court held that the prisoner's period of custody while awaiting trial on the misdemeanor charges, while awaiting return to prison after completion of the misdemeanor sentence, and pending return to prison after a subsequent cancellation of his parole, constituted a "return to custody" within the meaning of section 3064[3] and counted toward the term of his prison sentence. (247 Cal. App.2d at pp. 153-154.) The rationale of Aguilera is that when a parolee is jailed by an officer acting expressly under the Adult Authority's order or where his return to prison is delayed solely because the authority consents to his detention in jail the parolee is effectively held in actual custody and has been returned to prison custody. (247 Cal. App.2d at pp. 153-154; see In re Clark, 254 Cal. App.2d 1, at pp. 2-3 [61 Cal. Rptr. 902].)
Petitioner asserts that there is only one term to which the subject county jail time can be credited because he was sentenced on the new charges to a term which was to run consecutive to that imposed on the previous felony sentence for which he had been paroled.[4] It is petitioner's contention that under a sentence imposing consecutive terms of imprisonment the consecutive terms merge into a single term. Petitioner relies on In re Cowen, 27 Cal.2d 637, 643 [166 P.2d 279], wherein it was held that for purposes of computing and allowing credits on the term of imprisonment a prisoner confined under consecutive sentences must be regarded as undergoing a single continuous term of confinement rather than a series of distinct, independent terms. (See In re Albori, 218 Cal. 34, 37 [21 P.2d 423]; and see 55 Ops.Cal.Atty.Gen. (1972) 318, 321.)
In resolving these contentions we first observe that in the present case there was no cancellation of parole as there was in Aguilera. This distinction is of no moment, however, since the "parole hold" in the present case produced the same result as did the order in Aguilera. (See In re Law, supra, 10 Cal.3d at p. 23, fn. 2.) We also note that Aguilera was decided prior to the enactment of section 2900.5. We note, further, that Aguilera was not concerned with a subsequent felony conviction upon which either a concurrent or consecutive term was imposed in respect to the felony term for which the prisoner had been paroled, but, rather whether the prisoner was entitled to credit on such prison term for the period during *495 which he was in the county jail pursuant to a hold on order of the Adult Authority, while he was confined in the county jail awaiting trial on misdemeanor charges, and while he served a sentence upon conviction of said charges.
In any event under the provisions of section 2900.5 and the interpretation placed on it by Kapperman petitioner is entitled to credit upon the sentence on the new charges for the period of time he was in custody in the county jail because such custody was attributable to the new charges. If, as contended by petitioner himself, the term of imprisonment on the new charges has merged into the previous term petitioner is entitled to only one credit for the subject period of custody in the county jail. On the other hand, if as asserted by the People a double credit will result we see no proscription against such a consequence in the language of section 2900.5 as interpreted by Kapperman. We are disposed, however, to agree with petitioner's contention that the time credit to which petitioner is entitled must be computed on the total term of confinement rather than upon the separate terms. We have not been called upon, however, to determine the effect of the subject time credit upon petitionr's prior prison term but only whether he is entitled to such credit on the term imposed on the new charges. Since petitioner is asserting that he is entitled to only one credit for the subject period of jail custody on a single continuous term of confinement in the state prison for purposes of computing and allowing credits, a concurrence with such contention by the Adult Authority will moot the double credit question herein tendered by the People.
The Adult Authority is directed to allow petitioner 103 days' credit on the sentence imposed on February 19, 1971, for second degree burglary and possession of drugs in action No. 49977, Superior Court of the State of California, for the County of Santa Clara.
Sims, J., and Elkington, J., concurred.
NOTES
[1] Unless otherwise indicated all statutory references are to the Penal Code.
[2] Subdivision (c) of section 2900.5 provides: "This section shall be applicable only to those persons who are delivered into the custody of the Director of Corrections on or after the effective date of this section."
[3] Section 3064 provides: "From and after the suspension or revocation of the parole of any prisoner and until his return to custody he shall be deemed an escapee and fugitive from justice and no part of the time during which he is an escapee and fugitive from justice shall be part of his term."
[4] The record discloses that the sentences on the new charges were ordered to run concurrently but consecutive to the prior sentence.
|
All-natural ingredients. Austin, Texas. Made with fresh Roma tomatoes. People's Choice Award Winner - Austin, Texas. Premium beyond others. All our Select Salsas are made with fresh Roma tomatoes. Fresh peppers - fresh onions. No sugar added - no MSG - low sodium - gluten free. When we first started, I made deliveries to the stores from the back of my truck and I taste tested every batch made. My company has long outgrown the personal delivery business, but I still sample every batch. Why you ask? I do it for the same reason every chef, cook, and mom tastes their food when preparing it for other people - I want you to have the best I can make! Thank you customers, Ellie T. Donaldson. Go Texan.
Whether they are made in Texas, take on a familiar Texas shape or are inspired by local tastes, Totally Texas products remind us of everything we love about the Lone Star State. |
Q:
AAPT getting locked
I'll do my best to explain here. I have an eclipse plugin I'm developing for android development. It's based off the Java Bridge from Google/MIT's App Inventor library. The plugin simply adds a new project wizard (which copies over a couple of jars, along with some other files, and modifies the project.properties file). It also includes a wizard to easily create a new app widget.
For the new project wizard, I essentially just copied AdtPlugin, and changed the references to AltBridge, and removed stuff which I wasn't going to need. This worked fine from r15-r16. However, I recently updated to the newest adt (r19), and did something stupid. I went and made modifications on my plugin activator class to match the changes with the new adt version. The really stupid thing is I didn't back up my files beforehand.
Anyways, the problem I'm now having is that the R file isn't getting generated after the wizard completes. If I exit eclipse, then restart it, then clean the project, the R file gets generated, and errors go away.
Also, if I use the new widget wizard, it creates the xml files fine, but then I get an error in the console saying that aapt cannot be found. A restart of eclipse fixes this.
If you'd like to see some code, let me know. As the activator class is quite large, I didn't want to post the whole thing here.
A:
Found the issue. In the start(BundleContext context method, it was parsing the SDK. As the adtplugin does this, it was causing a conflict on multiple levels.
|
600 P.2d 496 (1979)
42 Or.App. 339
Helen KRIZ, Appellant,
v.
GOVERNMENT EMPLOYEES INSURANCE COMPANY, a Corporation, Respondent.
No. A7611-16529; CA 12871.
Court of Appeals of Oregon.
Argued and Submitted June 28, 1979.
Decided September 24, 1979.
*497 Raymond J. Conboy, Portland, argued the cause for appellant. With him on the briefs were Pozzi, Wilson, Atchison, Kahn & O'Leary, and Green & Griswold, Portland.
James Callahan, Portland, argued the cause for respondent. With him on the brief were David C. Landis, and Gearin, Landis & Aebi, Portland.
Before SCHWAB, C.J., and THORNTON, BUTTLER and JOSEPH, JJ.
JOSEPH, Judge.
This is an action against an insurer for refusal to settle within the limits of its policy a personal injury action brought against its insured. Judgment was entered against the insured in the personal injury action for a sum greatly in excess of the policy limits. Plaintiff here is the person who brought the personal injury action against the insured and is the assignee of the insured's cause of action against the insurer. The insurer was granted summary judgment. Plaintiff appeals.
We must determine whether the trial court was correct in concluding that there were no genuine issues of material fact remaining to be litigated and that the insurer was entitled to judgment as a matter of law. ORS 18.105(3). For that determination we view the evidence in the light most favorable to plaintiff. Forest Grove Brick v. Strickland, 277 Or. 81, 559 P.2d 502 (1977).
Plaintiff sustained severe injuries when a car in which she was riding was struck by a vehicle driven by Nicholas Barry (Barry). One of her legs was amputated, and she incurred hospital and medical bills of nearly $18,000. The circumstances indicated Barry's responsibility. Government Employees Insurance Company (GEICO) insured Barry. The policy provided $10,000/$20,000 liability coverage the lower limit for each injured person, the higher for each occurrence on Barry's pickup truck and $25,000/$50,000 on his car. The policy provided for payment on behalf of the insured of all sums up to the stated limits which he should become legally obligated to pay as damages because of bodily injury sustained by any person arising out of the ownership, maintenance or use of the "owned automobile" or a "non-owned automobile." The policy defined "owned automobile" to include a "temporary substitute automobile," i.e.,
"* * * any automobile * * * not owned by the named insured, while temporarily used with the permission of the owner as a substitute for the owned automobile * * * when withdrawn from normal use because of its breakdown, repair, servicing, loss or destruction."
"Non-owned automobile" was defined as an automobile
"* * * not owned or furnished for the regular use of either the named insured or any relative, other than a temporary substitute automobile."
"Relative" was defined as "a relative of the named insured who is a resident of the same household."
The accident occurred during a period in which Barry was temporarily staying with his sister and brother-in-law on their ranch in southeastern Oregon. His pickup truck, which he had driven there, had become inoperable. At the time of the accident he was driving a pickup belonging to his sister and brother-in-law to pick up a load of plywood to be used on the ranch. That truck was insured by American States Insurance Company (American States).
On November 21, 1972, roughly two and one-half months after the accident, a lawyer representing GEICO wrote a letter to GEICO stating:
"Based upon the information developed through the investigation to this point, it appears that your insured, Mr. Barry, was operating a vehicle which his sister, with *498 whom he resided in the same household, jointly owned, and under circumstances in which it was not a temporary substitute automobile as defined in the policy. Therefore, as we interpret the policy, the vehicle which he was driving was not a `non-owned vehicle' to which coverage under the policy would extend."
The extent of the investigation conducted prior to that letter and the information alluded to in it are not disclosed in the record. Sometime prior to December 14, 1973, plaintiff filed a personal injury action against Barry. GEICO undertook defense of that action, subject to a reservation of rights.
In January, 1974, while the personal injury action was pending, GEICO filed a declaratory judgment action against Barry, Kriz, the plaintiff here, and others seeking a declaration that its policy did not cover Barry's liability and that it was not required to defend him in the personal injury action.[1] Although the initial complaint in that case did not specifically request a determination whether the $10,000/$20,000 or $25,000/$50,000 limits were applicable, all other indications are that that was made an issue prior to the letter discussed in the following paragraph.
Attorney Atchison represented plaintiff here in both the personal injury action and the declaratory judgment action brought by GEICO. On May 10, 1974, while both actions were still pending, he wrote a letter to attorney O'Hanlon, who represented GEICO in the declaratory judgment action, and to the attorneys defending Barry on behalf of American States and GEICO. That letter stated in material part:
"As you know, Mrs. Kriz's case against Mr. Barry will be tried * * * on June 20, 1974. * * * AS you know, Mrs. Kriz suffered serious and permanent injuries including a lower leg amputation, and I enclose copies of the following medical reports * * *."
[There followed an itemization of medical expenses totalling $17,927.76.]
"The American States Insurance Company has a $10,000/20,000 policy and has previously indicated their [sic] willingness to pay their [sic] $10,000.
"Government Employees Insurance Company takes the position that their [sic] policy covering Mr. Barry does not apply, and they have filed a declaratory action. Discovery has been taken in that case and contrary to the allegations in the complaint it appears that there is in fact coverage protecting Mr. Barry in this accident.
"In an effort to get the matter settled for Mrs. Kriz at the least possible expense to her and with her concurrence and the concurrence of her family, we herewith offer to settle Mrs. Kriz's personal injury case for the sum of the single limit of the two policies. We will leave this offer open for a period of ten days, at which time the offer will be withdrawn. We will then proceed to trial against Mr. Barry and will not be in a position to discuss settlement of Mrs. Kriz's very serious injury for the applicable limit of the insurance."
On May 16, 1974, O'Hanlon responded to Atchison's letter:
"This is to acknowledge receipt of your letter of May 10, 1974 in which you demand that Government Employees Insurance Company pay to your client, Helen Kriz, the policy limit for a single occurrence of injury.
"As you know and recite in your letter, Government Employees Insurance Company earnestly believes that Mr. Nicholas Barry does not have insurance coverage for the accident involving your client. In order to resolve that controversy, Government Employees Insurance Company filed a declaratory judgment to resolve that question. Discovery in that declaratory action clearly indicates that Mr. Nicholas Barry does not have coverage for the accident involving your client. *499 The automobile driven by Mr. Nicholas Barry was not an `owned' automobile within the policy definition of that term because the pick-up involved in the accident was owned by Ruth and William Cox, Mr. Barry's sister and brother-in-law. Similarly, the vehicle was not a `non-owned' automobile because it was owned by a relative residing in the same household as Mr. Barry. However, it is clear that Mr. Barry has coverage under the American States Insurance Company policy and that your client may benefit therefrom because, as you state, they have tendered their policy limit to you.
"Furthermore, the complaint for declaratory judgment asks the court to resolve the coverage issue with regard to the single limit coverage applicable to this action. Assuming for purposes of argument that Mr. Nicholas Barry has coverage under this policy with Government Employees Insurance Company, there is an independent issue of coverage with respect to whether Mr. Barry would be entitled to the benefits of the $25,000/50,000 limits applicable to the Mercedes automobile or the $10,000/20,000 limits applicable to the pick-up truck. As you know Mr. Barry took the pick-up with him and regarded it as his own when he was permanently separated from his wife in July of 1972. It was upon that same pick-up that he placed sole reliance for his transportation at the time of the accident because he and the pick-up were in Lakeview, Oregon and the Mercedes automobile and Mrs. Lois Barry were in Roseburg, Oregon. To the best of our knowledge, that arrangement was never altered. Accordingly, Government Employees Insurance Company believes that even if a court should rule that Mr. Nicholas Barry has coverage under his policy with them, he would only be entitled to the benefits of the $10,000/20,000 limit applicable to the pick-up truck.
"With these two legitimate questions of insurance coverage unanswered with regard to Mr. Nicholas Barry's policy with Government Employees Insurance Company, Government Employees Insurance Company cannot intelligently respond to your demand letter of May 10, 1974. Therefore, Government Employees Insurance Company requests that you extend the time for response to your letter until the court has ruled upon these issues and postpone Mrs. Helen Kriz's lawsuit until these issues have been determined.
"If the Court rules in your client's favor, Government Employees Insurance Company will immediately offer to Mrs. Kriz the single policy limit found applicable by the court."
Atchison never responded to O'Hanlon's letter. He later testified on deposition that had GEICO offered $10,000, he would have accepted. He also testified in regard to his letter:
"Well, even though Mr. Barry had the pickup which the policy provided had a 10-20 coverage on it, we could, perhaps argue and negotiate with the carrier that perhaps there's a chance that the higher of the two limits would apply and obtain a little better settlement for the client by negotiating between the 10 and the 25."
About October 11, 1974, O'Hanlon inquired of Atchison "whether [he] would care to extend an offer to settle upon a 10-20 basis." There is no evidence of an express response.
The declaratory judgment action was tried on October 22-23, 1974. The jury found that at the time of the accident, Barry's own pickup was disabled and that the truck he was driving was a "temporary substitute automobile." Therefore, the court declared that GEICO's policy applied, but it also determined that the applicable limit of the insurer's liability was the $25,000/$50,000 limit provided for Barry's car. Shortly after that decision was rendered, the attorney representing GEICO in the personal injury action offered to settle for $25,000. Atchison rejected that offer. On October 16, 1975, the Oregon Supreme Court modified the judgment in the declaratory proceeding after determining that the $10,000/$20,000 limit provided for Barry's truck applied to the accident in question. Govt. Employees Ins. Co. v. Barry, 273 Or. 326, 541 P.2d 138 (1975).
*500 Plaintiff's personal injury action against Barry was tried in December, 1974. She was awarded a $97,898.26 judgment. Barry subsequently assigned to her his cause of action against GEICO for refusal to settle within the policy limits. The propriety of that assignment is not in issue.
Plaintiff's complaint in this action alleged in material part:
"[T]he attorneys for Helen Kriz offered to settle her case against Nicholas Loftus Barry for the limits of the policy in full settlement of all claims for damages, arising out of said accident for the injuries to plaintiff. Said offer was communicated to the defendant, but the defendant rejected said offer of settlement.
"In failing to accept said offer of settlement, defendant was negligent and acted in bad faith and in disregard of the interest of its insured, Nicholas Loftus Barry; and that it knew, or should have known, there was substantial evidence of the insured's responsibility for the accident and serious injuries to Helen Kriz; and that by refusing to accept said offer of settlement, defendant exposed Nicholas Loftus Barry, its insured, to a large judgment for damages in excess of the limits of liability of his insurance policy."
Plaintiff and GEICO each filed motions for summary judgment. GEICO's motion was based in part[2] on the argument that:
"The demand letter of plaintiff's attorney, Mr. Atchison, was not a `clear and unambiguous' offer to settle the personal injury action for the policy limits. It was rather a carefully ambiguous demand, coupled with a sudden death timetable intended to set up the insurance company for a `bad faith' claim."
The trial court allowed GEICO's motion without opinion.
It is well established that an insurer may be liable to its insured for the excess of a judgment over the limits of a liability policy if the insurer has failed, negligently or in bad faith, to settle the claim against the insured. Eastham v. Oregon Auto. Ins. Co., 273 Or. 600, 540 P.2d 364 (1975); Groce v. Fidelity General Insurance, 252 Or. 296, 448 P.2d 554 (1968); Radcliffe v. Franklin Nat'l Ins. Co., 208 Or. 1, 298 P.2d 1002 (1956). When an opportunity to settle within the policy limit is presented, the insurer, which is in a position of trust in managing the litigation, must consider the interests of the insured equally with its own. Eastham v. Oregon Auto. Ins. Co., supra. In other words, the insurer should exercise its judgment as if it would be solely responsible for the entire judgment.
On appeal, GEICO has abandoned its contention that 10 days was per se an unreasonably short time to leave the offer open. GEICO argues only that Atchison's letter did not convey a clear, unequivocal and unambiguous offer to settle within the policy limits and therefore could not be the basis for any liability. Plaintiff disagrees and argues that GEICO was not entitled to summary judgment on that or any other basis.[3]
We recognize that there are at least two possible ambiguities and one equivocation in Atchison's letter. They are all in one clause:
"* * * we herewith offer to settle Mrs. Kriz's personal injury case for the sum of the single limit of the two policies."
The first possible ambiguity is whether plaintiff's offer to settle with GEICO was *501 for the "applicable limit" of GEICO's policy (with American States paying its policy limit) or whether the offer contemplated GEICO paying the total of its policy limit and American States'. The letter did clearly state, however, that American States had agreed to pay the applicable limit of its $10,000/$20,000 policy, i.e., $10,000. Given the circumstances and that contextual background, a jury might reasonably conclude that GEICO should have interpreted the offer as one for its policy limit. The second possible ambiguity is whether plaintiff was offering to settle for the single person or single occurrence limit of the policy. Under the circumstances and in light of the letter's statement that American States was willing to pay $10,000 on its $10,000/$20,000 policy, a jury could find that the offer should reasonably have been taken as one for the single injury limit. Neither of these possible ambiguities is the basis for the problem, however.
It is the letter's equivocation with respect to the dollar amount of the "applicable limit" on which GEICO focuses. The evidence leaves no doubt that Atchison knew there was uncertainty as to whether the single injury limit was the $10,000 provided for Barry's truck or the $25,000 provided for his car. It is also clear that Atchison consciously avoided any commitment to a precise sum. Nevertheless, the letter did convey an offer to settle for the "applicable" policy limit.
GEICO could have responded to the letter other than it did. GEICO maintained all along that $10,000 was the applicable limit, if the claim was covered at all. It could have simply responded that it would pay $10,000.[4] Atchison testified that he would have accepted that. That would have settled the case, if Atchison's testimony that he would have accepted such an offer is credible, as we must treat it on reviewing a summary judgment.
Instead, GEICO declined to make any settlement offer until the declaratory judgment proceeding determined whether it had to cover the claim. A jury could find that GEICO was presented a reasonable opportunity to settle for the $10,000 policy limit, that in responding to the opportunity GEICO placed its own interests above those of its insureds and that had GEICO acted in "good faith" the claim would have been settled for the policy limit. On the other hand, a jury might find that GEICO was not presented a reasonable opportunity to settle (given, say, the issues of the existence and amount of coverage and Atchison's knowledge of those factors) or that the responsibility for the failure to settle lay at plaintiff's or her attorney's door. It was not the trial court's function, and it is not our function, to decide issues which are basically factual, like negligence or bad faith, or issues of credibility. Those are issues for trial.
We conclude that GEICO's motion for summary judgment should not have been granted. The judgment is therefore reversed and the matter remanded for trial.
Reversed and remanded.
NOTES
[1] That the declaratory judgment action was not properly maintainable was not raised. See Mitchell Bros. Truck Lines v. Lexington Insurance Company, 287 Or. 217, 598 P.2d 294 (1979).
[2] GEICO urged as an "alternative ground in support of its motion for summary judgment":
"* * * GEICO submits that the `offer' was not capable of acceptance since it failed to make any provision for the compromise or settlement of an outstanding subrogation claim of Safeco Insurance Company against the insured for PIP payments to the Kriz family."
There is virtually no evidence in the record with respect to any PIP payments or any interest of Safeco. It is clear that O'Hanlon's letter did not mention that problem. Because of the inadequacy of the record on that point and the fact that GEICO has abandoned that ground, we do not reach that issue.
[3] Plaintiff also argues two procedural reasons why the granting of summary judgment was erroneous. In the light of our disposition, we do not reach those issues.
[4] A jury could find that that amount, or $25,000 for that matter, was clearly within the amount of damages plaintiff could be expected to be awarded and that Barry's tort liability was clear.
|
NEW DELHI: The ED said on Monday it has attached a Paris-based property worth Rs 5.83 crore of the ex-wife of Christian Michel , the alleged middleman arrested in the VVIP choppers scam case, under the anti-money laundering law.
It said a provisional order under the Prevention of Money Laundering Act (PMLA) has been issued to attach the asset at 45 Avenue, Victor Hugo in France and it is in the name of Ms SCI Solaime and belongs to Michel's ex-wife Valerie Michel.
The Enforcement Directorate alleged that the woman had received "proceeds of crime" of this scam from the accused, Michel.
The agency said its probe found that Michel "had transferred the amount received as kickbacks to various entities, including euro 9,22,185.76 (equivalent to Rs 5,83,40,422) to his ex-wife Valerie Michel and subsequently to SCI Solaime for investment in purchase of the immovable property."
Michel was extradited from the UAE in December last year and was arrested by the ED. He is in judicial custody.
Michel is among the three alleged middlemen being probed in the Rs 3,600-crore case by ED and CBI. The others are foreign nationals — Guido Haschke and Carlos Gerosa.
The ED, in its chargesheet filed against Michel in June 2016, has alleged that he received euro 30 million — about Rs 225 crore — from AgustaWestland , the manufacturer of the helicopters.
|
using System;
using System.Net.Http;
namespace k8s
{
public partial class KubernetesClientConfiguration
{
public HttpClientHandler CreateDefaultHttpClientHandler()
{
var httpClientHandler = new HttpClientHandler();
#if !NET452
var uriScheme = new Uri(this.Host).Scheme;
if (uriScheme == "https")
{
if (this.SkipTlsVerify)
{
httpClientHandler.ServerCertificateCustomValidationCallback =
(sender, certificate, chain, sslPolicyErrors) => true;
}
else
{
httpClientHandler.ServerCertificateCustomValidationCallback =
(sender, certificate, chain, sslPolicyErrors) =>
{
return Kubernetes.CertificateValidationCallBack(sender, this.SslCaCerts, certificate, chain,
sslPolicyErrors);
};
}
}
#endif
AddCertificates(httpClientHandler);
return httpClientHandler;
}
public void AddCertificates(HttpClientHandler handler)
{
if ((!string.IsNullOrWhiteSpace(this.ClientCertificateData) ||
!string.IsNullOrWhiteSpace(this.ClientCertificateFilePath)) &&
(!string.IsNullOrWhiteSpace(this.ClientCertificateKeyData) ||
!string.IsNullOrWhiteSpace(this.ClientKeyFilePath)))
{
var cert = CertUtils.GeneratePfx(this);
#if NET452
((WebRequestHandler)handler).ClientCertificates.Add(cert);
#else
handler.ClientCertificates.Add(cert);
#endif
}
}
public static DelegatingHandler CreateWatchHandler() => new WatcherDelegatingHandler();
}
}
|
In addition to crops like peanuts, pecans, bluberries and peaches, Alabama is ranked #2 nationally in freshwater fish production and #3 in poultry production. Responsible for $13 billion a year in food processing means we’re dedicated to helping feed the world.
With products ranging from snack foods to soft drinks, fruits to nuts, and from poultry and eggs to farm-fresh fish, Alabama has become the base of operations to some of the most innovative and successful food producers in the country.
Alabama utilizes 9 million acres of farmland, over 48,000 farms, and 94,000 direct employees in agriculture and food production. With that many human and material resources available, we’re more than ready to help grow your industry. |
Fluorescence interference contrast microscopy
Fluorescence interference contrast (FLIC) microscopy is a microscopic technique developed to achieve z-resolution on the nanometer scale.
FLIC occurs whenever fluorescent objects are in the vicinity of a reflecting surface (e.g. Si wafer). The resulting interference between the direct and the reflected light leads to a double sin2 modulation of the intensity, I, of a fluorescent object as a function of distance, h, above the reflecting surface. This allows for the nanometer height measurements.
FLIC microscope is well suited to measuring the topography of a membrane that contains fluorescent
probes e.g. an artificial lipid bilayer, or a living cell membrane or the structure of fluorescently labeled proteins on a surface.
FLIC optical theory
General two layer system
The optical theory underlying FLIC was developed by Armin Lambacher and Peter Fromherz. They derived a relationship between the observed fluorescence intensity and the distance of the fluorophore from a reflective silicon surface.
The observed fluorescence intensity, , is the product of the excitation probability per unit time, , and the probability of measuring an emitted photon per unit time, . Both probabilities are a function of the fluorophore height above the silicon surface, so the observed intensity will also be a function of the fluorophore height. The simplest arrangement to consider is a fluorophore embedded in silicon dioxide (refractive index ) a distance d from an interface with silicon (refractive index ). The fluorophore is excited by light of wavelength and emits light of wavelength . The unit vector gives the orientation of the transition dipole of excitation of the fluorophore. is proportional to the squared projection of the local electric field, , which includes the effects of interference, on the direction of the transition dipole.
The local electric field, , at the fluorophore is affected by interference between the direct incident light and the light reflecting off the silicon surface. The interference is quantified by the phase difference given by
is the angle of the incident light with respect to the silicon plane normal. Not only does interference modulate , but the silicon surface does not perfectly reflect the incident light. Fresnel coefficients give the change in amplitude between an incident and reflected wave. The Fresnel coefficients depend on the angles of incidence, and , the indices of refraction of the two mediums and the polarization direction. The angles and can be related by Snell's Law. The expressions for the reflection coefficients are:
TE refers to the component of the electric field perpendicular to the plane of incidence and TM to the parallel component (The incident plane is defined by the plane normal and the propagation direction of the light). In cartesian coordinates, the local electric field is
is the polarization angle of the incident light with respect to the plane of incidence. The orientation of the excitation dipole is a function of its angle to the normal and azimuthal to the plane of incidence.
The above two equations for and can be combined to give the probability of exciting the fluorophore per unit time .
Many of the parameters used above would vary in a normal experiment. The variation in the five following parameters should be included in this theoretical description.
The coherence of the excitation light
The incident angle () of excitation light
Polarization angle () of the excitation light
The angle of transition dipole () of the fluorophore
The wavelength of the excitation light ()
The squared projection must be averaged over these quantities to give the probability of excitation . Averaging over the first 4 parameters gives
Normalization factors are not included. is a distribution of the orientation angle of the fluorophore dipoles. The azimuthal angle and the polarization angle are integrated over analytically, so they no longer appear in the above equation. To finally obtain the probability of excitation per unit time, the above equation is integrated over the spread in excitation wavelength, accounting for the intensity and the extinction coefficient of the fluorophore .
The steps to calculate are equivalent to those above in calculating except that the parameter labels em are replaced with ex and in is replaced with out.
The resulting fluorescence intensity measured is proportional to the product of the excitation probability and emission probability
It is important to note that this theory determines a proportionality relation between the measured fluorescence intensity and the distance of the fluorophore above the reflective surface. The fact that it is not an equality relation will have a significant effect on the experimental procedure.
Experimental Setup
A silicon wafer is typically used as the reflective surface in a FLIC experiment. An oxide layer is then thermally grown on top of the silicon wafer to act as a spacer. On top of the oxide is placed the fluorescently labeled specimen, such as a lipid membrane, a cell or membrane bound proteins.
With the sample system built, all that is needed is an epifluorescence microscope and a CCD camera to make quantitative intensity measurements.
The silicon dioxide thickness is very important in making accurate FLIC measurements. As mentioned before, the theoretical model describes the relative fluorescence intensity measured versus the fluorophore height. The fluorophore position cannot be simply read off of a single measured FLIC curve. The basic procedure is to manufacture the oxide layer with at least two known thicknesses (the layer can be made with photolithographic techniques and the thickness measured by ellipsometry). The thicknesses used depends on the sample being measured. For a sample with fluorophore height in the range of 10 nm, oxide thickness around 50 nm would be best because the FLIC intensity curve is steepest here and would produce the greatest contrast between fluorophore heights. Oxide thickness above a few hundred nanometers could be problematic because the curve begins to get smeared out by polychromatic light and a range of incident angles. A ratio of measured fluorescence intensities at different oxide thicknesses is compared to the predicted ratio to calculate the fluorophore height above the oxide ().
The above equation can then be solved numerically to find .
Imperfections of the experiment, such as imperfect reflection, nonnormal incidence of light and polychromatic light tend to smear out the sharp fluorescence curves. The spread in incidence angle can be controlled by the numerical aperture (N.A.). However, depending on the numerical aperture used, the experiment will yield good lateral resolution (x-y) or good vertical resolution (z), but not both. A high N.A. (~1.0) gives good lateral resolution which is best if the goal is to determine long range topography. Low N.A. (~0.001), on the other hand, provides accurate z-height measurement to determine the height of a fluorescently labeled molecule in a system.
Analysis
The basic analysis involves fitting the intensity data with the theoretical model allowing the distance of the fluorophore above the oxide surface () to be a free parameter.
The FLIC curves shift to the left as the distance of the fluorophore above the oxide increases. is usually the parameter of interest, but several other free parameters are often included to optimize the fit. Normally an amplitude factor (a) and a constant additive term for the background (b) are included. The amplitude factor scales the relative model intensity and the constant background shifts the curve up or down to account for fluorescence coming from out of focus areas, such as the top side of a cell. Occasionally the numerical aperture (N.A.) of the microscope is allowed to be a free parameter in the fitting. The other parameters entering the optical theory, such as different indices of refraction, layer thicknesses and light wavelengths, are assumed constant with some uncertainty.
A FLIC chip may be made with oxide terraces of 9 or 16 different heights arranged in blocks. After a fluorescence image is captured, each 9 or 16 terrace block yields a separate FLIC curve that defines a unique . The average is found by compiling all the values into a histogram.
The statistical error in the calculation of comes from two sources: the error in fitting of the optical theory to the data and the uncertainty in the thickness of the oxide layer. Systematic error comes from three sources: the measurement of the oxide thickness (usually by ellipsometer), the fluorescence intensity measurement with the CCD, and the uncertainty in the parameters used in the optical theory. The systematic error has been estimated to be .
References
Category:Microscopy
Category:Nanotechnology |
Q:
Mongoose multiple dependant queries
I am trying to save a new document to a collection and update two other documents in two different collections at the same time like this:
const newApplication = new ApplicationSchema({...})
newApplication.save()
EventSchema.findByIdAndUpdate(event_id, { $inc: { "application_counts": 1 } })
EventOwnerSchema.findByIdAndUpdate(event_owner_id, { $dec: { "balance": ticketPrice } })
These operations are related to each other and I want to make all of them fail if any of them fails. One possible solution maybe chaining them and reverting back previous updates, if in any step one of them fails.
const newApplication = new ApplicationSchema({...})
newApplication.save((err, res_1) => {
if(err) {
return false;
}
EventSchema.findByIdAndUpdate(event_id, { $inc: { "application_counts": 1 } }, (err, res_2) => {
if(err) {
ApplicationSchema.deleteOne({_id: res_1._id})
return false;
}
EventOwnerSchema.findByIdAndUpdate(event_owner_id, { $dec: { "balance": ticketPrice } }, (err, res_3) => {
if(err) {
ApplicationSchema.deleteOne({_id: res_1._id})
EventSchema.findByIdAndUpdate(event_id, { $dec: { "application_counts": 1 } })
return false;
}
return true;
})
})
})
However, this solution doesn't look ideal for performance (and also for the same reason this problem exists but I am being too fussy I guess). Any suggestions?
Edit:
Footnote: I am not using embedded documents for other reasons.
A:
Transactions is the thing for this. Mongoose Transactions
It allows you to create a session, do some operation and abort/commit the changes you made inside the session.
const mongoose = require("mongoose");
// Start the session
const session = await mongoose.startSession();
session.startTransaction();
try {
// Perform queries
const newApplication = new ApplicationSchema({...})
const p1 = newApplication .save();
const p2 = EventSchema.findByIdAndUpdate(event_id, { $inc: { "application_counts": 1 } })
const p3 = EventOwnerSchema.findByIdAndUpdate(event_owner_id, { $dec: { "balance": ticketPrice } })
// Wait for the results
const values = await Promise.all([p1, p2, p3]);
// If did not throw any errors, commit changes and resolve
await session.commitTransaction();
resolve(values);
} catch (err) {
// If an error occured, abort all changes and reject
await session.abortTransaction();
reject(err);
}
Thanks for the comment @Thomas Bormans
|
Calculating response functions in time domain with nonorthonormal basis sets
We extend the recently proposed order-N algorithms for calculating linear- and nonlinear-response functions in time domain to the systems described by nonorthonormal basis sets. |
Japanese guidance for ventricular assist devices/total artificial hearts.
To facilitate research and development (R&D) and to expedite the review processes of medical devices, the Ministry of Health, Labor and Welfare (MHLW) and the Ministry of Economy, Trade and Industry (METI) founded a joint committee to establish guidance for newly emerging technology. From 2005 to 2007, two working groups held discussions on ventricular assist devices and total artificial hearts, including out-of-hospital programs, based on previous guidance documents and standards. Based on this discussion, the METI published the R&D Guidelines for innovative artificial hearts in 2007, and in 2008 the MHLW published a Notification by Director regarding the evaluation criteria for emerging technology. |
Q:
UIImageView+AFNetworking setImageWithURL with animation
With AFNetworking, is very simple to download an image from a server and put into an UIImageView:
[imageView setImageWithURL:[NSURL URLWithString:@"http://i.imgur.com/r4uwx.jpg"] placeholderImage:[UIImage imageNamed:@"placeholder-avatar"]];
How about if I want to do this replacement of image with an effect (maybe fade)???
It's because I want to make a slideshow with a lot of images.
A:
You can use animateWithDuration in conjunction with the rendition of setImageWithURL that supplies the success block, e.g.
[imageView setImageWithURL:[NSURL URLWithString:@"http://i.imgur.com/r4uwx.jpg"]
placeholderImage:[UIImage imageNamed:@"placeholder-avatar"]
success:^(NSURLRequest *request, NSHTTPURLResponse *response, UIImage *image) {
self.imageView.alpha = 0.0;
self.imageView.image = image;
[UIView animateWithDuration:0.25
animations:^{
self.imageView.alpha = 1.0;
}];
}
failure:NULL];
Or, if you placeholder image isn't blank, you would probably want to cross dissolve via transitionWithView:
[imageView setImageWithURL:[NSURL URLWithString:@"http://i.imgur.com/r4uwx.jpg"]
placeholderImage:[UIImage imageNamed:@"placeholder-avatar"]
success:^(NSURLRequest *request, NSHTTPURLResponse *response, UIImage *image) {
[UIView transitionWithView:self.imageView
duration:0.3
options:UIViewAnimationOptionTransitionCrossDissolve
animations:^{
self.imageView.image = image;
}
completion:NULL];
}
failure:NULL];
Update:
By the way, if you're concerned about the fact that the image view (and if you refer to self, the view or the view controller, too) being retained until the download is done, you could:
__weak UIImageView *weakImageView = self.imageView;
[imageView setImageWithURL:[NSURL URLWithString:@"http://i.imgur.com/r4uwx.jpg"]
placeholderImage:[UIImage imageNamed:@"placeholder-avatar"]
success:^(NSURLRequest *request, NSHTTPURLResponse *response, UIImage *image) {
UIImageView *strongImageView = weakImageView; // make local strong reference to protect against race conditions
if (!strongImageView) return;
[UIView transitionWithView:strongImageView
duration:0.3
options:UIViewAnimationOptionTransitionCrossDissolve
animations:^{
strongImageView.image = image;
}
completion:NULL];
}
failure:NULL];
Even if you do that, the image view is retained until the download completes, so you could optionally also cancel any download in progress in the dealloc method of the view controller:
- (void)dealloc
{
// if MRC, call [super dealloc], too
[_imageView cancelImageRequestOperation];
}
A:
Try animating the alpha of the imageView from 0 to 1 when the online request completes with success:
// You should not call an ivar from a block (so get a weak reference to the imageView)
__weak UIImageView *weakImageView = self.imageView;
// The AFNetworking method to call
[imageView setImageWithURLRequest:[NSURLRequest requestWithURL:[NSURL URLWithString:@"http://host.com/image1.png"]] placeholderImage:nil]
success:^(NSURLRequest *request, NSHTTPURLResponse *response, UIImage *image){
// Here you can animate the alpha of the imageview from 0.0 to 1.0 in 0.3 seconds
[weakImageView setAlpha:0.0];
[UIView beginAnimations:nil context:NULL];
[UIView setAnimationDuration:0.3];
[weakImageView setAlpha:1.0];
[UIView commitAnimations];
}
failure:^(NSURLRequest *request, NSHTTPURLResponse *response, NSError *error){
// Your failure handle code
}
Of course you can use any other animation you like inside the completion block!
|
Q:
How to avoid exit of Windows cmd terminal if called command executes `exit`?
In a Windows cmd terminal, by cmd, I call command scripts (.cmd), but some of these does an exit [code] without the /B, whereby my Windows terminal is terminated.
How to avoid exit of Windows cmd terminal if called command executes exit without the /B?
A:
You could invoke scriptname.cmd with cmd /c. That way exit will exit your cmd /c invocation, rather than the ancestral console process.
Test1.bat:
@echo off & setlocal
echo Exiting.
exit 0
Test2.bat:
@echo off & setlocal
echo Invoking Test1.bat
cmd /c Test1.bat
echo Still running!
Output of Test2.bat:
Invoking Test1.bat
Exiting.
Still running!
... and the console window remains open.
|
UBS announces comprehensive settlement, in principle, for all clients holding auction rate securities at the estimated cost of USD 900 million
UBS announced today a settlement, in principle, with the New York Attorney General (NYAG), the Massachusetts Securities Division, the Securities and Exchange Commission (SEC) and other state regulatory agencies represented by North American Securities Administrators Association (NASAA) to restore liquidity to all remaining clients' holdings of auction rate securities (ARS).
Under the agreement in principle, UBS has committed to purchase a total of USD 8.3 billion of ARS, at par, from most private clients during a two-year time period beginning January 1, 2009. Private clients and charities holding less than USD 1 million in household assets at UBS will be able to avail themselves of this relief beginning Oct. 31, 2008. From mid-September, UBS will provide loans at no cost to the client for the par value of their ARS holdings.
In addition, UBS has also committed to provide liquidity solutions to institutional investors and will agree from June 2010 to purchase all or any of the remaining USD 10.3.billion, at par, from its institutional clients. Today's news is in addition to the firm's recently announced intention to repurchase USD 3.5 billion of tax-exempt Auction Preferred Stock.
"Today's solution provides further relief, beginning in September, to investors who have been understandably frustrated by the industry-wide failure of the ARS market. Our leading position in supporting the market and providing liquidity is clear, and now, we are the first firm to give all clients -- private, corporate and institutional the opportunity to be made whole," said Marten Hoekstra, Head of UBS Wealth Management Americas.
"Since the breakdown in the market, UBS clients have been offered multiple liquidity options. They have been able to borrow 100 percent against the value of their holdings. The solutions announced today provide our clients with the widest range of choices in the industry, including a two-year window during which clients can either continue to earn interest or redeem their ARS at any time," Hoekstra added.
The firm has also agreed to pay a fine of USD 150 million - USD 75 million to the state of New York and USD 75 million to other state regulatory agencies. UBS neither admits nor denies allegations of wrongdoing.
The full cost of the proposed settlement, taking into account the projected redemption patterns of clients, the difference between the purchase prices and the current market value of client ARS holdings, and the regulatory fine related to the settlements, is estimated to be in the range of USD 900 million on a pre-tax basis, to be booked in the second quarter results. This includes reimbursements to all clients for losses incurred from sales of ARS holdings between Feb. 13 and Aug. 8, 2008.
A provision for the costs of this settlement will be included in the firm's second quarter financial results, which will be announced on Aug.12, 2008.
Results, including this settlement, for UBS AG for the second quarter will be consistent with guidance given by the firm on July 4, 2008. |
Background
==========
Tobacco remains the most common preventable cause of death in the world today. The World Health Organization estimates that tobacco killed 5.4 million people globally in 2008 and on current trend this will rise to 8 million deaths per year by 2030 with more than 80% of deaths occurring in the developing world \[[@B1]\]. Despite reduction in prevalence of smoking in the Australian population, tobacco use and dependence remains the risk factors associated with the greatest disease burden, accounting for 9.5% of the total burden in men and 6% in women \[[@B2]\]. More than one in six Australians continue to smoke each day, and tobacco smoking is responsible for the premature deaths of about 16,000 Australians each year \[[@B3]\]. Less than 10% of Australian smokers consistently deny any interest in quitting and approximately 40% report attempting to quit in the previous year \[[@B4]\]. Unfortunately unaided quit attempts have a low success rate of only 3-5% \[[@B5]\].
Suitability of general practice for a quit smoking intervention
---------------------------------------------------------------
General practice is well suited for supporting smoking cessation. Around 85% of the Australian population visits a general practitioner (GP) at least once a year \[[@B6]\]. There is variation in reported rates of smokers presenting in general practice, with between 19.9% -35% of adult patients reported as currently smoking \[[@B7],[@B8]\]. The familiar environment of general practice and the sustained relationships between patients and providers can provide an environment conducive to effective promotion of behavioural risk factor modification \[[@B9]\].
Current general practice intervention
-------------------------------------
There is clear evidence that smoking cessation advice from a physician has an effect. The Cochrane review of 17 trials of brief advice versus no advice estimates that brief advice increases absolute rates of cessation at one year follow-up by about 2.5% compared to usual care \[[@B10]\]. This effect can be increased substantially if brief advice is combined with other evidence based support such as pharmacotherapy \[[@B11]\].
GPs in Australia as elsewhere have been encouraged by clinical practice guidelines \[[@B11]\] to offer smoking cessation advice and support, and some have attended training \[[@B12]\]. Despite this the number of patients who report receiving advice on smoking cessation from GPs is low \[[@B13]\]. In an Australian study of GPs\' use of evidence-based approaches only 32% provided written materials and 28% set a \'quit date\' \[[@B14]\]. Barriers raised by GPs to engaging in greater efforts in smoking cessation include: perception of lack of effect; lack of GP time; lack of GP skills; reluctance to raise the issue due to perceived patient sensitivity about smoking; and perceived lack of patient motivation \[[@B15]\].
Quitline referral
-----------------
An alternative to in-practice support from the GP is for GPs to identify smokers, provide brief advice and actively refer interested patients to the telephone Quitline. A study in Australia which compared standard in-practice management to this active referral to Quitline has shown that at 3 month follow up patients randomised to the referral intervention had a higher rate of sustained abstinence (12.3% compared with 6.9%). At 12 month follow-up patients in the referral intervention had a higher rate of sustained abstinence (6.5% compared to 2.6%), however this did not reach statistical significance \[[@B16]\]. The researchers concluded that GPs referring smokers to an evidence based telephone cessation service can result in increased cessation.
Practice nurses and cessation support
-------------------------------------
An innovative model for enhanced smoking cessation support is provision of advice in the practice by general practice nurses. Practice nursing is rapidly emerging in Australia and is making a considerable contribution to capacity in primary care \[[@B17]\].
In Australia the practice nurse workforce has grown rapidly since 2003. Almost 60% of Australian general practices now employing a practice nurse \[[@B18]\] and practice nurses are increasingly regarded as core members of general practice teams \[[@B19]\]. The Australian Government has committed over \$A230 million to support practices to employ practice nurses, however, their potential impact has been constrained by poor role descriptions, inadequate funding models, negative GP attitudes and unclear legal implications of the nursing role \[[@B20]\].
Although consumers support the practice nurse role in principle, there is no research to date on consumer acceptability of specific practice nurse interventions \[[@B21]\]. There is also a need for trials to test the impact of practice nurse interventions to ensure that the significant investment being made in expanding the practice nurse workforce achieves maximum impact on improving quality of care and patient outcomes \[[@B22]\]. Face-to-face support for smoking cessation provided within the practice primarily by a trained practice nurse may appeal to different groups of smokers who are less likely to use a telephone service such as people from culturally and linguistically diverse backgrounds (CALD). Support in the practice has the potential to be even more effective than referral to an outside service, given the familiar environment and setting of the practice within the local community \[[@B9]\].
Several studies have explored the effectiveness of involving the practice nurse in supporting smokers to quit \[[@B23]-[@B31]\]. In a study by Vetter et al there was a significant benefit at six month follow up \[[@B26]\]; another study demonstrated a significant reduction in smoking status \[[@B29]\] and a third study showed a reduction in the number of cigarettes smoked per day \[[@B28]\]. All other studies showed no significant difference. Limitations of these studies included the low uptake of the nursing intervention \[[@B23]\], research designs that provided only a one off nurse consultation and a lack of follow-up \[[@B24]\]. Additionally, there were low retention rates amongst smokers in these studies. The difficulties in retention of this group as study participants may have been responsible for the small effect sizes and lack of significance seen in some studies \[[@B32]\].
Cost effectiveness of smoking cessation interventions
-----------------------------------------------------
Smoking cessation strategies have been shown to be highly cost effective compared to many pharmacological, surgical and hospital treatments or services \[[@B33]\]. A recent systematic review of studies in a range of settings adjusted for variation in program effects and costing methods found cost effectiveness ratios ranged from US\$490 to \$US15280 per life-years saved (LYS) in different settings \[[@B34]\].
Face to face interventions are the most common strategies. A recent review of cost effectiveness studies for such face to face health behaviour interventions addressing smoking cessation found favourable cost effectiveness ratios for smoking cessation programs compared to preventative pharmaceutical and invasive interventions \[[@B35]\].
More intensive interventions may be more effective but also more costly \[[@B10]\]. Many studies omit disadvantaged populations which are known to have higher levels of smoking \[[@B10]\]. Health gains are likely to be larger in such groups. Hence it is proposed that although more intensive interventions may be more costly, cost effectiveness will still be very favourable as a result of the high health gains. The cost effectiveness analysis in this study will compare the more intensive interventions to usual care.
Aims and objectives
-------------------
This study will test the uptake and effectiveness of enhanced in-practice support for smoking cessation. The in-practice intervention (**Quit with Practice Nurse**) involves flexible support for quitting provided primarily by the practice nurse in partnership with the patient\'s GP and the Quitline. The number and diversity of smokers receiving intensive intervention will be optimised by offering a flexible package of support from the nurse, GP and Quitline to match the patient\'s needs. The rationale is that delivering more integrated and intensive quitting support will be more effective and offering flexibility in service provision will reach more smokers from a wider range of demographic, socioeconomic and cultural backgrounds.
The impact of the \'Quit with Practice Nurse\' intervention will be compared contrasted with an alternative intervention group as well as with a control group. The alternative intervention is referral to an evidence based telephone support service (Quitline Referral Intervention). The control group is usual care by the GP (control group). Referral to a specialized cessation service such as the Quitline represents the major alternative approach to supporting cessation. An important strength of this study is the comparison of the new approach to both a referral model and usual care.
Specifically the study will
---------------------------
• Evaluate uptake of the \'Quit with Practice Nurse\' intervention versus the referral intervention and the control group in terms of the number of patients, demographics, socio-economic status, language and ethnicity, smoking history and level of nicotine dependence. *Hypothesis: the \'Quit with Practice Nurse\' intervention will reach more smokers because it will meet the needs of a greater range of smokers with different demographic, socioeconomic and cultural characteristics than referral model or standard in-practice GP management*.
• Compare the effect on cessation of \'Quit with Practice Nurse\' versus \'Quitline Referral\' and the control group. *Hypothesis: the \'Quit with Practice Nurse\' model will achieve higher quit rates as more patients will receive a cessation intervention that meets their individual needs*.
• Examine the cost effectiveness of the three approaches and their components from the perspective of the health care sector. *Hypothesis: the more intensive intervention may be more costly than usual care or \'Quitline Referral\' but any higher costs of the \'Quit with Practice Nurse\' intervention will be justified by its higher uptake and quit rate*.
• Assess the acceptability to patients of the \'Quit with Practice Nurse\' intervention. *Hypothesis: the \'Quit with Practice Nurse\' intervention will be acceptable to patients as it offers a flexible package of support to meet patient needs*.
• Assess acceptability and sustainability of practice nurse assisted support to quit from the perspective of practice nurses and GPs. *Hypothesis: the \'Quit with Practice Nurse\' intervention will be acceptable to practice nurses and GPs as it provides an important new role for practice nurses and provides GPs the option of referral within their practice*.
Methods/Design
==============
This study is a three arm cluster randomised trial involving general practices with practice nurses located in Sydney and Melbourne, which are Australia\'s two largest cities. Recruitment will expand if necessary to other parts of New South Wales and Victoria. Practices will be allocated to one of three groups 1) Quit with Practice Nurse 2) Quitline Referral 3) usual care control group.
Recruitment
-----------
### General practice recruitment
Practices which employ at least one practice nurse will be eligible to participate. Eligible practices will be identified with the assistance of local general practice networks (local GP organisations). All GPs working in these practices will be approached by mailing an initial invitation letter followed by a telephone call from one of the chief investigators. GPs expressing interest on the phone will be visited by project staff to explain the project to GPs and practice nurses and to gain informed consent.
Randomisation to intervention groups will follow procedures outlined in the CONSORT statement \[[@B36]\] and will be performed by a researcher independent of the project team. Randomisation will occur in permuted blocks of size three using a system of sealed envelopes. Following randomisation, practices are notified of their allocation prior to the commencement of patient recruitment. Practices in the control group are given copies of smoking cessation guidelines \[[@B11]\]. Practices in the active referral arm are in addition given copies of active referral sheets with which to make referrals to the Quitline. Practices in the \'Quit with Practice Nurse\' group are scheduled for the practice nurse to attend the one day training course (see below).
### Patient recruitment
Eligible patients are those aged 18 and over presenting to their GPs who are daily or weekly smokers. Potential participants will be excluded if they meet any of the following criteria: unable to give informed consent (poor physical and/or cognitive state), insufficient command of English to comprehend the consent process and/or data collection questions. A research assistant will be attached to each participating practice for a two week recruitment period and approach patients in the waiting room prior to the consultation with the GP. Initially the research assistant will assess patient eligibility and, if eligible, patients will be given a copy of participant information statement. Patients providing a written consent will be asked to complete the baseline data questionnaire at this time. Patients take notice of their participation into the GP consultation. GPs respond to this notification depending on their group allocation.
This method of recruitment maintains a separation of baseline data collection from the intervention. Waiting room recruitment has previously been used successfully by members of the research team in studies on smokers, \[[@B37],[@B38]\] risky drinkers \[[@B39]\] and overweight and obese patients \[[@B40]\].
Intervention
------------
### Quit with Practice Nurse
This intervention involves the practice nurse, GP and Quitline working in partnership with the patient to provide flexible assistance that meets the needs of individual smokers. The GP identifies smokers and their willingness to quit and offers brief advice. Patients with any interest in quitting are referred to the practice nurse. The practice nurses will see the patient for an initial assessment visit. At this assessment the practice nurse gathers information about patient demographics, smoking behaviour, stage of readiness to quit, previous quit attempts, nicotine dependence (using Fagerstrom test), previous use of pharmacotherapy and perceived barriers to quitting. Patients are assisted to develop a quit plan and (in consultation with the GP) encouraged to use pharmacotherapy according to recommendations in clinical practice guidelines \[[@B11],[@B41]\]. Patients are then offered a flexible package of ongoing support. Those able to attend for face-to-face counseling are offered a series of weekly (three follow-up visits) visits with the practice nurse. At these visits patients are provided behavioural counseling, support in use of pharmacotherapy, relapse prevention advice and encouragement of social support as shown in table [1](#T1){ref-type="table"}.
######
Practice Nurse Visits
---------------------------------------------------------------------------------------
Visit 1 Visit 2 Visit 3 Visit 4
----------------------------------------------- --------- --------- --------- ---------
Smoking assessment ✓
Nicotine dependence assessment ✓
Pharmacotherapy\ ✓ ✓ ✓ ✓
discussed
Nicotine patches offered to eligible patients ✓ ✓ ✓
Quit support plan developed ✓
Cessation counseling support ✓ ✓ ✓ ✓
---------------------------------------------------------------------------------------
Patients in this group who are unable to attend for face-to-face consultations or who prefer telephone counseling to support their quit attempts will be referred to the Quitline using a faxed referral system. As in the referral intervention described below, patients are contacted and offered services to meet their needs. Patients are encouraged to use the proactive callback service which has been shown to be more effective than reactive counseling \[[@B42]\]. Feedback is provided by the Quitline to the practice on acceptance, use and outcomes of services offered to facilitate the ongoing management of the patient in the practice. Patients who are able to attend one or two practice nurse visits will be offered a combination of nurse counseling and referral to Quitline.
### Nurse training for \'Quit with Practice Nurse\' intervention
Training for the practice nurses will consist of a one day training workshop where the nurses are educated in: 5As approach to smoking cessation counseling (Ask, Assess, Advise, Assist, Arrange follow-up); basics of motivational interviewing; nicotine dependence; smoking cessation pharmacotherapy and resources for smoking cessation including Quitline services. The practice nurses will receive mentoring over the course of the project from an experienced Quitline counselor who they can contact for advice. The counselors involved will attend the practice nurse training sessions to establish this mentoring relationship
### Active referral to Quitline
The \'**Quitline Referral\'**intervention involves the GPs identifying smokers and their willingness to quit and offering brief advice. Patients with any interest in quitting are offered referral to the Quitline. Patients who consent will have their referral faxed to the Quitline and are provided with a brochure on Quitline services. Patients are telephoned by the Quitline and offered services to meet their needs. Patients who express interest in quitting are offered a series of proactive callback counseling/advice sessions \[[@B42]\]. Referring practices are provided with feedback from the Quitline on acceptance, use and outcomes of services offered to facilitate ongoing management of the patient. GPs are expected to provide advice on use of medications and prescriptions where appropriate.
### Control Group
The control group involves GPs identifying smokers and their willingness to quit and offering assistance in accordance with their usual practice. This should include advice on use of medications to quit and prescriptions where appropriate. It may involve advice provided by themselves within the practice or referral to the Quitline or both where the GP deems it appropriate, but no provision is made to facilitate either. Based on previous work, levels of either referral or intense counseling within practice interventions are likely to be very low \[[@B16]\].
### Smoking cessation pharmacotherapy
Patients in all three groups will be encouraged to use smoking cessation pharmacotherapy based on best practice guidelines \[[@B11],[@B41]\]. For patients in all three groups who are on low incomes and therefore eligible for subsidised medicines under the Australian Government Pharmaceutical Benefit Scheme (PBS) the project will fund access to nicotine patches. This targeted subsidy will not disrupt the ecological validity of the study as a test of the different modes of cessation support as it will be offered equally across all three arms of the study
### Outcome measures
Patient level measures will be assessed at baseline, three months and 12 months (the schedule of data collection is shown in table [2](#T2){ref-type="table"}. At baseline patients will be asked to complete a paper questionnaire assessing demographics including age, sex, language spoken at home, ethnicity, education levels, occupation, current level of smoking, nicotine dependence, quitting history and presence of co-morbidities. Three month and 12 month data will be collected by Computer Assisted Telephone Interview (CATI) by trained interviewers who are blind to intervention group until after the outcome data is collected.
######
Schedule of data collection
At recruitment 3-months 12-months
-------------------------------------------------------------- ---------------- ---------- -----------
Age, gender, language spoken at home, X
Smoking history X X X
Nicotine dependence X X X
Sustained abstinence X X
Point prevalence abstinence X X
Quit attempts X
Intervention costs X X
Process evaluation data from patients
Process evaluation data from PN, GPs and Quitline counselors X
### Primary outcomes
Uptake of the intervention in each group and characteristics of patients - age, sex, language spoken at home, ethnicity, education levels, occupation, smoking history, level of smoking and nicotine dependence.
Smoking cessation rates: sustained abstinence defined as patients reporting abstinence of ≥ one month at the three month follow-up and ≥ 10 months at the 12 month follow-up; and point prevalence abstinence defined as ≥ seven days of sustained abstinence at the three month and 12 month follow-up points. Validation of smoking cessation will not be undertaken as reviews confirm the accuracy of self-report measures, and conclude that validation is unnecessary in trials where there is no strong association between the interviewer and respondent \[[@B43]\]. Number and duration of quit attempts will be a further outcome measure as it is known that the key effect of advice from a health professional is to encourage the smoker to try to quit \[[@B10],[@B11]\].
Health economic outcomes: the economic evaluation will compare the flexible support intervention \'Quit with Practice Nurse\' and the \'Quitline referral intervention\' with standard \'in practice management by the GP\' (control group.) Cost analysis will be from the perspective of the health care sector and include direct costs of the intervention, including for recruitment, and for the intervention (GP costs, practice nurse costs, nurse training costs, telephone counseling costs, pharmaceutical costs, and overheads such as room rents).
### Process outcomes
Quantitative and qualitative data on process outcomes will be collected as part of the CATI of participating patients in each of the three arms at the three month follow-up point. These questions will be asked only after the primary outcome data on abstinence has been collected. In the CATI patients in all three arms will be asked about uptake including barriers and enablers to uptake, extent and nature of the intervention received including use of smoking cessation pharmacotherapy (type of pharmacotherapy used and duration of use), acceptability and perceived value of the smoking cessation support received. The interviews will also explore patient perception on the influence of culture, language and socioeconomic status on the acceptability of the intervention approaches. Patients in the \'Quit with Practice Nurse\' arm will be asked further questions about the perceived value of the flexible approach to cessation support. These will include their level of awareness or lack of awareness of the flexibility, its importance or otherwise for them, the important factors in the choices made about support options, and their perception on the roles of the providers involved (practice nurse, GP and Quitline counselor).
The acceptability and sustainability of the \'Quit with Practice Nurse\' intervention will be evaluated with semi-structured interviews with participating practice nurses, GPs and Quitline counselors.
### Data Analysis
Analysis for the primary outcomes of sustained abstinence and point prevalence abstinence will be on an intention to treat basis with cases retained regardless of whether they accept or receive the intended intervention. A series of planned imputation strategies for missing data will be used in examining outcomes for missing data. These are 1) analysis will be done on all participating patients, where all patients with missing outcome data will be assumed to be smokers; 2) the last known value carried forward to replace the missing value; 3) an analysis of outcomes for patients with complete outcome data. We will compare cessation outcomes between the three arms at three months and 12 month follow-up using multiple logistic regression. This approach will allow us to adjust for clustering and to assess the effect of potential confounders such as age, sex, socioeconomic status, ethnicity, language spoken at home and nicotine dependence on cessation outcomes.
### Health economic analysis
The study will estimate incremental cost effectiveness ratios (ICER) of cost per quitter for brief advice and referral to Quitline, and with the flexible support intervention, compared to standard GP care. The ICER will be estimated for the 12 month quit rate for the intervention, less an unaided/natural quit rate. Adjustments to effect sizes will also be made for long term relapse rate among the 12 month quitters.
### Analysis of qualitative data on process outcomes
Analysis will be based on thematic analysis. Our aim is to identify common themes and issues about barriers and facilitators to the uptake of the intervention from the perspective of both patients and providers. This will allow a richer understanding of the experiences of participants in the study and maximise our capacity to provide meaningful answers to our research questions \[[@B44]\].
### Sample size
The observed 12 month sustained abstinence outcomes of GP usual care and Quitline referral in Borland et al.\'s study in Victoria were 2.6% and 6.5% respectively \[[@B16]\]. The sustained abstinence at six months in a pilot study of practice nurse support was 16%. Assuming this drops to 12% at 12 months we have calculated power to detect a 5.5% difference in sustained abstinence quit rates between \'Quit with Practice Nurse\' intervention versus the referral intervention and a 9.4% difference between \'Quit with Practice Nurse\' intervention and the usual care control group at one year follow up with 80% power at the 5% significance level. Before adjustment for clustering this requires 471 patients per group to detect the 5.5% difference and 140 per group to detect the 9.4% difference (calculations using STATA software). To adjust for clustering the intracluster correlation coefficient observed by Lennox et al. in a smoking cessation trial in general practice has been used. The intracluster correlation coefficient observed in this study was 0.013 \[[@B45]\]. The resulting design effect = \[1+ (size of cluster-1) × intracluster correlation\]. In this study we plan to recruit 25 patients per practice so the design effect is 1.31 so the number per arm is 471 × 1.31 = 617 giving a total sample size of 1851. To enroll these participants we will recruit 90 general practices and 2250 patients across New South Wales and Victorian study locations (to allow for approximately 10% drop out rate of practices) and randomise 30 practices to each arm of the study.
### Ethics Approval
The study has received ethics approval from the University of New South Wales, University of Melbourne and University of Western Sydney Human Research Ethics Committees.
### Trial Registration
Australian New Zealand Clinical Trials Registry (ANZCTR). Number: ACTRN12609001040257.
Discussion
==========
This project will test an approach to supporting smoking cessation in general practice based on partnership between the practice nurse, GP and patient to support quitting. This is a new approach in Australia which has not had a system to provide face to face quitting support from specifically trained health professionals in a way that is accessible for most of the population. If successful it would have major benefits for addressing smoking which remains Australia\'s most important cause of preventable death and disease. The project is highly relevant with current policy direction in developing practice nurse roles and expanding access to Medicare rebates for services provided by practice nurses. Trials of actual interventions involving practice nurses have been identified as an important step in advancing the practice nurse role \[[@B22]\] and this study will provide key evidence to inform this development.
Abbreviations
=============
GP: General Practitioner; CA: TIComputer Assisted Telephone Interviews; CALD: Culturally and Linguistically Diverse; LYS: Life Years Saved; CONSORT: CONsolidated Standards Of Reporting Trials; ICER: Incremental Cost Effectiveness Ratios; STATA: Portmanteau of the words \"statistics\" and \"data\"
Competing interests
===================
The authors declare that they have no competing interests.
Authors\' contributions
=======================
NZ - leading development of the study conceptualisation, design, refining of protocol and write up for publication, RR - input into development of the study conceptualisation, design contribution to protocol publication. EH - input into development of the study conceptualisation with a focus on the role of the practice nurse, design, contribution to protocol publication. JF- input into development of the study conceptualisation, design including qualitative assessment of the intervention, and contribution to protocol publication. JS - development of the study conceptualisation, design with focus on health economic evaluation, contribution to protocol publication. OH - refining of protocol, outcome assessment tools and contribution to protocol publication, IB - refining of protocol, outcome assessment tools, and contribution to protocol publication. RB - input into development of the study conceptualisation, design and contribution to protocol publication. All authors have read and accepted the final manuscript.
Pre-publication history
=======================
The pre-publication history for this paper can be accessed here:
<http://www.biomedcentral.com/1471-2296/11/59/prepub>
Acknowledgements
================
Funding
The study is funded by a project grant from the Australian Government National Health and Medical Research Council (NHMRC). Project Grant No. 568617. Funding period 2009-2011.
|
T. M. Turner
Thomas Memory Turner (July 17, 1847 – September 2, 1917) was an American composer, band leader, and music professor. He was known to his friends as "Mem".
He was once assistant director of the Stonewall Brigade Band of Staunton, Virginia, the United States's oldest continuous community band sponsored by local government and funded, in part, by tax monies. His father A. J. Turner was director. Memory trained several cornet bands, and spent several years directing the band at the Western Lunatic Asylum.
Early years in Staunton
Thomas Memory Turner was born on July 17, 1847 in Middletown, Virginia to A. J. Turner and Kate Aby, and moved to Staunton with them in the mid to late 1850s.
Civil War
Turner served in the Confederacy for much of the American Civil War. His father A. J. was a band leader in the Stonewall Brigade Band in the Stonewall Brigade. Thomas Memory was a musician alongside his father in the 5th Virginia Infantry from April 1 to August 22, 1862, playing the cornet. He was later in the 14th Virginia Cavalry band, enlisting at Brandy Station on August 1, 1863. He was taken prisoner and paroled on April 30, 1865 in Winchester, at the age of 17.
Stonewall Brigade Band
The Stonewall Brigade Band was reorganized in 1869 with Turner as assistant leader and his father as leader.
First marriage
Turner married Kate Grimes of Maryland, daughter of Dr. Gassaway Sellman Grimes, on February 28, 1872 in Warren County, Virginia. They were married by a reverend Mr. Converse. A daughter, Susan Dorsey Turner, was born there in 1874. Turner instructed the Charlestown Cornet Band in 1874 and 1875.
Lewisburg
Turner lived in Lewisburg, West Virginia from 1876 until November 1879. A son, Charles Augustus Turner, was born there. Turner directed the Lewisburg Concert Band. His sister Cora would sing for them. He also was a jeweler and watchmaker.
Return to Staunton
Turner returns to Staunton in November 1879, and lived on 12 Madison Street. He continued to play in the Stonewall Brigade Band. He directed the "Stonewall Octette", a group of singers attached to the band.
At a rally for Hancock and English just before the election of 1880, Turner composed "Hancock's Grand March". After the assassination of President Garfield, Turner also composed a dirge, "Garfield's Funeral March".
Watchmaker
Turner ran a jewelry store in Olivier's Bookstore on 102 E. Beverley Street (also known as Main Street) now a part of the historic district. Turner fixed watches and jewelry as well as offered his services tuning instruments.
Return to Lewisburg
Turner again instructs a band in Lewisburg in 1884, and is living there by 1889, living at Alderson and Hinton in between. His wife Kate dies in Alderson on October 14, 1888. His son Claude died in Lewisburg, on September 5, 1889, at the age of just 14, falling headforemost into a vat of boiling water at the Greenbrier Cannery. Both Kate and Claude are buried at the Old Stone Church.
Second Return to Staunton
After the death of his wife and son, Turner again returned to Staunton, and lived at 213 W. Beverley St.
Western Lunatic Asylum
He became director of the Blackford Cornet Band of the Western Lunatic Asylum, a ten or eleven piece band composed of the male attendants. He was paid $6 a week and an extra $3 if he tuned the pianos.
One account reads "The music of the Hospital Band sets aside solitude and relieves the monotony of asylum life, and has a wonderful effects in quieting the noisy and disturbed patients, besides being a source of great pleasure and enjoyment to the more quiet class, and is greatly enjoyed by visitors to the institution."
Second marriage
On February 15, 1893, he married Virginia Ann "Nannie" Wyatt at Harrisonburg, Virginia, at the residence of Hubert or Herbert Coffman. They were married by C. R. Cruikshank. She died March 9, 1894 in Staunton.
Maryland
From 1896 to 1897 Turner was in Baltimore and Gaithersburg. In Gaithersburg, he taught a band, and attended a reunion of the Central Brass Band, which he had instructed.
Norfolk
Turner settled in Norfolk late in life, where he taught music. He died there September 2, 1917.
References
Bibliography
External links
Category:1847 births
Category:1917 deaths
Category:Stonewall Brigade
Category:American male composers
Category:American composers
Category:People from Staunton, Virginia
Category:Musicians from Norfolk, Virginia
Category:Confederate States Army personnel
Category:Watchmakers (people)
Category:People from Lewisburg, West Virginia
Category:American bandleaders
Category:People of Virginia in the American Civil War |
Test-reconstruct.C
EXE = $(FOAM_USER_APPBIN)/Test-reconstruct
|
LG-637G Green Laser Grips for Glock Gen3 17 22 24 31 34 35 37
Green Laser Grips are an excellent addition to the 3rd Generation Glock. A laser sight can make all the difference to your targeting ability, but most importantly, this helps you get that precision aim you're after! The Crimson Trace Green Laser target grips are designed and customized to fit seamlessly against the trigger guard of most Glock 3 Generations and these specific models: 17,22,24,31,34,35, and 37. These offer that more famous "instinctive activation" ensuring that activation of the laser is absolutely seamless and user friendly. Most users appreciate how well these affect their targeting in multiple environments. The user has all of the control, and if they are using the LG-637G model, there is a master switch which can automatically shut the unit down. These are ideal for those in: law enforcement, FBI, Sheriff's Dept. and military personnel. An officer will also find that these are easily adjusted to match windage and elevation issues as well, adding to the exceptional value! |
Q:
Swift: Ensure urlSession.dataTask is completed in my function before passing result
Hello I have this function:
func planAdded(id:Int, user_id:Int) -> Int {
let locationURL = "myurl"
var planResult: Int = 0
let request = URLRequest(url: URL(string: locationURL)!)
let urlSession = URLSession.shared
let task = urlSession.dataTask(with: request, completionHandler:{
(data, response, error) -> Void in
DispatchQueue.main.async {
if let error = error {
print (error)
return
}
if let data = data {
let responseString = NSString(data: data, encoding: String.Encoding.utf8.rawValue)
planResult = responseString!.integerValue
}
}
})
task.resume()
print(planResult)
return planResult
}
What I am trying to do is to ensure that I got the result for planResult in tableView cellforrow at indexpath function.
func tableView(_ tableView: UITableView, cellForRowAt indexPath: IndexPath) -> UITableViewCell {
...
case 4:
if (result == 1){
...
} else if (result == 2){
...
} else {
...
}
default:
cell.fieldLabel.text = ""
}
return cell
}
Here is my viewDidLoad function
override func viewDidLoad() {
super.viewDidLoad()
self.result = self.planAdded(1, 2)
}
For some reasons, this keeps returning 0; however, the print line is actually printing correct value. I did some research and I believe this is because of asychonous call of the dataTask. Is there a way I ensure that my function is actually completed and return the value for the indexpath function?
Thanks
A:
The reason is, you are doing it in a wrong way! Because, once you intialize the class the UIViewController lifecycle starts. Once the viewDidLoad() is called it the UITableView is also updated with no data.
Also, you are calling API to get the data, you need to notify UITableViewDataSource to update data and here is how you can do that!
func planAdded(id:Int, user_id:Int) {
let locationURL = "myurl"
var planResult: Int = 0
let request = URLRequest(url: URL(string: locationURL)!)
let urlSession = URLSession.shared
let task = urlSession.dataTask(with: request, completionHandler:{
(data, response, error) -> Void in
DispatchQueue.main.async {
if let error = error {
print (error)
return
}
if let data = data {
let responseString = NSString(data: data, encoding: String.Encoding.utf8.rawValue)
self.result = responseString!.integerValue
self.tableView.reloadData()
}
}
})
task.resume()
}
And you are getting zero value because it's an async method. So get the data you need to use completionCallback.
func planAdded(id:Int, user_id:Int, completion: (result: Int) -> ()) {
let locationURL = "myurl"
var planResult: Int = 0
let request = URLRequest(url: URL(string: locationURL)!)
let urlSession = URLSession.shared
let task = urlSession.dataTask(with: request, completionHandler:{
(data, response, error) -> Void in
DispatchQueue.main.async {
if let error = error {
print (error)
return
}
if let data = data {
let responseString = NSString(data: data, encoding: String.Encoding.utf8.rawValue)
planResult = responseString!.integerValue
completion(planResult)
}
}
})
task.resume()
}
Usage:
override func viewDidLoad() {
super.viewDidLoad()
planAdded(1, 2){(value) in
self.result = value
self.tableView.reloadData()
}
}
|
Man entered restaurant with gun claiming he was carjacked
Gabriel Samuel Rivera, 29, was arrested after an incident at an Oklahoma City Taco Bell in which he walked inside with a black pistol yelling that he had been carjacked. Click here for the full story.
Photos
Gabriel Samuel Rivera, 29, was arrested after an incident at an Oklahoma City Taco Bell in which he walked inside with a black pistol yelling that he had been carjacked. Click here for the full story.
An Oklahoma City man has been arrested after police said he walked into a Taco Bell with a gun, caused a disturbance, and then encouraged officers to check on his home where they uncovered a cache of weapons and ammunition.
According to the police report, officers responded to the Taco Bell in the 2800 block of Northwest 23rd on Tuesday night after employees reported Gabriel Samuel Rivera, 29, walked through the back door of the restaurant with a black pistol yelling that he had been carjacked.
Officers found employees huddled in the back of the business, but no one was hurt.
According to the report, officers were able to handcuff Rivera, but he appeared intoxicated and paranoid and kept claiming he was attacked in the parking lot near his SUV and was worried his attackers would head to his mother's home nearby.
Police dispatched officers to Rivera's mother's home in the 2500 block of Northwest 23rd but found no one at home. According to the report, police found two guns inside Rivera's SUV and heroin in Rivera's pockets.
A search warrant was executed at Rivera's mother's home and police uncovered 13 guns, a sound suppressor, parts for an AR-15, ammunition, counterfeit cash and drug paraphernalia, police said.
Rivera was arrested on several complaints including possession of controlled dangerous substance and possession of a firearm in commission of a felony.
Oklahoma City police are still investigating.
While you're here, peruse these breaking news photos from our U Local website. When YOU see breaking news happen, email your photos to ulocal@koco.com -- or post them (and your videos) to http://ulocal.koco.com. |
Archive
The RMS Lusitania, launched in 1907, was one of the fastest ocean liners of her time, holding the Blue Riband for fastest Atlantic passenger liner crossings along with her sister ship, the RMS Mauretania. With the help of state-of-the-art Parsons steam turbine engines generating 68,000 horsepower [1], fed by 25 boilers and turning four huge screws (propellers), she regularly cruised at 25 knots.
RMS Lusitania coming into port
On May 7, 1915, during World War I, she was nearing the end of a crossing from New York to Liverpool. South of the coast of Ireland, her lookout saw a trail of foam rapidly approaching the ship and shouted “Torpedoes!”. There was just one torpedo, but it slammed into the starboard side and detonated. Moments later a huge secondary explosion rocked the ship. She sank in just 18 minutes amid a chaos of trying to launch lifeboats, killing 1,198 of the 1,959 people on board, including 128 Americans. [2]
The torpedo came from the German submarine U20. The sinking of the Lusitania outraged Americans and helped turn the national sentiment, which had been very isolationist and neutral regarding the great European war, decidedly against the Germans. The Lusitania incident contributed to America eventually entering the war on the side of Britain and France. Why would the Germans attack a passenger liner with innocent women and children on board? Was this a wanton case of barbarism, as the English news stories claimed?
As always, there is more to the story than this. Near the start of the war in August 1914, the British, wanting to leverage the might of the Royal Navy, imposed a blockade of German ports. This blockage was very effective, causing starvation in Germany and the eventual deaths of 763,000 civilians, according to official statistics [3]. Germany responded with the only advantage she had, which was her submarine service, the most advanced in the world. Germany declared the North Sea and the area around the British Isles a British “military area” and warned that any ships entering this area, including those from neutral countries, were subject to submarine attack. The British admiralty responded to this declaration with orders for a merchant ship who encounters a submarine to steer straight for it at utmost speed – in effect instructions to ram the small and vulnerable submarine. The “rules of war” up to this time called for warships intercepting merchant vessels to stop them and allow for passengers and crew to disembark before firing on the ship, unless the ship resisted, attempted to flee, or was part of a convoy. The Germans were aware of the British admiralty instructions and the extreme vulnerability of a submarine on the surface. In addition, a submarine with a surface speed of 15 knots could not possibly keep up with a fast liner like the Lusitania. In light of this, in February the German government announced that allied ships in the war zone would be sunk without warning.
German warning notice
Most passengers were unaware of two crucial facts about the Lusitania. First, she was secretly subsidized by the British government, and in return was built to meet with specifications to allow her to be converted to an Armed Merchant Cruiser if the need arose. She had magazines for powder and ammunition, and gun mounts concealed underneath her decks. Second, on her final voyage she was carrying contraband (military cargo), including 4.3 million rounds of Remington .303 cartridges, used in both rifles and machine guns. Passengers were not aware of the contraband, but the Germans, via their spy network, almost certainly were. In fact, the German Embassy in Washington took out an ad in the New York newspapers, warning people not to book passage on the Lusitania. The German notice was printed next to a Cunard Line advertisement for the voyage, and caused a stir. Many people took heed, and the Lusitania was only at about half capacity on the final voyage.
All of these factors combined to a situation where the U20 issued no warning and simply fired a torpedo when the Lusitania came within range. The propaganda offices in both Britain and America were quick to portray the attack as a war crime. The Kaiser was quick to defend it. So the question for discussion is: was the commander of the U20 justified in this situation to fire on the Lusitania, or were the newspapers correct, and this was a barbaric act and a war crime?Vox’s Take: War is a very difficult thing to conduct in a “civilized” manner. In the words of William T. Sherman, “War is cruelty and you cannot refine it.” [4] Certainly, it’s hard to see how the sinking of a passenger liner loaded with civilians is justified. But did the Germans, with their people starving, have a right to enforce their own blockade in the manner they could, as the British were doing? And what did the Brits intend to do with the 4.3 million rounds of ammunition? Why, shoot them at the Germans of course. It can be argued that the Germans did indeed give warning, not on the high seas but before the voyage even began. My take is that the sinking was not “civilized”, but was not a war crime, given the conditions in which it occurred. What’s your take?
Most of us are familiar with the two most common tracks to statehood: first of course, there are the thirteen original colonies which joined together to form the United States. Second, most of the other states were admitted as a territory: additional land, often wilderness, beyond the thirteen colonies was acquired from another country by treaty or purchase. The new land was organized into a territory and when the territory reached a sufficient population and level of development, the territorial government applied for statehood, and was either accepted or rejected by Congress. In all, 31 territories were accepted as states.
However, there are a number of states which are exceptions to the two common routes. Four states were at one time independent republics: Vermont, Texas, California (very briefly) and Hawaii (before it was a territory). Louisiana brought a multitude of states when it was purchased from Napoleon’s First French Republic. The War with Mexico, also a republic, brought a bundle of other states.
There are also four states which at one time were part of another state: Maine was a district of Massachusetts, Kentucky and West Virginia were part of Virginia, and Tennessee was part of North Carolina before it became the Southwest Territory, on its way to becoming a state.
Check used to pay for Alaska
The thirteen original colonies were, of course, part of the Kingdom of Great Britain. Florida was acquired by treaty from the Kingdom of Spain. Alaska was famously purchased from the Russian Empire, an absolute monarchy. But one other state was itself a kingdom before it became a state. This was Hawaii, which was wrested away from the Hawaiians when American and European developers managed to overthrow the Hawaiian monarchy, form the independent Republic of Hawaii and put Hawaii on a track to United States annexation and eventual statehood.
Not all territories became states. The Philippines, won from Spain in the Spanish-American War, gained independence from the United States in 1946. The Panama Canal Zone was returned to Panama in 1979. And what about the territories today? There are still sixteen territories of the United States, most of which are small islands. The major territories, which presumably could apply for statehood, are the Commonwealth of Puerto Rico, Commonwealth of the Northern Mariana Islands, American Samoa, Guam and the United States Virgin Islands. |
As with all good things in Pose, it seems the scene’s writer identifies with the moment. As inspiration for the scene, Mock went back to her own first sexual experience. “Angel’s not a virgin at that point, but I was. I remember a moment when I had a boyfriend I really cared about, and I was hiding myself,” Mock recalled. To combat Mock’s discomfort at the time, the boyfriend did something really “empowering” for her. “He grabbed my hands and moved them to a point of saying, ‘I see you, and I see you as all that you are. I love and accept you, and I want to share this with you,’” Mock continued. |
April 30, 2013
The Silent Infection
A Canadian study between 2009 and 2011 found that nearly 14% of people between the ages of 14 and 59 may be infected by the herpes simplex 2 virus and 1% tested positive for chlamydia. Almost all of those affected were unaware they were infected, and that's why chlamydia is often called the silent infection. Simple urine and blood tests can spot the infections. Antibiotics can cure chlamydia infections, and prevent serious fertility problems, and other medical and psychological problems, too. |
41 F.2d 495 (1930)
APLIN
v.
UNITED STATES.
No. 6068.
Circuit Court of Appeals, Ninth Circuit.
June 9, 1930.
Forrest E. Littlefield, of Portland, Or., for appellant.
George Neuner, U. S. Atty., and Francis E. Marsh, Asst. U. S. Atty., both of Portland, Or.
Before RUDKIN, DIETRICH, and WILBUR, Circuit Judges.
RUDKIN, Circuit Judge.
The indictment in this case charged the defendant with the crime of transporting a certain woman in interstate commerce from Salem, Or., to Chico, Cal., for the purpose of prostitution, debauchery, and other immoral purposes. From a judgment of conviction, the defendant has appealed.
The appellant made a written confession to a special agent of the Department of Justice, in which he admitted that he had had illicit intercourse with the woman in question at Salem, Or., beginning in March, 1928; that they left Salem together, by automobile, on July 7, 1928, and proceeded down the Pacific Highway, stopping at Chico, Cal.; that they lived together in an auto camp at Chico for about three weeks, where they had illicit intercourse; that they then proceeded to Las Vegas, Nev., where they have since lived together as husband and wife. The appellee offered some further testimony tending to show the relations maintained between the parties at Salem, before leaving Oregon, from which illicit intercourse might be inferred. *496 The woman was then placed upon the witness stand and testified that she was 22 years of age and was now living at Las Vegas, Nev.; that she formerly lived in Salem, Or.; that she left Salem July 7, 1928, and went to Las Vegas, Nev., stopping at Chico, Cal., on the way; and that she traveled with the appellant in his Chevrolet car from Salem, Or., to Chico, Cal.
On cross-examination, counsel for appellant sought to inquire into the relations maintained between the witness and the appellant at the different places above mentioned, but an objection was sustained on the ground that it was not proper cross-examination. This ruling and the sufficiency of the testimony to support the verdict are the only questions presented for consideration.
Subject to certain exceptions, not material here, it is the settled rule in the federal courts that the cross-examination of a witness is limited to matters embraced in the examination in chief. Philadelphia & Trenton R. Co. v. Stimpson, 14 Pet. 448, 10 L. Ed. 535; Houghton v. Jones, 1 Wall. 702, 17 L. Ed. 503; Montgomery v. Ætna Life Ins. Co. (C. C. A.) 97 F. 913; Foster v. United States (C. C. A.) 178 F. 165; Ferry-Hallock Co. v. Orange Hat Box Co. (C. C.) 185 F. 816; Hales v. Michigan Cent. R. Co. (C. C. A.) 200 F. 533; Illinois Cent. R. Co. v. Nelson (C. C. A.) 212 F. 69; Heard v. United States (C. C. A.) 255 F. 829; Minnesota & Ontario P. Co. v. Swenson Evaporation Co. (C. C. A.) 281 F. 622. The examination in chief of this witness was limited to the question of her age and the transportation, so there was no error in the ruling complained of.
It is next contended that there was no proof of the corpus delicti. The principal ground of this objection is that the extrajudicial confession of the appellant was not corroborated. The extent to which such a confession must be corroborated was considered by this court in Mangum v. United States (C. C. A.) 289 F. 213, and Pearlman v. United States (C. C. A.) 10 F.(2d) 460. See, also, Daeche v. United States (C. C. A.) 250 F. 566. Under the rule there announced, the corroboration in this case was ample.
Finally, it is contended that there was a failure to prove that the transportation was for an immoral purpose. Purpose or intent is generally proved by circumstantial evidence, and may be so proved under all the authorities. Here there were illicit relations in Oregon before their departure from that state, there were illicit relations in the course of the trip, and illicit relations after its termination. From these facts and circumstances, the jury might well infer that at least one purpose of the transportation was debauchery, or other immoral purpose. Tobias v. United States (C. C. A.) 2 F.(2d) 361; Noland v. United States (C. C. A.) 10 F.(2d) 768; Hart v. United States (C. C. A.) 11 F.(2d) 499; Ghadiali v. United States (C. C. A.) 17 F.(2d) 236.
We find no error in the record, and the judgment of the court below is affirmed.
|
Q:
How to properly use SQL LIKE statement to query DB from Flask application
I am having a very hard time using a LIKE statement in my Flask application to query my DB. I keep getting a syntax error.
My application is for searching for books and I need to be able to search all columns. I know I need to use LIKE but it seems that the single quotes from my variable are getting in the way. However, I am not 100% positive.
I know if I wanted to SELECT all from a table based on in id, the format would be like this:
id = request.form.get('id')
name = db.execute("SELECT first_name FROM users WHERE id=:id", {"id": current_id})
If I try this similar format with LIKE, such as:
search = request.values.get('search')
books = db.execute("SELECT * FROM books WHERE author LIKE '%:search%'", {"search": search}).fetchall()
I get this error:
sqlalchemy.exc.ProgrammingError: (psycopg2.errors.SyntaxError) syntax error at or near "Raymond"
LINE 1: SELECT * FROM books WHERE author LIKE '%'Raymond'%'
^
[SQL: SELECT * FROM books WHERE author LIKE '%%%(search)s%%']
[parameters: {'search': 'Raymond'}]
(Background on this error at: http://sqlalche.me/e/f405)
From this error, I can see that single quotes are being added to my variable value (search) but I haven't been successful in stripping or replacing them. So I tried this format:
search = request.values.get('search')
books = db.execute("SELECT * FROM books WHERE author LIKE %s", ('%' + search + '%',)).fetchall()
But that also gave me an error:
AttributeError: 'list' object has no attribute 'keys'
I've been working on this for about four days and nothing I've tried has worked. I am at a loss. I know that I need to get those single quotes off, but I am so unsure how. I have a feeling that it's super easy, which is going to make me so sad but I am trying my best as a newbie.
Please let me know if you need any other information.
EDIT: Including tracebacks
Traceback for books = db.execute("SELECT * FROM books WHERE author LIKE %s", ('%' + search + '%',)).fetchall()
AttributeError
AttributeError: 'tuple' object has no attribute 'keys'
Traceback (most recent call last)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 2464, in __call__
return self.wsgi_app(environ, start_response)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 2450, in wsgi_app
response = self.handle_exception(e)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 1867, in handle_exception
reraise(exc_type, exc_value, tb)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\_compat.py", line 39, in reraise
raise value
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 2447, in wsgi_app
response = self.full_dispatch_request()
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 1952, in full_dispatch_request
rv = self.handle_user_exception(e)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 1821, in handle_user_exception
reraise(exc_type, exc_value, tb)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\_compat.py", line 39, in reraise
raise value
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 1950, in full_dispatch_request
rv = self.dispatch_request()
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 1936, in dispatch_request
return self.view_functions[rule.endpoint](**req.view_args)
File "C:\Users\Nilaja Williams\Desktop\Harvard Studies\nilajawill\project1\application.py", line 73, in current_search
books = db.execute("SELECT * FROM books WHERE author LIKE %s", ('%' + search + '%',)).fetchall()
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\orm\scoping.py", line 163, in do
return getattr(self.registry(), name)(*args, **kwargs)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\orm\session.py", line 1291, in execute
return self._connection_for_bind(bind, close_with_result=True).execute(
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\engine\base.py", line 1020, in execute
return meth(self, multiparams, params)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\sql\elements.py", line 298, in _execute_on_connection
return connection._execute_clauseelement(self, multiparams, params)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\engine\base.py", line 1099, in _execute_clauseelement
keys = list(distilled_params[0].keys())
AttributeError: 'tuple' object has no attribute 'keys'
The debugger caught an exception in your WSGI application. You can now look at the traceback which led to the error.
To switch between the interactive traceback and the plaintext one, you can click on the "Traceback" headline. From the text traceback you can also create a paste of it. For code execution mouse-over the frame you want to debug and click on the console icon on the right side.
You can execute arbitrary Python code in the stack frames and there are some extra helpers available for introspection:
dump() shows all variables in the frame
dump(obj) dumps all that's known about the object
Traceback for books = db.execute("SELECT * FROM books WHERE author LIKE '%:search%'", {"search": search}).fetchall()
sqlalchemy.exc.ProgrammingError
sqlalchemy.exc.ProgrammingError: (psycopg2.errors.SyntaxError) syntax error at or near "Raymond"
LINE 1: SELECT * FROM books WHERE author LIKE '%'Raymond'%'
^
[SQL: SELECT * FROM books WHERE author LIKE '%%%(search)s%%']
[parameters: {'search': 'Raymond'}]
(Background on this error at: http://sqlalche.me/e/f405)
Traceback (most recent call last)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\engine\base.py", line 1247, in _execute_context
self.dialect.do_execute(
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\engine\default.py", line 590, in do_execute
cursor.execute(statement, parameters)
The above exception was the direct cause of the following exception:
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 2464, in __call__
return self.wsgi_app(environ, start_response)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 2450, in wsgi_app
response = self.handle_exception(e)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 1867, in handle_exception
reraise(exc_type, exc_value, tb)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\_compat.py", line 39, in reraise
raise value
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 2447, in wsgi_app
response = self.full_dispatch_request()
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 1952, in full_dispatch_request
rv = self.handle_user_exception(e)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 1821, in handle_user_exception
reraise(exc_type, exc_value, tb)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\_compat.py", line 39, in reraise
raise value
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 1950, in full_dispatch_request
rv = self.dispatch_request()
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\flask\app.py", line 1936, in dispatch_request
return self.view_functions[rule.endpoint](**req.view_args)
File "C:\Users\Nilaja Williams\Desktop\Harvard Studies\nilajawill\project1\application.py", line 73, in current_search
books = db.execute("SELECT * FROM books WHERE author LIKE '%:search%'", {"search": search}).fetchall()
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\orm\scoping.py", line 162, in do
return getattr(self.registry(), name)(*args, **kwargs)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\orm\session.py", line 1277, in execute
return self._connection_for_bind(bind, close_with_result=True).execute(
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\engine\base.py", line 984, in execute
return meth(self, multiparams, params)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\sql\elements.py", line 293, in _execute_on_connection
return connection._execute_clauseelement(self, multiparams, params)
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\engine\base.py", line 1097, in _execute_clauseelement
ret = self._execute_context(
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\engine\base.py", line 1287, in _execute_context
self._handle_dbapi_exception(
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\engine\base.py", line 1481, in _handle_dbapi_exception
util.raise_(
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\util\compat.py", line 178, in raise_
raise exception
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\engine\base.py", line 1247, in _execute_context
self.dialect.do_execute(
File "C:\Users\Nilaja Williams\AppData\Local\Programs\Python\Python38-32\Lib\site-packages\sqlalchemy\engine\default.py", line 590, in do_execute
cursor.execute(statement, parameters)
sqlalchemy.exc.ProgrammingError: (psycopg2.errors.SyntaxError) syntax error at or near "Raymond"
LINE 1: SELECT * FROM books WHERE author LIKE '%'Raymond'%'
^
[SQL: SELECT * FROM books WHERE author LIKE '%%%(search)s%%']
[parameters: {'search': 'Raymond'}]
(Background on this error at: http://sqlalche.me/e/f405)
The debugger caught an exception in your WSGI application. You can now look at the traceback which led to the error.
To switch between the interactive traceback and the plaintext one, you can click on the "Traceback" headline. From the text traceback you can also create a paste of it. For code execution mouse-over the frame you want to debug and click on the console icon on the right side.
You can execute arbitrary Python code in the stack frames and there are some extra helpers available for introspection:
dump() shows all variables in the frame
dump(obj) dumps all that's known about the object
A:
For parameterized queries you never need to have quotes inside the statement, they will be added by the db api. This should work:
search = request.values.get('search')
books = db.execute("SELECT * FROM books WHERE author LIKE :search", {"search": '%' + search + '%'}).fetchall()
The % signs need to be part of the parameter, so that :search can finally be replaced with the quoted search string, as described here.
The error messages show what happens if the query already contains quotes: anohter set of qoutes will be added, breaking the query.
But note that this could also have problems as described here: backslashes in LIKE expresssions are treated as escape characters which can be used to treat wildcards into the passed string as their literal value, but if not used correctly can cause unexpected search results, or can enven cause an error (e.g. if the like pattern ends with a backslash).
If you don't intend to allow the user to insert wildcards in the search string, you'd need to escape them, or consider using the position() funciton instead:
position(:search in author) > 0
|
VITAMIN OPTIMISM: Have Love Courage!
Your dose for today…
“Man cannot discover new oceans unless he has courage to lose sight of the shore.”
—Andre Gide
Get on the love boat and don't look back!
We all know it’s important to be courageous. But sometimes we forget this is needed in love, too. Maybe the courage is obvious: Maybe you need to escape the relationship that’s beating down your soul, or you have to let go of a hurt that’s holding you back. But courage in love can also be quietly necessary. Maybe your courage is needed in another way: Let go of the image you have in your head of the “perfect” relationship you always “pictured” as a kid. Maybe that white-picket-fence or planned-and-plotted relationship with a particular kind of person isn’t what’s meant for you.
Turn away from the shore and open yourself to a new future with a surprising partner and family, in a different kind of place that will make your heart burst in ways you never pictured were possible. If you don’t open your eyes to new possibilities, how will you ever recognize them? Have courage: Let go of the shore and head for the ocean to see the love that’s out there for you. |
1. Introduction {#sec1}
===============
Parkinson\'s disease (PD) and multiple system atrophy (MSA) are two distinctive neurodegenerative disorders characterized by α-synuclein (αSYN) inclusion pathology, although some genetic PD variants show only little or no αSYN inclusion pathology, particularly *PARK2* and *LRRK2* mutation carriers [@bib1]. During the last two decades numerous candidate neuroprotective agents have been evaluated in large randomized controlled PD trials. Unfortunately, none of them proved effective either reflecting a lack of neuroprotective efficacy or shortcomings of preclinical models, outcome measures including surrogate markers and trial design issues [@bib2]. Novel strategies to overcome the deadlock in PD interventional trials are therefore needed. We here posit, based on overlapping features [@bib3], that drug discovery in PD can be accelerated by conceptualizing the parkinsonian variant of MSA (MSA-P) as a template for the validation of joint therapeutic strategies targeting αSYN aggregation. Hereinafter, we will review overlaps in genetics, pathology, etiopathogenesis, and clinical presentation, discuss trial considerations and finally suggest a modified drug development approach based on the quick win, fast fail paradigm [@bib4].
2. Genetic overlap {#sec2}
==================
Rare familial forms of PD generated important insights into the genetic underpinnings of parkinsonism. The seminal description by Polymeropoulos et al. demonstrating that mutations in *SNCA*, coding for αSYN, are a cause of PD has revolutionized the field for three reasons [@bib5]. First, it clearly disproved the long held hypothesis that PD pathogenesis is not genetic in nature; second, it provided a robust target to generate experimental cell and animal models and third, it offered the first clue that αSYN plays a pivotal role in neurodegeneration.
Systematic evaluations of the *SNCA* locus in PD and MSA have further advanced our understanding of α-synucleinopathies substantially. In addition to missense mutations, multiplication (triplication or duplication) of the entire *SNCA* locus has been demonstrated to cause familial PD [@bib6; @bib7; @bib8]. Although these mutations have not been detected in MSA, the presence of GCI-like inclusions as well as clinical phenotypes reminiscent of MSA have been noted in some *SNCA* multiplication family members suggesting that an increase in αSYN expression level could be involved in MSA pathogenesis [@bib8; @bib9]. This notion is supported by observations in transgenic mouse models overexpressing αSYN under oligodendroglial promoters, where GCIs as well as neurodegeneration and clinical features of MSA are observed [@bib10]. However, to date gene expression studies of small size did not reveal *SNCA* expression changes in pathology-proven MSA cases [@bib11], and the role of changes in αSYN expression or degradation in MSA pathogenesis remains elusive.
A genome-wide association study (GWAS) has linked single nucleotide polymorphisms at the *SNCA* locus to an increased risk for PD [@bib12]. Subsequently, the top risk variants from this study were tested in about 500 MSA cases and 4000 controls and significant association for two variants in *SNCA* were detected [@bib13]. However, preliminary results of the first MSA GWAS suggest that the *SNCA* risk loci will not reach genome-wide significance reflecting either insufficient power of the MSA GWAS or ethnic confounders in previous studies [@bib14]. More recently, Kiely et al. [@bib15] reported a SNCA p.G51D mutation in a British family with autosomal-dominant inheritance sharing neuropathological features characteristic of both PD and MSA and thereby providing a possible link between MSA and PD.
These findings indicate that αSYN is presumably a key player in neurodegenerative processes in PD and MSA. Furthermore, the intriguing observation of *SNCA* multiplications causing MSA-like glial pathology point towards common αSYN-related pathophysiological mechanism that we will discuss below.
3. Pathologic overlap {#sec3}
=====================
Immunohistochemical studies revealed that abnormal αSYN aggregates are found in neurons and axons in PD brains [@bib8], whereas, αSYN aggregates in MSA are predominantly seen in the cytoplasm of oligodendrocytes. The term α-synucleinopathies was coined to embrace these clinicopathological entities [@bib16]. While the cellular distribution of the aggregates is clearly different, there is still important pathological overlap. In both, PD and MSA-P, neurodegeneration is associated with the Lewy body and GCI burden as well as the increase of soluble αSYN in substantia nigra and striatum [@bib17]. In addition, apart from the apparent overlap in degeneration of the dopaminergic nigrostriatal system, involvement of the central and peripheral autonomic nervous system including the dorsal motor vagal nucleus, autonomic parts of the spinal cord, as well as the peripheral autonomic nervous system (e.g. the cardiac and enteric systems), is common to both PD and MSA-P [@bib17; @bib18; @bib19; @bib20].
Intriguingly, brainstem LBs -- a classical pathological hallmark of PD -- were also reported in MSA and, vice versa, GCI pathology occurred in familial PD cases with rapid disease progression [@bib8; @bib9; @bib21]. The molecular basis of these co-existing pathologies remains to be elucidated.
Overall, these neuropathological similarities provide further evidence that αSYN fragments are able to interfere with physiological processes thereby triggering neurodegenerative processes irrespective of the underlying inclusion pathology.
4. Common pathogenic pathways {#sec4}
=============================
The exact mechanisms of αSYN-triggered neurodegeneration are not completely understood, but studies point to common principles that may underlie disease development and progression. At the molecular level αSYN is a natively unfolded, soluble cytosolic protein. Biochemical analyses of αSYN deposits in MSA and PD revealed abnormal phosphorylation at the serine-129 residue, a mechanism that is known to increase αSYN aggregation propensity, as well as the precipitation of ubiquitinated fibrils made up of proteinase K resistant, β-sheeted αSYN [@bib22; @bib23]. Experimental evidence suggests that misfolded αSYN can influence the viability of cells affected by aggregation pathology in numerous fashions including the disruption of cytoskeleton integrity, dysfunction of the ubiquitin-proteasome system and autophagy pathways, by causing mitochondrial dysfunction, or by disruption of the endoplasmic reticulum-Golgi vesicular trafficking and membrane integrity [@bib24; @bib25]. In addition, it was recently proposed that presynaptic αSYN deposits generate a dying back type of neuronal loss [@bib26; @bib27; @bib28]. In parallel, loss of dendritic spines appears to accompany the presynaptic αSYN pathology in Dementia with Lewy Bodies [@bib29] and loss of dendritic spines was also reported for striatal neurons in post-mortem PD brains [@bib30]. These findings are consistent with a notion that αSYN aggregate-related synaptic dysfunction may constitute the starting point of neurodegeneration in LB disorders [@bib29]. In contrast, MSA-associated neuronal cell death appears secondary to the αSYN-related oligodendroglial dysfunction [@bib31]. Remarkably, glial filamentous inclusions in PD brains affecting oligodendroglial as well as astroglial cell populations were immunoreactive for αSYN and correlated with the severity of nigral cell loss [@bib32].
The temporal evolution of neuropathology in PD [@bib33], combined with the post-mortem observation of αSYN pathology within fetal grafts of transplanted PD patients [@bib34; @bib35] implicate that a transmission of αSYN (or its toxic truncated forms) from cell to cell may be a critical mechanism underlying disease spread in α-synucleinopathies. Interestingly, converging preclinical evidence indicates the ability of αSYN to spread throughout the PD brain in a prion-like fashion [@bib36; @bib37]. In MSA, the origin of oligodendroglial αSYN remains elusive as illustrated by lack of evidence of αSYN expression in oligodendrocytes of healthy and MSA brains [@bib38]. This gives rise to the notion that αSYN is taken up into oligodendrocytes from extracellular space with αSYN most likely being secreted by neurons.
In addition to direct neurotoxic effects of intra- and extracellular αSYN accumulation, it is proposed that αSYN may trigger gliosis which is associated with enhanced oxidative stress. Oxidative and nitrative stress seem to play a pivotal role in both PD and MSA pathogenesis either directly affecting neuronal survival or resulting in posttranslational modifications of αSYN which consequently leads to accelerated protein aggregation and enhanced toxicity [@bib39; @bib40; @bib41]. In PD an increasing body of evidence delineates the role of microglial and astroglial responses [@bib41]. Similarly, MSA *in vivo* and post-mortem data also support the involvement of glial mechanisms and transgenic models confirm the role of inflammatory signaling in the pathogenesis of GCI-related neurodegeneration [@bib42]. However, further aspects of pro-inflammatory mechanisms in the pathogenesis of PD and MSA need to be addressed to define potent candidate targets for neuroprotection [@bib39; @bib41].
In summary, despite the obvious notion of αSYN being involved in neurodegeneration in PD and MSA, several molecular mechanisms overlap. Both disorders are characterized by spreading of αSYN pathology with PD showing a pattern of neuron-to-neuron αSYN propagation. In MSA, neuronal αSYN is passed to oligodendrocytes as suggested by the lack of *SNCA* expression in glial cells [@bib38]. Furthermore, posttranslational modifications of αSYN and neuroinflammatory processes are comparable in MSA and PD. Major genetic, morphologic, and pathogenic overlaps between idiopathic PD and MSA-P are also summarized in [Fig. 1](#fig1){ref-type="fig"}.
5. Clinical overlap {#sec5}
===================
Alongside the apparent overlap in motor features, clinicopathological and prospective clinical studies indicate that MSA-P and PD share non-motor symptoms as well [@bib43]. Due to this overlap, PD and MSA-P are frequently indistinguishable in the early disease stages -- even when formal criteria are applied [@bib3]. Distinguishing and overlapping clinical features are shown in [Fig. 1](#fig1){ref-type="fig"}.
5.1. Motor features {#sec5.1}
-------------------
The diagnosis of PD hinges on the presence of bradykinesia together with one out of three additional hallmark features including rest tremor, rigidity, and postural instability [@bib44]. In MSA-P all of these features may occur although pill-rolling rest tremor is uncommon [@bib45] and, in contrast to PD, postural instability emerge early within the first years into the disease-course in MSA-P [@bib46]. One of the key-characteristics of PD is the marked and persistent levodopa response with drug-induced motor complications at later disease stages [@bib44]. Despite MSA-P being considered levodopa-unresponsive, there is an increasing body of evidence suggesting that MSA patients receiving levodopa may show a beneficial (albeit mostly self-limited) motor response and some of these patients will experience levodopa-induced motor complications [@bib3; @bib45]. These findings suggest that a subgroup of MSA-P patients may present with a PD-like syndrome. The latter notion is further supported by a case series of pathologically proven MSA-P patients exhibiting slow progression and prolonged survival of more than 15 years [@bib47].
5.2. Non-motor features {#sec5.2}
-----------------------
Non-motor features are common to both disorders involving autonomic, sleep and neuropsychiatric domains. As suggested for premotor MSA [@bib43], orthostatic hypotension (OH) may precede the onset of motor symptoms in some PD patients as well [@bib48]. Urinary problems emerge almost universally in PD and MSA. Although time course and severity of urinary symptoms are obviously different, both PD and MSA-P share similar urological features including frequency, urgency, urge incontinence and nocturia reflecting a prominent sphincter-detrusor dyssynergia [@bib49]. Erectile dysfunction in men and genital hyposensitivity in women are the earliest, but usually not the presenting features of MSA-P [@bib50], and sexual dysfunction may also occur as an early symptom in PD [@bib51]. Intriguingly, a retrospective analysis of a large cohort of men demonstrated that erectile dysfunction is associated with an increased risk of developing PD [@bib52]. Also both MSA-P and PD patients suffer from reduced bowel frequency, difficulties in evacuation and rarely fecal incontinence [@bib53]. Nevertheless, a pattern of widespread, severe and rapidly progressive generalized autonomic failure with adrenergic dysfunction clearly points towards a diagnosis of MSA [@bib54].
Sleep disorders including rapid eye movement sleep behavior disorder (RBD) are common in PD and MSA-P. In fact, it appears as if α-synucleinopathies share a common RBD phenotype often with premotor onset [@bib55; @bib56].
In contrast to the long-held belief, clinicopathological evidence proved that MSA patients may develop cognitive dysfunction and dementia [@bib57]. Additionally, a recently published prospective neuropsychological study found that approximately 20% of MSA patients score below the fifth percentile on the Mattis dementia rating scale [@bib58]. Nevertheless, dementia is much more common in PD compared with MSA [@bib59], however, the profile of cognitive impairment is comparable in PD and MSA as both disorders exhibit prominent impairment in frontal executive functions [@bib58; @bib59].
Another distinction between MSA and PD is the olfactory sense with MSA patients showing intact or mildly impaired olfaction only, whereas most PD patients are hyposmic or sometimes anosmic with deficits affecting odor detection, discrimination and identification. Even more interestingly, olfactory disturbances precede the motor-onset of PD [@bib44; @bib60].
5.3. Disease progression {#sec5.3}
------------------------
Rapid disease progression in MSA-P usually leads to loss of independent ambulation within the first few years of disease while PD patients usually maintain mobility and functional independence for more than 10 years with appropriate management [@bib57]. Although natural motor progression of PD is not well documented, data on the short-term rate of progression are available due to placebo-controlled trials suggesting accelerated progression of motor dysfunction in the early course of the untreated disease. These data are consistent with observations from the pre-levodopa era reporting latencies to Hoehn and Yahr stage IV and V of 9 and 14 years, respectively. The introduction of levodopa has significantly delayed the disability milestones and reduced mortality in PD [@bib61]. In contrast, MSA-P patients experience rapid motor decline regardless of levodopa therapy [@bib45], most likely reflecting the widespread striatal involvement. Furthermore, wheelchair-dependency was reported to occur on average after 6.7 years from disease-onset in MSA patients. Other clinical milestones of pre-terminal disease appeared in rapid succession at 5.3 years after disease-onset [@bib57]. Another characteristic feature occurring in both disorders are falls. In contrast to MSA, PD patients usually suffer from falls in advanced stages only, however, a retrospective clinicopathological study demonstrated that latency to onset of recurrent falls but not their duration differentiated PD from MSA [@bib46]. Finally, disease progression in PD is characterized by the increasing prevalence of non-motor symptoms, in particular neuropsychiatric features and autonomic failure [@bib59]. In MSA, autonomic failure including urogenital disturbances and OH occurs early in the course of the disease and in a substantial proportion of cases it even precedes motor onset [@bib43]. Furthermore autonomic failure, particularly urogenital symptoms, appear to worsen over time [@bib45; @bib62].
Clinicopathological studies in neurodegenerative diseases are limited by the inability to follow patients longitudinally and by the difficulty of associating pre-mortem clinical symptoms to post-mortem findings. In contrast, brain imaging has the potential to study lesion progression *in vivo*. This has been repetitively performed in parkinsonian disorders [@bib63; @bib64; @bib65]. In PD, functional imaging studies using both fluorodopa- and β-CIT single photon emission computerized tomography (SPECT) estimated an annual loss of signal in the range of 5%--10% per year [@bib66; @bib67] which is considerably slower than progression rates determined in MSA-P [@bib68]. Atrophy as determined by magnetic resonance imaging (MRI) is more rapid in MSA-P as compared with PD with regional atrophy rates ranging from 1.0 to 2.5% decline per year in MSA and 0.3--0.8% decline per year in PD [@bib63]. In addition, a significant increase in diffusivity over time was observed in MSA patients only [@bib69; @bib70; @bib71].
6. Trial considerations {#sec6}
=======================
In the absence of accurate biomarkers that are able to monitor PD disease progression, neuroprotection and disease-modification trials have been restricted to clinical outcomes which have important shortcomings including the fact that disease-specific rating scales are nonlinear in nature and may fail to detect progression of important disease features [@bib2]. To this end, interventional trials utilizing clinical milestones as primary outcome measures would be helpful. Obviously, latter studies are not feasible in PD with latencies to clinical milestones exceeding a decade. However, such trials may succeed in MSA with pre-terminal clinical milestones being reported to appear in rapid succession shortly after diagnosis [@bib57]. In addition, PD progression as measured by validated rating scales is slow [@bib61], whereas the motor decline in MSA as determined by the disease-specific Unified MSA Rating Scale is much more rapid [@bib45]. As mentioned before, trials aiming at disease-modification in PD require extensive study periods of at least two years due to the slow progression. In that regard and with excellent symptomatic treatment options at our disposal, long-term placebo-controlled clinical trials in PD have raised serious ethical concerns.
Serial brain imaging could be instrumental in the context of future interventional trials because monitoring progression by imaging parameters has been shown to reduce the required sample size. The progression of structural imaging in PD is slow hampering its utility in PD disease-modification trials [@bib63], whereas the continuous signal decline in presynaptic dopamine transporter imaging warranted the use of dopamine transporter SPECT in PD trials. Dopamine transporter SPECT was exploited to document nigrostriatal degeneration in two independent clinical trials suggesting disease-modifying effects in both of the two studied compounds [@bib72; @bib73]. However, the signal alterations were subsequently attributed to dopamine transporter expression dynamics in the levodopa treated control group [@bib74; @bib75; @bib76]. By contrast, functional and morphologic imaging parameters were shown to be rapidly progressive in MSA. Thus far, three MSA trials used neuroimaging as a secondary outcome measure. An efficacy and safety study on lithium (NCT00997672) compared micro- and macrostructural MRI parameters before and after the treatment, including voxel-based morphometry, resting functional MRI, diffusion tensor imaging, and magnetic resonance spectroscopy, but was terminated prematurely due to safety concerns. Another clinical trial, testing the efficacy of rasagiline in MSA-P (EudraCT 2009-014644-11), compared rates of progression of putaminal abnormalities in an imaging sub-study exploiting diffusion-weighted MRI. The imaging results showed progressive increase in putaminal apparent diffusion coefficient values over time and supported the clinical observation of lacking treatment effect [@bib77]. A recent study (NCT00911365) on mesenchymal stem cells (MSC) in patients with MSA defined changes in cerebral glucose metabolism and gray matter density as determined by fluorodeoxyglucose positron emission tomography and MRI-based morphometry, respectively, as secondary outcome measures. The results revealed a more pronounced decrease in cerebral glucose metabolism and gray matter density at 360 days relative to baseline in the cerebellum and the cerebral cortical areas in the placebo group compared to the MSC group [@bib78].
Finally, bearing recent experimental approaches counteracting intra- and extracellular αSYN toxicity in mind, *in vivo* visualization of αSYN deposition has become a recognized research target. MSA seems to be an ideal candidate for these imaging approaches possibly showing a better signal-to-noise ratio due to the greater αSYN load. In fact, Kikuchi and co-workers [@bib79] reported that GCIs may be visualized *in vivo* in MSA patients using positron emission tomography and the amyloid ligand ^11^C-2-\[2-(2-dimethylaminothiazol-5-yl)ethenyl\]-6-\[2-(fluoro)ethoxy\]benzoxazole. Nevertheless, additional studies are urgently required to establish imaging of intracellular αSYN deposits as surrogate marker in future interventional trials.
The rapid clinical progression of MSA-P and the lack of confounding symptomatic therapies in MSA as well as the presence of rapidly progressive and reliable surrogate markers are unique advantages of using MSA patients to screen for disease-modifying agents.
7. Discussion {#sec7}
=============
Clinical development (phases I--III) account for approximately 63% of the costs for each new compound launched with 53% arising from phase II until launch [@bib4]. It seems natural that clarifying the neuroprotective potential earlier in the drug development process would increase the number of evaluated interventional treatments. Based on the trial considerations delineated above, we suggest that MSA-P could be employed to clinically validate compounds, which were shown to interfere with joint pathophysiological mechanisms in preclinical α-synucleinopathy models. To this end, we posit that a modified drug development approach ([Fig. 2](#fig2){ref-type="fig"}) based on the quick win, fast fail paradigm [@bib4] exploiting MSA-P phase II proof of concept trials as a template disease for medications targeting αSYN could accelerate drug development in α-synucleinopathies. Employing such a MSA filter barrier could allow an earlier decision whether a candidate compound effectively mediates neuroprotection and, therefore, warrant further clinical validation (phase III trials). Consequently, the number of phase III trials prone to failure would decrease which, in turn, would increase the resources that could be allocated to earlier drug development stages. Overall, we suggest that an early MSA proof of concept trial has two major implications for accelerating development of neuroprotective strategies in PD with αSYN inclusion pathology: (1) due to the time- and cost-savings generated by reducing the number of negative phase III trials, more resources would be available to earlier drug development phases which consequently would increase the number of candidate compounds being validated. (2) Rapidly progressive surrogate measures and the lack of effective symptomatic treatment would enable relatively short-term, parallel group design MSA trials to prove neuroprotective efficacy. In this context, it is crucial to reliably identify MSA-P patients early in the disease course at the level of independent ambulation. This can be achieved with current consensus criteria for possible MSA [@bib54] which show an excellent positive predictive value of 95% at first clinic visit for a post-mortem MSA diagnosis [@bib80]. Nevertheless, due to the suboptimal sensitivity of these criteria [@bib80] the development and validation of highly sensitive and specific imaging and cerebrospinal fluid or plasma biomarker is a high priority objective in MSA research.
However, it has to be acknowledged that the described paradigm has certain shortcomings including the risk of false negative MSA trials. If any doubt on the face validity of such a proof of concept trial remains and a strong preclinical rational for a disease-modifying efficacy exists, a repetition of the trial in a PD setting would be required to exclude a PD-specific mechanism of neuroprotection. Vice versa, a positive MSA study does not necessarily predict that the same intervention will work in PD and in every case a phase III study in PD will be required to confirm efficacy specifically in PD. Difficulties in patient recruitment is another major factor in slowing drug development. This is even more problematic in rare disease, however, recruiting sufficient patient numbers for MSA is still possible as proven by the rifampicin and rasagiline MSA trials [@bib77; @bib81]. Finally, the typical patient diagnosed with MSA is likely to be considerably more disabled than the patient initially diagnosed with PD and it is in newly diagnosed PD patients that disease modifying therapies would be most useful. This dissimilarity in patient severity may limit the generalizability of findings in trials between MSA and PD. However, if disease-modifying efficacy of interventions targeting the effects of α-synucleinopathy lesions can be shown in MSA subjects, this finding would strengthen further therapeutic developments for PD. However, such MSA findings can only be extrapolated to those PD patients who suffer from an αSYN inclusion pathology.
Disclosures {#sec8}
===========
Florian Krismer, Kurt A. Jellinger, Sonja W. Scholz and Angelo Antonini report no conflicts of interest. Klaus Seppi served on advisory boards for Astra Zeneca, Teva, received payment for lectures including service on speakers bureaus: UCB, GlaxoSmithKline, Boehringer-Ingelheim, Lundbeck, AOP Orphan Pharmaceuticals AG, Movement Disorder Society and received funding from Michael J. Fox Foundation, Medical University Innsbruck, Oesterreichische Nationalbank, FWF Austrian Science Fund. Nadia Stefanova received honoraria for consultancies from Biogen and Merz and received research funding from the Austrian Science Fund; Astra Zeneca; Lundbeck. Werner Poewe has received personal fees from AbbVie, Astra-Zeneca, Teva, Novartis, GlaxoSmithKline, Boehringer-Ingelheim, UCB, Orion, Merck Serono, and Merz Pharmaceuticals (consultancy and lecture fees for Parkinson\'s disease clinical drug development programmes). Gregor K. Wenning received personal fees from Chelsea Therapeutic, Lundbeck, Teva (consultancy and lecture fees) and research funding from the Medical University Innsbruck, Oesterreichische Nationalbank, FWF Austrian Science Fund.
Study funding {#sec9}
=============
This manuscript was supported by funds of the Austrian Science Fund (FWF): F04404-B19. The present manuscript was not industry-sponsored.
This work was supported by funds of the Austrian Science Fund (FWF): F04404-B19 and European Community\'s Seventh Framework Programme (FP7/2007-2013) under grant agreement no. 603646 Multisyn
{#fig1}
{#fig2}
|
How to find this guy?
I just got a copy of Ocarina of Time a couple of days ago & I'm already up to the part of getting into the Dodongo's Cave right now. At the moment, I've been trying to sell some of the masks for the Happy Mask Sellsman & I just got the Bunny Hood. So I've been trying to find the Running Man in the Hyrule Field to sell the mask to him, but I can't find him. Where is he? I know he's near the Lon Lon Ranch & that's about it. |
Genetic maps of the sheep blowfly Lucilia cuprina: linkage-group correlations with other dipteran genera.
Linkage data and revised genetic maps for 72 autosomal loci in Lucilia cuprina are presented. Comparison of the linkage relationships of biochemically and morphologically similar mutations in Ceratitis capitata, Drosophila melanogaster, and Musca domestica supports the hypothesis that the major linkage elements have survived relatively intact during evolution of the higher Diptera. The relationship of the linkage groups of the mosquito Aedes aegypti to these species is less clear. |
/* endpoint_dialog.h
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* SPDX-License-Identifier: GPL-2.0-or-later
*/
#ifndef ENDPOINT_DIALOG_H
#define ENDPOINT_DIALOG_H
#include "traffic_table_dialog.h"
class EndpointTreeWidget : public TrafficTableTreeWidget
{
Q_OBJECT
public:
explicit EndpointTreeWidget(QWidget *parent, register_ct_t* table);
~EndpointTreeWidget();
#ifdef HAVE_MAXMINDDB
bool hasGeoIPData() const { return has_geoip_data_; }
#endif
static void tapReset(void *conv_hash_ptr);
static void tapDraw(void *conv_hash_ptr);
#ifdef HAVE_MAXMINDDB
signals:
void geoIPStatusChanged();
#endif
private:
void updateItems();
#ifdef HAVE_MAXMINDDB
bool has_geoip_data_;
#endif
address_type table_address_type_;
private slots:
void filterActionTriggered();
};
class EndpointDialog : public TrafficTableDialog
{
Q_OBJECT
public:
/** Create a new endpoint window.
*
* @param parent Parent widget.
* @param cf Capture file. No statistics will be calculated if this is NULL.
* @param cli_proto_id If valid, add this protocol and bring it to the front.
* @param filter Display filter to apply.
*/
explicit EndpointDialog(QWidget &parent, CaptureFile &cf, int cli_proto_id = -1, const char *filter = NULL);
~EndpointDialog();
signals:
public slots:
void captureFileClosing();
private:
#ifdef HAVE_MAXMINDDB
QPushButton *map_bt_;
QUrl createMap(bool json_only);
#endif
bool addTrafficTable(register_ct_t* table);
private slots:
#ifdef HAVE_MAXMINDDB
void tabChanged();
void openMap();
void saveMap();
#endif
void on_buttonBox_helpRequested();
};
void init_endpoint_table(struct register_ct* ct, const char *filter);
#endif // ENDPOINT_DIALOG_H
/*
* Editor modelines
*
* Local Variables:
* c-basic-offset: 4
* tab-width: 8
* indent-tabs-mode: nil
* End:
*
* ex: set shiftwidth=4 tabstop=8 expandtab:
* :indentSize=4:tabSize=8:noTabs=true:
*/
|
Shelters
A shelter can protect you from the sun, insects, wind, rain, snow, hot or cold temperatures, and enemy observation. It can give you a feeling of well-being. It can help you maintain your will to survive.
In some areas, your need for shelter may take precedence over your need for food and possibly even your need for water. For example, prolonged exposure to cold can cause excessive fatigue and weakness (exhaustion). An exhausted person may develop a "passive" outlook, thereby losing the will to survive.
The most common error in making a shelter is to make it too large. A shelter must be large enough to protect you. It must also be small enough to contain your body heat, especially in cold climates.
SheltersShelter site selection |
Types of shelters |
Subscribe
Archive for October, 2009
Sunday’s march in Mexico City drew of thousands of demonstrators
Laura Carlsen
Last Saturday, before scheduled Monday talks between the Central Light and Energy Company (LFC) and the government, federal police were ordered to take over more than 50 electrical installations just before midnight. The police assaulted the premises by jumping fences and using metal-cutters to break chains and locks. Just moments after the security forces occupied the premises, President Felipe Calderon issued an executive decree to liquidate the company. The move seeks to open the state-owned utility up for privatization and eliminate one of the nation’s most active independent unions.
The decree follows a union conflict that the government fueled and then took advantage of to eliminate the company and its union. The union elections last June were contested by the losing group amid rumors that the federal government was actively fomenting division. In a warning sign, on Oct. 5 the Secretary of Labor, Javier Lozano, rejected registration of the new union leadership without waiting for a decision from the Labor Tribunal.
What’s been dubbed the “Sabadazo” or Saturday Offensive took place when the union and the government were in the middle of talks and awaiting a promised response from the Calderon administration. Once again, the Mexican government showed a propensity for unilateral blows and the use of force over dialogue. Although it had previously taken aggressive stands against unions, this is by far the biggest union-busting measure yet and has sparked widespread indignation among workers and the public. Read the rest of this entry » |
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
PAUL JULIUS FLETCHER, )
)
Plaintiff, )
)
v. ) Civil Action No. 13-0447 (RC)
)
)
U.S. DEPARTMENT OF JUSTICE, )
)
Defendant. )
MEMORANDUM OPINION
Plaintiff, proceeding pro se, learned from a Freedom of Information Act (“FOIA”) request
in 2011 that records pertaining to his arrest and indictment in 1974 were destroyed in 1991. See
Fletcher v. U.S. Dep’t of Justice, 905 F. Supp. 2d 263 (D.D.C. 2012) (“Fletcher I”) (dismissing
FOIA/Privacy Act action). In what is captioned “Complaint for Declaratory and Injunctive
Relief,” ECF No. 1, plaintiff now sues the Department of Justice (“DOJ”) for $200 million in
damages for injuries he allegedly suffered as a result of the destroyed records. Plaintiff brings his
claims under the Privacy Act, 5 U.S.C. § 552a, the Administrative Procedure Act (“APA”), 5
U.S.C. §§ 701-06, the Federal Records Act (“FRA”), 44 U.S.C. §§ 2901-10, and the First and Fifth
Amendments to the Constitution. Id. at 1.
Defendant moves to dismiss under Federal Rule of Civil Procedure 12(b)(1) for lack of
subject matter jurisdiction and Rule 12(b)(6) for failure to state a claim upon which relief can be
granted. Def.’s Mot. to Dismiss Pl.’s Compl., ECF No. 13. Plaintiff has opposed the motion, see
Pl.’s Mot. to Respond to Def.’s Mot. to Dismiss Pl.’s Compl., ECF No. 15, and defendant has
replied, Def.’s Reply to Pl.’s Opp’n to Def.’s Mot. to Dismiss Pl.’s Compl., ECF No. 16. Upon
1
consideration of the parties’ submissions, the Court will grant defendant’s motion and dismiss the
case.
I. BACKGROUND
This action stems from Fletcher I where defendant “conced[ed] the impropriety of its
destruction of [p]laintiff's records . . . .” Fletcher, 905 F. Supp. 2d at 267. Because in that case
brought under the FOIA and the Privacy Act, “it [was] undisputed that the requested documents do
not exist, and none of [p]laintiff's other requested relief (perhaps excluding costs) [was] available,”
the Court granted defendant’s motion and dismissed the case without prejudice. Id. at 268-69.
The Court found that “the Government's explanation, which attributes the destruction to
inadvertence and negligent error, . . . vitiates [p]laintiff's assertion of willfulness or deliberate
destruction.” Id. at 267-68. It noted that “[t]o the extent [p]laintiff believes himself entitled to
some additional form of monetary relief for the improper destruction [of records], he may bring a
separate action so requesting,” or “if he subsequently suffers an adverse decision as a result of the
records destruction,” he could “revive” his Privacy Act claim. Id. at 268-69. The Court also
noted that plaintiff could “seek documents from the Superior Court[,] [but] offer[ed] no opinion as
to [plaintiff’s] likelihood of success in any of these ventures.” Id. at 269.
Plaintiff commenced this action in April 2013, five months after Fletcher I. He describes
his “injury as an inability to obtain through FOIA, information necessary to accomplish
[p]laintiff[’]s mission . . . to understand the charges, and convictions, which is traceable directly to
the defendants’ policy and practice of unlawfully [destroying his] records . . . .” Compl. at 3-4.
Plaintiff concludes that “DOJ negligently failed to maintain [his] case files by destroying them,”
and, as a result, he “has suffered great mental anguish and anxiety, producing physical symptoms
based on defendant’s conduct.” Id. at 11.
2
II. LEGAL STANDARDS
1. Rule 12(b)(1) Motion to Dismiss for Lack of Subject Matter Jurisdiction
Federal courts are courts of limited jurisdiction, and the law presumes that “a cause lies
outside this limited jurisdiction . . . .” Kokkonen v. Guardian Life Ins. Co. of Am., 511 U.S. 375,
377 (1994); see also Gen. Motors Corp. v. EPA, 363 F.3d 442, 448 (D.C. Cir. 2004) (“As a court of
limited jurisdiction, we begin, and end, with an examination of our jurisdiction.”). It is the
plaintiff's burden to establish that the court has subject matter jurisdiction. Lujan v. Defenders of
Wildlife, 504 U.S. 555, 561 (1992).
Because subject matter jurisdiction focuses on the Court's power to hear a claim, the Court
must give the plaintiff's factual allegations closer scrutiny than would be required in deciding a
Rule 12(b)(6) motion for failure to state a claim. See Grand Lodge of Fraternal Order of Police
v. Ashcroft, 185 F. Supp. 2d 9, 13 (D.D.C. 2001). Thus, the court is not limited to the allegations
contained in the complaint. See Wilderness Soc'y v. Griles, 824 F. 2d 4, 16 n.10 (D.C. Cir. 1987).
2. Rule 12(b)(6) Motion to Dismiss for Failure to State a Claim
The Federal Rules of Civil Procedure require that a complaint contain “a short and plain
statement of the claim” in order to give the defendant fair notice of the claim and the grounds upon
which it rests. Fed. R. Civ. P. 8(a)(2); accord Erickson v. Pardus, 551 U.S. 89, 93 (2007) (per
curiam). A motion to dismiss under Rule 12(b)(6) does not test a plaintiff's ultimate likelihood of
success on the merits; rather, it tests whether a plaintiff has properly stated a claim. See Scheuer
v. Rhodes, 416 U.S. 232, 236 (1974), abrogated on other grounds by Harlow v. Fitzgerald, 457
U.S. 800 (1982). A court considering such a motion presumes that the complaint's factual
allegations are true and construes them liberally in the plaintiff's favor. See, e.g., United States v.
Philip Morris, Inc., 116 F. Supp. 2d 131, 135 (D.D.C. 2000). It is not necessary for the plaintiff to
3
plead all elements of a prima facie case in the complaint. See Swierkiewicz v. Sorema N.A., 534
U.S. 506, 511-14 (2002); Bryant v. Pepco, 730 F. Supp. 2d 25, 28-29 (D.D.C. 2010).
Nevertheless, “[t]o survive a motion to dismiss, a complaint must contain sufficient factual
matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’ ” Ashcroft v. Iqbal,
556 U.S. 662, 678 (2009) (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007)). This
means that a plaintiff's factual allegations “must be enough to raise a right to relief above the
speculative level, on the assumption that all the allegations in the complaint are true (even if
doubtful in fact).” Twombly, 550 U.S. at 555-56 (citations omitted). “Threadbare recitals of the
elements of a cause of action, supported by mere conclusory statements,” are therefore insufficient
to withstand a motion to dismiss. Iqbal, 556 U.S. at 678. A court need not accept a plaintiff's
legal conclusions as true, see id., nor must a court presume the veracity of the legal conclusions
that are couched as factual allegations. See Twombly, 550 U.S. at 555. In deciding a motion to
dismiss under Rule 12(b)(6), the Court may take judicial notice of facts litigated in a prior related
case. See Oveissi v. Islamic Republic of Iran, 879 F. Supp. 2d 44, 49-50 (D.D.C. 2012).
III. DISCUSSION
1. Subject Matter Jurisdiction
Defendant argues that plaintiff’s claims for monetary damages under the APA and the
Constitution are barred by sovereign immunity. Def.’s Mem. of P. & A. at 5-9. Sovereign
immunity shields the federal government and its agencies from suit and is “jurisdictional in
nature.” American Road & Transp. Builders Ass’n v. EPA, 865 F. Supp. 2d 72, 79 (D.D.C. 2012)
(quoting FDIC v. Meyer, 510 U.S. 471, 475 (1994)) (other citations omitted). The government
may waive immunity, but such a waiver “must be unequivocally expressed in statutory text, and
will not be implied.” Lane v. Pena, 518 U.S. 187, 192 (1996) (citations omitted); see also United
4
States v. Mitchell, 463 U.S. 206, 212 (1983) (“It is axiomatic that the United States may not be
sued without its consent and that the existence of consent is a prerequisite for jurisdiction.”). To
survive a motion to dismiss under Rule 12(b)(1), “[t]he plaintiff bears the burden of establishing
both the court's statutory jurisdiction and the government's waiver of its sovereign immunity.”
American Road & Transp. Builders Ass’n, 865 F. Supp. 2d at 80 (citing Kokkonen v. Guardian
Life Ins. Co., 511 U.S. 375, 377 (1994); Tri–State Hosp. Supply Corp. v. United States, 341 F.3d
571, 575 (D.C. Cir. 2003); Jackson v. Bush, 448 F. Supp. 2d 198, 200 (D.D.C. 2006)).
Defendant argues correctly that Congress has not waived the federal government’s
immunity from suit for claims seeking monetary damages under either the APA or the
Constitution. The APA is a limited waiver statute that authorizes a claim against the United
States for “relief other than money damages.” 5 U.S.C. § 702; see § 706 (conferring jurisdiction
upon the court “to compel agency action unlawfully withheld or unreasonably delayed; and [to]
hold unlawful and set aside agency action, findings, and conclusions” upon making certain
enumerated findings).
The Federal Tort Claims Act (“FTCA”), 28 U.S.C. §§ 1346(b), 2671-80, is a limited
waiver statute that authorizes a claim for damages against the United States but only “under
circumstances where the United States, if a private person, would be liable to the claimant in
accordance with the law of the place where the act or omission occurred.” 28 U.S.C. §
1346(b)(1). Such consent does not encompass tort claims arising, as here, under the Constitution,
FDIC, 510 U.S. at 476-78, or claims arising, as here, “out of the failure of the United States to
carry out a federal statutory duty in the conduct of its own affairs.” Hornbeck Offshore Transp.,
LLC v. U.S., 569 F.3d 506, 509 (D.C. Cir. 2009) (citation and internal quotation marks omitted).
The Court finds that sovereign immunity shields defendant from monetary damages under
5
the APA and the Constitution and, thus, grants defendant’s motion to dismiss these claims under
Rule 12(b)(1).
2. Failure to State a Claim
A. The Federal Records Act
Defendant seeks dismissal of the claim brought under the FRA on the ground that “no
direct private right of action exists.” Def.’s Mem. of P. & A. at 10. In Armstrong v. Bush, the
United States Court of Appeals for the District of Columbia Circuit specifically held “that the FRA
precludes direct private actions to require that agency staff comply with the agency’s
recordkeeping guidelines.” 924 F.2d 282, 297 (D.C. Cir. 1991). The Court explained that
“[i]nstead, the APA authorizes the district court to entertain a properly pleaded claim that the
Archivist or an agency head has breached the statutory duty to take enforcement action to prevent
an agency official from destroying records in contravention of the agency’s recordkeeping
guidelines or to recover records unlawfully removed from an agency.” 1 Id. The instant
complaint does not present such a claim, and “the availability of [declaratory] relief presupposes
the existence of a judicially remediable right.” Ali v. Rumsfeld, 649 F.3d 762, 778 (D.C. Cir.
2011) (citation and internal quotation marks omitted) (alteration in original). Hence, the Court
grants defendant’s motion to dismiss the FRA claim under Rule 12(b)(6).
1
The Court of Appeals did not discuss what remedies are available when a statutory breach is
found. However, in Fletcher I, “the Government mention[ed] a Special Counsel investigation,
criminal penalties, or reporting of the incident to the National Archives and Records
Administration (“NARA”)” as “potential remedies for . . . improper [record] destruction,” and
indicated that it had reported the incident involving plaintiff’s records to NARA. Fletcher, 905 F.
Supp. 2d at 268. Hence, any potential claim under the APA concerning a report to NARA appears
to be moot, the criminal prosecution option is beyond this court’s civil jurisdiction, and the Special
Counsel investigation option appears impractical for an event that took place in 1991.
6
B. The APA Claim for Equitable Relief
The APA authorizes judicial review of final agency action by persons “adversely affected”
by such action and for which there is no other adequate judicial remedy. 5 U.S.C. § 702;
Trudeau v. FTC, 456 F.3d 178, 185 (D.C. Cir. 2006); see accord American Road & Transp.
Builders Ass’n v. EPA, 865 F. Supp. 2d at 81 (“[T]he waiver of sovereign immunity under § 702 is
limited by the ‘adequate remedy’ bar of § 704.”) (quoting Nat'l Wrestling Coaches Ass'n v. Dep't
of Educ., 366 F. 3d 930, 947 (D.C. Cir. 2004)). The only discernible final agency action in this
case is defendant’s denial of plaintiff’s FOIA request, which plaintiff properly challenged under
the FOIA in Fletcher I. Because the FOIA forecloses plaintiff’s “cause of action under the APA,”
Reliable Automatic Sprinkler Co., Inc., v. Consumer Prod. Safety Com’n, 324 F.3d 726, 731 (D.C.
Cir. 2003), the Court grants defendant’s motion to dismiss the APA claim under Rule 12(b)(6).
C. The Privacy Act Claim
Plaintiff alleges that defendant’s destruction of his records violated subsections (e)(1),
(e)(2), (e)(6), (e)(9), and (e)(10) of the Privacy Act. Compl. at 11. These provisions generally
require that records collected and maintained in an agency’s system of records contain “only such
information about an individual as is relevant and necessary to accomplish [an authorized] purpose
of the agency,” 5 U.S.C. § 552a(e)(1), and that such records be maintained in a manner that assures
their accuracy, completeness, timeliness and relevancy.
The Privacy Act provides for civil remedies in the form of actual damages of no less than
$1,000 and litigation costs upon a showing that an agency has failed to comply with the foregoing
provisions “in such a way as to have an adverse effect on an individual.” § 552a(g)(1)(D). The
United States may be held liable for such damages, however, only if the court “determines that the
agency acted in a manner which was intentional or willful.” Id. § 552a(g)(4); see accord Hurt v.
7
D.C. CSOSA, 827 F. Supp. 2d 16, 20 (D.D.C. 2011) (“The intent element of a Privacy Act damages
claim is a high hurdle to clear . . . . [A] violation of the statute ‘must be so patently egregious and
unlawful that anyone undertaking the conduct should have known it unlawful.’ ”) (quoting
Maydak v. U.S., 630 F.3d 166, 179 (D.C. Cir. 2010)).
In support of his argument that defendant acted willfully or intentionally, plaintiff asserts
that his “case files were sought to be disposed of to prevent detection of DOJ improprieties that
plaintiff was never indicted for the charges he was convicted of.” Pl.’s Opp’n at 4. Plaintiff has
not substantiated this claim by, for example, showing that his conviction has been invalidated or
supplying a court decision that has even addressed his accusations. Regardless, plaintiff’s
argument on the intent element is belied by the Court’s previous finding to the contrary. See
Fletcher, 905 F. Supp. 2d at 267-68 (“[T]he Government's explanation, which attributes the
destruction to inadvertence and negligent error, . . . vitiates [p]laintiff's assertion of willfulness or
deliberate destruction.”). Relying on a factually developed record, the Court reasoned:
Indeed, the destruction occurred in 1991--twenty years before ]p]laintiff's
FOIA request. This is clearly not a situation in which the Government
destroyed records to avoid disclosure. The documents sought, moreover,
are hardly clandestine materials; rather, the indictment and judgment of
conviction were (and may still be) publicly available from the Superior
Court.
Id. at 268. The Court agrees with this reasoning and, thus, has no basis to find that defendant’s
conduct rose to the level of violating the Privacy Act. Although this determination defeats the
Privacy Act claim, the Court, for the sake of finality, will address why plaintiff would not be
entitled to damages even if a violation had occurred.
In assessing the same injury asserted here, i.e., the inability to obtain records under the
FOIA to challenge a conviction, the Court in Fletcher I found that plaintiff had not pleaded an
8
injury sufficient to recover actual damages under the Privacy Act because “there has not yet been
any adverse determination against [p]laintiff from the destruction of records.” Id. (citing
Chambers v. U.S. Dept. of Interior, 568 F.3d 998, 1007 (D.C. Cir. 2009)). Although the Court
indicated that plaintiff could “revive” his Privacy Act claim should he suffer an adverse
determination, the instant claim does not suffice because it is based on the same injury already
determined to provide no basis for recovery under § 552a(g)(1)(C). See Fletcher, 905 F. Supp. 2d
at 268. Subsection (g)(1)(C), however, applies to violations of the amendment and accuracy
provisions set out at subsection (d) of the Privacy Act. This action is different insofar as plaintiff
alleges violations of the record maintenance provisions set out at subsection (e), which are
redressed under the “catch-all [remedial] provision” set forth at § 552a(g)(1)(D). Deters v. U.S.
Parole Com’n, 85 F.3d 655, 660 (D.C. Cir. 1996). Despite the differences, the assessment of
whether plaintiff is entitled to damages is the same in a “suit brought under the provisions of
subsection (g)(1)(C) or (D).” § 552a(g)(4).
The catch-all provision authorizes a cause of action based on an “adverse effect” (as
opposed to an adverse determination). Chambers, 568 F.3d at 1007, n.7 (citation omitted).
Because the requested court documents might be available from the Superior Court where they
originated, see Fletcher, 905 F. Supp. 2d at 267-68, plaintiff cannot show an adverse effect from
the agency’s destruction of copies of the same records. See Pl.’s Opp’n at 3-4 (asserting that he
lost his “right to appeal his conviction” and to seek post-conviction relief because defendant
destroyed “[a]ll . . . records relating to plaintiff[’s] arrest, indictment or information, [and] trial
finding of guilty”). Plaintiff also states that his “case files should be authenticated,” id. at 4, but
defendant is not responsible for authenticating court documents. See Fletcher, 905 F. Supp. 2d at
267 (“Plaintiff neglects the logical answer that [his] indictment was obtained from court, not
9
Government, records . . . .”); see also id. at 268 (“An agency does not control a record which has
been destroyed . . . and it is under no obligation to obtain a duplicate of or to re-create a record in
order to fulfill a FOIA request.”) (quoting James v. U.S. Secret Serv., 811 F. Supp. 2d 351, 358
(D.D.C. 2011) (citations omitted), aff'd, No. 11–5299, 2012 WL 1935828 (D.C. Cir. May 11,
2012) ( per curiam )). Hence, the Court grants defendant’s motion to dismiss the Privacy Act
claim under Rule 12(b)(6).
CONCLUSION
For the foregoing reasons, defendant’s motion to dismiss the case under Federal Rules of
Civil Procedure 12(b)(1) and 12(b)(6) is granted. A separate Order accompanies this
Memorandum Opinion.
________/s/____________
RUDOLPH CONTRERAS
United States District Judge
Date: February 21, 2014
10
|
Q:
Wrong default gateway assigned
I am using Windows 7. Here is a correct ipconfig which helps me connect to Internet:
IPv4 Address 192.168.1.100
Subnet Mask 255.255.255.0
Default Gateway 192.168.1.254
It happens so often that in the morning when I first turn on my computer, the Default Gateway was assigned as 192.168.1.252 so I could not connect to Internet and had to set a static Default Gateway myself.
There are two IPs that my default gateway is randomly assigned:
192.168.1.254 (correct)
192.168.1.252 (incorrect)
I don't know where the value of 192.168.1.252 comes from. I can not ping 192.168.1.252. I checked on my router setup page (192.168.1.254) but could not find any proof.
A:
Also because we don't know anything about your network and if we assume that it's big LAN it's possible that there is seccond DHCP server in network (even with the same IP as right DHCP so you won't figure it out) and give IP address to you faster than right DHCP server. Network administrator can easily find second DHCP server in LAN using dhcpdump (linux software).
|
Specific Detection of Clavibacter michiganensis subsp. sepedonicus by Amplification of Three Unique DNA Sequences Isolated by Subtraction Hybridization.
ABSTRACT Three single-copy, unique DNA fragments, designated Cms50, Cms72, and Cms85, were isolated from strain CS3 of Clavibacter michiganensis subsp. sepedonicus by subtraction hybridization using driver DNA from C. michiganensis subsp. insidiosus, C. michiganensis subsp. michiganensis, and Rhodococcus facians. Radio-labeled probes made of these fragments and used in Southern blot analysis revealed each to be absolutely specific to all North American C. michiganensis subsp. sepedonicus strains tested, including plasmidless and nonmucoid strains. The probes have no homology with genomic DNA from related C. michiganensis subspecies insidiosus, michiganensis, and tessellarius, nor with DNA from 11 additional bacterial species and three unidentified strains, some of which have been previously reported to display cross-reactivity with C. michiganensis subsp. sepedonicus-specific antisera. The three fragments shared no homology, and they appeared to be separated from each other by at least 20 kbp in the CS3 genome. Internal primer sets permitted amplification of each fragment by the polymerase chain reaction (PCR) only from C. michiganensis subsp. sepedonicus DNA. In a PCR-based sensitivity assay using a primer set that amplifies Cms85, the lowest level of detection of C. michiganensis subsp. sepedonicus was 100 CFU per milliliter when cells were added to potato core fluid. Erroneous results that may arise from PCR artifacts and mutational events are, therefore, minimized by the redundancy of the primer sets, and the products should be verifiable with unique capture probes in sequence-based detection systems. |
PodCamp 4 Session: False Metrics vs Real ROI
Tom Beach of TRB Designs came to my session on False Metrics vs Real ROI at PodCamp 4 in Boston and made a video of it for the internet, in which he embedded my slides. I love the participation throughout, but especially at the end with the interaction between Chris, myself, the rest of the participants and Kat (we were encouraging her to stop selling herself short and get out there to get known for her expertise). I had intended to reserve the slides for the attendees, but since they are out there now, here you go, Tom’s recording of my session, broken into two parts for YouTube: |
Q:
What is the name of the box which keeps software CD?
I don't know its exact name or how do you call this box in English:
The CDs inside the box are essential and required to be installed before the paid hardware can fully function.
I don't own this box. I found it somewhere on the Internet. I came up with the question, so I typed in some keyword on Google and then I found some photos about boxes that keep software CDs.
Update:
Thank you, @Usernew and @CookieMonster, for your prompt help.
I am sorry that my question is confusing to most of you. Please let me explain it some more. Say, I bought a sound card of ABC company some time ago, and the sound card was packed in a square cardboard box, and when I opened the square cardboard box, I found a software CD that came with the sound card.
And my question is, what is the name of that cardboard box which keeps that software CD and the sound card?
A:
There are different types of packing and packaging layers, kitty.
You can read about the three packaging layers on Wiki here.
There are many different packaging for CD/DVDs as well.
Here are the different packaging styles (thanks to Rainbowjam for making my work easier.):
Jewel Case: The normal plastic case with a plastic tray inside which holds the CD. Will include a paper inlay at the back and a paper inlay or booklet at the front. This is the standard packaging for CD albums.
Slipcase: A cardboard box, open at either one or both ends which slips over the jewel case. Sometimes also holds a thicker booklet which doesn't fit inside the jewel case.
Box Set: A box which is different to a slipcase as it doesn't have any open ends. Usually used to hold multiple CDs in either jewel cases or card sleeves but occasionally used as special packaging for a single CD.
Slimline Jewel Case: A slimmer jewel case to standard with no inner tray; the CD is held in place on the back of the jewel case. Will include a paper inlay at the front with the disc visible at the back. This is the standard packaging for CD singles.
Wide/Fat Double/Multiple Jewel Case: A jewel case which is at least twice as deep as a standard jewel case and opens at the back as well as the front to hold 2 or more CDs. Will include paper inlays at the front and back and may have a booklet inside as well. This is the standard packaging for older CD double albums.
Slim Double Jewel Case: A standard jewel case with a special tray inside. The tray holds a CD on each side and flips open inside the jewel case like the pages of a book. Will include a paper inlay at the back and a paper inlay or booklet at the front. This is the standard packaging for CD double albums.
Digipak: A cardboard sleeve which opens up like a book to reveal a plastic tray glued inside which holds the CD. All the CD artwork is printed on the cardboard packaging. May include a booklet which will slot inside the digipak.
Fold-out Digipak: Exactly the same as above but with extra fold-out sections on the digipak.
Slidepack: A cardboard slipcase, thinner than those used to hold a jewel case, which holds a plastic tray (similar to the tray inside a digipak) containing the CD. All the CD artwork is printed on the slipcase.
Card Sleeve: A cardboard sleeve identical to a record cover but in miniature. All the CD artwork is printed on the sleeve.
Plastic Wallet/Sleeve: A clear thin plastic sleeve with a fold-in envelope style flap. Usually only used for promotional CDs; if you're offered a standard release (ie: not a promo) in this kind of packaging (with or without artwork) then it's probably a pirate copy. Check out my guide on the different types of illegal CDs and how to spot them. Assuming the CD is a promo, it will either have a generic insert (white paper with printed CD details), a picture insert (basic copy of the proposed artwork - usually poorer quality than the finished product) or sometimes no insert at all.
There is one more:
CD sleeve: just like a cardboard sleeve, but there is usually no printing work on the cover, also, it is usually made of paper(or some other material I am unaware of). I think this type of packaging is used everywhere when there is a CD inside the box which is essential and required to be installed before the paid hardware can fully function. Here it is:
The big brown coloured box that Cookiemonster provided is called a Carton or simply a box. I won't call it a shipping box unless I am sure that they are being shipped.
A:
I don't use any special names. I just call it a box:
I bought Photoshop a long time ago, and it came in a huge box with a CD and a bunch of manuals. I put the manuals and CD back in the box after I installed it and kept the box on my shelf.
If I needed to, I'd use a larger phrase like the box my sound card came in. I could also call it something like packaging, but I generally don't.
So really, I don't think you need a special term. You can just say box.
A:
Not exactly sure what you're asking about (if you could be just a tad clearer), but what I can tell from looking at the picture you provided is that it looks more like a box for an electronic device, not a CD bundle. A CD bundle would be a bunch of CDs packaged and sold together as a single unit. I guess we could call it a software CD bundle or a CD box set. Something along those lines. Here's a Wikipedia article about different types of optical disc packaging techniques: Box set. Take your pick.
In computer-speak though, computer programs pre-written on compact disks like that and sold in consumer electronics stores are generally called shrink-wrapped software. Here's what this type of packaging looks like:
For bigger items like a TV set or computer display, I guess shipping box is the term we would normally use:
Let me know if this has been helpful or I got something wrong.
|
Introduction
============
When remembering an event we experienced in the past, a special sense of self is involved: not only do we experience being the subject of the conscious episode, but we also experience being the protagonist in the memory scene. That is, the one witnessing in the present and the one in the past who is witnessed are experienced as one and the same person. This is the "phenomenal presence of sel" ([@B48]). How does one identify oneself in episodic simulation during the retrieval of autobiographical memory?
The connection between memory and the sense of self has been a central topic in philosophy of memory; the role of memory in constituting personal identity, psychological self, and narrative has long been a major field of enquiry ([@B55]; [@B30]; [@B25]; [@B23]; [@B21]). Recently, more attention has been paid to self-awareness ([@B58]), self-concept ([@B22]; [@B48]), and immunity ([@B16]; [@B2]) in memory. However, I believe the issue of what constitutes the phenomenal presence of self remains underexplored. This paper aims to address it.
One important concept is that of "the phenomenal unit of identification (UI)," which has been recently introduced by [@B37],[@B38], [@B40]) to characterize the phenomenal property that gives rise to the conscious experience of "I am this." Candidates of the phenomenal property in question are the dimensions of the minimal phenomenal self (MPS), and altered states of consciousness -- such as out-of-body experiences, full-body illusions, dreams, and mind-wandering -- have been critical to our understanding of them ([@B36], [@B38], [@B40]; [@B5]; [@B63]). This paper aims to bring attention to field and observer perspectives in episodic memory and to suggest that studying these phenomena may provide an interesting approach to researching the phenomenal presence of self and UI in memory.
The paper begins by introducing the phenomenon of perspective shifting, and the target question of what constitutes the phenomenal presence of self is then elaborated. Next, I argue that observer-perspective remembering is a stable state of consciousness that is distinct from autoscopic phenomena with respect to the dimensions of MPS and as such can provide an interesting approach to researching identification in memory and its degree. The paper also notes that studying perspectives in episodic memory can draw out empirical and conceptual issues concerning the relationship between the MPS and extended self.
It is worth noting that "memory" is an equivocal term^[1](#fn01){ref-type="fn"}^ and is used to refer to retrieved information in this paper. In addition, the discussion here is restricted to "episodic memory," a kind of declarative memory whose content is a reconstruction of an event in the past with temporal, spatial, and self-referential context ([@B59]; [@B24]). Phenomenally, we experience as if we mentally travel back in time and "re-live" an event we once experienced.^[2](#fn02){ref-type="fn"}^ Moreover, memory is regarded as a kind of conscious or episodic simulation. According to "constructive memory framework" [@B54], representations of experiences are conceptualized as "patterns of features," which represent different facets of the experience. Retrieval is realized by the process of pattern completion, which allows a subset of features to comprise a past experience ([@B49], [@B50]; [@B51]; [@B53]).^[3](#fn03){ref-type="fn"}^ It is suggested that the mechanism of memory construction is shared by other mental phenomena including future and counterfactual thinking ([@B7]; [@B52]; [@B15]).
Field and Observer Perspectives in Episodic Simulation
======================================================
I see myself dancing at a party at the university. I remember my clothes and my legs (the way they moved). Suddenly, I am "inside my own body" looking out. A guy I know a little walks by me and says as he passes: "You look good today" ([@B4], p. 1193).
The experience of visual images is commonly involved when remembering an event, and two perspectives can be adopted in recollection: field and observer. When one recalls something from a field perspective, the event is viewed from the visual first-person perspective of the represented self. The visuospatial image originates from the same viewpoint experienced at encoding. In contrast, someone remembering can take an observer perspective in which an event is visualized from an external vantage point. Observer perspectives are located outside one's represented body and can vary across spatial locations depending on several factors. In the memory report above, the subject first experienced the recollection from an observer perspective and then shifted to a field perspective.
Despite the difficulty of pinning down the actual proportion of recollections from an observer perspective to those from a field perspective, it has been suggested that the observer perspective may be more common than initially thought ([@B46]). A cross-cultural study of the prevalence of the two visual vantage points in imaginary events during mind-wandering showed that almost half (46%) of participants reported most commonly adopting a third-person visual perspective ([@B9]). Additionally, [@B33] revealed that future events are more likely to be imagined from an observer perspective. Although the tendency to adopt an observer perspective may be different in memory, these studies indicate that observer perspectives can be found in a significant minority of mental events.
Recently, the topic of visual perspective in memory has gained attention in cognitive psychology. Studies of visuospatial perspectives have focused on its effects on emotional intensity ([@B4]), recollection content ([@B34]), personal continuity ([@B28]; [@B29]), self-projection ([@B13]), the truthfulness (or accuracy) of memory ([@B19]), and the links to clinical disorders such as post-traumatic stress disorder ([@B43]; [@B3]; [@B35]) and body dysmorphic disorder ([@B42]). [@B45] studied the relationship between the field and observer perspectives in a given episode of memory. Can we experience a single recalled experience from more than one vantage point? A mutually exclusive framework, which is presumed in many studies of perspective in memory (e.g., [@B41]), suggests that we only experience either a field or an observer perspective, but not both, in a single retrieval attempt. However, complementary and independent frameworks propose that both perspectives can be experienced. More adoption of one perspective necessitates lesser adoption of the other according to the complementary framework, whereas the two perspectives are independent from each other in the independent framework. How their relationship is conceptualized determines how perspective in memory should be assessed. Using different kinds of measurement techniques and examining how two perspectives correlate with ratings of vividness, [@B45] provide evidence in support of the independent framework.
The Phenomenal Presence of Self in Episodic Memory
==================================================
Every episodic memory -- with either a field or observer perspective -- entails a sense of self ([@B60]; [@B22], [@B24]).^[4](#fn04){ref-type="fn"}^ Each puts one -- the subject who is remembering -- in contact with an event that involves oneself -- who is remembered -- and leads to the question: how does one identify oneself in episodic simulation during the retrieval of autobiographical memory? To illustrate the issue, try to recall a public event in the past, such as a recent family reunion. It is very likely that you recall the event from a field perspective (if not, please shift to a field perspective for now; I will refer to this as "field-perspective remembering"). How do you identify yourself among the other people represented in your memory? One may find this question absurd when considering a case in which one remembers an event from a field perspective. You "re-experience" from the vantage point of your simulated eyes, similar to the original experience during encoding; you are probably also embodied in a simulated body. The egocentric center coincides with your body's location. Let us then try to remember an event from an observer perspective. (Feel free to recall any event as long as the experience originates from an observer's vantage point. It will be referred to here as "observer-perspective remembering.") Again, several people are represented in your episodic recollection as if they appear in your visual field, but this time, one of them is you. What enables you to successfully identify yourself?
Compare the experience of observer-perspective remembering with spotting yourself in a group photo. They differ in several ways: first, you probably recognize yourself in the photo through your face, hairstyle, an old item of clothing, or other external properties or combination of properties. However, in observer-perspective remembering, even sometimes without representations of recognizable features that could allow identification,^[5](#fn05){ref-type="fn"}^ that person is taken to be yourself in a direct and immediate manner. Additionally, subjectively, you do not experience many -- if any -- differences in the way of identification when remembering from an observer perspective when compared with field-perspective remembering. Second, when recognizing yourself in a photo, you may doubt if the person in that image was really you; however, there is no such doubt in autobiographical remembering. Third, such identification is robust in all experiences of episodic autobiographical memory. It is considered necessary for episodic memory by [@B59], [@B60]), who regarded remembering as an expression of autonoetic consciousness.
The identification with these features is also present in some forms of future thinking, imagining, mind wandering, and dreams ([@B47]). Addressing the issue of identification, [@B37],[@B38], [@B40]) introduced the concept of the phenomenal UI to characterize the phenomenal property that gives rise to the conscious experience of "I am this" -- that is, the phenomenal presence of self. I will examine identification and UI in memory with an observer perspective after the next section, in which I argue that observer-perspective remembering is itself an interesting phenomenon with respect to the dimensions of MPS.
Dimensions of MPS in Memory
===========================
What is the minimal form of self-consciousness and what are its enabling conditions? Many studies of MPS and bodily self-consciousness have focused on autoscopic phenomena, particularly out-of-body experiences. Three dimensions of MPS are proposed to characterize different forms of autoscopic phenomena: self-location, self-identification, and weak first-person perspective (weak 1PP) ([@B5]). Self-location refers to being located at a spatiotemporal point or space that in a standard situation would be localized within one's represented body; self-identification is the global identification of the body as a whole; and weak 1PP is the geometrical origin of an egocentric visuospatial model of reality.
These concepts enable clear characterizations of autoscopic phenomena such as autoscopic hallucination, heautoscopy, and out-of-body experiences ([@B6]; [@B5]). People with autoscopic hallucinations experience seeing an illusory double of their own body in an extrapersonal space, while their visuospatial perspective (weak 1PP) and the location of their experience of embodiment remain unchanged (self-location and self-identification). During out-of-body experiences, one's self-location and weak 1PP are located outside one's physical body, whereas one's identification with the physical body is lost and instead one identifies with an illusory body. Heautoscopy is considered an intermediate form between autoscopic hallucinations and full out-of-body experiences. Individuals with heautoscopy, experiencing an illusory body and an extrapersonal space, are unable to determine their self-location and self-identification, and the origin of their weak 1PP is reported to either alternate between the real and illusory bodies or exist at both locations simultaneously. Recently, bodiless experiences -- such as asomatic out-of-body experiences and bodiless dreams -- have been invoked to argue against the necessity of self-identification for phenomenal minimal selfhood and to suggest that only the experience of spatiotemporal self-location is required ([@B62]; [@B38]).
One essential difference between remembering and autoscopic phenomena is worth noting before examining three dimensions of MPS in episodic memory. Regarding remembering, having episodic memory means having a perception-like experience: a virtual world is mentally simulated in which one's virtual body is situated. In contrast, an illusory body is experienced in extrapersonal space in the real world in autoscopic phenomena. Additionally, unlike autoscopic phenomena, remembering involves the experience of temporal self-location in the past, which contributes to autonoetic consciousness. Autonoetic consciousness allows one to mentally project oneself backward to experienced events and provides the familiar phenomenal flavor of recollective experience characterized by "pastness" ([@B59], [@B60]).
How do self-location, self-identification, and weak 1PP appear in remembering? During recollection from a field perspective, in one's episodic simulated world, three dimensions of MPS coincide and are localized within the boundaries of one's virtual body. In contrast, while recalling an event from an observer perspective, the origin of our visuospatial perspective is by definition located outside the virtual body; its location depends on the content of recollection and several other factors ([@B44]). But what about self-identification and self-location?
It may be conjectured that decoupled visuospatial perspective results in reduced self-identification; however, some sports psychology studies challenge this idea. Perspectives are important in the inquiry of how imagery perspectives affect the performance of a given skill. It was assumed that expertise in sports is associated with increased use of internal imagery (i.e., imagery from a field perspective; e.g., [@B31]) and that kinesthetic imagery -- i.e., the simulation of the somatosensory consequences of imagined movement such as proprioception ([@B56]) -- can only, or will be more easily, be performed with an internal image (e.g., [@B18]). However, [@B12] found external imagery more effective for open forms of skill performance that include "changing environmental conditions, intertrial variability, body transport, and object manipulation" (p. 4) in tennis (e.g., forehand accuracy), but internal imagery for closed forms (e.g., serve accuracy). Furthermore, [@B8] examined the strength of the relationship between visual imagery and kinesthetic imagery and found no significant correlation when subjects were instructed to imagine watching someone else from an external perspective. Nevertheless, there was a significant correlation between external and kinesthetic imagery when the subjects were instructed to imagine "watching yourself" from an external perspective, but not between internal and kinesthetic imagery. The authors speculate that the correlation was due to the form of execution involved in this study, which requires greater "spatial positioning of movement" and "visual referencing of its location." These studies suggest that a dissociated weak 1PP can give rise to stronger identification with the virtual body in certain situations.
As for self-location, it remains unclear where it is; this is surely a question open to experimental investigation. According to the aforementioned studies, open forms of skill performance benefit more from observer-perspective imagery and this type of skill involves monitoring constantly changing environmental factors and their spatial relationships to external objects. It is suggested that the experience from an observer perspective can lead to a more accurate visuospatial self-location -- where accuracy refers to the degree to which the spatial relation between self-location and virtual body in episodic simulation corresponds to the spatial relation between self-location and physical body or objects in reality, and that such effect may also be found in memory. Self-location is predicted to remain within the boundary of one's body in observer-perspective remembering.
If the analysis is correct, remembering with an observer perspective is a phenomenon in which one's weak 1PP is decoupled from self-identification and self-location, which is hardly found in autoscopic phenomena. Given that such decoupling is also present in dreams ([@B47]), observer-perspective remembering can serve as a stable state of consciousness that is distinct from autoscopic phenomena and can be easily manipulated and assessed.
Identification in Memory With an Observer Perspective
=====================================================
Returning to the question of how we identify ourselves in memory (as well as in future thinking and dreams) with an observer perspective, UI -- defined as the phenomenal property that gives rise to the conscious experience of "I am this" -- can be linked to a range of different phenomenal properties and used to characterize various states of consciousness such as mind-wandering ([@B37], [@B40]) and dreams ([@B38]). According to UI-theory ([@B38]), UI can change dynamically as we "constantly search for a source of maximal invariance" (p. 5) and identify with it. In a standard situation in which we experience ourselves as embodied agents, UI candidates are contents of our body as a whole and the agentive experience of being in control of one's bodily actions ([@B37], p. 10), whereas when we are experienced as an epistemic agent, UI is the "epistemic agent model" (EAM) defined as a conscious self-representation of being equipped with epistemic self-control (e.g., maintaining knowledge relation to certain parts of the real/virtual world, body and oneself) ([@B38], [@B39]). In many cases, including observer-perspective remembering, UI can be a combination of these.
The concept of UI allows us to characterize episodic memory with field and observer perspectives. Like mind-wandering ([@B37]), every beginning and ending of an episodic autobiographical simulation -- from a real world- and self-model to a virtual (past) world- and self-model or back -- is a shift of the UI. However, unlike mind-wandering, which comprises causally determined unconscious processes, episodic simulation can also be deliberately initiated, and UI shifts are therefore not necessarily accompanied by a brief loss of self-awareness, i.e., a "self-representational blink" (SRB) ([@B37]). Furthermore, there may be more UI shifts in a memory episode.
The issue here is whether the UI shifts when one changes the vantage point from which one recollects -- from field to observer perspective, or vice versa. In this respect, we might ask: what constitutes UI when remembering from an observer perspective? To account for UI in this special case in which the origin of weak 1PP is decoupled from self-location and self-identification, three options are available.
The first possibility is to identify with the "observer" -- for UI to coincide with either a visuospatial perspective or an EAM. This is intuitive when considering self-references in the memory report such as "I see myself dancing at a party at the university" ([@B4], p. 1193). The first-person pronoun refers to the "observer" as an epistemic agent. In this case, UI switches from an embodied agent to a disembodied epistemic agent when changing one's vantage point from field to observer perspective. However, one can also identify with the "protagonist"; here, the UI can be the content of the virtual body image or sense of bodily agency. The finding that observer-perspective imagery is only significantly associated with kinesthetic imagery when subjects imagine watching themselves ([@B8]) suggests that we may experience ourselves identifying with the embodied agent, and no UI switching accompanies visual perspective shifting.
Consider the third possibility: UI is constituted by both the phenomenal embodied agency and epistemic agency, as well as the relation between these two, such as the spatial relation (e.g., distance, in front/behind, and height). [@B46] found that the location of the vantage point from which one remembers from an observer perspective is reliably associated with the events being recalled. For instance, remembering a face-to-face conversation and a group performance, respectively, produced images near the protagonist and images from a distance, whereas remembering giving an individual presentation and remembering being in an accident, respectively, produced images from a perspective in front of a protagonist and images from behind.
To be more specific, in observer-perspective remembering, if the relationship between the observing agent and embodied agent -- the protagonist -- contributes to the UI, it is hypothesized that there is a connection between the relationship and the degree of UI. No empirical study of which I am aware has assessed such a connection. However, if we consider remembering from a field perspective as one extreme of such a relationship, some currently available data indirectly supports such a hypothesis. The connection between perspectives and the personal assessment of self-change has been studied by [@B28] and [@B29]. They found that compatibility between one's current self-concepts (e.g., religious beliefs, political attitudes, and the nature of their relationships) and the actions visualized in memory affect the vantage points from which the subjects view a scene: conflicting actions tend to be viewed from an observer perspective, while compatible actions are viewed from a field perspective ([@B28]). UI in remembering offers an interesting perspective on understanding the phenomenal presence of self in memory and one's sense of identity, which I will illustrate next.
The Degree of Phenomenal Presence of Self and the Sense of Identity
===================================================================
One implication of the third conceptual possibility -- whereby UI is partially constituted by the relationship between the epistemic agent and the embodied agent in memory -- is that our phenomenal sense of self can emerge in degrees. Factors involved in determining the degree of identification may affect the relationship in question. There are a number of trait and state differences figured into the degree of identification. Regarding trait differences, some individuals are more capable of forming UI than others ([@B14]). Meanwhile, state differences illustrate the different likelihoods of a possible model being integrated into the current one. Some possible models are more likely to be integrated than others by the current self-model. The difference is largely dependent on the system's current state and the compatibility between the autobiographical and emotional content of the current state and a given possible state. As a system constantly aims to maximize its coherence, a form of integration that allows "distance" between one's current and past (or future) self-models is available to enable successful integration; in this case, remembering (or future thinking) from an observer perspective is accompanied by a reduced sense of identity. On the other hand, in some specific cases in which information obtained from an observer perspective (e.g., one's location in a group) is required for or can boost successful integration, observer-perspective remembering may bring one enhanced sense of identity.
This view resonates with the notion of "self-distancing" in cognitive therapy ([@B27]). The process of self-distancing refers to a mechanism that allows subjects to analyze their past experience from a self-distanced perspective instead of an immersive perspective. The underlying idea is that cueing subjects to analyze negative experiences from an immersive perspective will lead them to focus on the emotionally arousing feature of the experience, whereas taking a self-distanced perspective will shift the focus more to reconstructing the episode in ways that offer a sense of insight and closure. Shifting visual perspectives is a common technique: subjects are asked to "take a few steps back" and to watch the experience happening to them "from the vantage point of a fly on the wall" (observer-perspective episodic simulation; [@B27], p. 87). There are different types of distancing domains (e.g., non-first-person self-talk in the linguistic domain) and all are connected inasmuch as enhancing distance in one domain results in the enhancement of distance in other domains.
Furthermore, the degree of UI in memory -- as the experience of the degree to which one identifies with the simulated past self -- can be taken to understand the sense of identity or continuity. It should be noted that there is a distinction between sense of identity (or sense of continuity) and the metaphysical relationship of identity; only the former is of concern here. Unlike the metaphysical relationship, a sense of identity is a phenomenological concept: as we experience ourselves not only as existing at the present moment, but also in the past and potentially in the future, the concept refers to our feeling that we are a temporally extended being (cf. the autobiographical self in [@B11]). The point here is to point out that studying perspectives and dimensions of MPS in episodic simulation (remembering, future, and counterfactual thinking) can open up new avenues for understanding the connection between the MPS and the extended self ([@B17]).
Conclusion
==========
Together, the notion of UI and the special case of observer-perspective remembering offer a way of understanding the phenomenal presence of self in episodic memory and how it is linked to our sense of identity. I have shown how the particular style of remembering is relevant to research on phenomenal selfhood and identification in memory. The analysis can be further extended to study future thinking and vicarious dreams ([@B47]) and can inform issues ranging from theoretical inquiry in philosophy of memory to clinical applications in cognitive therapy.
Author Contributions
====================
The author confirms being the sole contributor of this work and has approved it for publication.
Conflict of Interest Statement
==============================
The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
I am grateful to the editors and two reviewers for their helpful comments on earlier versions of this paper.
The term "memory" may refer to neurocognitive capacity, hypothetical store, information persistence, information retrieval, or the phenomenal awareness of remembering ([@B61]).
Note that "re-living" is used in a loose sense here, as memory distortion and perspective switching is allowed. In agreement with [@B57], constructive memory and memory with an observer perspective are considered genuine.
The construction of memory is constrained by different factors, including the organism's present goal ([@B10]), the current environment ([@B1]), and prior knowledge ([@B20]).
However, it does not imply that semantic memory cannot be self-referential or about oneself. Contextually dependent personal information can reside in semantic memory: "personal semantic memory" ([@B26]).
The absence of recognizable features may be due to decreased vividness or accuracy of memory retrieval ([@B32]) or the vantage point adopted, which prevents some or any external properties represented in the visual scene.
[^1]: Edited by: Jennifer Michelle Windt, Monash University, Australia
[^2]: Reviewed by: David B. Edelman, Dartmouth College, United States; Matthew Fulkerson, University of California, San Diego, United States
[^3]: This article was submitted to Theoretical and Philosophical Psychology, a section of the journal Frontiers in Psychology
|
It is now fair to ask whether the National Rifle Association is winning — or has in fact won — this era of the gun debate in this country.
Gun control advocates have tried to use the horror that exists in the wake of mass shootings to catalyze the public into action around sensible gun restrictions. But rather than these tragedies being a cause for pause in ownership of guns, gun ownership has spiked in the wake of these shootings.
A striking report released Friday by the Pew Research Center revealed that “for the first time, more Americans say that protecting gun rights is more important than controlling gun ownership, 52 percent to 46 percent.”
One of the reasons cited was Americans’ inverse understanding of the reality and perception of crime in this country. As the report spells out, in the 1990s, people’s perception of the prevalence of crime fell in concert with actual instances of violent crime. But since the turn of the century, things have changed: “A majority of Americans (63 percent) said in a Gallup survey last year that crime was on the rise, despite crime statistics holding near 20-year lows.” |
Features
LOS ANGELES — Victims of hate crimes arising from the Sept. 11 terrorist attacks have a new hotline for help in California.
Salam Al-Marayati of the Muslim Public Affairs Council said the campaign by the state Department of Fair Employment and Housing was timely because Muslims and others continue to be the victims of backlash violence and harassment following the attacks.
“We have seen a backlash of violent incidents against American Muslims and those who appear to be Muslims,” Al-Marayati said during a press conference at the Islamic Center of Southern California, which is under police guard.
“We saw the backlash spike immediately after the (attacks) and that was expected,” he said. “We have seen it come back up again probably because now there are people again on the attack trying to defame Islam.”
The hate crime initiative includes a new toll-free telephone number (866-460-HELP) that gives victims immediate access to Fair Employment and Housing counselors who can tell them of services available and refer them to local district attorneys, if necessary, said Dennis Hayashi, director of the state agency.
“We can set up appointments in two to three minutes for people who call our hot line,” Hayashi said. “We feel strongly that there needs to be a sense of urgency for these types of incidents.”
The campaign also includes training sessions for attorneys to teach them the intricacies of hate-crime laws.
The first training session will be held Tuesday in Los Angeles and will be followed by one in Sacramento, said Roland Coleman, president of the Los Angeles County Bar Association.
The training is important because the litigation of hate crimes is a specialized area of law and in some situations victims will be entitled to monetary damages, Coleman said.
In an existing program, victims of hate-crime violence who file complaints with the Fair Employment and Housing agency can be awarded damages up to $150,000 for emotional distress, property damages, lost wages and medical expenses. The agency also can seek restraining orders and civil fines up to $25,000.
Al-Marayati, who also is a member of the Islamic Center, said about 100 Muslims have called to complain of being harassed and intimidated since the attacks. Most of the calls deal with Muslim women being harassed for wearing a headscarf and children being taunted at school.
He also noted the recent attack on a Hispanic man in Lancaster by two men who have been charged with hate crimes. The men allegedly chased home 47-year-old Gerard Pimentel, kicked in his front door and shouted anti-Middle Eastern slurs as they beat him.
An Arab-American convenience store owner in Fresno County also was shot and killed last weekend in what his family believes was a hate crime.
The Fair Employment and Housing agency also is translating information on the new toll-free number and state laws regarding hate crimes into Middle Eastern and South Asian languages, including Arabic, Farsi, Hindi and Punjabi. |
The invention seeks to provide a more efficient and economical method for coating a metal strip moving at high speed in a rolling mill or process line with oil or other lubricant. More particularly, the invention provides an improved ionic strip coating method which operates at a much lower and safer voltage and amperage than known prior art systems, lessens the consumption of oil and more completely and uniformly coats the metal strip on both sides during its passage through a very compact coating apparatus which requires much less floor space than prior art systems. The apparatus used to carry out the method is a unit which contains an electrical power supply, a circulating system for lubricant enabling excess lubricant to be recovered, and a pair of pinch rolls through which the lubricated strip may pass. The propose of the pinch rolls is only to hold a fixed pass line of the strip with respect to the oil discharge headers.
In accordance with an important feature which distinguishes the invention from the prior art, a pressurized gas, such as air, in the form of jets or sprays is directed at the attracted oil streams as they exit from a header and these streams are dispersed into a multitude of finer streams in a crossing pattern which assures complete and uniform coating of the moving strip across its full width.
Known prior art ionic systems operate at a voltage and current value far above that of the invention, and consequently are capable of causing a lethal shock. Prior art voltage and current are of the order of 150,000 volts at 1000 microamps. In contrast of this, the invention utilizes 60,000 to 100,000 V. at only about 10 microamps. As a consequence, the invention is entirely safe and cannot cause a lethal shock.
Additionally, from a construction standpoint, the apparatus employed in the method is much simpler and more compact than the prior art.
Other features and advantages of the invention will become apparent during the course of the following description. |
Icon Sportswire via Getty Images Police officers were called to the Overland Park, Kansas, home of Kansas City Chiefs wide receiver Tyreek Hill twice in March to investigate reports of child abuse, neglect and battery.
Police are investigating two incidents of alleged child abuse at the home of Kansas City Chiefs star wide receiver Tyreek Hill.
“The club is aware of the investigation involving Tyreek Hill,” a team spokesman said in a statement to HuffPost on Friday. “We are in the process of gathering information and have been in contact with the league and local authorities. We will have no further comment at this time.”
According to police reports obtained by KCTV5, police officers were called to Hill’s home in suburban Overland Park, Kansas, twice this month to investigate incidents involving a juvenile. The first report, dated March 5, pertained to reported child abuse and neglect and listed Hill and his fiancée, Crystal Espinal, under “others involved.”
The second report, dated March 14, regarded alleged battery of a juvenile at the same address. Hill is not listed on that report, but Espinal is listed again under “others involved.”
An unidentified source familiar with the situation told The Kansas City Star that the alleged battery involved Hill and Espinal’s 3-year-old son and resulted in a broken arm.
The Overland Park Police Department did not immediately respond to a request for comment.
Hill, 25, has a history of violence and abuse. In 2015 he pleaded guilty to domestic assault and battery of Espinal, who was pregnant at the time. She told police he hit her in the face and stomach, sat on her and choked her.
He received three years of probation and, as part of his plea deal, agreed to attend a 52-week batterer intervention course. The domestic violence conviction was dismissed and expunged from his record last year after he completed his probation requirements.
Strangulation is a uniquely terrifying and dangerous form of violence common in abusive relationships. Women who have been choked by their partners are seven times as likely as other abused women to become a homicide victim, according to a 2008 study. Experts believe men who strangle their partners to be among the most dangerous abusers out there.
In 2016, during his probation, Hill signed a four-year $2,586,220 contract with the Chiefs. His base annual salary as of 2019 is $1,965,036.
The Chiefs are reportedly in negotiations with Hill for what NFL Network’s Ian Rapoport said could be a “record-setting” new contract. |
Q:
Anonymous HTTP Web Request
I created http request application to test my web site qulatiy (see below).
Dim Request As HttpWebRequest = WebRequest.Create(webAddress)
Dim Response As HttpWebResponse = Request.GetResponse()
Request.Method = "Get"
Dim Reader As New StreamReader(Response.GetResponseStream)
Dim Html As String = Reader.ReadToEnd()
In this case, I would like to create anonymous request without catching the response. How can I do that?
A:
To do so, u have to get a little low level , working with sockets
TcpCient in this case
Sample code
Imports System.Net.Sockets
Module Module1
Sub Main()
Dim tcpcli = New TcpClient()
tcpcli.Connect("google.co.in", 80)
Dim stream As NetworkStream = tcpcli.GetStream()
Dim reqdata As String = String.Format("GET / HTTP/1.1{0}Host: www.google.co.in{0}Connection: Close{0}{0}", vbCrLf)
Dim reqbytes() As Byte = Text.Encoding.ASCII.GetBytes(reqdata)
stream.Write(reqbytes, 0, reqbytes.Length)
stream.Close()
stream.Dispose()
tcpcli.Close()
End Sub
End Module
Network capture via wireshark (no response received)
|
"Gentlemen, torture as a political instrument is no longer the crude and brutal extraction of information from one's enemies." "It has become a subtle and sophisticated specialty to be carried out with medical and scientific precision." "Physical and psychological pain is applied in unbearable yet controlled doses, to destroy the subject's will and spirit as the body clings to life." "Now, the process can take weeks, even months during which the subject is kept trapped in a delicate, shall we say, nightmare existence of terror." "Now, the hood, which serves to separate the interrogator and subject psychologically, is not always necessary." "There are times when one does without it." "Hidalgo." "George Hidalgo!" "You've seen how a woman must be made to remove her own clothing depriving her of her dignity." "With a man, it is the opposite." "Strip him!" "Sir." "Excuse me, gentlemen." "Doctor, there's some kind of trouble outside of the city." "I must get you to the hotel." "This won't take long." "Mr. Hidalgo, or I should say George, since I feel we almost know each other I've had an opportunity to read some of your articles about me." "Astute for the most part, though you do have certain facts wrong." "You credit me with instructing the leaders of over 35 countries." "Flattering, I must say, but the actual number is 20." "Notice, gentlemen, how the subject clings to compensatory morale and habitual defences." "Electrodes." "He was a nuisance, but I'm glad he's dead !" "I only wished that he suffer little longer" "Good morning, Quasimodo." " You will wait here, please." " Thank you." " Good day to you, man." " Good morning, Santiago." "I brings you a visitor." "Gentleman's coming from Mexico City on the airplane." "I bring him up here?" "I'll go down there." " Holland?" " Yes." "The name's Hector Lomelin." "George Hidalgo may have mentioned me." "Yes." "How are you?" "How's George?" "He's dead." " How are George's daughter and widow?" " You knew them?" " No, but he talked about them a lot." " They are doing as well as can be expected." "I just don't understand." "George was a journalist." "He had no business getting mixed up with someone like the Doctor." "He always counted on you on getting the job done." "He felt he had no other choice." "Now I am here for myself and for others hoping to convince you to do it." "Hector, you don't seem like the kind of man that would commission somebody's death." "I'm not but the Doctor stands outside the moral laws of civilized people." "George died trying to stop that man." "How much would it cost?" "Hector, like I told George, I'm retired." "Look." "You can't withdraw from the world, Holland." "You know, in my clinic, I have patients from all over the world." "They have recorded their experiences with the Doctor on tapes." "I brought some with me." "Will you look at them at least?" "Sure." "I was arrested with my sister and her husband." "They said we had been giving guns to the rebels, but it was a lie." "We had done nothing." "My sister was pregnant." "They beat her many times on the belly." "One day, they took her away." "I never saw her again." "But I was told her body was found in the street." "When she was cut open, her husband's head was found inside her." "My wife and children were taken from me." "The Doctor forced my wife to eat her own excrement." "My children's bones were broken." "They said it would continue until I confessed crimes against the government." "But I invented things to save my family, and they said I was lying." "They made me watch when my friend was strip naked and made him stand against a wooden table" "Two men held him when the doctor drove nails through his testicles" "He fainted many time from the pain and each time they trew water again to revive them" "My husband was made to watch when I was raped and then the doctor killed him in front of me very slowly by cutting him open and pulling out his intestines" "The doctor force me to eat ground glass that hurt my inside so bad that I cannot have solid food even now" "My skin was burn with acid and needle was puch under my fingernails" "At the time of the coup, I was arrested and taken to the national stadium." "I can never forget the man in the hood." "The man they called the Doctor." "It was he who selected those to be tortured, those to be shot." "All day and all night, you could hear the gunfire and the screams." "They injected me with a drug every day." "It gave me headaches so bad, I felt my skull was being split open and I had terrible cramps all over my body." "The Doctor." "The Doctor." "The Doctor." "Everyone of them." "Clement Molloch, the man they call the Doctor." "Will you do it?" "... until I passed out from the pain." "And then they broke..." "Like I said, I'm retired." "Clement, a pleasure." "And my dear seniora Molloch." " Please, be seated." " Why are we here, Aristos?" "Relax, Clement." "May I offer you a drink?" " Just mineral water." " There is a problem, Clement." "The Council for Central American States has just concluded its meetings in Costa Rica." "Hypocrites." "Every government represented condemns my brother publicly and then welcomes him privately." "They have called for another meeting and study of human rights violations." "Human rights violations." "There is no such thing." "There is only the security of the state and those who'd undermine that security." "We must play the game." "What are you suggesting?" "A move." "My brother had a great deal to do with making this country secure, Victor." "If his work should have earned us a welcome anywhere, it's here." "I only reflect my president, seniora." "How long are you giving us?" "As quickly as possible." "We'll see." " Changed your mind?" " Yeah, let's do it." "We haven't discussed your fee." "Don't worry about it." "I don't want the money." "I'm grateful." "There's a complication, however." "The Doctor is leaving Guatemala in a couple of weeks." "Nobody knows where he is going." "If we let him slip through our hands this time we may never have another chance at him." " Where do you get your information?" " A man named Max Ortiz." "Very well placed with the highest echelons, and fiercely opposed to the current regime." " Sounds like someone I could trust." " He's a lifelong friend." " Maybe you can put me in touch with him?" " Of course." "And one more thing, a little more difficult." "I'd like to get down appearing as a family man." "I want to take a woman and a child with me." " That could be dangerous, no?" " Yeah, but it's only for a few days." "Most of the people in this ward have one thing in common." " The Doctor." " That's it." "These are only a small portion." "They managed to escape." " Holland, this is my wife, Isabel." " How do you do?" "Seniora Rhiana Hidalgo." "My wife is a surgical nurse." "She is training Rhiana." " I'm sorry about George." " I'm sure you are." "Why don't we all get together for coffee later on?" "Fortune smiles in a strange way." " I don't think so." " Why not?" " Because she is George's widow?" " Because she's too emotionally involved." "It seems to me Rhiana is right." "And she has a daughter." "She is exactly what you are looking for." "But she's very careless." "In the scrub room, she told your wife I looked like a killer." "She could've been overheard." " You read lips?" " Yes." "I'm sorry." "I now realize I was mistaken." "Decided I don't look like a killer?" "I've decided I should keep my opinions to myself." " When can you be ready to leave?" " I can leave whenever you say." " Which bedroom do you want?" " Neither, I'll sleep out here." " But there's no bed." " I'll sleep on the floor." "I like it here, Mummy." "Max Ortiz?" " It's a pleasure to meet you." " The pleasure's all mine." "The Doctor has three men in particular who never leave his side." "Every one a totally trained assassin." "Randolph Wheatley, a former intelligence officer." "He's the Doctor's communications expert." "He likes to spend his off-hours in the filthiest dives in the barrio." "Karl Hausmann." "Green Beret, originally." "Then he was with the CIA before the Doctor hired him away." "This one is a mystery." "He's called Cillero." "He's probably Basque." "He's Molloch's chauffeur." "And then, there's Molloch himself." "The Doctor." "I don't suppose he needs any introduction." "It's a cosy little family." "Most of my collection is at my place in the country." "What I need is a shotgun with a sawed-off barrel and the shells to go with it." "And a large calibre handgun." "Tell me more about Molloch." "Does he follow any kind of routine?" "He's rarely seen in public." "The closest thing to a routine would be going to the cockfights." "That box is his." "Tell me something about the sister." "Does she have any routines or habits that are different from her brother?" "She visits town to shop." "She keeps a small apartment in one of the new high-rises." "Her name is Claire." "She and Molloch are inseparable." "I think I'm going to be sick." "I didn't mean for that to happen." "I'm sorry." "Hey, mister, do you want some dope?" "I said, dope." "Do you want any?" "Do you have elephant?" "Do you have Mingtoydop?" "I guess you don't." "It's extraordinary how easily he's gotten little Sarah to like him." " The innocence of children is blessed." " You don't like him?" "Before coming here today, we spent hours going from shop to shop looking for cassettes of Latin American favourites." "That's what tourists do." "Don't let him fool you, Max." "He's cold, bloodless." "He doesn't react to anyone or anything." "I forgot." "He reads lips." "Is that what you wanted?" " It'll do fine." " There it is." "Up ahead, on the right." "I don't dare to go much closer." "The place is completely covered." "Closed-circuit television, motion detectors, alarms even got some kind of infrared beam." " See that man over there, by that tree?" " Yes." "He's just inside the range of the cameras where he is now." " How will you get in there?" " I don't intend to go in." "Then how will you do it?" "A high-powered rifle, perhaps?" " Or is the obvious considered passé?" " Rhiana, please." "I honestly think I have the right to know." "I'm involved in this, too." "I'm just gonna have a look around." "I am sorry about Rhiana." "She's afraid he'll get away, or something will go wrong." "It's all right." "She's just afraid." "Take them both back to the hotel." "Sure." "I think you ought to consider going home today." "Why?" "Remember that cripple at the cockfight?" "The one with the crutch?" "He turned up at the Doctor's no crutch, and he walked like a champ." "There hasn't been anything to make them suspect, has there?" "From what I picked up, observing the conversation I think they're satisfied we're tourists." "Then why do you want us to leave?" " I don't need you anymore." " Mummy?" "Holland, if we stay, is Sarah in any danger?" "Not yet." "But you both could be." "Where's Randolph?" "He's been working on a computer programme all morning." " Damn these people." " Randolph?" "No, the embassy." "My reward in heaven will be getting my hands on generations of diplomats and petty bureaucrats." " Cillero." " Is Randolph there?" " Yes, sir." " There is a problem with Briggs." "He's not keeping his end of the bargain." "I guess I'll have to speak to him in person." " Holland, am I going to see you again?" " Yep, you'll see me again." "Remember, I want to see your fish." " What's his name?" " Quasimodo." " Be a good girl." " Yes, I will." " 'Bye, Holland. 'Bye, Mummy." " 'Bye, Sarah." " I love you." " I love you, too." "The embassy." "What would he be doing there?" "Jesus Christ, you scared the shit out of me." "Protector of the free world hard at work?" " Give me a break." " You give us a break." "What's this crap you've been handing the Doctor?" "Washington's putting on pressure." "I can't tell the locals to let him stay without sticking my neck way out." " Then you stick your neck out." " I suggest you don't rock the boat." "There are plenty of countries that would be happy to have him back." "You suggest." "The Doctor loves it here." "The air agrees with him." "Damn it, Randolph, if I used any influence with these people Washington would know in five minutes." "My ass would be posted to Afghanistan." "You want to play hardball, Briggs, we can play hardball, too." "The Doctor has done all the dirty work you've needed." "It's time to call in the markers." "Remember, all those congressional committees would be very interested in how you've used the Doctor's services." "Besides, a few well-placed leaks..." "Nothing to it." "I'll see what I can do." "That's exactly what you're going to do." "And see to it that it's done." " Sarah has taken quite a liking to you." " I think she misses her father." "It's more than that." "She actually worries about you." "Take the car and go back to the hotel." " Where are you going?" " I'm going inside." "Holland, wait." "I'm coming with you." "Okay, it's your decision." "Don't you do anything to screw up." "My father warned me about places like this." "It does have a certain intimate charm." "I'll get a couple of beers." "Couple of bottles of beer." " You American?" " You bet." " You crazy coming in here?" " Just thirsty." "Jeez, no sooner do I turn my back, and you pick somebody up." "Who is this American shit?" " My husband." " Only whores marry Americans." "Buddy, we didn't come in here looking for trouble." "Who are you looking for?" "Your mother?" "You're beautiful" "I'll take you into that kitchen and show you how hot a human is" "When I finish are you here to my friends" "I don't think you want do that!" "What you feeling now is your own mortality This bastard nows about it!" "You all right?" "You got strong hands, sport." "I just had glass chandeliers." "I didn't know what the hell I was to do." "Boy, real big, scary guy, he is." " You're an American." " That's right." "It's nice to hear somebody else speak English now and then, isn't it?" " Would you like to join us?" " Don't mind if I do." "There's a table right over there." "My name's Bart Smith." "My wife, Nancy." "Hello, Nancy." "I'm Randolph." "What are you all doing in here anyway?" "What are you, tourists?" "Sort of." "This is not your usual tourist attraction." "We're not your usual tourists." "You know what I mean?" "Life just gets dull and nothing like a little variety to spice things up." "That's right." "Nancy and me, we come from a small town up in Nebraska." "We always have to go someplace else for excitement and variety, you know?" "Bart, just what kind of excitement are you looking for?" "You know, me and Nancy, we've been into a lot of things." "We've learned tricks you wouldn't believe." "We've been into things like wife-swapping..." "You married?" "No, I'm divorced." "But remember, three's company and four is definitely a crowd." "I am down for anything or anybody." " Three is all right with me." " It's definitely all right with me." " You got a place?" " You bet." "Well, here we are." "Dear, why don't you go in and get something more comfortable on?" "Let's you and me make ourselves at home." "Sounds like a great idea." "Not bad." "First-class pad." "How about a drink to get this party started?" "Holland!" "It's ok, just don't coming here" "Oh, my God!" "Keep yourself together." " You didn't say you were going to kill him." " And if I had?" "You're depraved." "You've no principles whatsoever." "I didn't know our main concern here was principles." " You're a vicious..." " All right, now enough." "Stop it!" "I think it's time for you to get Sarah and go home." "Tell Max to get you on the earliest plane." "When you call me at the hotel, tell me the flight number and the time." "Nothing else." "Jesus Christ." "Doctor!" "Randolph's all over the road out there." "Did somebody declare war or what?" "Yes." "I'm at Max's." "I'm not leaving." "That wasn't our understanding." "Please, don't be angry, Holland." "I can explain." "I'm sorry." "We got as far as the boarding gate, but I just couldn't go any further." "I need to know he's finished." "Emotional vendettas are just another form of suicide." "Did Hector ever tell you about George?" "What happened to him?" "His body was returned three months ago." "His kidneys and spleen were crushed." "His teeth were completely broken." "That's what electric shock does to you." "George never gave up hope that the Doctor would be stopped." "Not even after he came to you for help." " You turned him down." " Well, it's finally out." "If you're blaming me, you're wrong." "Max I'd like to have the shotgun and shells sometime today." " It's done." " And his sister's address in town." " What are you going to do?" " I'm going to rattle his cage." "And when he sticks his neck out, I'll nail him." "Yeah, he was here." "He left with a couple of tourists." " Any idea where they were going?" " No." "None." "Tell him, if he keeps doing what he was doing, someday he'll get into trouble." "He already did." " Will you be long?" " I hope not." "As soon as I'm dropped at the apartment, I'll have the car come straight back for you." "I don't know who killed Randolph and Karl." "Neither does Colonel Aristos." "They want me out of the country, Briggs, and so do you." "Don't deny it." "They think that by killing my people they can scare me away." "I don't know a goddamn thing about this." "Do your duty as one of America's snarling watchdogs and find out." " But the local police..." " I don't trust them." "Nor do I trust Colonel Aristos, and I only just barely trust you." "Unfortunately, I have no one else to turn to." " I'll get on it." " Yes, you do that." " Do you want to shower first?" " No, thank you." " Cillero?" " Get dressed." "Max, didn't you say you had a country place?" "Yes, at Lake Amatitlan." "South of the city." " Do you have a map?" " Sure, come with me." "Here, that's the village of Magdalena." "Right here is my place." "What's this over here?" "That's an abandoned mine." "That's perfect." "There's no way that Sarah can stay here." "Send her home as soon as possible." "You ought to go into hiding yourself." "By this time, they'll have connected you with me." "All right." "Max Ortiz." "He's a local." " It's your department, Victor." " I'll have him picked up." "Someone comes out of nowhere, turns Randolph into a meat pie then does Cillero." "Your sister vanishes without a trace." "Jesus, what the hell does it mean?" "Damn it, Briggs!" "Stop playing guessing games." "Karl, Cillero and Randolph deserved what they got for being so stupid." "All I care about is my sister." " Now get outside help." " My people can handle it." "Get outside help, Briggs!" "Holland?" "I've been wondering about something." "How does someone like my husband come to know someone like you?" "In your profession?" "Your husband had a big curiosity." "We knew each other for years." "There you go again, not telling me anything." "I'd like to know." "So would the Doctor, if he got his hands on you." "How much are you being paid for this?" "I'm not getting paid anything." "I used to chase money, but where I live now I have no use for it." "Where do you live?" "I live in a very peaceful place." "I can watch a sunset every evening." "Read by natural light until 10:00." "In the morning, I can shower with rainwater." "It's magic." "Seems so strange to me." "What does?" "Someone like you, who kills people, talking about peace and magic." "I guess they're away safely." "He has a summer place out at Lake Amatitlan." "They've got my sister there." " Get word to Paul Briggs, right away." " Yes, sir." "Hello?" "I have somebody here that belongs to you, Molloch." "How is she?" " Have you hurt her?" " Ask her." "Hello?" "Hello?" "Clement, it's me." " Are you all right, Claire?" " Clement, I'm sorry." "It was my fault." "I'm so sorry." "What do they want?" "That will be enough." "After all, I'm paying for this call." "If it's me you're after, you should have the courage to come and get me." "Don't flatter yourself, Molloch." "I'm after money." "Cold, hard cash." "How much?" "Let's say about half a million dollars." "Large and small bills." "What makes you think I have that kind of money?" "If you don't have it, you better find a way of getting it or you won't see your sister alive again." "Say goodbye to your brother." "Clement!" "Please, help me." "Help me, please." "Please, help me." "What do you say, Molloch?" "I'll need time." "A few more hours." "He knows we're here." "How could you tell?" "He didn't ask." "We've got visitors." "You drive." "I'll need my hands free." "Go towards them." "Towards them." "Phone Briggs!" "Stop!" "Oh, Jesus." "Tell that guy we don't mean any trouble, and we'll pay for the damages." "Tell him, we'd like to buy his truck." "How much?" "Tell him that if anyone comes around asking questions he doesn't know anything." "Let's find a place to bury the woman." "Where are we going?" "Right here." "It's a village called Magdalena, if this thing will make it." "It was the Doctor who wanted you called in on his canal." " What have you done?" " I sent men to the place by the lake." "Last I heard, they were chasing the suspects to Hell." " How's the Doctor?" " Rattled." "He's taking it hard." "We're up against a pretty tough cookie." "But the way I got it I figure there's some terrorist outfit using the kidnapping to raise cash." "Either that or some turkey with more balls than brains is trying to get at the Doctor." "Shit." "I better get to a phone." "Alright." "Just keep the indien inform wondering the way" "Blow his feet off if you have to!" "We're on the way" "Turckies my ass!" "My man that just called in, found his partners burnt to a crisp in a farmer field." " Where?" " Four/Five hours down the road." "I don't think this damn thing is gonna make it." "There is nothing in there but pigs!" "Big god damn suckers that fight!" "I told you to keep that famer here!" "What could I do?" "Shot their feet off like I told you!" "Asshole!" "This guy's a pro." "What?" "Pro?" "He's turned this place into a wrecking yard." " And he still got away with the sister." " Oh, Jesus." " How far is the next village?" " That's Magdalena." "One of those sleepy little maniana places, about 100 kilometres." "Let's go." "Come on." "We're leaving." "Here's something to eat." "One of these could heat Cincinnati for a month." "Doesn't it ever get to you, Holland?" "Even a little?" "Don't you sometimes want to just scrub your hands raw?" "Just to wash the death off them." "I don't think about it the way you think about it." "I don't know if I can go on much longer." "You said you wanted to see for yourself." "You wanted to be there when he was finished." "I think maybe I've had enough." "All this killing." "The blood." "Rhiana, you had a choice before." "You don't have a choice now." "Eat some of this." "Did anyone ever tell you, you talk in your sleep?" "What did I say?" "Ask him what happened." "He said they were very young." "Soldiers took them away." "He says the bodies were badly mutilated." "It happens often." "Tell him we're on his side." "Ask him if there's a telephone in town we can use." "He says he has a café." "We can use his telephone." "Come on." " Want a beer?" " Beer would be nice." "Well, it doesn't look closed to me." "Bring us a couple of beers." "It's hot!" "What do you do, recycle the stuff from the john?" "You're in my friend's house, show some respect, or get the hell out!" "Let's stop blowing the smoke." "You've got what we want." "We'll pay." "I only deal with Molloch." "Where is he?" "Fuck him." "What do you care?" "Just so long as you get the money, right?" "That's being smart." "Now let's talk about a more reasonable price." "You know, I was thinking, I'd like to have a Mercedes and a little ranch in Malibu." "And maybe a hairdresser place up there in Aspen, you know what I mean?" "My client's willing to go $200,000, tops." "What?" "You expect me to rent?" "Look, we're talking serious business." "Shut up, asshole!" "It's not money you want, is it, Holland?" "You're too smart for the job, Cannell." "He was wearing a bulletproof vest!" "Do you know a couple of slugs named Briggs and Cannell?" " You've killed them." " It was stupid of you." "Don't do it again." "Where's my sister?" "She's not suffering." "Now, let's get on with the transaction and stop all this screwing around." "I'm ready." "First, I going to warn you." "This time you come on your own." "Southwest of you is a village called Magdalena." "Before the village, there's a mining road off to the right." "Take it." "It'll bring you up in front of an opal mine." "I'll meet you there." "Max told me that these mines were abandoned." "They have permission to look for opals." "Sometimes, they get lucky." "Maybe they could come back." "Ask them to leave and come back tomorrow." "They won't." "This is the only way they make money to feed their families." "There's a car coming." "There's a very dangerous man coming in that car." "There might be gunfire." "Are you really going to shoot him?" "That's why we're here, isn't it?" "Claire." "Over here, Molloch." "Sarah!" "Oh, Mummy." "He's got Sarah." "It's gonna be all right." "As long as he believes we have his sister, she'll be all right." "I can't see you, but I trust you can see me." "You now know I have the child." "I regret what may seem excessively cruel." "Please understand, you forced me to do it." "I will do anything necessary to get my sister back." "Do you hear me?" "It's me you want, isn't it?" "Not the money." "Is my life worth the child's life?" "A fair exchange." "The child for my sister." "What are you going to do?" "Well?" "Where is she?" "Where is she?" "She's safe." "She isn't here, is she?" "Is she?" "She's here!" "Clement!" "Claire!" "Where are you?" "Where have they got you?" "Help me, please." "Please." "Claire?" "Close the window." "Bring me my sister, or I'll kill the child!" "Paco!" "Paco, help me!" "You bring my sister this instant or he'll shoot her." "Bring me my sister this instant." |
Jennifer Lackey Ph.D.
Natural Born Liars
Why we spread lies, and how to stop.
Dictionary.com recently named “misinformation” the “Word of the Year.” The rampant spread of fake news on social media and the role it played in political elections across the globe were cited as key reasons this word rose to the top.
But why are lies so successful online?
Herman Melville famously wrote in an 1850 essay that “It is better to fail in originality, than to succeed in imitation.”
Privileging what is original lies at the core of our knowledge-producing practices. A University of Oxford study (Clarke and Lunt 2014) shows, for instance, that originality is required for passing Ph.D. exams across disciplines and fields.
Grants, publications, jobs, and promotions are all reserved for research that breaks new ground rather than rehearses familiar territory. No one wants to fund or undertake projects that tell us what we already know.
This structure of incentives in knowledge production, however, has an unintended consequence: it promotes novelty over truth.
The “replication crisis” (Bird 2018) in the social sciences, for instance, is often attributed in part to a system that values discovery at the expense of confirmation. In a widely cited study (Aarts et al. 2015), only one-third of the original findings in three highly ranked psychology journals were successfully replicated. In an effort to say something new, then, researchers seem to be sacrificing the truth.
A similar incentivization structure exists in online consumption of information. Human brains gravitate toward the novel (Cell Press 2006), so posts and tweets on social media with original content are more likely to be noticed and read. The mundane and familiar are ignored while information that is new or surprising is met with approval through likes, shares, and retweets.
Just as in the social sciences, however, privileging what is novel over what is true is leading to an epistemic crisis.
A recent study (Jasny et al. 2018) examined the diffusion of true and false news online by looking at rumor cascades on Twitter, which are unbroken retweet chains with a single common origin. What was found is that falsehood spreads significantly farther, faster, and more broadly than the truth in all categories of information.
For instance, false news cascades reached between 1,000 and 100,000 people, while the true ones rarely extended beyond 1,000 people. It also took the truth about six times longer to reach 1,500 people than falsehoods did.
But why do social media users gravitate toward the dissemination of lies?
Importantly, those who spread false news online have significantly fewer followers, follow significantly fewer people, and are significantly less active on Twitter.
False rumor cascades are not, therefore, more powerful than the true ones because of who is sharing them. Instead, what is being shared seems to be the driving force.
Across all relevant dimensions, false rumors are significantly more novel than true ones. False news also inspires greater responses from users of surprise or disgust, while the truth elicits reactions of sadness, anticipation, joy, and trust.
For instance, a victim of the Thousand Oaks, California shooting was the subject of an online conspiracy theory that claimed she is a crisis actor who also appeared in Orlando and Las Vegas. Despite the fact that the three images purporting to all be of the same person did not resemble one another, thousands of social media users shared and liked versions of this falsehood on Twitter, Facebook, Instagram, and YouTube.
These differences between true and false rumor cascades are especially pronounced when it comes to politics. False political news, for instance, reached more than 20,000 people nearly three times faster than all other types of news reached 10,000 people.
This raises an urgent problem. At a time when lies, particularly in politics, are propagated in unique ways—and to unprecedented degrees—the human fascination with the novel is leading to an epistemic crisis.
President Donald Trump, for instance, uses Twitter in ways unseen by previous political leaders, and he reportedly averages about eight lies a day in his public life since taking office. A recent CNN story highlights the 36 most outrageous claims Trump made in a single interview.
Given the platform that the President of the United States has, combined with the often shocking nature of his tweets, we have the ingredients for a perfect storm against truth: Trump tweets a lie. Because of its original content, social media users are drawn to it. They pick it up and retweet it. News outlets that correct the record may be ignored or drowned out because of the ordinary and familiar nature of their statements. In the meantime, the next interesting falsehood has been tweeted, captivating the attention of the bulk of social media users.
The cycle repeats itself.
The irony of this is that the origin of the crisis facing online users is the very system put in place to produce research of the highest caliber. Incentivizing the discovery of what is new aims to promote the uncovering of new truths. But novelty and falsehood often go hand-in-hand.
What needs answering is how this cycle of epistemic destruction on social media can be interrupted.
Although the replication crisis has been the occasion for much handwringing, social scientists are actively working through it with reforms on the publishing process. The sort of critical work needed to confirm results and uncover errors can be incentivized—with recognition, with publications, with tenure—in the same way that novel research is.
Similar efforts can be made with social media. Users don’t need to plug their ears like Odysseus to avoid the siren call of the novel.
Instead, posts that confirm and support—rather than surprise—can be incentivized through shares and retweets. Suspending judgment can be rewarded with likes and comments, and fact-checking pieces can be targeted for amplification, both individually and collectively.
Social media platform companies can also work to alleviate the problem.
Earlier this year, for instance, Google launched Google News Initiative to thwart fake news. One strategy of the initiative is to encourage accurate journalism through highlighting true stories, especially during breaking news events. This is a concrete incentivizing tool, one that other platforms can use to follow suit.
Crucially, control (Lackey 2008) over channels of communication belongs not only to those who speak, but also to those who listen. By harnessing our own power as participants in social media, we can enforce standards that are sensitive to what is true rather than to what is new. |
A Kenosha County father wants answers about why his 4-year-old daughter was left on a school bus for a second time by the same driver.
"And to sweep it under the rug the first time, and I have to find out from my daughter is unacceptable," the girl's father, Robert English, said.
Advertisement
English said his 4-year-old daughter, Bailey, was left behind on a Trevor-Wilmot school bus, not once, but twice this school year, by the same driver, who he said wasn't disciplined the first time in November:
"She told me, 'Daddy I fell asleep on the bus.' And I go, 'You fell asleep on the bus?' And she goes, 'Yeah, I woke up in some person's driveway and the house,'" English said.
The latest incident happened Thursday. The driver works for Dousman Transport Company, which serves Trevor-Wilmot School District and other districts from Arrowhead to Mukwonago.
"This particular individual is not going to ever drive any of our school district's bus routes again," Trevor-Wilmot School Superintendent George Steffen said. "In neither case was the child alone on the bus, but that's still, the bus should not have left here with the child asleep on it."
The superintendent said the driver is supposed to clear the bus before leaving school property.
Engish said at his meeting with school and bus company leaders he was told the driver still hadn't been fired.
"And now you're going to tell me, she's no longer going to drive for our school, but she's going to drive for another district, and this could happen to somebody else's kid," English said.
On the bus company's website, their slogan says "We transport the world's most precious cargo." It also says, "The safety of your children is our primary goal."
The school superintendent was told the bus company is still investigating, including reviewing bus camera recordings. |
"""
This code is automatically generated. Never edit it manually.
For details of generating the code see `rubi_parsing_guide.md` in `parsetools`.
"""
from sympy.external import import_module
matchpy = import_module("matchpy")
if matchpy:
from matchpy import Pattern, ReplacementRule, CustomConstraint, is_match
from sympy.integrals.rubi.utility_function import (
Int, Sum, Set, With, Module, Scan, MapAnd, FalseQ,
ZeroQ, NegativeQ, NonzeroQ, FreeQ, NFreeQ, List, Log, PositiveQ,
PositiveIntegerQ, NegativeIntegerQ, IntegerQ, IntegersQ,
ComplexNumberQ, PureComplexNumberQ, RealNumericQ, PositiveOrZeroQ,
NegativeOrZeroQ, FractionOrNegativeQ, NegQ, Equal, Unequal, IntPart,
FracPart, RationalQ, ProductQ, SumQ, NonsumQ, Subst, First, Rest,
SqrtNumberQ, SqrtNumberSumQ, LinearQ, Sqrt, ArcCosh, Coefficient,
Denominator, Hypergeometric2F1, Not, Simplify, FractionalPart,
IntegerPart, AppellF1, EllipticPi, EllipticE, EllipticF, ArcTan,
ArcCot, ArcCoth, ArcTanh, ArcSin, ArcSinh, ArcCos, ArcCsc, ArcSec,
ArcCsch, ArcSech, Sinh, Tanh, Cosh, Sech, Csch, Coth, LessEqual, Less,
Greater, GreaterEqual, FractionQ, IntLinearcQ, Expand, IndependentQ,
PowerQ, IntegerPowerQ, PositiveIntegerPowerQ, FractionalPowerQ, AtomQ,
ExpQ, LogQ, Head, MemberQ, TrigQ, SinQ, CosQ, TanQ, CotQ, SecQ, CscQ,
Sin, Cos, Tan, Cot, Sec, Csc, HyperbolicQ, SinhQ, CoshQ, TanhQ, CothQ,
SechQ, CschQ, InverseTrigQ, SinCosQ, SinhCoshQ, LeafCount, Numerator,
NumberQ, NumericQ, Length, ListQ, Im, Re, InverseHyperbolicQ,
InverseFunctionQ, TrigHyperbolicFreeQ, InverseFunctionFreeQ, RealQ,
EqQ, FractionalPowerFreeQ, ComplexFreeQ, PolynomialQ, FactorSquareFree,
PowerOfLinearQ, Exponent, QuadraticQ, LinearPairQ, BinomialParts,
TrinomialParts, PolyQ, EvenQ, OddQ, PerfectSquareQ, NiceSqrtAuxQ,
NiceSqrtQ, Together, PosAux, PosQ, CoefficientList, ReplaceAll,
ExpandLinearProduct, GCD, ContentFactor, NumericFactor,
NonnumericFactors, MakeAssocList, GensymSubst, KernelSubst,
ExpandExpression, Apart, SmartApart, MatchQ,
PolynomialQuotientRemainder, FreeFactors, NonfreeFactors,
RemoveContentAux, RemoveContent, FreeTerms, NonfreeTerms,
ExpandAlgebraicFunction, CollectReciprocals, ExpandCleanup,
AlgebraicFunctionQ, Coeff, LeadTerm, RemainingTerms, LeadFactor,
RemainingFactors, LeadBase, LeadDegree, Numer, Denom, hypergeom, Expon,
MergeMonomials, PolynomialDivide, BinomialQ, TrinomialQ,
GeneralizedBinomialQ, GeneralizedTrinomialQ, FactorSquareFreeList,
PerfectPowerTest, SquareFreeFactorTest, RationalFunctionQ,
RationalFunctionFactors, NonrationalFunctionFactors, Reverse,
RationalFunctionExponents, RationalFunctionExpand, ExpandIntegrand,
SimplerQ, SimplerSqrtQ, SumSimplerQ, BinomialDegree, TrinomialDegree,
CancelCommonFactors, SimplerIntegrandQ, GeneralizedBinomialDegree,
GeneralizedBinomialParts, GeneralizedTrinomialDegree,
GeneralizedTrinomialParts, MonomialQ, MonomialSumQ,
MinimumMonomialExponent, MonomialExponent, LinearMatchQ,
PowerOfLinearMatchQ, QuadraticMatchQ, CubicMatchQ, BinomialMatchQ,
TrinomialMatchQ, GeneralizedBinomialMatchQ, GeneralizedTrinomialMatchQ,
QuotientOfLinearsMatchQ, PolynomialTermQ, PolynomialTerms,
NonpolynomialTerms, PseudoBinomialParts, NormalizePseudoBinomial,
PseudoBinomialPairQ, PseudoBinomialQ, PolynomialGCD, PolyGCD,
AlgebraicFunctionFactors, NonalgebraicFunctionFactors,
QuotientOfLinearsP, QuotientOfLinearsParts, QuotientOfLinearsQ,
Flatten, Sort, AbsurdNumberQ, AbsurdNumberFactors,
NonabsurdNumberFactors, SumSimplerAuxQ, Prepend, Drop,
CombineExponents, FactorInteger, FactorAbsurdNumber,
SubstForInverseFunction, SubstForFractionalPower,
SubstForFractionalPowerOfQuotientOfLinears,
FractionalPowerOfQuotientOfLinears, SubstForFractionalPowerQ,
SubstForFractionalPowerAuxQ, FractionalPowerOfSquareQ,
FractionalPowerSubexpressionQ, Apply, FactorNumericGcd,
MergeableFactorQ, MergeFactor, MergeFactors, TrigSimplifyQ,
TrigSimplify, TrigSimplifyRecur, Order, FactorOrder, Smallest,
OrderedQ, MinimumDegree, PositiveFactors, Sign, NonpositiveFactors,
PolynomialInAuxQ, PolynomialInQ, ExponentInAux, ExponentIn,
PolynomialInSubstAux, PolynomialInSubst, Distrib, DistributeDegree,
FunctionOfPower, DivideDegreesOfFactors, MonomialFactor, FullSimplify,
FunctionOfLinearSubst, FunctionOfLinear, NormalizeIntegrand,
NormalizeIntegrandAux, NormalizeIntegrandFactor,
NormalizeIntegrandFactorBase, NormalizeTogether,
NormalizeLeadTermSigns, AbsorbMinusSign, NormalizeSumFactors,
SignOfFactor, NormalizePowerOfLinear, SimplifyIntegrand, SimplifyTerm,
TogetherSimplify, SmartSimplify, SubstForExpn, ExpandToSum, UnifySum,
UnifyTerms, UnifyTerm, CalculusQ, FunctionOfInverseLinear,
PureFunctionOfSinhQ, PureFunctionOfTanhQ, PureFunctionOfCoshQ,
IntegerQuotientQ, OddQuotientQ, EvenQuotientQ, FindTrigFactor,
FunctionOfSinhQ, FunctionOfCoshQ, OddHyperbolicPowerQ, FunctionOfTanhQ,
FunctionOfTanhWeight, FunctionOfHyperbolicQ, SmartNumerator,
SmartDenominator, SubstForAux, ActivateTrig, ExpandTrig, TrigExpand,
SubstForTrig, SubstForHyperbolic, InertTrigFreeQ, LCM,
SubstForFractionalPowerOfLinear, FractionalPowerOfLinear,
InverseFunctionOfLinear, InertTrigQ, InertReciprocalQ, DeactivateTrig,
FixInertTrigFunction, DeactivateTrigAux, PowerOfInertTrigSumQ,
PiecewiseLinearQ, KnownTrigIntegrandQ, KnownSineIntegrandQ,
KnownTangentIntegrandQ, KnownCotangentIntegrandQ,
KnownSecantIntegrandQ, TryPureTanSubst, TryTanhSubst, TryPureTanhSubst,
AbsurdNumberGCD, AbsurdNumberGCDList, ExpandTrigExpand,
ExpandTrigReduce, ExpandTrigReduceAux, NormalizeTrig, TrigToExp,
ExpandTrigToExp, TrigReduce, FunctionOfTrig, AlgebraicTrigFunctionQ,
FunctionOfHyperbolic, FunctionOfQ, FunctionOfExpnQ, PureFunctionOfSinQ,
PureFunctionOfCosQ, PureFunctionOfTanQ, PureFunctionOfCotQ,
FunctionOfCosQ, FunctionOfSinQ, OddTrigPowerQ, FunctionOfTanQ,
FunctionOfTanWeight, FunctionOfTrigQ, FunctionOfDensePolynomialsQ,
FunctionOfLog, PowerVariableExpn, PowerVariableDegree,
PowerVariableSubst, EulerIntegrandQ, FunctionOfSquareRootOfQuadratic,
SquareRootOfQuadraticSubst, Divides, EasyDQ, ProductOfLinearPowersQ,
Rt, NthRoot, AtomBaseQ, SumBaseQ, NegSumBaseQ, AllNegTermQ,
SomeNegTermQ, TrigSquareQ, RtAux, TrigSquare, IntSum, IntTerm, Map2,
ConstantFactor, SameQ, ReplacePart, CommonFactors,
MostMainFactorPosition, FunctionOfExponentialQ, FunctionOfExponential,
FunctionOfExponentialFunction, FunctionOfExponentialFunctionAux,
FunctionOfExponentialTest, FunctionOfExponentialTestAux, stdev,
rubi_test, If, IntQuadraticQ, IntBinomialQ, RectifyTangent,
RectifyCotangent, Inequality, Condition, Simp, SimpHelp, SplitProduct,
SplitSum, SubstFor, SubstForAux, FresnelS, FresnelC, Erfc, Erfi, Gamma,
FunctionOfTrigOfLinearQ, ElementaryFunctionQ, Complex, UnsameQ,
_SimpFixFactor, SimpFixFactor, _FixSimplify, FixSimplify,
_SimplifyAntiderivativeSum, SimplifyAntiderivativeSum,
_SimplifyAntiderivative, SimplifyAntiderivative, _TrigSimplifyAux,
TrigSimplifyAux, Cancel, Part, PolyLog, D, Dist, Sum_doit, PolynomialQuotient, Floor,
PolynomialRemainder, Factor, PolyLog, CosIntegral, SinIntegral, LogIntegral, SinhIntegral,
CoshIntegral, Rule, Erf, PolyGamma, ExpIntegralEi, ExpIntegralE, LogGamma , UtilityOperator, Factorial,
Zeta, ProductLog, DerivativeDivides, HypergeometricPFQ, IntHide, OneQ, Null, rubi_exp as exp, rubi_log as log, Discriminant,
Negative, Quotient
)
from sympy import (Integral, S, sqrt, And, Or, Integer, Float, Mod, I, Abs, simplify, Mul,
Add, Pow, sign, EulerGamma)
from sympy.integrals.rubi.symbol import WC
from sympy.core.symbol import symbols, Symbol
from sympy.functions import (sin, cos, tan, cot, csc, sec, sqrt, erf)
from sympy.functions.elementary.hyperbolic import (acosh, asinh, atanh, acoth, acsch, asech, cosh, sinh, tanh, coth, sech, csch)
from sympy.functions.elementary.trigonometric import (atan, acsc, asin, acot, acos, asec, atan2)
from sympy import pi as Pi
A_, B_, C_, F_, G_, H_, a_, b_, c_, d_, e_, f_, g_, h_, i_, j_, k_, l_, m_, n_, p_, q_, r_, t_, u_, v_, s_, w_, x_, y_, z_ = [WC(i) for i in 'ABCFGHabcdefghijklmnpqrtuvswxyz']
a1_, a2_, b1_, b2_, c1_, c2_, d1_, d2_, n1_, n2_, e1_, e2_, f1_, f2_, g1_, g2_, n1_, n2_, n3_, Pq_, Pm_, Px_, Qm_, Qr_, Qx_, jn_, mn_, non2_, RFx_, RGx_ = [WC(i) for i in ['a1', 'a2', 'b1', 'b2', 'c1', 'c2', 'd1', 'd2', 'n1', 'n2', 'e1', 'e2', 'f1', 'f2', 'g1', 'g2', 'n1', 'n2', 'n3', 'Pq', 'Pm', 'Px', 'Qm', 'Qr', 'Qx', 'jn', 'mn', 'non2', 'RFx', 'RGx']]
i, ii, Pqq, Q, R, r, C, k, u = symbols('i ii Pqq Q R r C k u')
_UseGamma = False
ShowSteps = False
StepCounter = None
def exponential():
from sympy.integrals.rubi.constraints import cons33, cons170, cons517, cons1100, cons1101, cons3, cons8, cons29, cons50, cons127, cons210, cons4, cons96, cons20, cons21, cons19, cons1102, cons130, cons2, cons246, cons139, cons554, cons1103, cons1104, cons5, cons382, cons56, cons1105, cons1106, cons1107, cons211, cons226, cons798, cons799, cons52, cons1108, cons806, cons1109, cons814, cons1110, cons1111, cons1112, cons1113, cons586, cons1114, cons1115, cons481, cons482, cons1116, cons198, cons25, cons1117, cons55, cons1118, cons1119, cons1120, cons1121, cons87, cons1122, cons358, cons533, cons1123, cons1124, cons537, cons95, cons1125, cons1126, cons178, cons369, cons168, cons746, cons70, cons842, cons1127, cons1128, cons1129, cons27, cons73, cons1130, cons1131, cons1132, cons820, cons1133, cons1134, cons1135, cons1136, cons821, cons1137, cons1138, cons1139, cons1140, cons150, cons812, cons813, cons1141, cons1142, cons54, cons802, cons1143, cons1144, cons1145, cons815, cons1146, cons228, cons64, cons1147, cons1148, cons1149, cons1150, cons1151, cons1152, cons1153, cons465, cons1154, cons45, cons450, cons1155, cons1156, cons1157, cons1019
pattern1904 = Pattern(Integral((F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1)))*WC('b', S(1)))**WC('n', S(1))*(x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1)), x_), cons1101, cons3, cons8, cons29, cons50, cons127, cons210, cons4, cons33, cons170, cons517, cons1100)
rule1904 = ReplacementRule(pattern1904, replacement1904)
pattern1905 = Pattern(Integral((F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1)))*WC('b', S(1)))**WC('n', S(1))*(x_*WC('d', S(1)) + WC('c', S(0)))**m_, x_), cons1101, cons3, cons8, cons29, cons50, cons127, cons210, cons4, cons33, cons96, cons517, cons1100)
rule1905 = ReplacementRule(pattern1905, replacement1905)
pattern1906 = Pattern(Integral(F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1)))/(x_*WC('d', S(1)) + WC('c', S(0))), x_), cons1101, cons8, cons29, cons50, cons127, cons210, cons1100)
rule1906 = ReplacementRule(pattern1906, replacement1906)
pattern1907 = Pattern(Integral(F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1)))*(x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1)), x_), cons1101, cons8, cons29, cons50, cons127, cons210, cons20)
rule1907 = ReplacementRule(pattern1907, replacement1907)
pattern1908 = Pattern(Integral(F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1)))/sqrt(x_*WC('d', S(1)) + WC('c', S(0))), x_), cons1101, cons8, cons29, cons50, cons127, cons210, cons1100)
rule1908 = ReplacementRule(pattern1908, replacement1908)
pattern1909 = Pattern(Integral(F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1)))*(x_*WC('d', S(1)) + WC('c', S(0)))**m_, x_), cons1101, cons8, cons29, cons50, cons127, cons210, cons19, cons21)
rule1909 = ReplacementRule(pattern1909, replacement1909)
pattern1910 = Pattern(Integral((F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1)))*WC('b', S(1)))**n_*(x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1)), x_), cons1101, cons3, cons8, cons29, cons50, cons127, cons210, cons19, cons4, cons1102)
rule1910 = ReplacementRule(pattern1910, replacement1910)
pattern1911 = Pattern(Integral((a_ + (F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1))))**WC('n', S(1))*WC('b', S(1)))**WC('p', S(1))*(x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons19, cons4, cons130)
rule1911 = ReplacementRule(pattern1911, replacement1911)
pattern1912 = Pattern(Integral((x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1))/(a_ + (F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1))))**WC('n', S(1))*WC('b', S(1))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons4, cons33, cons170)
rule1912 = ReplacementRule(pattern1912, replacement1912)
pattern1913 = Pattern(Integral((a_ + (F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1))))**WC('n', S(1))*WC('b', S(1)))**p_*(x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons4, cons246, cons170, cons139)
rule1913 = ReplacementRule(pattern1913, With1913)
pattern1914 = Pattern(Integral(u_**WC('m', S(1))*((F_**(v_*WC('g', S(1))))**WC('n', S(1))*WC('b', S(1)) + WC('a', S(0)))**WC('p', S(1)), x_), cons1101, cons2, cons3, cons210, cons4, cons5, cons554, cons1103, cons1104, cons20)
rule1914 = ReplacementRule(pattern1914, replacement1914)
pattern1915 = Pattern(Integral(u_**WC('m', S(1))*((F_**(v_*WC('g', S(1))))**WC('n', S(1))*WC('b', S(1)) + WC('a', S(0)))**WC('p', S(1)), x_), cons1101, cons2, cons3, cons210, cons19, cons4, cons5, cons554, cons1103, cons1104, cons21)
rule1915 = ReplacementRule(pattern1915, With1915)
pattern1916 = Pattern(Integral((a_ + (F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1))))**WC('n', S(1))*WC('b', S(1)))**WC('p', S(1))*(x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1)), x_), cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons19, cons4, cons5, cons382)
rule1916 = ReplacementRule(pattern1916, replacement1916)
pattern1917 = Pattern(Integral((x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1))*(F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1))))**WC('n', S(1))/(a_ + (F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1))))**WC('n', S(1))*WC('b', S(1))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons4, cons33, cons170)
rule1917 = ReplacementRule(pattern1917, replacement1917)
pattern1918 = Pattern(Integral((x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1))*((F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1))))**WC('n', S(1))*WC('b', S(1)) + WC('a', S(0)))**WC('p', S(1))*(F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1))))**WC('n', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons19, cons4, cons5, cons56)
rule1918 = ReplacementRule(pattern1918, replacement1918)
pattern1919 = Pattern(Integral((x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1))*((F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1))))**WC('n', S(1))*WC('b', S(1)) + WC('a', S(0)))**WC('p', S(1))*(F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1))))**WC('n', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons19, cons4, cons5, cons1105)
rule1919 = ReplacementRule(pattern1919, replacement1919)
pattern1920 = Pattern(Integral((G_**((x_*WC('i', S(1)) + WC('h', S(0)))*WC('j', S(1)))*WC('k', S(1)))**WC('q', S(1))*(x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1))*((F_**((x_*WC('f', S(1)) + WC('e', S(0)))*WC('g', S(1))))**WC('n', S(1))*WC('b', S(1)) + WC('a', S(0)))**WC('p', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons226, cons798, cons799, cons19, cons4, cons5, cons52, cons1106, cons1107)
rule1920 = ReplacementRule(pattern1920, replacement1920)
pattern1921 = Pattern(Integral((F_**((x_*WC('b', S(1)) + WC('a', S(0)))*WC('c', S(1))))**WC('n', S(1)), x_), cons1101, cons2, cons3, cons8, cons4, cons1108)
rule1921 = ReplacementRule(pattern1921, replacement1921)
pattern1922 = Pattern(Integral(F_**(v_*WC('c', S(1)))*u_, x_), cons1101, cons8, cons806, cons554, cons1109)
rule1922 = ReplacementRule(pattern1922, replacement1922)
pattern1923 = Pattern(Integral(F_**(v_*WC('c', S(1)))*u_, x_), cons1101, cons8, cons806, cons554, cons1100)
rule1923 = ReplacementRule(pattern1923, replacement1923)
pattern1924 = Pattern(Integral(F_**(v_*WC('c', S(1)))*u_**WC('m', S(1))*w_, x_), cons1101, cons8, cons19, cons814, cons1110)
rule1924 = ReplacementRule(pattern1924, replacement1924)
pattern1925 = Pattern(Integral(F_**(v_*WC('c', S(1)))*u_**WC('m', S(1))*w_, x_), cons1101, cons8, cons1111, cons554, cons1103, cons20, cons1109)
rule1925 = ReplacementRule(pattern1925, replacement1925)
pattern1926 = Pattern(Integral(F_**(v_*WC('c', S(1)))*u_**WC('m', S(1))*w_, x_), cons1101, cons8, cons1111, cons554, cons1103, cons20, cons1100)
rule1926 = ReplacementRule(pattern1926, replacement1926)
pattern1927 = Pattern(Integral(F_**(v_*WC('c', S(1)))*u_**WC('m', S(1))*w_, x_), cons1101, cons8, cons19, cons1111, cons554, cons1103, cons21)
rule1927 = ReplacementRule(pattern1927, With1927)
pattern1928 = Pattern(Integral(F_**((x_*WC('b', S(1)) + WC('a', S(0)))*WC('c', S(1)))*(e_ + (x_*WC('g', S(1)) + WC('f', S(0)))*WC('h', S(1))*log(x_*WC('d', S(1))))*log(x_*WC('d', S(1)))**WC('n', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons4, cons1112, cons1113, cons586)
rule1928 = ReplacementRule(pattern1928, replacement1928)
pattern1929 = Pattern(Integral(F_**((x_*WC('b', S(1)) + WC('a', S(0)))*WC('c', S(1)))*x_**WC('m', S(1))*(e_ + (x_*WC('g', S(1)) + WC('f', S(0)))*WC('h', S(1))*log(x_*WC('d', S(1))))*log(x_*WC('d', S(1)))**WC('n', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons19, cons4, cons1114, cons1113, cons586)
rule1929 = ReplacementRule(pattern1929, replacement1929)
pattern1930 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('b', S(1)) + WC('a', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons1115)
rule1930 = ReplacementRule(pattern1930, replacement1930)
pattern1931 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**S(2)*WC('b', S(1)) + WC('a', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons481)
rule1931 = ReplacementRule(pattern1931, replacement1931)
pattern1932 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**S(2)*WC('b', S(1)) + WC('a', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons482)
rule1932 = ReplacementRule(pattern1932, replacement1932)
pattern1933 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons1116, cons198)
rule1933 = ReplacementRule(pattern1933, replacement1933)
pattern1934 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons1116, cons25)
rule1934 = ReplacementRule(pattern1934, With1934)
pattern1935 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons4, cons1117)
rule1935 = ReplacementRule(pattern1935, replacement1935)
pattern1936 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('f', S(1)) + WC('e', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons4, cons55, cons1118)
rule1936 = ReplacementRule(pattern1936, replacement1936)
pattern1937 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0)))/(x_*WC('f', S(1)) + WC('e', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons4, cons1118)
rule1937 = ReplacementRule(pattern1937, replacement1937)
pattern1938 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons19, cons4, cons1119)
rule1938 = ReplacementRule(pattern1938, replacement1938)
pattern1939 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons33, cons1120, cons1121, cons87, cons1122)
rule1939 = ReplacementRule(pattern1939, replacement1939)
pattern1940 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons19, cons4, cons1120, cons1121, cons358, cons533)
rule1940 = ReplacementRule(pattern1940, replacement1940)
pattern1941 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons33, cons1120, cons1123, cons87, cons1124)
rule1941 = ReplacementRule(pattern1941, replacement1941)
pattern1942 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons19, cons4, cons1120, cons1123, cons358, cons537)
rule1942 = ReplacementRule(pattern1942, replacement1942)
pattern1943 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('d', S(1)) + WC('c', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons95, cons1120, cons1121, cons25)
rule1943 = ReplacementRule(pattern1943, With1943)
pattern1944 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('f', S(1)) + WC('e', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons19, cons4, cons1118, cons1120, cons1125, cons21, cons1126)
rule1944 = ReplacementRule(pattern1944, replacement1944)
pattern1945 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('f', S(1)) + WC('e', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons19, cons4, cons1118)
rule1945 = ReplacementRule(pattern1945, replacement1945)
pattern1946 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**S(2)*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('f', S(1)) + WC('e', S(0)))**m_, x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons178, cons369, cons168)
rule1946 = ReplacementRule(pattern1946, replacement1946)
pattern1947 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**S(2)*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('f', S(1)) + WC('e', S(0)))**m_, x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons178, cons33, cons96)
rule1947 = ReplacementRule(pattern1947, replacement1947)
pattern1948 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('f', S(1)) + WC('e', S(0)))**m_, x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons178, cons87, cons746, cons33, cons96)
rule1948 = ReplacementRule(pattern1948, replacement1948)
pattern1949 = Pattern(Integral(F_**(WC('a', S(0)) + WC('b', S(1))/(x_*WC('d', S(1)) + WC('c', S(0))))/(x_*WC('f', S(1)) + WC('e', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons178)
rule1949 = ReplacementRule(pattern1949, replacement1949)
pattern1950 = Pattern(Integral(F_**(WC('a', S(0)) + WC('b', S(1))/(x_*WC('d', S(1)) + WC('c', S(0))))*(x_*WC('f', S(1)) + WC('e', S(0)))**m_, x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons178, cons20, cons96)
rule1950 = ReplacementRule(pattern1950, replacement1950)
pattern1951 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0)))/(x_*WC('f', S(1)) + WC('e', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons4, cons178)
rule1951 = ReplacementRule(pattern1951, replacement1951)
pattern1952 = Pattern(Integral(F_**v_*u_**WC('m', S(1)), x_), cons1101, cons19, cons70, cons842, cons1127)
rule1952 = ReplacementRule(pattern1952, replacement1952)
pattern1953 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))**n_*WC('b', S(1)) + WC('a', S(0)))*u_, x_), cons1101, cons2, cons3, cons8, cons29, cons4, cons806)
rule1953 = ReplacementRule(pattern1953, replacement1953)
pattern1954 = Pattern(Integral(F_**(v_*WC('b', S(1)) + WC('a', S(0)))*WC('u', S(1)), x_), cons1101, cons2, cons3, cons806, cons1128, cons1129)
rule1954 = ReplacementRule(pattern1954, replacement1954)
pattern1955 = Pattern(Integral(F_**(WC('a', S(0)) + WC('b', S(1))/(x_*WC('d', S(1)) + WC('c', S(0))))/((x_*WC('f', S(1)) + WC('e', S(0)))*(x_*WC('h', S(1)) + WC('g', S(0)))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons1118)
rule1955 = ReplacementRule(pattern1955, replacement1955)
pattern1956 = Pattern(Integral(F_**((x_*WC('b', S(1)) + WC('a', S(0)))*WC('f', S(1))/(x_*WC('d', S(1)) + WC('c', S(0))) + WC('e', S(0)))*(x_*WC('h', S(1)) + WC('g', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons19, cons27)
rule1956 = ReplacementRule(pattern1956, replacement1956)
pattern1957 = Pattern(Integral(F_**((x_*WC('b', S(1)) + WC('a', S(0)))*WC('f', S(1))/(x_*WC('d', S(1)) + WC('c', S(0))) + WC('e', S(0)))*(x_*WC('h', S(1)) + WC('g', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons19, cons73, cons1130)
rule1957 = ReplacementRule(pattern1957, replacement1957)
pattern1958 = Pattern(Integral(F_**((x_*WC('b', S(1)) + WC('a', S(0)))*WC('f', S(1))/(x_*WC('d', S(1)) + WC('c', S(0))) + WC('e', S(0)))/(x_*WC('h', S(1)) + WC('g', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons73, cons1131)
rule1958 = ReplacementRule(pattern1958, replacement1958)
pattern1959 = Pattern(Integral(F_**((x_*WC('b', S(1)) + WC('a', S(0)))*WC('f', S(1))/(x_*WC('d', S(1)) + WC('c', S(0))) + WC('e', S(0)))*(x_*WC('h', S(1)) + WC('g', S(0)))**m_, x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons73, cons1131, cons20, cons96)
rule1959 = ReplacementRule(pattern1959, replacement1959)
pattern1960 = Pattern(Integral(F_**((x_*WC('b', S(1)) + WC('a', S(0)))*WC('f', S(1))/(x_*WC('d', S(1)) + WC('c', S(0))) + WC('e', S(0)))/((x_*WC('h', S(1)) + WC('g', S(0)))*(x_*WC('j', S(1)) + WC('i', S(0)))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons1130)
rule1960 = ReplacementRule(pattern1960, replacement1960)
pattern1961 = Pattern(Integral(F_**(x_**S(2)*WC('c', S(1)) + x_*WC('b', S(1)) + WC('a', S(0))), x_), cons1101, cons2, cons3, cons8, cons1132)
rule1961 = ReplacementRule(pattern1961, replacement1961)
pattern1962 = Pattern(Integral(F_**v_, x_), cons1101, cons820, cons1133)
rule1962 = ReplacementRule(pattern1962, replacement1962)
pattern1963 = Pattern(Integral(F_**(x_**S(2)*WC('c', S(1)) + x_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('e', S(1)) + WC('d', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons1134)
rule1963 = ReplacementRule(pattern1963, replacement1963)
pattern1964 = Pattern(Integral(F_**(x_**S(2)*WC('c', S(1)) + x_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('e', S(1)) + WC('d', S(0)))**m_, x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons1134, cons33, cons168)
rule1964 = ReplacementRule(pattern1964, replacement1964)
pattern1965 = Pattern(Integral(F_**(x_**S(2)*WC('c', S(1)) + x_*WC('b', S(1)) + WC('a', S(0)))/(x_*WC('e', S(1)) + WC('d', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons1134)
rule1965 = ReplacementRule(pattern1965, replacement1965)
pattern1966 = Pattern(Integral(F_**(x_**S(2)*WC('c', S(1)) + x_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('e', S(1)) + WC('d', S(0)))**m_, x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons1134, cons33, cons96)
rule1966 = ReplacementRule(pattern1966, replacement1966)
pattern1967 = Pattern(Integral(F_**(x_**S(2)*WC('c', S(1)) + x_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('e', S(1)) + WC('d', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons1135)
rule1967 = ReplacementRule(pattern1967, replacement1967)
pattern1968 = Pattern(Integral(F_**(x_**S(2)*WC('c', S(1)) + x_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('e', S(1)) + WC('d', S(0)))**m_, x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons1135, cons33, cons168)
rule1968 = ReplacementRule(pattern1968, replacement1968)
pattern1969 = Pattern(Integral(F_**(x_**S(2)*WC('c', S(1)) + x_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('e', S(1)) + WC('d', S(0)))**m_, x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons1135, cons33, cons96)
rule1969 = ReplacementRule(pattern1969, replacement1969)
pattern1970 = Pattern(Integral(F_**(x_**S(2)*WC('c', S(1)) + x_*WC('b', S(1)) + WC('a', S(0)))*(x_*WC('e', S(1)) + WC('d', S(0)))**WC('m', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons19, cons1136)
rule1970 = ReplacementRule(pattern1970, replacement1970)
pattern1971 = Pattern(Integral(F_**v_*u_**WC('m', S(1)), x_), cons1101, cons19, cons70, cons820, cons821)
rule1971 = ReplacementRule(pattern1971, replacement1971)
pattern1972 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*x_**WC('m', S(1))*(F_**v_*WC('b', S(1)) + WC('a', S(0)))**n_, x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons1137, cons33, cons170, cons198)
rule1972 = ReplacementRule(pattern1972, With1972)
pattern1973 = Pattern(Integral(G_**((x_*WC('g', S(1)) + WC('f', S(0)))*WC('h', S(1)))*(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*WC('b', S(1)) + a_)**WC('n', S(1)), x_), cons1101, cons1139, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons4, cons1138, CustomConstraint(With1973))
rule1973 = ReplacementRule(pattern1973, replacement1973)
pattern1974 = Pattern(Integral(G_**((x_*WC('g', S(1)) + WC('f', S(0)))*WC('h', S(1)))*(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*WC('b', S(1)) + a_)**WC('n', S(1)), x_), cons1101, cons1139, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons4, cons1138, CustomConstraint(With1974))
rule1974 = ReplacementRule(pattern1974, replacement1974)
pattern1975 = Pattern(Integral(G_**((x_*WC('g', S(1)) + WC('f', S(0)))*WC('h', S(1)))*(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*WC('b', S(1)) + a_)**WC('n', S(1)), x_), cons1101, cons1139, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons1140, cons150)
rule1975 = ReplacementRule(pattern1975, replacement1975)
pattern1976 = Pattern(Integral(G_**((x_*WC('g', S(1)) + WC('f', S(0)))*WC('h', S(1)))*(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*WC('b', S(1)) + a_)**n_, x_), cons1101, cons1139, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons1140, cons198)
rule1976 = ReplacementRule(pattern1976, replacement1976)
pattern1977 = Pattern(Integral(G_**((x_*WC('g', S(1)) + WC('f', S(0)))*WC('h', S(1)))*(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*WC('b', S(1)) + a_)**n_, x_), cons1101, cons1139, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons4, cons1140, cons25)
rule1977 = ReplacementRule(pattern1977, replacement1977)
pattern1978 = Pattern(Integral(G_**(u_*WC('h', S(1)))*(F_**(v_*WC('e', S(1)))*WC('b', S(1)) + a_)**n_, x_), cons1101, cons1139, cons2, cons3, cons50, cons211, cons4, cons812, cons813)
rule1978 = ReplacementRule(pattern1978, replacement1978)
pattern1979 = Pattern(Integral(G_**((x_*WC('g', S(1)) + WC('f', S(0)))*WC('h', S(1)))*H_**((x_*WC('s', S(1)) + WC('r', S(0)))*WC('t', S(1)))*(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*WC('b', S(1)) + a_)**WC('n', S(1)), x_), cons1101, cons1139, cons1142, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons54, cons802, cons1143, cons4, cons1141, CustomConstraint(With1979))
rule1979 = ReplacementRule(pattern1979, replacement1979)
pattern1980 = Pattern(Integral(G_**((x_*WC('g', S(1)) + WC('f', S(0)))*WC('h', S(1)))*H_**((x_*WC('s', S(1)) + WC('r', S(0)))*WC('t', S(1)))*(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*WC('b', S(1)) + a_)**WC('n', S(1)), x_), cons1101, cons1139, cons1142, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons54, cons802, cons1143, cons1144, cons87)
rule1980 = ReplacementRule(pattern1980, replacement1980)
pattern1981 = Pattern(Integral(G_**((x_*WC('g', S(1)) + WC('f', S(0)))*WC('h', S(1)))*H_**((x_*WC('s', S(1)) + WC('r', S(0)))*WC('t', S(1)))*(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*WC('b', S(1)) + a_)**WC('n', S(1)), x_), cons1101, cons1139, cons1142, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons54, cons802, cons1143, cons1145, cons150)
rule1981 = ReplacementRule(pattern1981, replacement1981)
pattern1982 = Pattern(Integral(G_**((x_*WC('g', S(1)) + WC('f', S(0)))*WC('h', S(1)))*H_**((x_*WC('s', S(1)) + WC('r', S(0)))*WC('t', S(1)))*(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*WC('b', S(1)) + a_)**n_, x_), cons1101, cons1139, cons1142, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons54, cons802, cons1143, cons1145, cons198)
rule1982 = ReplacementRule(pattern1982, replacement1982)
pattern1983 = Pattern(Integral(G_**((x_*WC('g', S(1)) + WC('f', S(0)))*WC('h', S(1)))*H_**((x_*WC('s', S(1)) + WC('r', S(0)))*WC('t', S(1)))*(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*WC('b', S(1)) + a_)**n_, x_), cons1101, cons1139, cons1142, cons2, cons3, cons8, cons29, cons50, cons127, cons210, cons211, cons54, cons802, cons1143, cons4, cons1145, cons25)
rule1983 = ReplacementRule(pattern1983, replacement1983)
pattern1984 = Pattern(Integral(G_**(u_*WC('h', S(1)))*H_**(w_*WC('t', S(1)))*(F_**(v_*WC('e', S(1)))*WC('b', S(1)) + a_)**n_, x_), cons1101, cons1139, cons1142, cons2, cons3, cons50, cons211, cons1143, cons4, cons814, cons815)
rule1984 = ReplacementRule(pattern1984, replacement1984)
pattern1985 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*WC('b', S(1)) + x_**WC('n', S(1))*WC('a', S(1)))**WC('p', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons4, cons5, cons56)
rule1985 = ReplacementRule(pattern1985, replacement1985)
pattern1986 = Pattern(Integral(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*x_**WC('m', S(1))*(F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1)))*WC('b', S(1)) + x_**WC('n', S(1))*WC('a', S(1)))**WC('p', S(1)), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons19, cons4, cons5, cons56)
rule1986 = ReplacementRule(pattern1986, replacement1986)
pattern1987 = Pattern(Integral((x_*WC('g', S(1)) + WC('f', S(0)))**WC('m', S(1))/(F_**u_*WC('b', S(1)) + F_**v_*WC('c', S(1)) + WC('a', S(0))), x_), cons1101, cons2, cons3, cons8, cons127, cons210, cons1146, cons70, cons228, cons64)
rule1987 = ReplacementRule(pattern1987, With1987)
pattern1988 = Pattern(Integral(F_**u_*(x_*WC('g', S(1)) + WC('f', S(0)))**WC('m', S(1))/(F_**u_*WC('b', S(1)) + F_**v_*WC('c', S(1)) + WC('a', S(0))), x_), cons1101, cons2, cons3, cons8, cons127, cons210, cons1146, cons70, cons228, cons64)
rule1988 = ReplacementRule(pattern1988, With1988)
pattern1989 = Pattern(Integral((F_**u_*WC('i', S(1)) + h_)*(x_*WC('g', S(1)) + WC('f', S(0)))**WC('m', S(1))/(F_**u_*WC('b', S(1)) + F_**v_*WC('c', S(1)) + WC('a', S(0))), x_), cons1101, cons2, cons3, cons8, cons127, cons210, cons211, cons226, cons1146, cons70, cons228, cons64)
rule1989 = ReplacementRule(pattern1989, With1989)
pattern1990 = Pattern(Integral(x_**WC('m', S(1))/(F_**v_*WC('b', S(1)) + F_**(x_*WC('d', S(1)) + WC('c', S(0)))*WC('a', S(1))), x_), cons1101, cons2, cons3, cons8, cons29, cons1147, cons33, cons170)
rule1990 = ReplacementRule(pattern1990, With1990)
pattern1991 = Pattern(Integral(u_/(F_**v_*WC('b', S(1)) + F_**w_*WC('c', S(1)) + a_), x_), cons1101, cons2, cons3, cons8, cons554, cons1148, cons1149, cons1150)
rule1991 = ReplacementRule(pattern1991, replacement1991)
pattern1992 = Pattern(Integral(F_**((x_*WC('e', S(1)) + WC('d', S(0)))**WC('n', S(1))*WC('g', S(1)))/(x_**S(2)*WC('c', S(1)) + x_*WC('b', S(1)) + WC('a', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons210, cons4, cons1151)
rule1992 = ReplacementRule(pattern1992, replacement1992)
pattern1993 = Pattern(Integral(F_**((x_*WC('e', S(1)) + WC('d', S(0)))**WC('n', S(1))*WC('g', S(1)))/(a_ + x_**S(2)*WC('c', S(1))), x_), cons1101, cons2, cons8, cons29, cons50, cons210, cons4, cons1152)
rule1993 = ReplacementRule(pattern1993, replacement1993)
pattern1994 = Pattern(Integral(F_**((x_*WC('e', S(1)) + WC('d', S(0)))**WC('n', S(1))*WC('g', S(1)))*u_**WC('m', S(1))/(c_*x_**S(2) + x_*WC('b', S(1)) + WC('a', S(0))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons210, cons4, cons806, cons20)
rule1994 = ReplacementRule(pattern1994, replacement1994)
pattern1995 = Pattern(Integral(F_**((x_*WC('e', S(1)) + WC('d', S(0)))**WC('n', S(1))*WC('g', S(1)))*u_**WC('m', S(1))/(a_ + c_*x_**S(2)), x_), cons1101, cons2, cons8, cons29, cons50, cons210, cons4, cons806, cons20)
rule1995 = ReplacementRule(pattern1995, replacement1995)
pattern1996 = Pattern(Integral(F_**((x_**S(4)*WC('b', S(1)) + WC('a', S(0)))/x_**S(2)), x_), cons1101, cons2, cons3, cons1153)
rule1996 = ReplacementRule(pattern1996, replacement1996)
pattern1997 = Pattern(Integral(x_**WC('m', S(1))*(x_**WC('m', S(1)) + exp(x_))**n_, x_), cons95, cons170, cons465, cons1154)
rule1997 = ReplacementRule(pattern1997, replacement1997)
pattern1998 = Pattern(Integral(log(a_ + (F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1))))**WC('n', S(1))*WC('b', S(1))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons4, cons45)
rule1998 = ReplacementRule(pattern1998, replacement1998)
pattern1999 = Pattern(Integral(log(a_ + (F_**((x_*WC('d', S(1)) + WC('c', S(0)))*WC('e', S(1))))**WC('n', S(1))*WC('b', S(1))), x_), cons1101, cons2, cons3, cons8, cons29, cons50, cons4, cons450)
rule1999 = ReplacementRule(pattern1999, replacement1999)
pattern2000 = Pattern(Integral((F_**v_*WC('a', S(1)))**n_*WC('u', S(1)), x_), cons1101, cons2, cons4, cons25)
rule2000 = ReplacementRule(pattern2000, replacement2000)
pattern2001 = Pattern(Integral(u_, x_), cons1155)
rule2001 = ReplacementRule(pattern2001, With2001)
pattern2002 = Pattern(Integral((F_**v_*WC('a', S(1)) + F_**w_*WC('b', S(1)))**n_*WC('u', S(1)), x_), cons1101, cons2, cons3, cons4, cons198, cons1156)
rule2002 = ReplacementRule(pattern2002, replacement2002)
pattern2003 = Pattern(Integral((F_**v_*WC('a', S(1)) + G_**w_*WC('b', S(1)))**n_*WC('u', S(1)), x_), cons1101, cons1139, cons2, cons3, cons4, cons198, cons1156)
rule2003 = ReplacementRule(pattern2003, replacement2003)
pattern2004 = Pattern(Integral((F_**v_*WC('a', S(1)) + F_**w_*WC('b', S(1)))**n_*WC('u', S(1)), x_), cons1101, cons2, cons3, cons4, cons25, cons1156)
rule2004 = ReplacementRule(pattern2004, replacement2004)
pattern2005 = Pattern(Integral((F_**v_*WC('a', S(1)) + G_**w_*WC('b', S(1)))**n_*WC('u', S(1)), x_), cons1101, cons1139, cons2, cons3, cons4, cons25, cons1156)
rule2005 = ReplacementRule(pattern2005, replacement2005)
pattern2006 = Pattern(Integral(F_**v_*G_**w_*WC('u', S(1)), x_), cons1101, cons1139, cons1157)
rule2006 = ReplacementRule(pattern2006, replacement2006)
pattern2007 = Pattern(Integral(F_**u_*(v_ + w_)*WC('y', S(1)), x_), cons1101, cons1101, CustomConstraint(With2007))
rule2007 = ReplacementRule(pattern2007, replacement2007)
pattern2008 = Pattern(Integral(F_**u_*v_**WC('n', S(1))*w_, x_), cons1101, cons4, cons806, cons1019, cons1111, CustomConstraint(With2008))
rule2008 = ReplacementRule(pattern2008, replacement2008)
return [rule1904, rule1905, rule1906, rule1907, rule1908, rule1909, rule1910, rule1911, rule1912, rule1913, rule1914, rule1915, rule1916, rule1917, rule1918, rule1919, rule1920, rule1921, rule1922, rule1923, rule1924, rule1925, rule1926, rule1927, rule1928, rule1929, rule1930, rule1931, rule1932, rule1933, rule1934, rule1935, rule1936, rule1937, rule1938, rule1939, rule1940, rule1941, rule1942, rule1943, rule1944, rule1945, rule1946, rule1947, rule1948, rule1949, rule1950, rule1951, rule1952, rule1953, rule1954, rule1955, rule1956, rule1957, rule1958, rule1959, rule1960, rule1961, rule1962, rule1963, rule1964, rule1965, rule1966, rule1967, rule1968, rule1969, rule1970, rule1971, rule1972, rule1973, rule1974, rule1975, rule1976, rule1977, rule1978, rule1979, rule1980, rule1981, rule1982, rule1983, rule1984, rule1985, rule1986, rule1987, rule1988, rule1989, rule1990, rule1991, rule1992, rule1993, rule1994, rule1995, rule1996, rule1997, rule1998, rule1999, rule2000, rule2001, rule2002, rule2003, rule2004, rule2005, rule2006, rule2007, rule2008, ]
def replacement1904(F, b, c, d, e, f, g, m, n, x):
return -Dist(d*m/(f*g*n*log(F)), Int((F**(g*(e + f*x))*b)**n*(c + d*x)**(m + S(-1)), x), x) + Simp((F**(g*(e + f*x))*b)**n*(c + d*x)**m/(f*g*n*log(F)), x)
def replacement1905(F, b, c, d, e, f, g, m, n, x):
return -Dist(f*g*n*log(F)/(d*(m + S(1))), Int((F**(g*(e + f*x))*b)**n*(c + d*x)**(m + S(1)), x), x) + Simp((F**(g*(e + f*x))*b)**n*(c + d*x)**(m + S(1))/(d*(m + S(1))), x)
def replacement1906(F, c, d, e, f, g, x):
return Simp(F**(g*(-c*f/d + e))*ExpIntegralEi(f*g*(c + d*x)*log(F)/d)/d, x)
def replacement1907(F, c, d, e, f, g, m, x):
return Simp(F**(g*(-c*f/d + e))*f**(-m + S(-1))*g**(-m + S(-1))*(-d)**m*Gamma(m + S(1), -f*g*(c + d*x)*log(F)/d)*log(F)**(-m + S(-1)), x)
def replacement1908(F, c, d, e, f, g, x):
return Dist(S(2)/d, Subst(Int(F**(g*(-c*f/d + e) + f*g*x**S(2)/d), x), x, sqrt(c + d*x)), x)
def replacement1909(F, c, d, e, f, g, m, x):
return -Simp(F**(g*(-c*f/d + e))*(-f*g*log(F)/d)**(-IntPart(m) + S(-1))*(-f*g*(c + d*x)*log(F)/d)**(-FracPart(m))*(c + d*x)**FracPart(m)*Gamma(m + S(1), -f*g*(c + d*x)*log(F)/d)/d, x)
def replacement1910(F, b, c, d, e, f, g, m, n, x):
return Dist(F**(-g*n*(e + f*x))*(F**(g*(e + f*x))*b)**n, Int(F**(g*n*(e + f*x))*(c + d*x)**m, x), x)
def replacement1911(F, a, b, c, d, e, f, g, m, n, p, x):
return Int(ExpandIntegrand((c + d*x)**m, (a + b*(F**(g*(e + f*x)))**n)**p, x), x)
def replacement1912(F, a, b, c, d, e, f, g, m, n, x):
return Dist(d*m/(a*f*g*n*log(F)), Int((c + d*x)**(m + S(-1))*log(a*(F**(g*(e + f*x)))**(-n)/b + S(1)), x), x) - Simp((c + d*x)**m*log(a*(F**(g*(e + f*x)))**(-n)/b + S(1))/(a*f*g*n*log(F)), x)
def With1913(F, a, b, c, d, e, f, g, m, n, p, x):
u = IntHide((a + b*(F**(g*(e + f*x)))**n)**p, x)
return -Dist(d*m, Int(u*(c + d*x)**(m + S(-1)), x), x) + Dist((c + d*x)**m, u, x)
def replacement1914(F, a, b, g, m, n, p, u, v, x):
return Int((a + b*(F**(g*ExpandToSum(v, x)))**n)**p*NormalizePowerOfLinear(u, x)**m, x)
def With1915(F, a, b, g, m, n, p, u, v, x):
uu = NormalizePowerOfLinear(u, x)
z = Symbol('z')
z = If(And(PowerQ(uu), FreeQ(Part(uu, S(2)), x)), Part(uu, S(1))**(m*Part(uu, S(2))), uu**m)
z = If(And(PowerQ(uu), FreeQ(Part(uu, 2), x)), Part(uu, 1)**(m*Part(uu, 2)), uu**m)
return Simp(uu**m*Int(z*(a + b*(F**(g*ExpandToSum(v, x)))**n)**p, x)/z, x)
def replacement1916(F, a, b, c, d, e, f, g, m, n, p, x):
return Int((a + b*(F**(g*(e + f*x)))**n)**p*(c + d*x)**m, x)
def replacement1917(F, a, b, c, d, e, f, g, m, n, x):
return -Dist(d*m/(b*f*g*n*log(F)), Int((c + d*x)**(m + S(-1))*log(S(1) + b*(F**(g*(e + f*x)))**n/a), x), x) + Simp((c + d*x)**m*log(S(1) + b*(F**(g*(e + f*x)))**n/a)/(b*f*g*n*log(F)), x)
def replacement1918(F, a, b, c, d, e, f, g, m, n, p, x):
return -Dist(d*m/(b*f*g*n*(p + S(1))*log(F)), Int((a + b*(F**(g*(e + f*x)))**n)**(p + S(1))*(c + d*x)**(m + S(-1)), x), x) + Simp((a + b*(F**(g*(e + f*x)))**n)**(p + S(1))*(c + d*x)**m/(b*f*g*n*(p + S(1))*log(F)), x)
def replacement1919(F, a, b, c, d, e, f, g, m, n, p, x):
return Int((a + b*(F**(g*(e + f*x)))**n)**p*(c + d*x)**m*(F**(g*(e + f*x)))**n, x)
def replacement1920(F, G, a, b, c, d, e, f, g, h, i, j, k, m, n, p, q, x):
return Dist((G**(j*(h + i*x))*k)**q*(F**(g*(e + f*x)))**(-n), Int((a + b*(F**(g*(e + f*x)))**n)**p*(c + d*x)**m*(F**(g*(e + f*x)))**n, x), x)
def replacement1921(F, a, b, c, n, x):
return Simp((F**(c*(a + b*x)))**n/(b*c*n*log(F)), x)
def replacement1922(F, c, u, v, x):
return Int(ExpandIntegrand(F**(c*ExpandToSum(v, x))*u, x), x)
def replacement1923(F, c, u, v, x):
return Int(ExpandIntegrand(F**(c*ExpandToSum(v, x)), u, x), x)
def replacement1924(F, c, m, u, v, w, x):
return Simp(F**(c*v)*u**(m + S(1))*Coefficient(w, x, S(1))/(c*Coefficient(u, x, S(1))*Coefficient(v, x, S(1))*log(F)), x)
def replacement1925(F, c, m, u, v, w, x):
return Int(ExpandIntegrand(F**(c*ExpandToSum(v, x))*w*NormalizePowerOfLinear(u, x)**m, x), x)
def replacement1926(F, c, m, u, v, w, x):
return Int(ExpandIntegrand(F**(c*ExpandToSum(v, x)), w*NormalizePowerOfLinear(u, x)**m, x), x)
def With1927(F, c, m, u, v, w, x):
uu = NormalizePowerOfLinear(u, x)
z = Symbol('z')
z = If(And(PowerQ(uu), FreeQ(Part(uu, S(2)), x)), Part(uu, S(1))**(m*Part(uu, S(2))), uu**m)
z = If(And(PowerQ(uu), FreeQ(Part(uu, 2), x)), Part(uu, 1)**(m*Part(uu, 2)), uu**m)
return Simp(uu**m*Int(ExpandIntegrand(F**(c*ExpandToSum(v, x))*w*z, x), x)/z, x)
def replacement1928(F, a, b, c, d, e, f, g, h, n, x):
return Simp(F**(c*(a + b*x))*e*x*log(d*x)**(n + S(1))/(n + S(1)), x)
def replacement1929(F, a, b, c, d, e, f, g, h, m, n, x):
return Simp(F**(c*(a + b*x))*e*x**(m + S(1))*log(d*x)**(n + S(1))/(n + S(1)), x)
def replacement1930(F, a, b, c, d, x):
return Simp(F**(a + b*(c + d*x))/(b*d*log(F)), x)
def replacement1931(F, a, b, c, d, x):
return Simp(F**a*sqrt(Pi)*Erfi((c + d*x)*Rt(b*log(F), S(2)))/(S(2)*d*Rt(b*log(F), S(2))), x)
def replacement1932(F, a, b, c, d, x):
return Simp(F**a*sqrt(Pi)*Erf((c + d*x)*Rt(-b*log(F), S(2)))/(S(2)*d*Rt(-b*log(F), S(2))), x)
def replacement1933(F, a, b, c, d, n, x):
return -Dist(b*n*log(F), Int(F**(a + b*(c + d*x)**n)*(c + d*x)**n, x), x) + Simp(F**(a + b*(c + d*x)**n)*(c + d*x)/d, x)
def With1934(F, a, b, c, d, n, x):
k = Denominator(n)
return Dist(k/d, Subst(Int(F**(a + b*x**(k*n))*x**(k + S(-1)), x), x, (c + d*x)**(S(1)/k)), x)
def replacement1935(F, a, b, c, d, n, x):
return -Simp(F**a*(-b*(c + d*x)**n*log(F))**(-S(1)/n)*(c + d*x)*Gamma(S(1)/n, -b*(c + d*x)**n*log(F))/(d*n), x)
def replacement1936(F, a, b, c, d, e, f, m, n, x):
return Simp(F**(a + b*(c + d*x)**n)*(c + d*x)**(-n)*(e + f*x)**n/(b*f*n*log(F)), x)
def replacement1937(F, a, b, c, d, e, f, n, x):
return Simp(F**a*ExpIntegralEi(b*(c + d*x)**n*log(F))/(f*n), x)
def replacement1938(F, a, b, c, d, m, n, x):
return Dist(S(1)/(d*(m + S(1))), Subst(Int(F**(a + b*x**S(2)), x), x, (c + d*x)**(m + S(1))), x)
def replacement1939(F, a, b, c, d, m, n, x):
return -Dist((m - n + S(1))/(b*n*log(F)), Int(F**(a + b*(c + d*x)**n)*(c + d*x)**(m - n), x), x) + Simp(F**(a + b*(c + d*x)**n)*(c + d*x)**(m - n + S(1))/(b*d*n*log(F)), x)
def replacement1940(F, a, b, c, d, m, n, x):
return -Dist((m - n + S(1))/(b*n*log(F)), Int(F**(a + b*(c + d*x)**n)*(c + d*x)**(m - n), x), x) + Simp(F**(a + b*(c + d*x)**n)*(c + d*x)**(m - n + S(1))/(b*d*n*log(F)), x)
def replacement1941(F, a, b, c, d, m, n, x):
return -Dist(b*n*log(F)/(m + S(1)), Int(F**(a + b*(c + d*x)**n)*(c + d*x)**(m + n), x), x) + Simp(F**(a + b*(c + d*x)**n)*(c + d*x)**(m + S(1))/(d*(m + S(1))), x)
def replacement1942(F, a, b, c, d, m, n, x):
return -Dist(b*n*log(F)/(m + S(1)), Int(F**(a + b*(c + d*x)**n)*(c + d*x)**(m + n), x), x) + Simp(F**(a + b*(c + d*x)**n)*(c + d*x)**(m + S(1))/(d*(m + S(1))), x)
def With1943(F, a, b, c, d, m, n, x):
k = Denominator(n)
return Dist(k/d, Subst(Int(F**(a + b*x**(k*n))*x**(k*(m + S(1)) + S(-1)), x), x, (c + d*x)**(S(1)/k)), x)
def replacement1944(F, a, b, c, d, e, f, m, n, x):
return Dist((c + d*x)**(-m)*(e + f*x)**m, Int(F**(a + b*(c + d*x)**n)*(c + d*x)**m, x), x)
def replacement1945(F, a, b, c, d, e, f, m, n, x):
return -Simp(F**a*(-b*(c + d*x)**n*log(F))**(-(m + S(1))/n)*(e + f*x)**(m + S(1))*Gamma((m + S(1))/n, -b*(c + d*x)**n*log(F))/(f*n), x)
def replacement1946(F, a, b, c, d, e, f, m, x):
return Dist((-c*f + d*e)/d, Int(F**(a + b*(c + d*x)**S(2))*(e + f*x)**(m + S(-1)), x), x) - Dist(f**S(2)*(m + S(-1))/(S(2)*b*d**S(2)*log(F)), Int(F**(a + b*(c + d*x)**S(2))*(e + f*x)**(m + S(-2)), x), x) + Simp(F**(a + b*(c + d*x)**S(2))*f*(e + f*x)**(m + S(-1))/(S(2)*b*d**S(2)*log(F)), x)
def replacement1947(F, a, b, c, d, e, f, m, x):
return -Dist(S(2)*b*d**S(2)*log(F)/(f**S(2)*(m + S(1))), Int(F**(a + b*(c + d*x)**S(2))*(e + f*x)**(m + S(2)), x), x) + Dist(S(2)*b*d*(-c*f + d*e)*log(F)/(f**S(2)*(m + S(1))), Int(F**(a + b*(c + d*x)**S(2))*(e + f*x)**(m + S(1)), x), x) + Simp(F**(a + b*(c + d*x)**S(2))*(e + f*x)**(m + S(1))/(f*(m + S(1))), x)
def replacement1948(F, a, b, c, d, e, f, m, n, x):
return -Dist(b*d*n*log(F)/(f*(m + S(1))), Int(F**(a + b*(c + d*x)**n)*(c + d*x)**(n + S(-1))*(e + f*x)**(m + S(1)), x), x) + Simp(F**(a + b*(c + d*x)**n)*(e + f*x)**(m + S(1))/(f*(m + S(1))), x)
def replacement1949(F, a, b, c, d, e, f, x):
return Dist(d/f, Int(F**(a + b/(c + d*x))/(c + d*x), x), x) - Dist((-c*f + d*e)/f, Int(F**(a + b/(c + d*x))/((c + d*x)*(e + f*x)), x), x)
def replacement1950(F, a, b, c, d, e, f, m, x):
return Dist(b*d*log(F)/(f*(m + S(1))), Int(F**(a + b/(c + d*x))*(e + f*x)**(m + S(1))/(c + d*x)**S(2), x), x) + Simp(F**(a + b/(c + d*x))*(e + f*x)**(m + S(1))/(f*(m + S(1))), x)
def replacement1951(F, a, b, c, d, e, f, n, x):
return Int(F**(a + b*(c + d*x)**n)/(e + f*x), x)
def replacement1952(F, m, u, v, x):
return Int(F**ExpandToSum(v, x)*ExpandToSum(u, x)**m, x)
def replacement1953(F, a, b, c, d, n, u, x):
return Int(ExpandLinearProduct(F**(a + b*(c + d*x)**n), u, c, d, x), x)
def replacement1954(F, a, b, u, v, x):
return Int(F**(a + b*NormalizePowerOfLinear(v, x))*u, x)
def replacement1955(F, a, b, c, d, e, f, g, h, x):
return -Dist(d/(f*(-c*h + d*g)), Subst(Int(F**(a + b*d*x/(-c*h + d*g) - b*h/(-c*h + d*g))/x, x), x, (g + h*x)/(c + d*x)), x)
def replacement1956(F, a, b, c, d, e, f, g, h, m, x):
return Dist(F**(b*f/d + e), Int((g + h*x)**m, x), x)
def replacement1957(F, a, b, c, d, e, f, g, h, m, x):
return Int(F**(-f*(-a*d + b*c)/(d*(c + d*x)) + (b*f + d*e)/d)*(g + h*x)**m, x)
def replacement1958(F, a, b, c, d, e, f, g, h, x):
return Dist(d/h, Int(F**(e + f*(a + b*x)/(c + d*x))/(c + d*x), x), x) - Dist((-c*h + d*g)/h, Int(F**(e + f*(a + b*x)/(c + d*x))/((c + d*x)*(g + h*x)), x), x)
def replacement1959(F, a, b, c, d, e, f, g, h, m, x):
return -Dist(f*(-a*d + b*c)*log(F)/(h*(m + S(1))), Int(F**(e + f*(a + b*x)/(c + d*x))*(g + h*x)**(m + S(1))/(c + d*x)**S(2), x), x) + Simp(F**(e + f*(a + b*x)/(c + d*x))*(g + h*x)**(m + S(1))/(h*(m + S(1))), x)
def replacement1960(F, a, b, c, d, e, f, g, h, i, j, x):
return -Dist(d/(h*(-c*j + d*i)), Subst(Int(F**(e - f*x*(-a*d + b*c)/(-c*j + d*i) + f*(-a*j + b*i)/(-c*j + d*i))/x, x), x, (i + j*x)/(c + d*x)), x)
def replacement1961(F, a, b, c, x):
return Dist(F**(a - b**S(2)/(S(4)*c)), Int(F**((b + S(2)*c*x)**S(2)/(S(4)*c)), x), x)
def replacement1962(F, v, x):
return Int(F**ExpandToSum(v, x), x)
def replacement1963(F, a, b, c, d, e, x):
return Simp(F**(a + b*x + c*x**S(2))*e/(S(2)*c*log(F)), x)
def replacement1964(F, a, b, c, d, e, m, x):
return -Dist(e**S(2)*(m + S(-1))/(S(2)*c*log(F)), Int(F**(a + b*x + c*x**S(2))*(d + e*x)**(m + S(-2)), x), x) + Simp(F**(a + b*x + c*x**S(2))*e*(d + e*x)**(m + S(-1))/(S(2)*c*log(F)), x)
def replacement1965(F, a, b, c, d, e, x):
return Simp(F**(a - b**S(2)/(S(4)*c))*ExpIntegralEi((b + S(2)*c*x)**S(2)*log(F)/(S(4)*c))/(S(2)*e), x)
def replacement1966(F, a, b, c, d, e, m, x):
return -Dist(S(2)*c*log(F)/(e**S(2)*(m + S(1))), Int(F**(a + b*x + c*x**S(2))*(d + e*x)**(m + S(2)), x), x) + Simp(F**(a + b*x + c*x**S(2))*(d + e*x)**(m + S(1))/(e*(m + S(1))), x)
def replacement1967(F, a, b, c, d, e, x):
return -Dist((b*e - S(2)*c*d)/(S(2)*c), Int(F**(a + b*x + c*x**S(2)), x), x) + Simp(F**(a + b*x + c*x**S(2))*e/(S(2)*c*log(F)), x)
def replacement1968(F, a, b, c, d, e, m, x):
return -Dist((b*e - S(2)*c*d)/(S(2)*c), Int(F**(a + b*x + c*x**S(2))*(d + e*x)**(m + S(-1)), x), x) - Dist(e**S(2)*(m + S(-1))/(S(2)*c*log(F)), Int(F**(a + b*x + c*x**S(2))*(d + e*x)**(m + S(-2)), x), x) + Simp(F**(a + b*x + c*x**S(2))*e*(d + e*x)**(m + S(-1))/(S(2)*c*log(F)), x)
def replacement1969(F, a, b, c, d, e, m, x):
return -Dist(S(2)*c*log(F)/(e**S(2)*(m + S(1))), Int(F**(a + b*x + c*x**S(2))*(d + e*x)**(m + S(2)), x), x) - Dist((b*e - S(2)*c*d)*log(F)/(e**S(2)*(m + S(1))), Int(F**(a + b*x + c*x**S(2))*(d + e*x)**(m + S(1)), x), x) + Simp(F**(a + b*x + c*x**S(2))*(d + e*x)**(m + S(1))/(e*(m + S(1))), x)
def replacement1970(F, a, b, c, d, e, m, x):
return Int(F**(a + b*x + c*x**S(2))*(d + e*x)**m, x)
def replacement1971(F, m, u, v, x):
return Int(F**ExpandToSum(v, x)*ExpandToSum(u, x)**m, x)
def With1972(F, a, b, c, d, e, m, n, v, x):
u = IntHide(F**(e*(c + d*x))*(F**v*b + a)**n, x)
return -Dist(m, Int(u*x**(m + S(-1)), x), x) + Dist(x**m, u, x)
def With1973(F, G, a, b, c, d, e, f, g, h, n, x):
if isinstance(x, (int, Integer, float, Float)):
return False
m = FullSimplify(g*h*log(G)/(d*e*log(F)))
if And(RationalQ(m), GreaterEqual(Abs(m), S(1))):
return True
return False
def replacement1973(F, G, a, b, c, d, e, f, g, h, n, x):
m = FullSimplify(g*h*log(G)/(d*e*log(F)))
return Dist(G**(-c*g*h/d + f*h)*Denominator(m)/(d*e*log(F)), Subst(Int(x**(Numerator(m) + S(-1))*(a + b*x**Denominator(m))**n, x), x, F**(e*(c + d*x)/Denominator(m))), x)
def With1974(F, G, a, b, c, d, e, f, g, h, n, x):
if isinstance(x, (int, Integer, float, Float)):
return False
m = FullSimplify(d*e*log(F)/(g*h*log(G)))
if And(RationalQ(m), Greater(Abs(m), S(1))):
return True
return False
def replacement1974(F, G, a, b, c, d, e, f, g, h, n, x):
m = FullSimplify(d*e*log(F)/(g*h*log(G)))
return Dist(Denominator(m)/(g*h*log(G)), Subst(Int(x**(Denominator(m) + S(-1))*(F**(c*e - d*e*f/g)*b*x**Numerator(m) + a)**n, x), x, G**(h*(f + g*x)/Denominator(m))), x)
def replacement1975(F, G, a, b, c, d, e, f, g, h, n, x):
return Int(G**(f*h)*G**(g*h*x)*(F**(c*e)*F**(d*e*x)*b + a)**n, x)
def replacement1976(F, G, a, b, c, d, e, f, g, h, n, x):
return Simp(G**(h*(f + g*x))*a**n*Hypergeometric2F1(-n, g*h*log(G)/(d*e*log(F)), S(1) + g*h*log(G)/(d*e*log(F)), -F**(e*(c + d*x))*b/a)/(g*h*log(G)), x)
def replacement1977(F, G, a, b, c, d, e, f, g, h, n, x):
return Simp(G**(h*(f + g*x))*(F**(e*(c + d*x))*b + a)**(n + S(1))*Hypergeometric2F1(S(1), n + S(1) + g*h*log(G)/(d*e*log(F)), S(1) + g*h*log(G)/(d*e*log(F)), -F**(e*(c + d*x))*b/a)/(a*g*h*log(G)), x)
def replacement1978(F, G, a, b, e, h, n, u, v, x):
return Int(G**(h*ExpandToSum(u, x))*(F**(e*ExpandToSum(v, x))*b + a)**n, x)
def With1979(F, G, H, a, b, c, d, e, f, g, h, n, r, s, t, x):
if isinstance(x, (int, Integer, float, Float)):
return False
m = FullSimplify((g*h*log(G) + s*t*log(H))/(d*e*log(F)))
if RationalQ(m):
return True
return False
def replacement1979(F, G, H, a, b, c, d, e, f, g, h, n, r, s, t, x):
m = FullSimplify((g*h*log(G) + s*t*log(H))/(d*e*log(F)))
return Dist(G**(-c*g*h/d + f*h)*H**(-c*s*t/d + r*t)*Denominator(m)/(d*e*log(F)), Subst(Int(x**(Numerator(m) + S(-1))*(a + b*x**Denominator(m))**n, x), x, F**(e*(c + d*x)/Denominator(m))), x)
def replacement1980(F, G, H, a, b, c, d, e, f, g, h, n, r, s, t, x):
return Dist(G**(h*(-c*g/d + f)), Int(H**(t*(r + s*x))*(b + F**(-e*(c + d*x))*a)**n, x), x)
def replacement1981(F, G, H, a, b, c, d, e, f, g, h, n, r, s, t, x):
return Int(G**(f*h)*G**(g*h*x)*H**(r*t)*H**(s*t*x)*(F**(c*e)*F**(d*e*x)*b + a)**n, x)
def replacement1982(F, G, H, a, b, c, d, e, f, g, h, n, r, s, t, x):
return Simp(G**(h*(f + g*x))*H**(t*(r + s*x))*a**n*Hypergeometric2F1(-n, (g*h*log(G) + s*t*log(H))/(d*e*log(F)), S(1) + (g*h*log(G) + s*t*log(H))/(d*e*log(F)), -F**(e*(c + d*x))*b/a)/(g*h*log(G) + s*t*log(H)), x)
def replacement1983(F, G, H, a, b, c, d, e, f, g, h, n, r, s, t, x):
return Simp(G**(h*(f + g*x))*H**(t*(r + s*x))*((F**(e*(c + d*x))*b + a)/a)**(-n)*(F**(e*(c + d*x))*b + a)**n*Hypergeometric2F1(-n, (g*h*log(G) + s*t*log(H))/(d*e*log(F)), S(1) + (g*h*log(G) + s*t*log(H))/(d*e*log(F)), -F**(e*(c + d*x))*b/a)/(g*h*log(G) + s*t*log(H)), x)
def replacement1984(F, G, H, a, b, e, h, n, t, u, v, w, x):
return Int(G**(h*ExpandToSum(u, x))*H**(t*ExpandToSum(w, x))*(F**(e*ExpandToSum(v, x))*b + a)**n, x)
def replacement1985(F, a, b, c, d, e, n, p, x):
return -Dist(a*n/(b*d*e*log(F)), Int(x**(n + S(-1))*(F**(e*(c + d*x))*b + a*x**n)**p, x), x) + Simp((F**(e*(c + d*x))*b + a*x**n)**(p + S(1))/(b*d*e*(p + S(1))*log(F)), x)
def replacement1986(F, a, b, c, d, e, m, n, p, x):
return -Dist(a*n/(b*d*e*log(F)), Int(x**(m + n + S(-1))*(F**(e*(c + d*x))*b + a*x**n)**p, x), x) - Dist(m/(b*d*e*(p + S(1))*log(F)), Int(x**(m + S(-1))*(F**(e*(c + d*x))*b + a*x**n)**(p + S(1)), x), x) + Simp(x**m*(F**(e*(c + d*x))*b + a*x**n)**(p + S(1))/(b*d*e*(p + S(1))*log(F)), x)
def With1987(F, a, b, c, f, g, m, u, v, x):
q = Rt(-S(4)*a*c + b**S(2), S(2))
return Dist(S(2)*c/q, Int((f + g*x)**m/(S(2)*F**u*c + b - q), x), x) - Dist(S(2)*c/q, Int((f + g*x)**m/(S(2)*F**u*c + b + q), x), x)
def With1988(F, a, b, c, f, g, m, u, v, x):
q = Rt(-S(4)*a*c + b**S(2), S(2))
return Dist(S(2)*c/q, Int(F**u*(f + g*x)**m/(S(2)*F**u*c + b - q), x), x) - Dist(S(2)*c/q, Int(F**u*(f + g*x)**m/(S(2)*F**u*c + b + q), x), x)
def With1989(F, a, b, c, f, g, h, i, m, u, v, x):
q = Rt(-S(4)*a*c + b**S(2), S(2))
return -Dist(-i + (-b*i + S(2)*c*h)/q, Int((f + g*x)**m/(S(2)*F**u*c + b + q), x), x) + Dist(i + (-b*i + S(2)*c*h)/q, Int((f + g*x)**m/(S(2)*F**u*c + b - q), x), x)
def With1990(F, a, b, c, d, m, v, x):
u = IntHide(S(1)/(F**v*b + F**(c + d*x)*a), x)
return -Dist(m, Int(u*x**(m + S(-1)), x), x) + Simp(u*x**m, x)
def replacement1991(F, a, b, c, u, v, w, x):
return Int(F**v*u/(F**(S(2)*v)*b + F**v*a + c), x)
def replacement1992(F, a, b, c, d, e, g, n, x):
return Int(ExpandIntegrand(F**(g*(d + e*x)**n), S(1)/(a + b*x + c*x**S(2)), x), x)
def replacement1993(F, a, c, d, e, g, n, x):
return Int(ExpandIntegrand(F**(g*(d + e*x)**n), S(1)/(a + c*x**S(2)), x), x)
def replacement1994(F, a, b, c, d, e, g, m, n, u, x):
return Int(ExpandIntegrand(F**(g*(d + e*x)**n), u**m/(a + b*x + c*x**S(2)), x), x)
def replacement1995(F, a, c, d, e, g, m, n, u, x):
return Int(ExpandIntegrand(F**(g*(d + e*x)**n), u**m/(a + c*x**S(2)), x), x)
def replacement1996(F, a, b, x):
return -Simp(sqrt(Pi)*Erf((-x**S(2)*sqrt(-b*log(F)) + sqrt(-a*log(F)))/x)*exp(-S(2)*sqrt(-a*log(F))*sqrt(-b*log(F)))/(S(4)*sqrt(-b*log(F))), x) + Simp(sqrt(Pi)*Erf((x**S(2)*sqrt(-b*log(F)) + sqrt(-a*log(F)))/x)*exp(S(2)*sqrt(-a*log(F))*sqrt(-b*log(F)))/(S(4)*sqrt(-b*log(F))), x)
def replacement1997(m, n, x):
return Dist(m, Int(x**(m + S(-1))*(x**m + exp(x))**n, x), x) + Int((x**m + exp(x))**(n + S(1)), x) - Simp((x**m + exp(x))**(n + S(1))/(n + S(1)), x)
def replacement1998(F, a, b, c, d, e, n, x):
return Dist(S(1)/(d*e*n*log(F)), Subst(Int(log(a + b*x)/x, x), x, (F**(e*(c + d*x)))**n), x)
def replacement1999(F, a, b, c, d, e, n, x):
return -Dist(b*d*e*n*log(F), Int(x*(F**(e*(c + d*x)))**n/(a + b*(F**(e*(c + d*x)))**n), x), x) + Simp(x*log(a + b*(F**(e*(c + d*x)))**n), x)
def replacement2000(F, a, n, u, v, x):
return Dist(F**(-n*v)*(F**v*a)**n, Int(F**(n*v)*u, x), x)
def With2001(u, x):
v = FunctionOfExponential(u, x)
return Dist(v/D(v, x), Subst(Int(FunctionOfExponentialFunction(u, x)/x, x), x, v), x)
def replacement2002(F, a, b, n, u, v, w, x):
return Int(F**(n*v)*u*(F**ExpandToSum(-v + w, x)*b + a)**n, x)
def replacement2003(F, G, a, b, n, u, v, w, x):
return Int(F**(n*v)*u*(a + b*exp(ExpandToSum(-v*log(F) + w*log(G), x)))**n, x)
def replacement2004(F, a, b, n, u, v, w, x):
return Dist(F**(-n*v)*(F**v*a + F**w*b)**n*(F**ExpandToSum(-v + w, x)*b + a)**(-n), Int(F**(n*v)*u*(F**ExpandToSum(-v + w, x)*b + a)**n, x), x)
def replacement2005(F, G, a, b, n, u, v, w, x):
return Dist(F**(-n*v)*(a + b*exp(ExpandToSum(-v*log(F) + w*log(G), x)))**(-n)*(F**v*a + G**w*b)**n, Int(F**(n*v)*u*(a + b*exp(ExpandToSum(-v*log(F) + w*log(G), x)))**n, x), x)
def replacement2006(F, G, u, v, w, x):
return Int(u*NormalizeIntegrand(exp(v*log(F) + w*log(G)), x), x)
def With2007(F, u, v, w, x, y):
if isinstance(x, (int, Integer, float, Float)):
return False
z = v*y/(D(u, x)*log(F))
if ZeroQ(-w*y + D(z, x)):
return True
return False
def replacement2007(F, u, v, w, x, y):
z = v*y/(D(u, x)*log(F))
return Simp(F**u*z, x)
def With2008(F, n, u, v, w, x):
if isinstance(x, (int, Integer, float, Float)):
return False
z = v*D(u, x)*log(F) + (n + S(1))*D(v, x)
if And(Equal(Exponent(w, x), Exponent(z, x)), ZeroQ(w*Coefficient(z, x, Exponent(z, x)) - z*Coefficient(w, x, Exponent(w, x)))):
return True
return False
def replacement2008(F, n, u, v, w, x):
z = v*D(u, x)*log(F) + (n + S(1))*D(v, x)
return Simp(F**u*v**(n + S(1))*Coefficient(w, x, Exponent(w, x))/Coefficient(z, x, Exponent(z, x)), x)
|
[Current questions concerning nutrition during pregnancy].
Maternal nutrition during pregnancy is known to influence the health state of the offspring during the whole lifetime. The paper discusses in details the sequelae of the imbalanced energy intake and the role of fats. Out of the micronutrients the effects of retinol, vitamins of the B-group, calcium, iron, iodine and magnesium are discussed and attention is called to the action of the high sodium intake. Finally, the principles of the nutritional recommendations in pregnancy are presented. |
Q:
Abort Ajax requests using jQuery
Is it possible that using jQuery, I cancel/abort an Ajax request that I have not yet received the response from?
A:
Most of the jQuery Ajax methods return an XMLHttpRequest (or the equivalent) object, so you can just use abort().
See the documentation:
abort Method (MSDN). Cancels the current HTTP request.
abort() (MDN). If the request has been sent already, this method will abort the request.
var xhr = $.ajax({
type: "POST",
url: "some.php",
data: "name=John&location=Boston",
success: function(msg){
alert( "Data Saved: " + msg );
}
});
//kill the request
xhr.abort()
UPDATE:
As of jQuery 1.5 the returned object is a wrapper for the native XMLHttpRequest object called jqXHR. This object appears to expose all of the native properties and methods so the above example still works. See The jqXHR Object (jQuery API documentation).
UPDATE 2:
As of jQuery 3, the ajax method now returns a promise with extra methods (like abort), so the above code still works, though the object being returned is not an xhr any more. See the 3.0 blog here.
UPDATE 3: xhr.abort() still works on jQuery 3.x. Don't assume the update 2 is correct. More info on jQuery Github repository.
A:
You can't recall the request but you can set a timeout value after which the response will be ignored. See this page for jquery AJAX options. I believe that your error callback will be called if the timeout period is exceeded. There is already a default timeout on every AJAX request.
You can also use the abort() method on the request object but, while it will cause the client to stop listening for the event, it may probably will not stop the server from processing it.
A:
It's an asynchronous request, meaning once it's sent it's out there.
In case your server is starting a very expensive operation due to the AJAX request, the best you can do is open your server to listen for cancel requests, and send a separate AJAX request notifying the server to stop whatever it's doing.
Otherwise, simply ignore the AJAX response.
|
It was great to get back to Texas. It was the first time my wife and I have been there since her army days, 25 years ago. We flew into San Antonio Friday afternoon, rented a car, and headed up to Marble Falls. Went to the Hotel first to get checked in, MaxGravy happened to just gotten back there, so we met up with him for the first time. Great to finally meet him in person, we have done FaceTime chats before, but nothing like an in person handshake with your business partner. Awesome to finally get to meet his better half Splunky as well.
After the meet and greet with them, we head out to Hidden Falls adventure park. First, we need to stop at Walmart for some coats because it is COLD in Texas! Who'd of thunk it? Found some nice Texas Longhorn jackets on clearence for 7 bucks, grabbed some beer and off we go. We get to Hidden Falls Adventure Park, and we get to meet Blue Angel, Stouttrout, and Midnight Crawler. Very nice to meet those guys. Got to check out some of the orginials of Blue Angels artwork, that was very impressive!
A little bit later, we head out for a few hours of wheeling. MaxGravy and I jumped in Stouttrouts Jeep, and the wives jumped in with Blue Angel. Very fun time! After a little while (and no tutorial ), Stouttrout handed over the wheel to me. I managed to keep the jeep on all 4 wheels! I drove for quite a while. I tried to get MaxGravy to drive, but he was way too chicken. We ended the evening up on top of the highest hill in the area to watch the sunset.
Headed back to the campsite where most everyone is staying (except us hotel campers), and Midnight Crawler was cooking burgers and kielbasi on the grill. Had dinner and a few beers, and headed back to the hotel. After getting up at 3am and traveling for 12 hrs, we were quite tired.
Got up Saturday morning, had breakfast at the hotel with MaxGravy and Splunky. Headed over to Hidden Falls and got ready for the soldiers to arrive. Very touching moment when they were unloading from the bus. Splunky went into pretty good detail about it in her post a few post up. We had lunch, then loaded up into Jeeps to head out for the day. I was in one of Stouttrouts Jeeps with his wife and my wife. His wife said she liked to ride more than drive, so i ended up driving all day, which was fine with me. Drove up, down, over, and inbetween some crazy stuff. Kept the jeep upright all day, so that was a plus . MaxGravy and Splunky went with Blue Angel and had a soldier in their jeep. It took Blue Angel several hours of badgering, but he finally got MaxGravy to drive for a brief period of time . I though Splunky was going to jump in my Jeep during that time! After about 5 hrs on the trails, we headed back to have dinner with the soldiers and their families. After dinner, they had the awards presentation, and drawings. Midnight Crawler presented MaxGravy and I with some very awesome plaques for our support of the organisation. I will get a picture added tomorrow. Randy made a brief speech (i'm not a public speaker ) about BullionStacker and it's members. Then it was time to hand out the BullionStacker bars that you guys so generously donated silver for. Unfortunately, some bars went unclaimed. Not sure if some of the soldiers weren't present during the annoucement or what. After that, we hung out and chatted with a few soldiers and thier families.
Sunday morning, we headed back to San Antonio for the day. Spent the day at the Riverwalk and The Alamo. Very nice area around there.
We had a great weekend, and cannot wait to go back next year. I hope some more of you guys will be able to make it out to the event, i'd love to meet more of you.
Getting to meet everyone was one of the greatest parts of this event. You guys are awesome. It felt like I had known you forever. I am so glad you had a good time. Next year maybe we can spend more time with each other. If there is still Ammo around, we will need to do a day of shooting.
I would like to share my experience. Seems like every year there is one person at the event that touches many lives. This year it my pleasure to ride with her. Her name was Pam. She was not a Warrior, she was not injured, but she did come on the bus from Brooke Army Medical Center (BAMC).
You have heard how Saturday began, but let me explain some of the back scenes stuff. We organized a special group of a a few Jeeps to take Jim Hatfield, our Sponsor from Northwest Dodge Jeep in Houston, Jeremy Komorn, our sponsor from 4wheelparts, and Billion Stacker out. We had empty seats and begin pulling from the rear of the line. I left about 2 or 3 seats empty in case we had a problem and needed to do move some over. On the way out, I saw a name tag on a lady that acted like she was going to jump in my jeep. The soldiers and families have different tags so I new she came on a bus. I stopped and asked if she wanted to ride with me in my empty seat. She said, "Really, sure! but I have two jeeps with me, can they follow? I said, "Absolutely" One of the Jeep had a 2 month old. So we headed out.
I asked her if she was military, thinking she was probably one of the nurses. It turned out, she was a mother and now a caregiver. She had identical twin sons and one was at BAMC. He was hit by a roadside IED and has lost both legs and will likely lose his arm. As she continued her story, she told me how hard he had worked to make it to the event. He has been in the hospital for 7 months and was supposed to be dismissed Wednesday before the event. Pam, his mother, had flown in to go with him to the event. After finding out he would not be released, they were extremely disappointed. The son told his mother, "YOU GO! Please." She reluctantly left. The cool thing is, her other son, the twin is serving at Fort Hood. He had hoped to see his mother and bother and showed up with two friends in Jeeps, the two that followed us. Both f her son's love Jeeps and both have plans to buy one. Hopefully one will be driving next year.
So far a great story, right, but it does not end there. Remember Jim Hatfield? Well Jim had one of our fine warriors with him. A young man we call Col. Dan. He was hit with a Roadside IED and lost both legs. He also has a Jeep and Jim had it outfitted very nicely and had all the controls put in it for him to drive. I took Pam back and introduced her to Jim and Dan. To see another young man like her son driving a Jeep and continuing his life really made her day. The stars sometimes fall into the right slots when we need them too. Oh yeah, and she drove. She drove through some HARD stuff too. I have a video I will post when it is done uploading.
Now that was just my experience with this Mother, Pam. While on the trail we did not thing but talk and laugh. I told her about Shane. Shane came to our event with the typical attitude they arrive in, not really wanting to be there but doing it for his family. He was busted up, had two little girls and wife Hilary with him. This was in 2011. They had a blast. WFTW changed his outlook on life and in 2012 they returned to volunteer and help with operations. Now, this year, he bought a jeep, well, he bought his wife a Jeep, and they returned at drivers. I meant to introduce Pam to Shane but the opportunity never arose. The event ended and Pam left. I was a little disappointed that I had missed that chance but I know we will see her son next year as he will be at BAMC for probably another 2.5 years in rehab.
Yesterday, I get home and Hilary had tagged me in a post. This is what it said,
"While at the table handing out tickets for the event I ran into a woman. She was clearly in distress and confused. I asked her what was wrong and she looked at me in the eye with a look I persoannly know all to well and said " I'm here because my son is in the hospital, he has been at bamc for the last 7 months, he saw this flyer and was so excited, the hospital said they would release him and he pushed so hard but they said he still needed more time to recover and couldn't go. He was upset so I came for him". With tears. Streaming down my face I asked "are his wounds combat related? What happened? ". She told me he was hit by a roadside bomb and lost both his legs at the knee and they are still trying to save his arm. I am crying at this point and so is she and Ashley (my bff). I composed myself and told Pam here is all my husbands information. You call us when your son is ready and we will make a trip out here just for him. I know several people with jeeps and we will make this happen for him. At the end of the event she found me and hugged me. She told me someone had told her about Shane and his healing thru wheeling and we shared a moment. So guys as soon as that soldier contacts us get ready to wheel up. I love you all so much and thank you for bringing my husband out of that dark nasty hole he was in, we have been thru so much the last 2.5 years and I know there are times when I couldn't have done it with out that damn jeep."
So in the end, once again the stars were in our favor. Looks like we will be doing a special trip for this soldier. I know Hilary and Shane very well and I know Hillary will not let this one slip. Of course it may be awhile before we get him offroad, but we do plan to take him for a few eat outs in Jeeps and go visit him.
I wanted to share this with you guys because you guys made this happen. This is not the only story like this. Everyone out there had an experience like this. Drivers and riders both shared time together that will make a difference is their life.
Take advantage of Mr Rebates and get cash back on tons of Internet purchases. It works, it really works!!! Hit the link below and you are on your way and you will also receive a $5 bonus for signing up.
I want to say a special thank you to my beautiful wonderful loving wife Brenda. She pre-cooked about 30 special meals for me so I could stay healthy on our trip. She drove me all the way to Texas and back, over 3500 miles! She supported me 100% on this trip and even when she sprained her ankle (taking a p in the woods in Texas, lol) she never complained once.
We've been married over 22 years and she is the love of my life, my very best friend. I can't imagine life without her. |
367 F.Supp.2d 919 (2005)
Donald R. MAYES, Plaintiff,
v.
Gregory A. MOORE, Smithfield Management Corporation, Smithfield Barbecue, Inc., Smithfield's of Gum Branch, Inc., Midatlantic Restaurant Corporation, Smithfield's of New Bern, Inc., Smithfield's of Ogden, Inc., Smithfield's of Zebulon, Inc., Smithfield's of Clayton, Inc., Smithfield's of Dunn, Inc., Smithfield's of Fayetteville, Inc., Defendants.
No. 1:04 CV 811.
United States District Court, M.D. North Carolina.
March 25, 2005.
*920 Curtis Scott Holmes, Durham, NC, for Plaintiff.
Marvin Schiller, David Garrett Schiller, Raleigh, NC, for Defendants.
MEMORANDUM OPINION and ORDER
OSTEEN, District Judge.
This matter is now before the court on Plaintiff's Motion to Remand and Motion to Strike. For the reasons stated herein, the court finds Smithfield's of Dunn, Inc. is a nominal party to the action. The court also finds it has jurisdiction pursuant to 28 U.S.C. §§ 1331 and 1367. Plaintiff's motion to remand the case to the General Court of Justice, Superior Court Division, Durham County, North Carolina, will be denied. Additionally, and for the reasons stated herein, the court finds the motion to strike is now moot.
I. BACKGROUND
Plaintiff Donald R. Mayes filed this action in Durham County Superior Court against eleven defendants: Gregory A. Moore ("Moore"), Smithfield Management Corporation ("SMC"), Smithfield Barbecue, Inc., Smithfield's of Gum Branch, Inc., Midatlantic Restaurant Corporation ("MRC"), Smithfield's of New Bern, Inc., Smithfield's of Ogden, Inc., Smithfield's of Zebulon, Inc., Smithfield's of Clayton, Inc., Smithfield's of Dunn, Inc. ("Smithfield's of Dunn"), and Smithfield's of Fayetteville, Inc. Plaintiff brings claims for sexual discrimination and retaliation in violation of Title VII of the Civil Rights Act of 1964, 42 U.S.C. §§ 2000e, et seq. He also brings state law claims for unfair and deceptive trade practices, wrongful discharge in violation of public policy, intentional infliction of emotional distress, and wrongful eviction.
Plaintiff asserts that from January 6, 2003, until his termination and eviction on February 9, 2003, he was employed by SMC as the chief financial officer for SMC and its subsidiaries, and also by Moore, the chief executive officer of SMC, as Moore's personal assistant and estate manager. Plaintiff Mayes alleges that he responded to an advertisement "for the position of Chief Financial Officer at SMC and another advertisement for estate manager." (Compl.¶ 19.) He then met with Defendant Moore "who indicated a need for a personal assistant, an estate manager, and someone to handle his personal finances." (Id. ¶ 20.) All acts of which Plaintiff Mayes complains were committed against him by Defendant Moore. Mayes claims that it was Moore who sexually harassed him, wrongfully terminated him, treated him with willful or wanton disregard for his rights, and wrongfully evicted him from the residence Moore owned in Cary, North Carolina.
Mayes brings these claims against the additional nine defendants, who did not employ him, on the basis of his belief that the other corporations are "instrumentalities" of SMC and that Moore owns a controlling interest in those companies. (Id. ¶¶ 2, 4-13.) Plaintiff alleges that as chief financial officer, he "reviewed and prepared documents for all of the individual Defendant corporations." (Id. ¶ 14.) Mayes does not allege that he was an employee of or a lessor of property owned by these other defendants.
After the complaint was served, a notice of removal was timely filed that purported to represent the interests of all defendants. However, just before the notice of removal was filed, one defendant, Smithfield's *921 of Dunn, answered the complaint in state court.
Plaintiff alleges that Defendant Moore controls Smithfield's of Dunn and that the "corporation is an instrumentality of SMC." (Id. ¶ 12.) However, in opposing Plaintiff's Motion to Remand, all defendants except Smithfield's of Dunn ("Removing Defendants") submit affidavits to show that they have no relationship with Smithfield's of Dunn, and that neither Defendant Moore nor Defendant SMC has ever been an owner or officer of Smithfield's of Dunn. (R. Massengill Aff. ¶¶ 3, 5-7.) Smithfield's of Dunn was incorporated under a franchise agreement between MRC[1] and an unrelated party to this action, Dale Massengill, who was the sole shareholder and director until his death in August 1998. (Id. ¶ 3.) After Massengill's death, SMC[2] operated the store on behalf of the estate until June 30, 1999. (Id. ¶ 8.) In 1999, all assets owned by Smithfield's of Dunn were sold to another corporation, 421 Harnett, Inc.[3] (Id. ¶ 10.) Smithfield's of Dunn has done no business since February 3, 1999, and all of its assets were disbursed as provided in Dale Massengill's will. (Id. ¶¶ 11-13.)
II. MOTION TO REMAND
The parties agree that, if properly removed, the court would have original jurisdiction over this case pursuant to 28 U.S.C. §§ 1331 and 1367. The court agrees with this contention. The parties disagree over whether removal was properly effected. Plaintiff contends that there was a defect in the removal procedure because Smithfield's of Dunn did not consent to removal, so the court must now remand the case. The Removing Defendants counter that Smithfield's of Dunn is a nominal party, and its consent was not required to effect removal.
The proper procedure for removal requires that "defendants desiring to remove any civil action ... from a State court shall file... a notice of removal signed pursuant to Rule 11 of the Federal Rules of Civil Procedure." 28 U.S.C. § 1446(a). All defendants must join in a notice of removal. See Perpetual Bldg. & Loan Ass'n v. Series Dirs. of Equitable Bldg. & Loan Ass'n, 217 F.2d 1, 6 (4th Cir.1954); Freeman v. Bechtel, 936 F.Supp. 320, 325 (M.D.N.C.1996).
This "rule of unanimity" allows an exception for "nominal" or "formal" parties, whose consent is not required. Egle Nursing Home, Inc. v. Erie Ins. Group, 981 F.Supp. 932, 933 (D.Md.1997). A nominal or formal party has been described as one "with no assets or one that does not actively engage in business," id., or as one *922 against whom "no reasonable basis [exists] for predicting that it will be held liable," Shaw v. Dow Brands, Inc., 994 F.2d 364, 369 (7th Cir.1993). For example, in Shaw v. Dow Brands, Inc., a products liability action, the parent corporation was a nominal party because it had "no connection with the manufacture, sale or distribution" of the product and was joined in the action "solely because of the acts of its subsidiary." Id.
Another test for determining whether a party is nominal is "whether in the absence of the [defendant], the Court can enter a final judgment consistent with equity and good conscience which would not be in any way unfair or inequitable to plaintiff." Tri-Cities Newspapers, Inc. v. Tri-Cities Printing Pressmen & Assistants' Local 349, 427 F.2d 325, 327 (5th Cir.1970) (internal quotations and citations omitted). Under this test, the "bottom line concern ... is whether the plaintiff can establish a cause of action against the nonremoving defendant in state court." Farias v. Bexar County Bd. of Trs. for Mental Health Mental Retardation Servs., 925 F.2d 866, 871-72 (5th Cir.1991). Whether a party is nominal requires exploration into the facts of each case. Tri-Cities Newspapers, Inc., 427 F.2d at 327.
Applying either of these tests to Smithfield's of Dunn shows that it is a nominal party to this action. During the time of Plaintiff's employment in January and February of 2003, Smithfield's of Dunn did no business and held no assets. The corporation had no connection with Plaintiff's hiring, termination, eviction, or the conditions of his employment. It appears that this Defendant was named in the suit only because it continues to exist as a corporation entitled to do business in the state of North Carolina and continues to bear the "Smithfield's" name. There appears to be no basis for imputing any liability to this corporation.[4]
Alternatively, if Smithfield's of Dunn is dismissed from this suit, a final judgment could still be rendered in favor of Plaintiff Mayes that would be fair and equitable to him. Under the facts of this case, Mayes could establish no cause of action against Smithfield's of Dunn. The company performed no actions which injured Plaintiff, did not employ Plaintiff, did not provide Plaintiff with housing, did not employ the persons who allegedly injured him, and otherwise owed him no duty. This court can see no legal theory under which Plaintiff could recover against Defendant Smithfield's of Dunn under the facts alleged.
Because Smithfield's of Dunn is only a nominal party to this suit, its consent was not needed to remove the case. Thus, removal was proper and this court has original jurisdiction pursuant to 28 U.S.C. §§ 1331 and 1367.
III. MOTION TO STRIKE
At a hearing held December 20, 2004, the court ordered the Removing Defendants *923 to submit affidavits and other documents by January 7, 2005, in support of their argument that Defendant Smithfield's of Dunn was a nominal party. On January 7, 2005, Removing Defendants submitted a Motion to Extend Time to File a Memorandum of Law and Supporting Documentation, asking to extend the January 7, 2005, deadline to January 10, 2005, because of problems acquiring affidavits from people outside the Removing Defendants' control, the holiday schedule, and problems acquiring documents that were several years old. The court granted the motion and the Removing Defendants filed their documents and memorandum on January 10. Before receiving notice that the court had granted this motion, Plaintiff filed a Motion to Strike the late filings on the ground that they were filed without an extension granted by the court. Because the court did, in fact, grant the extension, Plaintiff's motion is now moot and will be denied.
IV. CONCLUSION
For the reasons set forth above,
IT IS ORDERED that Plaintiff's Motion to Remand [10] is DENIED.
IT IS FURTHER ORDERED that Plaintiff's Motion to Strike [33] is DENIED AS MOOT.
NOTES
[1] MRC is the franchisor for Smithfield's Chicken `N Bar-B-Q restaurant concept. (Barringer Aff. ¶ 5.)
[2] SMC contracts with some of the corporations that operate Smithfield's Chicken `N Bar-B-Q restaurants to provide administrative support services, such as payroll, bookkeeping, compliance, and personnel services. (Moore Aff. ¶¶ 5-6.) In the event a franchisee is terminated or dies, SMC has the power to take over operations at the franchised restaurant. (Id. ¶ 9.) Defendant Moore is the president and sole shareholder of SMC. (Id. ¶ 2.)
[3] Defendant Moore was the sole stockholder of 421 Harnett, Inc. when it purchased all assets of Smithfield's of Dunn. (Moore Aff. ¶ 21.) The sale price was "One Dollar and other good and valuable consideration, and the mutual promises and covenants herein contained." (R. Massengill Aff. Ex. B.) In its state court answer, Smithfield's of Dunn alleges that it disclosed information about this sale to Plaintiff's attorney. (Answer ¶ 53.) On December 20, 2002, 421 Harnett, Inc. conveyed these assets to D & A Foods, Inc., a corporation owned by David Harris. D & A Foods, Inc. owned these assets during Plaintiff's employment with SMC and Moore. (Moore Aff. ¶¶ 22-23.)
[4] Plaintiff incorrectly argues that because Defendant Moore owned 421 Harnett, Inc., the corporation that purchased Smithfield's of Dunn's assets in 1999, Moore somehow continues to control Smithfield's of Dunn. (Reply Defs.' Mem. Law Response Pl.'s Mot. Remand at 5.) In fact, there has been no showing that Defendant Moore has any legal connection to Smithfield's of Dunn, other than his relationship with SMC and its power to take over operations of a restaurant after the franchisee's death. This is not enough to hold Smithfield's of Dunn, the corporation, liable for any of the acts of which Plaintiff now complains. Defendant Moore may continue to exert some control over the restaurant operating in Dunn, North Carolina, which the Plaintiff remains entitled to prove, but there is no evidence that he has any control over or any interest in that restaurant's former owner, Smithfield's of Dunn.
|
Tour Type
Nature of Trips
About the Activity:Take an adventurous Gulet cruise tour to explore the Mediterranean Sea starting from Fethiye, Turkey.The cruise is for 4 days and ends at Olympos. Cruise around, stopping at charming coastal villages and picturesque bays along the way. Go swimming and ... |
/*
* $Id: cro_conv.c,v 1.1 2009-04-08 23:25:41 fred Exp $
*/
/*
* File: cro_conv.c
*
* Author: Fred Clare
* National Center for Atmospheric Research
* PO 3000, Boulder, Colorado
*
* Date: Fri Mar 7 11:55:16 MST 2008
*
* Description: These are the conversion routines that convert
* raw input data coming in from GKS to their
* device dependent formats. These routines assume
* sufficient space exists in the destination list.
*/
#include <stdio.h>
#include "gksc.h"
#include "cro.h"
#include "croddi.h"
#include "cro_device.h"
/*ARGSUSED*/
void cro_ConvPoints(GKSC_Ptr ddp, float *rawx, float *rawy,
Points *points, int *n, int conv)
{
CROddp *psa = (CROddp *) ddp;
CROPoint *cro_point_ptr = (CROPoint *) points->list;
int index = points->num;
int i;
if (conv == RAW_TO_COOKED) {
for (i=0; i<*n; index++, i++) {
cro_point_ptr[index].x =
( ( (psa->transform).x_scale * rawx[i]) + (psa->transform).x_trans);
cro_point_ptr[index].y =
( ( (psa->transform).y_scale * rawy[i]) + (psa->transform).y_trans);
}
points->num = index;
}
else {
for (i=0; i<*n; i++) {
rawx[i] = (cro_point_ptr[i].x-(psa->transform).x_trans) /
(psa->transform).x_scale;
rawy[i] = (cro_point_ptr[i].y-(psa->transform).y_trans) /
(psa->transform).y_scale;
}
}
}
/*ARGSUSED*/
void cro_ConvString(GKSC_Ptr ddp, int *raw, String *string, int *n, int conv) {
char *s = (char *) string->list;
int index = string->num;
int i;
if (conv == RAW_TO_COOKED) {
for (i=0; i<*n; i++, index++) {
s[index] = raw[i];
}
s[index] = '\0';
string->num = index;
}
else {
for (i=0; i<*n; i++) {
raw[i] = s[i];
}
}
}
/*ARGSUSED*/
void cro_ConvInts(ddp, raw, ints, n, conv)
GKSC_Ptr ddp;
int *raw;
Ints *ints;
int *n;
int conv;
{
int *iptr = (int *) ints->list;
int index = ints->num;
int i;
if (conv == RAW_TO_COOKED) {
for (i=0; i<*n; i++, index++) {
iptr[index] = raw[i];
}
ints->num = index;
}
else {
for (i=0; i<*n; i++) {
raw[i] = iptr[i];
}
}
}
/*ARGSUSED*/
void cro_ConvFloats(ddp, raw, floats, n, conv)
GKSC_Ptr ddp;
float *raw;
Floats *floats;
int *n;
int conv;
{
float *fptr = (float *) floats->list;
int index = floats->num;
int i;
if (conv == RAW_TO_COOKED) {
for (i=0; i<*n; index++, i++) {
fptr[index] = raw[i];
}
floats->num = index;
}
else {
for (i=0; i<*n; i++) {
raw[i] = fptr[i];
}
}
}
/*ARGSUSED*/
void cro_ConvIndexes(ddp, raw, indexes, n, conv)
GKSC_Ptr ddp;
int *raw;
Indexes *indexes;
int *n;
int conv;
{
int *ind = (int *) indexes->list;
int index = indexes->num;
int i;
if (conv == RAW_TO_COOKED) {
for (i=0; i<*n; index++, i++) {
ind[index] = raw[i];
}
indexes->num = index;
}
else {
for (i=0; i<*n; i++) {
raw[i] = ind[i];
}
}
}
/*ARGSUSED*/
void cro_ConvRGBs(ddp, raw, rgbs, n, conv)
GKSC_Ptr ddp;
float *raw;
RGBs *rgbs;
int *n;
int conv;
{
CROColor *color = (CROColor *) rgbs->list;
int index = rgbs->num;
int i;
if (conv == RAW_TO_COOKED) {
for (i=0; i<*n; i +=3, index++) {
color[index].r = raw[ i];
color[index].g = raw[i+1];
color[index].b = raw[i+2];
}
rgbs->num = index;
}
else {
for (index=0, i=0; i<*n; i +=3, index++) {
raw[ i] = color[index].r;
raw[i+1] = color[index].g;
raw[i+2] = color[index].b;
}
/*
* on exit, *n is the number of elements written into
* the raw array.
*/
*n = i;
}
}
|
Biopharma CMO Market’s Recent Downturn Could be Short-Lived
Biopharmaceutical CMOs have seen their business slowly shrink as companies seek less volume and smaller batches, but outsourcing is expected to increase over the next three years.
The market for biopharma CMOs seems to have peaked in 2008. The number of development projects on protein, monoclonal antibodies and other biologics and APIs made recombinantly fell by 26% between 2007 and 2011, William Downey, president of HighTech Business Decisions, said in a session on the biopharma CMO market at Informex in Anaheim, Calif.
“A number of preclinical and Phase I trials were shelved during the economic downturn,” and fewer biopharma CMOs are entering the market as some have even outsourced their production facilities to larger companies looking to do their own manufacturing, Downey said. He noted that Lonza has had to recently cut some of its prices as smaller CMOs have won more business.
HighTech conducted two reports on biopharma CMOs, which are mainly separated by the ones who produce APIs, such as Lonza, and those that fill and finish and don’t have any fermentation or cell culture capabilities. The main challenges for fill-and-finish CMOs are driven by price competition, while for API CMOs it’s production liability.
The reports found a decline in CMO business at the same time as biologic sales grew at an increasingly faster rate over the last five years and regulatory approvals grew consistently in the late 2000s but tapered off over the past few years.
“There aren’t as many biotech companies as CMOs might think there are,” Downey said, noting that there isn’t currently a verified tally, but it’s less than the 3,000 companies that some CMOs might assume there to be.
In a survey of what biopharma companies are looking for in a CMO, Downey found they’re primarily seeking:
Additional analytical services;
Conjugation services;
High yield expression systems; and
Increased formulation.
These requests come as yields in microbial productivity in Phase 3 material are down for CMOs, but up for biopharma companies producing their own products, which Downey said is “great for consumers but bad for CMOs, especially the ones that sell on a per-batch basis.”
However, he said the biopharma CMO industry has a number of optimistic and positive trends, with outsourcing budgets expected to increase to almost 70% of some companies’ manufacturing budgets by 2016. Biotech companies with more than one biomanufacturing site, however, are only expected to devote 31% of their manufacturing budgets to outsourcing by 2016.
Outsourcing in Low-Cost Regions
But even though outsourcing budgets are expected to increase in the near future, it seems biopharma companies are not going to stick with familiar companies as opposed to those in low-cost regions.
In terms of outsourcing to low-cost regions, such as China, India and eastern Europe, 54% of biopharma managers said they would not consider it, while 29% said they would, and 15% said they would only if it was necessary for entering a new market, according to a recent survey conducted by HighTech.
And whereas 10 years ago many of the companies that refused to go to low-cost regions cited IP protections as their biggest issues, now companies say that cost and time difference is what is driving them away.
Other challenges to outsourcing to low-cost regions, listed in descending order of importance include:
Communication and language barriers;
Regional experience;
Quality;
Experience and technical ability;
Cultural differences; and
Manpower to deal with oversight.
This content is copyright protected
However, if you would like to share the information in this article, you may use the headline, summary and link below: |
1. Field of the Invention:
The present invention relates to apparatus and a method for processing excess sludge which is necessarily generated in and sent out of various sewage treatment plants as a result of processing of sewage water such as industrial effluent, discharges from homes or the like, using micro-organisms.
2. Background of the Prior Art:
The process of eliminating water polluting materials such as BOD, or COD contained in sewage water, by oxidatively decomposing them with micro-organisms, includes the activated sludge method, trickling filter method and the catalytic oxidation method. It is well known that excess sludge is produced according to the purification process and deposited on, for example, the bottom of a tank of the processing unit. If the excess sludge is left as it deposited, purification performance of the treating equipment is lowered, eventually resulting in incapability of the equipment. Accordingly, it is essential to remove the excess sludge out of the tank and process it.
Hitherto, there have been proposed several ways to process the deposited sludge, e.g., a method in which sludge is dewatered, dried and incinerated; a method in which dewatered sludege is buried under the ground or dumped into the ocean; a method in which dewatered sludge is made into compost to be effectively utilized as fertilizer, or a method in which sludge is quantitatively reduced by digestion with anaerobic bacteria, and others.
In the above known methods, however, there are serious drawbacks in that there is high equipment cost and also a fuel cost in the first method of dewatering, drying and incinerating the sludge. High transportation cost is incurred in the second method of burying the sludge under the ground because a large amount of sludge must be carried to the dumping site, and moreover it is rather difficult to get an extensive dumping site. Likewise, in the third method of dumping the sludge into the ocean, there is a drawback of transportation cost and moreover it raises the problem of ocean pollution. In the fourth method of utilizing the sludge by transforming it into compost, there is a drawback in that a high construction cost of processing facilities is required; and another drawback is that the utility of sludge transformed into the compost is lower than that of chemical fertilizer industrially produced.
On the other hand, in the method of reducing the quantity of sludge, utilizing digestion by anaerobic bacteria, processing equipment of rather simple construction can be used and its operation is also relatively simple, and therefore this method has been traditionally adopted in the typical sludge treatment process in sewage plants. In this method, however, it takes long for the sludge to be treated, e.g., over 6 to 8 months, because it is bacteria that carries out the treatment in the form of micro-biological decomposition. Accordingly, this method also results in a high construction cost for the treating equipment since a large scale processing facility is essential for the purpose of carrying out large-scale treatment. Moreover, during the period of digestion of sludge by the anaerobic bacteria, methane gas is continuously generated, and during the period of acidity reduction, large amount of offensive malodorous gases such as hydroxide, mercaptan, indole, etc. is generated. Accordingly, routine operation control of the processing facility is very important and troublesome. Besides, organic material of high concentration is contained in supernatant liquer left after the sludge treatment, and therefore a further problem exists in that some secondary process has to be applied to this supernatant liqueur. |
/******************************************************************************
* Copyright 2018 The Apollo Authors. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*****************************************************************************/
#ifndef TOOLS_CVT_MONITOR_RENDERABLE_MESSAGE_H_
#define TOOLS_CVT_MONITOR_RENDERABLE_MESSAGE_H_
#include <string>
class Screen;
class RenderableMessage {
public:
static constexpr int FrameRatio_Precision = 2;
explicit RenderableMessage(RenderableMessage* parent = nullptr,
int line_no = 0)
: line_no_(line_no),
pages_(1),
page_index_(0),
page_item_count_(24),
parent_(parent),
frame_ratio_(0.0) {}
virtual ~RenderableMessage() { parent_ = nullptr; }
virtual int Render(const Screen* s, int key) = 0;
virtual RenderableMessage* Child(int /* line_no */) const = 0;
virtual double frame_ratio(void) { return frame_ratio_; }
RenderableMessage* parent(void) const { return parent_; }
void set_parent(RenderableMessage* parent) {
if (parent == parent_) {
return;
}
parent_ = parent;
}
int page_item_count(void) const { return page_item_count_; }
protected:
int* line_no(void) { return &line_no_; }
void set_line_no(int line_no) { line_no_ = line_no; }
void reset_line_page(void) {
line_no_ = 0;
page_index_ = 0;
}
void SplitPages(int key);
int line_no_;
int pages_;
int page_index_;
int page_item_count_;
RenderableMessage* parent_;
double frame_ratio_;
friend class Screen;
}; // RenderableMessage
#endif // TOOLS_CVT_MONITOR_RENDERABLE_MESSAGE_H_
|
Soaring U.S. Wind Power Sector Growing Nervous Over Tax Incentives
The US wind power sector is soaring thanks in large part to a tax policy that makes it attractive to investors, but the uncertainty surrounding those very incentives is casting a cloud over the future, according to the American Wind Energy Association (AWEA).
In the quarter to the end of September, a total of 1,204MW of wind capacity was installed across the US, taking new capacity installations for the year to date to 3,360MW – up 74% percent year on year – and the industry total to 43,461 MW, representing some 20% percent of global capacity, AWEA said Tuesday presenting its latest data.
With the fourth quarter set to be even bigger than normal, AWEA said total new installations for the year could be between 6,500MW and 7,500MW with developers rushing to get projects under construction as the deadline nears under the crucial Production Tax Credit (PTC) programme.
This compares with a total of 5,217MW last year, which was bolstered by a fourth quarter that accounted for 3,296MW of projects.
“We are hearing very strongly from our members that we need to keep the tax credit going,” said a spokesman for the association.
“The PTC is our top priority. We have always had bipartisan support for that policy. It was started by Republicans in Congress, some of whom are still there and pushing for it ... The challenge of course right now in Washington ... is to get any action or vehicles to move,” he told a phone-in web presentation, adding that he was optimistic there would eventually be some movement on the issue.
Statistics issued by AWEA show that the third quarter of the year was the busiest three months since 2008 and the third most active quarter on record.
Overall, there are 90 projects under construction in 29 states, totalling 8,400MW of capacity and ranging from single turbine installations to those with several hundred.
AWEA said that, because of the number of projects in the pipeline – in part in response to the looming demise of the PTC, which is currently due to expire at the end of 2012 – it expected next year to also be active.
But the picture for 2013 was shrouded in uncertainty, AWEA said.
“We understand that many developers are not necessarily scheduling projects for the year, waiting to see if there is a Production Tax Credit in place for the year 2013,” an AWEA spokeswoman added. |
Q:
Select a row from MySQL table based on its order
I am trying to grab a specific row from a MySQL table based on its position. Let's say I have these records:
+-------------------+
| ID | Data |
+--------+----------+
| 1 | Apple |
| 2 | Orange |
| 3 | Kiwi |
| 4 | Lobster |
| 25 | Chicken |
| 26 | Banana | <----
| 27 | Melon |
+--------+----------+
Now, I want to grab the 6th record from this table, but I don't know what the ID is, or what the Data column contains. All I know is that it is the 6th record in the table. How would I go about this?
A:
Couldn't you use use the LIMIT clause:
SELECT ID, Data
FROM TABLE
LIMIT 5,1
Here's a SQLFiddle.
|
With technological advances, entertainment systems are becoming more sophisticated. For example, watching television originated as a passive activity, where a television set was simply tuned into a particular channel and the viewer watched whatever program was currently being broadcast. Now, with digital television, interactive and/or personalized services can be accessed via a television as well. For example, a television advertisement may include a link that can be selected to launch an application (e.g., a Web site, a digital video recorder scheduling application, etc.).
Personalized services provide another level of sophistication that can be implemented within an entertainment system. A favorite channel list is one example of such a personalized service. Some entertainment systems, such as a television with a digital cable television receiver that is configured to also provide Internet access may also provide access to Internet-based personalized services. Personalized services are common via the Internet, examples of which may include my.msn.com, my.yahoo.com, etc., but may also be provided, for example, by a cable television operator. Personalized services are typically associated with a particular user, which corresponds to an individual's Internet account. Such accounts are typically not shared among multiple individuals, so personalizing services based on an individual Internet account works well.
Enabling access to such personalized services via a television based system, however, poses a problem. Televisions are typically shared by several people within a household. Because television systems typically don't require a user to login to an account, it is more difficult to access personalized services via a shared television system.
One solution may be to require that a television viewer login so that a specific television viewer can be determined. Login on a personal computer is easy with a keyboard, and inputs can be easily masked to provide a level of security. Login via a television remote control device is much more difficult because of the limited number of available input buttons. Furthermore, masking the input is more difficult than via a computer-based user interface. Schemes for entering alphabetic characters and symbols such as on-screen keyboards and triple-tap typing involve showing the characters on screen so that the user can choose which character to add, which prevents effective character masking and allows others watching the television display to see the characters being entered. If logging into a television-based personal account is difficult, viewers will be much less likely to utilize personalized services that may be available through television viewing.
Accordingly, a need exists for an easier, secure way to authenticate a single user of an entertainment system so that personalized data can be presented via the entertainment system. |
Q:
I can't clear the listview in my fragment before populating it again?
NOTE :
First of all before writing any thing. this is not a duplicate because if it is then why I will post this here. I didn't find any of the stackoverflow similar questions' answers helpful to me at all for 2 days straight.
THE PROBLEM :
I have an activity that takes two fields of data and then go to the next activity where it has a view pager and the activity opens 2 fragments the posts and the profile. the problem here is that when I go back to the first activity to input different data and go to the fragments the listview shows duplicate data.
I tried every possible solution but none works.
I tried to clear adapter.
I tried to pass empty adapter.
I tried more things in the life cycle of the fragment but nothing.
so please I need help. thanks in advance.
package psychrating.psychrating;
import android.content.Context;
import android.content.Intent;
import android.os.Bundle;
import android.support.annotation.Nullable;
import android.support.v4.app.Fragment;
import android.util.Log;
import android.view.LayoutInflater;
import android.view.View;
import android.view.ViewGroup;
import android.widget.AdapterView;
import android.widget.ListView;
import android.widget.SearchView;
import android.widget.Spinner;
import android.widget.Toast;
import java.util.ArrayList;
/**
* Created by Ahmeed on 8/7/2017.
*/
public class PostsFragment extends Fragment {
static ListView posts_list;
Spinner list_order;
SearchView search;
String category, date, activity;
boolean get_data;
public static ArrayList<String> data = null;
static Context c;
transient ViewHolder holder;
@Nullable
@Override
public View onCreateView(LayoutInflater inflater, @Nullable ViewGroup container, @Nullable Bundle savedInstanceState) {
data = null;
activity = getArguments().getString("activity");
category = getArguments().getString("category");
date = getArguments().getString("date");
if (activity == "main") {
// get_data = true;
}else {
// get_data = true;
}
View view = inflater.inflate(R.layout.post_tab, container, false);
init(view);
posts_list.clearChoices();
if (searchResultses != null) {
searchResultses.clear();
searchResultses = null;
}
return view;
}
private void init(View view) {
posts_list = (ListView) view.findViewById(R.id.posts_list);
list_order = (Spinner) view.findViewById(R.id.list_order);
search = (SearchView) view.findViewById(R.id.search);
posts_list.setOnItemClickListener(new AdapterView.OnItemClickListener() {
public void onItemClick(AdapterView<?> parent, View view, int position, long id) {
holder = (ViewHolder) view.getTag();
Temp temp = new Temp();
temp.name = holder.name.getText().toString();
temp.highest = holder.highest.getText().toString();
temp.dname = holder.dname.getText().toString();
temp.date = holder.date.getText().toString();
temp.category = holder.category;
temp.sdesc = holder.sdesc;
temp.ddesc = holder.ddesc;
Intent i = new Intent(c, ProfileActivity.class);
i.putExtra("holder", temp);
startActivity(i);
}
});
}
@Override
public void onAttach(Context context) {
super.onAttach(context);
c = context;
}
@Override
public void onResume() {
super.onResume();
searchResultses = new ArrayList<>();
new Server(this.getActivity(), "posts").execute(category, date);
}
public static final String TAG ="ahmed";
static void removeCommas() {
StringBuilder word = new StringBuilder();
for (int i = 0; i < data.size(); i++) {
for (int j = 0; j < data.get(i).length(); j++) {
char c = data.get(i).charAt(j);
if (c != ',') {
word.append(c);
}else {
words.add(word.toString());
word.delete(0, word.length());
}
}
}
}
@Override
public void onPause() {
super.onPause();
searchResultses = null;
adapter = null;
}
@Override
public void onDestroyView() {
super.onDestroyView();
}
static void addToClass() {
SearchResults s;
int offset = 0;
for (int j = 0; j < words.size(); j += 8) {
Log.d(TAG, String.valueOf(words.size()));
s = new SearchResults();
for (int i = 0; i < 8; i++) {
offset = 1;
s.add(words.get(i * offset));
}
offset += 1;
s.init();
searchResultses.add(s);
}
}
static ArrayList<SearchResults> searchResultses = null;
static ArrayList<String> words = new ArrayList<>();
static MyCustomBaseAdapter adapter = null;
public static void fillList() {
removeCommas();
addToClass();
ArrayList<SearchResults> empty = new ArrayList<>();
adapter = new MyCustomBaseAdapter(c, empty);
adapter = new MyCustomBaseAdapter(c, searchResultses);
posts_list.setAdapter(adapter);
}
}
NOTE:
the fillList is a func that is being called by the asynctask when it finished retrieving data . which use the data variable and remove commas from data and add words to searchResult class
package psychrating.psychrating;
import android.content.Context;
import android.view.LayoutInflater;
import android.view.View;
import android.view.ViewGroup;
import android.widget.ArrayAdapter;
import android.widget.BaseAdapter;
import android.widget.TextView;
import java.io.Serializable;
import java.util.ArrayList;
/**
* Created by Ahmeed on 8/10/2017.
*/
public class MyCustomBaseAdapter extends BaseAdapter {
private static ArrayList<SearchResults> searchArrayList = null;
private LayoutInflater mInflater;
public MyCustomBaseAdapter(Context context, ArrayList<SearchResults> results) {
super();
searchArrayList = results;
mInflater = LayoutInflater.from(context);
}
public int getCount() {
return searchArrayList.size();
}
public Object getItem(int position) {
return searchArrayList.get(position);
}
public long getItemId(int position) {
return position;
}
public View getView(int position, View convertView, ViewGroup parent) {
ViewHolder holder;
if (convertView == null) {
convertView = mInflater.inflate(R.layout.row, parent, false);
holder = new ViewHolder(convertView);
convertView.setTag(holder);
} else {
holder = (ViewHolder) convertView.getTag();
}
holder.name.setText(searchArrayList.get(position).getName());
holder.highest.setText(searchArrayList.get(position).getHighest());
holder.dname.setText(searchArrayList.get(position).getDName());
holder.date.setText(searchArrayList.get(position).getDate());
holder.category = searchArrayList.get(position).getCategory();
holder.sdesc = searchArrayList.get(position).getSdesc();
holder.ddesc = searchArrayList.get(position).getDdesc();
convertView.setTag(holder);
return convertView;
}
}
Server class
package psychrating.psychrating;
import android.app.ProgressDialog;
import android.content.Context;
import android.content.DialogInterface;
import android.content.Intent;
import android.os.AsyncTask;
import android.os.Build;
import android.support.v7.app.AlertDialog;
import android.util.Log;
import android.widget.Toast;
import java.io.BufferedReader;
import java.io.BufferedWriter;
import java.io.IOException;
import java.io.InputStreamReader;
import java.io.OutputStreamWriter;
import java.net.HttpURLConnection;
import java.net.URL;
import java.util.ArrayList;
/**
* Created by Ahmeed on 8/6/2017.
*/
public class Server extends AsyncTask<String, String, String> {
private Context context;
private ProgressDialog progressDialog;
private AlertDialog.Builder builder;
private String type;
private static ArrayList<String> data = null;
Server(Context context, String type) {
this.context = context;
this.type = type;
}
private void createPreDialog(String message) {
progressDialog = new ProgressDialog(context);
progressDialog.setMessage(message);
progressDialog.setCancelable(false);
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.LOLLIPOP) {
progressDialog.create();
}
progressDialog.show();
}
@Override
protected void onPreExecute() {
super.onPreExecute();
createPreDialog("hold on");
}
@Override
protected String doInBackground(String... params) {
switch (type) {
case "login":
String personName = params[0];
String personEmail = params[1];
String id = params[2];
//
OutputStreamWriter outputStreamWriter = null;
BufferedWriter writer = null;
BufferedReader bufferedReader = null;
HttpURLConnection connection = null;
String line;
String result = null;
try {
URL url = new URL("http://192.168.1.64/blabla/sign_in.php");
connection = (HttpURLConnection) url.openConnection();
connection.setRequestMethod("POST");
connection.setDoOutput(true);
connection.setDoInput(true);
connection.setConnectTimeout(8000);
outputStreamWriter = new OutputStreamWriter(connection.getOutputStream(), "UTF-8");
writer = new BufferedWriter(outputStreamWriter);
String parameters = "name=" + personName + "&email=" + personEmail + "&id=" + id;
writer.write(parameters);
writer.flush();
if (connection.getResponseCode() == 200) {
bufferedReader = new BufferedReader(new InputStreamReader(connection.getInputStream()));
while ((line = bufferedReader.readLine()) != null) {
result = line;
}
} else {
result = "Server Error";
}
} catch (IOException e) {
e.printStackTrace();
} finally {
try {
if (outputStreamWriter != null) {
outputStreamWriter.close();
}
if (connection != null) {
connection.disconnect();
}
if (bufferedReader != null) {
bufferedReader.close();
}
if (writer != null) {
writer.close();
}
} catch (IOException e) {
e.printStackTrace();
}
}
return result;
case "posts":
String category = params[0];
String date = params[1];
//
OutputStreamWriter outputStreamWriter1 = null;
BufferedWriter writer1 = null;
BufferedReader bufferedReader1 = null;
HttpURLConnection connection1 = null;
String line1 = "";
String result1 = null;
try {
URL url1 = new URL("http://192.168.1.64/blabla/posts.php");
connection1 = (HttpURLConnection) url1.openConnection();
connection1.setRequestMethod("POST");
connection1.setDoOutput(true);
connection1.setDoInput(true);
connection1.setConnectTimeout(8000);
outputStreamWriter1 = new OutputStreamWriter(connection1.getOutputStream(), "UTF-8");
writer1 = new BufferedWriter(outputStreamWriter1);
String parameters1 = "category="+category+"&date="+date;
writer1.write(parameters1);
writer1.flush();
data = new ArrayList<>();
if (connection1.getResponseCode() == 200) {
bufferedReader1 = new BufferedReader(new InputStreamReader(connection1.getInputStream()));
while ((line1 = bufferedReader1.readLine()) != null) {
data.add(line1);
}
} else {
result1 = "Server Error";
}
} catch (IOException e) {
e.printStackTrace();
} finally {
try {
if (outputStreamWriter1 != null) {
outputStreamWriter1.close();
}
if (connection1 != null) {
connection1.disconnect();
}
if (bufferedReader1 != null) {
bufferedReader1.close();
}
if (writer1 != null) {
writer1.close();
}
} catch (IOException e) {
e.printStackTrace();
}
}
return result1;
}
return null;
}
@Override
protected void onPostExecute(String s) {
super.onPostExecute(s);
progressDialog.dismiss();
switch (type) {
case "login":
switch (s) {
case "Connect Error":
createDialog(s);
break;
case "Done":
Toast.makeText(context, s, Toast.LENGTH_LONG).show();
MainActivity.updateUI(true);
break;
case "Already Exist":
MainActivity.updateUI(true);
break;
case "Server Error":
createDialog(s);
break;
}
break;
case "posts":
if (data != null) {
PostsFragment.data = data;
PostsFragment.fillList();
data = null;
}
}
}
private void createDialog(String message) {
builder = new AlertDialog.Builder(context);
builder.setTitle("Error");
builder.setMessage(message);
builder.setCancelable(false);
builder.setPositiveButton("OK", new DialogInterface.OnClickListener() {
@Override
public void onClick(DialogInterface dialog, int which) {
dialog.dismiss();
}
});
builder.create();
builder.show();
}
}
A:
Your words in PostsFragment.java makes you element duplicate, In removeCommas() method first clears the words and then add the values to the words from data.
|
Our website uses cookies and other technologies so that we can remember you and understand how you and other visitors use our website. By continuing to browse this Site, you are agreeing to our use of cookies. Click here for more information on our Cookie Policy, including how you may control the information we collect about you through cookies.Read MoreAccept
Virginia Industrial Market Outlook H1 2018
Class A Logistics availability fell to 2.9% as its average rent climbed to $6.08 per sq. ft. in H1 2018. The rising rents coupled with the scarcity of supply presents challenges for users while new opportunities for developers.
Logistics employment surpassed its pre-recession peak expanding by 13.8% since 2005 and Virginia's overall employment exceeded 4.0 million earlier this year for the first time in its history.
The Port of Virginia is in the process expanding its capacity by 40% as over 2.84 Million TEUs passed through its gates in the past 12 Months |
1. Field of the Invention
The present invention relates to an optical pickup which makes it possible for information recorded in an optical recording medium to be read out and information to be recorded on an optical recording medium by irradiating light on the optical recording medium. In particular, the present invention relates to structure to prevent collision between an objective lens which is provided with the optical pickup and the optical recording medium.
2. Description of Related Art
Optical recording media such as a compact disc (hereinafter referred to as a CD) and a digital versatile disc (hereinafter referred to as a DVD) are widely available. In addition, researches on an optical recording medium which can be performed recording of information in high density are being carried on in recent years in order to further increase recording capacity of the optical recording medium. For example, a high density optical recording medium such as an HD-DVD or a Blu Ray Disc (hereinafter referred to as a BD) has been available in the market.
For a case to reproduce information from such optical recording medium or for a case to record information on the optical recording medium, an optical pickup which includes a light source, an objective lens that makes light emitted from the light source focus on a recording layer of the optical recording medium, and a photo receiving element that receives reflection light reflected by the recording layer, is used.
In the optical pickup it is necessary to control a focusing position of the objective lens such that focus of light which is emitted from the light source is always matched on the recording surface of the optical recording medium irrespective of waving of surface of the optical recording medium or the like when reading out or recording of information is performed. For this purpose, structure is employed in that control is performed such that a position of the objective lens which is held by a lens holder is moved by an optical lens actuator in order to make distance between the objective lens and the optical recording medium always constant. In below described explanation, there may be a case where such control is referred to as a focus servo.
By the way, when information recorded on an optical recording medium that can be performed the above described high density recording, for example, a BD, is read out by the optical pickup, for example, it is necessary that spot size of light spot which is formed on the optical recording medium is made small. As for method to make spot size of the light spot small, it is usually performed to make wavelength of light which is emitted from the light source shorter and at the same time to make numerical aperture of the objective lens larger.
However, if the numerical aperture of the objective lens is made larger, space between tip of the objective lens and the optical recording medium (working distance; WD) becomes narrower when the optical pickup is operated. Tendency for this WD to become narrower is remarkable especially in the optical pickup which can be applied to the BD, for example. As the WD becomes narrower as above described, possibility of occurrence of the collision between the objective lens and the optical recording medium is made much higher, for example, when the optical recording medium in that waving of its surface is large, is used or when the focus servo becomes out of control, or the like due to scratch that is made on surface of the optical recording medium, vibration from outside, or the like.
It should be noted that the situation where the WD becomes narrower is not limited only to the optical pickup which can be applied to the BD, and there may be a case where it happens in the optical pickup which is applied to the optical recording medium such as a CD or a DVD, for example. That is, as for a note type personal computer or the like, because it is requested that it is made thinner, the objective lens which is provided in the optical pickup, has a small diameter lens. In such case, too, the WD becomes narrower. Therefore, in such case, too, possibility of occurrence of the collision between the objective lens and the optical recording medium becomes very high.
Because of these reasons, in order to avoid that information recorded on the optical recording medium may become non-readable, or the optical pickup may become non usable because of damage to the objective lens, by the collision between the objective lens and the optical recording medium, various structures are proposed conventionally in which a protector for prevention of the collision is provided. It should be noted that, as for the protector for prevention of the collision, it is required that the protector is hard to damage the optical recording medium and hard to be worn out in itself when the collision with the optical recording medium happens. It is because to prevent deterioration of reproduced signal caused by alteration of state of the optical recording medium.
As for structure of the protector for prevention of the collision that has been conventionally proposed, there is structure in which a protector that is composed by a molded article is provided on a lens holder to hold the objective lens. For example, see JP-A-2006-120246, or JP-A-2001-209956. As for another structure of the protector for prevention of the collision, there is structure in which a coating layer is provided on outer layer of a protecting portion to prevent the collision between the objective lens and the optical recording medium. For example, see JP-A-2003-242703, JP-A-2006-338783, or JP-A-2002-222535. It should be noted that, in this case, examples are shown in which the protector for prevention of the collision is attached on a lens holder, and in which the protector for prevention of the collision is attached on the objective lens.
However, in case of the structure in which the protector composed by the molded article is provided on the lens holder, it causes a problem that it cannot sufficiently restrain damage on the optical recording medium or stain by abrasion of the protector by only using merely the molded article such as polyacetal or the like that is plastic softer than the optical disc.
In this regard, in JP-A-2006-120246, it is intended to solve the above described problem by means that utilizing the molded article composed of silicon rubber composite in which compounding agent that contains at least one of polyurethane particle and fluorine contained resin powder is mixed, as the protector. However, in case of the structure disclosed in JP-A-2006-120246, it causes problem in cost because it is the structure in that the molded article is formed utilizing a specially compounded composition.
Further, as the structure for the protector which is provided on the lens holder, in case where a portion that has a curved surface is formed as disclosed in JP-A-2001-209956, it causes a problem that a load for working operation increases when the optical pickup is manufactured because dimensional control for it is not easy.
Further, in case where structure is employed in which the coating layer that has special composition is provided on the protector portion as disclosed in JP-A-2003-242703, JP-A-2006-338783, or JP-A-2002-222535, though it has a merit that it is good at tolerance at height, it causes a problem that cost for it increases. |
Q:
Copy from a measurement to another measurement in InfluxDB
Having the following statement:
SELECT * INTO ZZZD FROM P4978
Output:
result
time written
1970-01-01T00:00:00Z 231
Using:
SELECT * FROM ZZZD
I get only 7 lines even if there where 231 lines written. I can't figure why there are only 7 lines. Is there some setting or this is a defect? I'm not able to copy from a measurement to another measurement more than 7 lines.
A:
If you want an exact copy use:
SELECT * INTO ZZZD FROM P4978 group by *
If you don't specify group by *, the tags will turn into fields.
You can verify the tags with show tag keys from ZZZD and the fields with show field keys from ZZZD
Source: https://docs.influxdata.com/influxdb/v1.5/query_language/continuous_queries/#common-issues-with-basic-syntax scroll to issue-4
|
Q:
Is every set comeagre in its closure?
Let $A$ be a set in a topological space $X$. We know that $A$ is dense in its closure $\bar{A}$. This implies that $\bar{A} \setminus A$ is nowhere dense in $\bar{A}$ (using a characterisation of nowhere dense sets in Kechris' Classical Descriptive Set Theory, section 8.A, namely that a set is nowhere dense if and only if its complement is dense). Since every nowhere dense set is also meagre, we know that $\bar{A} \setminus A$ is meagre and therefore $\bar{A} \setminus (\bar{A} \setminus A) = A$ is comeagre in $\bar{A}$.
Does this argument work?
Edit: Just noticed that I misread Kechris' characterisation. It is that a set $A$ is nowhere dense if and only if $X \setminus \bar{A}$ is dense (i.e. not when its complement is dense). Then obviously, my argument doesn't work.
A:
No, for instance take $\mathbb{Q}$. It is meager in its closure $\mathbb{R}$.
So your third sentence is already false, although it holds for open $A$.
|
Official Report (Hansard)
Committee for Health, Social Services and Public Safety
Cancelled Outpatient Appointments: DHSSPS, Health and Social Care Board and Southern Health and Social Care Trust
The Chairperson: You are very welcome, folks. We have Eugene Mooney, assistant director of the Department's information and analysis directorate. I think Jackie Johnston is not here.
Dr Eugene Mooney (Department of Health, Social Services and Public Safety): Jackie has been delayed. He sends his apologies, Chair.
The Chairperson: So he may join us then; OK. Anita Carroll from the Southern Health and Social Care Trust and Sara Groogan from the Health and Social Care Board, you are very welcome. The procedure is that I will ask you to adhere as much as possible to a 10-minute presentation. You can decide among yourselves who will lead that. We will then open it up to questions from members. I hand over to you at this point.
Jackie has just joined us. You are very welcome, Jackie.
Mr Jackie Johnston (Department of Health, Social Services and Public Safety): Apologies, Chair.
The Chairperson: You are OK.
Dr Mooney: Good afternoon. I will begin by thanking you for this further opportunity to update the Committee on the work that we have been undertaking to address the issue of hospital-cancelled outpatient appointments. While I am aware that the Committee is fully conversant with the issues surrounding hospital-cancelled appointments, it might be helpful to revisit a number of the key points of the discussion so far.
It is important to state at the outset that the Department, the board and the trusts are fully committed to improving the process of booking and monitoring consultant and outpatient appointments. We have genuinely greatly appreciated the Committee's interest and input into this matter.
We have provided two types of information in the briefing paper that we submitted to the Committee. The first piece of information is the Department's quarterly outpatient activity return, which is familiar to you. It collects information on hospital-cancelled outpatient appointments on the basis of the number of appointments cancelled in any given month or year. It is a count of appointments. The figures refer to attendances in all programmes of care. Although that information is useful, it did not fully address the issues raised by the Committee. The Committee was rightly concerned about not only the reasons for hospital-cancelled appointments but an assessment of the impact of those on patients.
The second piece of information, which has been developed by the short life working group, is new to the Committee. It refers to a count of patients who had attended an outpatient appointment during any given month or year and whose previous appointment was cancelled by the hospital and the impact that that had on the patient. It is, therefore, a count of patients. A regular and quarterly updated version of that report should be available from the period ending December 2013.
As you know, the short life working group was directed to address the Committee's request to have a fuller understanding of the reasons for hospital-cancelled appointments and, importantly, to provide information on the impact of those on patients. The information that you have before you does just that. We are now, for the first time, able to see clearly the number of patients who attended an outpatient appointment, the number of new and review appointments, those that were previously cancelled, the impact of those on patients in terms of whether the appointment resulted in a change in time, date or location, and, importantly, if the impact was positive in that the appointment was brought forward or negative in that the appointment was put back. We are able to quantify the impact in terms of the number of days that that involved.
A further action that resulted from the work of the short life working group was that the Department updated the technical guidance for completion of quarterly outpatient activity returns (QOARs) to include the agreed list of regional and subregional codes and remove the "other" category. The trust staff implemented the agreed regional and subregional codes on 1 July 2013. Moreover, the completion of the variable "reason for cancellation" became mandatory from that date. Any requests for new local codes must now be discussed and managed through the Department's hospital liaison group. This will ensure that there is no proliferation of local codes, which caused difficulty in the past.
I would like to draw out a few of the key points on the new data that was sent to the Committee on 10 October, in order to be helpful. Consider chart 1. There were 106,077 attendances at consultant-led outpatient appointments during July 2013. Of those, 33,729 were new, representing around 32%, and 72,348 were review appointments, representing around 68%. Of patients who attended their appointments in July 2013, 6,509 had previous appointments cancelled by the hospital. Around 20%,1,299, were new appointments. About 5,210 were review appointments. The split between new and review appointments is similar for August 2013. That is shown in chart 2 in your briefing pack. Of the 6,509 patients who attended in July 2013 following a previously cancelled appointment, 986 did not experience a change in date; five had the location changed and 981 had the time changed. Again, that is in chart 1.
Again, in August 2013, around 15% of affected patients did not experience a change in date. The converse of that is, of course, that there were 6,500 patients who attended in July 2013 following a previously cancelled appointment. There were 5,523 — about 85% — who experienced a change in date. Again, that is in chart 1. Of the 5,523 who experienced a change in date, 1,556 or 28% had their appointment brought forward and 3,967 or 71% had their appointments put back. On average, patients who had their appointments brought forward were seen 20 days earlier; 14 days for new appointments and about 21 days for review appointments. Patients whose appointments were put back were seen 21 days later; 16 days for new appointments and 23 for review appointments. Again, that is in chart 1. Figures for August were similar in that, of those patients who experienced a change of date, almost three quarters had their appointments put back for approximately three weeks. Those patients whose date was brought forward were seen around three weeks earlier.
I will turn to considering the reasons for cancellation. While the revised coding structure was implemented by trusts at the beginning of July, it obviously applies to appointments that were cancelled after 1 July. If appointments were cancelled prior to July 2013, they will have been coded under the old structure. That is estimated to be fairly small; 8% for July and 4% for August. Because of that, coverage of the reasons for cancellation is slightly reduced. The issue will resolve itself over the next few months. However, rather than wait until that time, and in order to give the Committee some indication of the type of information that we will be able to produce, the Department undertook further analysis to approximate the reasons for hospital cancellations, along with the associated impact. When that work is complete, we will obviously furnish the Committee with a copy of the results. However, I think that it is worth mentioning a few of the salient findings.
Of those patients who attended an appointment in July 2013 and had had a previous appointment cancelled by the hospital, 23% had had their appointments cancelled because the consultant was unavailable for personal reasons. That ranged from around 27% in the Belfast Trust to 17% in the Southern Trust. Around 15·6% were rescheduled and put back due to management of the clinic. Ten per cent of them were cancelled at the consultant's request because they were no longer required. Ten per cent were rescheduled and brought forward because an earlier appointment was requested by a health professional. About 6% were cancelled because the consultant was absent for clinical or medical reasons.
I will now turn briefly to consider the targets and indicators. During a previous session, the Committee pointed in particular to the high number of cancelled review appointments and suggested that that might be so because they were not subject to any targets and would be easier to cancel. Officials explained that it was not possible to set a target around the length of time for a review appointment because that would depend on clinical circumstances. Nevertheless, the Department shares the Committee's concerns about the level of cancelled appointments, both new and review, the impact that that has on patients, and the potential loss of capacity as a result. That is why, in addition to the current indicator of performance, the rate of new appointments cancelled by the hospital, we propose to include in the forthcoming commissioning plan direction an additional indicator and a target for 2014-15. I understand that a draft of the indicators of performance direction, detailing the new indicator, has been shared with the Committee. The proposed target, which has just been agreed with the Minister, will focus on achieving a significant reduction in the number of hospital-cancelled appointments, both new and review, while the indicator of performance direction will direct attention to achieving a reduction in the ratio of new to review appointments that are cancelled by hospitals.
Based on the current number of cancelled hospital outpatient appointments, which is 167,172, the effect of the target would seek to reduce that by some 28,420, representing a 17% reduction in 2014-15. The accompanying technical guidance will ensure that those reductions are applied across all specialties and to all health and social care trusts. That will also help to ensure progress in all areas, including mental health, which has been raised by a member of the Committee.
Committee members suggested that good practice in one health and social care trust, the Southern Trust, should be cascaded to others. I understand that, as a result of discussions at the short life working group, staff from other trusts have visited the Southern Trust to see how it manages its appointments.
In conclusion, we believe that we now have a more robust platform of information to enable us to address the issues of hospital-cancelled appointments, and we have the necessary commissioning plan direction, targets and indicators to affect positive change. We are obviously happy to take questions from members on any of the issues that have been raised.
Mr McCarthy: Thank you very much for your presentation. You will agree that the number of cancellations is horrendous and far too excessive. The result for people who do not get their treatment when they are supposed to get it is endured pain. Before I ask a question, I must put to you that I am aware of an incident at Musgrave Park Hospital, where an elderly patient was supposed to have her operation. It was cancelled. The reason given was that there was a high level of absenteeism due to staff sickness. Can you confirm or otherwise whether it was decided some time ago that there was no longer a need for a dedicated ward with beds and nurses at that hospital? As a result, people have not had their operations and continue to suffer. That is an incident that I am aware of, and perhaps you could address that.
The second question relates to your looking at the feasibility of changing the patient administration system (PAS) to record data on cancelled appointments in a different way. You concluded that it would take too long and cost too much. Can you tell the Committee how long it would have taken and how much it would have cost?
Dr Mooney: I do not know to what degree the short life working group actually looked at that in order to give an accurate estimate. The patient administration system is a fairly complex system that is primarily used to manage patients across the service. So, in that sense, it is a secondary use, really, for us in terms of information. Maybe some of my colleagues in the trust —
The Chairperson: Sorry, I think the point here is that we are being given an explanation as to why the short life working group cannot deliver and we are told that it is about cost. So I suggest that you address the question.
Ms Anita Carroll (Southern Health and Social Care Trust): When I chaired the short life working group, we tried to explore changes to the system with the suppliers, CMS. The lead-in time would have been at least one year, and the initial cost was at least £60,000 to £80,000. So that was the kind of cost that —
Mr McCarthy: That seems like a lot of money. Could it not have been done on a cheaper basis?
Ms Carroll: That is the only supplier, and that is the only basis that we have for going forward with the system.
The Chairperson: Just picking up on Kieran's question, that seems to be a tiny amount of money to be able to access the correct data, which is what we need in relation to this major issue across communities. Do you not agree?
Mrs Sara Groogan (Health and Social Care Board): There are a number of issues with the patient administration system. It is actually scheduled for replacement. It is a historical system which has existed for some time and was created to do different things than we now ask of it. That is acknowledged. I believe that the totality of the patient administration system is under review and, therefore, it is a question of short-term spend versus what the short life working group could reasonably do now to provide more coherent information.
The Chairperson: Was a business case done in relation to the cost?
Dr Mooney: No, there was no formal business case. I suppose I am curious as to what additional information is not available. What we were trying to do was to produce information for the Committee as quickly as possible and in the most efficient way. We thought that we had done that. However, if there is additional information that you require, obviously we can look at that.
The Chairperson: I want to bring in Fearghal on this issue. I am asking that you accept that this is not just information for the Committee, but information that surely you need in order to be able to explain and deal with cancelled appointments. Again, I suggest that a cost impact of between £60,000 and £80,000 is not significant, even if it were to take up to a year.
Mr McKinney: I am quite surprised that this is what you are telling us. The object of this exercise, surely, is to achieve the best for patients, not trying to present us with information that somehow satisfies the Committee in the short term. That information could now be flawed, because we have not got the system for getting the information.
Mrs Groogan: The key point is that we all accept that. This is the first time that we have been able to have this range of information and see those improvements as we move forward.
Mr McKinney: Surely the short life working group was about getting to the bottom of this, not getting to the bottom of the Committee. It was about getting to the bottom of it, and you have not done that.
Mrs Groogan: I think that we have come quite a long way from where we started.
Mr Johnston: We are really on an improvement path here. We fully accept that the situation is far from ideal and there needs to be a lot of improvement introduced to the system. One of the key outputs of the short life working group is that we now have a more robust coding system, so the statistics put in front of you for July and August are more robust and accurate with respect to reasons for cancellation. We want to move on on two fronts. One is to improve performance by giving the trusts something to aim for, so we are proposing this new target of reducing overall cancellations by 17%. We will also take up other improvement issues such as, for example, having another look at the patient access administration system to see what further refinements can be made to give us even better information. So, this is really the start of a process. We are not bringing you something that is finished, and saying "That is it." We fully accept that more work needs to be done.
Mr Beggs: You mentioned that you did not want to spend £60,000 to £80,000 because you are already looking at a new system. Has the decision been taken to introduce a new system, and when is it coming in? If you have not taken any decision, what is the timescale for this alternative system that you are talking about? I can understand not moving some way if you are already on another process, but has any other decision been taken and, if not, when will it be taken? Even taking one year to put in a new system might still be good time spent and value for money. How many years away is your next process?
Mrs Groogan: There is a plan in place. I do not know the full detail of it, but, from an ICT perspective, one of the key regional priorities is to have the current system upgraded and made fit for purpose for its uses today.
Mr Beggs: Will you come back to us with that information?
Mrs Groogan: Yes.
Mr McCarthy: Musgrave is in the Belfast Trust, which comes top for cancellations. There is no earthly reason why beds and staff should have been taken off when there was a demand for them. What can you tell us?
Mr Johnston: If you give me the details, Mr McCarthy, I will follow it up with the trusts and come back to you as a matter of urgency.
Ms Brown: Thank you for your presentation. Chart 1 [Inaudible.] over 4,000 [Inaudible.] Do you measure the impact that [Inaudible.] ?
Dr Mooney: No. If there is a delay, it could be for [Inaudible.] The clinic could be cancelled and the consultant could be called away to deal with another issue or an operation in theatre or whatever in the hospital. All that we can say is that, when you get a high level of cancelled appointments, there can be a loss of capacity. Obviously, there will be times when the consultant is required to deal with another issue in another part of the hospital. It is very difficult to disentangle what that is. We have certain codes, but I do not know whether we would be able to go into that level of detail.
Mrs Groogan: The average time for reappointing for a new patient was 16 days, and it was 21 days for a review patient. A proxy of potential impact would be around how quickly those patients could be reinstated.
The Chairperson: The question is about the impact on health, not the reasons why appointments were cancelled.
Mrs Groogan: As I said, the best proxy that we have is that the average length of time for a new patient to be reinstated was 16 days and was 27 for a review patient. Therefore, the potential impact is in days rather than weeks or months.
The Chairperson: But there is no assessment of the impact on the person's health. Some people are waiting for up to 100 days.
Dr Mooney: We can say whether they were brought forward or put back. We do not have the information to talk about an individual patient and the consequence of that particular delay in them receiving their appointment.
Ms Brown: I am a bit confused. The question has not been answered at all. The question was about whether you have measured the impact that the delay had on their health.
Mrs Groogan: No. I am not sure how that would be done. What we can say, obviously, is that the longer that it would take for a patient to be reappointed, you could suppose the greater the impact that that would have on their health.
Ms Brown: Do you know the reasons for the 4,000 delayed appointments?
Dr Mooney: Yes, we have some details on the reasons. That is also included in your pack.
Ms Anita Carroll (Southern Health and Social Care Trust): There is a breakdown of time change, location change and date change for each of those categories of patient, either new or review.
Dr Mooney: We still have the reasons that they have been cancelled, whether the consultant was unavailable or the medical staff were unavailable. We still have a detailed list of reasons at a regional and subregional level.
The Chairperson: The reasons are not in the papers that we have received.
Mrs Groogan: It is table 1A.
Dr Mooney: It is table 1A and table 1B.
The Chairperson: It does not relate to chart 1, which we are looking at.
Mrs Groogan: The reasons quoted are consultant not available; medical staff or nurse not available; patient treated elsewhere; consultant cancelled appointment; appointment rescheduled/brought forward; appointment rescheduled/put back; cancellation following validation or audit; administrative processes; hospital transport not available; cancelled by hospital in order to re-book as an alternative method; patient cancelled as appointment is no longer required; patient cancelled but the appointment is still required; GP cancelled appointment; and reason not recorded —
The Chairperson: Sorry, folks. The question, again, is whether you can provide a breakdown of the reasons for those 4,000 delayed appointments, not the overall reasons?
Mrs Groogan: In those categories, yes.
Mr McKinney: Specifically for the 4,000 delayed appointments. Were 1,000 cancelled by the consultant, who was unavailable for personal reasons? Have we got those figures?
Mr Johnston: Yes. The consultant being absent due to administrative management reasons accounted for 170; the consultant absent for clinical/medical reasons, 766; the consultant absent due to personal reasons, 3,157; the consultant ill, 330; and the consultant left the trust or retired, 60. That is a total of 4,483. I apologise if you do not have those figures in front of you, Chair.
The Chairperson: We don't.
Mr Johnston: That is what I was referring to when I said that we had more robust data to present to you to allow you to analyse this better.
Mr McKinney: I have found that figure. It is in the right-hand column of page 126. What constitutes "personal reasons"?
Ms Carroll: It could range from a family bereavement or a consultant has an ill relative.
Mr McKinney: On occasions that affected 3,157 people.
Ms Carroll: Appointments.
Mr McKinney: I asked specifically, for the record, what constitutes "personal reasons". You are telling me that those are bereavement or an ill relative.
Ms Carroll: Because the other reasons are broken down. If you look in all the categories, there are administrative and management reasons, and the clinical, medical and personal reasons. There are a significant number of incidents of "personal reasons". Within the Southern Health and Social Care Trust there are just 287.
Mr McKinney: No, let us just pick the 3,157.
Ms Carroll: The total?
Mr McKinney: Yes.
Dr Mooney: With regard to "consultant absent for personal reasons", we explained to the Committee last time that there are a series of gradations in terms of the information. We have a series of local codes, which we mapped up into subregional and regional. If I look at the subregional code for "consultant absent for personal reasons", at a lower level, to see the reasons, those could be for annual leave, study leave, industrial action or personal reasons, including, as my colleague said, bereavement or maternity leave. One of the consultant's children may have been sick, and he needed to take time off. It is those types of reasons.
Mr McKinney: Yes, Eugene, I can understand that, but have you found out those personal reasons in the 3,175 category? Surely you need to know that.
Dr Mooney: We do not have that detail in front of us just now but, yes, we can look.
Mr McKinney: Have you sought it?
Dr Mooney: We have it. We could break down within those particular codes how many were annual leave, study leave, industrial action, and how many for other, personal reasons. However, we could not go any further into it than that. What we were trying to do —
Mr McKinney: Sorry, you are telling me that you have gone into it in detail but you cannot go into it in detail.
Dr Mooney: No. What I am saying to you is that we have information at a regional and subregional level that we are content with. This is where we got into difficulties last time. There are a series of local codes, some of which are applied differently across the trusts. We have an agreed set. However, if someone within the category is on leave for personal reasons, I could not tell you whether that personal reason was because the person's child was sick or they were bereaved. I am sure that that information exists somewhere. It might exist in the trusts, given that the person contacted them and said that they were not able to take their appointment due to a particular reason.
Mr McKinney: Yes. Obviously, we can look at it from the patient perspective, but this is a management perspective. When we come to that extent — nearly 3,200 not getting their appointments — and we are not privy to or assessing in a drilled-down way the information that is affecting so many people negatively, would it not be appropriate to drill down into that information to arrive at solutions? For example, for July and August, it may be appropriate that it was annual leave, and if it is always going to be about annual leave, maybe we should get a replacement in to cover annual leave, and that, in itself, might resolve the stress.
Dr Mooney: The trust would be looking at that level of detail.
Mrs Groogan: That goes back to Jackie's earlier point, which is that we recognise entirely that we are on a journey in this. This is the first time in these two months that we have had this level of information, and now it is about what it is telling us; where it is telling us to target; where we need to focus those improvements; and where we need to work with trusts around that.
Mr McKinney: Do you accept that, as it is presented to us, there are significant shortfalls here too?
Mr Johnston: Very much so. I accept fully the point that you make, which is that, if you are going to manage the system effectively, you need more detailed information. Maybe Anita can tell us how it works at an operational level in her trust at the moment. You have those standard codes that you are obliged now to input against, but is there a further layer of detail in the operational side of the trust?
Ms Carroll: I can speak for the Southern Trust. We may have a consultant who requests to cancel a clinic that we have already started to book into, ie within the six weeks. We generally try to make all the consultants make us aware of their leave requirements at least eight to six weeks in advance to avoid getting into a cancelled situation. Nevertheless, if we have a consultant who, due to some extenuating circumstances, has to cancel a clinic while we are in the booking cycle, they complete a clinic template to advise that their clinic will be cancelled, and they have to indicate on that the reasons. That is just for us. It is a tick-box exercise for personal reasons, and we do not necessarily ask them to provide all of the detail around that. However, that is assuming that we, as a management system, are fully implementing that and that consultants are putting their hand up much earlier in the system and telling us when they want their annual leave. They understand, under partial booking, that we will start booking patients in a six-week cycle. Once we get that cancellation, we know that that clinic is going to be suspended, and we then stop booking any patients into that clinic. That is the routine that we use, and that is probably why our numbers are a little bit lower.
The Chairperson: I am going to refer to members, because a number of them have a line of questioning around this. Fearghal, you are happy enough.
Mr Beggs: I note your comment that this is the first time that you have useful information and data that you can compare. Do you accept that that is an indictment of those who have been managing the health service in Northern Ireland?
Dr Mooney: No. This is new information, but we had information in the past that looked at —
Mr Beggs: Which was pretty meaningless.
Dr Mooney: Well —
Mr Beggs: I move on.
The "Consultant Absent (Personal)" category is one of the largest categories that would be under management control to a degree. It is one of the things that you can manage and work with staff to try to improve. It is the biggest number that is jumping out at me. Why is there such variation between the trusts? The Southern Trust has 287, and you have brought someone from the Southern Trust here. Why did you not bring someone from the Belfast Trust or the South Eastern Trust, which have much higher figures? Why is there such variation in those numbers?
Mr Johnston: We brought Anita because she chaired the short-life working group for the region. You are right: we should have the other trusts come to another Committee hearing to explain that. As we say, we are at the start of the process, and anything that we can glean through the evidence produced here will add value to that.
Mr Beggs: My information is that the Northern Trust is the second biggest trust, so why does the South Eastern Trust, for instance, have almost 50% more consultant absences due to personal issues?
Mr Johnston: I do not know the answer to that question.
Mr Beggs: You mentioned that there was a variation of between 17% and 27%. Obviously, there are problems in some areas. Do you accept that?
Dr Mooney: Yes, and I think that the information and the points that you are picking up are perfectly valid. That is the type of discussion that I imagine that the board will be having with those trusts to try to understand where that variability is and why certain trusts are not performing as required. I think that it is perfectly reasonable to raise that, and I assume that the board will take that up with the trust.
Mr Beggs: Can you confirm that the heading of "Consultant Absent (Personal)" does not cover personal annual leave?
Dr Mooney: It covers annual leave, and it covers study leave. Another code covers industrial action, and other personal reasons are included.
Mr Beggs: Is it not seen as unprofessional to arrange patients to come in and then to take a holiday without giving due notice?
Ms Carroll: I suppose that that is what I was trying to explain earlier. We have a clear annual leave policy, and, therefore, we try to hold all of our medical staff to giving sufficient notice so that we do not start to book clinics when we know that they will be off on holidays, because, then, you will have to cancel.
Mr Beggs: Do the other trusts do this?
Ms Carroll: All trusts, I think, have annual leave policies, as far as I am aware.
Mr Beggs: Do they have a policy of that shortened period where you must give notice?
Mrs Groogan: The implementation of partial booking is variable across trusts, but all trusts have some form of partial booking, particularly for new patients. The implementation of policy on review patients is being rolled out across the trusts. For context, it is important to say that, with the volume of outpatient appointments that take place every month, I do not think that we will ever get to a situation where it will be impossible not to cancel for personal reasons, because the NHS staff group is very large, and there will always be unforeseen circumstances. So, we want to try to target reasonable reductions to that and look at where, as a Health and Social Care Board, we can focus and target that and what would be and look like a reasonable reduction.
Mr Beggs: I move on to another category. Can you explain exactly what it is? It is listed as "Consultant Cancelled Appointment". That is different from "Consultant Unavailable". Can you explain how you are certain that items are appropriately grouped under this description where appointments are no longer required at the consultant's request?
Dr Mooney: I will let my colleague deal with that in a moment. That could be that diagnostic tests that the consultant had been waiting for have come through, and, having seen the result, the consultant decided that it was no longer necessary to treat the patient. Perhaps Anita can add to that.
Ms Carroll: We have trained staff to use that code when a patient is awaiting results, and the diagnostic comes back and indicates to the consultant that a further appointment is not needed. That is when they use that code.
Mr Beggs: Again, there are big variations between each of the trusts. Does that mean that some trusts are bringing in patients who may not need to be seen?
Dr Mooney: It might be because of the nature of the conditions that some of the trusts deal with. The Belfast Trust, because it is a regional centre, will, obviously, deal with different cases than others across the regions.
Mr Beggs: Another large category is called "Appointment Rescheduled - Put Back". The sub code in that category that makes up by far the greatest proportion is called "Management of Clinic". I notice that two of the codes, "External Incident" and "Internal Incident", are listed as being used zero times. Under "Management of Clinic", 2,111 cancellations were reported. What does this heading actually mean? To a degree, does it mean poor management of the clinic?
Dr Mooney: I have some of the reasons why they categorise that. It is what it says. Some are put back, and some are held in a new clinic on a later day.
Mr Beggs: Why are they put back?
Dr Mooney: We do not have the exact reason other than that it is part of the management of that clinic for whatever reason. It might well be that there is a change in time. It could be on the same day but in a different time slot. The time slot might be removed because the consultant has requested that it be put back. We do not have all the individual reasons. We have some of it.
Mr Beggs: Can you give us a breakdown of the various sub-codes that you have and that you have not already provided to us?
Dr Mooney: We will share that with the Committee. As you said earlier, you have to manage it at a particular level, and, yes, I understand that those affect individual patients. It is useful to get as much detail as you can about the consequence of that for the patient and the exact distribution of the reasons for it. When we started the journey, as Jackie said, we had a system in which quite a range of local codes were being used, and the first thing that we had to do was to try to bring some sort of order to that, and the group did that. We are now more confident. We mapped that up from those local codes into subregional and regional codes. From a management perspective, our focus has tended to be on the regional and subregional codes. The type of information that you have is on the very local codes, and there will be a certain variability in how some of the trusts continue to use those. Those are more for operational purposes and to enable the trusts to know the individual reasons and challenge their staff about that. Quite honestly, some of us in the Department will not know each individual patient in that local area and whether that is reasonable or not. It is for the trusts to manage that.
Mr Johnston: We could try to take some of those larger numbers and see if we can get you more detailed analysis of what underpins those. If you bear with us, we will try to get that at a trust level.
Mr Beggs: The other large category that you have listed here is where the patient has cancelled. Why have you included it among all those other categories?
Ms Carroll: It is part of the quarterly return. It is the total cancellations, and that is just following the format of that, in that it is all of those.
Mr Beggs: To a degree, it is not under your control. However, what if, for instance, you are not taking into account local transport arrangements and are booking appointments at times when people cannot get to them? I remember trying to get to Antrim hospital for Translink one day as part of a study, and I left home at about 6.00 am to get to a 10.30 am appointment using public transport. So, how do you use the information on patients cancelling to ensure that slots are best utilised and are not being cancelled at short notice, so that we are maximising the ability of the NHS to treat people?
Ms Carroll: From a trust perspective, we do a number of things to try to minimise patients cancelling their appointment, one of which is the partial booking system, which is about giving the patient the choice, in the first place, to select an appointment that suits them, rather than sending them out a fixed appointment that may not suit them. We do 100% partial booking in the Southern Trust for every new appointment and every review appointment. Despite that, people do not necessarily turn up for appointments. On top of that, we confirm appointments by letter, and, for all patients for whom we have a mobile phone number — we extensively try to capture that number at every interface with patients — we send a text reminder three working days before appointment to say, "You have an appointment at Craigavon hospital" or whatever. Those are all the steps that we are taking to try to manage it as best we can. Aside from PR campaigns about the missing space — you know what that is doing — we actively and very rigorously try to make sure that we get patients to their appointments.
Mr Beggs: Is that good practice applied by every trust?
Ms Carroll: I think most trusts do —
Mr Beggs: Do we know if every trust uses it?
Mrs Groogan: Does every trust use partial booking for new patients? They do. Not all use it for review, but they are in the process of implementing it for all. The text reminder is not in use in every trust. I understand that that is because it was agreed that a number of trusts would pilot it and test whether it had an impact or not, so that it could then to be rolled out.
Mr Beggs: Do you know the outcome of that test?
Mrs Groogan: Not yet.
Mr Beggs: How long has it been running?
Ms Carroll: We have been running it for about a year in the Southern Trust. I suppose it has just become part and parcel, because, for most appointments, such as dental appointments outside of the trust, it is a common enough practice. I suppose that one of the biggest challenges around it has been getting mobile phone numbers. That is why I said that, at every interface, we try to ask for mobile phone numbers at reception.
The Chairperson: That is good work and good practice, but the focus is on the patient, whereas we are dealing with appointments cancelled by hospital providers. I think the last statistic that we saw for last year was something like 182,000. That is the issue, and that is where the focus needs to be.
Mr Beggs: [Inaudible.] unless the booking system takes account of local practicalities, they will get cancellations, because people will not be able to get there.
Mr Brady: Thanks for the presentation. I am just looking at table 1a. How many cancellations were true cancellations? By that I mean cancellations that resulted in the patient's appointment being cancelled or put back without there being any clinical need to do that?
Dr Mooney: Sorry, I did not quite catch that.
Mr Brady: It was about appointments that were put back without there being any clinical need to do so — true cancellations in that sense.
Dr Mooney: I think the information that you have there all refers to true cancellations. The figures that we have there, whether for new or review appointments, are of actual cancellations.
Mr Brady: Are the Department and the board happy enough that those are true cancellations and that none were cancelled or put back where there was no clinical need to do that in terms of the patient's condition?
Mrs Groogan: That is the thing that, for the first time, we can definitively say. The table shows appointments that had an impact on the patient where there was a change in date, a change in location or a change in time. I have a figure to September, which is 20,667 that had an impact on the patient.
Mr Brady: So, if you have that information to hand, that would give you a handle on the situation and would go some way towards improving it.
Ms Carroll: Yes. Part of the work of the short-life working group was to define the data and then put in place the measure, the measure being the number of days in the future that the appointment was rescheduled to or the number of days that it was brought forward. That is the first time that we have had that information.
Mr Johnston: [Inaudible.] progress that next year by suggesting a 17% reduction target. So, from the figures that we have at the moment, if that target is achieved, we should see a reduction of about 28,000 next year. That is the first benchmark to aim for, and then we will want to see further improvement.
Dr Mooney: I think you raised the point last time about mental health in particular, so, as part of that target, we require that that reduction is spread across all specialties and all trusts. It will not be a question of looking for easy hits in that.
Mr Brady: As a point of interest, if a consultant is not available and the patient sees a junior doctor or somebody else who is available — not the consultant they were scheduled to see — how does that fit in with the appointments? Presumably they are going to see a particular consultant about a particular condition, but there may be a junior doctor available, whom they see instead. Would that mean that they would have to be rescheduled?
Ms Carroll: Not necessarily, because most consultant clinics are constructed around the consultant and maybe his or her registrar and a series of juniors. That is how clinics actually take place. Not everyone is going to see the consultant at the clinic, because the clinic numbers do not work like that. So, if the clinic went ahead with a registrar in charge with, for example, two juniors or whatever, that clinic would not have been cancelled.
Mr Brady: Presumably, then, for all those cancellations when the consultant was not available, the person would have needed to see the consultant. Is that too simplistic an interpretation?
Dr Mooney: I think that the trusts would be better able to answer that. I think it is about whether it is a consultant-led clinic. If the consultant had agreed with his team who sees that patient, that is a clinical decision.
Mr Brady: The point that I am making is that it does not really matter whether the consultant is playing golf, on holiday or whatever, you have to presume in all these cancelled appointments that the consultant was the person who needed to be seen. If the registrar was there, why would the appointment need to be cancelled if it was the registrar who they were going to see anyway?
Dr Mooney: A consultant can cancel an appointment because that consultant may be the person who is taking a particular clinic. He may be the person who is called to deal with an emergency in another part of the hospital and, in those circumstances, it would be cancelled.
Mr Brady: That is what I mean. So, those are all appointments that the consultant needs to be dealing with as opposed to any other member of his team.
Mrs Groogan: Those are outpatient appointments, so it is probably not as easy from a referral letter to say whether you need to see a consultant or a member of junior staff as it would be, for example, for your treatment consequences or your operation. So, I do not think that you could automatically conclude that all those patients would have required consultant assessment.
Mr Brady: Is it possible to find that out?
Mrs Groogan: I am not sure that it would be. I am not sure how you would go about that, but it is probably a mix of both: some will have needed to see a consultant and some will have been appointed to the consultant as part of the booking process.
Mr Brady: Really, what I am saying is that there is an assumption that the team cannot function without the consultant being there, and that is not necessarily the case.
Mrs Groogan: Not necessarily, and it would depend on supervision and on the seniority of the other doctors who were there.
Mr Gardiner: The May 2013 headlines stated that more than 27,000 hospital appointments were cancelled between 2011 and 2012 because consultants were on leave. That seems to be following the trend. That was very damaging to the health service, I think you will agree; I certainly think so and am critical of it. What action has been taken in the six months since May to manage consultants' holidays better?
Ms Carroll: I will describe the process that we follow in the Southern Trust. Consultants are required to give a minimum of six weeks' notice and to send their annual leave plans through.
Mr Gardiner: There were 27,000 appointments cancelled between 2011 and 2012.
Mrs Groogan: All trusts follow the good practice of the six weeks' notice leave policy, but it goes back to the earlier point that, even with the best planning in the world, there are still 1·5 million outpatient appointments in any given year. We are dealing with a huge staff group, and while attempts are made to better plan that leave and good practice guidelines have been put in place, it is difficult to reach a point where there would never be unplanned leave. However, this has given us the ability, as I said, to be able to look at what reduction in that would be reasonable and to move forward on that basis.
Dr Mooney: [Inaudible.] It is not any mitigation, but the number of hospital-cancelled appointments over the last number of years has declined from about 216,800 in 2008-09 to around 167,000 now. It is far too high, we accept that, but —
Mr Gardiner: I am talking about cancellations in 2011-12. There were 27,000. There is no improvement there. I think that you need to go back to the drawing board, sort yourselves out and see what you can do. That is not good for the health service or for the patients in particular.
Mr Johnston: I accept your point entirely. It is a performance management issue at trust level. What we are trying to convey today is that we have got better and robust information now, so the next steps will be to use that information to tackle the issue that you have identified.
Mr Gardiner: When you come back to us in a year's time, we will look at the improvements that you have made. Hopefully, there are improvements.
Mr Johnston: I hope that the target will provide a focus over the incoming financial year to ensure that inroads are made around reducing the number of cancellations. We would like to see that 28,000 reduced by using that target.
Dr Mooney: We fully accept that the number of cancelled hospital appointments is far too high. We have put a target in place that is fairly significant. If that target is met, it will result in around 28,000 fewer cancelled appointments. We have also put in other indicators. We are looking at the ratio of new appointments against review appointments, because, again, we accept that there are far too many review appointments relative to new appointments, and we need to look at how we can bear down on that as well. So, the Department has put in place a range of measures. We expect the board to manage that and to work with the trust to try to ensure that those targets are met. We do take the issue extremely seriously.
Mr Gardiner: What is the board doing at the moment to make those improvements?
Mrs Groogan: At this point in time, the board meets the trusts on a regular basis to discuss a range of performance issues. Clearly, when the target and the indicator are introduced next year, we will put in place the same performance management arrangements for them as we do for any of the other targets on waiting times or the delivery of core capacity. So, at this point in time, it is about looking primarily at whether the trusts are in a position to deliver the volumes of outpatient activity that they need to. If they are not, we need to look at why not and what their reasons are for that. So, as Eugene said, I think that this is a really good platform for us to move forward with the performance management arrangements.
Mr Gardiner: I think that you need to move fast to make improvements. It is not good. It is definitely not good for the health service.
Dr Mooney: We will not wait for the target to come in in practice; this is something that the trust will be doing now. The board will obviously have those conversations and, in turn, the Department will have a conversation with the board about the best way to bear down on and reduce the number of cancellations. So, we will not simply wait for the introduction of the new target. We expect people to be dealing with this as we speak.
Mr Gardiner: Right, OK. We will watch this space.
The Chairperson: I have a number of short questions. Initially, regarding the reasons for cancellations in each of the trusts, are you able to monitor the number of cancellations across each speciality and for individual consultants?
Dr Mooney: We will be able to monitor that across the specialities, yes. The target will look at that.
The Chairperson: Can you do it now?
Dr Mooney: Yes, we can.
The Chairperson: You can. You have that information now across specialities and for consultants.
Mrs Groogan: I think that the trusts monitor it on an individual consultant basis.
The Chairperson: So, that information is available now. How do you use the data collected to monitor the performance of consultants?
Dr Mooney: [Inaudible.] in terms of annual appraisal.
The Chairperson: If the trusts have the data, how do you use that? You are saying that you have information across the specialities and for consultants, so how do you use that to monitor performance?
Ms Carroll: It is only now that we have the data available to us in that kind of format. You are saying, "How would we then drill into that data to make it speciality specific?". Yes —
The Chairperson: Sorry, I was told a minute ago that data is available across the specialities and for consultants, and now I am being told that it is only now available. Do we have it or do we not?
Dr Mooney: If you are asking whether we have information on the numbers, or on some of the things that we have been talking about, for cancelled consultant appointments for those reasons and by those specialities, we —
The Chairperson: I am talking specifically about the role of the trusts. In any other management process, if data was available that flagged up that there are cancellations across a number of key specialities and for a number of consultants, surely performance monitoring would kick in.
Mr Johnston: We do not have that information with us. We can find out what action is taken. If there are incidences —
The Chairperson: I am asking the trust. If the trust has that information, is it not monitored?
Mr McKinney: Chair, can I just re-emphasise the point? If you were making widgets and there was a failure to make the widgets because the person responsible was not attending work or for whatever reason, you would employ some sort of employment targets or calculation around that, per consultant. I am not talking about the wider figures. We are using the wider figures to monitor the performance of consultants within specialties. Are you doing that?
Ms Carroll: Consultants undergo appraisals, but —
Mrs Groogan: It is difficult to speak on behalf of all the trusts; only one trust is represented today. It is very much a trust management issue and it is also a medical management issue, which none of us can talk about. That is the honest answer.
Mr McKinney: Is your answer is simply no?
Mr Johnston: No, but we can find out. That is the answer.
Mrs Groogan: There are detailed consultant appraisal processes for things like this, but I am not familiar with them because it is down medical lines and nor —
The Chairperson: We are not asking you to speak on behalf of all the trusts. Just speak for your own trust.
Ms Carroll: My difficulty is that that is handled under consultant appraisal. It is not part of the work that I am involved in.
Dr Mooney: You are asking whether the trusts have information, which they would, across the specialties about which consultants are cancelling clinics and whether, if the numbers of cancelled clinics are high in particular areas, the trusts would have conversations with those consultants. It is not unreasonable to do so. I do not know whether they are doing that. I imagine that they should be doing it and that they are doing so, but we can come back and clarify that. That is part of how their work is managed and the contract that they have to undertake particular volumes of work. So, those things are routinely managed within trusts.
The Chairperson: OK. The other side of that is, if you have that information, how do you use it to reduce the number of cancelled appointments? We are suggesting that it is not necessarily the responsibility of those who are sitting in front of us. Whose responsibility is it? Is it that of the chief executives of the trusts? Who implements or deals with that data?
Dr Mooney: If a particular trust is looking across the specialties and trying to find out where high rates of cancellations are in a particular specialty, the trust's chief executive has responsibility for finding out where those cancellations are not defensible. There may be reasons why a particular consultant is always called away to A&E or called away at different stages. Those explanations will be gone through with that individual. Ultimately, it will be for a trust's chief executive to deal with. There are lines of accountability. We will look to see how that is managed from the Department through the board to the trust. If there are such problems, and we have the information in front of us, it would be addressed as part of performance management. That will be the case more so now that we have a particular target in place.
As I said in the opening statement, the target is not just about the reduction; it will be looked at across specialities and will be applied across all trusts.
The Chairperson: When will the figures for April 2012 to March 2013 be published?
Dr Mooney: Sorry, when the figures for —
The Chairperson: For cancelled appointments. That is what we are talking about.
Dr Mooney: The new sets of figures —
The Chairperson: We do not have the figures for April 2012 to March 2013. When will they be published?
Dr Mooney: I will check to find out when they will be published. One of the things that we referred to is that we intend to publish the new figures that we have available on a quarterly basis.
The Chairperson: It is not the new figures that we are looking for. We are looking for the overall annual figures.
Dr Mooney: I will check to find out when the figures for 2012 to 2013 will be published. I will come back to you with that date.
The Chairperson: Can I ask that they are forwarded to the Committee so that they can be given proper scrutiny?
Dr Mooney: Yes.
The Chairperson: I want to touch on the differences in table 1 and chart 1 because there was a bit of confusion there. From my reading of it, chart 1 seems to indicate that, of the people who turned up for an appointment in July, nearly 4,000 had previously had an appointment cancelled, which resulted in a delay for them averaging three to four weeks. Table 1a is not about people who came through the door of the hospital in July; it is about appointments that were booked through the hospital admin teams. The total number of appointments cancelled by hospitals across all trusts in July was almost 30,000. That is a very stark statistic relating to the levels that we are dealing with. Again, it is about the breakdown of the reasons for those delays, because we have not had that. I ask the Department to confirm that it will forward that information that the Committee is requesting.
Dr Mooney: Yes. What we have presented to you there is the number of appointments out of a total of 106,000 appointments in July that were cancelled, the impact of that, whether there was a delay experienced or there was no delay, and the impact of the particular days.
We have only two months' worth of new information. We had to hold the short life working group. We had to agree the regional code and get all those things in place. We have produced the information. My staff in the Department are looking at further analysis of things on this, which is why we shared some of that with the Committee in the opening statement. We will undertake further analysis and submit that to the Committee; there is no issue there.
We are looking at this and will do the analysis, but this is information in development and it will take a while for us to get a proper handle on it. Our intention is, as soon as possible, to begin quarterly reporting of the information. If there is information that the Committee feels that it would like but it has not got, we will endeavour to get that to you as quickly as possible.
The Chairperson: We have been specific about the breakdown that we are requesting regarding that July figure in table 1a.
Mr Johnston: Just for clarification, what is missing from table 1a that you would like to have?
The Chairperson: We are talking about chart 1 and the people who turned up for an appointment. Nearly 4,000 people had an appointment cancelled previously. Then we come to table 1a, which is not about the people who came through the door of a hospital.
Mr Johnston: OK. I take your point.
The Chairperson: We are looking for the breakdown of that. We have been specific enough, and you are clear on what we are asking.
Mr McKinney: I just want to check something. We asked specifically at the start about the correlation between that and 1a. It was explained that this was the connection. I would be concerned if it is not, and if there is some refinement, if you know what I mean. That is the best way of describing it.
Ms Carroll: Table 1a is the full list of all the cancellations, which includes patient-cancelled as well as hospital-cancelled appointments. Do you know what I mean? It is the whole thing.
The Chairperson: It seems to make Fearghal's point that it is two different sets of data and is not connected.
Mr McKinney: I am concerned that one was being explained as being central to the other, which it may not have been.
Dr Mooney: We will write to the Committee to set out the information that you require. We will map the table to the particular charts for you separately.
Mr Beggs: I would guess that the cost of organising and running consultants' surgeries and appointments would be around £100 million a year. It strikes me that, if it was a business, it would be carefully monitored by its owner to make sure that its output was good. What are the key performance indicators that the board should be looking at to satisfy itself that, in an ideal world, we get the best possible output? Is the board going to micromanage every detail? What is the best aspect for the board to look at? You allocate the money, so how will you monitor and manage whether you are getting the performance required?
Mrs Groogan: The board will generally use a range of performance indicators to ensure that it gets value for money in the output from what it commissions —
Mr Beggs: What is the key bit of information?
Mrs Groogan: I think that it would be performance against service and budget agreements so that the volumes that are delivered by trusts are the volumes of outpatient activity that the board has commissioned them to deliver. Behind that would be a subset of indicators around how they maximise their productivity to ensure that they deliver those volumes through reducing cancellations, the introduction of partial bookings and that range of service improvements —
Mr Beggs: Is this new?
Mrs Groogan: No. The board has been monitoring delivery against core activity with trusts for probably just over a year. It is about saying, "You are commissioned to deliver this volume of outpatient appointments and you have delivered that volume; is there a variance or not?".
Dr Mooney: I think the point made at the last meeting was that the trusts effectively get paid for just the volume of the service that they deliver. When we talked about whether there was a loss of productivity there, they said, "Well, there is an analysis that looks at demand and capacity, at whether the capacity is there to meet the demand, and the services are commissioned appropriately in order to meet that demand". If a trust finds that it is not able to meet that, it is not as though that money is paid. A trust is paid only for what it delivers.
Mr Beggs: Do you also appreciate that patient experience is to be built into this? You should not operate like some of the airlines by booking in extra patients and consider it tough if they are left standing there.
Mrs Groogan: One of the key differences is that we are not operating an airline or running a business. These are major and complex organisations with patients at the end of that. I suppose that it is about those indicators from the macro to the micro level. So, it is about accepting that the key performance indicators terms are around the delivery of core activity, but, in the delivery of those volumes, there are expectations around quality, safety and patient experience.
Dr Mooney: On a general point, we accept that this type of performance is not conducive to a good experience for patients. We are looking separately at patient experience, and a programme of patient experience surveys will be built into the next commissioning plan direction. So, we will also be asking patients about their experience as an inpatient, of A&E and the service in general.
Mr Beggs: Can you assure me that the trusts are aware that you are not just asking for numbers or for boxes to be ticked, and that they are aware that how patients are treated in achieving good outcomes and performance is also important?
Dr Mooney: Yes.
The Chairperson: OK. Thank you. Obviously, the Committee has a number of points that it is seeking to clarify with you. We look forward to receiving that information, particularly the published figures for 2012-13. We will be looking to interrogate those figures and will be back in contact with you. |
Cardiopulmonary effects of butorphanol tartrate in horses.
The cardiopulmonary and behavioral effects of butorphanol were evaluated in pain-free adult horses. Butorphanol tartrate was administered IV in doses of 0.1, 0.2, and 0.4 mg/kg to the same horses on 3 separate occasions. There were no significant (P less than 0.05) changes in heart rate, mean and diastolic arterial pressure, mean and diastolic pulmonary arterial blood pressure, or cardiac output recorded in the horses given these doses. Systolic arterial blood pressure was significantly (P less than 0.05) increased in only the horses given the 0.2 mg/kg dose. Significant (P greater than 0.05) changes in electrocardiographic intervals, respiratory rate, arterial blood gas values, or pH were not recorded. Increasing IV doses of butorphanol resulted in varied behavioral changes, but were predominantly excitatory. |
Nocellara del Belice
Nocellara del Belice is an olive cultivar from the Valle del Belice area of south-western Sicily. It is a dual-purpose olive, grown both for oil and for the table. It is used to make "Valle del Belìce" extra-virgin olive oil, which is pressed from a minimum of 70% Nocellara del Belice olives. As a table olive it may be treated by various methods, one of which is named for the comune of Castelvetrano in the Valle del Belice; these may be marketed as Castelvetrano olives in the United States and elsewhere, and are large, green olives with a mild, buttery flavor.
The Nocellara del Belice olive has two DOP protections: both Valle del Belìce DOP olive oil and Nocellara del Belice DOP table olives have protected status in the European Union.
Nocellara del Belice olives are grown primarily in Sicily, but also in India, Pakistan and South Africa.
References
External links
Category:Italian products with protected designation of origin
Category:Olive cultivars
Category:Castelvetrano |
9.23.2011
Buffalo Chicken Nachos
A Sunday afternoon in the Fall is No Thank You Boy's favorite time of the year. Football games continue one right after another from early afternoon all the way into the late evening. And an integral part of watching football games for him is the eating of football food.
Nachos are on every sports restaurant/bar menu with the usual ingredients of tortilla chips, seasoned ground beef, beans, cheddar cheese, tomatoes, lettuce, sour cream, salsa and guacamole. This version of the pseudo-Mexican snack is good enough on its own, but I decided to change up a few ingredients to suit No Thank You Boy's spicy taste buds and affinity for chicken. Buffalo Chicken Nachos combine shredded chicken with Frank's Hot Sauce and cheddar and blue cheeses on top of blue and white corn tortilla chips. After a few minutes in a hot oven, the nachos are topped with celery, tomatoes, and scallions.
It is only 2 days until Sunday. Make sure you have the ingredients to make Buffalo Chicken Nachos and sit back and cheer on your favorite football team. |
Can postmortem proteolysis explain tenderness differences in various bovine muscles?
This study investigated the relationship between postmortem proteolysis, muscle pH decline, sarcomere length (SL), intramuscular fat (IMF) and Warner-Bratzler shear force (WBSF) in four bovine muscles (biceps femoris (BF), infraspinatus (IS), longissimus lumborum (LL), psoas major (PM). The WBSF was low in BF, IS and PM, while LL had a higher value (P<0.001), but still considered as tender. The PM had fastest pH decline (P<0.001), ultimate pH was lowest in LL and PM and highest for IS (P<0.001), sarcomeres were longest for PM and shortest for BF and LL (P<0.001), while IS and PM had more IMF than BF and LL (P=0.038). Troponin T degradation was similar in all muscles after 2d postmortem, however after 13d LL had more degradation than IS (P=0.003). The MMP-2 activity increased during storage (P=0.001), while IS had less activity than the other muscles (P=0.022). Although the variation in proteolytic activity could not explain the variation in WBSF, the study provides useful knowledge for the meat industry for optimising processing and storage procedures for different beef muscles. |
ADAM, EVE AND THE SERPENT
Regular price
$13.00
Tax included.
by Elaine Pagels
(taken from southerncrossreview.org)
"The story of Adam and Eve, and the Serpent was written down about 3,000 years ago and probably told for many generations before that. During the course of her investigations, Pagels became fascinated with the extraordinary influence this tale has had on western culture. Augustine, whose views eventually became dogma, derived many of his ideas from this story: that sexual desire is sinful; that infants are infected from the moment of conception with the disease of original sin; and that Adam’s sin (not to mention Eve’s) corrupted the whole of nature itself. Even non-Christians live in a culture indelibly shaped by these interpretations.
By the beginning of the fifth century, Augustine had labeled spontaneous sexual desire (not for the purpose of procreation) as a proof of – and penalty for – universal original sin, a concept that would have baffled most of his Christian predecessors, as well as his pagan and Jewish contemporaries. Earlier generations of Christians and Jews found in Genesis 1-3 the affirmation of human freedom to choose good or evil. But Augustine found in it a story of human bondage. He argued that all humankind was fallen and that human will was incorrigibly corrupt. Finally, with the power of the Church and Empire behind him, Augustine decided that not only non-Christians, but also Christians who did not abide by his dogmas should be repressed.Many Christians as well as pagans, he noted regretfully, responded only to fear."
“What Christians see, or claim to see, in Genesis 1-3 changed as the church itself changed from a dissident Jewish sect to a popular movement persecuted by the Roman government, and changed further as this movement increasingly gained members throughout Roman society, until finally even the Roman emperor himself converted to the new faith and Christianity became the official religion of the Roman empire.” ― Elaine Pagels,Adam, Eve, and the Serpent: Sex and Politics in Early Christianity |
1-Jerry Lee´s Penis2-Mud3-Buttefly Sky4-I Ride a White Horse Against UFOs5-How Miller Beer is Made6-Don´t Dance7-The Myth of Objectivity8-World Economy9-Neo-Solipsism10-The Easy Way Out11-Fill in the Blanks12-Profits Without Honor13-New Subjectivity 14-National Duty vs. Obligations to the Human Race15-For Those Among Us Who Have Fallen16-Teenage Kids Just Want To Kill17-Profits Without Honor18-The Myth of objectivity19-Jerry Lee´s Penis20-For Those Among Us Who Have Fallen21-Miller Beer22-I Ride a White Horse Against UFOs23-Teenage Kids Just Want To Kill |
1. Introduction {#j_med-2016-0029_s_001}
===============
HS is the most commonly seen hemolytic disease in hereditary red cell membrane disease. The incidence rate in North Europe and North America can be as high as 1/2000; the overall incidence rate in Caucasians is 1/2000-1/5000\[1\]. According to the statistics of the Changhai Affiliated Hospital of Shanghai Second Military Medical University, among all the hereditary hemolytic diseases, hemoglobin disease counts for 34%, red cell membrane diseases 43%, and red cell enzyme diseases 23%; HS makes 84% in all the red cell membrane diseases [@j_med-2016-0029_ref_002]. The featuring chromosome alteration of CML is t (9;22) (q34;q11), hence in molecular level causes the formation of BCR-ABL fusion gene. Concurrent cases of HS and CML is rarely seen in literature reports, here we report our case as follows.
2. Case report {#j_med-2016-0029_s_002}
==============
The patient is female, 27 years old, with her mother, aunt, and brother and cousin history of HS. She was sent to our hospital in April 2005, for "yellowish discoloration of the sclera and the skin for 3 years, aggravated for 2 months". Physical examination shows "mild yellowish discoloration of the sclera and the skin, soft abdomen, liver not palpable, spleen is palpable 3cm below the left costal margin. Auxiliary examinations: blood routine test: white blood cell count (WBC) 8.2\*10E9/L, red blood cell count (RBC) 2.84\*10E12/L, hemoglobin (Hb) 92g/L, mean corpuscular hemoglobin concentration (MCHC) 382g/L, platelet count (PLT) 327\*10E9/L, proportion of reticulocyte 10.1%; blood smear shows the proportion of spherocytes is 18%; Erythrocyte osmotic fragility test: hemolysis begins at 0.56% salt solution (normal control at 0.42%), complete hemolysis at 0.41% salt solution (normal control at 0.22%); liver function tests: total bilirubin (TB) 163.3umol/L, indirect bilirubin (IB) 154.4umol/L, Lactate dehydrogenase (LDH) 402U/L. computed tomography of the abdomen shows splenomegaly (7 rib units); bone marrow routine test shows significantly active bone marrow proliferation ([Figure 1](#j_med-2016-0029_fig_001){ref-type="fig"}), erythroid proliferation is active, spherocytes are commonly seen, counts for 15%, folic acid, vitamin B12, ferritin, glucose phosphate isomerase, glucose-6-phosphate dehydrogenase test and pyruvate kinase tests were normal, Coomb's test shows negative result; normal hemoglobin electrophoresis; expression of CD55 and CD59 on erythrocytes and granulocytes are not significantly below normal range. The clinical diagnosis is: HS. She was given partial embolization of the splenic artery, after which yellowish discoloration of the skin and sclera faded, hemoglobin and bilirubin level returned to normal and splenomegly relieved.
{#j_med-2016-0029_fig_001}
Yellowish discoloration of the skin and sclera occurred again in September 200 7. Auxiliary examination shows: WBC 12.4\*10E9/L, RBC 3.17\*10E12/L, H 108g/L, PLT 425\*10E9/L, proportion of reticulocyte 12%; liver function tests: TB 122.3umol/L, IB 108umol/L; upper abdomen CT shows splenomegly (7 rib units) and splenic embolization postoperative change; bone marrow test gives the same result as the previous one. She received a second partial splenic artery embolization. After the procedure, yellowish discoloration of the skin and sclera faded, hemoglobin and bilirubin level returned to normal and splenomegly relieved again.
Her blood routine test in February 2008 shows a result of WBC 69.2\*10E9/L the proportion of neutrophils is 74% RBC 3.93\*10E12/L Hb 124g/L PLT 575\*10E9/L proportion of late promyelocyte is 10%, the proportion of reticulocytes is 11%。Physical examination shows her skin and sclera are mildly yellowish discolored, spleen is enlarged and being palpable 8cm below the left costal margin. Bone marrow test shows extremely active proliferation, Myeloid: erythroid ratio is 8:1, all stages of myeloid cells are increased, especially late promyelocytes, eosinophils and basophils are commonly seen, neutrophil alkaline phosphatase positive rate is 1%, score 2. Chromosome: 46, XX, t(9; 22)(q34; q11) ([Figure 2](#j_med-2016-0029_fig_002){ref-type="fig"}); bone marrow gene test: M-bcr-abl/abl 92%, m-bcr-abl/abl(-). She was diagnosed of CML (chronic phase), and was given imatinib therapy for 1 month before recheck her blood routine test: WBC 7.4\*10E9/L, RBC 3.8\*10E12/L, Hb 121g/L, PLT 344\*10E9/L. She didn't re-examine chromosome and fusion gene.
{#j_med-2016-0029_fig_002}
**Ethical approval**: The research related to human use has been complied with all the relevant national regulations, institutional policies and in accordance the tenets of the Helsinki Declaration, and has been approved by the authors' institutional review board or equivalent committee.
**Informed consent**: Informed consent has been obtained from all individuals included in this study.
3. Discussion {#j_med-2016-0029_s_003}
=============
HS is a hereditary hemolytic disease, in most cases is an autosomal dominant trait [@j_med-2016-0029_ref_003]. The age of onset presents with heterogeneity: it can start from infancy, however in rare cases can start from old age too, which is related to the severity of the defects of the membrane protein. The clinical manifestations of HS are hemolytic anemia of varying degrees, intermittent jaundice, enlargement of the spleen, and significant improvement of symptoms after splenectomy [@j_med-2016-0029_ref_004]. The hematological characteristics are spherical red blood cell in peripheral blood and significantly elevated red blood cell osmotic fragility [@j_med-2016-0029_ref_001],[@j_med-2016-0029_ref_005],[@j_med-2016-0029_ref_006].
According to guidelines for the diagnosis and management of hereditary spherocytosis, patient with an HS family history, typical clinical features (e.g. splenomegly) and peripheral blood index (elevated MCHC and reticulocytes, and presence of spherocytes) can be diagnosed with HS without further examinations. Approximately 70% of HS are autosomal dominant, 25% are autosomal recessive and 5% are de novo mutations. Even in autosomal dominant cases, most patients need further laboratory tests, for folate deficiency, severe anemia or recent blood transfusions can cover the changes in blood test index. In this case, the patient presents with an HS family history, anemia, jaundice, splenomegaly, elevated MCHC and red blood cell osmotic fragility, elevated reticulocytes, and spherocytes can be seen in peripheral blood. Hence the diagnosis of HS is clear according to 2011 HS guideline.
According to the management recommendations provided in the guidelines, the patient underwent a partial splenic artery embolization, and received good therapeutic effect [@j_med-2016-0029_ref_007]. Disease relapsed 2 years later, she underwent a second procedure which is still effective, however mild hemolysis has always been present since. During the time she was given 2nd generation tyrosine kinase inhibitor (TKI) (nilotimib and dasatinib), her hemolysis exacerbated. This condition has not been reported in literature up to date.
3 years after being diagnosed with HS, she was diagnosed of CML. She has been being treated with imatinib for 1 month, but stopped regular treatment afterwards for various kinds of reasons, she has been pregnant and given birth to a healthy baby girl. After the parturition, her examination results showed she was still in chronic phase. Through 3 months of regular treatment with 2nd generation TKI dasatinib, she achieved hematological remission, but gained no improvements in chromosome and BCR-ABL fusion gene ([Figure 3](#j_med-2016-0029_fig_003){ref-type="fig"}). Her treatment response is suboptimal response. The possible reasons for her poor treatment response could be: a. unstandardized and delayed treatment; b. leukemia cells are retained in the enlarged spleen caused by HS; c. drug resistance.
{#j_med-2016-0029_fig_003}
Recently, People's Hospital of Peking University Hematology Institute successfully treated a female case of HS associated with CML by allogenic hematopoietic stem cell transplantation [@j_med-2016-0029_ref_008]. After transplantation, the patient's anemia significantly improved, reticulocytes and MCHC went back to normal, BCR-ABL fusion gene is negative, TB level went back to normal. HS has no HLAidentical allogenic hematopoietic stem cell transplantation contraindications. The patient in our case is currently with serious hemolysis, has been treating with 2nd generation TKI for 3 months but hasn't achieved optimal response, HLA-identical allogenic hematopoietic stem cell transplantation can be a choice, for it cures both of the diseases. Also for this patient, we think splenectomy possibly can also have good effect for her condition.
For this patient, CML occurs during the treatment of HS. Could the occurrence of the two conditions have some sort of association? There are no literature reports exploring the reason, and is still waiting to be studied.
**Conflict of interest statement**: Authors state no conflict of interest.
|
Q:
Getting value from a range input (slider)
I am adding a slider dynamically on a page using a string like the one below:
"<input type=\"range\" name=\"aName\" min=\"1\" max=\"9\"/>";
Then, after I append it to the page using plain javascript I can delegate using the following code:
$('input[name=aName]').on('change', function () { alert(this.value)});
and indeed when the value changes, I receive the alert with the correct value. However, if I delegate like this:
$('input[name=aName]').on('change', handleChange);
and define the function later on like this:
function handleChange () {
var theValue = $('input[name=aName]').value;
alert("value: " + theValue);
}
I receive the alert with the message "value: undefined". Why is this thing happening?
A:
This is wrong $('input[name=aName]').value. I think you're mixing javascript & jquery.
For getting the value, use like this.
$('input[name=aName]').val()
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.